• Title/Summary/Keyword: 네트워크 지도

Search Result 12,221, Processing Time 0.048 seconds

Exploration of Optimum Retention of Antibacterial Agents in Functional Packaging Paper (항균 포장원지내 항균소재의 최적 정착법 탐색)

  • Kim, Chul-Hwan;Kim, Jae-Ok;Jung, Jun-Ho;Cho, Sung-Hwan
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.34 no.2
    • /
    • pp.298-305
    • /
    • 2005
  • Antimicrobial packaging paper was prepared with a powder-type botanical antimicrobial agent from grapefruit seed extract (BAAG) and zeolite according to TAPPI standard method. The functional fillers containing BAAG fixed to CaCO$_3$ and zeolite were well retained in the fiber network by a retention aid such as cationic polyacrylamide, which was ascertained by the ash contents of paper and the SEM microphotographs. With addition of the functional fillers to paper, tensile strength and burst strength of the paper decreased by interference of the functional fillers with interfiber bonding but bending stiffness and tear strength increased by improved elastic modulus of paper and delayed transfer of tearing energy. Finally, it was confirmed that the antimicrobial packaging paper might be able to be used to make packaging bags and corrugated containers due to the minor deterioration of strength properties.

A Practical Attack on In-Vehicle Network Using Repacked Android Applications (커넥티드 카 환경에서 안드로이드 앱 리패키징을 이용한 자동차 강제 제어 공격)

  • Lee, Jung Ho;Woo, Samuel;Lee, Se Young;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.679-691
    • /
    • 2016
  • As vehicle started to contain many different communication devices, collecting external information became possible in IoT environment. In such environment, remotely controling vehicle is possible when vehicle information is obtained by looking in to vehicle network through smart device. However, android based smart device applications are vulnerable to malicious modulation and redistribution. Modulated android application can lead to vehicle information disclosure that could bring about vehicle control accident which becomes threat to drivers. furthermore, since vehicles today does not contain security methods to protect it, they are very vulnerable to security threats which can cause serious damage to users and properties. In this paper, many different vehicle management android applications that are sold in Google Play has been analyzed. With this information, possible threats that could happen in vehicle management applications are being analysed to prove the risks. the experiment is done on actual vehicle to prove the risks. Also, access control method to protect the vehicle against malicious actions that could happen through external network in IoT environment is suggested in the paper.

Design and Implementation of IR-UWB Packet Analyzer Based on IEEE 802.14.5a (IEEE 802.15.4a IR-UWB 패킷 분석기 설계 및 구현)

  • Lim, Sol;Lee, Kye Joo;Kim, So Yeon;Hwang, Intae;Kim, Dae Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2857-2863
    • /
    • 2014
  • IR-UWB has been developed as a standard of indoor ranging technology, because it has robust and good transmission characteristics in indoor environments and it can be operated with low power. In this paper, a IR-UWB packet analyzer is designed and implemented based on IEEE 802.15.4a, which is useful in developing IR-UWB real time location system with resolution of a few ten centimeters. A sniffer device of the packet analyzer monitors IR-UWB wireless networks, captures MAC packet frames, and transmits packet frames to the packet analyzing computer. The packet analyzing program in a computer analyzes received MAC packet frames and displays parsed packet information for developing engineers. Developed packet analyzer is used to analyze IEEE 802.15.4a MAC protocol, and also it can be used in other IEEE 802 series MAC protocol by modifying some functions.

TCP Performance Improvement Scheme on Dynamic Wireless Environment over UMTS System (UMTS 시스템에서 동적 무선 환경 변화에 따른 TCP 성능 향상 기법)

  • Kim, Nam-Ki;Park, In-Yong;Yoon, Hyun-Soo
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.943-954
    • /
    • 2003
  • The mobile telecommunication system has been growing exponentially after 1990s due to the high population in a city and the growth of mobile user. In this time, the current mobile system mainly concentrates on the voice communication. However, in the next generation, mobile users want to get very diverse services via mobile terminal such as the Internet access, web access, multimedia communication, and etc. For this reason, the next generation system, such as the UMTS (Universal Mobile Telecommunication Services) system, has to support the packet data service and it will play the major role in the system. By the way, since the Web service is based on TCP, most of the Internet traffic TCP traffic. Therefore, efficient transmission of TCP traffic will take very important role in the performance of packet data service. There are many researches about improving TCP performance over wireless network. In those schemes, the UMTS system adapts the link layer retransmission scheme. However, there are rarely studies about the exact performance of the link layer retransmission scheme in the face of dynamic changes of wireless environment over the UMTS system. The dynamic changes of wireless environment, such as wireless bandwidth, can degrade TCP performance directly. So, in this paper, we simulate and analyze the TCP performance in the UMTS system with dynamic wireless environments. Then, we propose a simple scheme for minimizing TCP performance degradation. As a result of simulation, we can find that when wireless environment is changed dynamically, the probability of TCP timeout is increased, and the TCP performance is degraded very much. In this situation, the proposed simple scheme shows good performance. It saves wireless resources and reduces the degradation of TCP performance without large overhead of the base station.

Analysis of Level and Capacity for Multi-piconet in Koinonia High-Rate WPAN (Koinonia 고속 WPAN의 다중 피코넷 레벨 몇 용량 분석)

  • Jung Ssang-Bong;Yim Soon-Bin;Lee Tae-Jin;June Sun-Do;Lee Hyeon-Seok;Kwon Tai-Gil;Cho Jin-Woong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.3B
    • /
    • pp.216-223
    • /
    • 2006
  • The KOINONIA is developed to communicate with connection of the short-range devices by the technique of the WPAN. The piconet consists of one master and slaves above one, the multi-poconet consists of parent piconet and child piconets which is formed the basis of parent piconet. The child piconet consists of the child master and slaves. The child master takes a role of the master in the child piconet and the slave in the parent piconet. In this paper, the multi-piconet is made as above, then we estimate the max capacity of assigned CTA by level, number of slaves in child piconet. A super-frame is the maximum 65.535ms of usable capacity. Because of it is a fued number, We suggested quantitatively the fixed reduction of an usable capacity by increases of number of slave and child-master in the piconet. And we analyze the reduction of an available capacity by the increase of number of child piconet.

Fast Stream Cipher AA32 for Software Implementation (소프트웨어 구현에 적합한 고속 스트림 암호 AA32)

  • Kim, Gil-Ho;Park, Chang-Soo;Kim, Jong-Nam;Cho, Gyeong-Yeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.954-961
    • /
    • 2010
  • Stream cipher was worse than block cipher in terms of security, but faster in execution speed as an advantage. However, since so far there have been many algorithm researches about the execution speed of block cipher, these days, there is almost no difference between them in the execution speed of AES. Therefore an secure and fast stream cipher development is urgently needed. In this paper, we propose a 32bit output fast stream cipher, AA32, which is composed of ASR(Arithmetic Shifter Register) and simple logical operation. Proposed algorithm is a cipher algorithm which has been designed to be implemented by software easily. AA32 supports 128bit key and executes operations by word and byte unit. As Linear Feedback Sequencer, ASR 151bit is applied to AA32 and the reduction function is a very simple structure stream cipher, which consists of two major parts, using simple logical operations, instead of S-Box for a non-linear operation. The proposed stream cipher AA32 shows the result that it is faster than SSC2 and Salsa20 and satisfied with the security required for these days. Proposed cipher algorithm is a fast stream cipher algorithm which can be used in the field which requires wireless internet environment such as mobile phone system and real-time processing such as DRM(Digital Right Management) and limited computational environments such as WSN(Wireless Sensor Network).

The Characteristics of Web Applications and the Proposal of Their Development Methodology (웹 애플리케이션의 특징과 개발 방법의 제안)

  • Yoon, Jun-Su;Chung, Yong-Ju
    • Annual Conference of KIPS
    • /
    • 2003.05c
    • /
    • pp.1737-1740
    • /
    • 2003
  • 최근 몇 년간 웹 애플리케이션의 개발은 다른 애플리케이션의 개발보다 사회적으로 더욱 활발하였다. 이것은 우리 사회에 많이 보급되어 손쉽게 접근할 수 있는 인터넷과 또 그 인터넷 안에 있는 웹의 편리함에 그 이유가 있을 것이다. 그러나 이러한 활발한 웹 애플리케이션 개발에 비하여 웹 애플리케이션의 개발 방법 자체에 대한 연구는 거의 전무한 상태이다. 따라서 대학 교육에서도 그 일정한 지침이 없는 상태이다. 이러한 개발 방법에 대한 미진한 연구는 아마도 다른 애플리케이션에 비하여 웹 애플리케이션의 개발이 시작된 지 오래되지 않은 원인도 있겠지만 또 웹 애플리케이션이 가지는 특성에도 기인할 것이다. 즉, 웹은 보통 MVC(Model-View-Controller) 모델의 뷰(view)가 중심이 되고 컨트롤 부분이나 모델 부분은 상대적으로 적기 때문이다. 그래서 그 구현이 다른 일반 애플리케이션의 구현보다 비교적 개념이 쉽고 간단하다. 그러나 그 구현이 비교적 간단하다 하더라도 정형화된 개발 모델이 있으면 애플리케이션의 생산성은 향상될 뿐만이 아니라 학교 교육에도 큰 도움이 될 것이다. 즉 학생들에게 정형화 된 모델을 교육하는 경우 그것은 학생들의 웹 애플리케이션 개발에 큰 도움이 되는 것이다. 실제로 개발 모델을 교육시키고 프로젝트를 하는 경우와 그렇지 않은 경우에 그 완성도에서 크나큰 차이를 보였다. 정형화된 모델을 교육받은 학생들은 그렇지 않은 학생들에 비하여 프로젝트의 완성도도 높을 뿐만 아니라 그 구성이나 일관성에서 훨씬 좋은 결과를 보였다. 본 논문에서는 이러한 웹 애플리케이션을 위한 개발 방법을 제시하고 그에 앞서 클라이언트-서버 모델이 웹이라는 환경에서 가질 수 있는 특성과 작업에 대하여 분석한다. 그리고 본 논문에서는 그 예를 JSP로 보여준다.라도 단순 다중 쓰레드 모델보다 더 많은 수의 클라이언트를 수용할 수 있는 장점이 있다. 이러한 결과를 바탕으로 본 연구팀에서 수행중인 MoIM-Messge서버의 네트워크 모듈로 다중 쓰레드 소켓폴링 모델을 적용하였다.n rate compared with conventional face recognition algorithms. 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며 그 유의성이 움직임 보정 전에 비하여 낮음을 알 수 있었다. 결론: 뇌활성화 과제 수행시에 동반되는 피험자의 머리 움직임에 의하여 도파민 유리가 과대평가되었으며 이는 이 연구에서 제안한 영상정합을 이용한 움직임 보정기법에 의해서 개선되었다. 답이 없는 문제, 문제 만들기

  • PDF

Automatic Extraction of Abstract Components for supporting Model-driven Development of Components (모델기반 컴포넌트 개발방법론의 지원을 위한 추상컴포넌트 자동 추출기법)

  • Yun, Sang Kwon;Park, Min Gyu;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.543-554
    • /
    • 2013
  • Model-Driven Development(MDD) helps developers verify requirements and design issues of a software system in the early stage of development process by taking advantage of a software model which is the most highly abstracted form of a software system. In practice, however, many software systems have been developed through a code-centric method that builds a software system bottom-up rather than top-down. So, without support of appropriate tools, it is not easy to introduce MDD to real development process. Although there are many researches about extracting a model from code to help developers introduce MDD to code-centrically developed system, most of them only extracted base-level models. However, using concept of abstract component one can continuously extract higher level model from base-level model. In this paper we propose a practical method for automatic extraction of base level abstract component from source code, which is the first stage of continuous extraction process of abstract component, and validate the method by implementing an extraction tool based on the method. Target code chosen is the source code of TinyOS, an operating system for wireless sensor networks. The tool is applied to the source code of TinyOS, written in nesC language.

Methods for Stabilizing QoS in Mobile Cloud Computing (모바일 클라우드 컴퓨팅을 위한 QoS 안정화 기법)

  • La, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.507-516
    • /
    • 2013
  • Mobile devices have limited computing power and resources. Since mobile devices are equipped with rich network connectivity, an approach to subscribe cloud services can effectively remedy the problem, which is called Mobile Cloud Computing (MCC). Most works on MCC depend on a method to offload functional components at runtime. However, these works only consider the limited verion of offloading to a pre-defined, designated node. Moveover, there is the limitation of managing services subscribed by applications. To provide a comprehensive and practical solution for MCC, in this paper, we propose a self-stabilizing process and its management-related methods. The proposed process is based on an autonomic computing paradigm and works with diverse quality remedy actions such as migration or replicating services. And, we devise a pratical offloading mechanism which is still in an initial stage of the study. The proposed offloading mechanism is based on our proposed MCC meta-model. By adopting the self-stabilization process for MCC, many of the technical issues are effectively resolved, and mobile cloud environments can maintain consistent levels of quality in autonomous manner.

CCTV-Aided Accident Detection System on Four Lane Highway with Calogero-Moser System (칼로게로 모제 시스템을 활용한 4차선 도로의 사고검지 폐쇄회로 카메라 시스템)

  • Lee, In Jeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.255-263
    • /
    • 2014
  • Today, a number of CCTV on the highway is to observe the flow of traffics. There have been a number of studies where traffic data (e.g., the speed of vehicles and the amount of traffic on the road) are transferred back to the centralized server so that an appropriate action can be taken. This paper introduces a system that detects the changes of traffic flows caused by an accident or unexpected stopping (i.e., vehicle remains idle) by monitoring each lane separately. The traffic flows of each lane are level spacing curve that shows Wigner distribution for location vector. Applying calogero-moser system and Hamiltonian system, probability equation for each level-spacing curve is derived. The high level of modification of the signal means that the lane is in accident situation. This is different from previous studies in that it does more than looking for the signal from only one lane, now it is able to detect an accident in entire flow of traffic. In process of monitoring traffic flow of each lane, when camera recognizes a shadow of vehicle as a vehicle, it will affect the accident detecting capability. To prevent this from happening, the study introduces how to get rid of such shadow. The system using Basian network method is being compared for capability evaluation of the system of the study. As a result, the system of the study appeared to be better in performance in detecting the modification of traffic flow caused by idle vehicle.