• Title/Summary/Keyword: 메시지인메시지

Search Result 168, Processing Time 0.023 seconds

Segment Scheduling Scheme for Efficient Bandwidth Utilization of UHD Contents Streaming in Wireless Environment (무선 환경에서 UHD 콘텐츠의 효율적인 대역폭 활용을 위한 세그먼트 스케줄링 기법)

  • Kim, Heekwang;Chung, Kwangsue
    • Journal of Broadcast Engineering
    • /
    • v.23 no.6
    • /
    • pp.813-823
    • /
    • 2018
  • UHD content is characterized by higher bandwidth requirements to provide seamless playback. The existing HTTP adaptive streaming scheme periodically requests video segment of lower quality than the available bandwidth in the steady state. In the steady state, the On-Off pattern is repeated due to the difference of the available bandwidth and the encoding rate of the content. And the repeated Off interval is causing the problem that can not efficiently use the available bandwidth. In the wireless environment where the delay and loss rate are higher with large bandwidth fluctuations, this problem is exacerbated because the available bandwidth is estimated inaccurately. Therefore, in this paper, we propose a segment scheduling scheme for efficient bandwidth utilization of UHD contents streaming in wireless environment. Proposed scheme is a group segment that simultaneously reqeusts multiple segments in one request message in order to reduce frequency of OFF interval. Through simulation, Our scheme improves bandwidth utilization.

Research on Countermeasure of SQL Injection Attack (SQL Injection 공격을 효율적으로 방어하는 대응책 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.21-26
    • /
    • 2019
  • At present, it is indispensable to utilize data as an information society. Therefore, the database is used to manage large amounts of data. In real life, most of the data in a database is the personal information of a group of members. Because personal information is sensitive data, the role of the database administrator who manages personal information is important. However, there is a growing number of attacks on databases to use this personal information in a malicious way. SQL Injection is one of the most known and old hacking techniques. SQL Injection attacks are known as an easy technique, but countermeasures are easy, but a lot of efforts are made to avoid SQL attacks on web pages that require a lot of logins, but some sites are still vulnerable to SQL attacks. Therefore, this study suggests effective defense measures through analysis of SQL hacking technology cases and contributes to preventing web hacking and providing a secure information communication environment.

Tasks and Development plan of R.O.K. Navy to support Korean government's 『Indo-Pacific Strategy』 (한국의 『인도-태평양 전략』 지원을 위한 해군의 역할·발전방안 고찰)

  • Ji, Young
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.83-107
    • /
    • 2023
  • To Republic of Korea in the Indo-Pacific region, the stability and prosperity of the area are directly coupled with national survival, interest. Currently, on account of strategic competition between U.S.A, and China in this area as well as supranational·non-conventional threats, the security environment is unstable, required joint/allied responses. So, lots of states inside(U.S.A., Japan, ASEAN, etc.), also, out of this Indo-Pacific area like EU-NATO, open their own strategy related in Indo-Pacific issues to be involved. R.O.K. government took its own line with publishing self strategy following this international trend, it can be shown korean government's strong intend to join in the pending security issues in this region with 'strategic clarity'. Now, R.O.K. Navy has to back up governments, policy. First, R.O.K. Navy should strengthen the relationship inside and take part in the multilateral cooperation of security. Second, to convey this deterrence message to potential threats, Navy is required to show of forces and have combined exercises. Also, as naval forces of advanced countries, Korea, Navy should be taken action in non-traditional threats, and help developing states improve their sea power. To fulfill this tasks in the wide ocean area, Navy need five inherent characteristics(mobility, flexibility, sustainability, capability of presence and projection). In the end, this paper propose the development plan following operational environment (SWOT) analysis as well.

  • PDF

Group Key Management Scheme for Access Control with Reactive Approach (접근 제어를 위한 반응적 방식의 그룹키 관리 기법)

  • Kim, Hee-Youl;Lee, Youn-Ho;Park, Yong-Su;Yoon, Hyun-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.11
    • /
    • pp.589-598
    • /
    • 2007
  • In the group communication which has multiple data streams and various access privileges, it is necessary to provide group access control. The group members having the same access privilege are classified into one class, and the classes form a hierarchy based on the access relations. Then each class is assigned to a secret key. In the previous schemes, a single logical key graph is constructed from the hierarchy and each member always holds all secret keys of the classes he can access in the proactive manner. Thus, higher-privileged members hold more keys then lower-privileged members. However, if the hierarchy is large, each member manages too many keys and the size of multicast message in rekeying increases in proportion to the size of the hierarchy. Moreover, most of the members access a small portion of multiple data streams simultaneously. Therefore, it is redundant to receive rekeying message and update the keys in which he is not currently interested. In this paper, we present a new key management scheme that takes a reactive approach in which each member obtains the key of a data stream only when he wants to access the stream. Each member holds and updates only the key of the class he belongs. If he wants to get the key of other class, he derives it from his key and the public parameter. Proposed scheme considerable reduces the costs for rekeying, especially in the group where access relations are very complex and the hierarchy is large. Moreover, the scheme has another advantage that it easily reflects the change of access relations.

A Study on Platform Strategies of Korean First Mobile Instant Messenger KakaoTalk (주식회사 카카오의 플랫폼 전략에 대한 연구)

  • Jang, Kyoung Young;Oh, Jung Suk
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.4
    • /
    • pp.49-56
    • /
    • 2013
  • KakaoTalk, a Korean mobile instant messenger service launched by KAKAO Inc., has grown remarkably popular in a short period of time, with its number of subscribers exceeding 100 million as of July 2013. Today, KakaoTalk is an everyday communication tool among most Korean mobile users. Although KAKAO has been the subject of many business and consumer studies, the KakaoTalk platform strategy has not been studied thoroughly. In this study, we analyze its platform strategy through the lens of several widely utilized frameworks such as Platform Leadership (Gawer & Cusumano 2002, 2008), Winner-take-all dynamics (Eisenmann et al. 2006), and Open Service Innovation (Chesbrough 2011). Our results show that Eisenmann et al (2006)'s "Winner-Take-All" platform best explains how KakaoTalk dominated its rivals, Mypeople by Daum Communications and Line by Naver Corporation. In surpassing its rivals, KAKAO delivered a solution to the 'essential problem' that mobile social communication should be upgraded from mobile companies' paid "Short Message Service" (SMS). By doing so, KakaoTalk fulfilled the first requirement of Gawer & Cusumano (2008)'s "Coring" strategy, which explains how a new platform is created. KakaoTalk also satisfied the second requirement of "Coring" by providing economic incentives for KakaoTalk members to interact through its Games and Items store. Actively accepting its customers' ideas and upgrading its services, KAKAO reinforced its platform leadership to its customers and put Chesbrough (2011)'s "Outside In - Open Service" innovation strategy into practice.

  • PDF

A Design and Implementation of XML DTDs for Integrated Medical Information System (통합의료정보 시스템을 위한 XML DTD 설계 및 구현)

  • 안철범;나연묵
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.106-117
    • /
    • 2003
  • The advanced medical information systems usually consist of loosely-coupled interaction of independent systems, such as HIS/RIS and PACS. To support easier information exchange between these systems and between hospitals, and to support new types of medical service such as teleradiology, it becomes essential to integrate separated medical information and allow them to be exchanged and retrieved through internet. This thesis proposes an integrated medical information system using XML. We analyzed HL7 and DICOM standard formats, and designed an integrated XML DTD. We extracted information from HL7 messages and DICOM files and generated XML document instances and XSL stylesheets based on the proposed XML DTD. We implemented the web interface for the integrated medical information system, which supports data sharing, information exchange and retrieval between two different standard formats. The proposed XML-based integrated medical information system will contribute to solve the problems of current medical information systems, by enabling integration of separated medical informations and by allowing data exchange and sharing through internet. The proposed system with XML is more robust than web-based medical information systems developed by using HTML, because XML itself provides more flexibility and extensibility than HTML.

Understanding of the Linguistic Features of Earth Science Treatises: Register Analysis Approach (지구과학 논문의 언어 특성 이해: 레지스터 분석)

  • Maeng, Seung-Ho;Shin, Myung-Hwan;Cha, Hyun-Jung;Ham, Seok-Jin;Shin, Hyeon-Jeong;Kim, Chan-Jong
    • Journal of the Korean earth science society
    • /
    • v.31 no.7
    • /
    • pp.785-797
    • /
    • 2010
  • This study identified the linguistic features of Earth science treatises through the analysis of the register. Data included three Korean treatises that were in geology, atmospheric science, and oceanography. The register of Earth science treatise was as follows: First, there were semantic, referential connections between Themes and Rhemes, that the messages and main points of the texts were expressed coherently and cohesively. Second, some predicates were used which were related to deductive inference, abductive inferences, or causal relation according to the genre elements of each text. The logical relations were not represented by the conjunctions but by the types of predicates. Third, most texts in the treatises showed interpersonally weak relationship using mental predicates related to possibilities, which meant scientists expressed indirectly their interpretation, explanation, or arguments. From these results, we argued that some activities of unpacking the language of science be included in science curriculum in order to improve students' literacy of science texts and understanding scientists' knowledge construction.

A Study of FC-NIC Design Using zynq SoC for Host Load Reduction (호스트 부하 경감 달성을 위한 zynq SoC를 적용한 FC-NIC 설계에 관한 연구)

  • Hwang, Byeung-Chang;Seo, Jung-hoon;Kim, Young-Su;Ha, Sung-woo;Kim, Jae-Young;Jang, Sun-geun
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.5
    • /
    • pp.423-432
    • /
    • 2015
  • This paper shows that design, manufacture and the performance of FC-NIC (fibre channel network interface card) for network unit configuration which is based on one of the 5 main configuration items of the common functional module for IMA (integrated modular Avionics) architecture. Especially, FC-NIC uses zynq SoC (system on chip) for host load reductions. The host merely transmit FC destination address, source memory location and size information to the FC-NIC. After then the FC-NIC read the host memory via DMA (direct memory access). FC upper layer protocol and sequence process at local processor and programmable logic of FC-NIC zynq SoC. It enables to free from host load for external communication. The performance of FC-NIC shows average 5.47 us low end-to-end latency at 2.125 Gbps line speed. It represent that FC-NIC is one of good candidate network for IMA.

Reversible Data Hiding and Message Authentication for Medical Images (의료영상을 위한 복원 가능한 정보 은닉 및 메시지 인증)

  • Kim, Cheon-Shik;Yoon, Eun-Jun;Jo, Min-Ho;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.65-72
    • /
    • 2010
  • Nowadays, most hospitals have been used to create MRI or CT and managed them. Doctors depend on fast access to images such as magnetic resonance imaging (MRIs), computerized tomography (CT) scans, and X-rays for accurate diagnoses. Those image data are related privacy of a patient. Therefore, it should be protected from hackers and managed perfectly. In this paper, we propose a data hiding method into MRI or CT related a condition and intervention of a patient, and it is suggested that how to authenticate patient information from an image. In this way, we create hash code using HMAC with patient information, and hash code and patient information is hided into an image. After then, doctor will check authentication using HMAC. In addition, we use a reversible data hiding DE(Difference Expansion) algorithm to hide patient information. This technique is possible to reconstruct the original image with stego image. Therefore, doctor can easily be possible to check condition of a patient. As a consequence of an experiment with MRI image, data hiding, extraction and reconstruct is shown compact performance.

Content Insertion Technology using Mobile MMT with CMAF (CMAF 기반 Mobile MMT를 활용한 콘텐츠 삽입 기술)

  • Kim, Junsik;Park, Sunghwan;Kim, Doohwan;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.25 no.4
    • /
    • pp.560-568
    • /
    • 2020
  • In recent years, as network technology develops, the usage of streaming services by users is increasing. However, the complexity of streaming services is also increasing due to various terminal environments. Even when streaming the same content, it is necessary to re-encode the content according to the type of service. In order to solve the complexity and latency of the streaming service, Moving Picture Experts Group (MPEG) has standardized the Common Media Application Format (CMAF). In addition, as content transmission using a communication network becomes possible, the Republic of Korea's Ultra High Definition (UHD) broadcasting standard has been enacted as a hybrid standard using a broadcasting network and a communication network. The hybrid service enables various services such as transmitting additional information of contents or providing user-customized contents through a communication network. The Republic of Korea's UHD transmission standard utilizes MPEG Media Transport (MMT), and Mobile MMT is an extension of MMT to provide mobile network-specific functions. This paper proposes a method of inserting CMAF contents suitable for various streaming services using signaling messages of MMT and Mobile MMT. In addition, this paper proposes a model for content insertion system in heterogeneous network environment using broadcasting and communication networks, and verifies the validity of the proposed technology by checking the result of content insertion.