• Title/Summary/Keyword: 메시지 확산

Search Result 114, Processing Time 0.025 seconds

A new type of lightweight stream encryption algorithm motif for applying low capacity messaging data encryption for IoT / QR / electronic tags (IoT/QR/전자태그용 저용량 메시지 데이터 암호화 적용을 위한 새로운 방식의 스트림 경량 암호화 알고리즘 모티브 제안)

  • Kim, Jung-Hoon
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.1
    • /
    • pp.46-56
    • /
    • 2017
  • Recently, the spread of IoT technology has been spreading, and it has been applied to all industrial fields such as home / home appliance / medical care. Due to the low specification, low power consumption characteristic and communication data characteristic of IoT, implementation of existing algorithm is difficult thing. From this reason, we have proposed for the first time that encryption and decryption can be proceeded by introducing a kind of variable length bit XOR operation method which changes a variable the bit length value by using carry up and carry down method. We confirmed the practicality of encrypting short message data frequently processed by IoT device / QR code / RFID / NFC without changing the size of data before and after encryption.

Design of Intrustion Prevention System(IPS) in Linux Environment (리눅스 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.1-7
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing Power. while in Previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, Political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

Intermedia Agenda-setting Effects: Political Debates on TV and Twitter (트위터의 매체 간 의제설정 : TV 토론 방송과 트위터의 여론 형성 과정에 관한 연구)

  • Lee, Seunghee;Lim, Sohei
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.1
    • /
    • pp.139-149
    • /
    • 2014
  • This study attempts to explore the inter-media agenda setting effect between television and Twitter based on the framework of the two-step flow theory. Twitter's increasingly important role in political communication can be effectively addressed by examining the process by which Twitter users form their opinions on television debate program. Content analyses of Twitter discussions after television debate of the Korean presidential candidates provided interesting insights into how Twitter's opinion leaders reflect on the televised debates. The results show that Twitter mentions rather focus on personality traits of the candidates while television debates emphasize the candiates' policy issues. Specifically, Twitter users mainly concentrated on the political ideology and morality of the candidates. In sum, Twitter seems to have its own way of influencing the public opinion separately from the television.

Design of Intrusion Prevention System(IPS) in Linux Environment (Linux 환경에서의 침입방지시스템(IPS) 설계)

  • 이상훈;김우년;이도훈;박응기
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.21-26
    • /
    • 2004
  • The growth of incidents on the Internet has reflected growth of the internet itself and growth of the computing power. while in previous years, external attacks tended to originate from those interested trend in exploring the Internet for its own sake and testing their skills, there is an increasing trend towards intrusions motivated by financial, political, and military objectives. so, attacks on the nation's computer infrastructures are becoming an increasingly serious problem. Even though the problem is ubiquitious, government agencies are particularly appealing targets and they tend to be more willing to reveal such events than commercial organizations. The threat of damage made necessity of security's recognition, as a result, many researches have been carried out into security of system actively. Intrusion Detection technology is detection of intrusion using audit data differently from using traditional simple filtering and informs manager of it. It has security manager of system deal with the intrusion more quickly. but, cause current environment of Internet manager can't doing response Intrusion alert immediately. That's why IPS needed. IPS can response automatically the intrusion alert. so, manager is more comfortable and can response quickly.

  • PDF

Design and Implementation of A VXIbus Device for FFT Analysis (FFT분석을 위한 VWIbus 디바이스의 설계 및 구현)

  • 강민호;노승환;전동근;문대철;김덕진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.11
    • /
    • pp.1754-1766
    • /
    • 1993
  • The application of VXIbus system, an Industry standard, is rapidly spreading with its ability to offer the easiness of integration from GPIB and the fast data transmission from VMEbus system. Compared with VXIbus Register Based Device, VXIbus Message Based Device has a drawback In the aspect of speed. But it is possible to utilize high level ASCII commands to control a Message Based Device, therefore system integration is much easier with Message Based Device than with Register Based Device. And, the FFT analyzer is an instrument for signal analysis which can be inexpensively implemented to be fast and have high resolution. Its wide ability of analysis presents numerous application. So, it is necessary to apply VXIbus system to FFT analyzer. In this paper, the implementation of FFT analyzer is performed using a DSP module and by implementing all A/D conversion circuit and a control module which performs VXIbus interface. The device can be controlled by Slot0 Commender which supports VXIbus Shared Memory Protocol through VXIbus.

  • PDF

Design of a HL7-based Mobile Web Prescription Interface for U-Healthcare (U-Healthcare를 위한 HL7 기반의 모바일 웹 처방 인터페이스의 설계)

  • Ahn, Yoon-Ae;Cho, Han-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.8-16
    • /
    • 2013
  • Active studies are under way on telemedicine and medical support based on mobile devices in order to vitalize U-Healthcare. Especially when the medical law is revised to allow a remote prescription system, studies on a mobile prescription system will rapidly increase. And yet since mobile apps have less compatibility due to the nature of mobile platform, there is a restriction that they have to be redeveloped to be compatible with the platform. To compensate this problem, this study designs a mobile web prescription interface by using HLTML5, the standard language of mobile web development and jQuery Mobile, a JavaScript Library. It also adds a feature of converting to a form of standard protocol HL7-based messages to share data with existing hospital information system. This interface makes it possible to be interlocked with the existing hospital information system through the transmission of the HL7 messages. The advantage of the proposed system is that it can be used in various environments since it is independent of mobile platforms and compatible with general computers.

Grid-based Location Service Spot scheme for optimized routing path on VANET (VANET 환경에서의 경로 최적화를 위한 그리드 기반 위치 정보 서비스 스팟 기법)

  • Kim, Jong-Hyun;Kim, Kee-Cheon;Jung, Woo-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.1
    • /
    • pp.76-90
    • /
    • 2010
  • Location Service is required in position-based routing for VANET to provide position information. We propose Grid-based Location service spot(GLSS) scheme for optimized routing path to improve accessibility and load balance in location service. Specific area is defined as Location service spot(LSS) on each grid in this scheme, and all nodes in the grid geocast its location update message and location request message to each LSS. Location request messages are flooded throughout LSSs, location reply messages establish optimized route from the source grid to the destination grid. We evaluated GLSS which establishes optimized route on the grid comparing GPSR in consideration of road condition and geographical features.

A Study on Chain Collision Prevention Scheme using Vehicle-to-Vehicle Communications (적응형 채널 접근을 이용한 차량 간 통신 기반 사고 알림 기술에 관한 연구)

  • Lee, Ji-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.330-335
    • /
    • 2013
  • It is expected that the vehicle safety systems using vehicle-to-vehicle communication can reduce the possibility of vehicle collision and prevent the chain crash by promptly delivering the status of neighboring vehicles. Many IEEE 802.11 DCF based Flooding schemes have been proposed, but they may generally expose the problems that the chances of a chain-collision reaction are sharply increased as the vehicle density has increased. Therefore, this paper proposes the chain-collision prevention scheme using a broadcasting-based adaptive report. The proposed method can adaptively allocate the preoccupancy right based on a quantitative priority order and then promptly deliver the warning messages in neighboring areas. Moreover, it is shown from simulation that the proposed scheme provides the performance gains over the existing Flooding based scheme.

Preliminary Research for Korean Twitter User Analysis Focusing on Extreme Heavy User's Twitter Log (국내 트위터 유저 분석을 위한 예비연구 )

  • Jung, Hye-Lan;Ji, Sook-Young;Lee, Joong-Seek
    • Journal of the HCI Society of Korea
    • /
    • v.5 no.1
    • /
    • pp.37-43
    • /
    • 2010
  • Twitter has been continuously growing since October, 2006. Especially, not only the users and the number of messages have been increasing but also a new concept in social networking called 'micro blogging' has diffused. Within Korea, service such as 'me2day' has already been introduced and the improvement of internet accessibility within mobile devices is expected to expand the 'micro blogs'. In this point, this research is executed to study the new medium, 'micro blog'. To do so, we collected and analyzed Twitter logs of Korean users. Especially, we were curious about the extreme heavy users using Twitter, despite of the linguistic and cultural barrier of the foreign service. Who they are, why and how they use the 'micro blog'. First, we reviewed the general aspect of followers and messages by collecting a certain number of random samples. Using the Lorenz curve we found out that there was the imbalance within the users and based on this phenomenon we deducted an extreme heavy user group. In order to perform further analysis, log analysis was performed on the extreme heavy users. As the result, the users used multiple mobile and desktop 'Twitter' clients. The usage pattern was similar to that of internet usage time but was used during their "micro" time. The users using 'Twitter' not only to spread messages about important information, special events and emotions, but also as a habitual 'chatting tool' to express ordinary personal chats similar to SMS and IM services. In this research, it is proved that 68% of the total messages were ordinary personal chats. Also, with 24% of the total messages were retweets, we were able to find out that virtually connected 'people' and 'relationships' acted as the dominant trigger of their articulation.

  • PDF

TwittsIn: Twitter Friend Notification Service for Mobile Devices Using Place Recognition (TwittsIn: 장소 인식을 이용한 모바일 트위터 친구 알림 서비스)

  • Chang, Lae-Young;Lee, Min-Kyu;Cho, Jun-Hee;Han, Dong-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.7
    • /
    • pp.814-818
    • /
    • 2010
  • Online social networking services help people to migrate social networks from offline to online. Twitter, which has achieved incredible growth, showed that an online social networking service without offline bases can become large and successful. In this paper, we propose a twitter friend notification service using user‘s twitter messages and place recognizing technology. When there is a friend in user‘s nearby place, the service notifies the information to the users. Through the friend notification service, a user can easily extend his online social network to offline.