• Title/Summary/Keyword: 메시지 21

Search Result 158, Processing Time 0.024 seconds

Concurrency Control Method using the Asynchronous Data Broadcast in Mobile Computing Environments (이동 컴퓨팅 환경에서 비동기적 데이터방송을 사용한 동시성 제어 기법)

  • Ko Seung-Min;Kim Dae-In;Im Sun-Mo;Hwang Bu-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.12D no.1 s.97
    • /
    • pp.21-30
    • /
    • 2005
  • In mobile computing environments, a mobile host caches the data to use the narrow bandwidth efficiently and improve the response time. A server periodically broadcasts the update data for maintaining the cache consistency of a mobile host. However, a method for maintaining cache consistency using periodic invalidation report has a problem that defers the commit decision of a mobile transaction to guarantee its serializable execution. In this paper, we propose CCM-AD method that guarantees the serializable execution of a mobile transaction even in the case that it is executed using cached data. As CCM-AD method guarantees the serializable execution of mobile transactions by using the intersection between the data broadcast to mobile host and the data updated at server. Then the CCM-AD method can reduce the delay of commitment decision of a mobile transaction. Also our method can reduce the size of invalidation report.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

Integrated Structural Design Operation by Process Decomposition and Parallelization (프로세스 분할 병행에 의한 통합 구조설계 운용)

  • Hwang, Jin-Ha;Park, Jong-Hoi
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.1
    • /
    • pp.113-124
    • /
    • 2008
  • Distributed operation of overall structural design process, by which product optimization and process parallelization are simultaneously implemented, is presented in this paper. The database-interacted hybrid method, which selectively takes the accustomed procedure of the conventional method in the framework of the optimal design, is utilized here. The staged application of design constraints reduces the computational burden for large complex optimization problems. Two kinds of numeric and graphic processes are simultaneously implemented by concurrent engineering approach in the distributed environment of PC networks. The former is based on finite element optimization method and the latter is represented by AutoCAD using AutoLISP programming language. Numerical computation and database interaction on servers and graphic works on independent clients are communicated through message passing. The numerical experiments for some steel truss models show the validity and usability of the method. This study has sufficient adaptability and expandability, in that it is based on general methodologies and industry standard platforms.

Diagnosis and Improvement of mode transition delay in Linux 9bit serial communications (리눅스 9비트 시리얼통신에서 모드전환 지연원인의 분석과 개선)

  • Jeong, Seungho;Kim, Sangmin;Ahn, Heejune
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.6
    • /
    • pp.21-27
    • /
    • 2015
  • We analyze the problem that is occurring when using parity mode transformation required for 9 bit serial communication under Linux environment and propose the solution. The parity mode change is used for 9 bit serial communication in the Linux that by nature supports only 8 bit serial communication. delay (around OS tick) arises. Our analysis shows that the cause is minimum length of waiting time to transmit data remained in Tx FIFO buffers. A modified Linux serial driver proposed in this paper decreases the delay less than 1ms by using accurate time delaying. Despite various system communication interfaces, enormous existing standards and system have adopted RS-232 serial communication, and the part of them have communicated by 9bit serial.

Culture-Driven City Brand Communications via the Strategic Visuals

  • Kim, Seo Young;Hands, David
    • Review of Culture and Economy
    • /
    • v.21 no.2
    • /
    • pp.89-109
    • /
    • 2018
  • This paper aims to offer a conceptual framework in the context of culture-driven city branding through strategic design from a cross-disciplinary approach. The key findings identified the followings: Firstly, the phenomenon of culture-driven city brand creation and the use of design value of primary attractions. Secondly, the impact of the design contents of new media in supporting city brand creation. Lastly, the importance of image/text relationships through applying coding theory to enhance city brand communications.

Effects of Situation Awareness and Decision Making on Safety, Workload and Trust in Autonomous Vehicle Take-over Situations (자율주행 자동차의 제어권 전환상황에서 상황인식 및 의사결정 정보 제공이 운전자에게 미치는 영향)

  • Kim, Jihyun;Lee, Kahyun;Byun, Youngsi
    • Journal of the HCI Society of Korea
    • /
    • v.14 no.2
    • /
    • pp.21-29
    • /
    • 2019
  • Take-over requests in semi-autonomous cars must be handled properly in the case of road obstacles or curved roads in order to avoid accidents. In these situations, situation awareness and appropriate decision making are essential for distracted drivers. This study used a driving simulator to investigate the components of auditory-visual information systems that affect safety, workload, and trust. Auditory information consisted of either voice guidance providing situation awareness for the take-over or a beep sound that only alerted the driver. Visual information consisted of either a screen showing how to maneuver the vehicle or only an icon indicating a take-over situation. By providing auditory information that increased situation awareness and visual information that aided decision making, trust and safety increased, while workload decreased. These results suggest that the levels of situation awareness and decision making ability affect trust, safety, and workload for drivers.

Research on Countermeasure of SQL Injection Attack (SQL Injection 공격을 효율적으로 방어하는 대응책 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.21-26
    • /
    • 2019
  • At present, it is indispensable to utilize data as an information society. Therefore, the database is used to manage large amounts of data. In real life, most of the data in a database is the personal information of a group of members. Because personal information is sensitive data, the role of the database administrator who manages personal information is important. However, there is a growing number of attacks on databases to use this personal information in a malicious way. SQL Injection is one of the most known and old hacking techniques. SQL Injection attacks are known as an easy technique, but countermeasures are easy, but a lot of efforts are made to avoid SQL attacks on web pages that require a lot of logins, but some sites are still vulnerable to SQL attacks. Therefore, this study suggests effective defense measures through analysis of SQL hacking technology cases and contributes to preventing web hacking and providing a secure information communication environment.

Adaptive relay node search scheme for reducing network fragmentation (네트워크 단절 개선을 위한 적응적 전달자 노드검색 기법)

  • Hong, Won-Kee;Byun, Jeong-Sik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.3
    • /
    • pp.50-57
    • /
    • 2009
  • We propose a network node search scheme to address the network fragmentation due to high node mobility in the VANET. VANET is very similar to MANET in that a multi-hop ad-hoc network is configured by wireless communication between vehicles without any network infrastructure. However, high speed mobility, high node density, and frequent topology change induce frequent network fragmentation so that overall network traffic can be increased. In this paper, new broadcasting protocol called an adaptive relay node search protocol is proposed to decrease the network fragmentation. It reduces the network fragmentation and network traffic by researching nodes outside the dangerous area only in case of network fragmentation. Simulation results show that the proposed protocol decreases network fragmentation by up to 39.9% and increase informed rate by up to 41.9% compared to the existing broadcasting protocol.

SPARQL Query Tool for Using OWL Ontology (OWL 온톨로지 사용을 위한 SPARQL 쿼리 툴)

  • Jo, Dae-Woong;Choi, Ji-Woong;Kim, Myung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.21-30
    • /
    • 2009
  • Semantic web uses ontology languages such as RDF, RDFS, and OWL to define the metadata on the web. There have been many researching efforts in the semantic web technologies based on an agent for extracting triple and relation about concept of ontology. But the extraction of relation and triple about the concept of ontology based on an agent ends up writing a limited query statement as characteristics of an agent. As for this, there is the less of flexibility when extracting triple and relation about the other concept of ontology. We are need a query tool for flexible information retrieval of ontology that is can access the standard ontology and can be used standard query language. In this paper, we propose a SPARQL query tool that is can access the OWL ontology via HTTP protocol and it can be used to make a query. Query result can be output to the soap message. These operations can be support the web service.

A Total Design Process Using Design Structure Matrix (디자인 구조 매트릭스를 활용한 토탈 디자인프로세스에 관한 연구)

  • Lee, Jeong Hyun;Pan, Young Hwan
    • Design Convergence Study
    • /
    • v.15 no.5
    • /
    • pp.21-35
    • /
    • 2016
  • With subdivision of customers and markets, today, domains to design are expanding. When design merges with other spheres of design, it is important to convey a consistent message to customers. For delivering a message consistently and clearly, there is a need to reconcile different views in design processes. In this study, each design process was analyzed and the sequence was adjusted using the DSM methodology for understanding mutual dependent relations. For this, process activity elements were extracted with experts and a survey on related elements was conducted. Then the survey findings were divided for working out the sequence and based on the views regarding the sequence, a total design process was created.. As a result, the processes were combined into one sequence and there was a collaboration at the 10th stage. Also, a methodology used in collaboration and significant elements were analyzed. In conclusion, it is anticipated that this total design process would provide a more objective and scientific approach in collaboration among various spheres of design and help in reducing lead time.