• Title/Summary/Keyword: 인터넷프로토콜

Search Result 2,042, Processing Time 0.022 seconds

A Multi-Agent Platform Capable of Handling Ad Hoc Conversation Policies (Ad Hoc한 대화 정책을 지원하는 멀티 에이전트 플랫폼에 관한 연구)

  • Ahn, Hyung-Jun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1177-1188
    • /
    • 2004
  • Multi-agent systems have been developed for supporting intelligent collaboration of distributed and independent software entities and are be-ing widely used for various applications. For the collaboration among agents, conversation policies (or interaction protocols) mutually agreed by agents are used. In today's dynamic electronic market environment, there can be frequent changes in conversation policies induced by the changes in transaction methods in the market, and thus, the importance of ad hoc conversation policies is increasing. In existing agent platforms, they allow the use of only several standard or fixed conversation policies, which requires inevitable re implementation for ad hoc conversation policies and leads to inefficiency and intricacy. This paper designs an agent platform that supports ad hoc conversation policies and presents the prototype implementation. The suggested system includes an exchangeable and interpretable conversation policy model, a meta conversation procedure for exchanging new conversation policies, and a mechanism for performing actual transactions with exchanged conversation policies in run time in an adaptive way.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

Obscene Material Searching Method in WWW (WWW상에서 음란물 검색기법)

  • 노경택;김경우;이기영;김규호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.2
    • /
    • pp.1-7
    • /
    • 1999
  • World-Wide Web(WWW) is a protocol for changing information exchanges which is central to text documents in the existing network to make a multimedia data exchanges. It is possible for a beginner to search and access data which he wants to find as data were stored in the form of hypertext. The easiness for searching and accessing the multimedia data in WWW makes a important role for obscene materials to be toward generalization and multimedia and occurs social problems for them to be commercialized, while other researchers have actively studied the way to block effectively the site providing obscene materials for solving such problems. This paper presents and implements the blocking method for the sites having obscene material as it effectively search them. The proposed model was based on Link-Based information retrieval method and proved that it accomplished more efficient retrieval of relevant documents than probabilistic model when compared the one with the other which is known to generate the most correct results. The improvements in the average recall and precision ratio were shown as 12% and 8% respectively. Especially, the retrieval capability of relevant documents which include non-text data and have a few links increased highly.

  • PDF

Implementation of Medical Diagnostic Information System and Conformance Test of Medical Image in Mobile Environment (모바일 환경에서 의료 진단 정보 시스템의 구현 및 의료 영상의 적합성 평가)

  • Cho, Chung-Ho;Kim, Gwang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.6
    • /
    • pp.713-720
    • /
    • 2015
  • As the hand-held mobile devices are widely used, they are recently coming into convergence with medical diagnostic systems. Furthermore, the wireless mobile Internet and the various kinds of communication devices are rapidly coming into wide use converging with medical technology. The mobile communication environments can make people get more health care services beyond space and time. In this paper, we implement and evaluate the mobile client and the medical diagnostic information server for transmitting, searching and updating the medical diagnostic information. The DICOM CT image and the compressed JPEG 2000 CT image are statistically evaluated by t-test performance whether those images are clinically appropriate. In the case of the DICOM CT image, we realize that the average value is relatively more appropriate to the clinical diagnosis than the JPEG 2000 CT image.

A Multibit Tree Bitmap based Packet Classification (멀티 비트 트리 비트맵 기반 패킷 분류)

  • 최병철;이정태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.339-348
    • /
    • 2004
  • Packet classification is an important factor to support various services such as QoS guarantee and VPN for users in Internet. Packet classification is a searching process for best matching rule on rule tables by employing multi-field such as source address, protocol, and port number as well as destination address in If header. In this paper, we propose hardware based packet classification algorithm by employing tree bitmap of multi-bit trio. We divided prefixes of searching fields and rule into multi-bit stride, and perform a rule searching with multi-bit of fixed size. The proposed scheme can reduce the access times taking for rule search by employing indexing key in a fixed size of upper bits of rule prefixes. We also employ a marker prefixes in order to remove backtracking during searching a rule. In this paper, we generate two dimensional random rule set of source address and destination address using routing tables provided by IPMA Project, and compare its memory usages and performance.

A 4to6 DSTM Architecture Supporting Transparent Connections from IPv4 Hosts to IPv6 Hosts in Integrated IPv6/IPv4 Networks (IPv6/IPv4 통합망에서 IPv4 호스트로부터 IPv6 호스트로의 투명한 연결을 지원하는 4to6 DSTM 구조)

  • Park Eun-yong;Lee Jae-hwoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5B
    • /
    • pp.287-294
    • /
    • 2005
  • It is impossible to replace overnight the present Internet Protocol Version 4(IPv4)-based Internet with Internet Protocol Version 6(IPv6). These two protocols are expected to coexist for a number of years during the transition period. A number of transition mechanisms are proposed by Internet Engineering Task Force(IETF) Next Generation Transition Working Group(Ngtrans WG). However, most of them provide only the mechanism to initiate sessions from hosts within the IPv6 network to those within the IPv4 network, but do not support the initiation from IPv4 hosts to IPv6 ones. In this paper, we propose the IPv4-to-IPv6 Dual Stack Transition Mechanism(4to6 DSTM) which can operate even in the case that IPv4 clients in the IPv4 network initiate connections with dual stack servers in the IPv6 network.

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network (모바일 서비스 네트워크의 구조적 분석과 보안 취약성)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.16 no.5
    • /
    • pp.49-55
    • /
    • 2016
  • Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.

Research on Security Model and Requirements for Fog Computing: Survey (포그 컴퓨팅 보안 모델과 보안 요구사항 연구: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.5
    • /
    • pp.27-32
    • /
    • 2018
  • IoT technology is developing with various application areas in $4^{th}$ Industrial revolution. There are many users using the application services. Sensing data from various environment need to be transferred to cloud computing storage and store in the cloud storage. However, physical distance from the end node to cloud computing storage is far away, and it is not efficient to transfer data from sensors and store the sensing data in the cloud storage whenever sensing data happen. Therefore, Fog computing is proposed to solve these problems which can process and store the sensing data. However, Fog computing is new emerging technology, there is no standard security model and requirements. This research proposes to security requirements and security model for Fog computing to establish a secure and efficient cloud computing environment.

A Study on the High Quality 360 VR Tiled Video Edge Streaming (방송 케이블 망 기반 고품질 360 VR 분할 영상 엣지 스트리밍에 관한 연구)

  • Kim, Hyun-Wook;Yang, Jin-Wook;Yoon, Sang-Pil;Jang, Jun-Hwan;Park, Woo-Chool
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.43-52
    • /
    • 2019
  • 360 Virtual Reality(VR) service is getting attention in the domestic streaming market as 5G era is upcoming. However, existing IPTV-based 360 VR video services use upto 4K 360 VR video which is not enough to satisfy customers. It is generally required that over 8K resolution is necessary to meet users' satisfaction level. The bit rate of 8K resolution video exceeds the bandwidth of single QAM channel(38.817mbps), which means that it is impossible to provide 8K resolution video via the IPTV broadcast network environment. Therefore, we suggest and implement the edge streaming system for low-latency streaming to the display devices in the local network. We conducted experiments and confirmed that 360 VR streaming with a viewport switching delay less than 500ms can be achieved while using less than 100mbps of the network bandwidth.

Implementation of a Network Design and Analysis Tool Supporting VoIP Simulations (VoIP 시뮬레이션을 지원하는 네트워크 설계 및 분석 도구의 구현)

  • Choi Jae-Won;Lee Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.81-89
    • /
    • 2005
  • In this paper, we have described the implementation of a practical simulation tool to design and analyze communication networks. Especially, this study is focused on the implementation and application methods of a simulator supporting VoIP The key characteristics of this particular system are its easy and intuitive usage, the real behaviors implementation of equipment and protocols, the actual generation and transmission of traffic for simulation, supporting of VoIP and so forth. Our system is distinguished from the existing tools which define only the nature of voice traffic, process those packets in the same way as general data, and analyze only the quality of packet transmission such as delay. Our tool presented in this paper generates and processes packets in different way according to the types of traffic distinguishing call signal from voice information traffic. Also, we equipped this system with the various devices such as VoIP gateway and gatekeeper, which enabled this system to analyze the performance of devices and the quality of voice traffic transmission between PSTN and Internet. By presenting the implementation methods and application of this system, we managed to propose the utilization scheme of a simulation tool.