• Title/Summary/Keyword: 주소정보

Search Result 1,330, Processing Time 0.034 seconds

Data Transmission Performance Study of Wireless Channels over CCN-based VANETs (CCN 기반의 VANET에서 무선 채널에 따른 전송 성능에 관한 연구)

  • Kang, Seung-Seok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.367-373
    • /
    • 2022
  • VANET (Vehicular Ad hoc NETwork) is one of the special cases of the ad hoc networks in which car nodes communicate with each other and/or with RSUs (Road Side Unit) in order for the drivers to receive nearby road traffic information as well as for the passengers to retrieve nearby gas price or hotel information. In case of constructing VANET over CCN, users do not need to specify a destination server address rather to input a key word such as nearby congestion in order to gather surrounding traffic congestion information. Furthermore, each car node caches its retrieved data for forwarding other nodes when requested. In addition, the data transmission is inherently multicast, which implies fast data propagation to the participating car nodes. This paper measures and evaluates the data transmission performance of the VCCN (VANET over CCN) in which nodes are equipped with diverse wireless communication channels. The simulation result indicates that 802.11a shows the best performance of the data transmission against other wireless channels. Moreover, it indicates that VCCN improves overall data transmission and provides benefit to the nodes that request the same traffic information by exploiting inherent multicast communication.

DDoS Defense using Address Prefix-based Priority Service (Address Prefix에 기반한 우선 순위 서비스를 이용한 DDoS 방어)

  • Jin, Jinghe;Lee, Tai-Jin;Nam, Seung-Yeob
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.4
    • /
    • pp.207-217
    • /
    • 2009
  • We propose a two-stage Distributed Denial of Service (DDoS) defense system, which can protect a given subnet by serving existing flows and new flows with a different priority based on IP history information. Denial of Service (DoS) usually occurs when the resource of a network node or link is limited and the demand of the users for that resource exceeds the capacity. The objective of the proposed defense system is to provide continued service to existing flows even in the presence of DDoS attacks. The proposed scheme can protect existing connections effectively with a smaller memory size by reducing the monitored IP address set through sampling and per-prefix history management. We evaluate the performance of the proposed scheme through simulation.

Technique of Handoff Delay Reduction in Mobile IP (Mobile IP 에서의 핸드 오프 지연 시간 감소 기법)

  • You, Seung-Yeon;Lee, Jang-Su;Lee, Sung-Ju;Sin, Hong-Joong;Yoo, Seung-Hwan;Lee, Sang-Hyuck;Kim, Seung-Wook;Kim, Sung-Chun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1014-1017
    • /
    • 2007
  • 무선랜에서는 작은 셀 크기로 인해 노드들의 이동에 따른 빈번한 핸드오프가 이루어진다. 그래서 무선랜에서는 지속적인 통신 서비스를 제공하기 위한 방법으로 모바일 아이피와 같은 방법을 개발하고 있다. 모바일 아이피는 모바일 노드가 한 장소에서 다른 장소로 이동할 때 IP 주소의 변경 없이도 이동할 수 있도록 해준다. 그러나 모바일 아이피는 긴 시간의 등록과정과 연결 재설정 때문에 시간지연이나 패킷 손실과 같은 오버헤드를 발생시킨다. 따라서 무선랜의 QOS(Quality Of Service)를 향상시키기 위해서 Mobile IP 의 핸드오프 시간을 줄여야만 한다. 본 논문은 이러한 문제를 해결하기 위해 핸드오프 지연 시간을 감소시키는 기법을 제안한다. 제안기법의 기본 아이디어는 모바일 노드의 이동 네트워크를 예상하여, 미리 패킷 포워딩을 수행하는데 있다. 우리는 각 모바일 노드들에게 connection proxy table 정보를 추가하였다. 그리고 이 테이블 정보를 이용함으로써 모바일 노드들은 홈에이전트와 포린에이전트에 COA(Care of address)를 미리 등록하는 것이 가능해졌다. 그 결과로 이동 노드들은 홈 네트워크를 완전히 벗어나지 않고도 핸드오프가 이루어져 지속적인 서비스가 가능하였다. 본 논문에서 제안하는 기법이 기존 Mobile IP 와 비교해 볼 때 핸드오프가 이루어지는 동안 비 연결 시간을 줄일 수 있다는 것을 실험결과를 통해서 확인할 수 있었다.

Development of Road Bridge Information Management System based on Internet (교량 현황정보 관리를 위한 인터넷 기반 정보시스템 개발)

  • Park, Kyung-Hoon;Sun, Jong-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.716-723
    • /
    • 2016
  • A computerized information management system of road bridges as a national key infrastructure is needed to effectively collect data of the current status, improve the reliability of data, and use the results from the analysis of the accumulated data as fundamental resources for supporting the establishment of policies. The Internet-based Bridge Information System (BIS), including a database and geographic information systems (GIS), was designed, and the data items were comprised of essential information, such as GIS-based location coordinates, bridge condition grade information and so on. The BIS was developed to be connected with a related information system, and it is possible to make the current information of traffic volume, address and so on by adopting the GIS. To enhance the reliability of the information of current bridge status, it is also possible to improve the accuracy of data through an information verifying function to prevent entry errors. In addition, the BIS can easily support the establishment of policies offering various types of knowledge information that were available in the past based on an analysis of the accumulated data. The intuitive identification and analysis of the current status is to be feasible through a GIS screen. Improvement of the business efficiency and data accuracy and time-series information analysis are available by managing the information of current status through BIS. In the future, it is expected that BIS can be used effectively for the establishment of reasonable maintenance policies of the nation.

Improved Original Entry Point Detection Method Based on PinDemonium (PinDemonium 기반 Original Entry Point 탐지 방법 개선)

  • Kim, Gyeong Min;Park, Yong Su
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.6
    • /
    • pp.155-164
    • /
    • 2018
  • Many malicious programs have been compressed or encrypted using various commercial packers to prevent reverse engineering, So malicious code analysts must decompress or decrypt them first. The OEP (Original Entry Point) is the address of the first instruction executed after returning the encrypted or compressed executable file back to the original binary state. Several unpackers, including PinDemonium, execute the packed file and keep tracks of the addresses until the OEP appears and find the OEP among the addresses. However, instead of finding exact one OEP, unpackers provide a relatively large set of OEP candidates and sometimes OEP is missing among candidates. In other words, existing unpackers have difficulty in finding the correct OEP. We have developed new tool which provides fewer OEP candidate sets by adding two methods based on the property of the OEP. In this paper, we propose two methods to provide fewer OEP candidate sets by using the property that the function call sequence and parameters are same between packed program and original program. First way is based on a function call. Programs written in the C/C++ language are compiled to translate languages into binary code. Compiler-specific system functions are added to the compiled program. After examining these functions, we have added a method that we suggest to PinDemonium to detect the unpacking work by matching the patterns of system functions that are called in packed programs and unpacked programs. Second way is based on parameters. The parameters include not only the user-entered inputs, but also the system inputs. We have added a method that we suggest to PinDemonium to find the OEP using the system parameters of a particular function in stack memory. OEP detection experiments were performed on sample programs packed by 16 commercial packers. We can reduce the OEP candidate by more than 40% on average compared to PinDemonium except 2 commercial packers which are can not be executed due to the anti-debugging technique.

Word Segmentation in Handwritten Korean Text Lines based on GAP Clustering (GAP 군집화에 기반한 필기 한글 단어 분리)

  • Jeong, Seon-Hwa;Kim, Soo-Hyung
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.6
    • /
    • pp.660-667
    • /
    • 2000
  • In this paper, a word segmentation method for handwritten Korean text line images is proposed. The method uses gap information to segment words in line images, where the gap is defined as a white run obtained after vertical projection of line images. Each gap is assigned to one of inter-word gap and inter-character gap based on gap distance. We take up three distance measures which have been proposed for the word segmentation of handwritten English text line images. Then we test three clustering techniques to detect the best combination of gap metrics and classification techniques for Korean text line images. The experiment has been done with 305 text line images extracted manually from live mail pieces. The experimental result demonstrates the superiority of BB(Bounding Box) distance measure and sequential clustering approach, in which the cumulative word segmentation accuracy up to the third hypothesis is 88.52%. Given a line image, the processing time is about 0.05 second.

  • PDF

A Study of Collaboration between GIS and Census Data for Urban Analysis and Location Analysis (도시현황분석과 시설물 입지분석의 과학화를 위한 센서스와 GIS의 연계 활용방안 연구)

  • Koo, Chamun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.3 no.3
    • /
    • pp.31-44
    • /
    • 2000
  • The purpose of this study is to show how could GIS along with digital maps and census data be used for scientific urban analysis and location analysis for a proposed project. Results are summarized as follows. First. after digital maps being completed, the census tract system being adopted, and major urban data being inputted in the computer file, GIS could be used intensively for various reliable urban analysis. With graphic statistical, and overlay functions of GIS, various physical and socio-economic characteristics of urban areas could be presented for analysis in the form of thematic and datapoint maps on the computer screen. Second, the locational analysis for a proposed project is a major part in the building permit review process, which tends to become disputable and time consuming as society become pluralized. Along with various GIS functions scientific decision-making methods could be developed, and the methods could play an important role for faster and scientific location analysis. As such, GIS would play an important role for faster and reliable urban analysis and location analysis and these functions finally would play important roles to improve public services and administration of local governments.

  • PDF

A Study on the Management of "the Internship of the Disabled" Using Mobile App (모바일 앱을 이용한 장애학생의 현장실습 관리 연구)

  • Koo, Min-Jeong;Han, Koung-Don;Noh, Dong-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.419-424
    • /
    • 2013
  • A study was performed on the management of working hours, starting time, and the internship journal using mobile app in order to manage the on the job training of the disabled students in the industrial companies. The employer of the disabled verifies if the acceptable standard of the disabled students and the actual information of the applicant matches, before hiring (accepting) the applicant. The company manages the attendance information (working hours and address, etc.) of the trainees using GPS. Judging from the result of the performance of this process, the process has contributed to the on the job training of the disabled, so the program is underway to link the process to the actual employment in the future. To test This app in this research, surveys with 34 students were done on "Results of Usefulness." UI satisfaction about this application showed more than 81.1% of beyond Just OK.

A Study on Countermeasure for CCN Interest Flooding Attack (콘텐츠 중심 네트워킹 환경에서의 Interest Packet Flooding 대응 연구)

  • Kim, DaeYoub
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.8
    • /
    • pp.954-961
    • /
    • 2013
  • To enhance the efficiency of network, content-centric networking (CCN), one of future Internet architectures, allows network nodes to temporally cache transmitted contents and then to directly respond to request messages which are relevant to previously cached contents. Also, since CCN uses a hierarchical content-name, not a host identity like source/destination IP address, for request/response packet routing and CCN request message does not include requester's information for privacy protection, contents-providers/ network nodes can not identify practical requesters sending request messages. So to send back relevant contents, network nodes in CCN records both a request message and its incoming interfaces on Pending Interest Table (PIT). Then the devices refer PIT to return back a response message. If PIT is exhausted, the device can not normally handle request/response messages anymore. Hence, it is needed to detect/react attack to exhaust PIT. Hence, in this paper, we propose improved detection/reaction schemes against attacks to exhaust PIT. In practice, for fine-grained control, this proposal is applied to each incoming interface. Also, we propose the message framework to control attack traffic and evaluate the performance of our proposal.

A Study on the application of planning national index numbers in the Cadastral triangulation point (지적삼각(보조)점의 국가지점번호 활용방안에 관한 연구)

  • Lee, Hyong-Sam;Shin, Soon-Ho;Sung, Yeon-Dong
    • Journal of Cadastre & Land InformatiX
    • /
    • v.45 no.2
    • /
    • pp.45-56
    • /
    • 2015
  • The main purpose of this investigation is to make up for the limitations of parcel addressing and to seek the application plan of cadastral triangulation point to effective installation of national index numbers. The test-bed has been constructed at the mountainous area located in Nowon-gu, seven cadastral triangulation points within the test-bed was directly applied to this investigation. Each points have been firstly converted from a plane rectangular coordinates to a single plane rectangular coordinates (UTM-K). To verify positioning results achieved from these points, a single plane rectangular coordinates through the Network-RTK was considered. With regards to verification result, maximum coordinate shift was revealed by 6 cm, this level of difference can be satisfied to Article 7, paragraph 2 "the regulation for National Index Number". This means that coordinate transformation applied with cadastral triangulation points can achieve the sastisfied result without local surveying. And also, remarkable effects have been created in terms of financial effectiveness and safe preservation of cadastral triangulation points due to the omission of local surveying.