• Title/Summary/Keyword: Approach of Network

Search Result 4,556, Processing Time 0.035 seconds

Android based Local SNS (안드로이드기반 근거리 SNS)

  • Lee, Chung-Yeol;An, Beong-Ku;Ahn, Hong-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.93-98
    • /
    • 2010
  • Recently, users using social network service(SNS) with smart phone as well as users using smart phone are so rapidly increasing. In this paper, Android based local SNS system is proposed and developed. The main feature and contribution are as follows. First, the proposed SNS system is developed based on smart phone Android for supporting both the search of neighbor users and the addition of friends to start SNS with Web/DB. Second, the system is designed with the unchanged basic UI of Android and user oriented approach. The performance evaluation is performed by using OPTIMUS-Q/ANDROID 2.1. The results of performance evaluation show that the proposed SNS system can efficiently support the neighbor search services by using android based bluetooth neighbor search. Currently, we are still ongoing working on bluetooth autofaring in android to improve the performance of the proposed system.

A Study on Authentication of Mobile Agency AP Connection Using Trusted Third Party in Smart Phone Environment (스마트폰 환경에서 신뢰기관을 이용한 이동 통신사 AP 접속 인증에 관한 연구)

  • Lee, Gi-Sung;Min, Dae-Gi;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5496-5505
    • /
    • 2012
  • As the IT industry develops, the smart-phone technology and functions which are actively being studied at the moment greatly influence the entire living environment. With the smart-phone technology and functions, people's interest for the wireless LAN which can be used to get access to the Internet anytime anywhere is gradually increasing. However, since the malicious attacker can easily carry out hacking or approach the contents due to the characteristics of the wireless radio wave, the personal information with a high level of importance for data security is easily exposed due to Spoofing, Denial of Service attack and Man in the Middle attack. Therefore, the demand for security is gradually increasing. In this paper, the safe wireless network service environment is provided by supplementing the vulnerability in regard to Spoofing, Session Hijacking and Man in the Middle attack after executing the client's authentication process, the AP authentication process and the Mobile Agency authentication process with the client's information in the USIM, the AP information and the Mobile Agency information when the client uses the wireless Internet through the Mobile Agency AP access in the smart phone environment.

The design of the expanded BYOD solutions for business mobile users (기업 모바일 사용자를 위한 확장된 BYOD 솔루션의 설계)

  • Park, Jae-Kyung;Kim, Sung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.107-115
    • /
    • 2014
  • In recent years, large companies and public institutions in the Smartphone business purposes has been used a lot. Personal Smartphone are worried about security of personal information only. But if you are a corporate or business purposes requires a more cautious approach. It can destroy an organization's network to hack Smartphones have very serious damage. For this purpose, the existing solution, and try to solve security issues with MDM or MAM. However, Smartphone users discomfort and there is a limit of organizational control. In this paper, we can propose with these issues more broadly would like to suggest. Secure mobile traffic management system enables companies or agencies the ease for users to use a Smartphone. And, for organizations that provide smart phones are more powerful and can provide a means of control. In addition, wired/wireless integration and security measures that can provide new services to offer.

Scalable Stereoscopic Video Coding for Heterogeneous Environments (이질적인 환경을 위한 스케러블 스테레오 영상 부호화)

  • 오세찬;이영호;우운택
    • Journal of Broadcast Engineering
    • /
    • v.9 no.3
    • /
    • pp.225-235
    • /
    • 2004
  • In this paper, we propose a new stereoscopic video coding approach for heterogeneous consumer devices by exploiting the concept of spatio-temporal scalability. The proposed method uses MPEG-2 standard for coding the left or main sequence and an enhanced compatible coding scheme for predicting the P- and B-type of frames of the right or auxiliary sequence. The enhanced compatible coding scheme predicts matching block by interpolating both two forward and backward motion predicted macroblocks and disparity predicted macroblock. To provide flexible stereo video service, we define both a temporally scalable layer and a spatially scalable layer for each eye-view. The experimental results show the efficiency of proposed coding scheme by comparison with already known methods and the advantages of disparity estimation in terms of scalability overhead. According to the experimental results, we expect the proposed functionalities will play a key role in establishing highly flexible stereo video service for ubiquitous computing environment where devices and network connections are heterogeneous.

A Pipelined Design of the Block Cipher Algorithm SEED (SEED 블록 암호 알고리즘의 파이프라인 하드웨어 설계)

  • 엄성용;이규원;박선화
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.3_4
    • /
    • pp.149-159
    • /
    • 2003
  • The need for information security increases interests on cipher algorithms recently. Especially, a large volume of data transmission over high-band communication network requires faster encryption and decryption techniques for real-time processing. It would be a good solution for this problem that we implement the cipher algorithm in forms of hardware circuits. Though some previous researches use this approach, they focus only on repeatedly executing the core part of the algorithm to minimize the hardware chip size, while most cipher algorithms are inherently parallel. In this paper, we propose a new design for the SEED block cipher algorithm developed by KISA (Korea Information Security Agency) in 1998 as Korean standard cipher algorithm. It exploits the parallelism of the algorithm basically and implements it in a pipelined fashion. We described the design in VHDL program and performed functional simulations on the program, and then found that it worked correctly. In addition, we synthesized it and verified that it could be implemented in a single FPGA chip, implying that the new design can be Practically used for the actual hardware implementation of a high-speed and high-performance cipher system.

A Power Saving Routing Scheme in Wireless Networks (무선망에서 소비 전력을 절약하는 라우팅 기법)

  • 최종무;김재훈;고영배
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.179-188
    • /
    • 2003
  • Advances in wireless networking technology has engendered a new paradigm of computing, called mobile computing, in which users carrying portable devices have access to a shared infrastructure independent of their physical locations. Wireless communication has some restraints such as disconnection, low bandwidth, a variation of available bandwidth, network heterogeneity, security risk, small storage, and low power. Power adaptation routing scheme overcome the shortage of power by adjusting the output power, was proposed. Existing power saving routing algorithm has some minor effect such as seceding from shortest path to minimize the power consumption, and number of nodes that Participate in routing than optimal because it select a next node with considering only consuming power. This paper supplements the weak point in the existing power saving routing algorithm as considering the gradual approach to final destination and the number of optimal nodes that participate in routing.

A Study on the Trend Analysis St Environment of Motion Graphic. -Focused on Historical Backgrounds of Motion Graphic Appearance- (모션그래픽의 환경과 경향분석에 관한 연구 -모션그래픽 출현의 역사적 배경을 중심으로 -)

  • Kim, Jae-Myoung
    • Archives of design research
    • /
    • v.18 no.2 s.60
    • /
    • pp.5-14
    • /
    • 2005
  • Graphic Design is being developed as a unique genre and widely applied to movie, TV broadcasting, music video, computer an, web design, animation, and game. Some university added motion graphics in their curriculum recently. However Motion Graphic has not been defined clearly and pedagogy of motion graphics was not studied enough. Motion Graphic is not merely moving picture. Its typical purpose and concept are evolving because of the diversified application. Meta-synthesis between media and hybrid development based on diverse approach and composite presentational methods are also changing Motion Graphic. Various technology such as photograph, analytical engine, hypermedia, multimedia, digital composite picture, network and interface should be studied to understand Motion Graphic. This study reviews the historic background of Motion Graphic mainly related to its advent. A fundamental definition of Motion Graphic including the space and time is suggested and the international trend is introduced. Future Motion Graphic and possible development was also predicted.

  • PDF

Influence of Social Presence on Online Community Users' Continuance Intention (사회적 실재감이 온라인 커뮤니티 지속사용의도에 미치는 영향)

  • Kim, Kwang-Mo;Choi, Hee-Won;Kwon, Song-Il
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.2
    • /
    • pp.131-145
    • /
    • 2014
  • This study is an empirical analysis on the relationship between social presence and online community users' continuance intention. Based on Bhattacherjee(2001)'s expectation-confirmation model (ECM) of IT continuance model, we test the influence of social presence on one's intention to continue using online communities. This study sampled 132 online community users. Research hypotheses are tested using the structural equation modelling(SEM) approach. The results of this study demonstrate that user satisfaction is influenced by perceived usefulness and perceived enjoyment. But, the confirmation of expectation did not affect user satisfaction. And, social presence has direct effects on perceived usefulness and perceived enjoyment. Further, social presence has a positive effect on users' continuance intention through mediating effect of perceived usefulness. This study suggests that perceived usefulness should be taken into account when carrying out the operating strategy of online communities.

Learning Predictive Models of Memory Landmarks based on Attributed Bayesian Networks Using Mobile Context Log (모바일 컨텍스트 로그를 사용한 속성별 베이지안 네트워크 기반의 랜드마크 예측 모델 학습)

  • Lee, Byung-Gil;Lim, Sung-Soo;Cho, Sung-Bae
    • Korean Journal of Cognitive Science
    • /
    • v.20 no.4
    • /
    • pp.535-554
    • /
    • 2009
  • Information collected on mobile devices might be utilized to support user's memory, but it is difficult to effectively retrieve them because of the enormous amount of information. In order to organize information as an episodic approach that mimics human memory for the effective search, it is required to detect important event like landmarks. For providing new services with users, in this paper, we propose the prediction model to find landmarks automatically from various context log information based on attributed Bayesian networks. The data are divided into daily and weekly ones, and are categorized into attributes according to the source, to learn the Bayesian networks for the improvement of landmark prediction. The experiments on the Nokia log data showed that the Bayesian method outperforms SVMs, and the proposed attributed Bayesian networks are superior to the Bayesian networks modelled daily and weekly.

  • PDF

A New Congestion Control Algorithm for Improving Fairness in TCP Vegas (TCP Vegas에서 공정성 향상을 위한 혼잡제어 알고리즘)

  • Lee, Sun-Hun;Song, Byung-Hoon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.5
    • /
    • pp.583-592
    • /
    • 2005
  • An important factor influencing the robustness of the Internet is the end-to-end TCP congestion control. However, the congestion control scheme of TCP Reno, the most popular TCP version on the Internet, employs passive congestion indication. It makes the network congestion worse. Brakmo and Peterson proposed a congestion control algorithm, TCP Vegas, by modifying the congestion avoidance scheme of TCP Reno. Many studies indicate that Vegas is able to achieve better throughput and higher stability than Reno. But there are three unfairness problems in Vegas. These problems hinder the spread of Vegas in the current Internet. In this paper, in order to solve these unfairness problems, we propose a new congestion control algorithm called TCP NewVegas. The proposed NewVegas is able to solve these unfairness problems effectively by using the variation of the number of queued packets in a bottleneck router. To evaluate the proposed approach, we compare the performance among NewVegas, Reno and Vegas. Through the simulation, NewVegas is shown to be able to achieve throughput and better fairness than Vegas.