• Title/Summary/Keyword: CAN message

Search Result 1,912, Processing Time 0.024 seconds

Performance Analysis for Privacy-preserving Data Collection Protocols (개인정보보호를 위한 데이터 수집 프로토콜의 성능 분석)

  • Lee, Jongdeog;Jeong, Myoungin;Yoo, Jincheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1904-1913
    • /
    • 2021
  • With the proliferation of smart phones and the development of IoT technology, it has become possible to collect personal data for public purposes. However, users are afraid of voluntarily providing their private data due to privacy issues. To remedy this problem, mainly three techniques have been studied: data disturbance, traditional encryption, and homomorphic encryption. In this work, we perform simulations to compare them in terms of accuracy, message length, and computation delay. Experiment results show that the data disturbance method is fast and inaccurate while the traditional encryption method is accurate and slow. Similar to traditional encryption algorithms, the homomorphic encryption algorithm is relatively effective in privacy preserving because it allows computing encrypted data without decryption, but it requires high computation costs as well. However, its main cost, arithmetic operations, can be processed in parallel. Also, data analysis using the homomorphic encryption needs to do decryption only once at any number of data.

Jang Woo-Jae's Theater Aesthetics and Thought Experiment (장우재의 연극미학과 사유실험)

  • Shim, Jae-Min
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.3
    • /
    • pp.101-125
    • /
    • 2021
  • This paper aims from various angles to examine the context of the problem situations that Jang Woo-Jae describes from contemporary korean society, to examine which chance of thinking is in this case given to the audience, and to examine whether through the plays in the theater this chance of thinking can be referred to public opinion. This study considers not only the contribution of Jang's thought experiment that is connected to the dramaturgical function including the aspects of dramatic form and content to dramatic effects for the audience, but also the possibility of an arrangement for a new way of thinking by the audience. Thus, Jang's thought experiment should be understood in connection with the whole message of his plays. And this study researches, how an new attention to the public nature of common world, which should be demanded for the sake of a mature civil society comes into existence within the point of contention in every play based on Jang's thought experiment. Finally this paper inspects through Jang's plays the possibility of contribution of performing art to contemporary korean society, and takes account of self-examination in meta-dimension of the theater regarding the role and meaning for the sake of human being and gemeinschaft.

An Analysis of Beauty-Related Contents in Social Media in China, Thailand, and Indonesia (중국, 태국, 인도네시아의 소셜미디어 뷰티 콘텐츠 분석)

  • Her, Yusun;Chun, Jaehoon
    • Fashion & Textile Research Journal
    • /
    • v.23 no.3
    • /
    • pp.307-322
    • /
    • 2021
  • This study examined the influence of social media on the beauty industry and analyzed beauty-related content on social media in China, Thailand, and Indonesia. The existing literature was reviewed and four social media platforms that display the active sharing of beauty-related content in the three stated countries were selected. Five information sources were then chosen from each social media platform and 115 top posts from these sources analyzed. Beauty-related material was shared on discrete social media platforms in the three countries. Differences were found in the presentation types, themes, and message strategies of the content depending on the type of product and services provided by each social media platform. The content on Xiao Hongshu in China consisted of images showcasing product specifications along with a focus on honest and detailed empirical product review messages from its general users. From Taobao Zibo, Wang Hong conveyed powerful and influential information that communicated instantly with viewers and delivered entertaining and sensory messages. In Thailand earnest reviews of beauty products were offered, along with firsthand testimonials through traditional content uploaded on YouTube. In Indonesia, beauty influencers posted creative and sensational photographs of makeup products on image-centered Instagram. This study expands the current scholarship on social media platforms and extends the scope of the extant research on beauty-related content in Asian countries. The practical implications of this study include useful indications on how beauty brands can use social media to promote their products.

The Trends and Prospects of Mobile Forensics Using Linear Regression

  • Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.10
    • /
    • pp.115-121
    • /
    • 2022
  • In this paper, we analyze trends in the use of mobile forensic technology, focusing on cases where mobile forensics are used, and we predict the development of future mobile forensics technology using linear regression used in future prediction models. For the current status and outlook analysis, we extracted a total of 8 variables by analyzing 1,397 domestic and foreign mobile forensics-related cases and newspaper articles. We analyzed the prospects for each variable using the year of occurrence as an independent variable, seven variables such as text (text message usage information), communication information (cell phone communication information), Internet usage information, messenger usage information, stored files, GPS, and others as dependent variables. As a result of the analysis, among various aspects of the use of mobile devices, the use of Internet usage information, messenger usage information, and data stored in mobile devices is expected to increase. Therefore, it is expected that continuous research on technologies that can effectively extract and analyze characteristic information of mobile devices such as file systems, the Internet, and messengers will be needed As mobile devices increase performance and utilization in the future and security technology.

A Bypass Scheme for INVITE Messages With Priority in SIP Proxies (SIP 프록시에서 우선순위를 가지는 INVITE 메시지의 우회 방법)

  • Kwon, Oh-Jun;Jang, Hee-Suk;Lee, Jong-Min
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.51-58
    • /
    • 2010
  • SIP is a flexible and extensible call setup protocol that may be combined with other protocols used in the Internet to make various services like voice communication. Voice communication can be classified into normal calls used for communication between common users and emergency calls for 112, 119 and other services through public safety networks. It is required to research to process effectively these normal calls and emergency calls through public networks such as the Internet. In this paper, we propose a bypass scheme for emergency calls by giving priority to INVITE messages for them and processing them with priority in the SIP proxy queue. We perform simulation studies using the network simulator ns-2 for the performance evaluation. Simulation results show that the proposed scheme processes emergency calls faster than normal calls and thus it is expected to make a special purpose network like the national disaster network efficiently by using the existing Internet.

A Study on the Lightweight Encryption Method for Secure MQTT Communication (안전한 MQTT 통신을 위한 경량 암호화 방법에 관한 연구)

  • Jeon, Yu-ran;Joo, Soyoung;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.82-84
    • /
    • 2022
  • In recent years, research has been actively conducted to solve overhead problems caused by the increase in the number of IoT devices. MQTT, one of the IoT lightweight protocols for resolving performance degradation in IoT environments, is standardized to enable efficient operation in many-to-many communication environments, but there is a security vulnerability as it does not provide encryption by default. Although TLS communication technology can be applied to solve these problems, it is difficult to meet IoT's lightweight power-saving requirements. This paper introduces the latest MQTT communication encryption trends and analyzes IoT applicability by comparing TLS encryption and payload encryption methods.

  • PDF

A Study on the Analysis of Policy PR Content Using Digital Platform - Focusing on YouTube Analysis by Five Government Departments (디지털 플랫폼을 이용한 정책 홍보 내용분석 연구 정부 5개 부처의 유튜브 분석을 중심으로)

  • Yu, Hyun-Joong;Jeong, Hyeon Ju;Kim, Won-Han
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.595-603
    • /
    • 2023
  • Recently, many public institutions have been conducting promotional activities using digital platforms. Communication methods using digital platforms have a very important meaning in that they can create new values that did not exist before by connecting and sharing information with various users. To this end, we tried to analyze YouTube videos of five government ministries and examine them. As a result of YouTube analysis by government ministries, most of them were mainly used as channels for policy promotion, and many were used as channels for new information. Although the message is delivered through the production of various contents, it was possible to look at cases where the target as a channel for communication was not clear and the purpose was unclear. In order to communicate with the people, it should be used as a channel for communication through content suitable for clear target setting and purpose.

The 4-channel Multiple Contact Resistance Measurement Systems using MQTT Broker Server for AC 22.9 kV COS/Lightning Arrester (MQTT 브로커 서버를 이용한 AC 22.9 kV 차단기/피뢰기의 4-채널 다중 접촉저항 측정 시스템)

  • Ra-Yun Boo;Jung-Hun Choi;Myung-Eui Lee
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.2
    • /
    • pp.203-208
    • /
    • 2023
  • In this study, we propose a method to improve the precision of contact resistance measurement circuits using constant current method and voltage drop method, and implement a dashboard that monitors the measured data of contact resistance measurement systems through MQTT broker server. The contact resistance measurement system measures the resistance value and transmits the measured value to the MQTT broker server using wireless communications. This developed dashboard uses Node-RED and Node-RED-Dashboard to receive the resistance values of up to four contact resistance measurement systems and show them to user's monitor screen. Users can manage multiple measurement data using a single dashboard and easily interface with other devices through the MQTT broker server. Through the experimental results from real data measurements, the relative standard deviation about precision is improved to average 40.37% and maximum 64.73% respectively.

Image Steganography for Securing Hangul Messages based on RS-box Hiding Model (RS-box 은닉 모델에 기반한 한글 메시지 보안을 위한 이미지 스테가노그래피)

  • Seon-su Ji
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.2
    • /
    • pp.97-103
    • /
    • 2023
  • Since most of the information is transmitted through the network, eavesdropping and interception by a third party may occur. Appropriate measures are required for effective, secure and confidential communication in the network. Steganography is a technology that prevents third parties from detecting that confidential information is hidden in other media. Due to structural vulnerabilities, information protected by encryption and steganography techniques can be easily exposed to illegitimate groups. In order to improve the limitations of LSB where the simplicity and predictability of the hiding method exist, I propose a technique to improve the security of the message to be hidden based on PRNG and recursive function. To enhance security and confusion, XOR operation was performed on the result of selecting a random bit from the upper bits of the selected channel and the information transformed by the RS-box. PSNR and SSIM were used to confirm the performance of the proposed method. Compared to the reference values, the SSIM and PSNR of the proposed method were 0.9999 and 51.366, respectively, confirming that they were appropriate for hiding information.

A Study on the signification of TV advertisement narrative for enhancing brand image - Based on long-run brand 'Bacchus' - (브랜드 이미지 제고를 위한 TV광고 내러티브의 의미작용 연구 - 장수브랜드 '박카스'를 중심으로 -)

  • Kim, Eun Ju;Kim, Chong Hyuck;Kim, Geon
    • Design Convergence Study
    • /
    • v.15 no.2
    • /
    • pp.53-69
    • /
    • 2016
  • This paper analyzes the long-run brand Bacchus's TV advertisement narrative, which copes actively with changes in social and cultural circumstances. The paper focuses on the types of narrative and the consequent semantic effects used in the television advertisement of Bacchus. Through this, we aim to investigate the processes of brand strategies and transitions taken by the brand that made it a solid one. In conclusion, the summaries of distinctive meaning and value of long-run brand by examining the narrative of Bacchus in TV ads are as follows. Firstly, the narrative should be reflected in consumer's demands closely associated with changes in social and cultural circumstances. Secondly, a strong brand identity can be built by consistent management of brand image and through the cultivated effects. Lastly, it forms a bond of relationship between socio-cultural context and consumers, and functions as a communication message.