• Title/Summary/Keyword: Communication Blocking

Search Result 277, Processing Time 0.027 seconds

A Harmful Site Judgement Technique based on Text (문자 기반 유해사이트 판별 기법)

  • Jung, Kyu-Cheol;Lee, Jin-Kwan;Lee, Taehun;Park, Kihong
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.5
    • /
    • pp.83-91
    • /
    • 2004
  • Through this research, it was possible to set up classification system between 'Harmful information site' and 'General site' that badly effect to teenagers emotional health. To intercept those entire harmful information sites, it using contents basis isolating. Instead of using existing methods, it picks most frequent using composed key words and adds all those harmful words' harmfulness degree point by using 'ICEC(Information Communication Ethics Committee)' suggested harmful word classification. To testify harmful information blocking system, to classify the harmful information site, set standard harmfulness degree point as 3.5 by the result of a fore study, after that pick up a hundred of each 'Harmful information site' and 'General site' randomly to classify them through new classification system. By this classification could found this new classification system classified 78% of 'Harmful Site' to "Harmful information site' and 96% of 'General Site' to 'General site'. As a result, successfully confirm validity of this new classification system.

  • PDF

Satellite Mobility Pattern Scheme for Centrical and Seamless Handover Management in LEO Satellite Networks

  • Tuysuz, Aysegul;Alagoz, Fatih
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.451-460
    • /
    • 2006
  • Since low earth orbit (LEO) satellite constellations have important advantages over geosynchronous earth orbit (GEO) systems such as low propagation delay, low power requirements, and more efficient spectrum allocation due to frequency reuse between satellites and spotbeams, they are considered to be used to complement the existing terrestrial fixed and wireless networks in the evolving global mobile network. However, one of the major problems with LEO satellites is their higher speed relative to the terrestrial mobile terminals, which move at lower speeds but at more random directions. Therefore, handover management in LEO satellite networks becomes a very challenging task for supporting global mobile communication. Efficient and accurate methods are needed for LEO satellite handovers between the moving footprints. In this paper, we propose a new seamless handover management scheme for LEO satellites (SeaHO-LEO), which utilizes the handover management schemes aiming at decreasing latency, data loss, and handover blocking probability. We also present another interesting handover management model called satellite mobility pattern based handover management in LEO satellites (PatHO-LEO) which takes mobility pattern of both satellites and mobile terminals into account to minimize the handover messaging traffic. This is achieved by the newly introduced billboard manager which is used for location updates of mobile users and satellites. The billboard manager makes the proposed handover model much more flexible and easier than the current solutions, since it is a central server and supports the management of the whole system. To show the performance of the proposed algorithms, we run an extensive set of simulations both for the proposed algorithms and well known handover management methods as a baseline model. The simulation results show that the proposed algorithms are very promising for seamless handover in LEO satellites.

The Evaluation of Energy Saving using Ultrathin Heat Insulation in Railway Electrification Substation (철도전기실의 초박형 액체단열재 적용을 통한 에너지 절감효과)

  • Kim, Hyungchul;Jang, Junghoon;Shin, Sungkwon;Park, Yongsub;Kim, Sangam;Kim, Hyeong Rae;Hyun, Byungsoo;Kim, Jinho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.1
    • /
    • pp.171-175
    • /
    • 2015
  • In this paper, because of global environmental problems such as energy shortage and abnormal climate, green energy development and energy saving technology development is being magnified. Heat insulation, the most basic and traditional energy saving method, is highly expected. Especially, simple and advanced heat insulation technique based on Nano material is promising future technology. The railway system also requires heat insulation. Especially, traditional heat insulator such as glass wool has been adopted frequently to rolling stock. The heat insulator is also adopted in general railway service buildings. Take account of cost-effective heat blocking performance, the heat insulator shall be adopted in diverse fields such as electric power, railroad, signal and communication. The only and direct solution for this problem is installing heat insulator with outstanding endurance, corrosion resistance and heat resistance to block outer heat Upgrading heat specification of equipment can be a solution, but since price and maintenance cost rise severely, this plan might be incongruous. In this research, energy saving effect of ultrathin heat insulator film was demonstrated by installing the film on roof of electrical room.

Class Conflict and Empathetic Society in Korea: Crisis Management in the COVID-19 Era (한국 계층갈등의 지형과 공감사회: 코로나 시대의 극복방안)

  • Suh, Moon-Gi
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.23 no.3
    • /
    • pp.197-208
    • /
    • 2020
  • This study attempts to identify the structure of class conflict in Korea and to suggest an alternative framework for a empathetic society. The objective and subjective level of satisfaction with life and class consciousness are in direct proportion, and status consistency signifies polarization. Distorted distribution structures and cultural values make income disparity and property disputes widen, which in turn lead to educational divides and status fixations, refracting or blocking the possibility of social mobility. By overcoming the COVID-19 crisis, it is not appropriate to go back to the past but to correct wrong consciousness and practices in the past, and the consistency between the state and members of society must be re-established. Through the process of innovation at the economic, global, and digital level, a major transformation is required in the new normal era, which prioritizes social development for human values. The conflict resolution depends on the solidarity of the community as a social foundation, since an empathetic society needs the trust and communication of the members of the society.

The Design of Hardware MPI Units for MPSoC (MPSoC를 위한 저비용 하드웨어 MPI 유닛 설계)

  • Jeong, Ha-Young;Chung, Won-Young;Lee, Yong-Surk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.1B
    • /
    • pp.86-92
    • /
    • 2011
  • In this paper, we propose a novel hardware MPI(Message Passing Interface) unit which supports message passing in multiprocessor system which use distributed memory architecture. MPI Hardware unit processes data synchronization, transmission and completion, and it supports processor non-blocking operation so it reduces overhead according to synchronization. Additionally, MPI hardware unit combines ready entry, request entry, reserve entry which save and manage the synchronized messages and performs the multiple outstanding issue and out of order completion. According to BFM(Bus Functional Model) simulation result, the performance is increased by 25% on many to many communication. After we designed MPI unit using HDL, with synopsys design compiler we synthesized, and for synthesis library we used MagnaChip $0.18{\mu}m$. And then we making prototype chip. The proposed message transmission interface hardware shows high performance for its increase in size. Thus, as we consider low-cost design and scalability, MPI hardware unit is useful in increasing overall performance of embedded MPSoC(Multi-Processor System-on-Chip).

Performance Enhancement of Call Admission Control in an Adaptive Array Antenna System (적응형 어레이 안테나 시스템에서의 호 수락제어 알고리즘 성능 개선에 관한 연구)

  • Kim, Min-Jung;Kim, Nak-Myeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9A
    • /
    • pp.1013-1021
    • /
    • 2004
  • In the WCDMA mobile multimedia communication system, the adaptive array antenna IS adopted to improve the performance of the system by reducing inter-user interference using antenna beam control. Usually, the interference resulted from the higher data rate users is much more significant to the lower data rate users than the other way around, so the overall performance can be enhanced by reducing the interference from higher data rate users. In order to maximize the efficiency of adaptive antenna operation, an optimal call admission control, especially during handoff, adaptive to the data rates is a critical problem. In this paper, We propose a call admission control algorithm based on the Soft QoS concept for the efficient processing of the handoff of higher data rate calls, and an adaptive handoff control mechanism according to the data rates. The proposed algorithm has been evaluated by computer simulation that it accommodates high data rate users among many lower data rate users much better, and the average call blocking probability for lower rate users becomes much lower than the conventional call admission control algorithm.

Analysis of Frequency Sharing Performance using Guard Band and User Device Density in a Urban Environment (도심 환경에서 보호대역과 단말밀도를 이용한 주파수 공유성능 분석)

  • Cho, Ju-Phil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1864-1869
    • /
    • 2012
  • We make an interference analysis to obtain a critical ctiteria for coexisting availability of WLAN and WiBro between adjacent channels can be used in TVWS(TV White Space). To meet this analysis, we set the various transmission parameters including the emission and blocking mask, antenna height and gain, transmission power and bandwidth, channel model etc. And, based on these parameters, we analyze on performances according to a variation of guard band, a number of service user and allowable transmit power of the user operating in the adjacent channels. In this paper, we consider a urban environment and apply a Extended Hata-SRD for WLAN and an interference link and Extended Hata model for WiBro, respectively. With these results, we can see how each system can be shared in an adjacent channel.

Methodology for Intercepting the Ransomware Attacks Using File I/O Intervals (파일 I/O Interval을 이용한 랜섬웨어 공격 차단 방법론)

  • Youn, Jung-moo;Jo, Je-geong;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.645-653
    • /
    • 2016
  • Ransomware was first created in 1999, but its existence become widely known in Korean by 2015. As information and communication technology have developed, the storage capacity of computer has enlarged, it accordingly is getting more important to effectively manage these information, rather than the information itself. In such situation, the ransomware break into other people's computer and encrypt an files without a user's permission. So, it adversely affect the user. In this paper, we monitor an access of a specific process to the file. And on the basis of this monitoring information, we detect whether the abnormal approach happened. Through the detection result, we block the permission about access to the file for a specific process. Using this method, we propose a blocking technique for the ransomeware's abnormal approach and encryption to the files.

A study on Development of Remote Vehicle Fault Diagnostic System (원격 자동차 고장 진단 시스템 개발에 대한 연구)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.224-227
    • /
    • 2015
  • Data transmission via the car driver's tethered smart phone may have a volume-dependent billing in case car driver' phone transmits data in real-time to the remote data center. The on-board diagnosis data generated are temporary stored locally to mobile remote diagnosis application on the car driver's phone, and then transmit to the data center later when car driver connects to the Internet. To increase the easiest of using the remote vehicle application without blocking other tasks to be executing on the cloud, node.js stands as a suitable candidate for handling tasks of data storage on the cloud via mobile network. We demonstrate the effectiveness of the proposed architecture by simulating a preliminary case study of an android application responsible of real time analysis by using a vehicle-to- smart phones applications interface approach that considers the smart phones to act as a remote user which passes driver inputs and delivers output from external applications. In this paper, we propose a study on development of Remote Vehicle fault diagnostic system features web server architecture based event loop approach using node.js platform, and wireless communication to handle vehicle diagnostics data to a data center.

  • PDF

Operation Plan for the Management of an Information Security System to Block the Attack Routes of Advanced Persistent Threats (지능형지속위협 공격경로차단 위한 정보보호시스템 운영관리 방안)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.759-761
    • /
    • 2016
  • Recent changes in the information security environment have led to persistent attacks on intelligent assets such as cyber security breaches, leakage of confidential information, and global security threats. Since existing information security systems are not adequate for Advanced Persistent Threat; APT attacks, bypassing attacks, and attacks on encryption packets, therefore, continuous monitoring is required to detect and protect against such attacks. Accordingly, this paper suggests an operation plan for managing an information security system to block the attack routes of advanced persistent threats. This is achieved with identifying the valuable assets for prevention control by establishing information control policies through analyzing the vulnerability and risks to remove potential hazard, as well as constructing detection control through controlling access to servers and conducting surveillance on encrypted communication, and enabling intelligent violation of response by having corrective control through packet tagging, platform security, system backups, and recovery.

  • PDF