• Title/Summary/Keyword: Communication log

Search Result 388, Processing Time 0.026 seconds

Public Key Authentication Scheme using Transformed Merkle-Tree in WSNs (WSN에서 변형된 Merkle 트리를 이용한 공개키 인증 기법)

  • Kim, Eun-Ju;Kim, Hyun-Sung;Lee, Won-Jin;Jeon, Il-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.477-482
    • /
    • 2006
  • 최근 Du 등은 공개키 암호 기반의 센서네트워크에서 주요 난제인 공개키 인증 문제를 해결하기 위해 해쉬 함수를 사용하여 계산비용을 줄일 수 있는 트리 기반의 인증기법[1]을 제안하였다. 그러나 이 기법은 공개키 인증을 위해 노드의 수 N에 대해 O(logN)의 수행시간이 필요하고 전송되는 메시지의 양도 O(logN)이 되어 네트워크의 크기에 따라 인증비용이 커지는 문제점이 있다. 이러한 문제를 해결하기 위하여 본 논문에서는 공개키 인증을 위한 안전하고 효율적인 경량의 인증 기법을 제안한다. 제안한 기법은 해쉬 연산과 XOR 연산을 이용하여 네트워크의 크기에 관계없이 상수복잡도의 수행시간과 전송되는 메시지의 양이 상수복잡도인 향상된 공개키 인증을 수행한다.

  • PDF

Improving Lookup Time Complexity of Compressed Suffix Arrays using Multi-ary Wavelet Tree

  • Wu, Zheng;Na, Joong-Chae;Kim, Min-Hwan;Kim, Dong-Kyue
    • Journal of Computing Science and Engineering
    • /
    • v.3 no.1
    • /
    • pp.1-4
    • /
    • 2009
  • In a given text T of size n, we need to search for the information that we are interested. In order to support fast searching, an index must be constructed by preprocessing the text. Suffix array is a kind of index data structure. The compressed suffix array (CSA) is one of the compressed indices based on the regularity of the suffix array, and can be compressed to the $k^{th}$ order empirical entropy. In this paper we improve the lookup time complexity of the compressed suffix array by using the multi-ary wavelet tree at the cost of more space. In our implementation, the lookup time complexity of the compressed suffix array is O(${\log}_{\sigma}^{\varepsilon/(1-{\varepsilon})}\;n\;{\log}_r\;\sigma$), and the space of the compressed suffix array is ${\varepsilon}^{-1}\;nH_k(T)+O(n\;{\log}\;{\log}\;n/{\log}^{\varepsilon}_{\sigma}\;n)$ bits, where a is the size of alphabet, $H_k$ is the kth order empirical entropy r is the branching factor of the multi-ary wavelet tree such that $2{\leq}r{\leq}\sqrt{n}$ and $r{\leq}O({\log}^{1-{\varepsilon}}_{\sigma}\;n)$ and 0 < $\varepsilon$ < 1/2 is a constant.

On the Multicast Capacity of Wireless Ad Hoc Networks with Network Coding

  • Wang, Zheng;Karande, Shirish S.;Sadjadpour, Hamid R.;Garcia-Luna-Aceves, J.J.
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.525-535
    • /
    • 2011
  • In this paper, we study the contribution of network coding (NC) in improving the multicast capacity of random wireless ad hoc networks when nodes are endowed with multi-packet transmission (MPT) and multi-packet reception (MPR) capabilities. We show that a per session throughput capacity of ${\Theta}$(nT$^3$(n)) can be achieved as a tight bound when each session contains a constant number of sinks where n is the total number of nodes and T(n) is the transmission range. Surprisingly, an identical order capacity can be achieved when nodes have only MPR and MPT capabilities. This result proves that NC does not contribute to the order capacity of multicast traffic in wireless ad hoc networks when MPR and MPT are used in the network. The result is in sharp contrast to the general belief (conjecture) that NC improves the order capacity of multicast. Furthermore, if the communication range is selected to guarantee the connectivity in the network, i.e., ${\Omega}$($\sqrt{log\;n/n}$)=T(n) = O(log log n / log n), then the combination of MPR and MPT achieves a throughput capacity of ${\Theta}$(log$^{\frac{3}{2}}$ n/$\sqrt{n}$) which provides an order capacity gain of ${\Theta}$(log$^2$ n) compared to the point-to-point multicast capacity with the same number of destinations.

The Calculation of Cell Radius for CDMA PCS System on the presumption of Log-normal Distribution with The Hata Path Loss Model (Hata Path Loss Model에서 Log-normal Distribution을 가정한 CDMA PCS 시스템의 Cell반경 산출)

  • 이명국;이호경
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9A
    • /
    • pp.1306-1313
    • /
    • 1999
  • In this paper, we propose the signal strength path loss model (modified Hata path loss Model) and the signal strength distribution model (log-normal distribution) for the cell design of the land mobile communication system. We applied the measured experimental data at Soosungdon and Sanjuckdong in Daeku, to this model and calculate the fraction of total area above threshold.

  • PDF

Improved IEEE 802.11 RSSI Attenuation Log Model by Weighted Fitting Method (가중치 적합 기법을 이용한 개선된 IEEE 802.11 RSSI 감쇠 로그 모델)

  • Shin, Seokhun;Park, Joon Goo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.1
    • /
    • pp.70-75
    • /
    • 2015
  • With the development of communication technologies and smartphone, requirements of positioning accuracy for LBS (Location Based Service) are becoming increasingly important. LBS is a service which offers the information or entertainment based on a location to users. Therefore, positioning is very important for LBS. Among many positioning methods, IEEE 802.11 WLAN positioning measures the distance using the RSSI (Received Signal Strength Indicator) attenuation log model. Thus in order to enhance positioning, we modify the IEEE 802.11 RSSI attenuation log model by adaptive weighting method. In this paper, we propose improved IEEE 802.11 RSSI attenuation log model for enhanced indoor positioning.

Capacity Analysis of Internet Servers Based on Log-Data Analysis (로그자료 분석을 통한 인터넷 서버의 용량 분석)

  • 김수진;윤복식;이용주;강금석
    • Korean Management Science Review
    • /
    • v.19 no.1
    • /
    • pp.29-38
    • /
    • 2002
  • Due to the rapid increase In the Internet traffic volume, ISPs are faced with the definite need of the expansion of server capacity. In order to Provide prompt services for customers and still prevent excessive facility cost, it is critical to determine the optimum level of internet server capacity. The purpose of this Paper is to provide a simple but effective strategy on the expansion of servers capacity according to the increase in internet traffic. We model an internet server as an M/G/m/m queueing system and derive an efficient method to compute the loss probability which, In turn, Is used as a basis to determine proper server capacity. The Process of estimating the traffic parameter values at each server based on log data analysis is also given. All the procedures are numerically demonstrated through the process of analyzing actual log data collected from a game company.

Web Server Log Visualization

  • Kim, Jungkee
    • International journal of advanced smart convergence
    • /
    • v.7 no.4
    • /
    • pp.101-107
    • /
    • 2018
  • Visitors to a Web site leave access logs documenting their activity in the site. These access logs provide a valuable source of information about the visitors' access patterns in the Web site. In addition to the pages that the user visited, it is generally possible to discover the geographical locations of the visitors. Web servers also records other information such as the entry into the site, the URL, the used operating system and the browser, etc. There are several Web mining techniques to extract useful information from such information and visualization of a Web log is one of those techniques. This paper presents a technique as well as a case a study of visualizing a Web log.

A Study on SysLog-based Integrated Log Management System. (SysLog기반의 통합로그관리시스템에 관한 연구)

  • Lee, Dong-Yooung;Lee, Eul-Suk;Kim, Jin-Chul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1030-1032
    • /
    • 2011
  • 주요 ISP(Internet Service Provider)와 금융기관 및 공공기관에서는 로그 분석에 대한 관심도가 높아지고 있다. 보안사고 발생시 원인 규명을 위한 근거자료와 재발방지를 위한 정보를 제공하고, 이를 기반으로 정보보호시스템 관리자에게 다양한 보안정책을 수립할 수 있는 기반자료로 활용 로그정보의 수집과 대용량의 로그정보를 백업할 수 있는 통합로그수집/백업시스템의 필요성이 절실히 요구되고 있다. 이에 본 논문에서는 로그메시지를 처리하기 위해서 제공하는 표준 인터페이스 중 하나인 SysLog를 기반으로 이종의 침입차단시스템의 로그를 통합관리하는 시스템을 설계 구현하였다.

Prediction of Cognitive Ability Utilizing a Machine Learning approach based on Digital Therapeutics Log Data

  • Yeojin Kim;Jiseon Yang;Dohyoung Rim;Uran Oh
    • International journal of advanced smart convergence
    • /
    • v.12 no.2
    • /
    • pp.17-24
    • /
    • 2023
  • Given the surge in the elderly population, and increasing in dementia cases, there is a growing interest in digital therapies that facilitate steady remote treatment. However, in the cognitive assessment of digital therapies through clinical trials, the absence of log data as an essential evaluation factor is a significant issue. To address this, we propose a solution of utilizing weighted derived variables based on high-importance variables' accuracy in log data utilization as an indirect cognitive assessment factor for digital therapies. We have validated the effectiveness of this approach using machine learning techniques such as XGBoost, LGBM, and CatBoost. Thus, we suggest the use of log data as a rapid and indirect cognitive evaluation factor for digital therapy users.

The Design of a Log Manager for Mandatory Access Control Mechanism of Secure Operating System (보안운영체제의 강제적 접근통제(MAC)를 위한 로그 관리자 설계)

  • Park, Chun-Goo;Shin, Wook;Kang, Jung-Min;Lee, Hyung-Hyo;Lee, Dong-Ik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.805-807
    • /
    • 2001
  • 안전한 컴퓨터 시스템 평가기준인 TCSEC(Trusted Computer System Evaluation Criteria)[1] B1급 이상 시스템의 안전한 운영체제들은 강제접근통제(Mandatory Access Control : MAC) 메커니즘을 이용하여 정보의 흐름을 제어하고 있다. 하지만 아무리 정확하게 설계된 접근통제 메커니즘이라고 하더라도 시스템 관리자 또는 보안 관리자가 어떻게 시스템이 접근통제 메커니즘을 관리.운영하느냐에 따라 그 시스템의 안전성과 보안에 대한 신뢰도가 결정된다고 할 수 있다. 지금까지 연구되고 있는 대부분의 MAC을 적용한 안전한 운영체제는 접근통제메커니즘의 적용 및 관리.운영상의 보안문제점을 관리할 적당한 방법을 제시하고 있지 않다[4][5][6][7]. 본 논문은 MAC을 적용한 안전한 운영체제의 안전하고 효율적인 관리.운영을 위한 방법으로 LMACM(Log Manager for Access Control Mechanism)을 제안한다.

  • PDF