• 제목/요약/키워드: Connection information

검색결과 3,128건 처리시간 0.037초

SmartCAC : Novel Distributed Connection Admission Control Framework for Heterogeneous Networks (이종 네트워크를 위한 분산처리 방식의 효율적인 호 수락 제어 구조)

  • Kim, Hyo-Eun;Kim, Won-Tae;Kang, Eun-Hyun;Park, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • 제44권7호통권361호
    • /
    • pp.70-80
    • /
    • 2007
  • For supporting various mobile networks, this paper proposes a framework of distributed connection admission control, named SmartCAC. Especially, intelligent CAC operations are adopted in terms of interoperation between mobile nodes and mobile networks. This scheme does not need to correct information between networks. Basically vertical handover call can use guard channel that was reserved for handoff, because SmartCAC addresses the identification between vertical handover call and new call, delay and reliability as requirement of QoS for efficient connection control. The scheme also uses mobile terminal speed for network filtering. Especially an extended protocol is proposed to give different network states information to mobile nodes because there have been no ways for mobile nodes to compare the states of different networks. Sophisticated simulation study is performed in order to evaluate SmartCAC in terms of signaling cost. As a result, signaling cost of ours is up to 96% better than that of the existing scheme.

Analysis of Incarceration Attacks with RRCReject and RRCRelease in 5G Standalone Non-Public Network

  • Kim, Keewon;Park, Jong-Geun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • 제26권10호
    • /
    • pp.93-100
    • /
    • 2021
  • In this paper, the possibility of a UE (User Equipment) incarceration attack using RRCRejecet and RRCRelease in 5G SNPN (Standalone Non-Public Network) is analyzed based on the 3GPP standard document. First, the cell selection and reselection procedures of the UE are analyzed, and then the processing process of the false base station and the UE before and after transmission of RRCReject and RRCRelease is analyzed. As a result of the analysis, it is possible that the false base station that transmits a strong signal causes the victim UE to establish an RRC connection to the false base station itself. In addition, if the false base station transmits an RRCReject message without integrity protection in response to the victim UE's attempt to establish an RRC connection, it is determined that the victim UE can continue to stay in the RRC connection attempt process. On the other hand, it is determined that it is impossible to incarcerate the victim UE by inducing an attempt to establish an RRC connection to another false base station using RRCRelease.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제28권3호
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

Low-dose CT Image Denoising Using Classification Densely Connected Residual Network

  • Ming, Jun;Yi, Benshun;Zhang, Yungang;Li, Huixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권6호
    • /
    • pp.2480-2496
    • /
    • 2020
  • Considering that high-dose X-ray radiation during CT scans may bring potential risks to patients, in the medical imaging industry there has been increasing emphasis on low-dose CT. Due to complex statistical characteristics of noise found in low-dose CT images, many traditional methods are difficult to preserve structural details effectively while suppressing noise and artifacts. Inspired by the deep learning techniques, we propose a densely connected residual network (DCRN) for low-dose CT image noise cancelation, which combines the ideas of dense connection with residual learning. On one hand, dense connection maximizes information flow between layers in the network, which is beneficial to maintain structural details when denoising images. On the other hand, residual learning paired with batch normalization would allow for decreased training speed and better noise reduction performance in images. The experiments are performed on the 100 CT images selected from a public medical dataset-TCIA(The Cancer Imaging Archive). Compared with the other three competitive denoising algorithms, both subjective visual effect and objective evaluation indexes which include PSNR, RMSE, MAE and SSIM show that the proposed network can improve LDCT images quality more effectively while maintaining a low computational cost. In the objective evaluation indexes, the highest PSNR 33.67, RMSE 5.659, MAE 1.965 and SSIM 0.9434 are achieved by the proposed method. Especially for RMSE, compare with the best performing algorithm in the comparison algorithms, the proposed network increases it by 7 percentage points.

A study on Machine-Printed Korean Character Recognition by the Character Composition form Information of the Graphemes and Graphemes using the Connection Ingredient and by the Vertical Detection Information in the Weight Center of Graphemes

  • Lee, Kyong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • 제22권3호
    • /
    • pp.97-105
    • /
    • 2017
  • This study is the realization study recognizing the Korean gothic printing letter. This study defined the new grapheme by using the connection ingredient and had the graphemes recognized by means of the feature dots of the isolated dot, end dot, 2-line gathering dots, more than 3 lines gathering dots, and classified the characters by means of the arrangement information of the graphemes and the layers that the graphemes form within the characters, and made the character database for the recognition by using them. The layers and the arrangement information of the graphemes consisting in the characters were presumed by using the weight center position information of the graphemes extracted from the characters to recognize and the information of the graphemes obtained by vertically exploring from the weight center of each grapheme, and it recognized the characters by judging and comparing the character groups of the database by means of the information which was secured this way. 350 characters were used for the character recognition test and about 97% recognition result was obtained by recognizing 338 characters.

Study on the Expression of Sensory Visualization through AR Display Connection - Focusing on Eye Tracking (AR 디스플레이 연결을 통한 감각시각화에 대한 표현 검토)

  • Ma Xiaoyu
    • The Journal of the Convergence on Culture Technology
    • /
    • 제10권2호
    • /
    • pp.357-363
    • /
    • 2024
  • As AR display virtual technology enters public learning life extensively, the way in which reality and virtual connection are connected is also changing. The purpose of this paper is to study the expression between the 3D connection sensory information visualization experience and virtual reality enhancement through the visual direction sensory information visualization experience of the plane. It is analyzed by examining the basic setting method compared to the current application of AR display and flat visualization cases. The scope of this paper is to enable users to have a better experience through the relationship with sensory visualization, centering on eye tracking technology in the four categories of AR display connection design: gesture connection, eye tracking, voice connection, and sensor. Focusing on eye tracking technology through AR display interaction and current application and comparative analysis of flat visualization cases, the geometric consistency of visual figures, light and color consistency, combination of multi-sensory interaction methods, rational content display, and smart push presented sensory visualization in virtual reality more realistically and conveniently, providing a simple and convenient sensory visualization experience to the audience.

A Study on the Effective Routing Algorithm for Mobile Ad-hoc Wireless Network (이동 Ad-hoc 무선망에서 효율적인 라우팅 알고리즘에 관한 연구)

  • Lee, Dong-Chul;Kim, Ki-Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제9권1호
    • /
    • pp.58-64
    • /
    • 2005
  • The nodes of Ad-hoc network are made up of location registration for sending information and a great number of packet transmissions to maintain routing route among the nodes. under this environment, a huge number of traffics would be generated as mobility variable occurs more than in physical network. Hence, in this paper, focused on to study the relationship of nodes to analyze the extend of the traffic in order to control the traffics of the multi-hop in Ad-hoc.

Design and Implementation of Web-based Electronic Bidding System using XML (웹 기반의 XML을 활용한 전자 입찰 시스템의 설계 및 구현)

  • 윤선희
    • The Journal of Information Systems
    • /
    • 제10권1호
    • /
    • pp.127-146
    • /
    • 2001
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. Widely spread the use of the internet, there are various applications for Business to Business (B to B) or Business to Customer(B to C) model that are based on the intranet or extranet. This paper designed and implemented the Web-based Electronic Bidding System for Business to Business (B to B) model. The technical issues of electronic bidding system in the internet are involved in the connection between web client and server, electronic data interchange for the contract document, and security solution during the bidding and contracting processes. The web-based electronic bidding system in this paper is implemented using Java applet and servlet as a connection interface for web client and server, XML/EDI-based documents for a bid and a contract, and bidding server and notary server for enhancing the security using PKI(Public Key Infrastructure)-based public key cryptography, digital signature and Certification Authority(CA).

  • PDF

A Study on the Donor Development to utilize Internet Marketing (인터넷마케팅을 활용한 후원자 개발에 관한 연구)

  • Choi, Jeong-Gui
    • Management & Information Systems Review
    • /
    • 제21권
    • /
    • pp.169-187
    • /
    • 2007
  • Today, the principle of competition is being applied to Non-profit sector also. It is necessary for relevant persons in charge to learn the knowledge and technique about marketing technique endlessly in connection with the development of donor out of the development of social welfare resource which is being embossed as main pending problem at the point of time when the role of private sector about welfare service increased and the criterion of competition and evaluation among institutions was introduced. Especially, as for the application of marketing technique to utilize internet to have big marketing potential, the efforts for the realization and application of positive marketing to be suitable for the real situation of each institution is necessary in connection with the donor development of social welfare institution. In this study tried to examine the charge of method to develop donor which is based on the development of information technique and the popularization of internet from the viewpoint of internet marketing and suggest the basic data about the present situation of donor marketing to use the effective scheme for internet marketing.

  • PDF

A Exhibition Design of Digital Pavilion in DMC (디지털파빌리온 전시공간계획)

  • Kwon, Soon-Kwan
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 한국실내디자인학회 2007년도 추계학술발표대회 논문집
    • /
    • pp.210-213
    • /
    • 2007
  • The direction of this project is creates a future and it experiences ubiquitous world. The subject of the space is 'Ubiquitous Creative World' which Imagining the past becomes actuality and imagining in future become actuality and future when it will approach at once. The storyline of this space is as belows; 1 Zone - Ubiquitous life Gallery : it will be able to experience the future world ; home, office, street, school and the others. 2 Zone - Interactive Play Gallery : it will be able to explore the interactive media with information technology ; digital cafe, imagining jump, digital art and the others. 3 Zone - New product and Business Gallery : it composed with business, new product, and demonstration gallery such as public information space. The space concept makes connection and concentration which uses unit and line for world which becomes accomplished by the network. Connection of digital and the human being to make the center of new digital life.

  • PDF