• Title/Summary/Keyword: IT Technique

Search Result 22,985, Processing Time 0.045 seconds

A Study on Improved Intrusion Detection Technique Using Distributed Monitoring in Mobile Ad Hoc Network (Mobile Ad Hoc Network에서 분산 모니터링을 이용한 향상된 침입탐지 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.35-43
    • /
    • 2018
  • MANET composed of only wireless nodes is increasingly utilized in various fields. However, it is exposed to many security vulnerabilities because it doesn't have any infrastructure and transmits data by using multi-hop method. Therefore, MANET should be applied the intrusion detection technique that can detect efficiently malicious nodes and decrease impacts of various attacks. In this paper, we propose a distributed intrusion detection technique that can detect the various attacks while improving the efficiency of attack detection and reducing the false positive rate. The proposed technique uses the cluster structure to manage the information in the center and monitor the traffic of their neighbor nodes directly in all nodes. We use three parameters for attack detection. We also applied an efficient authentication technique using only key exchange without the help of CA in order to provide integrity when exchanging information between cluster heads. This makes it possible to free the forgery of information about trust information of the nodes and attack nodes. The superiority of the proposed technique can be confirmed through comparative experiments with existing intrusion detection techniques.

A Minimization Technique of XML Path Comparison Based on Signature (시그니쳐를 이용한 XML 경로 비교의 최소화 기법)

  • Jang, Kyung-Hoon;Hwang, Byung-Yeon
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.3
    • /
    • pp.61-72
    • /
    • 2012
  • Since XML allows users to define any tags, XML documents with various structures have been created. Accordingly, many studies on clustering and searching the XML documents based on the similarity of paths have been done in order to manage the documents efficiently. To retrieve XML documents having similar structures, the three-dimensional bitmap indexing technique uses a path as a unit when it creates an index. If a path structure is changed, the technique recognizes it as a new path. Thus, another technique to measure the similarity of paths was proposed. To compute the similarity between two paths, the technique compares every node of the paths. It causes unnecessary comparison of the nodes, which do not exist in common between the two paths. In this paper, we propose a new technique that minimizes the comparison using signatures and show the performance evaluation results of the technique. The comparison speed of proposed technique was 20 percent faster than the existing technique.

Improved block-wise MET for estimating vibration fields from the sensor

  • Jung, Byung Kyoo;Jeong, Weui Bong;Cho, Jinrae
    • Structural Engineering and Mechanics
    • /
    • v.64 no.3
    • /
    • pp.279-285
    • /
    • 2017
  • Modal expansion technique (MET) is a method to estimate the vibration fields of flexible structures by using eigenmodes of the structure and the signals of sensors. It is the useful method to estimate the vibration fields but has the truncation error since it only uses the limit number of the eigenmodes in the frequency of interest. Even though block-wise MET performed frequency block by block with different valid eigenmodes was developed, it still has the truncation error due to the absence of other eigenmodes. Thus, this paper suggested an improved block-wise modal expansion technique. The technique recovers the truncation errors in one frequency block by utilizing other eigenmodes existed in the other frequency blocks. It was applied for estimating the vibration fields of a cylindrical shell. The estimated results were compared to the vibration fields of the forced vibration analysis by using two indices: the root mean square error and parallelism between two vectors. These indices showed that the estimated vibration fields of the improved block-wise MET more accurately than those of the established METs. Especially, this method was outstanding for frequencies near the natural frequency of the highest eigenmode of each block. In other words, the suggested technique can estimate vibration fields more accurately by recovering the truncation errors of the established METs.

The Design of User-Authentication technique using QR-Code recognition (스마트폰의 QR-Code의 인식 기법을 이용한 사용자 인증 기법 설계)

  • Lee, Yong Jae;Kim, Young Gon;Park, Tae Sung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.85-95
    • /
    • 2011
  • Smart phones, greatly expanding in the recent mobile market, are equipped with various features compared to existing feature phones and provide the conveniences to in several ways. The camera, one of the features of a smartphone, creates the digital contents, such photos and videos, and plays a role for the media which transmits information, such as video calls and bar code reader. QR-Code recognition is also one of the camera features. It contains a variety of information in two-dimensional bar code type in matrix format, and makes it possible to obtain the information by using smart phones. This paper analyzes the method of QR-Code recognition, password method-the existing user-authentication technique, smart card, biometrics and voice recognition and so on and thenn designs a new user-authentication technique. The proposed user-authentication technique is the technique in which QR-Code, which can be simply granted is read by smart phones and transmitted to a server, for authentication. It has the advantages in view that it will simply the process of authentication and conteract the disadvantages, such as brute force attack, man-inthe-middle attack, and keyboard hacking, which may occur in other authentication techniques.

A Study on the Colored Glass Plaster Resist Printing Technique Experiment and the Porcelain Vase Fusion with the Motif of Leaf (나뭇잎을 모티브로 한 색유리 플래스터 방염기법 실험과 도자화병 융합에 관한 연구)

  • Kim, Seung-Man;Lee, Jung-Suk
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.663-674
    • /
    • 2019
  • The background of the study is to experiment with the color glass plaster technique and the resist printing technique which are newly developed with the motif of natural leaves, and to make an interior vase added with new and unique decoration by fusing with ceramic vases. First research and development method is to describe the color glass plaster technique. Second is to explain the resist printing technique and study the decoration method. Third is to examine the history and kinds of vase. And lastly, it is to design 16 vases contemporarily, and use the leaves to experiment with oxidation and reduction of white porcelain and celadon. This experiment acquired the unique color expression by yaobian, and the soft, warm brown resist printing gradation was formed around the leaves. It will get good effects and results by expanding and applying the unique experiment effects to living interior porcelain, molding porcelain, and industrial porcelain.

A Technique for Recovering Logs in Real-time Transactions by using a LIFO Method (LIFO 방식을 이용한 실시간 트랜잭션 로그 회복 방안)

  • Park, Il Tae;Choi, Dong Yeul;Oh, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.51-57
    • /
    • 2003
  • The Real-time DBMS must provide the keeping, fabrication and control function which the data where the user requsets for processing inside the hour when it is restricted, it is quick most and safely[3]. In order lide this to take chare of the real-time control and fabrication function, details recording (log) of the control processing is very important in accomplished transactions from inside the Real-time DBMS. In this proposal, it sees recording which is like this in base and it proposes the new recovery function for transactions log. This recovery technique which it sees used the concept of the LIFO (Last-In-First-Out) method with basic. The proposed technique will becomes the technique which it will be able and to record to process efficiently with a same attribute and the continuous transactions log.

  • PDF

A Design Technique of 3D-based Meta-model for Development of Demand-Oriented Curriculum (수요지향 교과과정 개발을 위한 3차원 기반의 메타모델 설계 기법)

  • Cho, Eunsook;Pak, Suehee;Chang, Juno
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.6
    • /
    • pp.1-12
    • /
    • 2005
  • IT education in the colleges or universities and IT industry in producing IT manpower are urgently called for to balance its supply and demand. To correct this problem, Ministry of Information and Communication launched a program where demand-oriented curriculums are developed and applied to colleges. This paper proposes a design technique based on meta-model and software development process in developing curriculums and courses. This meta-modeling technique is proven to result in the extendibility, flexibility and quality improvement in software design. Therefore, we expect that proposed technique makes it possible to be improved in quality.

  • PDF

Comparative Analysis for Security Technology to WiBro Terminals's Vulnerability (WiBro 단말 취약에 대한 보안기술적용 비교분석)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.128-131
    • /
    • 2012
  • WiBro the world is the communication technique which it standardizes from our country. The radio internet service use which uses WiBro is extending. Becomes accomplished from WiBro, terminals the internet service which is having a vulnerability in vulnerability and the Internet which come from the radio and the security technique is necessary in about vulnerability. It researched the vulnerability of WiBro terminals from the research which it sees and it researched a security technique in about vulnerability. To secure the vulnerability of WiBro, in order terminals it applies a security technique and around security technical applying comparison it analyzes.

  • PDF

소형 펀치 시험에 의한 강용접부의 파괴강도 평가에 관한 연구 1

  • 유대영;정세희;임재규
    • Journal of Welding and Joining
    • /
    • v.7 no.3
    • /
    • pp.28-35
    • /
    • 1989
  • It was reported that the toughness for welded region was influenced by various factors such as the gradient for prior austenite grain size, the variation of microhardness and the characteristic microstructure depending on distance from the fusion boundary. Therefore, in order to evaluate the fracture strength of the weldment in which the microstructures change continuously, it is important to assess the peculiar strength of each microstructure in welded region. It was known that the small punch(SP) test technique which was originally developed to study the irradiation damage effect for the structures of nuclear power plant was also useful to investigate the strength evaluating of nonhomogeneous materials. In this paper, by means of a small punch test technique the possibility of evaluating strength of parent and welded region in SS41 and SM53B steels was investigated. The obtained results are summerized as follows: 1) The small punch test which showed markedly the ductile-brittle transition behavior in this experiment may be applied to evaluation for the fracture strength of welded region. 2) It was shown that the ductile-brittle regime lied in Region III(plastic membrane stretching region) of the flow characteristics observed in SP test. 3) The SP test technique which shows a more precipitous energy change transition behavior than the other test technique is able to estimate the more precise transition temperature. 4) It could be seen that in comparision with the structure of parent the structure of weld HAZ in SS41 steel was improved while it in SM53B steel was deteriorated.

  • PDF

Hybrid Watermarking Algorithm for MPEG Video (MPEG 비디오를 위한 하이브리드 워터마킹 알고리즘)

  • Lee, Hyeong-Hun;Bae, Chang-Seok;Choe, Jae-Hun;Choe, Yun-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3157-3164
    • /
    • 1999
  • In this paper, we propose a hybrid watermarking algorithm for an MPEG bitstream. Our hybrid watermarking technique uses a spread spectrum technique for I-frames and a motion vector technique for P- and B-frames. Thus, the proposed algorithm makes it possible to watermark all MPEG frames. By applying this technique, it is possible not only to protect intellectual property rights but also be robust against various kinds of attacks to remove watermark. And this scheme requires only partial decoding of an MPEG bitstream, so it is applicable to real-time watermarking applications.

  • PDF