• Title/Summary/Keyword: Link information

Search Result 3,912, Processing Time 0.033 seconds

Diaspora and terrorism: An exploration of the relationship between diaspora support and violent terrorist activities in Arab and Africa (디아스포라와 테러활동: 아프리카와 중동지역의 디아스포라의 지원이 폭력적 테러활동에 미치는 영향에 관한 분석연구)

  • Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.131-160
    • /
    • 2014
  • The radicalization of diaspora is a new phenomena that have been begun to emerge in the complex picture of terrorism. The existence of diaspora and its supports for violent terrorist activities have made the whole dynamic of terrorism more complicated and unpredictable. Therefore, this study attempts to understand the relationship between diaspora support and violent terrorist activities in the constellation of other significant correlates of violent terrorist activities discussed in the prior studies. In analyses, the author utilized a step wise regrssion analyses with a set of variable drawn from an emphatical data collected in Arab and Africa region. The data used in this study is called as "MAROB"(the Minorities at Risk Organizational Behavior), which is developed by START and Minority at Risk project and contains information terrorist groups in Middle-East and Africa region. Considering the significance of this new emergence of the link between diaspora and violent terrorist activities, and the challenging nature of conducting empirical studies on this topic, this study have great contributions on the development in the field of criminal justice as well as terrorism. Other contributions of this study, policy implications, and suggestions for future studies are further discussed in the discussion.

  • PDF

A Study on Rethinking the Operating of Counter-terrorism Systems in South Korea (한국 대테러시스템 운영의 재모색)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.153-170
    • /
    • 2017
  • The purpose of this study is to rediscover the operation of anti-terrorism system focusing on the system approach and crisis management approach for counter terrorism in Korea. According to the results of this study, it is required to establish a link between open systems and integrative system focusing on functional linkage of counter-terrorism systems, and cooperative measures with private sectors in the dimension of governance activation. Further, it is necessary to prepare legal foundations for the cooperation with private sectors and then promote open consciousness transformation through the partnership with private security for anti-terrorism activities. In addition, in its preventive stage, it is required to prepare legal systems related to biochemical terrorism for stronger regulations through crisis-managerial approach. Next, in its preparatory stage, it is necessary to prepare education and enact named Terror Prevention Day for increasing terror safety consciousness, and then extend citizen reporting reward systems to enable citizens to participate and become interested voluntarily in terror prevention. Also, it is essential to establish the substantial training system for preparing for terror occurrence. Moreover, in its response stage, it is urgent to construct networks between related institutions to manage field and spot responses with integrative management systems through information sharing. Furthermore, in its restoration stage, it is indispensible to prepare long-term management systems for injured persons and families of the deceased from terror incidents.

  • PDF

Solution Algorithms for Logit Stochastic User Equilibrium Assignment Model (확률적 로짓 통행배정모형의 해석 알고리듬)

  • 임용택
    • Journal of Korean Society of Transportation
    • /
    • v.21 no.2
    • /
    • pp.95-105
    • /
    • 2003
  • Because the basic assumptions of deterministic user equilibrium assignment that all network users have perfect information of network condition and determine their routes without errors are known to be unrealistic, several stochastic assignment models have been proposed to relax this assumption. However. it is not easy to solve such stochastic assignment models due to the probability distribution they assume. Also. in order to avoid all path enumeration they restrict the number of feasible path set, thereby they can not preciously explain the travel behavior when the travel cost is varied in a network loading step. Another problem of the stochastic assignment models is stemmed from that they use heuristic approach in attaining optimal moving size, due to the difficulty for evaluation of their objective function. This paper presents a logit-based stochastic assignment model and its solution algorithm to cope with the problems above. We also provide a stochastic user equilibrium condition of the model. The model is based on path where all feasible paths are enumerated in advance. This kind of method needs a more computing demand for running the model compared to the link-based one. However, there are same advantages. It could describe the travel behavior more exactly, and too much computing time does not require than we expect, because we calculate the path set only one time in initial step Two numerical examples are also given in order to assess the model and to compare it with other methods.

Study on WP-IBE compliant Mobile IPSec (WP-IBE 적용 Mobile IPSec 연구)

  • Choi, Cheong Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.11-26
    • /
    • 2013
  • In the wireless Internet, it is so restrictive to use the IPSec. The MIPv4 IPSec's path cannot include wireless links. That is, the IPSec of the wireless Internet cannot protect an entire path of Host-to-Host connection. Also wireless circumstance keeps a path static during the shorter time, nevertheless, the IKE for IPSec SA agreement requires relatively long delay. The certificate management of IPSec PKI security needs too much burden. This means that IPSec of the wireless Internet is so disadvantageous. Our paper is to construct the Mobile IPSec proper to the wireless Internet which provides the host-to-host transport mode service to protect even wireless links as applying excellent WP-IBE scheme. For this, Mobile IPSec requires a dynamic routing over a path with wireless links. FA Forwarding is a routing method for FA to extend the path to a newly formed wireless link. The FA IPSec SA for FA Forwarding is updated to comply the dynamically extended path using Source Routing based Bind Update. To improve the performance of IPSec, we apply efficient and strong future Identity based Weil Pairing Bilinear Elliptic Curve Cryptography called as WP-IBE scheme. Our paper proposes the modified protocols to apply 6 security-related algorithms of WP-IBE into the Mobile IPSec. Particularly we focus on the protocols to be applied to construct ESP Datagram.

Synchronization of Network Interfaces in System Area Networks (시스템 에어리어 네트?에서의 동기화 기법)

  • Song, Hyo-Jung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.5
    • /
    • pp.219-231
    • /
    • 2005
  • Many applications in cluster computing require QoS (Quality of Service) services. Since performance predictability is essential to provide QoS service, underlying systems must provide predictable performance guarantees. One way to ensure such guarantees from network subsystems is to generate global schedules from applications'network requests and to execute the local portion of the schedules at each network interface. To ensure accurate execution of the schedules, it is essential that a global time base must be maintained by local clocks at each network interface. The task of providing a single time base is called a synchronization problem and this paper addresses the problem for system area networks. To solve the synchronization problem, FM-QoS (1) proposed a simple synchronization mechanism called FBS(Feedback-Based Synchronization) which uses built-in How control signals. This paper extends the basic notion of FM-QoS to a theoretical framework and generalizes it: 1) to identify a set of built-in network flow control signals for synchrony and to formalize it as a synchronizing schedule, and 2) to analyze the synchronization precision of FBS in terms of flow control parameters. Based on generalization, two application classes are studied for a single switch network and a multiple switch network. For each class, a synchroniring schedule is proposed and its bounded skew is analyzed. Unlike FM-QoS, the synchronizing schedule is proven to minimize the bounded skew value for a single switch network. To understand the analysis results in practical networks, skew values are obtained with flow control parameters of Myrinet-1280/SAN. We observed that the maximum bounded skew of FBS is 9.2 Usec or less over all our experiments. Based on this result, we came to a conclusion that FBS was a feasible synchronization mechanism in system area networks.

A Distributed address allocation scheme based on three-dimensional coordinate for efficient routing in WBAN (WBAN 환경에서 효율적인 라우팅을 위한 3차원 좌표 주소할당 기법의 적용)

  • Lee, Jun-Hyuk
    • Journal of Digital Contents Society
    • /
    • v.15 no.6
    • /
    • pp.663-673
    • /
    • 2014
  • The WBAN technology means a short distance wireless network which provides each device interactive communication by connecting devices inside and outside of body. Standardization on the physical layer, data link layer, network layer and application layer is in progress by IEEE 802.15.6 TG BAN. Wireless body area network is usually configured in energy efficient using sensor and zigbee device due to the power limitation and the characteristics of human body. Wireless sensor network consist of sensor field and sink node. Sensor field are composed a lot of sensor node and sink node collect sensing data. Wireless sensor network has capacity of the self constitution by protocol where placed in large area without fixed position. In this paper, we proposed the efficient addressing scheme for improving the performance of routing algorithm by using ZigBee in WBAN environment. A distributed address allocation scheme used an existing algorithm that has wasted in address space. Therefore proposing x, y and z coordinate axes from divided address space of 16 bit to solve this problems. Each node was reduced not only bitwise but also multi hop using the coordinate axes while routing than Cskip algorithm. I compared the performance between the standard and the proposed mechanism through the numerical analysis. Simulation verified performance about decrease averaging multi hop count that compare proposing algorithm and another. The numerical analysis results show that proposed algorithm reduced the multi hop better than ZigBee distributed address assignment

Study on Development Method for Galileo/SAR Ground System in Korea (국내의 갈릴레오 탐색구조 지상시스템 개발 방안에 관한 연구)

  • Ju, In-Won;Lee, Sang-Uk;Kim, Jae-Hun
    • Journal of Satellite, Information and Communications
    • /
    • v.2 no.1
    • /
    • pp.35-40
    • /
    • 2007
  • COSPAS-SARSAT is the search and rescue system for providing a distress alarm and a position identification using an international satellite and ground facilities. Aviators, mariners and land users worldwide are equipped with COSPAS-SARSAT distress beacons, which could help save their in emergency situations anywhere in the world. As the existing COSPAS-SARSAT system is generally operated by LEO(Low-altitude Earth Orbit) Satellite System, the time from the distress beacon to the rescue is more than 1 hour with average and the accuracy of the distress location is about 5 Km. Therefore, in order to overcome this problem, the development for the next generation SAR(search and rescue) system which uses the MEO(middle-altitude Earth Orbit) satellites is going on the Galileo project. EU is developing this project for the full operation capability in 2011, and this project will have SAR payloads and support to the Search and Rescue service-herein called SAR/Galileo. SAR/Galileo will have the performance of a few meter accuracy, within 10 minutes to rescue from reception of distress messages, and Return Link Service(from the SAR operator to the distress emitting beacon), thereby facilitating more efficient rescue operations and helping to reduce the rate of false alerts. As the disaster is larger every year, the ground station, MEOLUT for next generation ASR/Galileo is urgently needed for the lifesaving for the larger disaster, the research for beacon and the ground station such as MEOLUT for introducing the next generation SAR/Galileo in Korea is very timely and is important. This paper presents the procedures and the strategies for the participation, the area to develop reasonably, and the propulsion organization for developing the SAR/Galileo ground system in Korea.

  • PDF

Cell Buffer Analysis for ATM-to-Frame Relay Interworking (ATM-프레임 릴레이 망 연동장치의 셀 수신 버퍼 용량 분석)

  • Lee, Sung-Chang;Nam, Yoon-Seok;Kim, Jeong-Sik
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.10
    • /
    • pp.30-39
    • /
    • 1999
  • In this paper, the size of IWU frame cell buffer is analyzed that receives FR frame cells from other FR networks through ATM backbone network. The frame cell buffer receives multiplexed ATM cells from other IWUs that provide interworking with ATM network for other FR networks A receiving IWU reassembles frames from multiplexed ATM cells by identifying the VPI/VCIs. The reassembled frames are transmitted on FR network links according to their destination. Therefore, IWU needs sufficient amount of buffers for the assembly of the frames and for providing the assembled frames with the queue to wait until the frame is transmitted by FR network link. In this paper, the probability of frame loss at the frame cell buffer is derived in terms of traffic parameters, the number of multiplexed FR connections, the number of FR links and the transmission capacity. By applying the derived results, we analyzed the required buffer size for a given probability of frame loss. Also, it is presented that how the probability and the required size are effected by the number of multiplexed FR connections and FR transmission links.

  • PDF

The Header Compression Scheme for Real-Time Multimedia Service Data in All IP Network (All IP 네트워크에서 실시간 멀티미디어 서비스 데이터를 위한 헤더 압축 기술)

  • Choi, Sang-Ho;Ho, Kwang-Chun;Kim, Yung-Kwon
    • Journal of IKEEE
    • /
    • v.5 no.1 s.8
    • /
    • pp.8-15
    • /
    • 2001
  • This paper remarks IETF based requirements for IP/UDP/RTP header compression issued in 3GPP2 All IP Ad Hoc Meeting and protocol stacks of the next generation mobile station. All IP Network, for real time application such as Voice over IP (VoIP) multimedia services based on 3GPP2 3G cdma2000. Frames for various protocols expected in the All IP network Mobile Station (MS) are explained with several figures including the bit-for-bit notation of header format based on IETF draft of Robust Header Compression Working Group (ROHC). Especially, this paper includes problems of IS-707 Radio Link Protocol (RLP) for header compression which will be expected to modify in All IP network MS's medium access layer to accommodate real time packet data service[1]. And also, since PPP has also many problems in header compression and mobility aspects in MS protocol stacks for 3G cdma2000 packet data network based on Mobile IP (PN-4286)[2], we introduce the problem of solution for header compression of PPP. Finally. we suggest the guidelines for All IP network MS header compression about expected protocol stacks, radio resource efficiency and performance.

  • PDF

The Effect of the Satisfaction after Consumption and Consumer Self-Confidence for Hedonic Products on Transaction Coupling (소비 후 만족도와 소비자 자신감이 거래 커플링에 미치는 영향 - 쾌락적 제품을 중심으로 -)

  • Kang, Seong-Min;Kang, Hyun-Mo
    • CRM연구
    • /
    • v.4 no.2
    • /
    • pp.1-17
    • /
    • 2011
  • In the study of transaction coupling and consumer behavior it is argued that the satisfaction after consumption and consumer self-confidence would affect the degree of transaction coupling. Based on Kivetz(1999), this study expand transaction coupling which is a mental accounting process. Satisfaction after consumption and consumer self-confidence have been frequently cited as a key construct for predicting various consumer-related behaviors. The purpose of this research is to examine the effect of satisfaction after consumption and consumer self-confidence for hedonic products on transaction coupling. In order to explain the impact of consumer self-confidence clearly, the authors used a five-factor(i.e., information acquisition, consideration-set formation, personal and social outcomes, persuasion knowledge and marketplace interfaces). Using the scenario about baseball game, the authors manipulated the consumer satisfaction after consumption (satisfaction vs. dissatisfaction) between-subjects design. And consumer self-confidence was measured based on Bearden et al.(2001). The results of experimental study showed that the main effects of satisfaction after consumption is significant. The larger consumer satisfaction after consumption reflected a higher degree of transaction coupling. The 2-way interaction between satisfaction after consumption and consumer self-confidence is also significant. Specifically, the transaction coupling differentiation from satisfaction after consumption tends to be larger at high consumer-self confidence than at low one.

  • PDF