• Title/Summary/Keyword: Personal Communication Networks

Search Result 157, Processing Time 0.027 seconds

Study on the developmental directions of Mobile contents for Mobile e-learning prosumers in Web 2.0 decade (웹 2.0시대 모바일 이-러닝 컨텐츠 소비자의 컨텐츠 활용 확장성 연구)

  • Ahn, Kyung-Whan
    • Journal of Digital Contents Society
    • /
    • v.9 no.1
    • /
    • pp.41-51
    • /
    • 2008
  • In a circumstance that the development of mobile media through the on-line consumer desire in the era of Web 2.0 has promoted extension of personal mobile media on the part of consumers, this study examined consumer trends depending on use of e-learning contents through mobile media. In connection with tendencies through mobile prosumers' consumption patterns and use of mobile educational contents, I analyzed user demands based on characteristics of personal media centering around a communities of e-learning portals. Direction of e-learning technological development calls on mobile communication companies to open their networks and share platform following digital convergence. E-learning contents should be produced in a custom-made way for the personal media. This study is aimed at contributing for advancement of e-learning contents consumers' user convenience implicating examination into consumer demands which are necessary to invigorate e-learning contents.

  • PDF

A Vehicle-to-Vehicle Communication Protocol Scheme for Forwarding Emergency Information in Intelligent Cars Transportation Systems (지능형 차량 전송시스템에서 긴급정보 전송을 위한 Vehicle-to-Vehicle 통신 프로토콜)

  • Kim, Kyung-Jun;Cha, Byung-Rae;Kim, Chul-Won
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.2
    • /
    • pp.70-80
    • /
    • 2007
  • Inter-vehicular communication suffers from a variety of the problem on the road, resulting in large delay in propagating emergency warning. An energy depletion as well as a transmission delay may induced by traffic accident. A transmission delay are caused by direct contention from nodes that can hear each other or indirect contention from nodes that can not hear each other, but simultaneously transmit to the same destination. A variety of works have been researched to solve the transmission delay and energy consumption problem in intelligent cars transportation systems. We consider a vehicle-to-vehicle communication protocol for disseminating an emergency information that include end-to-end and energy efficient transmission. In this paper, we propose A vehicle-to-vehicle communication protocol scheme for dissemination emergency information in intelligent cars communication based on IEEE 802.15.3 wireless personal area networks. Results from a simulation study reveal that our scheme can achieves low latency in delivering emergency warnings, and efficiency in consuming energy in stressful road scenarios.

  • PDF

LTE Load Balancer for Emergency Based on Raspberry Pi and OpenWRT (라즈베리 파이를 활용한 OpenWRT 기반 LTE 비상망 로드밸런서)

  • Baek, Seung-Hyun;Jang, Min-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.97-110
    • /
    • 2019
  • Recently, the 4th Industrial Revolution has been emerged and various products are developed and commercialized in preparation of the communication failure. Many solutions are underway in Back-Up Network for IDC Servers, but not in the personal or sensor for low-power system use. Therefore we used the OpenWRT Firmware in Raspberry Pi which can be easily obtained in online market, and it created a low-power load balancer. Therefore, we developed the device that uses LTE Antenna based on USB Interface for communication fault notification and important data. The equipment used in this paper is easy to buy in online shop for anyone. Also, it can be applied in other vendors' boards by using USB. We hope that this paper will contribute to the stability of individual sensor networks.

The Effect of Synchronous CMC Technology by Task Network: A Perspective of Media Synchronicity Theory (개인의 업무 네트워크 특성에 따른 동시적 CMC의 영향 : 매체 동시성 이론 관점)

  • Kim, Min-Soo;Park, Chul-Woo;Yang, Hee-Dong
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.21-43
    • /
    • 2008
  • The task network which is formed of different individuals can be recognized as a social network. Therefore, the way to communicate with people inside or outside the network has considerable influence on their outcome. Moreover, the position on which a member stands in a network shows the different effects of the information systems supporting communication with others. In this paper, it is to be studied how personal CMC (computer-mediated communication) tools affect the mission that those who work for a network perform through diverse task networks. Especially, we focused on synchronicity of CMC. On this score, the perspective of Media Synchronicity Theory was taken that had been suggested by criticizing Media Richness Theory. It is the objective, from this perspective, to find which characteristics of networks make the value of IT supporting synchronicity high. In the research trends of social networks, there have been two traditional perspectives to explain the effect of network: embeddedness and diversity ones. These differ from the aspect which type of social network can provide much more economic benefits. As similar studies have been reported by various researchers, these are also divided into the bonding and bridging views which are based on internal and external tie, respectively, Size, density, and centrality were measured as the characteristics of personal task networks. Size means the level of relationship between members. It is the total number of other colleagues who work with a specific member for a certain project. It means, the larger the size of task network, the more the number of coworkers who interact each other through the job. Density is the ratio of the number of relationships arranged actually to the total number of available ones. In an ego-centered network, it is defined as the ratio of the number of relationship made really to the total number of possible ones between members who are actually involved each other. The higher the level of density, the larger the number of projects on which the members collaborate. Centrality means that his/her position is on the exact center of whole network. There are several methods to measure it. In this research, betweenness centrality was adopted among them. It is measured by the position on which one member stands between others in a network. The determinant to raise its level is the shortest geodesic that represents the shortest distance between members. Centrality also indicates the level of role as a broker among others. To verify the hypotheses, we interviewed and surveyed a group of employees of a nationwide financial organization in which a groupware system is used. They were questioned about two CMC applications: MSN with a higher level of synchronicity and email with a lower one. As a result, the larger the size of his/her own task network, the smaller its density and the higher the level of his/her centrality, the higher the level of the effect using the task network with CMC tools. Above all, this positive effect is verified to be much more produced while using CMC applications with higher-level synchronicity. Among the a variety of situations under which the use of CMC gives more benefits, this research is considered as one of rare cases regarding the characteristics of task network as moderators by focusing ITs for the operation of his/her own task network. It is another contribution of this research to prove empirically that the values of information system depend on the social, or comparative, characteristic of time. Though the same amount of time is shared, the social characteristics of users change its value. In addition, it is significant to examine empirically that the ITs with higher-level synchronicity have the positive effect on productivity. Many businesses are worried about the negative effect of synchronous ITs, for their employees are likely to use them for personal social activities. However. this research can help to dismiss the concern against CMC tools.

Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 생체 정보 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.147-153
    • /
    • 2014
  • The numerous improved schemes of remote user authentication based on password have been proposed in order to overcome the security weakness in user authentication process. Recently, some of biometric-based user authentication schemes to use personal biometric information have been introduced and they have shown the relatively higher security and the enhanced convenience as compared to traditional password-based schemes. These days wireless sensor network is a fundamental technology in face of the ubiquitous era. The wireless sensor networks to collect and process the data from sensor nodes in increasing high-tech applications require important security issues to prevent the data access from the unauthorized person. Accordingly, the research to apply to the user authentication to the wireless sensor networks has been under the progress. In 2010, Yuan et al. proposed a biometric-based user authentication scheme to be applicable for wireless sensor networks. Yuan et al. claimed that their scheme is effectively secure against the various security flaws including the stolen verifier attack. In this paper, author will prove that Yuan et al.'s scheme is still vulnerable to the password guessing attack, user impersonation attack and the replay attack, by analyzing their security weakness.

Social Network Characteristics and Body Mass Index in an Elderly Korean Population

  • Lee, Won Joon;Youm, Yoosik;Rhee, Yumie;Park, Yeong-Ran;Chu, Sang Hui;Kim, Hyeon Chang
    • Journal of Preventive Medicine and Public Health
    • /
    • v.46 no.6
    • /
    • pp.336-345
    • /
    • 2013
  • Objectives: Research has shown that obesity appears to spread through social ties. However, the association between other characteristics of social networks and obesity is unclear. This study aimed to identify the association between social network characteristics and body mass index (BMI, $kg/m^2$) in an elderly Korean population. Methods: This cross-sectional study analyzed data from 657 Koreans (273 men, 384 women) aged 60 years or older who participated in the Korean Social Life, Health, and Aging Project. Network size is a count of the number of friends. Density of communication network is the number of connections in the social network reported as a fraction of the total links possible in the personal (ego-centric) network. Average frequency of communication (or meeting) measures how often network members communicate (or meet) each other. The association of each social network measure with BMI was investigated by multiple linear regression analysis. Results: After adjusting for potential confounders, the men with lower density (<0.71) and higher network size (4-6) had the higher BMI (${\beta}$=1.089, p=0.037) compared to the men with higher density (>0.83) and lower size (1-2), but not in the women (p=0.393). The lowest tertile of communication frequency was associated with higher BMI in the women (${\beta}$=0.885, p=0.049), but not in the men (p=0.140). Conclusions: Our study suggests that social network structure (network size and density) and activation (communication frequency and meeting frequency) are associated with obesity among the elderly. There may also be gender differences in this association.

A Decentralized Frame Synchronization System for Ad-hoc Inter-Vehicle Communication Networks (Ad-hoc 차량통신 네트워크를 위한 자율분산 동기화 시스템)

  • Kim, Young-An;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.2
    • /
    • pp.166-172
    • /
    • 2008
  • This paper proposes an autonomous decentralized frame synchronization system for Ad-hoc Inter-Vehicle Communication Network (IVCN). We have to consider the feature of Ad-hoc IVCN: "time variant" about the number and the location of vehicles and receive power in IVCN, frame timing, and fading. Proposed scheme is different from other decentralized synchronization systems that have association with a fixed base station, and from centralized Personal Communication Systems. This system includes an autonomous decentralized frame synchronization scheme for Ad-hoc IVCN, a high-speed algorithm, a protocol for a newly joining subscriber in IVCN, and a utilization of spread spectrum ranging for frame timing error of the system under highway conditions. Performance evaluation of proposed scheme is validated through simulation. It is shown that Ad-hoc IVCN can be carried out among one and surrounding vehicles in such environment.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

A Study about weight grant of Authentication level in USN environment

  • Choi, Bae-Young;Ahn, Byung-Ryul;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.165-168
    • /
    • 2005
  • The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.

  • PDF

A Study on the Utilization of Co-Housing Community Facilities in the User-Oriented Design Perspective - Focusing on the Case of So-Haeng-Ju No.1, No.2, and No.3 - (사용자중심 디자인 관점에서의 국내 코하우징 공동생활시설 활용에 대한 연구 - 소행주(소통이 있어 행복한 주택) 1, 2, 3호 사례를 중심으로 -)

  • Lee, Jin Woo;Lee, Joo Young;Ma, Wen Hao;Hwang, Yeon Sook
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.4
    • /
    • pp.80-90
    • /
    • 2015
  • This study aims to improve plans by analyzing spatial compositions of cohousing common houses, their role depending on the types of users and spaces, and satisfaction from the user-oriented design perspective. For this study, a basic concept was examined based on previous studies and literature reviews. So-Haeng-Ju(Happy House with Communication) Houses 1, 2, and 3 in Seongmisan Village was analyzed. As well, interviews with residents of these houses were conducted to analyze the role of user behavior in common house depending on the types of users and spaces. As a result, it was found that there were common characteristics of roles in an exchange with neighbors, cooperative child-care, and residents' meetings. The time and behavioral types were different depending on the living patterns, characteristics, and family members of residents. User satisfaction with the locations of community facilities including communal kitchen and communal living room, the composition of rooms, communication with residents, and the connection between communal living space and personal living space, was above the average. However, user satisfaction with storage facilities, or defect repair and facility maintenance was low. Most of cohousing common house users were satisfied with the use and size of spaces, and a sense of community, including communication with neighbors beyond the environment and Seongmisan Village. In conclusion, a realistic alternative is required for future cohousing by developing a system regarding human resources networks and cost bearing issues.