• Title/Summary/Keyword: Resource Access Control

Search Result 226, Processing Time 0.022 seconds

Cognitive Radio MAC Protocol for Hidden Incumbent System Detection (무선 인지 기술 기반의 WRAN 시스템에서 숨겨진 인컴번트 시스템 검출 MAC 프로토콜)

  • Kim, Hyun-Ju;Jo, Kyoung-Jin;Hyon, Tae-In;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1058-1067
    • /
    • 2006
  • In this paper, we propose a inband/outband broadcast method for hidden incumbent system detection of medium access control layer for wireless regional area network systems using cognitive radio technology. Through some extra channels that are not currently used, a short message is broadcasted. The message allows CPE detecting an appearance of incumbent system to send sensing report to CR BS. For the hidden incumbent system report message, the BS needs a process or method for allocation of upstream resource to CPEs. And transmitting multiple out-band signals has a possibility to collide with out-band signals of other co-located WRAN BSs. To avoid out-band signal collision, BSs randomly select it out-band signal broadcasting time within the pre-defined explicit out-band signaling, period. And fractional Bandwidth Usage allows WRAN BSs to efficiently use bandwidth.

A Study on the Utilization Plan of Lexical Resources for Disaster and Safety Information Management Based on Current Status Analysis (재난안전정보 관리를 위한 어휘자원 현황분석 및 활용방안)

  • Jeong, Him-Chan;Kim, Tae-Young;Kim, Yong;Oh, Hyo-Jung
    • Journal of the Korean Society for information Management
    • /
    • v.34 no.2
    • /
    • pp.137-158
    • /
    • 2017
  • Disaster has a direct influence on the lives of the people, the body, and the property. For effective and rapid disaster responses, coordination process based on sharing and utilizing disaster information is the essential requirement Disaster and safety control agencies produce and manage heterogeneous information. They also develop and use word dictionaries individually. This is a major obstacle to retrieve and access disaster and safety information in terms of practitioners. To solve this problem, standardization of lexical resources related disaster and safety is essentially required. In this paper, we conducted current status analysis about lexical resources in disaster and safety domain. Consequently, we identified the characteristics according to lexical groups. And then we proposed the utilization plan of lexical resources for disaster and safety information management.

A Design of MAC Protocol for Dynamic WDM Channel and Bandwidth Allocation in TDM-PON (TDM-PON에서 동적 WDM 채널 및 대역폭 할당을 위한 MAC 프로토콜 설계 연구)

  • Lee Sung-Kuen;Kim Eal-Lae;Lee Yong-Won;Lee Sang-Rok;Jung Dae-Kwang;Hwang Seong-Taek;Oh Yun-Je;Park Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.9B
    • /
    • pp.777-784
    • /
    • 2006
  • In this paper, we propose the PON-based access network based on conventional TDM-PON architecture, which utilizes WDM wavelength channel and bandwidth dynamically. It is also described a dynamic MAC protocol in order to increase the number of subscribers and efficiency of resource utilization. Of particular importance in the proposed approach for MAC protocol is that the wavelength channel and time slot for up/downlink is dynamically allocated according to the required QoS level and the amount of data in data transmission, through the dedicated control channel between OLT and ONU. We evaluate the performance of average packet end-to-end delay in a statistical analysis and numerical analysis. In addition, through simulations with various traffic models, we verified the superior performance of the proposed approach by comparing with the results of other E-PONs.

Modified MQTT-SN Protocol for End-to-End Security in a Constrained Embedded Environment (자원제약적 임베디드 환경에서 종단간 보안을 지원하는 수정된 MQTT-SN)

  • Nam, Hye-min;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.859-870
    • /
    • 2020
  • The MQTT-SN (Message Queuing Telemetry Transport-Sensor Network) protocol is a message transmission protocol used in a sensor-based Internet of Things (IoT) environment. This MQTT-SN protocol is a publish-subscribe model with a broker in the middle of message transmission, and each IoT device sends and receives messages through an intermediary when delivering messages. However, the MQTT-SN protocol does not provide security-related functions such as message security, mutual authentication, access control, and broker security. Accordingly, various security problems have recently occurred, and a situation in which security is required has emerged. In this paper, we review the security requirements of MQTT-SN once again, and propose a modified protocol that improves security while satisfying the constraints in the environment where the resource of IoT to which this protocol is applied is limited. Unlike the existing protocol, the security field and authentication server have been added to satisfy the security requirements. In addition, the proposed protocol is actually implemented and tested, and the proposed protocol is evaluated for practical use in terms of energy consumption.

LP-MAC Technique in association with Low Power operation in unmanned remote wireless network (무인원격 무선 네트워크 환경에서의 저전력 운용을 고려한 LP-MAC 기법)

  • Youn, Jong-Taek;Ryu, Jeong-Kyu;Kim, Yongi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.8
    • /
    • pp.1877-1884
    • /
    • 2014
  • Because of the limited power resource, we need a reliable low-power media access control technique suitable for unmaned remote sensor operation condition for the unmanned sensor processor to perform the task in the remote wireless network situation. Therefore CSMA/CA and X-MAC is generally considered to effectively transmit the signal in the low-power wireless network. In this paper, we propose the more efficient low-power LP-MAC Technique which consumes the minimum power and transmits the data faster in condition that the mobile nodes' joining to and leaving from the network which consists of the fixed nodes is fluid. The fixed nodes operate in an asynchronous mode to perform the network self-configuration and transmit data faster to the mobile node which is frequently join and leave the network. When the mobile node leaves the network, the network's operation mode will be synchronous mode to achieve the minimum power consumption, thus the minimum power operation becomes possible.

Design and Parameter Optimization of Virtual Storage Protocol (iATA) for Mobile Devices (모바일 기기를 위한 가상 스토리지 프로토콜(iATA)의 설계 및 파라메터 최적화)

  • Yeoh, Chee-Min;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.267-276
    • /
    • 2009
  • Nowadays, numerous of valuable internet services are available not only for personal computer but also for mobile appliances in wireless network environment. Therefore, as the amount of contents is increased for those services, the storage limitation on mobile devices has became a significant issue. In this paper, we present a new block-level storage network protocol, iATA (Internet Advanced Technology Attachment) as a solution to the above problem. iATA is designed to transport ATA block-level data and command over the ubiquitous TCP/IP network. With iATA, a mobile appliance is able to access and control the ATA storage devices natively through network from anywhere and at anytime as if the storage devices is attached locally. We describe the concepts, design and diverse consideration of iATA protocol. Based on the benchmark experiments and application exploitation, we strongly believe that iATA as a light-weight protocol is efficient and cost-effective to be used as a storage network protocol on a resource limited device that utilizes common-off-the-shelf storage hardware and existing IP infrastructure.

Forecasting of the COVID-19 pandemic situation of Korea

  • Goo, Taewan;Apio, Catherine;Heo, Gyujin;Lee, Doeun;Lee, Jong Hyeok;Lim, Jisun;Han, Kyulhee;Park, Taesung
    • Genomics & Informatics
    • /
    • v.19 no.1
    • /
    • pp.11.1-11.8
    • /
    • 2021
  • For the novel coronavirus disease 2019 (COVID-19), predictive modeling, in the literature, uses broadly susceptible exposed infected recoverd (SEIR)/SIR, agent-based, curve-fitting models. Governments and legislative bodies rely on insights from prediction models to suggest new policies and to assess the effectiveness of enforced policies. Therefore, access to accurate outbreak prediction models is essential to obtain insights into the likely spread and consequences of infectious diseases. The objective of this study is to predict the future COVID-19 situation of Korea. Here, we employed 5 models for this analysis; SEIR, local linear regression (LLR), negative binomial (NB) regression, segment Poisson, deep-learning based long short-term memory models (LSTM) and tree based gradient boosting machine (GBM). After prediction, model performance comparison was evelauated using relative mean squared errors (RMSE) for two sets of train (January 20, 2020-December 31, 2020 and January 20, 2020-January 31, 2021) and testing data (January 1, 2021-February 28, 2021 and February 1, 2021-February 28, 2021) . Except for segmented Poisson model, the other models predicted a decline in the daily confirmed cases in the country for the coming future. RMSE values' comparison showed that LLR, GBM, SEIR, NB, and LSTM respectively, performed well in the forecasting of the pandemic situation of the country. A good understanding of the epidemic dynamics would greatly enhance the control and prevention of COVID-19 and other infectious diseases. Therefore, with increasing daily confirmed cases since this year, these results could help in the pandemic response by informing decisions about planning, resource allocation, and decision concerning social distancing policies.

A Study on the Improvement of Security Enhancement for ZTNA (보안성 강화를 위한 ZTNA운영 개선방안 연구)

  • Seung Jae Yoo
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.21-26
    • /
    • 2024
  • The security model in the previous network environment has a vulnerability in which resource access control for trusted users is not properly achieved using the Perimeter model based on trust. The Zero Trust is an absolute principle to assume that the users and devices accessing internal data have nothing to trust. Applying the Zero Trust principle is very successful in reducing the attack surface of an organization, and by using the Zero Trust, it is possible to minimize damage when an attack occurs by limiting the intrusion to one small area through segmentation. ZTNA is a major technology that enables organizations to implement Zero Trust security, and similar to Software Defined Boundary (SDP), ZTNA hides most of its infrastructure and services, establishing one-to-one encrypted connections between devices and the resources they need. In this study, we review the functions and requirements that become the principles of the ZTNA architecture, and also study the security requirements and additional considerations according to the construction and operation of the ZTNA solution.

Research libraries as a scholarly communication system (학술정보 커뮤니케이션 시스팀으로서의 연구도서관)

  • 이영자
    • Journal of Korean Library and Information Science Society
    • /
    • v.9
    • /
    • pp.179-211
    • /
    • 1982
  • Many problems which today's research libraries are confronted with should be taken the measures to find some solutions in any ways. The purpose of this study is to identify the main stream of chaining of research libraries as an existing collector and distributor of scholarly information into a communication system adopting the concept of resource sharing and on-line bibliographic search as some possible ways for solutions. The conclusions of this study can be summarized as follows: 1) The research libraries will be imposed on more and more responsibilities to be a reservoir of the intellectual heritage of an individual, a nation and mankind. 2) The research libraries in the near future will have to develop their collections in the new environment of austerity with the limited budget. 3) It is more desirable for the future research libraries to have the attitude that they are in the business of information and communication rather than being an entity as "a library". 4) The resource sharing developed to solve the severe problems confrontal by research libraries will improve the organizational and technical mechanism for the access to the scholarly information. 5) The research libraries will produce more and more bibliographic database to expand the library materials which can be available and shared. 6) Though on-line search service will be sure to provide a considerable profit to the scholarly information users, it will take a long time for this service to be popularize because of the high ratio of service fee. 7) Two problems should be solved for the efficient service by on-line search. One is the continuous, updating training for the professional librarians. The other is that the common efforts for the quality control and standardization of data base by the data base producers should be made. 8) Taking all the items of the conclusions derived from the study of research libraries mainly in the United States into a consideration, the followings should be paid an attention. - The status-quo of the research libraries in Korea should be analyzed in very detailed and accurate way. - The problems of research libraries in Korea as the major scholarly communication system should be clarified based on the analysis. - The measures for the problems should be taken in the light of the unique characteristics of korean environment. - For the developing the most efficient measures, the formal organize action to lead and govern the long-aimed study on the problems of research libraries should be established and the government-level su n.0, pport for the legislation and finance should be provided for the realization of the result of the study.

  • PDF

NQO1-Knockout Mice Are Highly Sensitive to Clostridium Difficile Toxin A-Induced Enteritis

  • Nam, Seung Taek;Hwang, Jung Hwan;Kim, Dae Hong;Lu, Li Fang;Hong, Ji;Zhang, Peng;Yoon, I Na;Hwang, Jae Sam;Chung, Hyo Kyun;Shong, Minho;Lee, Chul-Ho;Kim, Ho
    • Journal of Microbiology and Biotechnology
    • /
    • v.26 no.8
    • /
    • pp.1446-1451
    • /
    • 2016
  • Clostridium difficile toxin A causes acute gut inflammation in animals and humans. It is known to downregulate the tight junctions between colonic epithelial cells, allowing luminal contents to access body tissues and trigger acute immune responses. However, it is not yet known whether this loss of the barrier function is a critical factor in the progression of toxin A-induced pseudomembranous colitis. We previously showed that NADH:quinone oxidoreductase 1 (NQO1) KO (knockout) mice spontaneously display weak gut inflammation and a marked loss of colonic epithelial tight junctions. Moreover, NQO1 KO mice exhibited highly increased inflammatory responses compared with NQO1 WT (wild-type) control mice when subjected to DSS-induced experimental colitis. Here, we tested whether toxin A could also trigger more severe inflammatory responses in NQO1 KO mice compared with NQO1 WT mice. Indeed, our results show that C. difficile toxin A-mediated enteritis is significantly enhanced in NQO1 KO mice compared with NQO1 WT mice. The levels of fluid secretion, villus disruption, and epithelial cell apoptosis were also higher in toxin A-treated NQO1 KO mice compared with WT mice. The previous and present results collectively show that NQO1 is involved in the formation of tight junctions in the small intestine, and that defects in NQO1 enhance C. difficile toxin A-induced acute inflammatory responses, presumably via the loss of epithelial cell tight junctions.