• Title/Summary/Keyword: S&T information service

Search Result 816, Processing Time 0.034 seconds

Feature Selection for Traffic Classification in SDN (SDN환경에서 트래픽 분류를 위한 특징 선택 기법)

  • Lim, Hwan-Hee;Kim, Dong-Hyun;Lee, Byung-Jun;Kim, Kyung-tae;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.43-44
    • /
    • 2018
  • 본 논문에서는 SDN환경에서 트래픽 분류를 위한 특징 선택 기법을 제안한다. 최근 들어 다양한 스마트폰 어플리케이션이나 다양한 IoT 기기들이 등장하고 있다. 다양한 IoT 기기나 어플리케이션은 엄청난 양의 트래픽을 발생시킨다. 엄청난 양의 트래픽은 전송속도를 저하시킬 뿐만 아니라, 높은 Quality of Service(QoS)를 보장하기가 힘들다. 또한 이러한 문제점들을 보안하기 위해 Software Defined Networking(SDN)이라는 기술이 빠른속도로 발전하고 있으며, 본 논문에서는 다양한 어플리케이션과 IoT 기기의 트래픽을 SDN환경에서 분류 하며, 트래픽의 분류 정확도와 더 빠른 분류를 위해 트래픽의 특징 선택 기법을 제안한다. 특징 선택을 수행한 뒤, 트래픽 분류를 진행하면 트래픽 분류 정확도를 높이고, 트래픽 분류시간은 줄어드는 효과를 보이며, 높은 QoS를 보장함으로써, 기존 네트워크 트래픽의 부하가 줄어드는 우수한 성능을 보인다.

  • PDF

Embedded System for Mobile Phone-based Control and Monitoring (모바일 폰 기반의 제어 및 모니터링을 위한 임베디드 시스템)

  • Park, Hung-bog;Seo, Jung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.288-289
    • /
    • 2018
  • The use of IoT (Internet of Things) is rapidly expanding to enhance the quality of life as seen in the interconnection between mobile devices and Web. This paper proposes an embedded system that connects sensors and mobile devices via IoT technology, improving the user's ability and service experience to remotely control the home appliances with mobile-detection features. Home appliances are expected to increase labor efficiency by utilizing the embedded system connected to the sensors. Using mobile applications to control home appliances remotely and to monitor operation status advances the user's knowledge, experience, and perspectives to experience refined life qualities.

  • PDF

Efficient QoS Policy Implementation Using DSCP Redefinition: Towards Network Load Balancing (DSCP 재정의를 통한 효율적인 QoS 정책 구현: 네트워크 부하 분산을 위해)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.715-720
    • /
    • 2023
  • The military is driving innovative changes such as AI, cloud computing, and drone operation through the Fourth Industrial Revolution. It is expected that such changes will lead to a rapid increase in the demand for information exchange requirements, reaching all lower-ranking soldiers, as networking based on IoT occurs. The flow of such information must ensure efficient information distribution through various infrastructures such as ground networks, stationary satellites, and low-earth orbit small communication satellites, and the demand for information exchange that is distributed through them must be appropriately dispersed. In this study, we redefined the DSCP, which is closely related to QoS (Quality of Service) in information dissemination, into 11 categories and performed research to map each cluster group identified by cluster analysis to the defense "information exchange requirement list" on a one-to-one basis. The purpose of the research is to ensure efficient information dissemination within a multi-layer integrated network (ground network, stationary satellite network, low-earth orbit small communication satellite network) with limited bandwidth by re-establishing QoS policies that prioritize important information exchange requirements so that they are routed in priority. In this paper, we evaluated how well the information exchange requirement lists classified by cluster analysis were assigned to DSCP through M&S, and confirmed that reclassifying DSCP can lead to more efficient information distribution in a network environment with limited bandwidth.

Implementation of a Viterbi Decoder Operated in the 1000Base-T (1000Base-T에서 동작하는 Viterbi Decoder 구현)

  • Jung, Jae-woo;Chung, Hae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.41-44
    • /
    • 2013
  • As appearance of high-quality service such as UDTV application, high-speed and high-capacity communication services are required. For this, communication systems increase the data processing speed and use various error correction techniques. In this paper, we implement the Viterbi decoder applied in 1000BASE-T with 4 pairs UTP cable. The minimum operating speed of the Viterbi decoer should be more than 125 MHz because 125 MHz PAM-5 signal is transmitted on each pair of cables in 1000BASE-T. To do this, we implement the decoder by using the pipeline and parallel processing and verify the operation with 125 MHz by using a logic analyzer. Finally, we will show that the decoder recovers the original data for the added random error data.

  • PDF

Mobile Receiver Model for T-DMB Location Automatic Emergency Alert Service (T-DMB 국지적 자동재난경보방송 서비스를 위한 모바일 수신 모델)

  • Kwon, Seong-Geun;Jeon, Hee-Young;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.10A
    • /
    • pp.796-806
    • /
    • 2009
  • This paper presents the method of emergency warning system operation based on T-DMB and the design of T-DMB AEAS receiver model. The proposed receiver model compares the geographical location of emergency with the location of DMB transmitting station from T-DMB broadcasting signal and classifies the receiver location into alert region, neighboring region and non-alert region and transmits the emergency alert message according to each region. The geographical location of emergency can be obtained from FIG 5/2 EWS data field for AEAS message and the location of DMB transmitting station can be estimated from either the latitude and the longitude in main identifier and sub identifier in FIG 0/22 data filed for TII(Transmitter Identification Information) or TII distribution database. In our experiment, we implemented the proposed receiver model with display section, storage section, DMB module for receiving broadcasting signal and control section and performed test emergency alert broadcasting using T-DMB signal generator.

Symmetric and Asymmetric Double Gate MOSFET Modeling

  • Abebe, H.;Cumberbatch, E.;Morris, H.;Tyree, V.;Numata, T.; Uno, S.
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.9 no.4
    • /
    • pp.225-232
    • /
    • 2009
  • An analytical compact model for the asymmetric lightly doped Double Gate (DG) MOSFET is presented. The model is developed using the Lambert Function and a 2-dimensional (2-D) parabolic electrostatic potential approximation. Compact models of the net charge and channel current of the DG-MOSFET are derived in section 2. Results for the channel potential and current are compared with 2-D numerical data for a lightly doped DG MOSFET in section 3, showing very good agreement.

Realization of a Web based Remote Monitoring Server for SMD In Line System (SMD 조립 설비의 웹기반 원격 관리 서버 구축)

  • Lim, S. J.;Park, K. T.;Lyou, J.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2001.04a
    • /
    • pp.529-532
    • /
    • 2001
  • A Remote Monitoring Server(RMS) server which uses Internet and World Wide Web is constructed for SMD in-line system. Hardware base consists of server computer, virtual SMD in-line system and other computers. Software includes assignment of server, RDBMS and various modules in server home page. Web browser provide production quantity, bad PCB quantity, error number and error message in virtual SMD module, user information in setup module, detailed error information in fault diagnosis module, fault history in fault history module and customer information in customer service management module. These functions of the RMS helps a decrease of non-operation time and a service response as fast as possible.

  • PDF

A study on design and analysis of collaboration oriented system (협업 지향적 시스템 설계와 분석에 관한 연구)

  • Shin, Mun-Bong;Chun, Seung-Su;Son, Hong-Min
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.178-180
    • /
    • 2012
  • 협업은 둘 이상의 사람들이 하나의 업무 또는 목적을 달성하기위해 공동으로 협력하여 일하는 것이다. 최근 개인 및 조직 간 협업 범위가 공동분석, 데이터 연계, 서비스 조합 등으로 확장되고 대용량 데이터 공유 및 실시간 연계분석 활동이 증대되면서 협업 지향적인 시스템 설계와 개발이 중요시 되고 있다. 특히 스마트워크와 지능화된 협업 기반은 데이터, 프로세스, 서비스, 사람 간의 다차원 연계와 실시간 활용, 의미 기반의 기계적 협력을 전재로 하고 있다. 본 연구에서는 Data, Process, Service, People 측면의 4가지 계층으로 전사적 자원을 설계하고 메타 메타데이터 기반의 온톨로지 분석을 통해 자원 간의 연계와 조합을 지원하는 시스템을 설계했다. Data 계층은 프로세스별 Input, Output 정보를 식별하여 Data의 메타 정보를 정의하고 이를 검색 에이전트가 색인하여 모델링에 참조할수록 한다. Process 계층은 BPMN모델을 확장한 exCPM의 개선 모델을 바탕으로 프로세스를 수행주체 간, 정보공유측면에서 프로세스를 분석했다. Service 계층은 협업지향적인 프로세스를 구성하는 컴포넌트를 서비스로 인식하고 프로파일을 통해 협업을 위한 검색과 프로세스를 연계지원하도록 설계 했다. 마지막으로 People계층은 자원, 프로세스, 서비스 등 시스템에 관여하는 참여자들의 메타정보를 정의하고 이를 온톨로지 기반의 모델에 통합하여 자동 검색되도록 설계했다. 이를 통해 프로세스와 서비스 측면에서 협업을 요구하는 에이전트와 일반 검색 사용자들이 프로세스 간 협업 자원을 파악하고 상호 관계를 분석할 수 있도록 하는 한편, 프로세스를 지원하는 컴포넌트와 서비스 간의 자동적인 조합을 통해 통합적 자원 협력과 실시간 협업 지원 기반을 제시했다.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.

Design and Implementation of Lightweight Encryption Algorithm on OpenSSL (OpenSSL 상에서 LEA 설계 및 구현)

  • Park, Gi-Tae;Han, Hyo-Joon;Lee, Jae-Hwoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.822-830
    • /
    • 2014
  • Recently, A Security service in Internet environments has been more important and the use of SSL & TLS is increasing for the personel homepage as well as administrative institutions. Also, IETF suggests using DTLS, which can provide a security service to constrained devices with lower CPU power and limited memory space under IoT environments. In this paper, we implement LEA(Lightweight Encryption Algorithm) algorithm and apply it to OpenSSL. The implemented algorithm is compared with other symmetric encryption algorithms such as AES etc, and it shows the superior performance in calculation speed.