• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.036 seconds

Implementation of systematic LT codes using VHDL (VHDL을 이용한 시스터메틱 LT 부호의 구현)

  • Zhang, Meixiang;Kim, Sooyoung;Chang, Jin Yeong;Kim, Won-Yong
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.45-51
    • /
    • 2014
  • Luby transform (LT) codes are a class of ratelss codes, and they have capability of generating infinite length of parities with a given information length. These rateless codes can be effectively utilized to provide broadcasting and multicasting services where each user is in a different channel condition. For this reason, there have been a number of researches on the application of rateless codes for satellite systems. In this paper, by considering the current research status on rateless codes, we present VHLD implementation results of LT codes, for future hardware implementation for satellite systems. The results demonstrated in this paper can be utilized as a basic information on efficient utilization of rateless codes in the future satellite systems.

Middleware for Context-Aware Ubiquitous Computing

  • Hung Q.;Sungyoung
    • Korea Information Processing Society Review
    • /
    • v.11 no.6
    • /
    • pp.56-75
    • /
    • 2004
  • In this article we address some system characteristics and challenging issues in developing Context-aware Middleware for Ubiquitous Computing. The functionalities of a Context-aware Middleware includes gathering context data from hardware/software sensors, reasoning and inferring high-level context data, and disseminating/delivering appropriate context data to interested applications/services. The Middleware should facilitate the query, aggregation, and discovery for the contexts, as well as facilities to specify their privacy policy. Following a formal context model using ontology would enable syntactic and semantic interoperability, and knowledge sharing between different domains. Moddleware should also provide different kinds of context classification mechanical as pluggable modules, including rules written in different types of logic (first order logic, description logic, temporal/spatial logic, fuzzy logic, etc.) as well as machine-learning mechanical (supervised and unsupervised classifiers). Different mechanisms have different power, expressiveness and decidability properties, and system developers can choose the appropriate mechanism that best meets the reasoning requirements of each context. And finally, to promote the context-trigger actions in application level, it is important to provide a uniform and platform-independent interface for applications to express their need for different context data without knowing how that data is acquired. The action could involve adapting to the new environment, notifying the user, communicating with another device to exchange information, or performing any other task.

  • PDF

An Internet-based Self-Learning Educational System for Efficient Learning Process of Java Language

  • Kim, Dong-Sik;Lee, Dong-Yeop;Park, Sang-Yoon
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.709-713
    • /
    • 2004
  • This Paper Presents an Internet-based Java self-learning educational system which consists of a management system named Java Web Player (JWP) and creative multimedia contents fer Java language. The JWP Is a Java application program free from security problems by the Java Web Start technologies that supports an Integrated learning environment including three Important learning Procedures: Java concept learning Process, Programming practice process and assessment process. This JWP enables the learners to achieve efficient and Interesting self-learning since the learning process is designed to enhance the multimedia capabilities on the basis of various educational technologies. On-line voice presentation and its related texts together with moving images are synchronized for efficiently conveying creative contents to learners. Furthermore, a simple and useful compiler is included in the JWP fur providing user-friendly language practice environment enabling such as coding, editing, executing and debugging Java source files on the Web. The assessment process with various items helps the learners not only to increase their academic capability but also to appreciate their current degree of understanding. Finally, simple multiple choices are given suddenly to the learners while they are studying through the JWP and the test results are displayed on the message box. The proposed system can be used for an efficient tool for learning system on the Web.

  • PDF

Scanned Drawing-based Production Management System for Deckhouse Floor Outfitting (스캔도면 기반 선실바닥의장 생산관리 시스템 개발)

  • Kang, In-Chang;Song, Chang-Yong
    • Journal of Ocean Engineering and Technology
    • /
    • v.31 no.2
    • /
    • pp.141-154
    • /
    • 2017
  • A production management system is developed to enhance both the information and productivity of ship and offshore plant deckhouse floor outfitting. The functions of the production management system for the deckhouse floor outfitting were reviewed based on a literature survey of several production management systems with respect to the ship building and architecture fields. This study investigated numerous daily production reports and their application to actual work places to utilize the system development. The developed scanned drawing-based production management (SDPM) system minimizes any loss and/or distortion of work information between the workshop and management office when applying a scanned production drawing to the daily report. The SDPM system increases the data objectivity, as well as intuitiveness of the information generation by adopting an efficient user interface, which makes it possible to perform image annotations on the scanned drawing for the daily production report while simultaneously interacting with the production management database. Applying the system operation to actual deckhouse floor covering work verified that it was feasible to use the SDPM system for production management in the ship outfitting work process.

The study of the law system for constructing a Home-Network at the environment of apartment houses (공동주택 환경에서의 홈네트워크 구축을 위한 법제도 연구)

  • Lim, Sang-Chul;Kim, Sun-Hyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.801-808
    • /
    • 2008
  • As Home Network facilities are more enlarging on the basis of a Certification system and U-City by a different operators and regional groups. In this paper, describer to the status of it's installation and promotion and arrange it's general idea and law system concept. Also, draw operation system's problems and present counterproposal through analyzing an application basis of the law systems and information-communication technical standards such as construction law, housing law, and regulation to the housing construction standard. etc. We suggest an change necessity of the law system that home network can get ready for safely, facilities, comfortability of the user's convenience.

User-friendly Application for operability with HL7 in mobile agent of Ubiquitous Health Environment

  • Lee, JeongHoon;Kwock, DongYeup;Moon, KangNam;sahama, Tony;Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.866-870
    • /
    • 2009
  • Mobile Health (M-Health) system is a recent term for medical and public health practice supported by mobile devices, such as mobile phones, PDAs, and other wireless devices. Mobile Health system has been successfully establishing at few general hospital in Korea. However, to use diverse devices manufactured by various company cause inoperability, and lack of security disappoints customers often. Although the outstanding health environment, most of hospitals are unavailable to share electronic patient records due to lack of standard protocol to handle the interoperability each other. Health Level 7 (HL7) is the best solution for the problem. In this paper, we will analyse a current M-Health service in terms of security and mobile device, and suggest iPhone for the best device against hospital environment. Also, for keep confidentiality of health information and patient privacy, enhanced security mechanism is introduced. As a consequence, interoperable standard, and most appropriate device for supporting staffs and M-Health performance, and enhanced securirty mechanism will be integrated in order to propose improved M-health model.

  • PDF

Analysis of Web Browser Security Configuration Options

  • Jillepalli, Ananth A.;de Leon, Daniel Conte;Steiner, Stuart;Alves-Foss, Jim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6139-6160
    • /
    • 2018
  • For ease of use and access, web browsers are now being used to access and modify sensitive data and systems including critical control systems. Due to their computational capabilities and network connectivity, browsers are vulnerable to several types of attacks, even when fully updated. Browsers are also the main target of phishing attacks. Many browser attacks, including phishing, could be prevented or mitigated by using site-, user-, and device-specific security configurations. However, we discovered that all major browsers expose disparate security configuration procedures, option names, values, and semantics. This results in an extremely hard to secure web browsing ecosystem. We analyzed more than a 1000 browser security configuration options in three major browsers and found that only 13 configuration options had syntactic and semantic similarity, while 4 configuration options had semantic similarity, but not syntactic similarity. We: a) describe the results of our in-depth analysis of browser security configuration options; b) demonstrate the complexity of policy-based configuration of web browsers; c) describe a knowledge-based solution that would enable organizations to implement highly-granular and policy-level secure configurations for their information and operational technology browsing infrastructures at the enterprise scale; and d) argue for necessity of developing a common language and semantics for web browser configurations.

An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

  • Niu, Shufen;Fang, Lizhi;Song, Mi;Yu, Fei;Han, Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3365-3383
    • /
    • 2021
  • The rapid growth of data has successfully promoted the development of modern information and communication technologies, which are used to process data generated by public urban departments and citizens in modern cities. In specific application areas where the ciphertext of messages generated by different users' needs to be transmitted, the concept of broadcast encryption is important. It can not only improve the transmission efficiency but also reduce the cost. However, the existing schemes cannot entirely ensure the privacy of receivers and dynamically adjust the user authorization. To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid solutions. Moreover, we constructed a security model to ensure wireless data transmission under cloud computing and internet of things integrated devices. The achieved results reveal that the proposed scheme is semantically secure in the random oracle model. The performance of the proposed scheme is evaluated through theoretical analysis and numerical experiments.

Conditionally Traceable Pseudonym Protocol based on Oblivious Transfer (OT(Oblivious Transfer) 기반의 조건부 추적이 가능한 가명 프로토콜)

  • Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.33-42
    • /
    • 2009
  • Recently, there have been many researches about anonymous credential systems for supporting the user anonymity. However, these systems only hold a high security level, even though they must be able to be applied to various application that might require access control, conditional traceability, etc. As new challenges to these systems, some researches that several entities store the link information that associates identities and pseudonyms each other have been performed. In this paper, based on the oblivious transfer, we suggest a new pseudonym protocol that solves the pseudonym exhaustion problem which the original pseudonym retrieval protocol suffers from. By using the universal re-encryption and one-way function, we can also archive other requirements like the pseudonym unlinkability from the outside.

Sasang Constitution Analysis and Wine Recommendation App suggestion through Mobile Face Recognition

  • Sung, Ki-hyuk;Ryu, Gi-hwan;Yun, Dai-yeol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.155-162
    • /
    • 2021
  • With the global COVID-19 pandemic, the tourism sector and all consumption have contracted with the untact era. Wine will also be sold and developed in various ways non-face-to-face in the future. Therefore, it is necessary to develop apps and web servers that focus on health in the era of single-person households and non-face-to-face. This study used facial recognition data based on photos of adult men and women in their 40s and 50s to analyze the Sasang constitution through a mobile app and web server, and suggested wine recommendations suitable for their constitution. First, the user's body information is entered. And through the facial recognition mobile app, recommend the right wine after analyzing the body type. if it's not like the first recommended wine, it is configured to receive another wine recommendation. In the future, the number of single-person households will increase further, and in the age of well-being, wine recommendations that fit my body will be useful. Wine recommendation suitable for Sasang constitution will be a useful mobile application to manage personal healt