• Title/Summary/Keyword: X-Internet

Search Result 428, Processing Time 0.03 seconds

Hash Tree based Communication Protocol in V2X Environments Including Internet of Vehicles for Providing Secure Vehicular Communication Services (차량인터넷을 포함한 V2X 환경에서 안전한 차량 통신 서비스 제공을 위한 해시 트리 기반 통신 프로토콜)

  • Jin, Byungwook;Cha, Siho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.27-34
    • /
    • 2018
  • Various messages generated in vehicles are transmitted based on the wireless telecommunication which is a core technology of vehicle to everything (V2X). However, the hackers attack them upon penetration to the system and network to cause the generation of users' inconveniences for vehicular communication. Moreover, huge damage could be occurred in terms of physical and materialistic areas if the users in the vehicles were attacked in the communication environment. Therefore, this study was to design the safe communication protocol using hash tree technique in the V2X environments. Using hash tree technique, processes of issuing certificate and registration and communication protocol were designed, and safety analysis was performed on the attacking technique which is occurred in the existing vehicles. Approximately 62% of decrease in the capacity analysis was found upon comparative analysis of telecommunication processes with the system to issue the certificate which is used in the existing vehicles.

Integer Factorization Algorithm of Pollard's Rho Based on Multiple Initial Values (다중 초기치 Pollards's Rho 소인수분해 알고리즘)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.19-25
    • /
    • 2017
  • This paper deals with integer factorization of two prime p,q of SHA-256 secure hash value n for Bit coin mining. This paper proposes an algorithm that greatly reduces the execution time of Pollard's rho integer factorization algorithm. Rho(${\rho}$) algorithm computes $x_i=x^2_{i-1}+1(mod\;n)$ and $y_i=[(y^2_{i-1}+1)^2+1](mod\;n)$ for intial values $(x_0,y_0)=(2,2)$ to find the factor 1 < $gcd({\mid}x_i-y_i{\mid},n)$ < n. It however fails to factorize some particular composite numbers. The algorithm proposed in this paper applies multiple initial values $(x_0,y_0)=(2^k,2^k)$ and ($2^k,2$), $2{\leq}k{\leq}10$ to the existing Pollard's Rho algorithm. As a results, the proposed algorithm achieves both the factorization of all the composite numbers and the reduction of the execution time of Pollard's Rho by 67.94%.

Implementation and Comparison of H.26x Video Compression algorithm and Motion Estimation Algorithm (H.26x 영상압축 알고리즘과 Motion Estimation 알고리즘의 구현 및 비교)

  • 이현우;성동수;이건배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10b
    • /
    • pp.403-405
    • /
    • 2001
  • 한정된 대역폭의 통신망에서 다른 매체에 비해 자료량이 많은 화상의 압축은 중요한 문제로 떠올랐다. 대표적인 영상 압축방법으로 MPEG 시리즈와 H.26x 시리즈가 있다. 그중 H.263은 화상회의 표준안인 H.323와 최근 진행중인 차세대 이동통신이라 일컬어지는 IMT-2000에서 영상압축방법중의 하나로 채택되었다. 또한 현대에 이르러 Desktop상에서의 영상회의구축은 더 이상 불가능한 일이 아니며, 또 하나의 영상회의 활용분야로 급속히 떠오르고 있다. 이는 internet의 보급과 함께 internet방송, 다대다 화상회의, 원격 의료 진료 등, 수없이 많은 분야에 활용될 수 있는 계기가 마련되었다. 이에 본 논문에서는 H.261과 H.263, 그리고 H.263 version 2의 Desktop상에서의 실제적인 구현 및 비교를 기술한다.

  • PDF

Cyberloafing Across Generation X and Y in Indonesia

  • Hartijasti, Yanki;Fathonah, Nur
    • Journal of Information Technology Applications and Management
    • /
    • v.21 no.1
    • /
    • pp.1-16
    • /
    • 2014
  • Cyberloafing is as counterproductive behavior because it is the act of using internet for personal purposes which can affect employees' productivity, especially when done excessively (more than 4 hours a week). The objective of this study was to analyze whether gender and education level had significant effect on cyberloafing among generations in the workplace. From 267 respondents, gender was not found to have impact on cyberloafing because female and male respondents had the same frequency of low level cyberloafing. However, female had higher excessive cyberloafing than male. Gen Y had significant impact on the relationship between education and cyberloafing but Gen Y with diploma degree was revealed to have excessive cyberloafing. Furthermore, Gen X had started combining professional and personal lives throughout their daily lives. Hence, organizations should foster a culture of hard work by giving challenging job with clear target and worthy incentive but still implementing internet usage policy.

Design and Implementation of Tele-operation system based on the Haptic Interface

  • Lee, Jong-Bae;Lim, Joon-Hong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.3 no.2
    • /
    • pp.161-165
    • /
    • 2003
  • In this paper, we investigate the issues on the design and implementation of tele-operation system based on the haptic interface. Here, the 3-DOF haptic device and the X-Y-Z stage are employed as master controller and slave system respectively. For this master-slave system, the force feedback algorithm, the modeling of virtual environments and the control method of X-Y-Z stage are presented. In this paper, internet network is used for data communication between master and slave. We construct virtual environment of the real convex surface from the force-feedback in controlling the X-Y-Z stage and measuring the force applied by the 3-DOF haptic device.

Performance Analysis of Automatic Thickness Image using Convolution Function (컨벌루션 함수를 이용한 자동두께측정 영상의 성능분석)

  • Kang, Min-Goo;Zo, Moon-shin
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.21-26
    • /
    • 2010
  • In this paper, film uniformity is improved by the bolt-mapping of convolutional image processing between bolts and a film using soft X-ray based in-line LCD TV film thickness controls. The automatic film thickness analysis of 3 inter-bolt's convolution function is proposed for the reduction of offset error from the X-ray changing of line scan in film profiles.

A study on railway performance test management program building based on X-internet (X- 인터넷 기반의 철도성능시험관리 프로그램 구축에 관한 연구)

  • Ohn, Jung-Ghun;Kim, Myung-Ryoung;Yang, Doh-Chul
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.2096-2100
    • /
    • 2008
  • This research project management, building systems to test the performance requirements of a user to accept the plan and schedule management, personnel management, and test results, and the status of testing and reporting procedures to handle the process of implementation of Java-based X - Under the Internet environment, the default network, remote process research and development program as a test automation, structure and each module of the software analysis, design, analysis and clean-up and structure of the modules, each module and the GUI structure, performance, testing integration DB The present system is to study the system.

  • PDF

Internet Addiction a In Correlation to Friendship and Internet Use of Adolescents (청소년의 친구관계와 인터넷 사용에 따른 인터넷 중독)

  • Lee, Sook;Nam, Yun-Ju
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.3
    • /
    • pp.1-16
    • /
    • 2004
  • This study analyzes the relation of friendship and internet use on adolescents' internet addiction. The subjects were 117 middle and 106 high school adolescents living in Kwang-ju city. Cronbach'a, t-test, x²-test, ANOVA, Duncan's test were employed in analyzing the data by using SPSS 10.0. The results of this study can be summarized as follows: - First of all, most adolescents had a best friend and maintained an affirmative friendship showing high social function and satisfaction. And it was also found that internet use has been settled as a part of daily life among adolescents and over majority of the subjects reported themselves as internet addicts. - Secondly, boys had more friends than girls, but the frequency of interaction with their friends was lower than for girls. Girls showed higher scores in function and satisfaction with friends than boys. And girls used the internet longer than boys. - Thirdly, variables of internet friends and internet use showed significant differences on internet addiction. Groups using the internet frequently, more than usual, and groups using the internet to relax and enjoy showed significantly higher scores in internet addiction.

LOCAL SPECTRAL PROPERTIES OF SEMI-SHIFTS

  • Yoo, Jong-Kwang;Kim, Yong-Il
    • Journal of applied mathematics & informatics
    • /
    • v.28 no.1_2
    • /
    • pp.499-507
    • /
    • 2010
  • In this note, we study the local spectral properties of semi-shifts. If $T\;{\in}\;L(X)$ is a semi-shift on a complex Banach space X, then T is admissible. We also prove that if $T\;{\in}\;L(X)$ is subadmissible, then $X_T(F)\;=\;E_T(F)$ for all closed $F\;{\subseteq}\;\mathbb{C}$. In particular, every subscalar operator on a Banach space is admissible.

The Effects of an Internet Addiction Prevention Program on Middle School Students (인터넷 중독 예방 프로그램이 중학생의 스트레스와 인터넷 중독에 미치는 효과)

  • Joo, Ae-Ran
    • Research in Community and Public Health Nursing
    • /
    • v.20 no.2
    • /
    • pp.207-214
    • /
    • 2009
  • Purpose: The purpose of this study was to determine the effect of an Internet addiction prevention program on middle school students' stress and Internet addiction, Methods: This research adopted the non-equivalent control group pretest-posttest design, and was conducted with 40 middle school students who were selected through convenient sampling and assigned to an experimental group or a control group, Data were collected from September 5, 2007 to September 27, 2007, and analyzed using the SPSS/WIN program by frequency, $x^2$-test, Fisher's exact test, and t-test. Results: The results of the experiment supported the hypothesis that the experimental group would have lower stress scores and Internet addiction scores than the control group, Conclusion: After 8 sessions of the Internet addiction prevention program, it was found the program was effective to reduce stress and Internet addiction.

  • PDF