• Title/Summary/Keyword: adapted connection

Search Result 48, Processing Time 0.026 seconds

Security Scheme for Prevent malicious Nodes in WiMAX Environment (WiMAX 환경에서 악의적 노드 예방을 위한 보안 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.382-389
    • /
    • 2009
  • As the use of mobile device is popularized, the needs of variable services of WiMAX technique and the importance of security is increasing. There is a problem that can be easily attacked from a malicious attack because the action is achieved connectionlessly between neighbor link establishing procedure and TEK exchange procedure in mobile WiMAX even though typical 1 hop network security technique is adapted to WiMAX for satisfying these security requirement. In this paper, security connected mechanism which safely connects neighbor link establishing procedure of WiMAX and TEK exchange procedure additional to the basic function provided by IEEE 802.16e standard to satisfy security requirement of mobile WiMAX is proposed. The proposed mechanism strengthens the function of security about SS and BS by application random number and private value which generated by SS and BS to public key of neighbor link establishing procedure and TEK exchange procedure. Also, we can prevent from inside attack like man-in-the-middle which can occur in the request of TEK through cryptographic connection of neighbor link establishing procedure and TEK exchange procedure.

A Study on the Characteristics of System Furniture (시스템 가구의 특성에 관한 연구)

  • 신홍경
    • Korean Institute of Interior Design Journal
    • /
    • no.6
    • /
    • pp.45-52
    • /
    • 1995
  • The presentation of the method by which the furniture and the architecture can be unified in one category, and the study and the verification on the mutual relation in the shape and the function are having been consistently made till the late twenties. The change of the social structure such as increasing the unit dwelling space with the small scale comes to need the efficiency in using space and the open dwelling space by the systematic spa-cial formation. Therefore, the understanding of the mean-ing and the characteristics of system furnitures as the design method which can meet such needs will be made here in this study. The application of the systematic consideration as the method of interior design means the formation of the firm image on the spacial environment through the mix-ture and link of the heterogeneous factors, the organic connection of each surface, the establishment of the natu-ral relation by linking the heterogeneous materials mutu-ally. and the easiness of the entire plan in the end. This study aims at analyzing and studying the typical charac-teristics by understanding the historical background and methodical principle which enabled the appearance of this kind of thought, and the adapted cases of the wood and metal material system furniture. There may be difference between the structural sub-stance and formative consideration. Transformative furni-ture which consists of the factors is the concept for the encrease of the multi purpose value by mixing the unit cabinets. One system can be separated horizontally, verti-cally, and to the drawers, and it gives us the disengage-ment from the artificial environment, since all the heights and width can be transformed as per each situa-tion of the space. The factors which can not be found in the other existing furniture are as follows. 1. disengagement from the artificial environment. 2. establishing the new productiosn trend as freed from the customers' fashion trend. 3. presenting the producing condition which leads the exact technology. 4. flexibility of the furniture which enables the reduction and enlargement in each situation.

  • PDF

Adaptive Application of CPP Algorithm to Test Suite Generation for Protocol Conformance Testing (프로토콜 적합성 시험항목 생성시 CPP 알고리즘의 적응적 적용 방안)

  • Kim, Chul
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.597-604
    • /
    • 2019
  • In this paper, we propose an improved method on an adaptive application of the CPP(Chinese Postman Problem) algorithm to the protocol test suite generation for conformance testing. Also, we present an example application of this CPP algorithm to B-ISDN Q.2931 call/connection control procedure for the purpose of showing how it can be adapted to generate a test suite for conformance testing of a communication protocol. The proposed method has an advantage of an optimization technique which finds a minimum cost of test suite from a standardized specification, so this optimization technique of the CPP algorithm can be practically applied to a real environment for testing a conformity of a protocol implementation.

A Study on Temporality of 'Phenomenology of music' in Rem Koolhaas's space (렘 콜하스 공간의 음악현상학적 시간성에 대한 연구)

  • Kang, So-Yeon;Yoon, Sang-Young;Yoon, Jae-Eun
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.1
    • /
    • pp.115-123
    • /
    • 2013
  • Today, the views on Temporality of space have been changed not only to be based on the concept of time, but also to identify the space with a body adapted to the new circumstances. The study suggests that the actions of performers in space have been important by changes of views and are connected to the music phenomenology mixed with music whose tempo is the phenomenology related with of human consciousness itself, and derives the temporal property by putting them into Rem Koolhaas space with the fluid quality. According to Clifton's Phenomenology of Music, an understanding of music is made in both human body and consciousness as two ways to listen to sounds and enjoy music. Though a correlation between the characteristics of Clifton's Phenomenology of Music and one of resulted from uncertainty and immateriality of modern space Temporality, we could work out four kinds of characters which are the continuity of the fluidity from temporal programs, contrasting changes or synchronicity, the multidimensionality from synesthesia of line and face, ventilation by quality of the material and immaterial circumstances of sound effects, the implication in events resulted from cognition for information and unexpected actions, and the autonomy of the route of a variety of experiences including intimate connection of inter-related events and temporary and diverse external conditions. Hereby Temporality of musical phenomenology in Rem Koolhaas's space can be experienced by systems base oh the importance of host's motion, changes of programs according to the motion as well as uncertainty and immaterial changes. Due to the changes user's emotion and motion is undergone as Temporality that changes automatically.

Research on efficient HW/SW co-design method of light-weight cryptography using GEZEL (경량화 암호의 GEZEL을 이용한 효율적인 하드웨어/소프트웨어 통합 설계 기법에 대한 연구)

  • Kim, Sung-Gon;Kim, Hyun-Min;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.593-605
    • /
    • 2014
  • In this paper, we propose the efficient HW/SW co-design method of light-weight cryptography such as HIGHT, PRESENT and PRINTcipher using GEZEL. At first the symmetric cryptographic algorithms were designed using the GEZEL language which is efficiently used for HW/SW co-design. And for the improvement of performance the HW optimization theory such as unfolding, retiming and so forth were adapted to the cryptographic HW module conducted by FSMD. Also, the operation modes of those algorithms were implemented using C language in 8051 microprocessor, it can be compatible to various platforms. For providing reliable communication between HW/SW and preventing the time delay the improved handshake protocol was chosen for enhancing the performance of the connection between HW/SW. The improved protocol can process the communication-core and cryptography-core on the HW in parallel so that the messages can be transmitted to SW after HW operation and received from SW during encryption operation.

An Adaptive Peer-to-Peer Search Algorithm for Reformed Node Distribution Rate (개선된 노드 분산율을 위한 적응적 P2P 검색 알고리즘)

  • Kim, Boon-Hee;Lee, Jun-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.93-102
    • /
    • 2005
  • Excessive traffic of P2P applications in the limited communication environment is considered as a network bandwidth problem. Moreover, Though P2P systems search a resource in the phase of search using weakly connected systems(peers' connection to P2P overlay network is very weakly connected), it is not guaranteed to download the very peer's resource in the phase of download. In previous P2P search algorithm (1), we had adopted the heuristic peer selection method based on Random Walks to resolve this problems. In this paper, we suggested an adaptive P2P search algorithm based on the previous algorithm(1) to reform the node distribution rate which is affected in unit peer ability. Also, we have adapted the discriminative replication method based on a query ratio to reduce traffic amount additionally. In the performance estimation result of this suggested system, our system works on a appropriate point of compromise in due consideration of the direction of searching and distribution of traffic occurrence.

  • PDF

A Development and Applications of Problem Solving Tool for Learning Geometry (기하 학습을 위한 문제해결 도구 개발 및 적용)

  • Bae, Jin-Seong;Kim, Kap-Su
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.3
    • /
    • pp.449-459
    • /
    • 2010
  • Using a geometric computer program achieve learning effects as handling various function and has advantage to overcome the environment of classroom through providing an inquiring surroundings in the figure learning at an elementary school. There are many software for drawing the geometric. But currently most is focus on how to use the softwares without contents. So, It is necessary to develope a geometric software adapted cognitive development of primary schoolchildren. This study is aim to analyze elementary mathematic curriculum based on Van Heiles theory, to develope the software(Geometry for Kids : GeoKids) considering cognitive level of the primary schoolchildren. This software is developed to substitute a ruler and a compass considering cognitive level of the primary schoolchildren. Using mouse, GeoKids software help a child to draw easily lines and circles and this software notice another lines and circle automatically for a more accurate drawing figures. Children can use practically this software in connection with subjects of elementary mathematic curriculum.

  • PDF

Fabrication and characteristics of pyroelectric infrared sensors using P(VDF/TrFE) film (P(VDF/TrFE) 필름을 이용한 초전형 적외선 센서의 제작 및 특성)

  • Kwon, Sung-Yeol;Kim, Ki-Wan
    • Journal of Sensor Science and Technology
    • /
    • v.8 no.3
    • /
    • pp.226-231
    • /
    • 1999
  • Pyroelectric infrared sensors have been fabricated using P(VDF/TrFE) film with pyroelectric effect. The weight percent and thickness of the poled P(VDF/TrFE) film are 75/25 percent and $25\;{\mu}m$ respectively. For easier fabrication and connection method new top and bottom electrodes design was adapted for human body detecting pyroelectric infrared sensor. An aluminum infrared absorption electrode and bottom electrode were deposited by thermal evaporator. And the device was mounted in TO-5 housing to detect infrared light of $5.5{\sim}14\;{\mu}m$ wavelength. The responsibility, NEP (noise equivalent power) and specific detectivity $D^*$ of the device were $9.62{\times}10^5\;V/W$, $3.95{\times}10^{-7}\;W$ and $5.06{\times}10^5\;cm/W$ under emission energy of $13\;{\mu}W/cm^2$ respectively.

  • PDF

Fuzzy Neural System Modeling using Fuzzy Entropy (퍼지 엔트로피를 이용한 퍼지 뉴럴 시스템 모델링)

  • 박인규
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.2
    • /
    • pp.201-208
    • /
    • 2000
  • In this paper We describe an algorithm which is devised for 4he partition o# the input space and the generation of fuzzy rules by the fuzzy entropy and tested with the time series prediction problem using Mackey-Glass chaotic time series. This method divides the input space into several fuzzy regions and assigns a degree of each of the generated rules for the partitioned subspaces from the given data using the Shannon function and fuzzy entropy function generating the optimal knowledge base without the irrelevant rules. In this scheme the basic idea of the fuzzy neural network is to realize the fuzzy rules base and the process of reasoning by neural network and to make the corresponding parameters of the fuzzy control rules be adapted by the steepest descent algorithm. The Proposed algorithm has been naturally derived by means of the synergistic combination of the approximative approach and the descriptive approach. Each output of the rule's consequences has expressed with its connection weights in order to minimize the system parameters and reduce its complexities.

  • PDF

Design of the Shortcut based Integrated & Advanced Networking Server(IANS) for QoS path (QoS 경로 설정을 위한 Shortcut 기반 통합 서버 설계)

  • 김기영;이상호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.74-84
    • /
    • 2001
  • In the current Internet, InteServ model based on Resource reSerVation Protocol (RSVP), DiffServ Model based on service differentiation according to per hope behavior(PHB) and traffic engineering policy, and two-tire model of above mentioned two models which are adapted differently as the target network status for providing the end-to-end QoS Path are suggested. But, when we integrated this internet QoS into the ATM based network, differences of the connection setup procedure, name/address translation methods, and QoS provisioning mechanisms for end-to-end path setup procedures are introduced. In this paper, we propose the method of shortcut based QoS path setup procedure to solve these problems, and to guarantee the integration and scalability of Next Generation Internet(NGI) names/address in Integrated IP network into ATM based network. This network should support the engineering differentiated into the multiple service classes, which depend on established by this path is designed suitably into the target router and host step by step. In the near future, this function which provide the QoS guaranteed path based on end-to-end shortcut between the configuration devices are extended into the NGI target network.

  • PDF