• Title/Summary/Keyword: additional information

Search Result 4,957, Processing Time 0.033 seconds

Development of Nursery Total Solution by using NFC Sensing (NFC 센싱을 이용한 어린이집 등하원 토탈 솔루션 개발)

  • Kim, Tae Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.65-66
    • /
    • 2013
  • Using NFC sensing technology and smart phone, nursery total solution system has been developed and bus position and time information can be conformed through its total system without additional GPS receiver and hardware. This total system will be applied on nursery school with low cost.

  • PDF

A Secure Mobile Agent Transfer Protocol in Mobile Agents Based E-Commerce System (이동 에이전트 기반 저자사걸 시스템에서의 안전한 이동 에이전트 전송 프로토콜)

  • Han, Seung-Wan;Im, Hyeong-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5S
    • /
    • pp.1657-1665
    • /
    • 2000
  • Mobile agents based e-commerce system has many advantage than traditional e-commerce-information gathering on goods, price settlement and payment, delivery of the goods purchased, and so on. However, due to the security vulnerability that stems from mobile agent's mobility, mobile agents based e-commerce system has additional security problems. Therefore, in order to do e-commerce securely in th system, first of al the security issues on mobile agents must be addressed. It this paper, we propose a mobile agent transfer protocol that provides confidentiality and integrity of mobile agent in transit and mutual authentication for communicating hosts. We further show the security of the protocol against many possible attacks. Also, we suggest the location management mechanism of mobile agents based on the trust center. This mechanism is capable of finding their locations transparently and detecting mobile agent clones.

  • PDF

Effective Partitioning of Static Global Buses for Small Processor Arrays

  • Matsumae, Susumu
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.85-92
    • /
    • 2011
  • This paper shows an effective partitioning of static global row/column buses for tightly coupled 2D mesh-connected small processor arrays ("mesh", for short). With additional O(n/m (n/m + log m)) time slowdown, it enables the mesh of size $m{\times}m$ with static row/column buses to simulate the mesh of the larger size $n{\times}n$ with reconfigurable row/column buses ($m{\leq}n$). This means that if a problem can be solved in O(T) time by the mesh of size $n{\times}n$ with reconfigurable buses, then the same problem can be solved in O(Tn/m (n/m + log m)) time on the mesh of a smaller size $m{\times}m$ without a reconfigurable function. This time-cost is optimal when the relation $n{\geq}m$ log m holds (e.g., m = $n^{1-\varepsilon}$ for $\varepsilon$ > 0).

Adaptive Multiview Video Coding Scheme Based on Spatiotemporal Correlation Analyses

  • Zhang, Yun;Jiang, Gang-Yi;Yu, Mei;Ho, Yo-Sung
    • ETRI Journal
    • /
    • v.31 no.2
    • /
    • pp.151-161
    • /
    • 2009
  • In this paper, we propose an adaptive multiview video coding scheme based on spatiotemporal correlation analyses using hierarchical B picture (AMVC-HBP) for the integrative encoding performances, including high compression efficiency, low complexity, fast random access, and view scalability, by integrating multiple prediction structures. We also propose an in-coding mode-switching algorithm that enables AMVC-HBP to adaptively select a better prediction structure in the encoding process without any additional complexity. Experimental results show that AMVC-HBP outperforms the previous multiview video coding scheme based on H.264/MPEG-4 AVC using the hierarchical B picture (MVC-HBP) on low complexity for 21.5%, on fast random access for about 20%, and on view scalability for 11% to 15% on average. In addition, distinct coding gain can be achieved by AMVC-HBP for dense and fast-moving sequences compared with MVC-HBP.

  • PDF

Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations

  • Kim, Tae-Hyun;Han, Dong-Guk;Okeya, Katsuyuki;Lim, Jong-In
    • ETRI Journal
    • /
    • v.29 no.5
    • /
    • pp.619-632
    • /
    • 2007
  • Side channel attacks are a very serious menace to embedded devices with cryptographic applications. To counteract such attacks many randomization techniques have been proposed. One efficient technique in elliptic curve cryptosystems randomizes addition chains with binary signed digit (BSD) representations of the secret key. However, when such countermeasures have been used alone, most of them have been broken by various simple power analysis attacks. In this paper, we consider combinations which can enhance the security of countermeasures using BSD representations by adding additional countermeasures. First, we propose several ways the improved countermeasures based on BSD representations can be attacked. In an actual statistical power analysis attack, the number of samples plays an important role. Therefore, we estimate the number of samples needed in the proposed attack.

  • PDF

Service Provision for Future Access Networks Using PPP Extensions

  • Lee, Jungjoon;Park, Jun-Kyun
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.695-698
    • /
    • 2000
  • The services such as real-time audio and video applications have become increasingly popular, especially over the Internet. Furthermore, as being commercialized those contents on the Internet require quality of service (QoS) support to ensure their performance. PPP is the best solution to of for those kinds of services. The reason why we want to employ PPP is this satisfies most of the requirements associated with remote connectivity to an NSP, such as IP address assignment, security, and AAA (authentication, authorization and accounting). In addition, since ISPs and corporations are familiar with PPP based connectivity, easy migration from existing ISP infrastructure is expected, if QoS is guaranteed. But so for PPP has had no field to ensure the quality of service. This article presents the solution by using some tunneling protocols and the draft [1] that proposed additional LCP option fields to negotiate QoS. To communicate each other, after negotiating those option fields, over various protocols such as ATM, Ethernet, and etc. tunneling protocol is used. Following sections will mention those briefly. And the service provision to offer the end-to-end communication with negotiated QoS will also be proposed.

  • PDF

Effects of Foreign Capital Inflow on Efficiency of Bank Industry (외국자본유입이 우리나라 은행산업의 효율성에 미치는 영향)

  • Kim, Chang-Beom
    • International Commerce and Information Review
    • /
    • v.9 no.3
    • /
    • pp.23-32
    • /
    • 2007
  • The purpose of this study is to estimate and analyse the relationship between efficiency of bank industry and macroeconomic variables. We employ Johansen's multivariate cointegration methodology, since the model must be stationary to avoid the spurious results. The empirical results show that our model is stationary as well as mean-reverting. This paper also applies impulse-response functions to get additional information regarding the responses of the bank spread to the shocks economic variables such as long and short term interest rates differential, banking organ liquidity, business cycle index, and foreigner's net equity investment. The results indicate that while the bank spread respond positively to liquidity and equity investment shocks and then decay very quickly.

  • PDF

Conceptual Data Modeling of Integrated Information System for Research & Development Configuration Management (연구개발 형상관리 자동화체계에 대한 개념적 데이터모델링)

  • 김인주
    • Journal of the military operations research society of Korea
    • /
    • v.25 no.1
    • /
    • pp.87-106
    • /
    • 1999
  • There are many technical datum in related with design, test & evaluation and logistic support which will be exchanged between geographically isolated units and heterogeneous hardwares & softwares in developing and operating the weapon systems. The paper proposes the conceptual database schema to establish configuration management information systems in which these datum can be automatically interchanged, tracked, audited and status-accounted without errors under the various environments. The paper investigates how to identify and classify the data in accordance with document identification, task analysis, system development, logistic support, system test & evaluation and data management. Furthermore, the investigation includes drawing the subject areas and modeling the conceptual database schema to explain the relationships between these datum. Thus, the paper results in the conceptual framework and data models of configuration management information systems, while additional customization efforts be required in applying the models to a specific weapon systems R&D.

  • PDF

Multiclass SVM Model with Order Information

  • Ahn, Hyun-Chul;Kim, Kyoung-Jae
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.4
    • /
    • pp.331-334
    • /
    • 2006
  • Original Support Vsctor Machines (SVMs) by Vapnik were used for binary classification problems. Some researchers have tried to extend original SVM to multiclass classification. However, their studies have only focused on classifying samples into nominal categories. This study proposes a novel multiclass SVM model in order to handle ordinal multiple classes. Our suggested model may use less classifiers but predict more accurately because it utilizes additional hidden information, the order of the classes. To validate our model, we apply it to the real-world bond rating case. In this study, we compare the results of the model to those of statistical and typical machine learning techniques, and another multi class SVM algorithm. The result shows that proposed model may improve classification performance in comparison to other typical multiclass classification algorithms.

MAC Protocol for Reliable Multicast over Multi-Hop Wireless Ad Hoc Networks

  • Kim, Sung-Won;Kim, Byung-Seo;Lee, In-Kyu
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.63-74
    • /
    • 2012
  • Multicast data communication is an efficient communication scheme, especially inmulti-hop ad hoc networks where the media access control (MAC) layer is based on one-hop broadcast from one source to multiple receivers. Compared to unicast, multicast over a wireless channel should be able to deal with varying channel conditions of multiple users and user mobility to provide good quality to all users. IEEE 802.11 does not support reliable multicast owing to its inability to exchange request-to-send/clear-to-send and acknowledgement packets with multiple recipients. Thus, several MAC layer protocols have been proposed to provide reliable multicast. However, additional overhead is introduced, as a result, which degrades the system performance. In this paper, we propose an efficient wireless multicast MAC protocol with small control overhead required for reliable multicast in multi-hop wireless ad hoc networks. We present analytical formulations of the system throughput and delay associated with the overhead.