• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.028 seconds

Context-based classification for harmful web documents and comparison of feature selecting algorithms

  • Kim, Young-Soo;Park, Nam-Je;Hong, Do-Won;Won, Dong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.6
    • /
    • pp.867-875
    • /
    • 2009
  • More and richer information sources and services are available on the web everyday. However, harmful information, such as adult content, is not appropriate for all users, notably children. Since internet is a worldwide open network, it has a limit to regulate users providing harmful contents through each countrie's national laws or systems. Additionally it is not a desirable way of developing a certain system-specific classification technology for harmful contents, because internet users can contact with them in diverse ways, for example, porn sites, harmful spams, or peer-to-peer networks, etc. Therefore, it is being emphasized to research and develop context-based core technologies for classifying harmful contents. In this paper, we propose an efficient text filter for blocking harmful texts of web documents using context-based technologies and examine which algorithms for feature selection, the process that select content terms, as features, can be useful for text categorization in all content term occurs in documents, are suitable for classifying harmful contents through implementation and experiment.

  • PDF

Implementation of IS-95C Multimedia Terminal using GPS (GPS 연동 IS-95C 멀티미디어 단말기 구현)

  • 하재승
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.8
    • /
    • pp.1133-1138
    • /
    • 2001
  • In this paper, we implemented that MMT(Multimedia Terminal) demonstrates spot news, weather forecast, sports news and cultural news employed CDMA mobile communication networks. The MMT displays mobile pictures/joint pictures/on screen ad and to make known Bus stop or Mobile stations. The MMT gives driver's and passenger's safety and valuable information for one's use GPS satellites. We verified to make real time mobile picture transfer use of CDMA2000 1×(IS-95C) network and development the scheduler control each module. This system tested on vehicle that train and bus. MMT was implemented high reliability and stability by the embedded system. The mobile terminal shows reliable data transfer rate about 74Kbps on IS-95C.

  • PDF

The Longitudinal Case Study on the Dynamically Evolving Value Network of SK Telecom (SK텔레콤 가치네트워크의 역동적 진화에 관한 장기사례분석)

  • Chang, Yong Ho;Park, Bellnine
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.5
    • /
    • pp.2150-2156
    • /
    • 2013
  • This study attempts to identify how the value network of mobile industry has evolved in the value creating process. The longitudinal case study on SK Telecom was conducted by measuring the SK Telecom's investment structure during from 1999 to 2008. Results show that the convergence services based on the advanced mobile networks changed the revenue structure, and enabled SK Telecom to reposition as a media company. For the value creation, SK Telecom's value network has flexibly adapted to convergence environment through dynamic asset reconfiguration.

The Design of Electronic Payment Protocol Using Dual Signature based on Cardholder's Secret Number (카드사용자의 비밀번호 기반 이중서명을 이용한 전자 지불 프로토콜의 설계)

  • 김성열;이옥빈;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.411-420
    • /
    • 1999
  • The topic of electronic commerce is a hot issue in computer technology. There are many kinds of risks associated with electronic commerce which performs financial transactions by exchanging electronic information over public networks. Therefore, security factors such as confidentiality, integrity, authentication and non-repudiation should be required to construct secure electronic commerce systems. In this paper, the credit card-based payment protocol applying dual signature is presented. It provides payment information to the bank a cardholder pays to, but conceals ordering information. It also offers ordering information to a merchant, but hides payment information including the card number. Thus, cardholder's private information can be protected. In order to accomplish this, dual signature is performed employing both symmetric method utilizing cardholder's secret number as an encryption key and asymmetric method.

  • PDF

Design and Manufacture of CPW-fed Two Arc-shaped Antenna for WLAN Applications (WLAN 시스템을 위한 두 개 원호 형태 안테나의 설계와 제작)

  • Yoon, Joong-Han
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.765-771
    • /
    • 2015
  • In this paper, a dual-band arc-shaped monopole antenna for WLAN(Wireless Local Area Networks) applications. The proposed antenna is based on CPW-fed structure, and composed of two-arc shaped of radiating patch and ground plane. To obtain the optimized parameters, we used the simulator, Ansoft's High Frequency Structure Simulator (HFSS) and found the parameters that greatly effect antenna characteristics. Using optimal parameters, the antenna is fabricated. The numerical and experiment results demonstrated that the propnosed antenna satisfied the -10 dB impedance bandwidth requirement while simultaneously covering the WLAN bands. And measured results of gain and radiation patterns characteristics displayed determined for opeating bands.

A System to Recognize Position of Moving Vehicle based on Images (영상을 이용한 차량의 주행 위치 측정 시스템)

  • Kim, Jin-Deog;Moon, Hye-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.12
    • /
    • pp.2619-2625
    • /
    • 2011
  • The GPS technique widely used recently in car navigation system has two problems that are unavailability in urban canyons and inherent positional error rate. The one has been studied and solved in many literatures. However, the other still leads to incorrect locational information in some area, especially parallel roads. This paper proposes and implements a system to recognize lane of moving vehicle based on images obtained from in-vehicle networks or other devices. The proposed system utilizes a real-time image matching algorithm which determines the direction of moving vehicle in parallel section of road. It also employs a method for accuracy improvement. The results obtained from experimental test on real-time navigation show that the proposed systems works well and the accuracy increases.

A New Ensemble System using Dynamic Weighting Method (동적 중요도 결정 방법을 이용한 새로운 앙상블 시스템)

  • Seo, Dong-Hun;Lee, Won-Don
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1213-1220
    • /
    • 2011
  • In this paper, a new ensemble system using dynamic weighting method with added weight information into classifiers is proposed. The weights used in the traditional ensemble system are those after the training phase. Once extracted, the weights in the traditional ensemble system remain fixed regardless of the test data set. One way to circumvent this problem in the gating networks is to update the weights dynamically by adding processes making architectural hierarchies, but it has the drawback of added processes. A simple method to update weights dynamically, without added processes, is proposed, which can be applied to the already established ensemble system without much of the architectural modification. Experiment shows that this method performs better than AdaBoost.

A Secure Intrusion Detection System for Mobile Ad Hoc Network (모바일 Ad Hoc 네트워크를 위한 안전한 침입 탐지 시스템)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo;Lee, Seong-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.87-94
    • /
    • 2009
  • The intrusion detection system is one of the active fields of research in wireless networks. Intrusion detection in wireless mobile Ad hoc network is challenging because the network topologies are dynamic, lack centralization and are vulnerable to attacks. Detection of malicious nodes in an open ad-hoc network in which participating nodes do not have previous security association has to face number of challenges which is described in this paper. This paper is about determining the malicious nodes under critical conditions in the mobile ad-hoc network and deals with security and vulnerabilities issues which results in the better performance and detection of the intrusion.

A study on MIH Handover in Heterogeneous networks using IFH-MIPv6 (IFH-MIPv6로 이용한 이기종망간 MIH 기반의 핸드오버에 관한 연구)

  • Oh, Ku-Yeong;Kim, Dong-Il;Kim, Ki-Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2451-2456
    • /
    • 2010
  • As the recent development of mobile technology, users want to multi-service in anytime, anywhere, any terminal. To meet the needs of users, it causes a lot of expense that redesign of the entire network or expand the network of services areas. Therefore, IEEE, IETF is offering Handover technology between heterogeneous network. In this paper, the IEEE 802.21 MIH information server is based on the network. It proposes an improved handover that L3 layer to optimize the handover process use of FMIPv6 and executes simulation.

ASESDP : An Efficient Service Discovery Protocol in Pervasive Computing Environments

  • Ma, Qianli;Liao, Minghong;Jiang, Shouxu;Hong, Wan-Pyo;Gao, Zhenguo
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.396-404
    • /
    • 2008
  • Service discovery is the technology of finding needed services in networks, and a key point in pervasive computing environments. This paper presents a novel service discovery protocol: ASESDP(AIP and SRR Enhanced Service Discovery Protocol). In ASESDP, tow schemes are proposed to enhance its performance: AIP(Advertisement Information Piggybacked) and SRR(Shortest Reply Route). In AIP, parts of advertisement information are piggybacked in the service reply packet, which makes the advertisement information propagating along the reply path, and spreads its transmission area. In SRR, in order to reduce the service response time, the shortest reply route is chosen to forward the service reply packet to the source node sending the service request. With the theoretical analysis and Glomosim simulation results, it is verified that ASESDP can reduce the number of service request packets, save the response time, and improve the efficiency of service discovery.