• Title/Summary/Keyword: header

Search Result 647, Processing Time 0.024 seconds

Fixed IP-port based Application-Level Internet Traffic Classification (고정 IP-port 기반 응용 레벨 인터넷 트래픽 분석에 관한 연구)

  • Yoon, Sung-Ho;Park, Jun-Sang;Park, Jin-Wan;Lee, Sang-Woo;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.205-214
    • /
    • 2010
  • As network traffic is dramatically increasing due to the popularization of Internet, the need for application traffic classification becomes important for the effective use of network resources. In this paper, we present an application traffic classification method based on fixed IP-port information. A fixed IP-port is a {IP address, port number, transport protocol}triple dedicated to only one application, which is automatically collected from the behavior analysis of individual applications. We can classify the Internet traffic more accurately and quickly by simple packet header matching to the collected fixed IP-port information. Therefore, we can construct a lightweight, fast, and accurate real-time traffic classification system than other classification method. In this paper we propose a novel algorithm to extract the fixed IP-port information and the system architecture. Also we prove the feasibility and applicability of our proposed method by an acceptable experimental result.

Effect of Node Size on the Performance of the B+-tree on Flash Memory (플래시 메모리 상에서 B+-트리 노드 크기 증가에 따른 성능 평가)

  • Park, Dong-Joo;Choi, Hae-Gi
    • The KIPS Transactions:PartA
    • /
    • v.15A no.6
    • /
    • pp.325-334
    • /
    • 2008
  • Flash memory is widely used as a storage medium for mobile devices such as cell phones, MP3 players, PDA's due to its tiny size, low power consumption and shock resistant characteristics. Additionally, some computer manufacturers try to replace hard-disk drives used in Laptops or personal computers with flash memory. More recently, there are some literatures on developing a flash memory-aware $B^+$-tree index for an efficient key-based search in the flash memory storage system. They focus on minimizing the number of "overwrites" resulting from inserting or deleting a sequence of key values to/from the $B^+$-tree. However, in addition to this factor, the size of a physical page allocated to a node can affect the maintenance cost of the $B^+$-tree. In this paper, with diverse experiments, we compare and analyze the costs of construction and search of the $B^+$-tree and the space requirement on flash memory as the node size increases. We also provide sorting-based or non-sorting-based algorithms to be used when inserting a key value into the node and suggest an header structure of the index node for searching a given key inside it efficiently.

Design and Implementation of for High Resolution Inkjet Header Interface (고해상도 잉크젯 헤더 인터페이스를 위한 IP 설계 및 구현)

  • Lee, Jong-Hyeok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2032-2038
    • /
    • 2007
  • Embedded Controller which controls whole system is most important part of embedded system. Nowadays, new technique called SoC is more using than ASIC. But SoC have some problems. Because of long development time and high cost, it is hard to applying SoC to small and medium enterprise. So many companies use IP technique combined with embedded processor. High resolution inkjet marking system is printing system with embedded controller. It is used in various part of industry. But it has many problems such as printing quality, marking errors, system faults and so on. In this paper, we designed and implemented IP that can solve the printing quality problems. We analyzed total-logic-elements and timing by simulation. As a result of simulation, we could verified that output signals satisfied reference timing. Appling IP to high resolution inkjet marking system, we could get good quality printing message.

A key management scheme for the cluster-based sensor network using polar coordinated (극 좌표를 이용한 클러스터 기반 센서 네트워크의 키 관리 기법)

  • Hong, Seong-Sik;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.870-878
    • /
    • 2008
  • The level of security of most sensor nodes that comprise the sensor networks is low, but because of the low computing power and small storage capacity, it is even very difficult to apply a security algorithm efficiently to the sensor nodes. Therefore, preventing the join of an illegal node to a sensor network is impossible, and the transmitting information is easily exposed and overheard when the transmitting algorithm of the sensor node is hewn. In this paper, we propose a group key management scheme for the sensor network using polar coordinates, so that the sensor nodes can deliver information securely inside a cluster and any illegal node is prevented from joining to the cluster where a sensor network is composed of many clusters. In the proposed scheme, all of the sensor nodes in a cluster set up the authentication keys based on the pivot value provided by the CH. The intensive simulations show that the proposed scheme outperforms the pair-wise scheme in terms of the secure key management and the prevention of the illegal nodes joining to the network.

Harvesting Performance of the Prototype Small Combine for Buckwheat and Adlay

  • Yoo, Soonam;Lee, Changhoon;Lee, Beom Seob;Yun, Young Tae
    • Journal of Biosystems Engineering
    • /
    • v.43 no.4
    • /
    • pp.320-330
    • /
    • 2018
  • Purpose: The aim of this study was to investigate the harvesting performance of a prototype small combine for buckwheat and adlay. Methods: The prototype small combine was designed and constructed. Its ratio of grain loss, ratio of output components in the grain outlet, and field capacity for harvesting buckwheat and adlay were analyzed through field tests. Results: The prototype small combine required a working width of about 0.6 to 0.7 m to harvest buckwheat. The maximum travel speed was about 0.36 m/. The total ratio of grain loss was about 21.6%, which consisted of 8.8% at the header and 12.8% at the dust outlet. The grain and the material other than grain (MOG) ratios at the grain outlet were 94.1% and 5.9% respectively. In the case of adlay harvest, the maximum working width was about 1.2 m, that is, two rows. The range of maximum travel speed was about 0.45 to 0.46 m/s. When adlay was harvested in one row, the total ratio of grain loss ranged from 36.3 to 42.8% according to the cutting height. The cutting height of 30 cm resulted in a higher total ratio of grain loss than 60 cm and 90 cm. When the cutting height was 60 cm, there was no significant change in the total ratio of grain loss according to the number of working rows and the stage of the primary transmission shift. The total ratio of grain loss ranged from 35.2 to 37.7%. The grain and the MOG ratios at the grain outlet ranged from 93.1 to 95.8% and from 4.2 to 6.9%, respectively. No significant difference was observed in relation to cutting height, number of working rows, and the stage of the primary transmission shift. Conclusions: The prototype small combine for harvesting miscellaneous cereal crops showed good potential for the efficient harvesting of buckwheat and adlay. However, to improve the harvesting performance, there seems to be a need to develop new crop varieties suitable for machine-based harvesting and improve the transmissions, reels, separation/cleaning systems.

A Study of Verification Methods for File Carving Tools by Scenario-Based Image Creation (시나리오 기반 이미지 개발을 통한 파일 카빙 도구 검증 방안 연구)

  • Kim, Haeni;Kim, Jaeuk;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.835-845
    • /
    • 2019
  • File Carving is a technique for attempting to recover a file without metadata, such as a formated storage media or a damaged file system, and generally looks for a specific header / footer signature and data structure of the file. However, file carving is faced with the problem of recovering fragmented files for a long time, and it is very important to propose a solution for digital forensics because important files are relatively fragmented. To overcome these limitations, various carving techniques and tools are continuously being developed, and data sets from various researches and institutions are provided for functional verification. However, existing data sets are ineffective in verifying tools because of their limited environmental conditions. Therefore, this paper refers to the importance of fragmented file carving and develops 16 images for carving tool verification based on scenarios. The developed images' carving rate and accuracy of each media is shown through Foremost which is well known as a commercial carving tool.

Group Based Two-Layer Mobility Management of MTC Devices in 5G Network (5G 네트워크에서 MTC 단말들의 그룹기반 2계층 이동성 관리 기술)

  • Kim, Nam-Sun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.631-637
    • /
    • 2018
  • In 5G mobile communication, it is necessary to provide different mobility to user equipments(UE) that do not require mobility management or need limited mobility management. In this paper, we propose a two-layer mobility management system that classifies multiple MTC devices with similar mobility levels into c-MTC and m-MTC groups. In order to improve the energy efficiency and service life by reducing the number of control signals generated when TAU is performed, the group header typically performs a Tracking Area Update(TAU) request and adjusts the periodic TAU update period according to the mobility level. The TAU update period of the m-MTC is set to 54 minutes proposed by the 3GPP standard and the c-MTC is set to 12 minutes. Compared to when the UEs perform TAU individually, it is found that the number of control signals decreases by 33% when the MME is not changed and by 49% when the MME is not changed in the m-MTC or c-MTC group.

User experience of responsive web on multi-device environment (멀티 디바이스 환경에서 반응형 웹의 사용자 경험)

  • Kang, Jae-Shin;Lee, Young-Ju
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.465-470
    • /
    • 2018
  • This study investigated how layouts can be arranged to improve the user experience in response to changes in the size of responsive webs in a multi - device environment. The layout elements of the responsive web are largely divided into a header, a main concept image, a main content, a sub-content, and a footer. As the screen becomes smaller, the use of drawers and the menu of the scrolling menus rather than the vertical menus will help improve the user experience. The main concept image should be consistent and not lose readability through the use of system fonts. The main content and the sub content should be prevented from being long in the vertical scroll, and the card UI, the table list and the grid list could be alternatively presented for this purpose. Another problem with vertical scrolling is that the placement of user-selectable menus, such as more or new content corrections, is helpful in improving the user experience.

Cyclic behaviour of infilled steel frames with different beam-to-column connection types

  • Sakr, Mohammed A.;Eladly, Mohammed M.;Khalifa, Tarek;El-Khoriby, Saher
    • Steel and Composite Structures
    • /
    • v.30 no.5
    • /
    • pp.443-456
    • /
    • 2019
  • Although numerous researchers demonstrated the significant difference in performance between the various beam-to-column connection types, most of the previous studies in the area of infilled steel frames focused on the behaviour of frames with welded connections. Therefore, there is a need for conducting studies on infilled steel frames with other common connection types (extended endplate with and without rib stiffeners, flush endplate and shear connections). In this paper, firstly, a two-dimensional finite-element model simulating the cyclic response of infilled steel frames was presented. The infill-frame interaction, as well as the interactions between connections' components, were properly modelled. Using the previously-validated model, a parametric study on infilled steel frames with five different beam-to-column connection types, under cyclic loading, was carried out. Several parameters, including infill material, fracture energy of masonry and infill thickness, were investigated. The results showed that the infilled frames with welded connections had the highest initial stiffness and load-carrying capacity. However, the infilled frames with extended endplate connections (without rib stiffeners) showed the greatest energy dissipation capacity and about 96% of the load-carrying capacity of frames with welded connections which indicates that this type of connection could have the best performance among the studied connection types. Finally, a simplified analytical model for estimating the stiffness and strength of infilled steel frames (with different beam-to-column connection types) subjected to lateral cyclic loading, was suggested.

Flow-Accelerated Corrosion Analysis for Heat Recovery Steam Generator in District Heating System (지역난방 배열 회수 보일러의 유동 가속 부식 원인 고찰)

  • Hong, Minki;Chae, Hobyung;Kim, Youngsu;Song, Min Ji;Cho, Jeongmin;Kim, Woo Cheol;Ha, Tae Baek;Lee, Soo Yeol
    • Korean Journal of Materials Research
    • /
    • v.29 no.1
    • /
    • pp.11-15
    • /
    • 2019
  • Severe wall thinning is found on the tube of a low-pressure evaporator(LPEVA) module that is used for a heat recovery steam generator(HRSG) of a district heating system. Since wall thinning can lead to sudden failure or accidents that lead to shutdown of the operation, it is very important to investigate the main mechanism of the wall thinning. In this study, corrosion analysis associated with a typical flow-accelerated corrosion(FAC) is performed using the corroded tube connected to an upper header of the LPEVA. To investigate factors triggering the FAC, the morphology, composition, and phase of the corroded product of the tube are examined using optical microscopy, scanning electron microscopy combined with energy dispersive spectroscopy, and x-ray diffraction. The results show that the thinnest part of the tube is in the region where gas directly contacts, revealing the typical orange peel type of morphology frequently found in the FAC. The discovery of oxide scales containing phosphate indicates that phosphate corrosion is the main mechanism that weakens the stability of the protective magnetite film and the FAC accelerates the corrosion by generating the orange peel type of morphology.