• Title/Summary/Keyword: home networks

Search Result 533, Processing Time 0.028 seconds

A Study on the Family communication and Power in Functional View. (가족의 커뮤니케이션과 勸力에 관한 기능적 이론의 접근)

  • 조은경
    • Journal of Families and Better Life
    • /
    • v.5 no.2
    • /
    • pp.127-144
    • /
    • 1987
  • The purpose of this study is to explore the family communication and power. Communication is a symbolic, transactional process in functional view . To say tat communication is a process implies a continuous interaction of an indefinite large number of variables with a concomitant, continuous change in the values taken by these variables. Finally the process implies change. Family functions include the primary functions of cohesion and adaptability and supporting functions of family images, themes, boundaries, and biosocial issues, The primary functions reveal concepts integrated family interaction and supporting functions, along with those of cohesion and adaptability, give shape of family life. The message system is the major element of communication process and influences both the form and the content of thier relationship and create and share meanings. The family-of-origin issues influence all aspects of family communication and account for many of the communication patterns, rules and networks. Power does not belong to an individual. rather it is a property of a relationship between two or more persons, Power, a system property is the ability of an individual to change the behavior of other members in a social system. Power operate transactionally in a family and any power maneuvers within it have a system wide effect. In order to study power in families , it is necessary to examine 1) family power operations 2) development of family power and 3) the communication of power strutegies. The research presented indicated that a rigid power structure, characterized by dominance and little sharing, restricts family flexibility reduce cohesion, and adversely affects satisfaction in families. power constantly changes as a family grows and develops within its system. Although power changes may be more obvious in children as they mature and more from a independent stated to an independent one, each of the parents experience egual or greater. Communication and activities take place that either enhance positively or negatively the images, themes, and degree of unity of cohesion the family desires. Power operated within a dynamic, growing, changing, interdependent transactional family system. Power struggle may develop when as issue becomes important to one or more family member. When this happens, and the rational exploration of alternatives ceases, various one-up power maneuvers usally follows, This affect family intimacy. a vital element in meaningful relationships . To resolve differences and not become the victim of another's power , one need to engage in constructive conflict since the ability to clearly and comfortably repudiate another is part of the achievement of intimacy.

  • PDF

Reliable Extension Scheme using Multiple Paths in Wireless Ad-hoc Networks (무선 애드-혹 네트워크의 다중 경로를 이용한 신뢰적인 확장 기법)

  • Kim, Moon-Jeong;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.218-225
    • /
    • 2007
  • As the research on home network technologies, sensor network technologies, and ubiquitous network technologies makes rapid progresses, wireless ad-hoc network have attracted a lot of attention. A wireless mobile ad-hoc network is a temporary network formed by a collection of wireless mobile nodes without the aid of any existing network infrastructure or centralized administration, and it is suitable for ubiquitous computing environments. In this paper, we suggest an extension scheme of a wireless mobile ad-hoc network based on limited multiple paths source routing protocol. This scheme reduces the overhead of route re-establishment and re-registration by maintaining link/node non-disjoint multiple paths between mobile hosts in a wireless mobile ad-hoc network or a mobile host in a wireless mobile ad-hoc network and a base station supporting fixed network services. By maintaining multiple paths, our scheme provides short end-to-end delay and is reliable extension scheme of a wireless mobile ad-hoc network to a fixed network. In this paper, our simulations show that our scheme outperforms existing schemes with regards to throughput and end-to-end delay. Also we show that our scheme outperforms multi-paths approach using disjoint routes with regards to routing overhead.

A Efficient Network Security Management Model in Industrial Control System Environments (산업제어시스템 환경에서 효과적인 네트워크 보안 관리 모델)

  • Kim, Il-Yong;Lim, Hee-Teag;Ji, Dae-Bum;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.664-673
    • /
    • 2018
  • The industrial control system (ICS) has operated as a closed network in the past, but it has recently been linked to information and communications services and has been causing damage due to cyber attacks. As a countermeasure, the Information Communication Infrastructure Protection Act was enacted, but it cannot be applied to various real control environments because there is only a one-way policy-from a control network to a business network. In addition, IEC62443 defines an industrial control system reference model as an international standard, and suggests an area security model using a firewall. However, there is a limit to linking an industrial control network, operating as a closed network, to an external network only through a firewall. In this paper, we analyze the security model and research trends of the industrial control system at home and abroad, and propose an industrial control system security model that can be applied to the actual interworking environments of various domestic industrial control networks. Also, we analyze the security of firewalls, industrial firewalls, network connection equipment, and one-way transmission systems. Through a domestic case and policy comparison, it is confirmed that security is improved. In the era of the fourth industrial revolution, the proposed security model can be applied to security management measures for various industrial control fields, such as smart factories, smart cars, and smart plants.

An Exploratory Case Study on Consumer-Goods SMEs' Overseas Expansion of Their Own Brands (자사브랜드 부착 소비재 수출 중소기업의 해외진출에 대한 탐색적 사례분석)

  • Won, Jong-Hyeon;Chung, Jae-Eun;Yang, Hee-Soon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.1
    • /
    • pp.199-210
    • /
    • 2015
  • This study analyzes various aspects of the successful overseas expansion of SMEs that export consumer goods with their own brands. Through in-depth interviews with CEOs and marketing practitioners of fifteen SMEs that export consumer goods of their own brands, researchers examined the determinants of the decisions to export own-brand products, forms of expansion into foreign markets, firms' distribution networks, firms' technological and marketing capabilities, export barriers, and export support services offered by the government. The results indicate that these companies obtained competitiveness in the design and quality of their products through steady R&D investment, with a focus on niche markets. This study also shows that they established foreign branches, participated in overseas trade fairs, and tapped into foreign markets with Korean home shopping channels and department stores to build distribution channels and to find new buyers. However, the findings of this study reveal that many of those companies export both OEM/OEM products as well as their own-brand products due to the low level of brand awareness in foreign markets. Thus, efforts to improve their brand awareness in the global market are much needed. In addition, this paper demonstrates that the programs and services provided by state-run organizations need improvement in credibility and expertise. This research suggests recommendations for successful export programs, and provides meaningful insights for consumer-goods SMEs establishing foreign market entry strategies with their own brands.

  • PDF

Systematic Review of Smoking Initiation among Asian Adolescents, 2005-2015: Utilizing the Frameworks of Triadic Influence and Planned Behavior

  • Talip, Tajidah;Murang, Zaidah;Kifli, Nurolaini;Naing, Lin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.7
    • /
    • pp.3341-3355
    • /
    • 2016
  • Background: A recent WHO data report on mortality attributable to tobacco use including cigarette smoking indicated a very high burden of deaths in Asia and that people often initiate smoking as early as young adolescents. The objectives of this study were to systematically review peer-reviewed articles on cigarette smoking initiation among Asian adolescents and to develop a conceptual model of factors influencing smoking initiation by integrating all relevant factors based on existing data. Materials and Methods: Following a PRISMA guideline, a systematic review of articles published between 2005 and June 2015 was conducted using 5 databases on cigarette smoking initiation among adolescents (aged 10-19 years) living in Asia. We summarized the main findings of each study according to our research questions and data that emerged during the data extraction process. Analysis and categorization were based on the TTI and TPB models and classification of factors extracted from the study, were as follows: personal factors, social factors, broader environmental factors, mediators, and intention to initiate smoking and smoking behavior. Results: Of 1,227 identified studies, only 20 were included in this review. Our findings found that the mean age of cigarette smoking initiation ranged from 10 to 14 years and those who are more likely to initiate smoking are male, older adolescents, adolescents with low parental SES, individuals with low parental monitoring, low parental education level and having no discussion on smoking at home, those living in public housing and those exhibiting health-risk behavior. Our study also revealed that the risk of smoking initiation increased when they are exposed to smokers, influenced by peers, exposed to tobacco advertisements, receive pocket money, have lack of knowledge about smoking, have poor school performance, have a family conflict and have psychological problems. The conceptual model developed demonstrated complex networks of factors influencing initiation. Conclusions: This systematic review presents various factors influencing smoking initiation of the Asian adolescents and provides a conceptual framework to further analyze factors. Future studies should have a standard measure of smoking initiation, should analyze interactions and the intensity of relationships between different factors or variables in the conceptual model. This will in turn consolidate the understanding of the different factors affecting smoking initiation and will help to improve interventions in this area.

Expert System-based Context Awareness for Edge Computing in IoT Environment (IoT 환경에서 Edge Computing을 위한 전문가 시스템 기반 상황 인식)

  • Song, Junseok;Lee, Byungjun;Kim, Kyung Tae;Youn, Hee Yong
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.21-30
    • /
    • 2017
  • IoT(Internet of Things) can enable networking and computing using any devices is rapidly proliferated. In the existing IoT environment, bottlenecks and service delays can occur because it processes data and provides services to users using central processing based on Cloud. For this reason, Edge Computing processes data directly in IoT nodes and networks to provide the services to the users has attracted attention. Also, numerous researchers have been attracted to intelligent service efficiently based on Edge Computing. In this paper, expert system-based context awareness scheme for Edge Computing in IoT environment is proposed. The proposed scheme can provide customized services to the users using context awareness and process data in real-time using the expert system based on efficient cooperations of resource limited IoT nodes. The context awareness services can be modified by the users according to the usage purpose. The three service modes in the security system based on smart home are used to test the proposed scheme and the stability of the proposed scheme is proven by a comparison of the resource consumptions of the servers between the proposed scheme and the PC-based expert system.

Effective Index and Backup Techniques for HLR System in Mobile Networks (이동통신 HLR 시스템에서의 효과적인 색인 및 백업 기법)

  • 김장환;이충세
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.33-46
    • /
    • 2003
  • A Home Location Register(HLR) database system manages each subscriber's location information, which continuously changes in a cellular network. For this purpose, the HLR database system provides table management, index management, and backup management facilities. In this thesis, we propose using a two-level index method for the mobile directory number(MDN) as a suitable method and a chained bucket hashing method for the electronic serial number(ESN). Both the MDN and the ESN are used as keys in the HLR database system. We also propose an efficient backup method that takes into account the characteristics of HLR database transactions. The retrieval speed and the memory usage of the two-level index method are better than those of the R-tree index method. The insertion and deletion overhead of the chained bucket hashing method is less than that of the modified linear hashing method. In the proposed backup method, we use two kinds of dirty flags in order to solve the performance degradation problem caused by frequent registration-location operations. For a million subscribers, proposed techniques support reduction of memory size(more than 62%), directory operations (2500,000 times), and backup operations(more than 80%) compared with current techniques.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

A Node Mobility-based Adaptive Route Optimization Scheme for Hierarchical Mobile IPv6 Networks (노드 이동성을 고려한 계층적 이동 IPv6 네트워크에서의 적응적 경로 최적화 방안)

  • 황승희;이보경;황종선;한연희
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.4
    • /
    • pp.474-483
    • /
    • 2003
  • The secret sharing is the basic concept of the threshold cryptosystem and has an important position in the modern cryptography. At 1995, Jarecki proposed the proactive secret sharing to be a solution of existing the mobile adversary and also proposed the share renewal scheme for (k, n) threshold scheme. For n participants in the protocol, his method needs O($n^2$) modular exponentiation per one participant. It is very high computational cost and is not fit for the scalable cryptosystem. In this paper, we propose the efficient share renewal scheme that need only O(n) modular exponentiation per participant. And we prove our scheme is secure if less that ${\frac}\frac{1}{2}n-1$ adversaries exist and they static adversary.

Lightweight Validation Mechanism for IoT Sensing Data Based on Obfuscation and Variance Analysis (난독화와 변화량 분석을 통한 IoT 센싱 데이터의 경량 유효성 검증 기법)

  • Yun, Junhyeok;Kim, Mihui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.217-224
    • /
    • 2019
  • Recently, sensor networks are built and used on many kinds of fields such as home, traffic, medical treatment and power grid. Sensing data manipulation on these fields could be a serious threat on property and safety. Thus, a proper way to block sensing data manipulation is necessary. In this paper, we propose IoT(Internet of Things) sensing data validation mechanism based on data obfuscation and variance analysis to remove manipulated sensing data effectively. IoT sensor device modulates sensing data with obfuscation function and sends it to a user. The user demodulates received data to use it. Fake data which are not modulated with proper obfuscation function show different variance aspect with valid data. Our proposed mechanism thus can detect fake data by analyzing data variance. Finally, we measured data validation time for performance analysis. As a result, block rate for false data was improved by up to 1.45 times compared with the existing technique and false alarm rate was 0.1~2.0%. In addition, the validation time on the low-power, low-performance IoT sensor device was measured. Compared to the RSA encryption method, which increased to 2.5969 seconds according to the increase of the data amount, the proposed method showed high validation efficiency as 0.0003 seconds.