• Title/Summary/Keyword: information overload

Search Result 522, Processing Time 0.031 seconds

Mutual Authentication Protocol Using a Low Power in the Ubiquitous Computing Environment

  • Cho Young-bok;Kim Dong-myung;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.91-94
    • /
    • 2004
  • Ubiquitous sensor network is to manage and collect information autonomously by communicating user around device. Security requirements in Ubiquitous based on sensor network are as follows: a location of sensor, a restriction of performance by low electric power, communication by broadcasting, etc. We propose new mutual authentication protocol using a low power of sensor node. This protocol solved a low power problem by reducing calculation overload of sensor node using two steps, RM(Register Manager) and AM(Authentication Manager). Many operations performing the sensor node itself have a big overload in low power node. Our protocol reduces the operation number from sensor node. Also it is mutual authentication protocol in Ubiquitous network, which satisfies mutual authentication, session key establishment, user and device authentication, MITM attack, confidentiality, integrity, and is safe the security enemy with solving low electric power problem.

  • PDF

Feedback Load Control Mechanism for Real-Time Web Services (실시간 웹 서비스를 위한 피드백 부하 제어 기법)

  • Jung, Suk-Yong
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.17-21
    • /
    • 2010
  • This paper proposes a mechanism for managing overload in real-time web service system. The many previous mechanisms manage overload with controlling web request. These mechanisms can control only new web request. They don't have any control existing tasks, especially periodic tasks. We design a controller that able to meet real-time performance with controlling even periodic tasks. A feedback control system is implemented applying the proposed mechanism. And we verified the stable operation of system.

An Edge Adaptive 1-Bit DPCM Image Coding (에지 적응 1-비트 DPCM 영상부호화)

  • 심영석;남상욱
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.25 no.7
    • /
    • pp.819-825
    • /
    • 1988
  • An 1-bit DPCM image coding method is presented. Our method is specially designed to reduce the slope overload which seems to be the major performance degradation factor in 1-bit DPCM. In the present algorithm, based on the classification of neighborhoods by its flatness, slope strength and direction, predictor and quantizer operate adaptively through switching action. Compared with some other methods by computer simulation, proposed method shows improved performance in image quality as well as in signal to noise ratio. This gain mainly comes from the reduced slope overload and seems large to compensate the increased complexity in prediction. As a post processing, Lee filter is used to reduce the granular noise subjectively annoying in flat region.

  • PDF

Overload control mechanism by parameter tuning in FDDI networks (FDDI 네트워크의 파라미터 튜닝에 의한 과부하 제어 메카니즘)

  • 이준호;김경신;강문식;송명렬;이상배
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.4
    • /
    • pp.32-39
    • /
    • 1995
  • In this paper, a timer thresholds tuning algorithm is proposed, satisfying the required response time for traffic with time-critical applications and asynchronous traffic in FDDI network. Under light and medium load, priorities and timer thresholds play a minor role for medium access control. In these cases all quenes are served exhaustively with a ver high service probability and the packet loss probability approaches almost zero. Under overload condition, however, the performance of the FDDI Network is completely determined by the selection of the timer thresholds. The timer thresholds tuned by mathematical results is confirmed by simulation results using SIMAN/UNIX package. The allocation of guaranteed bandwidth can be controlled easily by tuning the timer thresholds according to the proposed rules.

  • PDF

Load Balancing Technique using MAP Structure Change on HMIPv6 (HMIPv6에서 MAP 구조를 개선한 부하분산기법)

  • Hong, Won-Sang;Lee, Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.12
    • /
    • pp.135-140
    • /
    • 2005
  • This paper proposes the technique of load balancing with traffic which is concentrated to MAP on the hierarchical mobile IPv6. This technique sends the secondary MAP address using the extension option of IPv6, so the upper level MAP will manage it. Therefore, when the overload occurs, it distributes the overload to the secondary MAP address by using redirect tunneling technique, so the efficient communication becomes possible. We validate the feasibility and result of the proposed technique by using ns-2 simulator.

Design a Method Enhancing Recommendation Accuracy Using Trust Cluster from Large and Complex Information (대규모 복잡 정보에서 신뢰 클러스터를 이용한 추천 정확도 향상기법 설계)

  • Noh, Giseop;Oh, Hayoung;Lee, Jaehoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.17-25
    • /
    • 2018
  • Recently, with the development of ICT technology and the rapid spread of smart devices, a huge amount of information is being generated. The recommendation system has helped the informant to judge the information from the information overload, and it has become a solution for the information provider to increase the profit of the company and the publicity effect of the company. Recommendation systems can be implemented in various approaches, but social information is presented as a way to improve performance. However, no research has been done to utilize trust cluster information among users in the recommendation system. In this paper, we propose a method to improve the performance of the recommendation system by using the influence between the intra-cluster objects and the information between the trustor-trustee in the cluster generated in the online review. Experiments using the proposed method and real data have confirmed that the prediction accuracy is improved than the existing methods.

A Design of Important Sentence Extraction Method for Automatic Text Summarization System (자동 문서요약을 위한 중요문 추출 방법 설계)

  • Shin, Sung-Hyuk;Kim, Tae-Wan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.543-546
    • /
    • 2001
  • 본 논문에서는 빠른 속도로 증가하고 있는 인터넷상의 정보와 서비스를 검색함에 있어서 기본적인 내용은 유지하면서 정보의 과부하(information overload)문제를 해결하기 위한 문서요약의 방법으로 통계적 접근 방법에서 Kupiec의 요약문이 가지는 특성을 이용하여 문서의 방법을 설계하였다. 요약문의 각 문장에 대하여 중요도에 따라 가중치를 부여 한 후, 주어진 임계값에 따라 가중치가 낮은 문장들을 제외한다. 제외 후 가중치 점수를 부여해서 요약문 문장의 개수를 조절하면서 중요문을 추출할 수 있다.

  • PDF

Cluster Head Selection Algorithm for Reducing overload of Head Node in Wireless Sensor Network (무선 센서 네트워크 환경에서 헤더 노드의 과부하를 줄이기 위한 클러스터 헤드 선출 알고리즘)

  • Lee, Jong-Sung;Jeon, Min-Ho;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.612-615
    • /
    • 2012
  • Energy efficiency in wireless sensor network is a principal issue because wireless sensor network uses limited energy. In wireless sensor network, because nodes are placed randomly, they may be concentrated in certain area. This dense area causes shortening the life of the concentrated area, and furthermore reducing the life of the entire network. In this paper, we suggest a additional cluster head selection algorithm for reducing the overload of head node in dense area and shows simulation result using our algorithm with LEACH algorithm.

  • PDF

RFID Mutual Authentication Protocol on Insecure Channel for Improvement of ID Search (ID 검색 개선을 위한 비보호채널상의 RFID 상호인증 프로토콜)

  • Park, Mi-Og;Oh, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.10
    • /
    • pp.121-128
    • /
    • 2010
  • In this paper, we proposed a new secure RFID(Radio Frequency IDentification) mutual authentication protocol on insecure communication channel which assumed that all communication channels between the database, the reader and the tag are insecure communication channels. The proposed protocol used a secure one-way hash function and the goal is to improve search time of a tag ID and overload of hash calculational load in DB. In addition, the proposed protocol supports not only basic security requirements to be provided by RFID mutual authentication protocol but also forward secrecy, and the tag does not generate a random number to reduce overload of processing capacity in it.