• Title/Summary/Keyword: sensitive information

Search Result 2,333, Processing Time 0.03 seconds

Mobility-Sensitive Multicast Protocol in NEMO

  • Li, Long-Sheng;Chi, Hung-I;Xie, Kai-Chung;Chan, Din-Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1994-2017
    • /
    • 2022
  • In view of the past, the mobility of the multicast source in the mobility networks is seldom discussed in the traditional multicast protocols. It is a heavy cost for the traditional multicast protocols to reconstruct the multicast tree in the Network Mobility (NEMO) environment. This article proposes an alternative multicast protocol, referred to as Mobility-Sensitive Multicast protocol (MSM), for the NEMO environment. The MSM can be considered as an alternative version of the Multicast Listener Discovery (MLD) protocol to maintain the multicast tree in the NEMO. There are two obvious contributions for the MSM. Reconstruct mechanism could rebuild the multicast tree for the mobility of the multicast source. Multi-group suppression mechanism reduce the multicast tree maintaining cost for the mobility of the multicast members. Through the performance evaluations and analyses, the MSM has less cost to maintain the multicast tree than the traditional multicast protocols, especially for a large numbers of multicast groups. Moreover, the MSM allows the mobility of the multicast source to reconstruct the multicast tree easily.

Proposal of Traffic Management Strategy between Hierarchical Mobile-WiMAX/WLAN Networks (계층적 Mobile-WiMAX/WLAN 네트워크에서의 트래픽 관리 전략에 관한 연구연구)

  • Moon, Tae-Wook;Kim, Moon;Cho, Sung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.153-160
    • /
    • 2009
  • A hierarchical network between Mobile-WiMAX and WLAN systems is to make it possible to utilize wireless internet services including time sensitive applications such as VoIP, VOD, visual telephony etc. During the process of vertical handoff decision from Mobile-WiMAX to WLAN hotspot, vertical handoff delay causes user dissatisfaction because it doesn't provide the seamless wireless internet service. We make use of type of service (ToS) parameters in IEEE 802.16e specification as the criterion parameter of vertical handoff decision process in hierarchical Mobile-WiMAX/WLAN networks. In this paper, we propose the process of vertical handoff decision for seamless wireless internet service which is sensitive to time delay. If type of service is time sensitive application, the decision of vertical handoff is withdrawn until the service is terminated. In focus on user satisfaction, if the proposed traffic management strategy in hierarchical Mobile-WiMAX/WLAN networks is used, user will utilize seamless wireless internet services including time sensitive applications.

A Study on Applying the Adaptive Window to Detect Objects Contour (물체의 윤곽선 검출을 위한 Adaptive Window적용에 관한 연구)

  • 양환석;서요한;강창원;박찬란;이웅기
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.2
    • /
    • pp.57-67
    • /
    • 1998
  • In order to extract the contour of interesting object in the image, Kass suggested the Active Contour Model called "Snakes" The speed of this model is slow and this model is sensitive of initialization. In order to improve these problems, Gunn extracted the accurate contour by using two initializations, and operated to less sensitive of initialization. This method could extract more accurate contour than the existing method, but it had no effect in the speed and it was sensitive of noise. This paper applied to the Energy Minimization Algorithm about only the pixel within the window applying the window of $8{\times}8$ size at each contour point consisting Snakes in order to solve these problems. In order to less sensitive of noise which exists within image, it suggests a method that moves the window to vertical direction for the gradient of each contour point.our point.

  • PDF

A Traffic Shaping Scheme Considering ATM Traffic Characteristics (ATM 트래픽 특성을 고려한 트래픽 쉐이핑 기법)

  • Choi, Chang-Won;Kim, Tai-Yun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.2 no.5
    • /
    • pp.667-676
    • /
    • 1995
  • In ATM traffic multiplexing, the cell clumping and the cell dispersion are occured due to the cell delay variance(CDV) which changes the traffic characteristics. These cell variances increase the burstiness of t.he cell streams and make the network congested. The function of the traffic shaping is necessary to transmit the input streams into the networks or into the traffic policing schemes with some intevals. Most of the existing studies regard the input traffics as the traffic with the identical characteristics. In this study, the traffic shaping is processed by considering the traffic characteristICS with t.he loss-sensitive traffic and the delay-sensitive traffic. The traffic shaping model and the traffic shaping algorithm which considers the" characteristics of input streams have been presented. The traffic effect On t.he CDV size is also studied. The proposed scheme is compared to Virtual Scheduling Algorithm(VSA) and the efficiency of the proposed scheme is evaluated. According to the simulation results, t.he mean delay is decreased about 12% in delay-sensitive traffic and the traffic burstiness is decreased about 11 % in loss-sensitive traffic.

  • PDF

A study on the highly sensitive metal nanowire sensor for detecting hydrogen (수소감지를 위한 고감도의 금속 나노선 센서에 관한 연구)

  • An, Ho-Myoung;Seo, Young-Ho;Yang, Won-Jae;Kim, Byungcheul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2197-2202
    • /
    • 2014
  • In this paper, we report on an investigation of highly sensitive sensing performance of a hydrogen sensor composed of palladium (Pd) nanowires. The Pd nanowires have been grown by electrodeposition into nanochannels and liberated from the anodic aluminum oxide (AAO) template by dissolving in an aqueous solution of NaOH. A combination of photo-lithography, electron beam lithography and a lift-off process has been utilized to fabricate the sensor using the Pd nanowire. The hydrogen concentrations for 2% and 0.1% were obtained from the sensitivities (${\Delta}R/R$) for 1.92% and 0.18%, respectively. The resistance of the Pd nanowires depends on absorption and desorption of hydrogen. Therefore, we expect that the Pd nanowires can be applicable for detecting highly sensitive hydrogen gas at room temperature.

A Study of the Mitigating Effect Comparison of Voltage Sags by WTG Types Based on the Concept of Area of Vulnerability (타입별 풍력 발전기 설치에 따른 민감 부하의 순간전압강하 저감 효과 비교 분석 연구)

  • Park, Se-Jun;Yoon, Min-Han
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1682-1688
    • /
    • 2017
  • In modern society, the number of industrial customers using equipment sensitive particularly to voltage sags is rapidly increasing. As voltage sags can cause loss of information as well as false operation of the control device, it results in the vast economic damage in industrial processes. One way to mitigate voltage sags in the sensitive loads is the installation of distributed generation (DGs) on the periphery of these loads. In addition, renewable energy sources are currently in the spot light as the potential solution for the energy crisis and environmental issues. In particular, wind power generation which is connected to a grid is rising rapidly because it is energy efficient and also economically feasible compared to other renewable energy sources. On the basis of the above information, in this paper, with Wind Turbine Generators (WTGs) installed nearby the sensitive load, the analysis of the mitigating effect comparison by types of WTGs is performed using voltage sag assessment on the IEEE-30 bus test system. That is, the areas of vulnerability according to types of WTGs are expected to be different by how much reactive power is produced or consumed as WTG reactive power capability is related to the types of WTGs. Using the concept of 'Vulnerable area' with the failure rate for buses and lines, the annual number of voltage sags at the sensitive load with the installation of WTGs per type is studied. This research will be anticipated to be useful data when determining the interconnection of wind power generation in the power system with the consideration of voltage sags.

A study on speed-sensitive vehicle brake light system using LED (LED를 이용한 속도 감응형 차량용 브레이크등 시스템)

  • Kim, Tae-Jin;Kim, Hyung-Jun;Park, Seong-Jun;Park, In-Soo;Park, Sung-Won;Kim, Sung-Chan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.809-810
    • /
    • 2016
  • In this study, Speed-sensitive vehicle brake using the LED, When the driver presses the brake pedal, range step while being turned in connection taillights brake of the vehicle, such as speed-sensitive vehicle brake using the LED, It is turned on according to the deceleration of the vehicle to be series of points are displayed. The rear vehicle can prevent collision about an abrupt stop of preceding vehicle by perceiving deceleration state of preceding vehicle easier and faster. Also, if the inter-vehicle distance by using an ultrasonic sensor is closer than a certain distance, the emergency light turns on to convey the situation to the driver of the rear vehicle with a buzzer.

  • PDF

A Study on Malware Clustering Technique Using API Call Sequence and Locality Sensitive Hashing (API 콜 시퀀스와 Locality Sensitive Hashing을 이용한 악성코드 클러스터링 기법에 관한 연구)

  • Goh, Dong Woo;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.91-101
    • /
    • 2017
  • API call sequence analysis is a kind of analysis using API call information extracted in target program. Compared to other techniques, this is advantageous as it can characterize the behavior of the target. However, existing API call sequence analysis has an issue of identifying same characteristics to different function during the analysis. To resolve the identification issue and improve performance of analysis, this study includes the method of API abstraction technique in addition to existing analysis. From there on, similarity between target programs is computed and clustered into similar types by applying LSH to abstracted API call sequence from analyzed target. Thus, this study can attribute in improving the accuracy of the malware analysis based on discovered information on the types of malware identified.

Information Dimensions of Speech Phonemes

  • Lee, Chang-Young
    • Speech Sciences
    • /
    • v.3
    • /
    • pp.148-155
    • /
    • 1998
  • As an application of dimensional analysis in the theory of chaos and fractals, we studied and estimated the information dimension for various phonemes. By constructing phase-space vectors from the time-series speech signals, we calculated the natural measure and the Shannon's information from the trajectories. The information dimension was finally obtained as the slope of the plot of the information versus space division order. The information dimension showed that it is so sensitive to the waveform and time delay. By averaging over frames for various phonemes, we found the information dimension ranges from 1.2 to 1.4.

  • PDF

Novel Multi-user Conjunctive Keyword Search Against Keyword Guessing Attacks Under Simple Assumptions

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3699-3719
    • /
    • 2017
  • Conjunctive keyword search encryption is an important technique for protecting sensitive personal health records that are outsourced to cloud servers. It has been extensively employed for cloud storage, which is a convenient storage option that saves bandwidth and economizes computing resources. However, the process of searching outsourced data may facilitate the leakage of sensitive personal information. Thus, an efficient data search approach with high security is critical. The multi-user search function is critical for personal health records (PHRs). To solve these problems, this paper proposes a novel multi-user conjunctive keyword search scheme (mNCKS) without a secure channel against keyword guessing attacks for personal health records, which is referred to as a secure channel-free mNCKS (SCF-mNCKS). The security of this scheme is demonstrated using the Decisional Bilinear Diffie-Hellman (DBDH) and Decision Linear (D-Linear) assumptions in the standard model. Comparisons are performed to demonstrate the security advantages of the SCF-mNCKS scheme and show that it has more functions than other schemes in the case of analogous efficiency.