• 제목/요약/키워드: the Information Poor

검색결과 1,949건 처리시간 0.03초

Replica Update Propagation Using Demand-Based Tree for Weak Consistency in the Grid Database

  • Ge, Ruixuan;Jang, Yong-Il;Park, Soon-Young;Bae, Hae-Young
    • 한국멀티미디어학회논문지
    • /
    • 제9권12호
    • /
    • pp.1542-1551
    • /
    • 2006
  • In the Grid Database, some replicas will have more requests from the clients than others. A fast consistency algorithm has been presented to satisfy the high demand nodes in a shorter period of time. But it has poor performance in multiple regions of high demand for forming the island of locally consistent replicas. Then, a leader election method is proposed, whereas it needs much additional cost for periodic leader election, information storage, and message passing, Also, false leader can be created. In this paper, we propose a tree-based algorithm for replica update propagation. Leader replicas with high demand are considered as the roots of trees which are interconnected. All the other replicas are sorted and considered as nodes of the trees. Once an update occurs at any replica, it need be transmitted to the leader replicas first. Every node that receives the update propagates it to its children in the tree. The update propagation is optimized by cost reduction for fixed propagation schedule. And it is also flexible for the dynamic model in which the demand conditions change with time.

  • PDF

DLNA Protocol Inspection Tool for Compatibility Analysis

  • Park, Se-Ho;Park, Yong-Suk;Seo, Jeong-Wook;Choi, Jun-Rim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권6호
    • /
    • pp.2104-2117
    • /
    • 2014
  • The propagation of smart devices and the rapid expansion of wireless mobile networks have increased the need for ubiquitous device connectivity and contents access. DLNA is currently being used as the de facto standard for connectivity of consumer devices in the digital home. The guidelines provided by DLNA are intended to facilitate device and contents discovery, management, sharing and distribution. However, consumer experience with DLNA has been rather poor and usability not up to speed. Different problems and issues in limited compatibility have been reported due to manufacturer customizations. Such compatibility issues are often difficult to identify by average consumers who are not savvy in information communications and multimedia technology. In this paper, the design and implementation of a DLNA protocol inspection tool is presented for compatibility analysis among DLNA certified devices. The tool monitors the home network and performs analysis of the underlying protocols used by DLNA. The tool can be used for diagnostics and troubleshooting, enabling the user to identify compatibility issues between devices or problems in the network.

서열 정렬 기법을 이용한 악성코드 유사도 분석의 성능 개선 (Improvement of Performance of Malware Similarity Analysis by the Sequence Alignment Technique)

  • 조인겸;임을규
    • 정보과학회 컴퓨팅의 실제 논문지
    • /
    • 제21권3호
    • /
    • pp.263-268
    • /
    • 2015
  • 변종 악성코드는 그 기능에 있어 차이가 없으나 구조적인 차이가 존재하는 악성코드로, 같은 그룹으로 분류하여 처리하는 것이 유용하다. 변종 악성코드 분석을 위해 본 논문에서는 바이오인포매틱스 분야에서 사용하는 서열 정렬 기법을 사용하여 악성코드들의 API 호출 정보 간의 공통부분을 찾고자 하였다. 서열 정렬 기법은 API 호출 정보의 길이에 대해 의존적인 성능을 가지며, API 호출 정보의 길이가 커짐에 따라 성능이 매우 떨어진다. 따라서 본 논문에서는 서열 정렬 기법 적용 이전에 API 호출 정보에서 발견되는 반복 패턴을 제거하는 방법을 적용함으로써 성능이 보장될 수 있도록 하였다. 최종적으로 서열 정렬 기법을 통한 악성코드 간의 유사도를 구하는 방법에 대하여 논하였다. 또한 실제 악성코드 샘플에 대한 실험 결과를 제시하였다.

Two Factor Authentication for Cloud Computing

  • Lee, Shirly;Ong, Ivy;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • 제8권4호
    • /
    • pp.427-432
    • /
    • 2010
  • The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.

활동기준 경영기법에 의한 전사적 자원관리에 관한 연구 (Study on Enterprise Resources Planning by Activity Based Management Method)

  • 이장형
    • 경영과정보연구
    • /
    • 제2권
    • /
    • pp.209-235
    • /
    • 1998
  • Traditional cost system is distorted due to the using unit-based measure. It is being criticized that it do a poor job of attributing the expenses of support resources to the production and sales of individual product. Activity Based Cost System expend the range of second-stage cost assignment drivers beyond the traditional measures of labor and machine times, units produced, and material quantities to allow for drivers that measure the amount of batch-level, product-sustaining, and facility-sustaining activities performed. It is a resources consumption model of organization, not just a more complex cost accounting of cost allocation system. This paper proposes a enterprise resource planning by activity based management. To effective performance system for company that want to be setting competitive levels, the information systems must support a fast moving, rapidly changing. Activity based management is a process of accumulating and tracing cost and performance da to a firm's activities and providing feedback of actual results against the planned cost to initiate corrective action where required. Therefore this system provides a highly powerful decision-making tool. To construct this system, we need Enterprise Resource Planning System. Since ERP is designed around the idea that rapid change and a degree of unhandled change is normal, it allows driving the customer's rapidly needs much deeper through the business cycle.

  • PDF

AES 암호 알고리즘 교육용 학습 프로그램 개발 (Development of Education Learning Program for AES Cryptography Algorithm)

  • 이동범;정명수;곽진
    • 컴퓨터교육학회논문지
    • /
    • 제14권4호
    • /
    • pp.53-61
    • /
    • 2011
  • 최근 급변하고 있는 시대에 맞춰 IT 관련 분야에서는 정보보호에 대한 중요성이 강조되고 있다. 정보보호 관련 기관에서는 관련 정책을 통해 개인정보보호 및 보안의 중요성을 강조하고 있지만, 아직까지 일부 업체나 개인 사용자들은 보안 의식이 매우 저조한 수준이다. 이에 본 논문에서는 사용자들의 보안의식을 제고시키기 위하여 대칭 블록 암호인 AES를 이용한 학습 프로그램을 개발하여 사용자들이 암호 알고리즘에 대해 쉽게 이해할 수 있도록 한다. 즉, AES 암호 알고리즘 교육용 학습 프로그램을 통해 암호화 및 복호화 되는 과정을 직접 확인할 수 있어 AES 암호에 대한 관심을 유발하고 정보보호에 대한 의식을 제고시키고자 한다.

  • PDF

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권12호
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

실내 위치 추정 시스템의 설치비용 최소화와 위치 정확도 개선에 대한 연구 (A Study on Improvement of Location Accuracy and Indoor location estimation system to minimize installation costs)

  • 염진영;강동조;박현주
    • 한국정보통신학회논문지
    • /
    • 제16권5호
    • /
    • pp.1083-1094
    • /
    • 2012
  • 현재 상용화 되어 있는 위치 추정 시스템은 높은 정확도로 다양한 서비스에 폭넓게 사용되고 있다. 그러나 위치추정 시스템은 실내에서 완벽하게 설치하지 않을 경우 위치 추정 정확도가 매우 좋지 않은 경향을 보인다. 본 논문에서는 Location Fingerprint 기법을 활용하여 완벽하게 설치되지 않은 위치 추정 시스템으로부터 얻은 위치 정보를 보정하여 객체의 위치 정확도를 향상시켜 설치비용을 최소화할 수 있는 실내 위치 추정 알고리즘을 제안한다. 본 논문에서는 실내 환경에서 우수한 위치 정밀도를 제공하는 UWB 기반의 Ubisense 시스템을 활용하였다. 결론적으로, 본 논문에서는 위치 추정 시스템에서 측정한 객체의 위치 정보를 보정함으로써 위치 정확도를 향상시킬 수 있었다.

평남과 전북지역 초등학교 영양사의 인터넷 및 식생활정보 이용실태 (The Status of the Utilization Internet and Dietary Information by Elementary School Dietitians in the Gyeongnam and Jeonbuk Areas)

  • 허은실;이경혜
    • 대한지역사회영양학회지
    • /
    • 제8권4호
    • /
    • pp.595-602
    • /
    • 2003
  • This study was carried out to investigate the status of the utilization of internet and dietary information by elementary school dietitians (total = 201) The results were summarized as follows: All subjects used the internet regularly and the major purpose they mentioned for using it was ″data search″ (72.3%). Those having a frequency of using the internet 6 to 7 times per week were 46.7% of the subjects and the majority indicated the duration of their use of the internet was ″〈 2 hours″ (68.5%). They mainly used the internet at ″school″ (81.8%) , and their favorite search engines were ″Daum″ (41.1%) and ″Yahoo″ (34.7%). They stated that the organization that offered reliable internet information were those ″related to society and organizations″ (36.9%) and ″educational institutions″ (33.8%). Ninety-five percent of the subjects searched for dietary information mainly ″for public affairs″ (80.0%) Their degree of satisfaction when searching for information was high (78.7%). Those dissatisfied with internet sites when searching for dietary information give the following reasons: ″poor information″ (39.1%) and ″slow updates″ (25.4%). They acquired information on nutrition and health management mainly through ″the internet″ (63.6%) The most frequently requested information about public affairs was on ″Materials for nutritional education″ (38.6%) and ″up-to-date nutritional information″ (16.0%) . The desirable update periods for websites was ″1 -3 months″ (51.8%) and ″ < 1 month″ (30.6%), and the favorite site colors were ″blue″ (37.8%) and ″green″ (37.8%). The results of this study showed that, although the internet usage was high, the dietitians were dissatisfied with the information obtained. Therefore, the information donors should find out what kind of dietary information is needed by elementary school dietitians. (Korean J Community Nutrition 8(4) : 595-602, 2003)

Implementation of interactive Stock Trading System Using VoiceXML

  • Shin Jeong-Hoon;Cho Chang-Su;Hong Kwang-Seok
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 ICEIC The International Conference on Electronics Informations and Communications
    • /
    • pp.387-390
    • /
    • 2004
  • In this paper, we design and implement practical application service using VoiceXML. And we suggest new solutions of problems can be occurred when implementing a new systems using VoiceXML, based on the fact. Up to now, speech related services were developed using API (Application Program Interface) and programming languages, which methods depend on system architectures. It thus appears that reuse of contents and resource was very difficult. To solve these problems, nowadays, companies develop their applications using VoiceXML. Advantages of using VoiceXML when developing services are as follows. First, we can use web developing technologies and technologies for transmitting web contents. And, we can save labors for low level programming like C language or Assembler language. And we can save labors for managing resources, too. As the result of these advantages, we can reduce developing hours of applications services and we can solve problem of compatibility between systems. But, there's poor grip of actual problems can be occurred when implementing their own services using VoiceXML. To overcome these problems, we implemented interactive stock trading system using VoiceXML and concentrated our effort to find out problems when using VoiceXML. And then, we proposed solutions to these problems and analyzed strong points and weak points of suggested system.

  • PDF