http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
An Efficient Compression Method in Wireless Sensor Networks
Byoungyup Lee,Myoungho Yeo,Kyungsoo Bok,Jaesoo Yoo 보안공학연구지원센터 2014 International Journal of Multimedia and Ubiquitous Vol.9 No.11
Sensor data exhibit strong correlation in both space and time. Many algorithms have been proposed to utilize these characteristics. However, each sensor just utilizes neighboring information, because its communication range is restrained. Information that includes the distribution and characteristics of whole sensor data provides other opportunities to enhance the compression technique. In this paper, we propose an orthogonal approach for compressing sensor readings based on a novel feedback technique. That is, the base station or a super node generates Huffman code for the compression of sensor data and broadcasts it into sensor networks as Huffman code. All sensor nodes that have received the information compress their sensor data and transmit them to the base station. We call this approach as feedback-diffusion and this modified Huffman coding as sHuffman coding. In order to show the superiority of our approach, we compare it with the existing data compression algorithms in terms of the lifetime of the sensor network. As a result, our experimental results show that the whole network lifetime was prolonged by about 30%.
An Efficient Social Search Method Based on Location and User Preferences in Mobile Environments
Byoungyup Lee,Minje Ahn,Jongtae Lim,Kyungsoo Bok,Jaesoo Yoo 보안공학연구지원센터 2015 International Journal of Multimedia and Ubiquitous Vol.10 No.12
Due to advances in mobile networks and smartphone popularity in recent years, users can now connect to the internet anytime from anywhere and social searches are becoming popularly. Unlike conventional web searches, the social search provides optimal search results according to user preferences. In this paper, we propose a mobile social search method based on popularities and user preferences. The popularity is calculated by collecting the visiting records of users. The user preferences are generated by the actual visiting information among the search results. We process a skyline query to extract the meaningful information from the candidate objects with multiple features. The proposed method ranks social search results by combining user preferences and popularity with the skyline query processing mechanism. To show the superiority of the proposed method, we compare it with the existing method through performance evaluation.
최정훈, 이병엽 배재대학교 공학연구소 2019 공학논문집 Vol.21 No.1
현대 사회에서 인터넷은 기업의 필수 기술이 되었다. 이에 따라, 대부분의 기업에서 기업 홍보 및 고객정보 수집을 위한, 다양한 웹사이트가 불특정 다수의 고객들에게 오픈되어 있고, 기업에서는 비즈니스를 위하여, 고객의 다양한 정보를 수집하고 있다. 개인정보의 중요성이 커짐과 동시에 해커들의 공격 초점도 지속적으로 애플리케이션 계층으로 이동하여, 개인정보를 탈취하는 부분에 집중되고 있다. 따라서 개인정보를 보호하는 보안 기술 및 관리 프로세스에 대한 지속적인 보완은 기업의 필수 불가결한 요소가 되었고, 정부에서도 이런 트렌드를 반영하여, 개인정보보호법 및 정보통신망법에서 개인정보 보호를 언급하며, 다양한 규제 조치를 마련하였다. 기업은 개인정보의 보호를 위해 다양한 방안들을 마련해 이러한 규제를 준수하여야 하며, 기업 내부에 관리중인 개인정보에 대해 보안을 강화하여야만 한다. 이에 다수의 개인정보들이 저장되는 DB의 암호화 아키텍처를 비교 하고, 법 규제를 준수 하는 암호화 알고리즘을 분석하여, 데이터 보안을 확보하기 위한 방안을 마련할 필요가 있다, 본 논문은 법률상 강화된 개인정보보호 기준에 맞는 기술적 관리적인 보호 조치를 정리하고, 기존 DB암호화 솔루션의 기술적 아키텍처을 비교 분석하였으며, 개인정보의 속성에 따른 암호화 알고리즘 구현 및 키관리 기능을 중앙화 하는 방식을 제안 하여, 개인정보를 저장하는 시스템 구축 시 사용이 편리하면서도 안전한 보안을 제공하는 시스템을 구축하고자 한다. In modern society, the Internet has become an essential technology for corporations. Accordingly, in most companies, various websites are opened to a large number of unspecified customers for corporate promotion and customer information collection, and companies collect various information of customers for business. As personal information grows in importance, hacker attacks continue to shift to the application layer, focusing on stealing personal information. Therefore, the continuous supplementation of security technology and management process to protect personal information has become an indispensable element of the company, and the government reflects this trend, referring to the protection of personal information in the Personal Information Protection Act and the Network Act, and It provides a wide range of regulatory measures. Companies must prepare various measures to protect personal information to comply with these regulations, and strengthen the security of personal information under management. Therefore, it is necessary to prepare a plan to secure data security by comparing the encryption architecture of DB where a large number of personal information is stored, and analyzing encryption algorithms that comply with laws and regulations. It summarizes the technical management protection measures that meet the protection criteria, compares and analyzes the technical architecture of the existing DB encryption solution, proposes a method to centralize the encryption algorithm and key management functions according to the properties of personal information, and stores the personal information. When constructing a system, we want to build a system that provides safe and convenient security.