• Title/Summary/Keyword: Access and evaluation

Search Result 1,100, Processing Time 0.039 seconds

Private Blockchain-Based Secure Access Control for Smart Home Systems

  • Xue, Jingting;Xu, Chunxiang;Zhang, Yuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6057-6078
    • /
    • 2018
  • Smart home systems provide a safe, comfortable, and convenient living environment for users, whereby users enjoy featured home services supported by the data collected and generated by smart devices in smart home systems. However, existing smart devices lack sufficient protection in terms of data security and privacy, and challenging security and privacy issues inevitably emerge when using these data. This article aims to address these challenging issues by proposing a private blockchain-based access control (PBAC) scheme. PBAC involves employing a private blockchain to provide an unforgeable and auditable foundation for smart home systems, that can thwart illegal data access, and ensure the accuracy, integrity, and timeliness of access records. A detailed security analysis shows that PBAC could preserve data security against various attacks. In addition, we conduct a comprehensive performance evaluation to demonstrate that PBAC is feasible and efficient.

Comprehensive Evaluation of Impacts of Connecting Distributed Generation to the Distribution Network

  • Jin, Wei;Shi, Xuemei;Ge, Fei;Zhang, Wei;Wu, Hongbin;Zhong, Chengyuan
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.621-631
    • /
    • 2017
  • In this paper, we study the various impacts of connecting distributed generation (DG) to the distribution network. The comprehensive evaluation index system (CEIS) of four hierarchies is established, considering economy, reliability and voltage quality, and the calculation methods of different indexes are presented. This paper puts forward an improved triangular fuzzy number analytic hierarchy process (ITFNAHP) to weight the second level indexes (SLI) and the third level indexes (TLI), and calculates the variation coefficient to weight the fourth level indexes (FLI). We calculate the comprehensive weight coefficients based on the weight coefficients of the SLI, TLI and FLI, and then calculate the comprehensive evaluation of satisfaction (CES) of different access schemes. On the basis of the IEEE 33-bus example system, simulations of the calculation methods and the comprehensive evaluation method are carried out under different DG access schemes according to the same total investment cost and the same permeability, respectively, and the simulation results are analyzed and discussed.

Performance Analysis and Power Allocation for NOMA-assisted Cloud Radio Access Network

  • Xu, Fangcheng;Yu, Xiangbin;Xu, Weiye;Cai, Jiali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1174-1192
    • /
    • 2021
  • With the assistance of non-orthogonal multiple access (NOMA), the spectrum efficiency and the number of users in cloud radio access network (CRAN) can be greatly improved. In this paper, the system performance of NOMA-assisted CRAN is investigated. Specially, the outage probability (OP) and ergodic sum rate (ESR), are derived for performance evaluation of the system, respectively. Based on this, by minimizing the OP of the system, a suboptimal power allocation (PA) scheme with closed-form PA coefficients is proposed. Numerical simulations validate the accuracy of the theoretical results, where the derived OP has more accuracy than the existing one. Moreover, the developed PA scheme has superior performance over the conventional fixed PA scheme but has smaller performance loss than the optimal PA scheme using the exhaustive search method.

Performance Evaluation of a High-Speed LAN using a Dual Mode Switching Access Protocol (이중 모드 스윗칭 억세스 프로토콜을 이용한 고속 근거리 통신망의 성능평가)

  • 주기호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.10
    • /
    • pp.2620-2633
    • /
    • 1996
  • In this paper, a new high-speed local area network using a dual mode switching access (DMSA) protocol implemented on a dual unidirectional bus is described. By utilizing the implicit positionalordering of stations on a unidirectional bus, the proposed system switches between random access mode and the token access model withoug unnecessary delay. Therefore, unlike other hybrid systems such as Buzz-net and Z-net, DMSA does not show a rapid degradation in performance as the load increases. We obtain the average channel utilization and the average access delay by using a simplified analytic model. The numerical results obtained via analysis are compared to the simulation resuls for a partial validation of the approximate model. The performance characteristics of DMSA are superior delay-throughput characteristics at light and medium loads, compared to compared to other LAN systems, and the capability of providing a single active station with full capabity of the channel.

  • PDF

Development and Application of an Evaluation Model for Urban Biotope Appraisal (도시 비오톱의 자연체험 가치 평가모형의 개발과 적용)

  • 나정화;류연수
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.30 no.3
    • /
    • pp.1-11
    • /
    • 2002
  • The purpose of this study is to construct an evaluation criteria based on the relative importance and various combinations of each evaluation index and then to appraise urban biotope in terms of nature experience and recreation. After the standard of evaluation had been developed through the review of existing literature, the relative importance of the evaluation index through expert survey was determined, and the evaluation model to assess biotope value was established. The results of this study are as follows; 1) We have constructed the seventeen evaluation criteria through literature reviews, and have provided relative importance to each evaluation index of the natural in biotope, the diversity of landscape patterns, the appearance-existence of water space, the special landscape elements, and the access based on the results of expert survey. and then we have constructed an evaluation system using the relative importance criteria. 2) To evaluate urban biotope using the evaluation system constructed, we selected 14 sites. The final evaluation results of each site is as follows; The first grade areas are the water space with semi-natural style in front of Gangchon Woobang apartments, the forest zone near Page Temple at Mt. Palgong, the edge area of Jisan and Gosan and the tendril yard against Anshim middle school. The second grade areas are Hyomyung elementary school, the farm land behind the third Anshim Jugong apartment, Ehyun put and the swampy land in front of the Kangchon and Anshim construction site. The third grade areas are Seohan and Hwasung high-rise apartments at Beummul-Dong, the Korea Manpower Agency in the Sungseo industrial zone, and the adjacent area of St. Tongil. The only fourth grade area is the commercial zone near Taegu Department Store. 3) It is highly useful to evaluate urban biotope using the evaluation criteria constructed for this research, the evaluation criteria we developed may be difficult to encompass all expert opinion and the period of space-formation is difficult to estimate urban biotopes. In the future, it is necessary to gather the basic data suitable to estimate biotope and it is necessary to develop detailed evaluation criteria applicable to estimate every biotope that has specific property.

A Performance Evaluation System of the SOTDMA Algorithm for AIS (AIS용 SOTDMA 알고리즘 성능평가 시스템)

  • 김승범;임용곤;이상정
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.765-768
    • /
    • 2001
  • A universal shipborne automatic identification system(AIS) uses self-organised time division multiple access(SOTDMA). The performance evaluation system of the SOTDMA algorithm for AIS is needed to implement it efficiently. This paper shows the method of designing it. Real ships access the VHF maritime mobile band but in this performance system, several ship objects access the shared memory. Real ships are designed as the object and the wireless communication channel is designed as the shared memory. This system shows several stations are assigned the transmission slot by the SOTDMA algorithm

  • PDF

Performance Characteristic of the β-Human Chorionic Gonadotropin Assay on the Access 2 for Its Use in Doping Control

  • Kang, Min-Jung;Lee, Hye-Im;Shin, Sang-Mi;Yoo, Hye-Hyun;Kwon, Oh-Seung;Jin, Chang-Bae;Chung, Bong-Chul
    • Bulletin of the Korean Chemical Society
    • /
    • v.31 no.10
    • /
    • pp.2889-2892
    • /
    • 2010
  • The objective of this study was to validate performance characteristics of the Access 2 (Beckman coulter) system for hCG assays for use as a confirmation test for doping control. The Access 2 assay was linear up to 500 IU/L. The correlation coefficient was higher than 0.999, and the sensitivity of the linearity was 0.82. There were no false positive or false negative cases. LOD was 0.59 IU/L. The method was robust when performed by different people. Repeatability and reproducibility were below 7%. We compared reproducibility and recoveries of Access 2 and Elecsys 2010. Access 2 demonstrated higher reproducibility than Elecsys 2010. Recoveries (accuracy) of Access 2 were between 85 and 105%. Recoveries for Elecsys 2010 were between 91 and 104%.

Access Control for D2D Systems in 5G Wireless Networks

  • Kim, Seog-Gyu;Kim, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.103-110
    • /
    • 2021
  • In this paper, we compare two access control mechanisms for D2D(Device-to-Device) systems in 5G wireless networks and propose an effective access control for 5G D2D networks. Currently, there is no specified access control for 5G D2D networks but there can be two access control approaches for 5G D2D networks. One is the UE-to-Network Relay based access control and the other is the Remote UE(User Equipment) based access control. The former is a UE-to-Network Relay carries out the access control check for 5G D2D networks but the latter is a Remote UE performs the access control check for 5G D2D networks. Through simulation and evaluation, we finally propose the Remote UE based access control for D2D systems in 5G wireless networks. The proposed approach minimizes signalling overhead between the UE-to-Network Relay and the Remote UE and more efficiently performs the access control check, when the access control functionalities are different from the UE-to-Network Relay in 5G D2D networks.

Crowdsourced Risk Minimization for Inter-Application Access in Android

  • Lee, Youn Kyu;Kim, Tai Suk
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.827-834
    • /
    • 2017
  • Android's inter-application access enriches its application ecosystem. However, it exposes security vulnerabilities where end-user data can be exploited by attackers. While existing techniques have focused on minimizing the risks of inter-application access, they either suffer from inaccurate risk detection or are primarily available to expert users. This paper introduces a novel technique that automatically analyzes potential risks between a set of applications, aids end-users to effectively assess the identified risks by crowdsourcing assessments, and generates an access control policy which prevents unsafe inter-application access at runtime. Our evaluation demonstrated that our technique identifies potential risks between real-world applications with perfect accuracy, supports a scalable analysis on a large number of applications, and successfully aids end-users' risk assessments.

A Study on Security Model Design of Adaptive Access Control based Context-Aware (상황인식 기반 적응적 접근제어 보안모델 설계에 관한 연구)

  • Kim, Nam-Il;Kim, Chang-Bok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.211-219
    • /
    • 2008
  • This paper is proposed context-aware based access control, model by extending original access control model. In this paper, we survey the recent researches about security model based context-aware such as xoRBAC and CAAC. For exactly policy evaluation, we make an addition Context Broker and Finder in existing CAAC security model. By this security model, Context information and context decision information is able to be collected easily for more correct policy decision. This paper controlled access of possible every resources that is able to access by user's event and constraint from primitive access resources. In this paper proposed security model can be offer dynamically various security level and access authority method alone with specified policy and constraint adjustment at user's role.

  • PDF