• Title/Summary/Keyword: Active user identification

Search Result 15, Processing Time 0.029 seconds

A Novel Active User Identification Method for Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.212-216
    • /
    • 2022
  • Space based constellation network is a kind of ad hoc network in which users are self-organized without center node. In space based constellation network, users are allowed to enter or leave the network at any given time. Thus, the number of active users is an unknown and time-varying parameter, and the performance of the network depends on how accurately this parameter is estimated. The so-called problem of active user identification, which consists of determining the number and identities of users transmitting in space based constellation network is discussed and a novel active user identification method is proposed in this paper. Active user identification code generated by transmitter address code and receiver address code is used to spread spectrum. Subspace-based method is used to process received signal and judgment model is established to identify active users according to the processing results. The proposed method is simulated under AWGN channel, Rician channel and Rayleigh channel respectively. Numerical results indicate that the proposed method obtains at least 1.16dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Personal Identification Based on Radio Signal Strength for Ubiquitous Healthcare Systems

  • Lee, Jong-Shill;Park, Sang-Hae;Chee, Young-Joon;Kim, In-Young;Kim, Sun-I.
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.3
    • /
    • pp.325-331
    • /
    • 2007
  • Personal identification is essential for the automatic measurement of biosignal information in home healthcare systems. Personal identification is usually achieved with passive radio frequency identification (RFID), which does little more than store a unique identification number. However, passive RFID is not ideal for automatic identification. We present a user identification system based on radio signal strength indication (RSSI) using ZigBee for active RFID tags. Personal identification is achieved by finding the largest RSSI value from aggregated beacon messages that are periodically transmitted by active RFID tags carried by users. Obtaining reliable person!'.! identification without restricting the orientation requires a certain distance between the closest active RFID tag from the ZED and the second closest tag. The results show that the closest active RFID tag from the ZED and the second closest tag must be at least 70 cm apart to achieve reliable personal identification.

Developing an integrated software solution for active-sensing SHM

  • Overly, T.G.;Jacobs, L.D.;Farinholt, K.M.;Park, G.;Farrar, C.R.;Flynn, E.B.;Todd, M.D.
    • Smart Structures and Systems
    • /
    • v.5 no.4
    • /
    • pp.457-468
    • /
    • 2009
  • A novel approach for integrating active sensing data interrogation algorithms for structural health monitoring (SHM) applications is presented. These algorithms cover Lamb wave propagation, impedance methods, and sensor diagnostics. Contrary to most active-sensing SHM techniques, which utilize only a single signal processing method for damage identification, a suite of signal processing algorithms are employed and grouped into one package to improve the damage detection capability. A MATLAB-based user interface, referred to as HOPS, was created, which allows the analyst to configure the data acquisition system and display the results from each damage identification algorithm for side-by-side comparison. By grouping a suite of algorithms into one package, this study contributes to and enhances the visibility and interpretation of the active-sensing methods related to damage identification. This paper will discuss the detailed descriptions of the damage identification techniques employed in this software and outline future issues to realize the full potential of this software.

A study on the User Experience and Aggressive Action in Violent Video Game (폭력적 비디오게임의 사용자 경험과 공격행동성에 대한 연구)

  • Yun, Ju-Sung;Noh, Ghee-Young
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.215-226
    • /
    • 2015
  • As violent video game is used based on active interaction and involvement of users, it is widely thought that it may have more effect on individual violence and aggressive action than existing violent videos. This study aimed to examine the effect of user experiences in the violent video game such as hostility, anger, arousal, enjoyment and identification on users' aggressive action. For this purpose, the first person FPS shooting game that consists of violent contents was employed to carry out playtest for 80 subjects with 40 male and 40 female university students. As a result, it was found that the user's arousal level, state anger, enjoyment and identification experience by the use of violent video game had an effect on aggressive action. Among factors that have aggressive action in the used of violent video game, besides emotion and arousal, the level of identification with a game character was found to be important effect factor. Hostility factor that was assumed to have effect on aggressive action was not significant, but enjoyment of game was proved to have effect on aggressive action of users.

Identification with avatar and self-reference effects: Impact on perceived attributes and purchase intentions (아바타와의 동일시가 가상 패션 아이템 속성 지각 및 구매의도에 미치는 영향)

  • Woojin Choi;Yuri Lee
    • Journal of Fashion Business
    • /
    • v.28 no.2
    • /
    • pp.1-14
    • /
    • 2024
  • Within the metaverse platform, users engage in communication with others through 'avatars' reflecting their own identities. Users experience various virtual fashion items through avatars, and the fashion industry anticipates avatars wearing virtual fashion items as an emerging business opportunity. Many fashion brands are currently releasing virtual fashion items specifically designed for avatars. In this study, we examined the impact of user identification with their avatar on their perception of the attributes of virtual fashion items (investment attractiveness, scarcity, playfulness, and aesthetics) and its influence on behavioral intentions. The research involved a survey of 250 females with prior knowledge of the metaverse. Structural equation modeling analysis was conducted to examine research hypotheses and validate the model. The results confirmed that as users within the metaverse perceive greater identification with their avatar, they also perceive the attributes of virtual fashion items more favorably. This finding affirms the self-reference effect, where users positively evaluate objects associated with themselves. Additionally, perceiving the attributes of virtual fashion items was found to be positively linked to purchase intentions for virtual products and actual interest in the brand. Lastly, a higher intention to purchase virtual fashion items was associated with forming a more favorable attitude toward the respective brand. Consequently, this study provides academic and practical implications for marketing strategies within the metaverse, emphasizing the active utilization of avatars and elements that facilitate user-avatar identification for effective engagement.

A Multimodal Fusion Method Based on a Rotation Invariant Hierarchical Model for Finger-based Recognition

  • Zhong, Zhen;Gao, Wanlin;Wang, Minjuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.131-146
    • /
    • 2021
  • Multimodal biometric-based recognition has been an active topic because of its higher convenience in recent years. Due to high user convenience of finger, finger-based personal identification has been widely used in practice. Hence, taking Finger-Print (FP), Finger-Vein (FV) and Finger-Knuckle-Print (FKP) as the ingredients of characteristic, their feature representation were helpful for improving the universality and reliability in identification. To usefully fuse the multimodal finger-features together, a new robust representation algorithm was proposed based on hierarchical model. Firstly, to obtain more robust features, the feature maps were obtained by Gabor magnitude feature coding and then described by Local Binary Pattern (LBP). Secondly, the LGBP-based feature maps were processed hierarchically in bottom-up mode by variable rectangle and circle granules, respectively. Finally, the intension of each granule was represented by Local-invariant Gray Features (LGFs) and called Hierarchical Local-Gabor-based Gray Invariant Features (HLGGIFs). Experiment results revealed that the proposed algorithm is capable of improving rotation variation of finger-pose, and achieving lower Equal Error Rate (EER) in our homemade database.

New Mobile Terminated Protocol for User Privacy Protection in Mobile Communication Environments (이동통신 환경에서 사용자 프라이버시 보호를 위한 새로운 이동 착호프로토콜)

  • Kim, Soon-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.12
    • /
    • pp.2193-2201
    • /
    • 2006
  • In related to mobile communication environment. Kesdogan and Pfitzmann[1,2,3] proposed solutions using temporary pseudonym identification, called TP(Temporary Pseudonym) to solve the problems concerning current locations of mobile users and exposure of their movements in the privacy aspect. After that, we proposed more improved method protecting mobile users from active attacks of network providers in [4]. But it is the case that mobile users are located in only home domain. As a more extended method. we propose new mobile terminated protocol protecting user privacy in case of moving from the home domain to the remote domain and analyze its security.

Certificate-based SSO Protocol Complying with Web Standard (웹 표준을 준수하는 인증서기반 통합 인증 프로토콜)

  • Yun, Jong Pil;Kim, Jonghyun;Lee, Kwangsu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1466-1477
    • /
    • 2016
  • Public key infrastructure(PKI), principle technology of the certificate, is a security technology providing functions such as identification, non-repudiation, and anti-forgery of electronic documents on the Internet. Our government and financial organizations use PKI authentication using ActiveX to prevent security accident on the Internet service. However, like ActiveX, plug-in technology is vulnerable to security and inconvenience since it is only serviceable to certain browser. Therefore, the research on HTML5 authentication system has been conducted actively. Recently, domestic bank introduced PKI authentication complying with web standard for the first time. However, it still has inconvenience to register a certification on each website because of same origin policy of web storage. This paper proposes the certificate based SSO protocol that complying with web standard to provide user authentication using certificate on several sites by going around same origin policy and its security proof.

Analysis & defence of detection technology in network Attacker (네트워크 침입자탐지기법 분석과 대응)

  • Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.155-163
    • /
    • 2013
  • Connection hijacking attack using the vulnerability of the TCP protocol to redirect TCP stream goes through your machine actively (Active Attack). The SKEY such as one-time password protection mechanisms that are provided by a ticket-based authentication system such as Kerberos or redirection, the attacker can bypass.Someone TCP connection if you have access on TCP packet sniffer or packet generator is very vulnerable. Sniffer to defend against attacks such as one-time passwords and token-based authentication and user identification scheme has been used. Active protection, but these methods does not sign or encrypt the data stream from sniffing passwords over insecure networks, they are still vulnerable from attacks. For many people, an active attack is very difficult and so I think the threat is low, but here to help break the illusion successful intrusion on the UNIX host, a very aggressive attack is presented. The tools available on the Internet that attempt to exploit this vulnerability, known as the recent theoretical measures is required. In this paper, we propose analysis techniques on a wireless network intruder detection.

An Automatic Identification System of Biological Resources based on 2D Barcode and UCC/EAN-128 (2차원 바코드와 UCC/EAN-128을 이용한 생물자원 자동인식시스템)

  • Chu, Min-Seok;Ryu, Keun-Ho;Kim, Jun-Woo;Kim, Hung-Tae;Han, Bok-Ghee
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.861-872
    • /
    • 2008
  • As rapid development of computing environment, field of automatic identification research which interoperates with various physical objects and digital information is making active progress. Although the automatic identification system is widely used in various industries, application of automatic identification system in the field of medical health doesn't reach other industry. Therefore research in medical health supplies such as medical equipment, blood, human tissues and etc is on progress. This paper suggests the application of automatic identification technology for biological resources which is core research material in human genome research. First of all, user environment requirements for the introduction of automatic identification technology are defined and through the experiments and research, barcode is selected as a suitable tag interface. Data Matrix which is 2D barcode symbology is chosen and data schema is designed based on UCC/EAN-128 for international defecto standard. To showapplicability of proposed method when applied to actual environment, we developed, tested and evaluated application as following methods. Experiments of barcode read time at 196 and 75 below zero which is actual temperature where biological resources are preserved resulted read speed of average of 1.6 second and the data schema satisfies requirements for the biological resources application. Therefore suggested method can provide data reliability as well as rapid input of data in biological resources information processing.