• Title/Summary/Keyword: Closed access

Search Result 179, Processing Time 0.028 seconds

A Study on The Hybrid Acquisition Performance of MC DS-CDMA Over Multipath Fading Channel (다중경로 환경에서 MC DS-CDMA시스템의 직.병렬 혼합 동기 획득에 관한 연구)

  • Kim, Won-Sbu;Kim, Kyung-Won;Park, Jin-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1968-1976
    • /
    • 2007
  • This paper proposes a hybrid pseudo-noise (PN) code acquisition scheme for Multicarrier Direct Sequence - Code Division Multiple Access (MC DS-CDMA) mobile communication systems on the code acquisition performance for Nakagami-m fading channel. The hybrid acquisition scheme combines parallel search with serial search to cover the whole uncertainty region of the input code phase. It has a much simpler acquisition hardware structure than the total parallel acquisition and can achieve the mean acquisition time (MAT) slightly inferior to that of the total parallel acquisition. The closed-form expressions of the detection and false-alarm probabilities are derived.

On the Performance of All-optical Amplify-and-forward Relaying with a Backup Radio-frequency Link Over Strong Atmospheric Turbulence and Misalignment Fading

  • Altubaishi, Essam Saleh
    • Current Optics and Photonics
    • /
    • v.5 no.2
    • /
    • pp.114-120
    • /
    • 2021
  • Free-space optical (FSO) communication is considered to be a potential solution to congestion in the radio-frequency spectrum and last-mile-access bottleneck issues in future cellular communication networks, such as 5G and beyond. However, FSO link performance may degrade significantly due to irradiance fluctuations and random temporal fluctuations from atmospheric turbulence. Therefore, in this work the main objective is to reduce the effect of the atmospheric turbulence by considering a multihop FSO communication system with amplify-and-forward relaying supported by a radio-frequency (RF) link, which form a hybrid FSO/RF communication system. The FSO link is assumed to follow the gamma-gamma fading model, which represents strong turbulence. Also, the RF link is modeled by a Rayleigh distribution. The performance of the considered system, in terms of the outage probability and average bit-error rate (BER), is investigated and analyzed under various weather conditions and pointing errors. Furthermore, the effect of the number of employed relay nodes on the performance of the system is investigated. The results indicate that the considered system reduces outage probability and average BER significantly, especially for low channel quality. Finally, the closed-form expressions derived in this work are compared to the results of Monte Carlo simulations, for verification.

Performance Analysis of a Novel Distributed C-ARQ Scheme for IEEE 802.11 Wireless Networks

  • Wang, Fan;Li, Suoping;Dou, Zufang;Hai, Shexiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3447-3469
    • /
    • 2019
  • It is well-known that the cooperative communication and error control technology can improve the network performance, but most existing cooperative MAC protocols have not focused on how to cope with the contention process caused by cooperation and how to reduce the bad influence of channel packet error rate on the system performance. Inspired by this, this paper first modifies and improves the basic rules of the IEEE 802.11 Medium Access Control (MAC) protocol to optimize the contention among the multi-relay in a cooperative ARQ scheme. Secondly, a hybrid ARQ protocol with soft combining is adopted to make full use of the effective information in the error data packet and hence improve the ability of the receiver to decode the data packet correctly. The closed expressions of network performance including throughput and average packet transmission delay in a saturated network are then analyzed and derived by establishing a dedicated two-dimensional Markov model and solving its steady-state distribution. Finally, the performance evaluation and superiority of the proposed protocol are validated in different representative study cases through MATLAB simulations.

Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment

  • Jimin Ha;Jungho Kang;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.767-777
    • /
    • 2023
  • In modern society, user privacy is emerging as an important issue as closed-circuit television (CCTV) systems increase rapidly in various public and private spaces. If CCTV cameras monitor sensitive areas or personal spaces, they can infringe on personal privacy. Someone's behavior patterns, sensitive information, residence, etc. can be exposed, and if the image data collected from CCTV is not properly protected, there can be a risk of data leakage by hackers or illegal accessors. This paper presents an innovative approach to "machine learning based reversible chaotic masking method for user privacy protection in CCTV environment." The proposed method was developed to protect an individual's identity within CCTV images while maintaining the usefulness of the data for surveillance and analysis purposes. This method utilizes a two-step process for user privacy. First, machine learning models are trained to accurately detect and locate human subjects within the CCTV frame. This model is designed to identify individuals accurately and robustly by leveraging state-of-the-art object detection techniques. When an individual is detected, reversible chaos masking technology is applied. This masking technique uses chaos maps to create complex patterns to hide individual facial features and identifiable characteristics. Above all, the generated mask can be reversibly applied and removed, allowing authorized users to access the original unmasking image.

A study on old trees as they relate to the organization of space in Pusan -Attaching importance to the growth environment and arrangement form in space- (부산시 노거수의 공간구성에 관한 연구 -생육환경 및 배치형태를 중심으로-)

  • 김승환;김순희
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.24 no.2
    • /
    • pp.86-98
    • /
    • 1996
  • This study is intended to revaluate old tree, five of the shot of the Natural Monument and 66 shot trees under protection in the city at present. The study covers distribution, management of usage, investigation and research into various matters relating to the situation of old trees in Pusan. Because 60% of the old trees selected for protection is on private land, citizens have difficulty gaining access to them. Also space for growth is impinged on by various urban facilities. Some trees have problems of growth because the land is covered with cement and asphalt. As regards space for old trees, many places have been destroyed due to the lack of protection fences and the failure to establish a guidance board. Only 40% of the space has been set aside for rest. In these places the establishment of rest areas, benches and handy chairs is needed. And there are 20 holy places where people observe religious ceremonies. As for space security necessary for old trees according to trunk width, the minimum trunk width and availale area needed are more than 1:1.5, but less than 30% have the necessary space. The growth of many old trees is threatended because of the small apace for growth. The prescription of the boundary space is divided between inside and outside. This indicates the domain nature and space rank of the old tree. It can be classified into five forms for research purposes. The elements for prescription of critical space outside are connected with the security of space, and the elements relating to inside space portray the conditions for sensitive growth according to the institution and the ground conditions. The open and closed nature of old tree space has some connection with the relationship between usage and the intimacy of the user. Most of the spaces for old trees can't be used or are difficult to gain access to, so it is necessary to secure enough space for them. The 18 places, despite having easy access, are near farmland, hills or forest. So the intimacy factor is low, and the security of space of the old trees is not generally sufficient. Henceforth, it will be necessary to have security of area for old trees as well as maintenance control to protect them. Also the space should be used as a communal and recreation are in the city. It is the time to construct a landscaped area which people can easily approach, a place with a secure entrance where they can play, rest and converse.

  • PDF

A Study on the Blockchain-Based Access Control Using Random-List in Industrial Control System (산업제어시스템에서 랜덤리스트를 이용한 블록체인 기반 접근제어 방식에 관한 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.147-156
    • /
    • 2022
  • Industrial control systems that manage and maintain various industries were mainly operated in closed environment without external connection, but with the recent development of the Internet and the introduction of ICT technology, the access to the industrial control system of external or attackers has become easier. Such incorrect approaches or attacks can undermine the availability, a major attribute of the industrial control system, and violation of availability can cause great damage. In this paper, when issuing commands in an industrial control system, a verification group is formed using a random list to verify and execute commands, and a trust score technique is introduced that applies feedback to the verification group that conducted verification using the command execution result. This technique can reduce overhead generated by random generation in the process of requesting command verification, give flexibility to the verification process, and ensure system availability. For the performance analysis of the system, we measured the time and gas usage when deploying a smart contract, gas usage when verifying a command. As a result, we confirmed that although the proposed system generates a random list compared to the legacy system, there was little difference in the time when it took to deploy smart contract and that the gas used to deploy smart contract increased by about 1.4 times in the process of generating a random list. However, the proposed system does not perform random operations even though the operation of command verification and confidence score technique is performed together during the command verification process, thus it uses about 9% less gas per verification, which ensures availability in the verification process.

The "open incubation model": deriving community-driven value and innovation in the incubation process

  • Xenia, Ziouvelou;Eri, Giannaka;Raimund, Brochler
    • World Technopolis Review
    • /
    • v.4 no.1
    • /
    • pp.11-22
    • /
    • 2015
  • Globalization, increasing technological advancements and dynamic knowledge diffusion are moving our world closer together at a unique scale and pace. At the same time, our rapidly changing society is confronted with major challenges ranging from demographic to economic ones; challenges that necessitate highly innovative solutions, forcing us to reconsider the way that we actually innovate and create shared value. As such the linear, centralized innovation models of the past need to be replaced with new approaches; approaches that are based upon an open and collaborative, global network perspective where all innovation actors strategically network and collaborate, openly distribute their ideas and co-innovate/co-create in a global context utilizing our society's full innovation potential (Innovation 4.0 - Open Innovation 2.0). These emerging innovation paradigms create "an opportunity for a new entrepreneurial renaissance which can drive a Cambrian like explosion of sustainable wealth creation" (Curley 2013). Thus, in order to materialize this entrepreneurial renaissance, it is critical not only to value but also to actively employ this new innovation paradigms so as to derive community-driven shared value that stems from global innovation networks. This paper argues that there is a gap in existing business incubation model that needs to be filled, in that the innovation and entrepreneurship community cannot afford to ignore the emerging innovation paradigms and rely upon closed incubation models but has to adopt an "open incubation" (Ziouvelou 2013). The open incubation model is based on the principles of open innovation, crowdsourcing and co-creation of shared value and enables individual users and innovation stakeholders to strategically network, find collaborators and partners, co-create ideas and prototypes, share their ideas/prototypes and utilize the wisdom of the crowd to assess the value of these project ideas/prototypes, while at the same time find connections/partners, business and technical information, knowledge on start-up related topics, online tools, online content, open data and open educational material and most importantly access to capital and crowd-funding. By introducing a new incubation phase, namely the "interest phase", open incubation bridges the gap between entrepreneurial need and action and addresses the wantpreneurial needs during the innovation conception phase. In this context one such ecosystem that aligns fully with the open incubation model and theoretical approach, is the VOICE ecosystem. VOICE is an international, community-driven innovation and entrepreneurship ecosystem based on open innovation, crowdsourcing and co-creation principles that has no physical location as opposed to traditional business incubators. VOICE aims to tap into the collective intelligence of the crowd and turn their entrepreneurial interest or need into a collaborative project that will result into a prototype and to a successful "crowd-venture".

Changes in Toxicological Characteristics after Sales of Nonprescription Drugs in Convenience Stores (안전상비의약품 판매 이후 중독환자 특성 변화)

  • Kim, Chang Yeong;Lee, Eui Jung;Lee, Sung Woo;Kim, Su Jin;Han, Kap Su
    • Journal of The Korean Society of Clinical Toxicology
    • /
    • v.16 no.1
    • /
    • pp.42-48
    • /
    • 2018
  • Purpose: On November 15, 2012, sales of OTC (Over-The-Counter) drugs began at convenience stores, which changed the accessibility of some drugs. As a result, the exposure and access patterns of these drugs could have changed. In this study, we reviewed the changes in the characteristics of drug poisoning patients because of the reposition of nonprescription drugs according to the revised Pharmaceutical Affairs Act. Methods: A retrospective study was conducted to evaluate changes in characteristics of drug poisoning patients between 2008 and 2016. A registry was developed by an emergency medical center in a local tertiary teaching hospital, and patients who visited the center were enrolled in this registry. We compared two periods, from 2008 to 2012 (Pre OTC) and from 2013 to 2016 (Post OTC), for type of intoxicant, time from poisoning to visiting the emergency center, intention, psychiatric history, previous suicidal attempt, alcohol status, and emergency room outcomes. The primary outcome was the number of patients who took acetaminophen and NSAIDs (nonsteroidal anti-inflammatory drugs). Secondary outcomes were ICU admission rate, mortality rate, and number of patients who visited the ER when the pharmacy was closed after taking acetaminophen and NSAIDs (nonsteroidal anti-inflammatory drugs). Results: Among 1,564 patients, 945 and 619 patients visited the emergency room during pre and post OTC periods. The number of patients with acetaminophen and NSAIDs poisoning decreased from 9.2% to 6.1% (p=0.016). The ICU admission rate and mortality rate in the emergency room did not show significant results in the relevant patient groups, and so was the number of patients visiting ER when the pharmacy was closed taking acetaminophen and NSAIDs. Conclusion: Despite the sales of nonprescription drugs at convenience stores, the number of acetaminophen and NSAIDs poisoning patients decreased.

IBN-based: AI-driven Multi-Domain e2e Network Orchestration Approach (IBN 기반: AI 기반 멀티 도메인 네트워크 슬라이싱 접근법)

  • Khan, Talha Ahmed;Muhammad, Afaq;Abbas, Khizar;Song, Wang-Cheol
    • KNOM Review
    • /
    • v.23 no.2
    • /
    • pp.29-41
    • /
    • 2020
  • Networks are growing faster than ever before causing a multi-domain complexity. The diversity, variety and dynamic nature of network traffic and services require enhanced orchestration and management approaches. While many standard orchestrators and network operators are resulting in an increase of complexity for handling E2E slice orchestration. Besides, there are multiple domains involved in E2E slice orchestration including access, edge, transport and core network each having their specific challenges. Hence, handling of multi-domain, multi-platform and multi-operator based networking environments manually requires specified experts and using this approach it is impossible to handle the dynamic changes in the network at runtime. Also, the manual approaches towards handling such complexity is always error-prone and tedious. Hence, this work proposes an automated and abstracted solution for handling E2E slice orchestration using an intent-based approach. It abstracts the domains from the operators and enable them to provide their orchestration intention in the form of high-level intents. Besides, it actively monitors the orchestrated resources and based on current monitoring stats using the machine learning it predicts future utilization of resources for updating the system states. Resulting in a closed-loop automated E2E network orchestration and management system.

An Implementation Method of HB-Family Light-weight Authentication for Device Authentication between ECU (ECU간 기기인증을 위한 HB-Family 경량인증기법의 적용 방법)

  • Kim, Tae Su;Kim, Hyoseung;Woo, Samuel;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.593-607
    • /
    • 2013
  • The In-Vehicle-Networking(IVN) of modern cars is constituted by an small electronic control device called ECU. In the past, there was no way to be able to access the IVN of a driving car. so IVN has been recognized as a closed environment so there is no need to exist authentication protocol between devices which are to configure the internal network and to communicate with other devices. However, constant improvements made it possible to access the IVN in many different ways as the communication technology evolves. This possibility created a need for device authentication in IVN. HB-Family are representative authentication schemes in RFID environment which has similar restrictions to IVN. In this paper, we propose an implementation method of HB-Family for device authentication between ECU considering ECU has low computing power and the message field of CAN protocol has restricted size of 8 bytes. In order to evaluate the efficiency and availability of the authentication schemes adopted our method, we have evaluated the performance based on DSP-28335 device. Further, it was possible to improve the efficiency rate of at lest 10%, up to 36%, and we then analyze this result in various aspects of the IVN.