• Title/Summary/Keyword: Common number network

Search Result 210, Processing Time 0.064 seconds

Yi et al.'s Group Key Exchange Protocol : A Security Vulnerability and its Remediation (Yi등이 제안한 그룹 키 교환 프로토콜의 보안 취약성 및 개선 방법)

  • Lee, Young-Sook;Kim, Jee-Yeon;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.91-98
    • /
    • 2012
  • A group key exchange (GKE) protocol is designed to allow a group of parties communicating over a public network to establish a common secret key. As group-oriented applications gain popularity over the Internet, a number of GKE protocols have been suggested to provide those applications with a secure multicast channel. Among the many protocols is Yi et al.'s password-based GKE protocol in which each participant is assumed to hold their individual password registered with a trusted server. A fundamental requirement for password-based key exchange is security against off-line dictionary attacks. However, Yi et al.'s protocol fails to meet the requirement. In this paper, we report this security problem with Yi et al.'s protocol and show how to solve it.

A new method for optimal selection of sensor location on a high-rise building using simplified finite element model

  • Yi, Ting-Hua;Li, Hong-Nan;Gu, Ming
    • Structural Engineering and Mechanics
    • /
    • v.37 no.6
    • /
    • pp.671-684
    • /
    • 2011
  • Deciding on an optimal sensor placement (OSP) is a common problem encountered in many engineering applications and is also a critical issue in the construction and implementation of an effective structural health monitoring (SHM) system. The present study focuses with techniques for selecting optimal sensor locations in a sensor network designed to monitor the health condition of Dalian World Trade Building which is the tallest in the northeast of China. Since the number of degree-of-freedom (DOF) of the building structure is too large, multi-modes should be selected to describe the dynamic behavior of a structural system with sufficient accuracy to allow its health state to be determined effectively. However, it's difficult to accurately distinguish the translational and rotational modes for the flexible structures with closely spaced modes by the modal participation mass ratios. In this paper, a new method of the OSP that computing the mode shape matrix in the weak axis of structure by the simplified multi-DOF system was presented based on the equivalent rigidity parameter identification method. The initial sensor assignment was obtained by the QR-factorization of the structural mode shape matrix. Taking the maximum off-diagonal element of the modal assurance criterion (MAC) matrix as a target function, one more sensor was added each time until the maximum off-diagonal element of the MAC reaches the threshold. Considering the economic factors, the final plan of sensor placement was determined. The numerical example demonstrated the feasibility and effectiveness of the proposed scheme.

Customized Coupon Recommendation Model based on Fuzzy AHP Reflecting User Preference (사용자 선호도를 반영한 FUZZY-AHP 기반 맞춤형 쿠폰 추천 모델)

  • Sim, Weon-Ik;Lee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.395-401
    • /
    • 2014
  • As social network service becomes common, the consumers use many discount coupons with which they can purchase goods via social commerce. Although, the quantities of coupons offered from social commerce are currently on the sharp increase, customized coupon service that reflects user preference is not offered. This paper proposes a coupon service method reflecting user's subjective inclination targeting food coupons to offer customized coupon service for social commerce. Towards this end, this paper conducts hierarchization of the factors that become standard in selecting coupons including food types, food prices, discount rates and the number of buyers. And then, this study classifies, extracts and offers the coupons using Fuzzy-AHP, a decision making support method that reflects subjective inclination. From the user satisfaction results on the extracted coupons, the users are generally satisfied: very satisfactory with 45%, satisfactory with 33% and fair with 22%, and there was no experiment participant, who was dissatisfied.

A Study on the Improvement of DTW with Speech Silence Detection (음성의 묵음구간 검출을 통한 DTW의 성능개선에 관한 연구)

  • Kim, Jong-Kuk;Jo, Wang-Rae;Bae, Myung-Jin
    • Speech Sciences
    • /
    • v.10 no.4
    • /
    • pp.117-124
    • /
    • 2003
  • Speaker recognition is the technology that confirms the identification of speaker by using the characteristic of speech. Such technique is classified into speaker identification and speaker verification: The first method discriminates the speaker from the preregistered group and recognize the word, the second verifies the speaker who claims the identification. This method that extracts the information of speaker from the speech and confirms the individual identification becomes one of the most efficient technology as the service via telephone network is popularized. Some problems, however, must be solved for the real application as follows; The first thing is concerning that the safe method is necessary to reject the imposter because the recognition is not performed for the only preregistered customer. The second thing is about the fact that the characteristic of speech is changed as time goes by, So this fact causes the severe degradation of recognition rate and the inconvenience of users as the number of times to utter the text increases. The last thing is relating to the fact that the common characteristic among speakers causes the wrong recognition result. The silence parts being included the center of speech cause that identification rate is decreased. In this paper, to make improvement, We proposed identification rate can be improved by removing silence part before processing identification algorithm. The methods detecting speech area are zero crossing rate, energy of signal detect end point and starting point of the speech and process DTW algorithm by using two methods in this paper. As a result, the proposed method is obtained about 3% of improved recognition rate compare with the conventional methods.

  • PDF

A Cache Consistency Control for B-Tree Indices in a Database Sharing System (데이타베이스 공유 시스템에서 B-트리 인덱스를 위한 캐쉬 일관성 제어)

  • On, Gyeong-O;Jo, Haeng-Rae
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.593-604
    • /
    • 2001
  • A database sharing system (DSS) refers to a system for high performance transaction processing. In the DSS, the processing nodes are coupled via a high speed network and share a common database at the disk level. Each node has a local memory and a separate copy of operating system. To reduce the number of disk accesses, the node caches data pages and index pages in its memory buffer. In general, B-tree index pages are accessed more often and thus cached at more processing nodes, than their corresponding data pages. There are also complicated operations in the B-tree such as Fetch, Fetch Next, Insertion and Deletion. Therefore, an efficient cache consistency scheme supporting high level concurrency is required. In this paper, we propose cache consistency schemes using identifiers of index pages and page_LSN of leaf page. The propose schemes can improve the system throughput by reducing the required message traffic between nodes and index re-traversal.

  • PDF

An Authentication and Key Management Protocol for Secure Data Exchange in EPON MAC Layer (EPON MAC 계층의 안전한 데이터 전송을 위한 인증 및 키관리 프로토콜)

  • Kang, In-kon;Lee, Do-Hoon;Lee, Bong-Ju;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.1-10
    • /
    • 2003
  • An EPON which is going on standardization in IEEE 802.3ah, is tree topology consists of a OLT and multiple ONU using passive optical components, so this network is susceptible to variable security threats - eavesdropping, masquerading, denial of service and so on. In this paper, we design a security protocol supporting authentication and confidentiality services in MAC layer in order to prevent these security threats and to guarantee secure data exchange The designed security protocol introduce public-key based authentication and key management protocols for efficient key management, and choose Rijndael algorithm, which is recent standard of AES, to provide the confidentiality of EPON Proposed authentication and key management protocols perform authentication and public-key exchange at a time, and are secure protocols using derived common cipher key by exchanging public random number To implement the designed security protocol, we propose the procedures of authentication and public-key exchange, session key update, key recovery. This proposed protocol is verified using unknown session key, forward secrecy, unknown key-share, key-compromise impersonation.

Possibilities and Challenges in Education for Sustainable Development in Korean Universities - Focused on Curriculum, Partnership, and Sustainable University Management - (우리나라 대학에서의 지속가능발전교육의 가능성과 과제 - 교육 과정 파트너쉽, 지속가능한 대학 경영을 중심으로 -)

  • Lee, Sun-Kyung;Ju, Hyung-Son;Kim, Nam-Soo;Kim, Chan-Kook;Jang, Mee-Jeong;Kwon, Hye-Seon
    • Hwankyungkyoyuk
    • /
    • v.24 no.1
    • /
    • pp.88-101
    • /
    • 2011
  • This study aims to address the current status of ESD(Education for Sustainable Development) in Korean universities since UN DESD was launched in 2005, and to explore the possibilities and challenges in them. For this purpose we conducted questionnaire surveys and case studies on members of university communities which were engaged in green campus activities or interested in SD and ESD. Results of questionnaire surveys showed that most of those who answered the questionnaire were well aware of SD, but had comparatively low understanding of ESD. The highest number of respondents answered that since 2005 they had newly opened courses on SD or ESD, or added contents on SD or ESD to existing ones. Ratio of network participation among ESD-related universities was over 30%, and they appeared to have the highest partnership ratio with NGOs. Not many universities had policies for sustainable school management, and 'green space conservation and ecosystem protection' and 'energy and resource saving campaign and monitoring' were most common sustainable environment protection activities. Through case studies on eight universities, it was discovered that ESD programs in universities took various forms such as whole-university approaches, participatory courses and club activities. We suggest that it is needed to make efforts to find out good examples of ESD in Korean universities and share the results with university leaders, professors and staffs for further development of ESD.

  • PDF

VirtFrame: A Sniffing-based Throughput Estimation Scheme in IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜 환경에서의 스니핑 기반 전송률 측정 기법(VirtFrame)에 관한 연구)

  • Seo, Sung-Hoon;Baek, Jae-Jong;Kim, Dong-Gun;Song, Joo-Seok
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.187-194
    • /
    • 2011
  • IEEE 802.11 wireless LAN has become the center of attention for one of the most dominant wireless networking technologies nowadays. In densely deployed wireless LANs, mobile stations are exposed to a number of AP, thus it is needed to select the best AP to associate with. The most common approach is to select the AP with the highest received signal strength. However it does not consider traffic load imposed to each AP so that it may cause the poor network performance. Therefore, in this paper, we propose a throughput estimation scheme for neighboring APs by sniffing the traffic within 802.11 networks. We devise a tool, named "VirtFrame", which is to estimate the station's capable throughput from neighbor APs based on the channel access time by virtually combining the sniffed frames. Simulation results show that our proposed scheme well matches that there exists correlation between the channel access time and the actual throughput of the APs.

Text Augmentation Using Hierarchy-based Word Replacement

  • Kim, Museong;Kim, Namgyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.1
    • /
    • pp.57-67
    • /
    • 2021
  • Recently, multi-modal deep learning techniques that combine heterogeneous data for deep learning analysis have been utilized a lot. In particular, studies on the synthesis of Text to Image that automatically generate images from text are being actively conducted. Deep learning for image synthesis requires a vast amount of data consisting of pairs of images and text describing the image. Therefore, various data augmentation techniques have been devised to generate a large amount of data from small data. A number of text augmentation techniques based on synonym replacement have been proposed so far. However, these techniques have a common limitation in that there is a possibility of generating a incorrect text from the content of an image when replacing the synonym for a noun word. In this study, we propose a text augmentation method to replace words using word hierarchy information for noun words. Additionally, we performed experiments using MSCOCO data in order to evaluate the performance of the proposed methodology.

Youtube Influencer's Startup Strategy Using Lean Startup Technique (린스타트업 기법을 활용한 유튜브 인플루언서의 창업전략)

  • Park, Jeong Sun;Park, Sang Hyeok;Kim, Young Lag
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.147-173
    • /
    • 2022
  • Purpose As the use of social network services has become common, it has become possible to freely communicate and establish relationships with other people anytime, anywhere for communication and information sharing. Influencers who have a strong influence on consumers' perceptions and attitudes through their own opinions and stories have appeared on various social media channels such as YouTube. Recently, companies utilize influencers with a large number of followers to check interactions with customers to understand customer attitudes and opinions about products in real time. Start-ups with insufficient resources need to quickly examine customer responses to reduce the probability of failure after product planning. The Lean process of creating an MVP and quickly confirming and learning the market response should be repeated over and over again. Findings In this paper, we try to suggest that the YouTube platform can play a sufficient role as a customer experiment space through examples. The case company is a company that has successfully commercialized products by continuously interacting with customers through the YouTube platform for the first four months of its founding. This paper is expected to be helpful in the experimental process for prospective founders and early founders to examine customer responses to reduce the probability of market failure before commercialization. Design/methodology/approach This paper analyzed the YouTube channel data of case companies based on the netnography methodology and presented the contents of the lean process management carried out in the experimental stage and the post-production stage through interview research.