• Title/Summary/Keyword: Convergence Proof

Search Result 154, Processing Time 0.025 seconds

Study on the Application of a Decentralized Identity System within University Based on Zero-Knowledge Proof for Self-Sovereign Identity Assurance (자기주권 신원 보장을 위한 영지식증명 기반의 대학 내 DID 시스템 적용방안 연구)

  • Im Sung Sik;Kim Seo Yeon;Kim Dong Woo;Han Su Jin;Lee Ki Chan;Oh Soo Hyun
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.141-150
    • /
    • 2024
  • With the increasing frequency of incidents related to personal information leaks, there is a growing concern about personal information protection. Moreover, with the emergence of blockchain technology, there is a heightened interest in self-sovereign identity models applied through blockchain, with ongoing research on Decentralized Identifiers (DID) to achieve this. However, despite universities storing and utilizing significant information such as personal data, their computer systems are operated and managed based on centralized systems, leading to annual occurrences of personal data breaches. Therefore, this paper proposes and implements a DID-based computing system applicable within universities. Additionally, it establishes and executes prominent services within the university context. The proposed system ensures users' self-sovereign identities through verifiable credentials, enabling the establishment of a secure integrated information system within the university, departing from traditional centralized systems.

Characteristic of New Materials for Repairing/Reinforcement of Sea and Underwater Structures using Urethane (우레탄을 이용한 해양 및 수중구조물의 보수/보강용 신소재 특성)

  • Lee, Young-Sei
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.16 no.1
    • /
    • pp.14-20
    • /
    • 2013
  • In this study, characteristic of new materials for repairing/reinforcement of sea and underwater structures using urethane were studied experimentally. As a results, following their good result was obtained. Materials and construction methods due to a chemical reaction, so no seams, shape or form, regardless of the variety of civil engineering in the field can be applied. Fast workability, hardening existing concrete compared with 80% in shortening. Than the existing large concrete pouring construction cost could be reduced by more than 30%.

A Structural Analysis and Safety Evaluation of a Loose-proof Lock-Nut Structure (풀림방지 로크너트의 구조해석 및 안전성 평가)

  • Park, Sang Kun
    • Journal of Institute of Convergence Technology
    • /
    • v.2 no.2
    • /
    • pp.20-24
    • /
    • 2012
  • In this paper, we perform a ANSYS simulation of assembly structure composed of three parts, bolt, nut, and coil spring, under the loading of a screw torque 640~800 ($N{\cdot}m$) derived from the given bolt tensile strength 10.9, which allows us to investigate a lock-nut mechanism for the prevention of bolt-loosening after three parts are fastened. And also we investigate the safety factor of each component with effective stress distribution obtained from the simulation, which enables us to estimate the structural safety of a new lock-nut structure. Both simulation and investigation shown in this paper will contribute to the development of a new lock nut structure.

  • PDF

Next-Generation Converged Networking in Korea: The Concept and Its R&D Activities

  • Kang, Kug-Chang;Park, No-Ik;Lee, Soon-Seok;Kim, Young-Sun;Jun, Kyung-Pyo
    • Journal of Communications and Networks
    • /
    • v.8 no.4
    • /
    • pp.475-479
    • /
    • 2006
  • In Korea, we witness vivid evidences of changing trend in communication that insist the emergence of new networking architecture. To accommodate the changing trend and to hold current strong position in global IT industry, Korea have launched broadband convergence network (BcN) initiative. BcN vision for Korea is to be the first in the world to realize converged network infrastructure and ubiquitous service environment. In this paper, we have introduced the concept and the vision of BcN with a viewpoint of a new paradigm to prepare future-proof communication environment. And then, we have disclosed BcN research and development (R&D) activities including R&D philosophy, R&D phases, and key technologies required. Also, we have discussed current development issues in three technology branches including service and control technology, unified transport technology, and next-generation access technology.

Fair Private Block Encryption Protocol for Delegated Node of Public Blockchain (동등한 권한을 가진 대표노드를 위한 비공개 블록 암호화 기법)

  • Jung, Seung Wook;Lee, HooKi
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.11-18
    • /
    • 2019
  • In current public blockchain, any node can see every blocks, so that public blockchain provider transparent property. However, some application requires the confidential information to be stored in the block. Therefore, this paper proposes a multi-layer blockchain that have the public block layer and the private block for confidential information. This paper suggests the requirement for encryption of private block. Also, this paper shows the t-of-n threshold cryptosystem without dealer who is trusted third party. Finally proposed scheme satisfies the requirements for encryption and fairness.

Barycentric Approximator for Reinforcement Learning Control

  • Whang Cho
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.3 no.1
    • /
    • pp.33-42
    • /
    • 2002
  • Recently, various experiments to apply reinforcement learning method to the self-learning intelligent control of continuous dynamic system have been reported in the machine learning related research community. The reports have produced mixed results of some successes and some failures, and show that the success of reinforcement learning method in application to the intelligent control of continuous control systems depends on the ability to combine proper function approximation method with temporal difference methods such as Q-learning and value iteration. One of the difficulties in using function approximation method in connection with temporal difference method is the absence of guarantee for the convergence of the algorithm. This paper provides a proof of convergence of a particular function approximation method based on \"barycentric interpolator\" which is known to be computationally more efficient than multilinear interpolation .

THE STEEPEST DESCENT METHOD AND THE CONJUGATE GRADIENT METHOD FOR SLIGHTLY NON-SYMMETRIC, POSITIVE DEFINITE MATRICES

  • Shin, Dong-Ho;Kim, Do-Hyun;Song, Man-Suk
    • Communications of the Korean Mathematical Society
    • /
    • v.9 no.2
    • /
    • pp.439-448
    • /
    • 1994
  • It is known that the steepest descent(SD) method and the conjugate gradient(CG) method [1, 2, 5, 6] converge when these methods are applied to solve linear systems of the form Ax = b, where A is symmetric and positive definite. For some finite difference discretizations of elliptic problems, one gets positive definite matrices that are almost symmetric. Practically, the SD method and the CG method work for these matrices. However, the convergence of these methods is not guaranteed theoretically. The SD method is also called Orthores(1) in iterative method papers. Elman [4] states that the convergence proof for Orthores($\kappa$), with $\kappa$ a positive integer, is not heard. In this paper, we prove that the SD method and the CG method converge when the $\iota$$^2$ matrix norm of the non-symmetric part of a positive definite matrix is less than some value related to the smallest and the largest eigenvalues of the symmetric part of the given matrix.(omitted)

  • PDF

Similarity Measure Design on High Dimensional Data

  • Nipon, Theera-Umpon;Lee, Sanghyuk
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.1
    • /
    • pp.43-48
    • /
    • 2013
  • Designing of similarity on high dimensional data was done. Similarity measure between high dimensional data was considered by analysing neighbor information with respect to data sets. Obtained result could be applied to big data, because big data has multiple characteristics compared to simple data set. Definitely, analysis of high dimensional data could be the pre-study of big data. High dimensional data analysis was also compared with the conventional similarity. Traditional similarity measure on overlapped data was illustrated, and application to non-overlapped data was carried out. Its usefulness was proved by way of mathematical proof, and verified by calculation of similarity for artificial data example.

HMD Type SMV 3Ddisplay System (HMD 형태의 초다시점 3차원 영상 표시 장치)

  • 김성규
    • Journal of Broadcast Engineering
    • /
    • v.7 no.4
    • /
    • pp.362-367
    • /
    • 2002
  • The 3-dimensional image display system using only binocular disparity can induce the eye fatigue because of the mismatch between the accommodation of eye and the convergence of two eyes. A new 3-dimensional display system for one observer that can solve eye fatigue caused by mismatch between accommodation and convergence was introduced in this paper. A proof about the possibility of satisfaction of accommodation of one eye was given as the experimental result in this 3-dimensional display system.

A security implementation based on the sensor tag (센서 태그를 이용한 보안 장치 구현)

  • Kim, Sang-Choon;Park, Ji-Mann
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.19-24
    • /
    • 2011
  • This paper describes a passive SID sensor tag that provide physical security functions based on a sensor interface module. It elementarily consists of a serial I/O interface, control module, and sensor module. In this paper, it show tamper-proof security functions by comparison and encryption with the sensor signal data using the physical resistors. The passive SID sensor tag can be realized by the real time management for the safety, forgery, and so on. The proposed SID tag embedded with a sensor module is expected to find wide physical security applications.