• Title/Summary/Keyword: Data reuse

Search Result 581, Processing Time 0.031 seconds

Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System

  • Wu, Jun;Chen, Ze;Bao, Jianrong;Gan, Jipeng;Chen, Zehao;Zhang, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3738-3760
    • /
    • 2022
  • Due to increasing spectrum demand for new wireless devices applications, cooperative spectrum sensing (CSS) paradigm is the most promising solution to alleviate the spectrum shortage problem. However, in the interweave cognitive radio (CR) system, the inherent nature of CSS opens a hole to Byzantine attack, thereby resulting in a significant drop of the CSS security and efficiency. In view of this, a weighted differential sequential single symbol (WD3S) algorithm based on MATLAB platform is developed to accurately identify malicious users (MUs) and benefit useful sensing information from their malicious reports in this paper. In order to achieve this, a dynamic Byzantine attack model is proposed to describe malicious behaviors for MUs in an interweave CR system. On the basis of this, a method of data transmission consistency verification is formulated to evaluate the global decision's correctness and update the trust value (TrV) of secondary users (SUs), thereby accurately identifying MUs. Then, we innovatively reuse malicious sensing information from MUs by the weight allocation scheme. In addition, considering a high spectrum usage of primary network, a sequential and differential reporting way based on a single symbol is also proposed in the process of the sensing information submission. Finally, under various Byzantine attack types, we provide in-depth simulations to demonstrate the efficiency and security of the proposed WD3S.

Preliminary Evaluation of Clearance Level of Uranium in Metal Waste Using the RESRAD-RECYCLE Code (RESRAD-RECYCLE 전산코드를 활용한 금속폐기물 내 우라늄 자체처분 허용농도 예비 평가)

  • SunWoo Lee;JungHwan Hong;JungSuk Park;KwangPyo Kim
    • Journal of Radiation Industry
    • /
    • v.17 no.4
    • /
    • pp.457-469
    • /
    • 2023
  • The clearance level by nuclide is announced by the Nuclear Safety and Security Commission. However, the clearance level of uranium existing in nature has not been announced, and research is needed. Therefore, the purpose of this study was to evaluate the clearance level of uranium nuclides appropriate to domestic conditions preliminary. For this purpose, this study selected major processes for recycling metal wastes and analyzed the exposure scenarios and major input factors by investigating the characteristics of each process. Then, the radiation dose to the general public and workers was evaluated according to the selected scenarios. Finally, the results of the radiation dose per unit radioactivity for each scenario were analyzed to derive the clearance level of uranium in metal waste. The results of the radiation dose assessment for both the general public and workers per unit radioactivity of uranium isotopes were shown to meet the allowable dose (individual dose of 10 µSv y-1 and collective dose of 1 Man-Sv y-1) regulated by the Nuclear Safety and Security Commission. The most conservative scenarios for volumetric and surface contamination were evaluated for the handling of the slag generated after the melting of the metal waste and the direct reuse of the contaminated metal waste into the building without further disposal. For each of these scenarios, the radioactivity concentration by uranium isotope was calculated, and the clearance level of uranium in metal waste was calculated through the radioactivity ratio by enrichment. The results of this study can be used as a basic data for defining the clearance level of uranium-contaminated radioactive waste.

Microbial Risk Assessment in Treated Wastewater Irrigation on Paddy Rice Plot (하수처리수를 관개한 후 벼재배 시험구에 대한 미생물 위해성 평가)

  • Jung, Kwang-Wook;An, Youn-Joo;Jang, Jae-Ho;Jeon, Ji-Hong;Yoon, Chun-Gyeong
    • Korean Journal of Ecology and Environment
    • /
    • v.38 no.2 s.112
    • /
    • pp.225-236
    • /
    • 2005
  • The protection of public health In wastewater reclamation and reuse is one of the most important issues. Monitoring data of Escherichia coli were collected from paddy rice plots in 2003 and 2004 experiments. Five treatments were used and each one was triplicated to evaluate the changes of E. coli: surface water, biofilter effluent (secondary level), UV-disinfected water and pond treatment. Microbial risk was quantified to assess human health risk by exposure to E. coli in paddy rice plots, which were irrigated with reclaimed wastewater. Beta-Poisson model was used to estimate the microbial risk of pathogen ingestion that may occur to farmer and neighbor children. Monte-Carlo analysis (10,000 trials) was used to estimate the risk characterization of uncertainty. In the following analysis, two scenarios were related to the reduction of risk against direct ingestion and exposure times. Scenarios A and B were assumed that the risk was 1,000 and 10,000 times lower than direct ingestion.'Golfers were assumed to be 0.001 L of reclaimed water by contact with balls and their cloths. Opportunity of contact in paddy rice field with pathogens was more frequent than handing golf balls, because of agricultural activity was practiced in ponded water in paddy rice culture. As a result of microbial risk assessment using total data of experimental period, risk value of E. coli in 2003 and 2004 experiment ranged from $10^{-5}$ to $10^{-8}$ and $10^{-4}$ to $10^{-8}$, respectively. The risk values in biofilter effluent irrigation was the highest, which is $10^{-4}$ in 2003 and $10^{-5}$ in 2004 experiments with scenario A. Ranges of $10^{-6}$ to $10^{-8}$ were considered at reasonable levels of risk for communicable disease transmission from environmental exposure and the risk value above $10^{-4}$ was considered to be attributable to the risk of infection. Irrigation with UV-disinfected water in the paddy field during the agricultural Period showed significantly lower microbial risk than others, and their levels of risk value were within the range of actual paddy rice field with surface water.

A Study on the Improvement of the Design VE Process using VE Idea-DataBank System (설계 VE 프로세스 개선을 위한 VE Idea-DataBank System 구축에 관한 연구 - 한국도로공사 고속도로 건축공사를 대상으로 -)

  • Park, Heetaek;Park, Chansik;Jung, Wooseob
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.1
    • /
    • pp.28-38
    • /
    • 2014
  • Construction value engineering(VE) is often performed in the form of a short term review of designs, rather than during a regular workshop with a standardized work plan, and its application method is limited. Thus, tasks are performed by applying the method in reverse depending on the VE results, and function analysis, a key VE method, is omitted or only applied for the sake of formality. In addition, it is hard to expect great results from VE because of insufficient time and budget allowed to perform VE and a lack of understanding of VE procedures and methods. In particular, the methods used to store and reuse the tremendous amount of ideas and information created during the process of VE implementation is not systematic. Even the Korea Expressway Corporation, which has produced relatively systematic VE performance compared to other institutions, has had the above-mentioned problems. Therefore, this study aims to improve existing VE processes and suggest a method to efficiently store and retrieve VE information by analyzing the limitations of construction VE practice and the characteristics of VE for highway facilities as part of improving design VE performance.

Development of Reconfigurable Tactical Operation Display Framework by Battery and Battalion (포대/대대 별 재구성 가능한 전술작전화면 프레임워크 개발)

  • Lee, Sangtae;Lee, Seungyoung;Wi, SoungHyouk;Cho, Kyutae
    • Journal of KIISE
    • /
    • v.44 no.5
    • /
    • pp.476-485
    • /
    • 2017
  • The tactical operation centers of future anti-aircraft missile systems provide the environment for the research on future air threats, tactical information, integrated battlefield environment creation and management, engagement control and command and control algorithms. To develop the key functional elements of integrated battlefield situation creation and processing and tactical operation automation processing operations, battery/battalion tactical operation control and reconfiguration design software are required. Therefore, the algorithm software of each function and the tactical operation display software and link software for interworking between equipment were developed as reconfigurable through a data-centric design. In this paper, a tactical operation display framework that can be reconfigured on the operation display of the tactical operations according to the battery/battalion is introduced. This tactical operation display framework was used to develop a common data model design for the reconfigurable structure of multi-role tactical operations with battery / battalion and mission views, and a display configuration tool that provides a tactical operation display framework for view development was also developed using the MVC pattern. If the tactical operation display framework is used, it will be possible to reuse the view design through the common base structure, and a view that can be reconfigured easily and quickly will also be developed.

A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology (빅데이터 기반 비대면 본인확인 기술에 대한 연구)

  • Jung, Kwansoo;Yeom, Hee Gyun;Choi, Daeseon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.421-428
    • /
    • 2017
  • The need for various approaches to non-face-to-face identification technology for registering and authenticating users online is being required because of the growth of online financial services and the rapid development of financial technology. In general, non-face-to-face approaches can be exposed to a greater number of threats than face-to-face approaches. Therefore, identification policies and technologies to verify users by using various factors and channels are being studied in order to complement the risks and to be more reliable non-face-to-face identification methods. One of these new approaches is to collect and verify a large number of personal information of user. Therefore, we propose a big-data based non-face-to-face Identity Proofing method that verifies identity on online based on various and large amount of information of user. The proposed method also provides an identification information management scheme that collects and verifies only the user information required for the identity verification level required by the service. In addition, we propose an identity information sharing model that can provide the information to other service providers so that user can reuse verified identity information. Finally, we prove by implementing a system that verifies and manages only the identity assurance level required by the service through the enhanced user verification in the non-face-to-face identity proofing process.

Performance Evaluation of Scheduling Algorithm for VoIP under Data Traffic in LTE Networks (데이터 트래픽 중심의 LTE망에서 VoIP를 위한 스케줄링 알고리즘 성능 분석)

  • Kim, Sung-Ju;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.20-29
    • /
    • 2014
  • Recently, LTE is preparing to make a new leap forward LTE-A all over the world. As LTE privides high speed service, the role of mobile phones seems to change from voice to data service. According to Cisco, global mobile data traffic will increase nearly 11-fold between 2013 and 2018. Mobile video traffic will reach 75% by 2018 from 66% in 2013 in Korea. However, voice service is still the most important role of mobile phones. Thus, controllability of throughput and low BLER is indispensable for high-quality VoIP service among various type of traffic. Although the maximum AMR-WB, 23.85 Kbps is sufficient to a VoIP call, it is difficult for the LTE which can provide tens to hundreds of MB/s may not keep the certain level VoIP QoS especially in the cell-edge area. This paper proposes a new scheduling algorithm in order to improve VoIP performance after analyzing various scheduling algorithms. The proposal is the technology which applies more priority processing for VoIP than other applications in cell-edge area based on two-tier scheduling algorithm. The simulation result shows the improvement of VoIP performance in the view point of throughput and BLER.

A Study on Preservation Metadata for Long Term Preservation of Electronic Records (전자기록의 장기적 보존을 위한 보존메타데이터 요소 분석)

  • Lee, Kyung-Nam
    • The Korean Journal of Archival Studies
    • /
    • no.14
    • /
    • pp.191-240
    • /
    • 2006
  • For long-term preservation of electronic records, the information on the whole processes of management from the time of creation of the electronic information should be captured and managed together. Such information is supported by preservation metadata thus the implementation of preservation metadata is important for preservation of electronic records maintaining the record-ness. Preservation metadata is the information that supports the process of digital preservation and functions th maintain long-term viability, renderability, understandability, authenticity and identity of digital resources. Preservation metadata should be developed applying the international standard Reference Model for an Open Archival Information System(OAIS) to have international interoperability for exchange and reuse. Initial international preservation metadata schemas were developed standardizing the OAIS Reference Model. But the preservation metadata schema of Victorian Electronic Records Strategy(VERS) and recently published Data Dictionary of PREMIS Working Group were developed in advanced types that are different from the existing framework. Those were advanced th practical ones from conceptual one. Comparing these two cases, proposed the elements of integral preservation metadata for long-term preservation of electronic records. This thesis has the significance that it has suggested the direction for future development of the elements of preservation metadata by setting the past discussions related to preservation metadata in order and proposing integral preservation metadata elements for long-term preservation of electronic records.

Spatiotemporal Removal of Text in Image Sequences (비디오 영상에서 시공간적 문자영역 제거방법)

  • Lee, Chang-Woo;Kang, Hyun;Jung, Kee-Chul;Kim, Hang-Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.2
    • /
    • pp.113-130
    • /
    • 2004
  • Most multimedia data contain text to emphasize the meaning of the data, to present additional explanations about the situation, or to translate different languages. But, the left makes it difficult to reuse the images, and distorts not only the original images but also their meanings. Accordingly, this paper proposes a support vector machines (SVMs) and spatiotemporal restoration-based approach for automatic text detection and removal in video sequences. Given two consecutive frames, first, text regions in the current frame are detected by an SVM-based texture classifier Second, two stages are performed for the restoration of the regions occluded by the detected text regions: temporal restoration in consecutive frames and spatial restoration in the current frame. Utilizing text motion and background difference, an input video sequence is classified and a different temporal restoration scheme is applied to the sequence. Such a combination of temporal restoration and spatial restoration shows great potential for automatic detection and removal of objects of interest in various kinds of video sequences, and is applicable to many applications such as translation of captions and replacement of indirect advertisements in videos.

A Design and Implementation of Event Processor for Playing SMIL 2.0 Documents (SMIL 2.0 문서 재생을 위한 이벤트 처리기의 설계 및 구현)

  • 김혜은;채진석;이재원;김성동;이종우
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.251-263
    • /
    • 2004
  • The Synchronized Multimedia Integration Language (SMIL), recommended by the World Wide Web Consortium (W3C) in 1998, is an XML-based declarative language to synchronize and present multimedia documents. SMIL can create new multimedia data integrating various types of multimedia objects which exist separately such as text, video, graphics and audio. It can support synchronization of multimedia data which are limited in current HTML-based Web technology. For its popularity, it is required to develop a multimedia server guaranteeing Quality of Service (QoS), authoring tool and player. For developing a SMIL authoring tool and player, the technologies are essentially required to read and analyze a SMIL document and to play synchronized various types of media objects in a timeline. In this paper, we describe a design and implementation of an event processor which supports SMIL 2.0 timing model. Moreover, we also develop a SMIL 2.0 player using the proposed event processor. This will facilitate the play of SMIL contents, so that it can contribute to the prosperity of SMIL technology It is possible to reuse in various language profiles defined in the SMIL standard. This player is expected to be utilized in other standard integrating SMIL such as XHTML+SMIL and SMIL Animation.

  • PDF