• 제목/요약/키워드: Dynamic Information

검색결과 8,230건 처리시간 0.032초

User attribute verification method using user mobile dynamic information

  • Kim, Seok-Hun
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권1호
    • /
    • pp.145-149
    • /
    • 2019
  • Various supplementary authentication methods are used to supplement user authentication and authorization provided by existing password verification online1. In recent years, authentication and authorization methods using user attribute information have been studied and utilized in various services. User attribute information can be divided into static information and dynamic information. The existing methods focus on research to identify users using dynamic information or to generate challenge questions for user reauthentication. Static information such as a user's home address, school, company, etc. is associated with dynamic information such as location information. We propose a method to verify user attribute information by using the association between two attribute information. For this purpose, the static information of the user is verified by using the user's location record which is dynamic information. The experiment of this paper collects the dynamic information of the actual user and extracts the static information to verify the user attributes. And we implemented the user attribute information authentication system using the proposal verification method and evaluated the utility based on applicability, convenience, and security.

포만트 정보의 동적 변화특성 조사에 관한 연구 (Investigation on Dynamic Behavior of Formant Information)

  • 조철우
    • 말소리와 음성과학
    • /
    • 제7권2호
    • /
    • pp.157-162
    • /
    • 2015
  • This study reports on the effective way of displaying dynamic formant information on F1-F2 space. Conventional ways of F1-F2 space (different name of vowel triangle or vowel rectangle) have been used for investigating vowel characteristics of a speaker or a language based on statistics of the F1 and F2 values, which were computed by spectral envelope search method. Those methods were dealing mainly with the static information of the formants, not the changes of the formant values (i.e. dynamic information). So a better way of investigating dynamic informations from the formant values of speech signal is suggested so that more convenient and detailed investigation of the dynamic changes can be achieved on F1-F2 space. Suggested method used visualization of static and dynamic information in overlapped way to be able to observe the change of the formant information easily. Finally some examples of the implemented display on some cases of the continuous vowels are shown to prove the usefulness of suggested method.

A Dynamic Adjustment Method of Service Function Chain Resource Configuration

  • Han, Xiaoyang;Meng, Xiangru;Yu, Zhenhua;Zhai, Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권8호
    • /
    • pp.2783-2804
    • /
    • 2021
  • In the network function virtualization environment, dynamic changes in network traffic will lead to the dynamic changes of service function chain resource demand, which entails timely dynamic adjustment of service function chain resource configuration. At present, most researches solve this problem through virtual network function migration and link rerouting, and there exist some problems such as long service interruption time, excessive network operation cost and high penalty. This paper proposes a dynamic adjustment method of service function chain resource configuration for the dynamic changes of network traffic. First, a dynamic adjustment request of service function chain is generated according to the prediction of network traffic. Second, a dynamic adjustment strategy of service function chain resource configuration is determined according to substrate network resources. Finally, the resource configuration of a service function chain is pre-adjusted according to the dynamic adjustment strategy. Virtual network functions combination and virtual machine reusing are fully considered in this process. The experimental results show that this method can reduce the influence of service function chain resource configuration dynamic adjustment on quality of service, reduce network operation cost and improve the revenue of service providers.

다중 채널 동적 객체 정보 추정을 통한 특징점 기반 Visual SLAM (A New Feature-Based Visual SLAM Using Multi-Channel Dynamic Object Estimation)

  • 박근형;조형기
    • 대한임베디드공학회논문지
    • /
    • 제19권1호
    • /
    • pp.65-71
    • /
    • 2024
  • An indirect visual SLAM takes raw image data and exploits geometric information such as key-points and line edges. Due to various environmental changes, SLAM performance may decrease. The main problem is caused by dynamic objects especially in highly crowded environments. In this paper, we propose a robust feature-based visual SLAM, building on ORB-SLAM, via multi-channel dynamic objects estimation. An optical flow and deep learning-based object detection algorithm each estimate different types of dynamic object information. Proposed method incorporates two dynamic object information and creates multi-channel dynamic masks. In this method, information on actually moving dynamic objects and potential dynamic objects can be obtained. Finally, dynamic objects included in the masks are removed in feature extraction part. As a results, proposed method can obtain more precise camera poses. The superiority of our ORB-SLAM was verified to compared with conventional ORB-SLAM by the experiment using KITTI odometry dataset.

블록 암호 알고리즘을 위한 Dynamic-네트워크 (Dynamic Network for Block Cipher Algorithm)

  • 박승배
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 1998년도 가을 학술발표논문집 Vol.25 No.2 (3)
    • /
    • pp.615-617
    • /
    • 1998
  • 본 논문에서는 블록 암호 알고리즘을 위한 새로운 Dynamic-네트워크를 제시한다. Dynamic-네트워크 는 좋은 confusion과 diffusion 메카니즘을 제공한다. 어떠한 Dynamic-네트워크 {{{{ { 2}^{n }-비트(n >=1) }}}}길 이를 갖는 모든 평문을 입력으로 할 수 있으며, 일정 길이 이상의 모든 비트 스트링을 키로 사용할 수 있다.

  • PDF

Dynamic Network using Symmetric Block Cipher

  • Park Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • 제3권1호
    • /
    • pp.5-8
    • /
    • 2005
  • Dynamic cipher has the property that the key-size, the number of round, and the plaintext-size are scalable simultaneously. We present the method for designing secure Dynamic cipher against meet-in-the-middle attack and linear cryptanalysis. Also, we show that the differential cryptanalysis to Dynamic cipher is hard. In this paper we propose a new network called Dynamic network for symmetric block ciphers.

칩마운트 (SMD) 장비의 동하중(動荷重) 발생특성에 관한 실험적 연구 (An Experimental Study on the Dynamic Load Characteristics of Surface Mount Device(SMD))

  • 백재호;이홍기;김강부
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 2000년도 춘계학술대회논문집
    • /
    • pp.1913-1917
    • /
    • 2000
  • SMD Equipment convey an electronic parts at high speed, then assemble parts into a circuit board, and it develop a long time-duration dynamic force to be caused by moving mass. Vibration problem to be caused by SMD Equipment have an effect on micro-meter level's precision production process, directly, and dynamic stability of building. In the cause of quantitatively access about its vibration problem, input information(or data) of structure dynamic analysis need accuracy information of dynamic load. Determination of Dynamic load is various kinds of method using experimental and theory. In this paper, we got dynamic load using direct measurement method. We expect that an study on the dynamic load characteristic of SMD can be used to Equipment development of low level vibration and basis information of structure dynamic analysis.

  • PDF

A Study on Feature Extraction and Matching of Enhanced Dynamic Signature Verification

  • Kim Jin-Whan;Cho Hyuk-Gyn;Cha Eui-Young
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2005년도 춘계학술대회 학술발표 논문집 제15권 제1호
    • /
    • pp.419-423
    • /
    • 2005
  • This paper is a research on feature extraction and comparison method of dynamic (on-line) signature verification. We suggest desirable feature information and modified DTW(Dynamic Time Warping) and describe the performance results of our enhanced dynamic signature verification system.

  • PDF

Terminal-based Dynamic Clustering Algorithm in Multi-Cell Cellular System

  • Ni, Jiqing;Fei, Zesong;Xing, Chengwen;Zhao, Di;Kuang, Jingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권9호
    • /
    • pp.2086-2097
    • /
    • 2012
  • A terminal-based dynamic clustering algorithm is proposed in a multi-cell scenario, where the user could select the cooperative BSs from the predetermined static base stations (BSs) set based on dynamic channel condition. First, the user transmission rate is derived based on linear precoding and per-cell feedback scheme. Then, the dynamic clustering algorithm can be implemented based on two criteria: (a) the transmission rate should meet the user requirement for quality of service (QoS); (b) the rate increment exceeds the predetermined constant threshold. By adopting random vector quantization (RVQ), the optimized number of cooperative BSs and the corresponding channel conditions are presented respectively. Numerical results are given and show that the performance of the proposed method can improve the system resources utilization effectively.

ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법 (The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption)

  • 김미령;김효승;손영동;이동훈
    • 정보보호학회논문지
    • /
    • 제22권4호
    • /
    • pp.733-744
    • /
    • 2012
  • 동적 임계 공개키 암호 시스템(dynamic threshold public-key encryption)이란 시스템을 구축하는 과정에서 전체 사용자들의 집합과 인증된 수신자 집합의 크기, 임계치를 고정값으로 설정하지 않고 유연하게 변경될 수 있는 기능을 제공하는 임계 암호 시스템을 말한다. 이와 관련하여 신원정보를 공개키로 사용하는 ID기반 암호 시스템(identity-based encryption)과 동적 임계 공개키 시스템을 결합하여 ID기반 동적 임계 암호 시스템(identity-based dynamic threshold encryption)을 설계하려는 연구가 이뤄지고 있으며, 최근 2011년 Xing과 Xu은 동적 기능을 제공하는 ID기반 임계 암호기법을 제안하였다. 본 논문에서는 Xing과 Xu가 제안한 ID기반 동적 임계 암호 시스템을 분석하고 구조적으로 문제점이 있음을 보인다. 또한 겹선형 함수를 이용한 ID기반 암호 시스템을 ID기반 동적 임계 암호 시스템으로 변환하는 방법(conversion method)를 제안한다. 마지막으로, 변환하여 설계한 기법이 완전한 풀 모델(full model)로 선택된 평문 공격(chosen plaintext attack)환경에서 안전함을 증명한다.