• Title/Summary/Keyword: Efficient

Search Result 45,976, Processing Time 0.055 seconds

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid

  • Li, Hongwei;Liu, Dongxiao;Alharbi, Khalid;Zhang, Shenmin;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1404-1423
    • /
    • 2015
  • In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. However, it is crucial to protect sensitive electricity consumption data during the sharing process. In this paper, we propose a fine-grained access control scheme (FAC) with efficient attribute revocation and policy updating in smart grid. Specifically, by introducing the concept of Third-party Auditor (TPA), the proposed FAC achieves efficient attribute revocation. Also, we design an efficient policy updating algorithm by outsourcing the computational task to a cloud server. Moreover, we give security analysis and conduct experiments to demonstrate that the FAC is both secure and efficient compared with existing ABE-based approaches.

Energy Efficient Transmit and Receive Strategies (에너지 효율적인 송수신 운용 방안)

  • Oh, Changyoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.2
    • /
    • pp.3-9
    • /
    • 2014
  • We propose energy efficient transmit and receive strategies for nomadic M2M devices. Recently, communication applications consume more and more battery. Hence, the efficient battery management is becoming increasingly important. Turbo code as a channel coding is being widely used in many communication areas. Accordingly, the efficient energy management in using turbo code is an important issue. In this paper, we optimize joint transmit and receive energy for M2M devices pair. We first model the transmit energy and receive energy. Then, we develop the energy efficient transmit and receive strategies.

A Study on Efficient Market Hypothesis to Predict Exchange Rate Trends Using Sentiment Analysis of Twitter Data

  • Komariah, Kokoy Siti;Machbub, Carmadi;Prihatmanto, Ary S.;Sin, Bong-Kee
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.7
    • /
    • pp.1107-1115
    • /
    • 2016
  • Efficient Market Hypothesis (EMH), states that at any point in time in a liquid market security prices fully reflect all available information. This paper presents a study of proving the hypothesis through daily Twitter sentiments using the hybrid approach of the lexicon-based approach and the naïve Bayes classifier. In this research we analyze the currency exchange rate movement of Indonesia Rupiah vs US dollar as a way of testing the Efficient Market Hypothesis. In order to find a correlation between the prediction sentiments from Twitter data and the actual currency exchange rate trends we collect Twitter data every day and compute the overall sentiment to label them as positive or negative. Experimental results have shown 69% correct prediction of sentiment analysis and 65.7% correlation with positive sentiments. This implies that EMH is semi-strong Efficient Market Hypothesis, and that public information provide by Twitter sentiment correlate with changes in the exchange market trends.

Efficient designs in conjoint analysis (컨조인트 분석에서 효율적인 문항 설계)

  • Chung, Jong Hee;Lim, Yong B.
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.1
    • /
    • pp.27-38
    • /
    • 2018
  • Purpose: A large number of attributes with mixed levels are often considered in the conjoint analysis. In the cases where attributes have two or three levels, we research on the efficient design of survey questionnaire to estimate all the main effect and two factor interaction effects with a reasonable size of it. Methods: To reduce the number of questions in a questionnaire, the balanced incomplete block mixed level factorial design with minimum aberration was proposed by Lim and Chung (2016). Based on the number of questions and that of the respondents in that design, D-optimality criterion is adopted to find efficient designs where the main effect and two factor interaction effects are estimated. Results: The list of the number of questions and that of the respondents in efficient designs for survey questionnaire are recommended based on the D-efficiency of each design and the proposed selection criteria for the number of both questions and the respondents. By analyzing all the respondents survey data generated by the simulation study, we find the proper model. Conclusion: The proposed methods of designing survey questionnaires seem to perform well in the sense that how often the proper model is found in a simulation study where all the respondents survey data are generated by the simulation model.

Efficient NLP Techniques for the Optimum Design of Simple Steel Plate Girder Cross Section (단순강판형 단면의 최적설계를 위한 효율적인 비선형계획기법)

  • 김종옥
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.36 no.2
    • /
    • pp.111-122
    • /
    • 1994
  • In this study, an algorithm which can be applied to the optimum design of simple steel plate girders was developed, and efficient optimization strategies for the solution of algorithm were found out. The optimum design algorithm consists of 3-levels of optimization. In the first and second levels of optimization, the absolute maximum bending moment and shearing force are extracted and in the third level of optimization, the optimum cross section of steel plate girder is determined. For the optimum design of cross section, the objective function is formulated as the total area of cross section and constraints are derived in consideration of the various stresses and the minimum dimension of flange and web based on the part of steel bridge in the Korea standard code of road bridge. Sequential unconstrained minimization technique using the exterior penalty function method(SUMT-EP), sequential linear programming(SLP) and sequential quadratic programming (SQP) are proved to be efficient and robust strategies for the optimum design of simple plate girder cross section. From the reliable point of view, SLP is the most efficient and robust strategy and SQP is the most efficient one from the viewpoint of converguency and computing time.

  • PDF

KMMR: An Efficient and scalable Key Management Protocol to Secure Multi-Hop Communications in large scale Wireless Sensor Networks

  • Guermazi, Abderrahmen;Belghith, Abdelfettah;Abid, Mohamed;Gannouni, Sofien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.901-923
    • /
    • 2017
  • Efficient key distribution and management mechanisms as well as lightweight ciphers are the main pillar for establishing secure wireless sensor networks (WSN). Several symmetric based key distribution protocols are already proposed, but most of them are not scalable, yet vulnerable to a small number of compromised nodes. In this paper, we propose an efficient and scalable key management and distribution framework, named KMMR, for large scale WSNs. The KMMR contributions are three fold. First, it performs lightweight local processes orchestrated into upward and downward tiers. Second, it limits the impact of compromised nodes to only local links. Third, KMMR performs efficient secure node addition and revocation. The security analysis shows that KMMR withstands several known attacks. We implemented KMMR using the NesC language and experimented on Telosb motes. Performance evaluation using the TOSSIM simulator shows that KMMR is scalable, provides an excellent key connectivity and allows a good resilience, yet it ensures both forward and backward secrecy. For a WSN comprising 961 sensor nodes monitoring a 60 hectares agriculture field, KMMR requires around 2.5 seconds to distribute all necessary keys, and attains a key connectivity above 96% and a resilience approaching 100%. Quantitative comparisons to earlier work show that KMMR is more efficient in terms of computational complexity, required storage space and communication overhead.

High efficient vision system for volumetric display (입체영상 디스플레이를 위한 고효율 비젼 시스템)

  • Kim, Sang Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.10
    • /
    • pp.5130-5133
    • /
    • 2013
  • Volumetric display has many applications recently in education, 3D movie, medical images but these applications have several problems that need to be overcome. Volumetric display may process a amount of visual data and design the high efficient vision system for realtime display. The stereo data for volumetric display estimated the disparity vectors from the stereoscopic sequences has been transmitted the disparity vectors, motion vectors and residual images with the reference images, and the stereoscopic sequences have been reconstructed at the receiver for 3D display. Central issue for efficient 3D display lies in selecting an appropriate stereo matching with robust vision system. In this paper, high efficient vision system is proposed for efficient stereo image matching and the experimental results represent high efficiency for proposed 3D display system.

Provably secure attribute based signcryption with delegated computation and efficient key updating

  • Hong, Hanshu;Xia, Yunhao;Sun, Zhixin;Liu, Ximeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2646-2659
    • /
    • 2017
  • Equipped with the advantages of flexible access control and fine-grained authentication, attribute based signcryption is diffusely designed for security preservation in many scenarios. However, realizing efficient key evolution and reducing the calculation costs are two challenges which should be given full consideration in attribute based cryptosystem. In this paper, we present a key-policy attribute based signcryption scheme (KP-ABSC) with delegated computation and efficient key updating. In our scheme, an access structure is embedded into user's private key, while ciphertexts corresponds a target attribute set. Only the two are matched can a user decrypt and verify the ciphertexts. When the access privileges have to be altered or key exposure happens, the system will evolve into the next time slice to preserve the forward security. What's more, data receivers can delegate most of the de-signcryption task to data server, which can reduce the calculation on client's side. By performance analysis, our scheme is shown to be secure and more efficient, which makes it a promising method for data protection in data outsourcing systems.

Efficient Soft Handover method for Bluetooth (블루투스를 위한 효율적 소프트 핸드오버 방안)

  • Choi, Eun-Seok;Jeong, Myoung-Soon;Oh, Hoon;Park, Hong-Seong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3A
    • /
    • pp.266-275
    • /
    • 2004
  • Recently, wireless networks require an efficient handover scheme due to increase of mobile devices. But Bluetooth has several problems to support the efficient handover, which are the additional increase of signaling traffic and long time of the initial setup processes of inquiry and paging processes. This paper suggests an efficient Soft Handover method for Bluetooth (eSoHoB), which reduces the eplased time of the inquiry and paging process and supports a soft handover using the anticipation method. This paper implements the eSoHoB using two Bluetooth hardware modules and a testbed to be able to receive streaming data while a Bluetooth terminal is moving. This paper measures handover delays and the operation of the soft handover to verify the proposed mhthod.

Development of Real-Time Decision Support System for the Efficient Berth Operation of Inchon Port (인천항의 효율적 선석운영을 위한 실시간 의사결정지원시스템 구축)

  • 유재성
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1998.10a
    • /
    • pp.12-16
    • /
    • 1998
  • The purpose of this paper is to develop a knowledge-based real-time decision support system to support decision makers for efficient berth operation of Inchon Port. In these days, the efficient berth operation has been many studied. The berth operation rules differ from port to port and the problem is highly dependent on natural, geographical and operational environment of port. In Inchon Port, the ship's entrance into port and departure from port is extremely affected by the status of dock and berth because of capacity restriction. First, we analyzed the specific characteristics of Inchon Port such as dock based on the data of 1997. And then, we construct the database of experts knowledge for berth utilization. Finally, we build the real-time decision support system for the efficient berth operation of Inchon Port to make the better berth allocation in case of not only regular scheduling but also dynamic scheduling such as delay in berth operation and exchange of ship between berths. The DSS is developed with graphic user interface(GUI) concept to help the user determining user interactive updating of the port status. Then this DSS will be provide decision maker with an efficient and fast way to berth allocation, and reduce wastes of time, space, and manpower in Inchon Port operation.

  • PDF