• Title/Summary/Keyword: Identifier System

Search Result 264, Processing Time 0.035 seconds

Public Key based Secure Data Management Scheme for the Cloud Data Centers in Public Institution (공공기관 클라우드 데이터 센터에 활용 가능한 공개키 기반의 안전한 데이터 관리 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.467-477
    • /
    • 2013
  • The cloud computing has propagated rapidly and thus there is growing interest on the introduction of cloud services in the public institution. Accordingly, domestic public institution are adoption of cloud computing impose and devise a plan. In addition, more specifically, is building a cloud computing system in the public institution. However, solutions to various security threats(e.g., availability invasion of storage, access by unauthorized attacker, data downloaded from uncertain identifier, decrease the reliability of cloud data centers and so on) is required. For the introduction and revitalize of cloud services in the public institution. Therefore, in this paper, we propose a public key based secure data management scheme for the cloud data centers in public institution. Thus, the use of cloud computing in the public institutions, the only authorized users have access to the data center. And setting for importance and level of difficulty of public data management enables by systematic, secure, and efficient. Thus, cloud services for public institution to improve the overall security and convenience.

Tool Development for Identifying Components using Object-Oriented Domain Models (객체 지향 도메인 모델을 이용한 컴포넌트 식별 도구 개발)

  • 이우진;권오천
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.381-392
    • /
    • 2003
  • Component-based Development(CBD) based on the software reuse has been more attractive from software companies that want to enhance software productivity. However, since component identification process is mainly dependent on domain expert´s intuition and experience, it was very difficult to develop tools for supporting the component identification process. In this paper, we propose a systematic procedure of identifying reusable component by using object dependencies and object usages and provide a design and implementation of its supporting tool. In object-oriented domain models. there exists several diagrams which are described in different viewpoints. From these diagrams, object dependency and object usages are extracted and merged into an object dependency network, which is a basis for performing a comfonent identification algorithm. Finally, through a case study of internet banking system, we evaluate the applicability of the proposed identification process and tool.

Design and Implementation of Multiple View Image Synthesis Scheme based on RAM Disk for Real-Time 3D Browsing System (실시간 3D 브라우징 시스템을 위한 램 디스크 기반의 다시점 영상 합성 기법의 설계 및 구현)

  • Sim, Chun-Bo;Lim, Eun-Cheon
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.5
    • /
    • pp.13-23
    • /
    • 2009
  • One of the main purpose of multiple-view image processing technology is support realistic 3D image to device user by using multiple viewpoint display devices and compressed data restoration devices. This paper proposes a multiple view image synthesis scheme based on RAM disk which makes possible to browse 3D images generated by applying effective composing method to real time input stereo images. The proposed scheme first converts input images to binary image. We applies edge detection algorithm such as Sobel algorithm and Prewiit algorithm to find edges used to evaluate disparities from images of 4 multi-cameras. In addition, we make use of time interval between hardware trigger and software trigger to solve the synchronization problem which has stated ambiguously in related studies. We use a unique identifier on each snapshot of images for distributed environment. With respect of performance results, the proposed scheme takes 0.67 sec in each binary array. to transfer entire images which contains left and right side with disparity information for high quality 3D image browsing. We conclude that the proposed scheme is suitable for real time 3D applications.

Semantic Service Composition Based on Semantic Broker (시맨틱 브로커 기반 시맨틱 서비스 조합)

  • Jung, Hanmin;Lee, Mi-Kyoung;You, Beom-Jong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.283-288
    • /
    • 2009
  • Semantic service can be defined as the service providing search API or reasoning API based on ontology and Web Services. It performs a pre-defined task by exploiting URI, classes, and properties. This study introduces a semantic service composition method based on a semantic broker referring ontology and management information of semantic services stored in a semantic service manager with requirements of the user. The requirements consist of input instances, an output class, a visualization type, semantic service names, and property names. This composition method provides dynamically generated semantic service pipelines including composit semantic services. The user can execute the pipelines provided by the semantic broker to find a meaningful semantic pipeline. After all, this study contributes to develop a system supporting human service planners who want to find composit semantic services among distributed semantic services.

  • PDF

Mobile IP local pre-registration scheme for accommodating real-time data traffics in cdma2000 Networks (cdma2000 네트워크에서 실시간 데이터 트래픽을 수용하기 위한 Mobile IP 지역내 사전등록 기법)

  • 박민철;임재성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7A
    • /
    • pp.493-502
    • /
    • 2003
  • In this paper, to solve some problems of the Mobile IP and local registration strategy we propose a method that can effectively support real-time traffics sensitive to delay time and packet loss. The proposed method reduces the registration time after a Mobile Node's movement between networks by carrying out the pre-registration for the domain which it will move into the network information of the link layer of cdma2000 system, at the boundary cell's handoff zone. Through the cost analysis and simulation it is shown that the proposed scheme yield a better performance compared with the Mobile IP and local registration strategies in terms of packet loss for parameters; variation of the velocity of a Mobile Node, and a distance between the Mobile Node and home networks, etc.

An Efficient Broadcast Technique for Vehicular Networks

  • Ho, Ai Hua;Ho, Yao H.;Hua, Kien A.;Villafane, Roy;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • v.7 no.2
    • /
    • pp.221-240
    • /
    • 2011
  • Vehicular networks are a promising application of mobile ad hoc networks. In this paper, we introduce an efficient broadcast technique, called CB-S (Cell Broadcast for Streets), for vehicular networks with occlusions such as skyscrapers. In this environment, the road network is fragmented into cells such that nodes in a cell can communicate with any node within a two cell distance. Each mobile node is equipped with a GPS (Global Positioning System) unit and a map of the cells. The cell map has information about the cells including their identifier and the coordinates of the upper-right and lower-left corner of each cell. CB-S has the following desirable property. Broadcast of a message is performed by rebroadcasting the message from every other cell in the terrain. This characteristic allows CB-S to achieve an efficient performance. Our simulation results indicate that messages always reach all nodes in the wireless network. This perfect coverage is achieved with minimal overhead. That is, CB-S uses a low number of nodes to disseminate the data packets as quickly as probabilistically possible. This efficiency gives it the advantage of low delay. To show these benefits, we give simulations results to compare CB-S with four other broadcast techniques. In practice, CB-S can be used for information dissemination, or to reduce the high cost of destination discovery in routing protocols. By also specify the radius of affected zone, CB-S is also more efficient when broadcast to a subset of the nodes is desirable.

Effects of a Herbal Medicine, Yukgunja-Tang Extract Granule, on Functional Dyspepsia Patients by Sasang Constitution: Placebo-Controlled, Double-Blind, Randomized Trial (기능성 소화불량에 대한 육군자탕 엑스과립의 사상체질별 치료효과: 위약 대조, 이중 맹검, 무작위 시험)

  • Jeon, Su-Hyeong;Kim, Jong-Won
    • Journal of Sasang Constitutional Medicine
    • /
    • v.30 no.2
    • /
    • pp.42-54
    • /
    • 2018
  • Objectives This study was aimed to compare effects of Yukgunja-tang (YGJT) extract granule on functional dyspepsia (FD) by sasang constitution. Methods A placebo-controlled, double-blind, randomized, two-center trial was performed. We obtained 3D face images of FD patients participating in this study using face-only scanner and classified them into two types as narrow face and wide face by 3D facial shape diagnosis system (3-FSDS). 96 subjects (48 subjects per type) were enrolled and were randomly allocated into treatment or control groups in a 2:1 ratio. YGJT extract granule or placebo were administered to each group during the 8 week treatment period. One of sasang constitutional specialist diagnosed their constitutions by referring to questionnaires and 3D face images. The primary outcome was total dyspepsia symptom scale (TDS scale), the secondary outcomes were single dyspepsia symptom scale (SDS scale), visual analog scale (VAS) and so on. This trial was registered with clinical research information service identifier: KCT0001920, 15 May, 2016. Results In the Taeeumin treatment group, the TDS scale was significantly decreased after 8 weeks compared to the control group (t=2.331, p=0.025) and the SDS scale also significantly decreased. (t=2.042, p=0.048). The specific effects of the YGJT extract granule without the placebo effect on the Taeeumin with functional dyspepsia were 30.61% in TDS scale and 28.33% in SDS scale. Conclusions The effects of Yukgunja-tang extract granule on functional dyspepsia was different according to Sasang constitution. So the constitution should be considered in randomized controlled trials using herbal extract granules.

Service Class-Aided Scheduling for LTE (LTE를 위한 서비스 클래스를 고려한 스케줄링 기법)

  • Hung, Pham;Hwang, Seung-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.60-66
    • /
    • 2011
  • LTE (Long Term Evolution) supports QoS (Quality of Service) with several service classes. For each class of traffic, a big difference exists on BER (Bit Error Rate) requirement. This leads to a considerable difference in transmission power for various classes of traffic. In this paper, a novel scheduler is designed and proposed for LTE which supports CoS (Class of Service) with the consideration of priority as well as target BER. By the CQI (Channel Quality Indicator) and QCI (QoS Class Identifier), a minimum transmission power is assigned from the target BER for each class of traffic per each user. Hence, with the other information such as user's used rate in the past and the priority of traffic, the probability of occupying channels is determined. The simulation results of Service Class scheduling are compared with that of Maximum Rate and Proportional Fair. The results show that the service class-aided scheduling can improve the throughput of whole system significantly.

The De-identification Technique Using Data Grouping in Relational Database (관계형 데이터베이스에서 데이터 그룹화를 이용한 익명화 처리 기법)

  • Park, Jun-Bum;Jin, Seung-Hun;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.493-500
    • /
    • 2015
  • Personal information exposed in the Internet is increasing by the public data opening and sharing, vitalization of SNS(Social Network Service) and growth of information shared between users. Exposed personal information in the Internet can infringe upon targeted users using linkage attack or background attack. To prevent these attack De-identification models were appeared a few years ago. The 'k-anonymity' has been introduced in the first place, and the '${\ell}$-diversity' and 't-closeness' have been followed up as solutions, and diverse algorithms have been being suggested for performance improvement nowadays. However, industry or public sectors actually needs a whole solution as a system for the de-identification process rather than performance of the de-identification algorithm. This paper explains a way of de-identification techique for 'k-anonymity', '${\ell}$-diversity', and 't-closeness' algorithm using QI(Quasi-Identifier) grouping method in the relational database.

Secure Smart Safety System Using Streetlight Infrastructure (가로등 인프라를 활용한 안전한 스마트 방범 시스템)

  • Cha, Jeong-Hwa;Lee, Ju-Yong;Lee, Ji-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.851-856
    • /
    • 2015
  • As crime has actually increased in recent years, various mobile applications related to safety and emergency measure have received much attention. Therefore, IoT (Internet of Things) technologies, which connect various physical objects with Internet communication, have been also paid attention and then diverse safety services based on IoT technologies have been on the increase. However, existing mobile safety applications are simply based on location based service (LBS). Also, as they are independently operated without the help of another safety systems, they cannot efficiently cope with various safety situations. So, this paper proposes the efficient smart safety service architecture with both the risky situation detection using user location as well as various sensing information and the risk congruence measure using the streetlight infrastructure. Additionally, UDID (unique device identifier) is utilized for the secure communication with the control center.