• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.023 seconds

Integrity, Orbit Determination and Time Synchronisation Algorithms for Galileo

  • Merino, M.M. Romay;Medel, C. Hernandez;Piedelobo, J.R. Martin
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.9-14
    • /
    • 2006
  • Galileo is the European Global Navigation Satellite System, under civilian control, and consists on a constellation of medium Earth orbit satellites and its associated ground infrastructure. Galileo will provide to their users highly accurate global positioning services and their associated integrity information. The elements in charge of the computation of Galileo navigation and integrity information are the OSPF (Orbit Synchronization Processing Facility) and IPF (Integrity Processing Facility), within the Galileo Ground Mission Segment (GMS). Navigation algorithms play a key role in the provision of the Galileo Mission, since they are responsible for computing the essential information the users need to calculate their position: the satellite ephemeris and clock offsets. Such information is generated in the Galileo Ground Mission Segment and broadcast by the satellites within the navigation signal, together with the expected a-priori accuracy (SISA: Signal-In-Space Accuracy), which is the parameter that in fault-free conditions makes the overbounding the predicted ephemeris and clock model errors for the Worst User Location. In parallel, the integrity algorithms of the GMS are responsible of providing a real-time monitoring of the satellite status with timely alarm messages in case of failures. The accuracy of the integrity monitoring system is characterized by the SISMA (Signal In Space Monitoring Accuracy), which is also broadcast to the users through the integrity message.

  • PDF

Analysis Method of Signal Integrity for Mobile Display Circuit Modules (모바일 디스플레이 회로 모듈의 시그널 인티그리티 해석 기법)

  • Lee, Yong-Min
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.46 no.4
    • /
    • pp.64-69
    • /
    • 2009
  • This paper addresses the simulation methodology of signal integrity and power integrity for mobile display modules. The proposed technique can be applied to analyse a circuit module which consist of connector, FPCB and driver ICs. The recent demand of serial interconnection technology in the mobile display industry needs delicate impedance control of signal and power traces to prohibit system malfunctioning and to reduce electromagnetic field radiation. Based on the S-parameter and Z-parameter analysis, we analyse the correlation between frequency-domain and time-domain measurements. With multi-port macros, signal integrity can be included in power integrity analysis in time domain.

A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks

  • Liu, Xiyao;Ge, Yu;Zhu, Yuesheng;Wu, Dajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4643-4660
    • /
    • 2014
  • Integrity authentication of biometric data in Wireless Body Area Network (WBAN) is a critical issue because the sensitive data transmitted over broadcast wireless channels could be attacked easily. However, traditional cryptograph-based integrity authentication schemes are not suitable for WBAN as they consume much computational resource on the sensor nodes with limited memory, computational capability and power. To address this problem, a novel lightweight integrity authentication scheme based on reversible watermark is proposed for WBAN and implemented on a TinyOS-based WBAN test bed in this paper. In the proposed scheme, the data is divided into groups with a fixed size to improve grouping efficiency; the histogram shifting technique is adopted to avoid possible underflow or overflow; local maps are generated to restore the shifted data; and the watermarks are generated and embedded in a chaining way for integrity authentication. Our analytic and experimental results demonstrate that the integrity of biometric data can be reliably authenticated with low cost, and the data can be entirely recovered for healthcare applications by using our proposed scheme.

The Design and Implementation of HTML Document Integrity Management System (HTML 문서의 무결성 유지 시스템의 설계 및 구현)

  • 조이기;이영운;황인문;양수영;김원중
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.380-383
    • /
    • 2002
  • It Is difficult to manage broken link with dangling reference, inaccurate reference m the manual site that is consist of HTML documents of much quantity as KLDP(Korean Linux Documentation Project, http:/ /kldp.org) Web site. In this paper. we define relationship and constrain renditions that exist between Web site's HTML documents. And we design and implement HIMS(HTML Document Integrity Management System), which notify user that integrity violation happens or launch trigger operation to keep integrity between HTML documents in case of insert, delete, update.

  • PDF

Integrity Verification in Vehicle Black Box Video Files with Hashing Method (차량용 블랙박스 영상파일의 무결성 검증에 해시함수 이용 방법)

  • Choi, Jin-young;Chang, Nam Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.241-249
    • /
    • 2017
  • Recently, as a vehicle black box device has propagated, it has been increasingly used as a legal proof and there are the needs to verify an integrity of the video data. However, since the black box classified as the embedded system has a small capacity and low processing speed, there are limitations to the storage of video files and the integrity verification processing. In this paper, we propose a novel method for video files integrity in the black box environment with limited resources by using lightweight hash function LSH and the security of HMAC. We also present the test results of CPU idle rate at integrity verification in vehicle black box device by implementing this method, and verify the effectiveness and practicality of the proposed method.

Edge-Integrity and the Syllable Structure in Korean

  • Kang, Eun-Yeong
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2002.02a
    • /
    • pp.135-146
    • /
    • 2002
  • The so-called overapplication of Coda Neutralization in Korean, the occurrence of a neutralized consonant in a non-neutralizing environment, is often considered as evidence for serial derivation. In this paper I propose that the neutralization effect at surface is not a result of a phonological process at an intermediate level in serial derivation, but due to a constraint requiring the integrity of the morphological constituent: EDGE-INTEGRITY. It is argued that this is not reducible to an alignment constraint, but a genuine faithfulness constraint on the edge of a morphological constituent. The putative opacity related with the coda neutralization is shown to be an epiphenomenon arising from the ambisyllabic representation of a consonant at a morphological juncture, satisfying both EDGE-INTEGRITY arid Syllabic Conditions. Consonant Copy in the Jeju dialect provides further evidence for EDGE-INTEGRITY, the Only difference being that the conflict between Syllabic Conditions and EDGE-INTEGRITY is resolved by insertion of a copied consonant.

  • PDF

A Study on Referential Integrity Constraint on Web Page (웹 페이지에서 참조무결성 제약조건에 관한 연구)

  • 유남현;손철수;김원중
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.569-572
    • /
    • 2004
  • The Web site which many people manage and maintenance much HTML page is so difficult to solve broken link like as dangling reference and inaccurate contents reference. That is, in the case we update or delete connections structure between HTML documents, it is difficult to guarantee referential integrity of Web Pages. In this chapter, we surveyed and defined integrity constraints condition between the parent page and child page, and studied about method to express by extension UML. WWW, Constraints, UML

  • PDF

A Review on the Scope of the Right of Integrity : Focusing on the Case about the Popular Music (저작권법상 동일성유지권의 범위에 관한 검토 : 대중음악에 관한 사례를 중심으로)

  • Park, Da Hyo;Kang, Seung Hee;Jang, Soon ho
    • Journal of Information Technology Services
    • /
    • v.19 no.4
    • /
    • pp.109-124
    • /
    • 2020
  • In 2012, Psy's music video 'Gangnam Style' spread through parodies, and gained explosive popularity. In 2016, there was a case so-called as 'baseball ground cheering song' in which a author(songwriters) claimed an infringement of the 'right of integrity' related to cheering songs used by professional baseball teams. In response, the court denied violating the right of integrity in 2019. These cases have different effects depending on whether or not the 'right of integrity' is claimed. This study attempted an economic analysis in addition to a legal analysis of the right of integrity. Korean copyright law regards even simple changes that go against the author's will as a infringement of the 'right of integrity' even if they do not harm honor or reputation. Such legislation is one of the most strongly protected forms in the world, so it cause many problems. Meanwhile, we analyzed the cost-benefit analysis of Psy's 'Gangnam Style' case and the 'baseball ground cheering song' case. As a result of the analysis, the right to integrity is inefficient in quantitative and qualitative aspects. Therefore, the right of integrity should be reconsidered with the focus on 'popular music'. In particular, considering the development of information communication technology and changes, a revision direction is needed to meet the purpose of the copyright act. Furthermore, in order to solve the legal issues under the Copyright Act, the requirement for infringement of the right of integrity should be relaxed. Then, we proposed the establishment of a proviso clause on the right of integrity.

GPS Integrity Monitoring Method Using Auxiliary Nonlinear Filters with Log Likelihood Ratio Test Approach

  • Ahn, Jong-Sun;Rosihan, Rosihan;Won, Dae-Hee;Lee, Young-Jae;Nam, Gi-Wook;Heo, Moon-Beom;Sung, Sang-Kyung
    • Journal of Electrical Engineering and Technology
    • /
    • v.6 no.4
    • /
    • pp.563-572
    • /
    • 2011
  • Reliability is an essential factor in a navigation system. Therefore, an integrity monitoring system is considered one of the most important parts in an avionic navigation system. A fault due to systematic malfunctioning definitely requires integrity reinforcement through systematic analysis. In this paper, we propose a method to detect faults of the GPS signal by using a distributed nonlinear filter based probability test. In order to detect faults, consistency is examined through a likelihood ratio between the main and auxiliary particle filters (PFs). Specifically, the main PF which includes all the measurements and the auxiliary PFs which only do partial measurements are used in the process of consistency testing. Through GPS measurement and the application of the autonomous integrity monitoring system, the current study illustrates the performance of the proposed fault detection algorithm.

Broken Integrity Detection of Video Files in Video Event Data Recorders

  • Lee, Choongin;Lee, Jehyun;Pyo, Youngbin;Lee, Heejo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3943-3957
    • /
    • 2016
  • As digital evidence has a highly influential role in proving the innocence of suspects, methods for integrity verification of such digital evidence have become essential in the digital forensic field. Most surveillance camera systems are not equipped with proper built-in integrity protection functions. Because digital forgery techniques are becoming increasingly sophisticated, manually determining whether digital content has been falsified is becoming extremely difficult for investigators. Hence, systematic approaches to forensic integrity verification are essential for ascertaining truth or falsehood. We propose an integrity determination method that utilizes the structure of the video content in a Video Event Data Recorder (VEDR). The proposed method identifies the difference in frame index fields between a forged file and an original file. Experiments conducted using real VEDRs in the market and video files forged by a video editing tool demonstrate that the proposed integrity verification scheme can detect broken integrity in video content.