• Title/Summary/Keyword: Key account

Search Result 538, Processing Time 0.022 seconds

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

Active Distribution System Planning for Low-carbon Objective using Cuckoo Search Algorithm

  • Zeng, Bo;Zhang, Jianhua;Zhang, Yuying;Yang, Xu;Dong, Jun;Liu, Wenxia
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.2
    • /
    • pp.433-440
    • /
    • 2014
  • In this study, a method for the low-carbon active distribution system (ADS) planning is proposed. It takes into account the impacts of both network capacity and demand correlation to the renewable energy accommodation, and incorporates demand response (DR) as an available resource in the ADS planning. The problem is formulated as a mixed integer nonlinear programming model, whereby the optimal allocation of renewable energy sources and the design of DR contract (i.e. payment incentives and default penalties) are determined simultaneously, in order to achieve the minimization of total cost and $CO_2$ emissions subjected to the system constraints. The uncertainties that involved are also considered by using the scenario synthesis method with the improved Taguchi's orthogonal array testing for reducing information redundancy. A novel cuckoo search (CS) is applied for the planning optimization. The case study results confirm the effectiveness and superiority of the proposed method.

Spatial correlation-based WRF observation-nudging approach in simulating regional wind field

  • Ren, Hehe;Laima, Shujin;Chen, Wen-Li;Guo, Anxin;Li, Hui
    • Wind and Structures
    • /
    • v.28 no.2
    • /
    • pp.129-140
    • /
    • 2019
  • Accurately simulating the wind field of large-scale region, for instant urban areas, the locations of large span bridges, wind farms and so on, is very difficult, due to the complicated terrains or land surfaces. Currently, the regional wind field can be simulated through the combination of observation data and numerical model using observation-nudging in the Weather Research and Forecasting model (WRF). However, the main drawback of original observation-nudging method in WRF is the effects of observation on the surrounding field is fully mathematical express in terms of temporal and spatial, and it ignores the effects of terrain, wind direction and atmospheric circulation, while these are physically unreasonable for the turbulence. For these reasons, a spatial correlation-based observation-nudging method, which can take account the influence of complicated terrain, is proposed in the paper. The validation and comparation results show that proposed method can obtain more reasonable and accurate result than original observation-nudging method. Finally, the discussion of wind field along bridge span obtained from the simulation with spatial correlation-based observation-nudging method was carried out.

Video Quality Assessment Based on Short-Term Memory

  • Fang, Ying;Chen, Weiling;Zhao, Tiesong;Xu, Yiwen;Chen, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.7
    • /
    • pp.2513-2530
    • /
    • 2021
  • With the fast development of information and communication technologies, video streaming services and applications are increasing rapidly. However, the network condition is volatile. In order to provide users with better quality of service, it is necessary to develop an accurate and low-complexity model for Quality of Experience (QoE) prediction of time-varying video. Memory effects refer to the psychological influence factor of historical experience, which can be taken into account to improve the accuracy of QoE evaluation. In this paper, we design subjective experiments to explore the impact of Short-Term Memory (STM) on QoE. The experimental results show that the user's real-time QoE is influenced by the duration of previous viewing experience and the expectations generated by STM. Furthermore, we propose analytical models to determine the relationship between intrinsic video quality, expectation and real-time QoE. The proposed models have better performance for real-time QoE prediction when the video is transmitted in a fluctuate network. The models are capable of providing more accurate guidance for improving the quality of video streaming services.

The Rating of Korean Basketball League Teams in 2006-2007 Season: Taking Account of Home-Court Advantage (홈팀의 이점을 고려한 KBL 2006-2007 시즌 경기력 평가)

  • Lee, Seung-Chun;Byun, Jong-Seok
    • Communications for Statistical Applications and Methods
    • /
    • v.15 no.5
    • /
    • pp.687-695
    • /
    • 2008
  • It is widely known that the home advantage plays an important factor for determining victory or defeat in sport leagues. Thus a ranking system of sport league should take account of the home advantage as a key factor. Various statistical models are studied to rate the Korean Basketball league teams in 2006-2007 season. Among them, the model equation provided by Harville and Smith (1994) is useful for constructing two ranking systems. Both systems give quite reasonable quantifications of the team's ability and the home advantage.

Seismic response of a rigid foundation embedded in a viscoelastic soil by taking into account the soil-foundation interaction

  • Messioud, Salah;Sbartai, Badreddine;Dias, Daniel
    • Structural Engineering and Mechanics
    • /
    • v.58 no.5
    • /
    • pp.887-903
    • /
    • 2016
  • This study analyses the seismic response of a three-dimensional (3-D) rigid massless square foundation resting or embedded in a viscoelastic soil limited by rigid bedrock. The foundation is subjected to harmonic oblique seismic waves P, SV, SH and R. The key step is the characterization of the soil-foundation interaction by computing the impedance matrix and the input motion matrix. A 3-D frequency boundary element method (BEM) in conjunction with the thin layer method (TLM) is adapted for the seismic analysis of the foundation. The dynamic response of the rigid foundation is solved from the wave equations by taking into account the soil-foundation interaction. The solution is formulated using the frequency BEM with the Green's function obtained from the TLM. This approach has been applied to analyze the effect of soilstructure interaction on the seismic response of the foundation as a function of the kind of incident waves, the angles of incident waves, the wave's frequencies and the embedding of foundation. The parametric results show that the non-vertical incident waves, the embedment of foundation, and the wave's frequencies have important impact on the dynamic response of rigid foundations.

Validating Twin Deficit Hypothesis: The Zambian Case

  • Mahuni, Kenneth
    • Asia Pacific Journal of Business Review
    • /
    • v.1 no.2
    • /
    • pp.1-16
    • /
    • 2017
  • The fundamental goal of the research was to verify if the Twin Deficits Hypothesis holds for the economy of Zambia using time series data from 1980-2014. The current account and budget deficit were employed as key variables. The exchange rate was also used as a transmission mechanism to see how it contributes in the nexus. Cointegration tests confirmed a long run association of the variables. After fitting the VECM model, Granger causality tests confirmed the existence of twin deficits for Zambia. The results supported uni-directional reverse causality. The exchange rate was shown to be more significant in the long run than in the short run. The implosion of the time series as shown by the predicted cointegration equation implies that unless drastic measures are taken to cure the deficits, using the current account as the major target variable, twin deficits will persist for some time. The major policy implication of this research is that given that Zambia is a primary commodity-dependent developing country subsisting largely on copper revenues to sustain the economy, there is a need to move away from "copper addiction," given the recent volatility of earnings of primary commodities (e.g. through diversification of the economy, import substitution, and other strategies).

An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking (자바스크립트 변조를 이용한 국내 인터넷 뱅킹 키보드 암호화 모듈 우회 공격)

  • Lee, Sung-hoon;Kim, Seung-hyun;Jeong, Eui-yeob;Choi, Dae-seon;Jin, Seung-hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.941-950
    • /
    • 2015
  • Internet banking is widely used in our life with the development of the internet. At the same time, phishing attacks to internet banking have been increased by using malicious object to make unfair profit. People using internet banking service in Korea is required to install security modules such as anti-virus and keyboard protection. However phishing attack technique has been progressed and the advanced technique such as memory hacking defeats the security module of internet banking service. In this paper, we describe internet banking security modules provided by Korean internet banks and analyze how keyboard encryption module works. And we propose an attack to manipulate account transfer information using javascript. Although keyboard protection module provides two functions that protect leakage and manipulation of account transfer information submitted by users against the malicious program of hackers. Our proposed technique can manipulate the account transfer information and result html pages.

The Significance of Professional Subjectivity of a Specialist in Taking into Account Educational and Civilizational Changes in the Information Society

  • Podkovyroff, Tatiana Sonia Nanouchka;Golubenko, Natalya;Altanova, Alona;Shkodyn, Alona;Bielikova, Valentyna;Pasynchuk, Kateryna;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.83-90
    • /
    • 2022
  • A forecast foresight of the conditions for the development of educational affairs in the Information Society of Ukraine is presented, taking into account changes in the technique, technologies, and the socio-social sphere. Unresolved problems in Ukraine regarding the modernization and improvement of the education system by means of informatization are highlighted. The need for further improvement of Ukrainian education by means of informatization is noted. Formulated the main goal of future education. The necessary conditions for the successful development of future education are highlighted. The role and place of the key figure of the teacher in the education of the future is determined. The article highlights the theoretical and philosophical foundations of professional subjectivity of the future specialist. Recently, the world's pedagogical thought has increasingly focused on how to build an educational process so that it brings a sense of happiness to all its participants. It is believed that this is a new management philosophy in general, although its origins are in ancient Greek sources, which claim that only a happy life has meaning and value. It is found out that the professional subjectivity of a specialist is an important professionally significant quality of the individual, which provides a purposeful and optimal implementation of their mental, personal resources for solving professional and life problems, which is manifested in the desire for self-definition, self-determination, self-regulation and self-improvement in professional activities taking into account the information society. The structure of this phenomenon is shown.

Intelligent Character Recognition System for Account Payable by using SVM and RBF Kernel

  • Farooq, Muhammad Umer;Kazi, Abdul Karim;Latif, Mustafa;Alauddin, Shoaib;Kisa-e-Zehra, Kisa-e-Zehra;Baig, Mirza Adnan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.213-221
    • /
    • 2022
  • Intelligent Character Recognition System for Account Payable (ICRS AP) Automation represents the process of capturing text from scanned invoices and extracting the key fields from invoices and storing the captured fields into properly structured document format. ICRS plays a very critical role in invoice data streamlining, we are interested in data like Vendor Name, Purchase Order Number, Due Date, Total Amount, Payee Name, etc. As companies attempt to cut costs and upgrade their processes, accounts payable (A/P) is an example of a paper-intensive procedure. Invoice processing is a possible candidate for digitization. Most of the companies dealing with an enormous number of invoices, these manual invoice matching procedures start to show their limitations. Receiving a paper invoice and matching it to a purchase order (PO) and general ledger (GL) code can be difficult for businesses. Lack of automation leads to more serious company issues such as accruals for financial close, excessive labor costs, and a lack of insight into corporate expenditures. The proposed system offers tighter control on their invoice processing to make a better and more appropriate decision. AP automation solutions provide tighter controls, quicker clearances, smart payments, and real-time access to transactional data, allowing financial managers to make better and wiser decisions for the bottom line of their organizations. An Intelligent Character Recognition System for AP Automation is a process of extricating fields like Vendor Name, Purchase Order Number, Due Date, Total Amount, Payee Name, etc. based on their x-axis and y-axis position coordinates.