• Title/Summary/Keyword: Location Information Assurance

Search Result 13, Processing Time 0.03 seconds

Comparative Study on the Measures of Similarity for the Location Template Matching(LTM) Method (Location Template Matching(LTM) 방법에 사용되는 유사성 척도들의 비교 연구)

  • Shin, Kihong
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.24 no.4
    • /
    • pp.310-316
    • /
    • 2014
  • The location template matching(LTM) method is a technique of identifying an impact location on a structure, and requires a certain measure of similarity between two time signals. In general, the correlation coefficient is widely used as the measure of similarity, while the group delay based method is recently proposed to improve the accuracy of the impact localization. Another possible measure is the frequency response assurance criterion(FRAC), though this has not been applied yet. In this paper, these three different measures of similarity are examined comparatively by using experimental data in order to understand the properties of these measures of similarity. The comparative study shows that the correlation coefficient and the FRAC give almost the same information while the group delay based method gives the shape oriented information that is best suitable for the location template matching method.

Comparative Study on the Measures of Similarity for the Location Template Matching (LTM) Method (Location Template Matching(LTM) 방법에 사용되는 유사성 척도들의 비교 연구)

  • Shin, Kihong
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2014.04a
    • /
    • pp.506-511
    • /
    • 2014
  • The location template matching (LTM) method is a technique of identifying an impact location on a structure, and requires a certain measure of similarity between two time signals. In general, the correlation coefficient is widely used as the measure of similarity, while the group delay based method is recently proposed to improve the accuracy of the impact localization. Another possible measure is the frequency response assurance criterion (FRAC), though this has not been applied yet. In this paper, these three different measures of similarity are examined comparatively by using experimental data in order to understand the properties of these measures of similarity. The comparative study shows that the correlation coefficient and the FRAC give almost the same information while the group delay based method gives the shape oriented information that is best suitable for the location template matching method.

  • PDF

Integrative Analysis on Service Quality and User Satisfaction of Wired and Mobile Internet: A Case Study in Korea

  • Cho, Sung-Bin;Sung, Min-Je
    • Management Science and Financial Engineering
    • /
    • v.13 no.2
    • /
    • pp.79-97
    • /
    • 2007
  • This paper investigates the relationship of service quality and user satisfaction in the wired and mobile Internet services based on the integrative framework of both systems. Given a moderate level of reliability and validity, the commonly driven dimensions for measuring service quality include responsiveness, assurance, empathy, convenience, usefulness, and diversity. User satisfaction is measurable by the dimensions of communication/entertainment, finance/economics, location/geography, and information/consulting. We apply the MANOVA tests to evaluate whether each of the service quality dimensions has an overall influence on user satisfaction. Next, multiple regression analyses are conducted to check if unique positive effect exists between each combination of service quality dimensions and user satisfaction dimensions. The results show that service quality must be taken care of with respect to the assurance dimension in order to enhance customer satisfaction in the dimensions of location/geography, which will contribute to increasing the utilization of mobile service. For improving user satisfaction in the dimension of information/consulting, service quality must be supported with respect to assurance and empathy in the mobile Internet market, in addition to diversity, which is the only significant service quality in the wired Internet service.

A Secure Protocol for Location-Aware Services in VANETs (VANET에서 안전한 위치인지 서비스를 위한 보안 프로토콜)

  • Sur, Chul;Park, Youngho;Rhee, Kyung Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.495-502
    • /
    • 2013
  • In this paper, we present an anonymous authentication and location assurance protocol for secure location-aware services over vehicular ad hoc networks (VANETs). In other to achieve our goal, we propose the notion of a location-aware signing key so as to strongly bind geographic location information to cryptographic function while providing conditional privacy preservation which is a desirable property for secure vehicular communications. Furthermore, the proposed protocol provides an efficient procedure based on hash chain technique for revocation checking to effectively alleviate communication and computational costs on vehicles in VANETs. Finally, we demonstrate comprehensive analysis to confirm the fulfillment of the security objectives, and the efficiency and effectiveness of the proposed protocol.

Performance Enhancement Architecture including Location Information Secrecy for HLR System (위치 정보의 보안성이 고려된 가입자 위치등록기 시스템의 새로운 구조)

  • 김자환
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.103-108
    • /
    • 2004
  • A Home Location Register(HLR) database system manages each subscriber's location information, which continuously changes in a cellular network. For this purpose, the HLR database system provides table management, index management, and backup management facilities. In this thesis, I propose using a two-level index method for the mobile directory number(MDN) as a suitable method and a chained bucket hashing method for the electronic serial number(ESN). Both the MDN and the ESN are used as keys in the HLR database system. I also propose an efficient backup method that takes into account the characteristics of HLR database transactions. The retrieval speed and the memory usage of the two-level index method are better than those of the T-tree index method. The insertion and deletion overhead of the chained bucket hashing method is less than that of the modified linear hashing method. In the proposed backup method, I use two kinds of dirty flags in order to solvethe performance degradation problem caused by frequent registration-location operations. I also propose using additional attributes in the HLR database scheme for location information secrecy as a suitable security method.

  • PDF

VANET Privacy Assurance Architecture Design (VANET 프라이버시 보장 아키텍처 설계)

  • Park, Su-min;Hong, Man-pyo;Shon, Tae-shik;Kwak, Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.81-91
    • /
    • 2016
  • VANET is one of the most developed technologies many people have considered a technology for the next generation. It basically utilizes the wireless technology and it can be used for measuring the speed of the vehicle, the location and even traffic control. With sharing those information, VANET can offer Cooperative ITS which can make a solution for a variety of traffic issues. In this way, safety for drivers, efficiency and mobility can be increased with VANET but data between vehicles or between vehicle and infrastructure are included with private information. Therefore alternatives are necessary to secure privacy. If there is no alternative for privacy, it can not only cause some problems about identification information but also it allows attackers to get location tracking and makes a target. Besides, people's lives or property can be dangerous because of sending wrong information or forgery. In addition to this, it is possible to be information stealing by attacker's impersonation or private information exposure through eavesdropping in communication environment. Therefore, in this paper we propose Privacy Assurance Architecture for VANET to ensure privacy from these threats.

Mid-Term Performance of Clinical LINAC in Volumetric Modulated Arc Therapy

  • Rahman, Mohammad Mahfujur;Kim, Chan Hyeong;Kim, Seonghoon
    • Journal of Radiation Protection and Research
    • /
    • v.44 no.1
    • /
    • pp.43-52
    • /
    • 2019
  • Background: The mid-term performance of clinical linear accelerator (LINAC) during volumetric modulated arc therapy (VMAT) treatment period is not performed in clinical practice and usually replaced with one-time plan quality assurance (QA). In this research we aim to monitor daily reproducibility of VMAT delivery from tracking individual leaf movement error and dosimetric error to evaluate the mid-term quality of the machine used. Materials and Methods: First, multileaf collimator (MLC) information was imported into MATLAB program to determine which of the MLC leaves in the leaf bank had the maximum RMS position error (maxRMS). We estimated where the maximum positional errors (maxPE) of the chosen leaf occur along its path length and tracked its daily variations over the entire treatment period. Secondly, picture information of dosimetric error from portal dosimetry was imported into MATLAB where representative high gamma index region (HGR) was determined as HGR with length of > 1 cm and their centers were daily tracked. Results and Discussion: The maxPEs in the brain and tongue cases were distributed broader than in other cases, but all data were found located within ${\pm}0.5mm$. From first day to last day all of five cases show the similar visual pattern of HGRs and Centers of the longest HGRs remained within ${\pm}1mm$ of that in first day. These findings prove excellent mid-term performance of the LINAC used in VMAT treatments over a full course of treatment. Conclusion: Tracking the daily location changes of leaf movement and dosimetric error can be a good indicator of predicting the daily quality like stability and reproducibility of beam delivering in VMAT treatment.

A study on exposed aggrigate P.C. in field plant cast - case study for core building, VOTRAKON project - (골재노출 P.C제품의 현지생산에 관한 소고 -보트라콘 프로젝트의 코아빌딩을 중심으로-)

  • 이학영
    • Journal of the Korean Professional Engineers Association
    • /
    • v.19 no.2
    • /
    • pp.34-42
    • /
    • 1986
  • These brief studies and reports of the use of exposed aggrigate precast concrete in practice are combined with a description of some notable co-ordination such as shop drawing, manufacturing and erection in the field construction. Above mentioned exposed aggrigate P. C. means architectural P. C. which was used to the VOTRAKON site in Riyadh, Saudi Arabia. Fabricated P. C. on the site without autoclaving and steam curing plant had been successfully carried out on this project-core building, conference room and others. The project designed by HOPE/VTN international INC. which is located in San Diego, California U.S.A. stands for vocational training and related support facilities contract. We had to submit shop drawings showing complete information for fabrication and installation of P. C. unit reinforcement. Also we should be indicated member dimension and cross section, location size and type of necessary for erection. We can delineate the following characteristic results. One of the most important things how to handle exposed aggrigate P.C. unit as specified was quality assurance and co-ordination for shop drawing, manufacturing and erection.

  • PDF

A Study on the Development of Service Quality Scale in Traditional Market for Big Data Analysis

  • HWANG, Moon-Young
    • Korean Journal of Artificial Intelligence
    • /
    • v.7 no.1
    • /
    • pp.23-59
    • /
    • 2019
  • The purpose of this study is to develop a measure of service quality in the traditional market by examining previous research on the service quality of the traditional market studied so far. After defining basic concepts through definition of traditional market and existing studies, 5 categories of configuration items for SERVQUAL measurement in traditional market were made up based on existing researches related to definition of service quality and service quality of traditional market. A survey was conducted on the items that fit the intention of this study and various statistical analyzes were conducted. Statistical analysis was performed using SPSS 22.0 and AMOS 22.0. The reliability of the items was measured by the reliability test, and the predictability and accuracy of the items were examined. The validity of the measured variables was verified through confirmatory factor analysis. Reliability, empathy, responsiveness, certainty, and tangibility were the most important factors in this study. Responsiveness factors include communication, time reduction, real time, promptness. Assurance factors include the assurance of delivery, prompt answers, product knowledge items. Tangibility factors include, convenient device systems, location information, presence as a fact, and as a result, the latest modern items are adopted. The quality of service in the traditional market developed in this study was found to be good in reliability and validity test. Confirmatory factor analysis result using structural equation model also met the conformity index standard. If service satisfaction is measured based on this research, basic data can be presented to policy makers who implement policies on traditional markets to make the right decisions. In addition, it will be able to provide traditional market operators with operational strategy and marketing data. In the future, based on the traditional market service quality scale developed in this study, it is necessary to grasp the factors to be continuously managed to improve the service quality of the traditional market, user satisfaction, and intention to use.

The Framework for Cost Reduction of User Authentication Using Implicit Risk Model (내재적 리스크 감지 모델을 사용한 사용자 인증 편의성 향상 프레임워크)

  • Kim, Pyung;Seo, Kyongjin;Cho, Jin-Man;Kim, Soo-Hyung;Lee, Younho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1033-1047
    • /
    • 2017
  • Traditional explicit authentication, which requires awareness of the user's authentication process, is a burden on the user, which is one of main reasons why users tend not to employ authentication. In this paper, we try to reduce such cost by employing implicit authentication methods, such as biometrics and location based authentication methods. We define the 4-level security assurance model, where each level is mapped to an explicit authentication method. We implement our model as an Android application, where the implicit authentication methods are touch-stroke dynamics-based, face recognition based, and the location based authentication. From user experiment, we could show that the authentication cost is reduced by 14.9% compared to password authentication-only case and by 21.7% compared to the case where 6-digit PIN authentication is solely used.