• Title/Summary/Keyword: Multi-users

Search Result 1,469, Processing Time 0.028 seconds

A Method of Comparing Risk Similarities Based on Multimodal Data (멀티모달 데이터 기반 위험 발생 유사성 비교 방법)

  • Kwon, Eun-Jung;Shin, WonJae;Lee, Yong-Tae;Lee, Kyu-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.510-512
    • /
    • 2019
  • Recently, there have been growing requirements in the public safety sector to ensure safety through detection of hazardous situations or preemptive predictions. It is noteworthy that various sensor data can be analyzed and utilized as a result of mobile device's dissemination, and many advantages can be used in terms of safety and security. An effective modeling technique is needed to combine sensor data generated by smart-phones and wearable devices to analyze users' moving patterns and behavioral patterns, and to ensure public safety by fusing location-based crime risk data provided.

  • PDF

Blockchain-based Personal Information Authentication Method using Zero Knowledge Proofs (영지식을 활용한 블록체인 기반 개인정보 인증 기법)

  • Lee, Kwang Kyu
    • Smart Media Journal
    • /
    • v.10 no.3
    • /
    • pp.48-53
    • /
    • 2021
  • The authentication process is a key step that should be used to verify that a user is legitimate, and it should be used to verify that a user is a legitimate user and grant access only to that user. Recently, two-factor authentication and OTP schemes are used by most applications to add a layer of security to the login process and to address the vulnerability of using only one factor for authentication, but this method also allows access to user accounts without permission. This is a known security vulnerability. In this paper, we propose a Zero Knowledge Proofs (ZKP) personal information authentication scheme based on a Smart Contract of a block chain that authenticates users with minimal personal information exposure conditions. This has the advantage of providing many security technologies to the authentication process based on blockchain technology, and that personal information authentication can be performed more safely than the existing authentication method.

A Study on User's Wayfinding Information-Seeking Behavior When Using the Mobile Map Application on Foot (도보 상황에서 모바일 지도 애플리케이션 이용자의 길 찾기 정보추구행위에 관한 연구)

  • Gwon, Hyeon Jeong;Lee, Jee Yeon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.469-492
    • /
    • 2021
  • This study aims to find an optimal method for the mobile map application to provide directions by analyzing users' behavior in wayfinding and the information referenced in the direction-finding tasks. The mobile application provided information such as 'the name of the store on the first floor,' 'current location and directions to proceed if there are multi-branching roads,' and 'alleyways.' In the visual representation of information, the application should pay attention to 'landmark elements such as subway station exits and bus stops,' 'the color of crosswalks and overpasses,' 'division between sidewalks and driveways,' and 'entry to the subway stations.' For the mobile map application to provide intuitive interaction, it is necessary to specify 'the direction toward the destination,' 'the possible rotation of the map screen,' and 'the big roads' preference guidance.'

A Study on the Design of Bridge Model Community Learning Center(CLC) (브릿지 모델 지역학습센터(르완다) 설계 모형 연구)

  • Chung, Jae-Yong;Park, Hoon
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.1
    • /
    • pp.83-94
    • /
    • 2018
  • UNESCO has continued to work in Africa, especially in the six southern sub-Saharan countries, and Asia, where international cooperation is needed. The CLC (Rwanda Community Learning Center) covered in this study aims to create a regional learning center in Rwanda and to recover local communities and provide learning environment. During the course of this study, we conducted field trips for actual planning and reviewed the current state of educational and cultural facilities that recently opened and are operated, and found implications. In consultation with the Rwandan Educational Commission, the site for CLC was decided, the building was designed, and the construction is about to start. The results of this study are as follows. First, in addition to the efforts of the activists in the village, which can be considered the smallest unit of a local community, the approach for establishing an architectural space and active education and community environment can be evaluated as a result of experimental efforts. Second, we can pay attention to the attempts to realize local communities. The bridge business is based on the multi-purposes such as early childhood education, technical education for adults, and community restoration of local residents and it reflects space and program plans for this purposes. It also reflects detailed plans such as differentiating the flow planning depending on users' time of use. Third, we can explain the characteristics of architectural planning considering local characteristics such as active use of local materials. Due to the characteristics of a developing country, there were significant considerations on maintenance, and to this end, the plan included plans for the environment and use of materials that are easily maintained. In addition, the participation of local residents in the process of establishment was suggested as a possibility to serve an educational role.

A Review of Open Modeling Platform Towards Integrated Water Environmental Management (통합 물환경 관리를 위한 개방형 모델링 플랫폼 고찰)

  • Lee, Sunghack;Shin, Changmin;Lee, Yongseok;Cho, Jaepil
    • Journal of Korean Society on Water Environment
    • /
    • v.36 no.6
    • /
    • pp.636-650
    • /
    • 2020
  • A modeling system that can consider the overall water environment and be used to integrate hydrology, water quality, and aquatic ecosystem on a watershed scale is essential to support decision-making in integrated water resources management (IWRM). In adapting imported models for evaluating the unique water environment in Korea, a platform perspective is becoming increasingly important. In this study, a modeling platform is defined as an ecosystem that continuously grows and provides sustainable values through voluntary participation- and interaction-of all stakeholders- not only experts related to model development, but also model users and decision-makers. We assessed the conceptual values provided by the IWRM modeling platform in terms of openness, transparency, scalability, and sustainability. I We also reviewed the technical aspects of functional and spatial integrations in terms of socio-economic factors and user-centered multi-scale climate-forecast information. Based on those conceptual and technical aspects, we evaluated potential modeling platforms such as Source, FREEWAT, Object Modeling System (OMS), OpenMI, Community Surface-Dynamics Modeling System (CSDMS), and HydroShare. Among them, CSDMS most closely approached the values suggested in model development and offered a basic standard for easy integration of existing models using different program languages. HydroShare showed potential for sharing modeling results with the transparency expected by model user-s. Therefore, we believe that can be used as a reference in development of a modeling platform appropriate for managing the unique integrated water environment in Korea.

An Extended SAML Delegation Model Based on Multi-Agent for Secure Web Services (안전한 웹서비스를 위한 멀티 에이전트 기반의 확장된 SAML 위임 모델)

  • Kim, Kyu-Il;Won, Dong-Ho;Kim, Ung-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.111-122
    • /
    • 2008
  • Web service is defined to support interoperable machine to machine interaction over a network and defined as distributed technologies. Recently in web service environment, security has become one of the most critical issues. An attacker may expose user privacy and service information without authentication. Furthermore, the users of web services must temporarily delegate some or all of their behalf. This results in the exposure of user privacy information by agents. We propose a delegation model for providing safety of web service and user privacy in ubiquitous computing environments. In order to provide safety of web service and user privacy, XML-based encryption and a digital signature mechanism need to be efficiently integrated. In this paper, we propose web service management server based on XACML, in order to manage services and policies of web service providers. For this purpose, we extend SAML to declare delegation assertions transferred to web service providers by delegation among agents.

An Offloading Scheduling Strategy with Minimized Power Overhead for Internet of Vehicles Based on Mobile Edge Computing

  • He, Bo;Li, Tianzhang
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.489-504
    • /
    • 2021
  • By distributing computing tasks among devices at the edge of networks, edge computing uses virtualization, distributed computing and parallel computing technologies to enable users dynamically obtain computing power, storage space and other services as needed. Applying edge computing architectures to Internet of Vehicles can effectively alleviate the contradiction among the large amount of computing, low delayed vehicle applications, and the limited and uneven resource distribution of vehicles. In this paper, a predictive offloading strategy based on the MEC load state is proposed, which not only considers reducing the delay of calculation results by the RSU multi-hop backhaul, but also reduces the queuing time of tasks at MEC servers. Firstly, the delay factor and the energy consumption factor are introduced according to the characteristics of tasks, and the cost of local execution and offloading to MEC servers for execution are defined. Then, from the perspective of vehicles, the delay preference factor and the energy consumption preference factor are introduced to define the cost of executing a computing task for another computing task. Furthermore, a mathematical optimization model for minimizing the power overhead is constructed with the constraints of time delay and power consumption. Additionally, the simulated annealing algorithm is utilized to solve the optimization model. The simulation results show that this strategy can effectively reduce the system power consumption by shortening the task execution delay. Finally, we can choose whether to offload computing tasks to MEC server for execution according to the size of two costs. This strategy not only meets the requirements of time delay and energy consumption, but also ensures the lowest cost.

Intelligent Abnormal Situation Event Detections for Smart Home Users Using Lidar, Vision, and Audio Sensors (스마트 홈 사용자를 위한 라이다, 영상, 오디오 센서를 이용한 인공지능 이상징후 탐지 알고리즘)

  • Kim, Da-hyeon;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.17-26
    • /
    • 2021
  • Recently, COVID-19 has spread and time to stay at home has been increasing in accordance with quarantine guidelines of the government such as recommendations to refrain from going out. As a result, the number of single-person households staying at home is also increasingsingle-person households are less likely to be notified to the outside world in times of emergency than multi-person households. This study collects various situations occurring in the home with lidar, image, and voice sensors and analyzes the data according to the sensors through their respective algorithms. Using this method, we analyzed abnormal patterns such as emergency situations and conducted research to detect abnormal signs in humans. Artificial intelligence algorithms that detect abnormalities in people by each sensor were studied and the accuracy of anomaly detection was measured according to the sensor. Furthermore, this work proposes a fusion method that complements the pros and cons between sensors by experimenting with the detectability of sensors for various situations.

An Intelligent Game Theoretic Model With Machine Learning For Online Cybersecurity Risk Management

  • Alharbi, Talal
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.390-399
    • /
    • 2022
  • Cyber security and resilience are phrases that describe safeguards of ICTs (information and communication technologies) from cyber-attacks or mitigations of cyber event impacts. The sole purpose of Risk models are detections, analyses, and handling by considering all relevant perceptions of risks. The current research effort has resulted in the development of a new paradigm for safeguarding services offered online which can be utilized by both service providers and users. customers. However, rather of relying on detailed studies, this approach emphasizes task selection and execution that leads to successful risk treatment outcomes. Modelling intelligent CSGs (Cyber Security Games) using MLTs (machine learning techniques) was the focus of this research. By limiting mission risk, CSGs maximize ability of systems to operate unhindered in cyber environments. The suggested framework's main components are the Threat and Risk models. These models are tailored to meet the special characteristics of online services as well as the cyberspace environment. A risk management procedure is included in the framework. Risk scores are computed by combining probabilities of successful attacks with findings of impact models that predict cyber catastrophe consequences. To assess successful attacks, models emulating defense against threats can be used in topologies. CSGs consider widespread interconnectivity of cyber systems which forces defending all multi-step attack paths. In contrast, attackers just need one of the paths to succeed. CSGs are game-theoretic methods for identifying defense measures and reducing risks for systems and probe for maximum cyber risks using game formulations (MiniMax). To detect the impacts, the attacker player creates an attack tree for each state of the game using a modified Extreme Gradient Boosting Decision Tree (that sees numerous compromises ahead). Based on the findings, the proposed model has a high level of security for the web sources used in the experiment.

Spatial Correlation-based Resource Sharing in Cognitive Radio SWIPT Networks

  • Rong, Mei;Liang, Zhonghua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3172-3193
    • /
    • 2022
  • Cognitive radio-simultaneous wireless information and power transfer (CR-SWIPT) has attracted much interest since it can improve both the spectrum and energy efficiency of wireless networks. This paper focuses on the resource sharing between a point-to-point primary system (PRS) and a multiuser multi-antenna cellular cognitive radio system (CRS) containing a large number of cognitive users (CUs). The resource sharing optimization problem is formulated by jointly scheduling CUs and adjusting the transmit power at the cognitive base station (CBS). The effect of accessing CUs' spatial channel correlation on the possible transmit power of the CBS is investigated. Accordingly, we provide a low-complexity suboptimal approach termed the semi-correlated semi-orthogonal user selection (SC-SOUS) algorithm to enhance the spectrum efficiency. In the proposed algorithm, CUs that are highly correlated to the information decoding primary receiver (IPR) and mutually near orthogonal are selected for simultaneous transmission to reduce the interference to the IPR and increase the sum rate of the CRS. We further develop a spatial correlation-based resource sharing (SC-RS) strategy to improve energy sharing performance. CUs nearly orthogonal to the energy harvesting primary receiver (EPR) are chosen as candidates for user selection. Therefore, the EPR can harvest more energy from the CBS so that the energy utilization of the network can improve. Besides, zero-forcing precoding and power control are adopted to eliminate interference within the CRS and meet the transmit power constraints. Simulation results and analysis show that, compared with the existing CU selection methods, the proposed low-complex strategy can enhance both the achievable sum rate of the CRS and the energy sharing capability of the network.