• Title/Summary/Keyword: Party School

Search Result 265, Processing Time 0.035 seconds

On the Theoretical Solution and Application to Container Loading Problem using Normal Distribution Based Model (정규 분포 모델을 이용한 화물 적재 문제의 이론적 해법 도출 및 활용)

  • Seung Hwan Jung
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.4
    • /
    • pp.240-246
    • /
    • 2022
  • This paper introduces a container loading problem and proposes a theoretical approach that efficiently solves it. The problem is to determine a proper weight of products loaded on a container that is delivered by third party logistics (3PL) providers. When the company pre-loads products into a container, typically one or two days in advance of its delivery date, various truck weights of 3PL providers and unpredictability of the randomness make it difficult for the company to meet the total weight regulation. Such a randomness is mainly due to physical difference of trucks, fuel level, and personalized equipment/belongings, etc. This paper provides a theoretical methodology that uses historical shipping data to deal with the randomness. The problem is formulated as a stochastic optimization where the truck randomness is reflected by a theoretical distribution. The data analytics solution of the problem is derived, which can be easily applied in practice. Experiments using practical data reveal that the suggested approach results in a significant cost reduction, compared to a simple average heuristic method. This study provides new aspects of the container loading problem and the efficient solving approach, which can be widely applied in diverse industries using 3PL providers.

3-Partv Communication Enabled TLS Protocol (3 자간 통신이 가능한 TLS 프로토콜)

  • Kim, In-Hwan;Hwang, In-Yong;Kim, Seok-Joong;Choi, Hyoung-Kee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2009.01a
    • /
    • pp.381-384
    • /
    • 2009
  • 통신기술의 발달에 따라, 사용자들은 다양한 통신 서비스와 편의를 제공받게 되었지만, 서비스 거부 공격 및 재전송 공격 등의 다양한 위협 역시 존재 하게 되었다. 이에 따라, IETF는 안전한 통신을 위해 Transport Layer Security (TLS)를 제안하였다. 그러나 TLS는 3자간 통신을 보호하려 할 때, Handshake 과정을 여러 번 반복해야하는 비효율성을 지니고 있었다. 따라서 우라는 본 논문을 통해 3자간 통신이 가능한 TLS 프로토콜을 제안한다. 기존 TLS와의 호환성 유지를 위해 최소한의 변형만 이루어졌으며, 객체 간 통신 시간 측정을 통해 Handshake 과정을 효율적으로 수행할 수 있도록 구성하였다.

  • PDF

Post-quantum identity-based authenticated multiple key agreement protocol

  • Yang Yang;Hongji Yuan;Linbo Yan;Yinglan Ruan
    • ETRI Journal
    • /
    • v.45 no.6
    • /
    • pp.1090-1102
    • /
    • 2023
  • Authenticated multiple key agreement (AMKA) protocols provide participants with multiple session keys after one round of authentication. Many schemes use Diffie-Hellman or authenticated key agreement schemes that rely on hard integer factorizations that are vulnerable to quantum algorithms. Lattice cryptography provides quantum resistance to authenticated key agreement protocols, but the certificate always incurs excessive public key infrastructure management overhead. Thus, a lightweight lattice-based secure system is needed that removes this overhead. To answer this need, we provide a two-party lattice- and identity-based AMKA scheme based on bilateral short integer or computational bilateral inhomogeneous small integer solutions, and we provide a security proof based on the random oracle model. Compared with existing AMKA protocols, our new protocol has higher efficiency and stronger security.

A figure categorization structure for imagery and conceptualization

  • Sakai, Y.;Kitazawa, M.;Murahashi, T.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10b
    • /
    • pp.265-270
    • /
    • 1993
  • In an intelligent man-machine interface, it is very effective to support human thinking and to be in communication in some intuitive fashion. For this, sharing experience between the party concerned, human operators(s) and the interface is essential. It is also necessary to keep mutual understanding in some conceptual levels. Here in the present paper, figures which are an aspect of concepts and form a basis of mental image are discussed.

  • PDF

An Application of Fuzzy AHP and TOPSIS Methodology for Ranking the Factors Influencing FinTech Adoption Intention: A Comparative Study of China and Korea (FinTech 채택 의도에 영향을 미치는 요소의 순위 결정을 위한 Fuzzy AHP 및 TOPSIS 방법론의 적용 : 중국과 한국의 비교 연구)

  • Mu, Hong-Lei;Lee, Young-Chan
    • Journal of Service Research and Studies
    • /
    • v.7 no.4
    • /
    • pp.51-68
    • /
    • 2017
  • Financial technology (FinTech) is an emerging financial service sector include innovations in financial literacy and investment, retail banking, education, and crypto-currencies like bitcoin. One of the crucial branch of financial technology-third-party payment (TPP) is undergoing rapid growth, with online/mobile systems replacing offline financial systems. System quality and user attitudes are key perceptions driving third-party payment usage, the importance of these perceptions, however, may be different with countries as users' thinking varies from country to country. Thus, the purpose of this study is to elaborate how factors differ from China to Korea by drawing on the unified theory of acceptance and use of technology (UTAUT2). Additionally, this study also aims to propose a multi-attribute evaluation of the third-party online payment system based on analytic hierarchy process (AHP), fuzzy sets and technique for order performance by similarity to ideal solution (TOPSIS), to examine the relative importance of the perceptions influencing new technology adoption intention. The results showed that the price value has the most significant influence on Chinese perceptions, while the perceived credibility has the most significant effect on Korean perceptions. Sub-criteria also performs different results to Chinese and Korean third-party online payment system.

A STUDY ON IMPROVED PKMv2 FRAMEWORK FOR FAST MOBILITY IN 802.16e NETWORKS

  • Suh, Gi-Jun;Yun, Seung-Hwan;Yi, Ok-Yeon;Lee, Sang-Jin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.400-403
    • /
    • 2009
  • EAP (Extensible Authentication Protocol) is often used as an authentication framework for two-party protocol which supports multiple authentication algorithms known as "EAP method". And PKMv2 in 802.16e networks use EAP as an authentication protocol. However, this framework is not efficient when the EAP peer executing handover. The reason is that the EAP peer and EAP server should re-run EAP method each time so that they authenticate each other for secure handover. This makes some delays, so faster re-authentication method is needed. In this paper, we propose a new design of the PKMv2 framework which provides fast re-authentication. This new framework and usage of the keys which used as a short-term credential bring better performance during handover process.

  • PDF

Cryptanalysis and Improvement of an Efficient Certificateless Signature Scheme

  • Li, Jiguo;Huang, Xinyi;Mu, Yi;Wu, Wei
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.10-17
    • /
    • 2008
  • In traditional digital signature schemes, certificates signed by a trusted party are required to ensure the authenticity of the public key. In Asiacrypt 2003, the concept of certificateless signature scheme was introduced. The advantage of certificateless public key cryptography successfully eliminates the necessity of certificates in the traditional public key cryptography and simultaneously solves the inherent key escrow problem suffered in identity-based cryptography. Recently, Yap et al. proposed an efficient certificateless signature scheme and claimed that their scheme is existentially unforgeable in the random oracle model. In this paper, we show that the certificateless signature scheme proposed by Yap et al. is insecure against public key replacement attacks. Furthermore, we propose an improved certificateless signature scheme, which is existentially unforgeable against adaptive chosen message attacks under the computational Diffie-Hellman assumption in the random oracle model and provide the security proof of the proposed scheme.

Online-Game Server Party System Verification using SPIN Model Checker (스핀 모델 체커를 이용한 온라인 게임 서버의 파티 시스템 검증)

  • Kim, Goanghun;Park, Mingyu;Choi, Yunja
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.609-612
    • /
    • 2014
  • 오늘날 신뢰할 수 있는 정보통신기술(Information and Communication Technology, ICT) 시스템의 중요성은 증대되고 있으며 그에 맞춰 고위험 시스템의 검증(Verification) 작업도 점점 체계화되고 있다. 반면 여전히 일반적인 소프트웨어들은 검증 과정을 인력에 의한 테스팅과 같은 기초적인 방법에 의존하고 있다. 본 논문에서는 그 대표적인 예인 온라인 게임 서버를 대상으로, SPIN 모델 체커(SPIN model checker)를 이용한 자동화 검증방법을 적용하는 실험적인 연구를 수행한다. 연구 결과 기존의 검증 과정으로는 파악하지 못한 오류를 파악할 수 있었고, 검증 비용도 납득할 만한 수준이라는 것을 확인하였다.

Deterministic Private Matching with Perfect Correctness (정확성을 보장하는 결정적 Private Matching)

  • Hong, Jeong-Dae;Kim, Jin-Il;Cheon, Jung-Hee;Park, Kun-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.484-489
    • /
    • 2006
  • Private Matching은 각기 다른 두 참여자 (two-party)가 가진 데이터의 교집합 (intersection)을 구하는 문제이다. Private matching은 보험사기 방지시스템 (insurance fraud detection system), 의료정보 검색, 항공기 탐승 금지자 목록 (Do-not-fly list) 검색 등에 이용될 수 있으며 다자간의 계산 (multiparty computation)으로 확장하면 전자투표, 온라인 게임 등에도 이용될 수 있다. 2004년 Freedman 등은 이 문제를 확률적 (probabilistic)으로 해결하는 프로토콜 (protocol) [1]을 제안하고 악의적인 공격자 (malicious adversary) 모델과 다자간 계산으로 확장하였다. 이 논문에서는 기존의 프로토콜을 결정적 (deterministic) 방법으로 개선하여 Semi-Honest 모델에서 결과의 정확성을 보장하는 한편, 이를 악의적인 공격자 모델에 확장하여 신뢰도와 연산속도를 향상시키는 새로운 프로토콜을 제안한다.

  • PDF

AR Tourism Recommendation System Based on Character-Based Tourism Preference Using Big Data

  • Kim, In-Seon;Jeong, Chi-Seo;Jung, Tae-Won;Kang, Jin-Kyu;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.61-68
    • /
    • 2021
  • The development of the fourth industry has enabled users to quickly share a lot of data online. We can analyze big data on information about tourist attractions and users' experiences and opinions using artificial intelligence. It can also analyze the association between characteristics of users and types of tourism. This paper analyzes individual characteristics, recommends customized tourist sites and proposes a system to provide the sacred texts of recommended tourist sites as AR services. The system uses machine learning to analyze the relationship between personality type and tourism type preference. Based on this, it recommends tourist attractions according to the gender and personality types of users. When the user finishes selecting a tourist destination from the recommendation list, it visualizes the information of the selected tourist destination with AR.