• Title/Summary/Keyword: Reliable transfer

Search Result 445, Processing Time 0.023 seconds

Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality (개인정보의 위임 제공 및 데이터 기밀성을 보장하는 블록체인에 제공 정보의 저장)

  • Jun-Cheol, Park
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.76-88
    • /
    • 2022
  • Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user's smartphone to store any authentication credential or personal information of its owner.

Load-transferring mechanism and evaluation theory of bolt with single and double nut fasteners

  • Qiyu Li;Dachang Zhang;Hao Xu;Yibi Li;Weiqun Chen;Kaixuan Zhang
    • Structural Engineering and Mechanics
    • /
    • v.86 no.2
    • /
    • pp.261-276
    • /
    • 2023
  • The use of the ordinary double nut (i.e., ODN) composed of a master nut (i.e., M-nut) and a slave nut (i.e., S-nut) is a highly efficient method to prevent bolts loosening. A novel double nut (i.e., FODN) composed of a master nut (i.e., M-nut) and flat slave nut (i.e., FS-nut) is proposed to save raw materials. The bolt fastening tests with single nut, ODN and FODN are performed to investigate the preload and counterbalance forces. Corresponding finite element analysis (FEA) models are established and validated by comparing the preload with the experimental results. The load-bearing capacity, the extrusion effect, and the contact stress of each engaged thread for ODN and FODN are observed by FEA. The experimental and simulated results revealed that the bolt fastening with double-nut has different load-transferring mechanisms from single-nut. Nevertheless, for double-nut/bolt assemblies, the FS-nut can provide load transfer that is like that of the S-nut, and the FODN is a reasonable and reliable fastening method. Furthermore, based on the theory of Yamamoto, a formula considering the extrusion effect is proposed to calculate the preload distribution of the double-nut, which is applicable to varying thicknesses of slave-nuts in double-nut/bolt assemblies.

A Study on the Response Technique for Toxic Chemicals Release Accidents - Hydrogen Fluoride and Ammonia - (독성 화학물질 누출사고 대응 기술연구 - 불산 및 암모니아 누출을 중심으로 -)

  • Yoon, Young Sam;Cho, Mun Sik;Kim, Ki Joon;Park, Yeon Shin;Hwang, Dong Gun;Yoon, Jun heon;Choi, Kyung Hee
    • Korean Journal of Hazardous Materials
    • /
    • v.2 no.1
    • /
    • pp.31-37
    • /
    • 2014
  • Since the unprecedented hydrogen fluoride leak accident in 2012, there has been growing demand for customized technical information for rapid response and chemical accident management agencies including the Ministry of Environment, the National Emergency Management Agency, and the National Police Agency need more information on chemicals and accident management. In this regard, this study aims to provide reliable technical data and guidelines to initial response agencies, similar to accident management technical reports of the US and Canada. In this study, we conducted a questionnaire survey and interviews on initial response agencies like fire stations, police stations, and local governments to identify new information items for appropriate initial response and improvements of current guidelines. We also collected and reviewed the Canada's TIPS, US EPA's hydrogen fluoride documents, domestic and foreign literature on applicability tests of control chemicals, and interview data, and then produced items to be listed in the technical guidelines. In addition, to establish database of on-site technical information, we carried out applicability tests for accident control data including ① emergency shut down devide, safety guard, shut down valve, ground connection, dyke, transfer pipe, scrubber, and sensor; ② literature and field survey on distribution type and transportation/storage characteristics (container identification, valve, ground connection, etc.); ③ classification and identification of storage/transportation facilities and emergency management methodslike leak prevention, chemicals control, and cutoff or bypass of rain drainage; ④ domestic/foreign analysis methods and environmental standards including portable detection methods, test standards, and exposure limits; and ⑤ comparison/evaluation of neutralization efficiency of control chemicals on toxic substances.

Application of T1 Map Information Based on Synthetic MRI for Dynamic Contrast-Enhanced Imaging: A Comparison Study with the Fixed Baseline T1 Value Method

  • Dong Jae Shin;Seung Hong Choi;Roh-Eul Yoo;Koung Mi Kang;Tae Jin Yun;Ji-Hoon Kim;Chul-Ho Sohn;Sang Won Jo;Eun Jung Lee
    • Korean Journal of Radiology
    • /
    • v.22 no.8
    • /
    • pp.1352-1368
    • /
    • 2021
  • Objective: For an accurate dynamic contrast-enhanced (DCE) MRI analysis, exact baseline T1 mapping is critical. The purpose of this study was to compare the pharmacokinetic parameters of DCE MRI using synthetic MRI with those using fixed baseline T1 values. Materials and Methods: This retrospective study included 102 patients who underwent both DCE and synthetic brain MRI. Two methods were set for the baseline T1: one using the fixed value and the other using the T1 map from synthetic MRI. The volume transfer constant (Ktrans), volume of the vascular plasma space (vp), and the volume of the extravascular extracellular space (ve) were compared between the two methods. The interclass correlation coefficients and the Bland-Altman method were used to assess the reliability. Results: In normal-appearing frontal white matter (WM), the mean values of Ktrans, ve, and vp were significantly higher in the fixed value method than in the T1 map method. In the normal-appearing occipital WM, the mean values of ve and vp were significantly higher in the fixed value method. In the putamen and head of the caudate nucleus, the mean values of Ktrans, ve, and vp were significantly lower in the fixed value method. In addition, the T1 map method showed comparable interobserver agreements with the fixed baseline T1 value method. Conclusion: The T1 map method using synthetic MRI may be useful for reflecting individual differences and reliable measurements in clinical applications of DCE MRI.

Cloud Security and Privacy: SAAS, PAAS, and IAAS

  • Bokhari Nabil;Jose Javier Martinez Herraiz
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.23-28
    • /
    • 2024
  • The multi-tenancy and high scalability of the cloud have inspired businesses and organizations across various sectors to adopt and deploy cloud computing. Cloud computing provides cost-effective, reliable, and convenient access to pooled resources, including storage, servers, and networking. Cloud service models, SaaS, PaaS, and IaaS, enable organizations, developers, and end users to access resources, develop and deploy applications, and provide access to pooled computing infrastructure. Despite the benefits, cloud service models are vulnerable to multiple security and privacy attacks and threats. The SaaS layer is on top of the PaaS, and the IaaS is the bottom layer of the model. The software is hosted by a platform offered as a service through an infrastructure provided by a cloud computing provider. The Hypertext Transfer Protocol (HTTP) delivers cloud-based apps through a web browser. The stateless nature of HTTP facilitates session hijacking and related attacks. The Open Web Applications Security Project identifies web apps' most critical security risks as SQL injections, cross-site scripting, sensitive data leakage, lack of functional access control, and broken authentication. The systematic literature review reveals that data security, application-level security, and authentication are the primary security threats in the SaaS model. The recommended solutions to enhance security in SaaS include Elliptic-curve cryptography and Identity-based encryption. Integration and security challenges in PaaS and IaaS can be effectively addressed using well-defined APIs, implementing Service Level Agreements (SLAs), and standard syntax for cloud provisioning.

A Study on detection of missing person using DRONE and AI (드론과 인공지능을 활용한 실종자 탐색에 관한 연구)

  • Kyoung-Mok Kim;Ho-beom Jeon;Geon-Seon Lim
    • Journal of the Health Care and Life Science
    • /
    • v.10 no.2
    • /
    • pp.361-367
    • /
    • 2022
  • This study provides several methods to minimize dead zone and to detect missing person using combined DRONE and AI especially called 4 th Industrial Revolution. That is composed of image acquisition for a person who is in needed of support. The procedure is DRONE that is made of image acquisition and transfer system. after that can be shown GPS information. Currently representative AI algorithm is YOLO (You Only Look Once) that can be adopted to find manikin or real image by learning with dataset. The output was reached in reliable and efficient results. As the trends of DRONE is expanded widely that will provide various roll. This paper was composed of three parts. the first is DRONE specification, the second is the definition of AI and procedures, the third is the methods of image acquisition using DRONE, the last is the future of DRONE with AI.

Smart-Coord: Enhancing Healthcare IoT-based Security by Blockchain Coordinate Systems

  • Talal Saad Albalawi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.32-42
    • /
    • 2024
  • The Internet of Things (IoT) is set to transform patient care by enhancing data collection, analysis, and management through medical sensors and wearable devices. However, the convergence of IoT device vulnerabilities and the sensitivity of healthcare data raises significant data integrity and privacy concerns. In response, this research introduces the Smart-Coord system, a practical and affordable solution for securing healthcare IoT. Smart-Coord leverages blockchain technology and coordinate-based access management to fortify healthcare IoT. It employs IPFS for immutable data storage and intelligent Solidity Ethereum contracts for data integrity and confidentiality, creating a hierarchical, AES-CBC-secured data transmission protocol from IoT devices to blockchain repositories. Our technique uses a unique coordinate system to embed confidentiality and integrity regulations into a single access control model, dictating data access and transfer based on subject-object pairings in a coordinate plane. This dual enforcement technique governs and secures the flow of healthcare IoT information. With its implementation on the Matic network, the Smart-Coord system's computational efficiency and cost-effectiveness are unparalleled. Smart-Coord boasts significantly lower transaction costs and data operation processing times than other blockchain networks, making it a practical and affordable solution. Smart-Coord holds the promise of enhancing IoT-based healthcare system security by managing sensitive health data in a scalable, efficient, and secure manner. The Smart-Coord framework heralds a new era in healthcare IoT adoption, expertly managing data integrity, confidentiality, and accessibility to ensure a secure, reliable digital environment for patient data management.

The Reverse Posterior Interosseous Island Flap for the Reconstruction of Soft Tissue Defects in the Wrist Injured by Electrical Arc (역혈행 후골간 도상피판을 이용한 전기아크손상으로 인한 손목부 결손의 재건)

  • Suh, Jeong Seok;Lee, Jong Wook;Ko, Jang Hyu;Seo, Dong Kook;Choi, Jai Koo;Chung, Chul Hoon;Oh, Suk Joon;Jang, Young Chul
    • Archives of Plastic Surgery
    • /
    • v.34 no.5
    • /
    • pp.580-586
    • /
    • 2007
  • Purpose: High tension electrical injuries result in major tissue(eg. bones, tendons, vessels and nerves) destruction. Therefore, the management of mutilating wrist caused by electrical injuries still represents a challenge. There are various approaches to this problem including local and regional flaps as well as pedicled distant flaps and microsurgical free tissue transfer. Although it has not gained wide acceptance, because of the technically demanding dissection of the pedicle, posterior interosseous flap is now well accepted for the reconstruction of hand and wrist in hand surgery. The principal advantages of this flap are minimal donor site morbidity, minimal vascular compromise, one stage operation. This flap also offers the advantages of ideal color match and composition. In this report, we describe our experience with the reverse posterior interosseous island flap for reconstruction of mutilating wrist with main vessel injuries. Methods: From October, 2004 to June, 2006, we treated 11 patients with soft tissue defects and main vessel injuries on the wrist that were covered with reverse posterior interosseous island flap. Results: These 11 patients were all male. The ages ranged from 27 to 67 years(mean age 41.75) and the follow-up period varied from 4 to 19 months. Complete healing of the reverse posterior interosseous island flaps were observed in 11 patients(12 flaps). The majority of these flaps showed a certain degree of venous congestion, which in a flap was treated with medical leech. 1 flap has partial necrosis owing to sustained venous congestion, requiring secondary skin graft. flap size varied from $3.5{\times}8cm$ to $10{\times}12cm$(mean size $6.4{\times}8.9m$). The donor site defect was closed directly in 5 flaps, and by skin graft in 7 flaps. Conclusion: We found that the reverse posterior interosseous island flap is reliable and very useful for reconstruction of mutilating wrist and we recommend it as first choice in coverage of soft tissue defects in the wrist with electrical arc injuries.

Data Dissemination Protocol based on Home Agent and Access Node for Mobile Sink in Sensor Network (센서 네트워크에서 홈에이젼트와 액세스 노드에 기반한 모바일 싱크를 위한 데이터 전송 기법)

  • Lee, Joa-Hyoung;Jung, In-Bum
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.383-390
    • /
    • 2008
  • The mobile sink is most suitable to guarantee the real time processing to events in ubiquitous environment. However it brings many challenges to wireless sensor networks. In particular, the question of how to transfer the collected data to the mobile sink is an important topic in the aspect of effective management of wireless sensor nodes. In this paper, a new data dissemination model is proposed. Since this method uses the home agent and the access node concepts, it provides reliable and efficient data delivery to mobile sink with minimum overhead. In this proposed method, the information of the mobile sink which is constantly moving is informed only to the home agent node and the access node, instead of all sensor nodes. Thus, the collected data from sensor nodes are transferred to the fixed home agent and it sends these data to the mobile sink. Since the confliction phenomenon between data packets in wireless networks could be reduced, the success ratio of data arriving in the mobile sink is highly enhanced. In our experiments, the proposed method reduces the number of broadcast packets so that it saves the amount of energy consumed for transmitting and receiving the data packets. This effect contributes to prolong the lifetime of the wireless sensor networks operated by batteries.

Development of a Procedure for Remaining Life Estimation in Airfield Concrete Pavement (공항 콘크리트 포장의 잔존수명 산출 논리 개선 연구)

  • Kwon Soo-Ahn;Suh Young-Chan;Cho Yong-Joo
    • International Journal of Highway Engineering
    • /
    • v.8 no.1 s.27
    • /
    • pp.131-138
    • /
    • 2006
  • Methods of back calculation for either design procedures or elastic moduli obtained from FWD(Falling Weight Deflectometer) tests have widely been used to predict remaining life of airfield concrete pavements. Since the variation of the elastic modulus obtained from the FWD test depends on the back calculation methods, prediction of remaining life of airfield pavement using the back calculation method has not been reliable. In addition, the FWD method only concentrates on the structural integrity of the pavement without considering functional distress. In this study, a newly developed remaining life estimation procedure is proposed. This methodology includes both structural and functional consideration and suggests models and decision criteria for each stage. In order to improve the estimation procedure on remaining life of pavement, conducted the several tests on an old airfield concrete pavement. As a result, it is concluded that the load transfer efficiency on joint is better for predicting remaining life of pavement than the elastic modulus, which is commonly used. In order to verify applicability of the newly developed estimation procedure and detailed models, investigation and analysis were conducted according to the new methodology on C-airfield pavement. Finally, it is confirmed that the efficiency of the proposed method for practical application was good enough.

  • PDF