• Title/Summary/Keyword: Smart-key system

Search Result 513, Processing Time 0.024 seconds

Proposed Open Source Model for Video Offline Distribution using Cinema DRM for Home Users

  • Pardeshi, Sunil;Kwon, Soon Chul;Lee, Seung Hyun;Hamacher, Alaric
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.1
    • /
    • pp.10-14
    • /
    • 2015
  • Video Content owners seek to squeeze the maximum amount of revenue from their assets via distribution into more territories. Digital Cinema Package(DCP), trusted solution to distribute protected content to theaters, caters to relatively small user base, which limits revenue. With the growth of the Internet & other digital media, the economics of media content has changed dramatically. Security remains main concern to deliver content to millions of consumers using intelligent digital display devices like Tablets, Smartphones, Smart TVs, Desktop & Laptop. By making the video content available to this segment securely, content owners will benefit from increased revenue. Through this paper we propose Open Source HomeDCP model to distribute the content to home users for offline viewing. We propose to include other open source CODEC than JPEG2000/MPEG2, which are specifically designed for theatrical performance. Final image size will be further reduced considering the display device resolution where video will be finally played. Key Delivery Message(KDM) system to be altered to suit new devices. This will be a big boost to Content Economy as content owners would be able to distribute the content securely to the wider audience & ensure more revenue.

Masking-Based Block Cipher LEA Resistant to Side Channel Attacks (부채널 공격에 대응하는 마스킹 기반의 블록 암호 LEA)

  • Park, Eunsoo;Oh, Soohyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1023-1032
    • /
    • 2017
  • When a cryptographic device such as smart card performs an encryption for a plain text, an attacker can extract the secret key in it using side channel information. Especially, many researches found some weaknesses for side channel attack on the lightweight block cipher LEA designed to apply in IoT environments. In this paper, we survey several masking countermeasures to defeat the side channel attack and propose a novel masking conversion method. Even though the proposed Arithmetic-to-Boolean masking conversion method requires storage memory of 256 bytes, it can improve the LEA encryption speed up to 17 percentage compared to the case adopted the previous masking method.

Studies on vibration control effects of a semi-active impact damper for seismically excited nonlinear building

  • Lu, Zheng;Zhang, Hengrui;Masri, Sami F.
    • Smart Structures and Systems
    • /
    • v.24 no.1
    • /
    • pp.95-110
    • /
    • 2019
  • The semi-active impact damper (SAID) is proposed to improve the damping efficiency of traditional passive impact dampers. In order to investigate its damping mechanism and vibration control effects on realistic engineering structures, a 20-story nonlinear benchmark building is used as the main structure. The studies on system parameters, including the mass ratio, damping ratio, rigid coefficient, and the intensity of excitation are carried out, and their effects both on linear and nonlinear indexes are evaluated. The damping mechanism is herein further investigated and some suggestions for the design in high-rise buildings are also proposed. To validate the superiority of SAID, an optimal passive particle impact damper ($PID_{opt}$) is also investigated as a control group, in which the parameters of the SAID remain the same, and the optimal parameters of the $PID_{opt}$ are designed by differential evolution algorithm based on a reduced-order model. The numerical simulation shows that the SAID has better control effects than that of the optimized passive particle impact damper, not only for linear indexes (e.g., root mean square response), but also for nonlinear indexes (e.g., component energy consumption and hinge joint curvature).

Bayesian forecasting approach for structure response prediction and load effect separation of a revolving auditorium

  • Ma, Zhi;Yun, Chung-Bang;Shen, Yan-Bin;Yu, Feng;Wan, Hua-Ping;Luo, Yao-Zhi
    • Smart Structures and Systems
    • /
    • v.24 no.4
    • /
    • pp.507-524
    • /
    • 2019
  • A Bayesian dynamic linear model (BDLM) is presented for a data-driven analysis for response prediction and load effect separation of a revolving auditorium structure, where the main loads are self-weight and dead loads, temperature load, and audience load. Analyses are carried out based on the long-term monitoring data for static strains on several key members of the structure. Three improvements are introduced to the ordinary regression BDLM, which are a classificatory regression term to address the temporary audience load effect, improved inference for the variance of observation noise to be updated continuously, and component discount factors for effective load effect separation. The effects of those improvements are evaluated regarding the root mean square errors, standard deviations, and 95% confidence intervals of the predictions. Bayes factors are used for evaluating the probability distributions of the predictions, which are essential to structural condition assessments, such as outlier identification and reliability analysis. The performance of the present BDLM has been successfully verified based on the simulated data and the real data obtained from the structural health monitoring system installed on the revolving structure.

Nonlinear dynamic analysis of a RC bridge subjected to seismic loading

  • Nanclares, German;Ambrosini, Daniel;Curadelli, Oscar;Domizio, Martin
    • Smart Structures and Systems
    • /
    • v.26 no.6
    • /
    • pp.765-779
    • /
    • 2020
  • Collapse of bridges in recent earthquakes demonstrates the need to deepen the understanding of the behaviour of these structures against seismic actions. This paper presents a highly detailed numerical model of an actual bridge subjected to extreme seismic action which results in its collapse. Normally, nonlinear numerical models have high difficulties to achieve convergence when reinforced concrete is intended to be represented. The main objective of this work is to determine the efficiency of different passive control strategies to prevent the structural collapse of an existing bridge. Metallic dampers and seismic isolation by decoupling the mass were evaluated. The response is evaluated not only in terms of reduction of displacements, but also in increasing of shear force and axial force in key elements, which can be a negative characteristic of the systems studied. It can be concluded that the use of a metallic damper significantly reduces the horizontal displacements and ensures the integrity of the structure from extreme seismic actions. Moreover, the isolation of the deck, which in principle seems to be the most effective solution to protect existing bridges, proves inadequate for the case analysed due to its dynamic characteristics and its particular geometry and an unpredictable type of axial pounding in the columns. This unexpected effect on the isolation system would have been impossible to identify with simplified models.

Intensity and Ambient Enhanced Lidar-Inertial SLAM for Unstructured Construction Environment (비정형의 건설환경 매핑을 위한 레이저 반사광 강도와 주변광을 활용한 향상된 라이다-관성 슬램)

  • Jung, Minwoo;Jung, Sangwoo;Jang, Hyesu;Kim, Ayoung
    • The Journal of Korea Robotics Society
    • /
    • v.16 no.3
    • /
    • pp.179-188
    • /
    • 2021
  • Construction monitoring is one of the key modules in smart construction. Unlike structured urban environment, construction site mapping is challenging due to the characteristics of an unstructured environment. For example, irregular feature points and matching prohibit creating a map for management. To tackle this issue, we propose a system for data acquisition in unstructured environment and a framework for Intensity and Ambient Enhanced Lidar Inertial Odometry via Smoothing and Mapping, IA-LIO-SAM, that achieves highly accurate robot trajectories and mapping. IA-LIO-SAM utilizes a factor graph same as Tightly-coupled Lidar Inertial Odometry via Smoothing and Mapping (LIO-SAM). Enhancing the existing LIO-SAM, IA-LIO-SAM leverages point's intensity and ambient value to remove unnecessary feature points. These additional values also perform as a new factor of the K-Nearest Neighbor algorithm (KNN), allowing accurate comparisons between stored points and scanned points. The performance was verified in three different environments and compared with LIO-SAM.

Digital Transformation of Agriculture Supply Chain in Vietnam: Current Status and Proposal of Roadmap

  • Quoc Cuong Nguyen;Hoang Tuan Nguyen
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.249-257
    • /
    • 2024
  • As the main driver of economic growth and employment, the agricultural sector plays an important role in Vietnam's economy. However, in recent years, the sector has faced new challenges and also presented new investment opportunities to stimulate agricultural growth. Many Vietnamese agricultural producers currently lack the modern technology and decision support tools needed to maintain and improve productivity in a rapidly changing environment. Other stakeholders in the agricultural value chain, such as input suppliers, distributors, and consumers, also face significant challenges, including disrupted value chains, transportation costs. The cost of transporting goods across the supply chain continues to increase and information exchange remains fragmented. A potential solution to address these challenges is the application of digital transformation in agricultural supply chains. Farmers and other value chain participants can improve the production of their goods and procedures by utilizing new and cutting-edge technologies that are integrated into a unified system as part of the digital transformation of agricultural supply chains. In this study, we evaluate the current status of digital transformation in the supply chain of the agriculture industry by finding and examining pertinent publications from key agencies as well as prior research. From there, in the framework of the digital economy, this study suggests a digital transformation roadmap for the agricultural supply chain.

Streamlining ERP Deployment in Nepal's Oil and Gas Industry: A Case Analysis

  • Dipa Adhikari;Bhanu Shrestha;Surendra Shrestha;Rajan Nepal
    • International Journal of Advanced Culture Technology
    • /
    • v.12 no.3
    • /
    • pp.140-147
    • /
    • 2024
  • Oil and gas industry is a unique sector with complex activities, long supply chains and strict rules for the business. It is important to use enterprise resource planning (ERP) systems to address these challenges as it helps in simplifying operations, improving efficiency and facilitating evidence-based decision making. Nonetheless, successful integration of ERP systems in this industry involves careful planning, customization and alignment with specific business processes including regulatory requirements. Several critical factors, such as strong change management, support of top managers and training that works have been identified in the study. Amongst the hurdles are employee resistance towards the changes, data migration complications and integration with existing systems. Nonetheless, NOCL's ERP implementation resulted in significant improvements in operating efficiency, better data visibility and compliance management. It also led to a decrease in financial reporting timeframes, more accurate inventory tracking and improved decision-making capabilities. The study provides useful insights on how to optimize oil and gas sector ERP implementations; key among them is practical advice including strengthening change management strategies, prioritizing data security and collaborating with ERP vendors. The research highlights the importance of tailoring ERP solutions to specific industry needs as well as emphasizes the strategic role of ongoing monitoring/feedback for future benefits sustainability.

Design Evaluation Model Based on Consumer Values: Three-step Approach from Product Attributes, Perceived Attributes, to Consumer Values (소비자 가치기반 디자인 평가 모형: 제품 속성, 인지 속성, 소비자 가치의 3단계 접근)

  • Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.57-76
    • /
    • 2017
  • Recently, consumer needs are diversifying as information technologies are evolving rapidly. A lot of IT devices such as smart phones and tablet PCs are launching following the trend of information technology. While IT devices focused on the technical advance and improvement a few years ago, the situation is changed now. There is no difference in functional aspects, so companies are trying to differentiate IT devices in terms of appearance design. Consumers also consider design as being a more important factor in the decision-making of smart phones. Smart phones have become a fashion items, revealing consumers' own characteristics and personality. As the design and appearance of the smartphone become important things, it is necessary to examine consumer values from the design and appearance of IT devices. Furthermore, it is crucial to clarify the mechanisms of consumers' design evaluation and develop the design evaluation model based on the mechanism. Since the influence of design gets continuously strong, various and many studies related to design were carried out. These studies can classify three main streams. The first stream focuses on the role of design from the perspective of marketing and communication. The second one is the studies to find out an effective and appealing design from the perspective of industrial design. The last one is to examine the consumer values created by a product design, which means consumers' perception or feeling when they look and feel it. These numerous studies somewhat have dealt with consumer values, but they do not include product attributes, or do not cover the whole process and mechanism from product attributes to consumer values. In this study, we try to develop the holistic design evaluation model based on consumer values based on three-step approach from product attributes, perceived attributes, to consumer values. Product attributes means the real and physical characteristics each smart phone has. They consist of bezel, length, width, thickness, weight and curvature. Perceived attributes are derived from consumers' perception on product attributes. We consider perceived size of device, perceived size of display, perceived thickness, perceived weight, perceived bezel (top - bottom / left - right side), perceived curvature of edge, perceived curvature of back side, gap of each part, perceived gloss and perceived screen ratio. They are factorized into six clusters named as 'Size,' 'Slimness,' 'No-Frame,' 'Roundness,' 'Screen Ratio,' and 'Looseness.' We conducted qualitative research to find out consumer values, which are categorized into two: look and feel values. We identified the values named as 'Silhouette,' 'Neatness,' 'Attractiveness,' 'Polishing,' 'Innovativeness,' 'Professionalism,' 'Intellectualness,' 'Individuality,' and 'Distinctiveness' in terms of look values. Also, we identifies 'Stability,' 'Comfortableness,' 'Grip,' 'Solidity,' 'Non-fragility,' and 'Smoothness' in terms of feel values. They are factorized into five key values: 'Sleek Value,' 'Professional Value,' 'Unique Value,' 'Comfortable Value,' and 'Solid Value.' Finally, we developed the holistic design evaluation model by analyzing each relationship from product attributes, perceived attributes, to consumer values. This study has several theoretical and practical contributions. First, we found consumer values in terms of design evaluation and implicit chain relationship from the objective and physical characteristics to the subjective and mental evaluation. That is, the model explains the mechanism of design evaluation in consumer minds. Second, we suggest a general design evaluation process from product attributes, perceived attributes to consumer values. It is an adaptable methodology not only smart phone but also other IT products. Practically, this model can support the decision-making when companies initiative new product development. It can help product designers focus on their capacities with limited resources. Moreover, if its model combined with machine learning collecting consumers' purchasing data, most preferred values, sales data, etc., it will be able to evolve intelligent design decision support system.

QR-Code Based Mutual Authentication System for Web Service (웹 서비스를 위한 QR 코드 기반 상호 인증 시스템)

  • Park, Ji-Ye;Kim, Jung-In;Shin, Min-Su;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.207-215
    • /
    • 2014
  • Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.