• Title/Summary/Keyword: Software re-engineering

Search Result 169, Processing Time 0.03 seconds

Efficient Proxy Re-encryption Scheme for E-Voting System

  • Li, Wenchao;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1847-1870
    • /
    • 2021
  • With the development of information and communication technologies, especially wireless networks and cell phones, the e-voting system becomes popular as its cost-effectiveness, swiftness, scalability, and ecological sustainability. However, the current e-voting schemes are faced with the problem of privacy leakage and further cause worse vote-buying and voter-coercion problems. Moreover, in large-scale voting, some previous e-voting system encryption scheme with pairing operation also brings huge overhead pressure to the voting system. Thus, it is a vital problem to design a protocol that can protect voter privacy and simultaneously has high efficiency to guarantee the effective implementation of e-voting. To address these problems, our paper proposes an efficient unidirectional proxy re-encryption scheme that provides the re-encryption of vote content and the verification of users' identity. This function can be exactly applied in the e-voting system to protect the content of vote and preserve the privacy of the voter. Our proposal is proven to be CCA secure and collusion resistant. The detailed analysis also shows that our scheme achieves higher efficiency in computation cost and ciphertext size than the schemes in related fields.

Prediction of radiation dose to adult human from radiopharmaceutical manufactured by third generation bisphosphonate labeled with Rhenium

  • Zahra Pourhabib;Hassan Ranjbar
    • Nuclear Engineering and Technology
    • /
    • v.55 no.2
    • /
    • pp.669-673
    • /
    • 2023
  • Introduction: The crucial step in preclinical process of radiopharmaceutical production is internal dosimetry evaluation by different ways to realize radiobiological dose-response relationships and to extract the results for clinical use. Till now several bone-seeking radiopharmaceuticals have been developed for bone metastasis. Interesting features of bisphosphonates attracted attentions to them in the field of radiopharmaceutical therapy and studies on new generation of them have been doing too. Materials and methods: In this study, we used ZNA as representative of the third generation. The radiopharmaceutical 188Re-ZNA was produced and its radiochemical purity was investigated. Then, the biological distribution of the produced radiopharmaceutical at 1, 2, 4 and 24 h after injection on different organs of mice were investigated. Finally, the absorbed dose of organs in the human body was assessed using the RADAR method. Results: The results show 96% radiochemical purity of the 188Re-ZNA radiopharmaceutical. The amount of %ID/g in bone is 1.131% after 1 h and in 24 h it has a significant amount compared to other organs, that is 0.516%. Also dosimetric results show that the highest absorption dose is related to bone and the amount of this dose is 0.050 mGy/MBq. Conclusion: Considering the possibility of producing the 188Re-ZNA radiopharmaceutical, as well as the proper distribution of this radiopharmaceutical in target and non-target organs and increasing the absorbed dose in bone, it can be concluded that this radiopharmaceutical can be useful in the "radiopharmaceutical therapy" in metastases.

System-level Design Space Exploration and Resource Mapping Strategies for a Reconfigurable Hybrid System

  • Ahn, Seong-Yong;Lee, Jeong-A
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.924-927
    • /
    • 2002
  • In this paper we proposed the design space exploration environment of re-configurable hybrid systems and evaluate the performance by changing design parameters. With this, we analyzed the effect of various scheduling methods which determine how we allocate hardware/software resources to application program. A simple static (fixed) mapping strategy produces almost the same performance compared with a sophisticated dynamic mapping strategy especially when a CPU is already busy with its pre-assigned own tasks.

  • PDF

Re-engineering framework for improving reusability of embedded software (임베디드 소프트웨어의 재사용성 향상을 위한 리엔지니어링 프레임워크)

  • Kim, Kang-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.1-9
    • /
    • 2008
  • Most consumer electronics companies hold numerous line-ups to cope with divergent customer's needs. To cope with current situation, most products are derived from the 'base product' which is developed for brand new features with respect to the change requests. That is called derivation. After 'base code' is developed for newly introduced products, some modification will occur corresponding to the derivative product models. So, quality attributes of 'base code' affects quality and productivity of 'derived code'. But in the middle of continuous modification to 'base code', violation of architectural design decision and unauthorized or maybe unsophisticated change to source code willing to happen and thus it cause critical problem. Those code has 'aging symptom' both architectural and code level in nature. In this paper, we introduced reengineering framework which guide the procedure and tactics to find and fix 'aging symptom' for improvement on quality attribute of 'base code'.

  • PDF

A Tool for Modernization of Legacy Cobol System (래거시 Cobol 시스템의 현대화 지원 도구 구현)

  • Kim, Cheol-Hong;Kim, Dong-Kwan;Yang, Young-Jong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.327-330
    • /
    • 2001
  • 래거시 시스템은 기업의 운영에 중요한 시스템이나, 대부분 Cobol이나 Fortran으로 작성되어 있다. 이들 프로그램들은 수년 동안 많은 프로그래머들에 의해서 유지관리 되어서, 소프트웨어에 많은 수정이 가해졌으며, 대부분 설계 문서들이 존재하지 않는다. 이러한 이유들 때문에 래거시 시스템을 유지 보수하는데 많은 비용이 소요된다. 따라서 기업의 시스템 운영에 지장을 주지 않고 래거시 프로그램들을 유지보수하기 용이하도록 하는 것이 시급하다. Cobol로 구축된 시스템을 사용하고 있는 업체들이 고려하고 있는 하나의 접근 방법은 래거시 시스템을 객체지향 시스템으로 재공학(Re-engineering)하거나 새로운 분산환경 플랫폼인 EJB 등으로 통합하는 것이다. 본 논문에서는 래거시 Cobol 시스템을 재공학하기 위한 시각화 도구와 래거시 시스템과 EJB 플랫폼을 연계하기 위한 도구를 제시한다.

  • PDF

Evaluation Method of Architecture Asset (아키텍처 자산의 평가 방법)

  • Choi, Han-yong
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.101-106
    • /
    • 2018
  • Software are being studied to register and manage assets. And Methods for evaluating software systems have been based on subjective evaluation criteria. We propose an evaluation model for evaluating complex assets obtained from the complexity measurement of the preceding asset management system. We used scales to measure and provide logical complexity to measure the complexity of our architectural assets. And we used a method to evaluate whether it expresses attribute value of architecture asset. We have also built an evaluation model criterion for evaluating the usability of the asset data based on the ISO/IEC 25010 quality model characteristics of the SQuaRE Series. When the designers design the asset as a composite asset, the optional evaluation of the negative property that weights are assigned according to the characteristics of each asset is applied to secure the flexibility of the evaluation model.

Study of the Transmission Error Prediction of a Five-speed Manual Transmission System (5속 수동 트랜스미션의 전달오차 예측에 관한 연구)

  • Cho, Sang-Pil;Lee, Dong-Gyu;Kim, Lae-Sung;Xu, Zhe-zhu;Lyu, Sung-ki
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.15 no.2
    • /
    • pp.66-71
    • /
    • 2016
  • For the manual transmission gearbox used in the automotive industry, gear meshing transmission error is the main source of noise known as gear whine, and radiated gear whine noise plays an important role in the whole gearbox. Therefore, in order to keep competitive in the automotive market, the NVH performance of transmission gearboxes is increasingly important for automotive manufacturers when a new product is developed. In this paper, in order to achieve an optimized tooth contact pattern, gear tooth modification is applied to make up for the deformation of the teeth owing to load. A five-speed MT gearbox is firstly modeled in RomaxDesign software and the prediction of transmission error under the loaded torques is studied and compared. From the simulation, the transmission error and maximum contact stress are also simulated and compared after tooth modification of the loaded torques. Finally, the simulation results are used to optimize the whole gearbox design and the final gearbox prototype is testified to obtain NVH performance in a semi-anechoic room.

Video Analysis System for Action and Emotion Detection by Object with Hierarchical Clustering based Re-ID (계층적 군집화 기반 Re-ID를 활용한 객체별 행동 및 표정 검출용 영상 분석 시스템)

  • Lee, Sang-Hyun;Yang, Seong-Hun;Oh, Seung-Jin;Kang, Jinbeom
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.89-106
    • /
    • 2022
  • Recently, the amount of video data collected from smartphones, CCTVs, black boxes, and high-definition cameras has increased rapidly. According to the increasing video data, the requirements for analysis and utilization are increasing. Due to the lack of skilled manpower to analyze videos in many industries, machine learning and artificial intelligence are actively used to assist manpower. In this situation, the demand for various computer vision technologies such as object detection and tracking, action detection, emotion detection, and Re-ID also increased rapidly. However, the object detection and tracking technology has many difficulties that degrade performance, such as re-appearance after the object's departure from the video recording location, and occlusion. Accordingly, action and emotion detection models based on object detection and tracking models also have difficulties in extracting data for each object. In addition, deep learning architectures consist of various models suffer from performance degradation due to bottlenects and lack of optimization. In this study, we propose an video analysis system consists of YOLOv5 based DeepSORT object tracking model, SlowFast based action recognition model, Torchreid based Re-ID model, and AWS Rekognition which is emotion recognition service. Proposed model uses single-linkage hierarchical clustering based Re-ID and some processing method which maximize hardware throughput. It has higher accuracy than the performance of the re-identification model using simple metrics, near real-time processing performance, and prevents tracking failure due to object departure and re-emergence, occlusion, etc. By continuously linking the action and facial emotion detection results of each object to the same object, it is possible to efficiently analyze videos. The re-identification model extracts a feature vector from the bounding box of object image detected by the object tracking model for each frame, and applies the single-linkage hierarchical clustering from the past frame using the extracted feature vectors to identify the same object that failed to track. Through the above process, it is possible to re-track the same object that has failed to tracking in the case of re-appearance or occlusion after leaving the video location. As a result, action and facial emotion detection results of the newly recognized object due to the tracking fails can be linked to those of the object that appeared in the past. On the other hand, as a way to improve processing performance, we introduce Bounding Box Queue by Object and Feature Queue method that can reduce RAM memory requirements while maximizing GPU memory throughput. Also we introduce the IoF(Intersection over Face) algorithm that allows facial emotion recognized through AWS Rekognition to be linked with object tracking information. The academic significance of this study is that the two-stage re-identification model can have real-time performance even in a high-cost environment that performs action and facial emotion detection according to processing techniques without reducing the accuracy by using simple metrics to achieve real-time performance. The practical implication of this study is that in various industrial fields that require action and facial emotion detection but have many difficulties due to the fails in object tracking can analyze videos effectively through proposed model. Proposed model which has high accuracy of retrace and processing performance can be used in various fields such as intelligent monitoring, observation services and behavioral or psychological analysis services where the integration of tracking information and extracted metadata creates greate industrial and business value. In the future, in order to measure the object tracking performance more precisely, there is a need to conduct an experiment using the MOT Challenge dataset, which is data used by many international conferences. We will investigate the problem that the IoF algorithm cannot solve to develop an additional complementary algorithm. In addition, we plan to conduct additional research to apply this model to various fields' dataset related to intelligent video analysis.

SDN Based Mobility Management To Reduce Packet Loss Using Anchor Switch Selection (Anchor 스위치 선정을 통해 패킷 손실을 줄이기 위한 SDN 기반의 이동성 기법)

  • Yang, Yunjung;Yeom, Sanggil;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.119-122
    • /
    • 2016
  • 대표적인 네트워크 기반의 이동성 기법인 PMIPv6(Proxy Mobility IPv6)은 이동 단말에 대한 끊김 없는 서비스 지원이 가능하다. 하지만 PMIPv6 기법은 단말과 홈 에이전트 간 IP Tunnel을 생성해야 하며, 그에 따른 시그널링 비용이 발생하게 된다. 또한, 단말 이동에 따른 연속적인 서비스 지원만 고려할 뿐 이동 중 발생하는 패킷 손실은 고려하지 않는 문제점이 있다. 본 논문은 이러한 문제점을 해결하기 위해 SDN(Software Defined Networks)을 적용하였다. 데이터 플레인에서 Anchor 스위치를 선정하여 이동 전 위치의 단말로 전송되던 패킷을 이동한 위치의 단말로 Re-direction 함으로써 패킷 손실을 줄이기 위한 기법을 제안한다.

Data Sharing Scheme based on Attribute Re-Encryption in Cloud Computing (클라우드 환경에서 속성 재암호 기반의 데이터 공유 기법)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.402-403
    • /
    • 2015
  • 클라우드 컴퓨팅 환경에서는 사용자의 데이터를 수많은 분산서버를 이용하여 데이터를 암호화하여 저장한다. 이러한 클라우드 스토리지에 사용자의 수많은 데이터가 저장됨에 따라 클라우드 스토리지의 신뢰성에 문제가 발생하고 있다. 비신뢰적인 관리자 및 공직자로부터 클라우드 서버에 저장된 사용자의 데이터를 안전하게 저장하기 위한 다양한 암호 기술들이 계속해서 연구되고 있다. 하지만 기존의 데이터 암호 기술들은 클라우드 스토리지 상에서 여러 사용자 간의 데이터 공유 서비스에 적용하기 힘든 단점을 가지고 있다. 따라서 본 논문에서는 비신뢰적인 클라우드 스토리지를 고려하여 속성기반 암호로 암호화된 키를 재암호화하여 다른 사용자와 안전하고 효율적으로 공유할 수 있는 데이터 공유기법을 제안한다.