• Title/Summary/Keyword: Standard service model

Search Result 520, Processing Time 0.026 seconds

Development of Models for the Prediction of Domestic Red Pepper (Capsicum annuum L.) Powder Capsaicinoid Content using Visible and Near-infrared Spectroscopy

  • Lim, Jongguk;Mo, Changyeun;Kim, Giyoung;Kim, Moon S.;Lee, Hoyoung
    • Journal of Biosystems Engineering
    • /
    • v.40 no.1
    • /
    • pp.47-60
    • /
    • 2015
  • Purpose: The purpose of this study was to non-destructively and quickly predict the capsaicinoid content of domestic red pepper powders from various areas of Korea using a pungency measurement system in combination with visible and near-infrared (VNIR) spectroscopic techniques. Methods: The reflectance spectra of 149 red pepper powder samples from 14 areas of Korea were obtained in the wavelength range of 450-950 nm and partial least squares regression (PLSR) models for the prediction of capsaicinoid content were developed using area models. Results: The determination coefficient of validation (RV2), standard error of prediction (SEP), and residual prediction deviation (RPD) for the capsaicinoid content prediction model for the Namyoungyang area were 0.985, ${\pm}2.17mg/100g$, and 7.94, respectively. Conclusions: These results show the possibility of VNIR spectroscopy combined with PLSR models in the non-destructive and facile prediction of capsaicinoid content of red pepper powders from Korea.

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing

  • Zhang, Yinghui;Chen, Xiaofeng;Li, Jin;Li, Hui;Li, Fenghua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4028-4049
    • /
    • 2014
  • Attribute-based encryption (ABE) is a promising cryptographic primitive for implementing fine-grained data sharing in cloud computing. However, before ABE can be widely deployed in practical cloud storage systems, a challenging issue with regard to attributes and user revocation has to be addressed. To our knowledge, most of the existing ABE schemes fail to support flexible and direct revocation owing to the burdensome update of attribute secret keys and all the ciphertexts. Aiming at tackling the challenge above, we formalize the notion of ciphertext-policy ABE supporting flexible and direct revocation (FDR-CP-ABE), and present a concrete construction. The proposed scheme supports direct attribute and user revocation. To achieve this goal, we introduce an auxiliary function to determine the ciphertexts involved in revocation events, and then only update these involved ciphertexts by adopting the technique of broadcast encryption. Furthermore, our construction is proven secure in the standard model. Theoretical analysis and experimental results indicate that FDR-CP-ABE outperforms the previous revocation-related methods.

A Metadata Design for Augmented Broadcasting and Testbed System Implementation

  • Choi, Bumsuk;Kim, Jeonghak;Kim, Soonchoul;Jeong, Youngho;Hong, Jin Woo;Lee, Won Don
    • ETRI Journal
    • /
    • v.35 no.2
    • /
    • pp.292-300
    • /
    • 2013
  • Augmented reality (AR) is a popular service in mobile devices, and many AR applications can be downloaded from app stores. As TV broadcasting has continued to integrate with the Internet, it has become an area in which the AR concept is able to reside, although in a simple form, such as an advertisement placed in the static region of a scene. There are some restrictions against TV broadcasting realizing AR since TVs are fixed devices and typically do not have GPS, geomagnetic, or acceleration sensors, which are standard equipment in mobile devices. However, the desire to experience AR on a large TV screen has triggered research and development for an ideal AR business model and service type. This paper introduces several use cases for augmented broadcasting services and also presents an augmented broadcasting metadata scheme designed for a broadcasting environment. We also verify some of the use cases and an augmented broadcasting metadata scheme in an implemented augmented broadcasting system based on a hybrid TV platform.

A Study on the Security System of the Web Based Defense Information Service Network (WEB 환경에서 국방정보통신망 정보보호체계 구축에 관한 연구)

  • 신유찬;남길현
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.1
    • /
    • pp.115-135
    • /
    • 2002
  • The limits of current DN(Defense networks), private and closed network, become to reality; for Example, high expense of construction and maintenance of networks, restriction of new subscribers on DN. Therefore, a network using web environment that reflect fast development of If and IS(Information Security) technology is demanded for MND. Meeting the requirement of reliable IS system and extension and improvement of DN using common network, we can reduce the expense to extend, maintain, repair DN, form the environment that makes military business cooperate better with civil company and government agency, advance implementing Defense computing and networking service for field small size units that was a exception of Defense digitalization. But it is essential to construct DN based on common network that there are security requisites; confidentiality, integrity, availability, efficiency, log, backup, restoration, that have to be realized at demanding level for IS. This thesis suggested four measurements; replacement DN with common network to resolve the requirements of building new network and improvement of performance for private DN, linkage with common network for new requirement, distribution of traffic using common network, configuration of DN using Internet and Proposed a refinement of IS management organization to treat security threat of common network flexibly, and LAN IS standard model of DN based on the web environment.

A Study on the Application Service Model and Platform for Web Services Based on USN Application Developments (웹 서비스 기반의 USN 응용 개발을 위한 응용서비스 모델 및 플랫폼에 관한 연구)

  • Kim, Chang-Su;Cao, Ke-Rang;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.485-488
    • /
    • 2010
  • Recently, as the dissemination of the Internet and development of computer network technology, Research is actively underway for realization of the next-generation computing paradigm called Ubiquitous Computing. It will not be constrained by Space-time and It will be a cornerstone of human-oriented services. Such ubiquitous computing as a core technology for USN (Ubiquitous Sensor Network) is presented. In this paper, the sensor information into a standardized form to describe the information describing standards and USN sensor applications for the service standard for directory services protocols were investigated.

  • PDF

Study on Highly Reliable Drone System to Mitigate Denial of Service Attack in Terms of Scheduling (고신뢰 드론 시스템을 위한 스케줄링 측면에서의 서비스 거부 공격 완화 방안 연구)

  • Kwak, Ji-Won;Kang, Soo-Young;Kim, Seung-Joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.821-834
    • /
    • 2019
  • As cyber security threats increase, there is a growing demand for highly reliable systems. Common Criteria, an international standard for evaluating information security products, requires formal specification and verification of the system to ensure a high level of security, and more and more cases are being observed. In this paper, we propose highly reliable drone systems that ensure high level security level and trust. Based on the results, we use formal methods especially Z/EVES to improve the system model in terms of scheduling in the system kernel.

The Scalability and the Strategy for EMR Database Encryption Techniques

  • Shin, David;Sahama, Tony;Kim, Steve Jung-Tae;Kim, Ji-Hong
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.577-582
    • /
    • 2011
  • EMR(Electronic Medical Record) is an emerging technology that is highly-blended between non-IT and IT area. One of methodology to link non-IT and IT area is to construct databases. Nowadays, it supports before and after-treatment for patients and should satisfy all stakeholders such as practitioners, nurses, researchers, administrators and financial department and so on. In accordance with the database maintenance, DAS (Data as Service) model is one solution for outsourcing. However, there are some scalability and strategy issues when we need to plan to use DAS model properly. We constructed three kinds of databases such as plain-text, MS built-in encryption which is in-house model and custom AES (Advanced Encryption Standard) - DAS model scaling from 5K to 2560K records. To perform custom AES-DAS better, we also devised Bucket Index using Bloom Filter. The simulation showed the response times arithmetically increased in the beginning but after a certain threshold, exponentially increased in the end. In conclusion, if the database model is close to in-house model, then vendor technology is a good way to perform and get query response times in a consistent manner. If the model is DAS model, it is easy to outsource the database, however, some technique like Bucket Index enhances its utilization. To get faster query response times, designing database such as consideration of the field type is also important. This study suggests cloud computing would be a next DAS model to satisfy the scalability and the security issues.

Reliability of mortar filling layer void length in in-service ballastless track-bridge system of HSR

  • Binbin He;Sheng Wen;Yulin Feng;Lizhong Jiang;Wangbao Zhou
    • Steel and Composite Structures
    • /
    • v.47 no.1
    • /
    • pp.91-102
    • /
    • 2023
  • To study the evaluation standard and control limit of mortar filling layer void length, in this paper, the train sub-model was developed by MATLAB and the track-bridge sub-model considering the mortar filling layer void was established by ANSYS. The two sub-models were assembled into a train-track-bridge coupling dynamic model through the wheel-rail contact relationship, and the validity was corroborated by the coupling dynamic model with the literature model. Considering the randomness of fastening stiffness, mortar elastic modulus, length of mortar filling layer void, and pier settlement, the test points were designed by the Box-Behnken method based on Design-Expert software. The coupled dynamic model was calculated, and the support vector regression (SVR) nonlinear mapping model of the wheel-rail system was established. The learning, prediction, and verification were carried out. Finally, the reliable probability of the amplification coefficient distribution of the response index of the train and structure in different ranges was obtained based on the SVR nonlinear mapping model and Latin hypercube sampling method. The limit of the length of the mortar filling layer void was, thus, obtained. The results show that the SVR nonlinear mapping model developed in this paper has a high fitting accuracy of 0.993, and the computational efficiency is significantly improved by 99.86%. It can be used to calculate the dynamic response of the wheel-rail system. The length of the mortar filling layer void significantly affects the wheel-rail vertical force, wheel weight load reduction ratio, rail vertical displacement, and track plate vertical displacement. The dynamic response of the track structure has a more significant effect on the limit value of the length of the mortar filling layer void than the dynamic response of the vehicle, and the rail vertical displacement is the most obvious. At 250 km/h - 350 km/h train running speed, the limit values of grade I, II, and III of the lengths of the mortar filling layer void are 3.932 m, 4.337 m, and 4.766 m, respectively. The results can provide some reference for the long-term service performance reliability of the ballastless track-bridge system of HRS.

영국의 공공도서관법연구

  • 최달현
    • Journal of Korean Library and Information Science Society
    • /
    • v.7
    • /
    • pp.177-206
    • /
    • 1980
  • Public library legislation is the essential means of providing for all the citizen in modern society with a standard public library service. We can trace the origin of that back to the Public Libraries Act 1850 in England. This paper is reviewing all the measures concerning public libraries of England since then in order to find out some guidelines for revision of the Korean Library Law enacted in 1963. Although Public Libraries Act 1850 was an output of a series of social reform movement in the 19th century, it established first the provision of public library service su n.0, pported by public funds. However the Act had several restrictions hindering public library service from making progress. These are: 1. Adoptive legislation in nature 2. Limitation of the size of population and rate income 3. Small library authorities 4. Procedure for adoption by public meeting 5. Restrictions on the ways in which rate income might be spent 6. No governmental organization to direct or control for a standardized public library service 7. No cooperative schemes among libraries. Subsequent development was directed largely to removal of those limitations. The present Public Libraries Act 1964 as a model of public library legislation was enacted on the basis of such reports as Kenyon, McColvin, Roberts, and Bourdillon. All but the problem of small library authorities were removed with this new Act. The final object could be achieved by the Local Government Act 1974 which reorganized existing 383 small authorities into new 115 ones the average population of which was 280, 000. Now, McColvin's dream of 30 years could be fulfilled in the late 70's. He argued that the minimum size of population of a viable authority should be 300, 000. Although the effect of the 1964 Act on the development of public library services in England was great, there must be some considerations as to the provisions of public library objective, government funding for library services, free use of library materials to all regardless of residence, and placement of library committee within the authority.

  • PDF

A Multi-Service MAC Protocol in a Multi-Channel CSMA/CA for IEEE 802.11 Networks

  • Ben-Othman, Jalel;Castel, Hind;Mokdad, Lynda
    • Journal of Communications and Networks
    • /
    • v.10 no.3
    • /
    • pp.287-296
    • /
    • 2008
  • The IEEE 802.11 wireless standard uses the carrier sense multiple access with collision avoidance (CSMA/CA) as its MAC protocol (during the distributed coordination function period). This protocol is an adaptation of the CSMA/CD of the wired networks. CSMA/CA mechanism cannot guarantee quality of service (QoS) required by the application because orits random access method. In this study, we propose a new MAC protocol that considers different types of traffic (e.g., voice and data) and for each traffic type different priority levels are assigned. To improve the QoS of IEEE 802.11 MAC protocols over a multi-channel CSMA/CA, we have developed a new admission policy for both voice and data traffics. This protocol can be performed in direct sequence spread spectrum (DSSS) or frequency hopping spread spectrum (FHSS). For voice traffic we reserve a channel, while for data traffic the access is random using a CSMA/CA mechanism, and in this case a selective reject and push-out mechanism is added to meet the quality of service required by data traffic. To study the performance of the proposed protocol and to show the benefits of our design, a mathematical model is built based on Markov chains. The system could be represented by a Markov chain which is difficult to solve as the state-space is too large. This is due to the resource management and user mobility. Thus, we propose to build an aggregated Markov chain with a smaller state-space that allows performance measures to be computed easily. We have used stochastic comparisons of Markov chains to prove that the proposed access protocol (with selective reject and push-out mechanisms) gives less loss rates of high priority connections (data and voices) than the traditional one (without admission policy and selective reject and push-out mechanisms). We give numerical results to confirm mathematical proofs.