• Title/Summary/Keyword: Validation Server

Search Result 72, Processing Time 0.027 seconds

Design and Implementation of a Reprocessing Transaction Model for Mobile Computing Environments (모바일 컴퓨팅 환경을 위한 재수행 트랜잭션 모델의 설계 및 구현)

  • 김동현;홍봉희
    • Journal of KIISE:Databases
    • /
    • v.30 no.2
    • /
    • pp.184-196
    • /
    • 2003
  • Mobile transactions updating spatial objects are long transactions that can update independently local objects of mobile clients during disconnection. Validation based protocols that are well known to be appropriate for mobile transactions are required to abort a conflicted transaction in order to keep data consistent. Since abortion leads to cancel of all of tile updates, it is not desirable to use the abortion for resolving conflicts of mobile transactions. In this paper, we propose a reprocessing transaction model to resolve the update conflicts between mobile transactions without aborting them. We also design a mobile transaction server to support the reprocessing transaction and build a prototype of a mobile field system. The reprocessing transaction is a subtransaction of a newly committed mobile transaction and re-executes only conflicted objects with foreign conflicted objects. We also introduce a progressive reprocessing scheme to expose non-conflicted objects of the mobile transaction to other transactions in order to reduce starvation of reprocessing transactions.

A Development of Trend Analysis Models and a Process Integrating with GIS for Industrial Water Consumption Using Realtime Sensing Data (실시간 공업용수 추세패턴 모형개발 및 GIS 연계방안)

  • Kim, Seong-Hoon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.19 no.3
    • /
    • pp.83-90
    • /
    • 2011
  • The purpose of this study is to develop a series of trend analysis models for industrial water consumption and to propose a blueprint for the integration of the developed models with GIS. For the consumption data acquisition, a real-time sensing technique was adopted. Data were transformed from the field equipments to the management server in every 5 minutes. The data acquired were substituted to a polynomial formula selected. As a result, a series of models were developed for the consumption of each day. A series of validation processes were applied to the developed models and the models were finalized. Then the finalized models were transformed to the average models representing a day's average consumption or an average daily consumption of each month. Demand pattern analyses were fulfilled through the visualization of the finally derived models. It has founded out that the demand patterns show great consistency and, therefore, it is concluded that high probability of demand forecasting for a day or for a season is available. Also proposed is the integration with GIS as an IT tool by which the developed forecasting models are utilized.

A Compatibility Assessment and Verification of Suitable to DICOM of PACS DATA CD : Current Situation Investigation of Korea (PACS DATA CD의 호환성 평가 및 DICOM 적합성에 대한 검증을 통한 기준 제시)

  • Jeong, Jae-Ho;Sung, Dong-Wook;Park, Bum-Jin;Son, Gi-Gyeong;Kang, Hui-Doo
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.10 no.1
    • /
    • pp.29-34
    • /
    • 2008
  • Purpose To analyze the input and output error of data CD which records the image information and the problems of the server of the compatibility. And to report a compatibility assessment and verification of suitable to DICOM of PACS data CD with investigation of current situation of Korea METHOD AND MATERIALS Date CD of each 8 vendors in 30 hospitals was analyzed. We grasped a main verification element existence of a generation compatibility of data CD. The items of element are media identification, DICOM compression, DICOM viewer send, specified object information modify, auto-run, DICOM content type, etc, and give 1 point for each item. We divided the assessment about an each item into 5 levels. Verification about. DICOM conformance by using DICOM validation tool kit is shown to be classified pass or fail according to error occurrence of tag valus. Classify the prequency of tag occurrence as the item. RESULTS The average point of date CD compatibility is 8 point (very good), lowest is 5 point (6.6%), and highest is 10 point (23%_. Most high occurrence frequency's distribution is 7 point (36.6%). As a result of verification about DICOM conformance, PASS in 8 occurrence frequency's distribution is 7 point (36.6%). As a result of verification about DICOM maximum length numbers (14 items), DICOM error of modality (10 items), discord of pixel data length (6 items). etc.

  • PDF

Autonomous evaluation of ambient vibration of underground spaces induced by adjacent subway trains using high-sensitivity wireless smart sensors

  • Sun, Ke;Zhang, Wei;Ding, Huaping;Kim, Robin E.;Spencer, Billie F. Jr.
    • Smart Structures and Systems
    • /
    • v.19 no.1
    • /
    • pp.1-10
    • /
    • 2017
  • The operation of subway trains induces secondary structure-borne vibrations in the nearby underground spaces. The vibration, along with the associated noise, can cause annoyance and adverse physical, physiological, and psychological effects on humans in dense urban environments. Traditional tethered instruments restrict the rapid measurement and assessment on such vibration effect. This paper presents a novel approach for Wireless Smart Sensor (WSS)-based autonomous evaluation system for the subway train-induced vibrations. The system was implemented on a MEMSIC's Imote2 platform, using a SHM-H high-sensitivity accelerometer board stacked on top. A new embedded application VibrationLevelCalculation, which determines the International Organization for Standardization defined weighted acceleration level, was added into the Illinois Structural Health Monitoring Project Service Toolsuite. The system was verified in a large underground space, where a nearby subway station is a good source of ground excitation caused by the running subway trains. Using an on-board processor, each sensor calculated the distribution of vibration levels within the testing zone, and sent the distribution of vibration level by radio to display it on the central server. Also, the raw time-histories and frequency spectrum were retrieved from the WSS leaf nodes. Subsequently, spectral vibration levels in the one-third octave band, characterizing the vibrating influence of different frequency components on human bodies, was also calculated from each sensor node. Experimental validation demonstrates that the proposed system is efficient for autonomously evaluating the subway train-induced ambient vibration of underground spaces, and the system holds the potential of greatly reducing the laboring of dynamic field testing.

A Study of Zero-Knowledge Proof for Transaction Improvement based Blockchain (블록체인 기반의 트랜잭션 향상을 위한 영지식 증명 연구)

  • Ahn, Byeongtae
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.233-238
    • /
    • 2021
  • Recently, blockchain technology accumulates and stores all transactions. Therefore, in order to verify the contents of all transactions, the data itself is compressed, but the scalability is limited. In addition, since a separate verification algorithm is used for each type of transaction, the verification burden increases as the size of the transaction increases. Existing blockchain cannot participate in the network because it does not become a block sink by using a server with a low specification. Due to this problem, as the time passes, the data size of the blockchain network becomes larger and it becomes impossible to participate in the network except for users with abundant resources. Therefore, in this paper, we are improved transaction as studied the zero knowledge proof algorithm for general operation verification. In this system, the design of zero-knowledge circuit generator capable of general operation verification and optimization of verifier and prover were also conducted.

A Technique for Protecting Android Applications using Executable Code Encryption and Integrity Verification (실행코드 암호화 및 무결성 검증을 적용한 안드로이드앱 보호 기법)

  • Shim, HyungJoon;Cho, Sangwook;Jeong, Younsik;Lee, Chanhee;Han, Sangchul;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.10 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • In this paper, we propose a method for protecting Android applications against reverse engineering attacks. In this method, the server encrypts the original executable code (DEX) included in an APK file, inserts into the APK file a stub code that decrypts the encrypted DEX later at run-time, and distributes the modified APK file. The stub code includes an integrity validation code to detect attacks on itself. When a user installs and executes the APK file, the stub code verifies the integrity of itself, decrypts the encrypted DEX, and loads it dynamically to execute. Since the original DEX is distributed as an encrypted one, we can effectively protect the intellectual property. Further, by verifying the integrity of the stub code, we can prevent malicious users from bypassing our method. We applied the method to 15 Android apps, and evaluated its effectiveness. We confirmed that 13 out of them operates normally.

Genome Analysis and Optimization of Caproic Acid Production of Clostridium butyricum GD1-1 Isolated from the Pit Mud of Nongxiangxing Baijiu

  • Min Li;Tao Li;Jia Zheng;Zongwei Qiao;Kaizheng Zhang;Huibo Luo;Wei Zou
    • Journal of Microbiology and Biotechnology
    • /
    • v.33 no.10
    • /
    • pp.1337-1350
    • /
    • 2023
  • Caproic acid is a precursor substance for the synthesis of ethyl caproate, the main flavor substance of nongxiangxing baijiu liquor. In this study, Clostridium butyricum GD1-1, a strain with high caproic acid concentration (3.86 g/l), was isolated from the storage pit mud of nongxiangxing baijiu for sequencing and analysis. The strain's genome was 3,840,048 bp in length with 4,050 open reading frames. In addition, virulence factor annotation analysis showed C. butyricum GD1-1 to be safe at the genetic level. However, the annotation results using the Kyoto Encyclopedia of Genes and Genomes Automatic Annotation Server predicted a deficiency in the strain's synthesis of alanine, methionine, and biotin. These results were confirmed by essential nutrient factor validation experiments. Furthermore, the optimized medium conditions for caproic acid concentration by strain GD1-1 were (g/l): glucose 30, NaCl 5, yeast extract 10, peptone 10, beef paste 10, sodium acetate 11, L-cysteine 0.6, biotin 0.004, starch 2, and 2.0% ethanol. The optimized fermentation conditions for caproic acid production by C. butyricum GD1-1 on a single-factor basis were: 5% inoculum volume, 35℃, pH 7, and 90% loading volume. Under optimal conditions, the caproic acid concentration of strain GD1-1 reached 5.42 g/l, which was 1.40 times higher than the initial concentration. C. butyricum GD1-1 could be further used in caproic acid production, NXXB pit mud strengthening and maintenance, and artificial pit mud preparation.

An Efficient Mobile Transaction Processing Scheme over Multiple Wireless Broadcast Channels (다중 무선 방송채널에서의 효과적인 모바일 트랜잭션 처리 기법)

  • Jeong, Ho-Ryun;Jung, Sung-Won;Park, Sung-Wook
    • Journal of KIISE:Databases
    • /
    • v.35 no.3
    • /
    • pp.257-271
    • /
    • 2008
  • Wireless broadcast environments has character that a number of mobile client can receive data streaming from central server no matter how they are so many. Because it is asymmetric bandwidth in that uplink and downlink bandwidth are different. This advantage helps wireless broadcast environments is used in many applications. These applications work almost read operation and need control concurrency using transaction unit. Previous concurrency control scheme in single channel is not adapted in multi channel environments because consistency of data are broken when a mobile client tunes in a broadcast cycle in a channel and then move into another channel and listen to different broadcast cycle with already accessed broadcast cycle. In this paper, we propose concurrency control for read-only mobile transactions in multiple wireless broadcast channel. First of all, we adapt index and data dedicated channel and propose LBCPC(Longest Broadcast Cycle Per Channel) as new unit of consistency. In index dedicated channel, it is repeatedly broadcasted data in same BCPC(Broadcast Cycle Per Channel) until LBCPC. And mobile transaction executes validation using control information every LBCPC. As a result, consistency of data is kept and average response time is shorter than one in single channel because waiting time for restart reduces. And as control information is broadcasted more frequently than in single channel, it is guaranteed currency about data accessed by transaction. Finally, according to the simulation result, we verify performance of our scheme in multi channel as comparing average response time with single channel.

Generator of Dynamic User Profiles Based on Web Usage Mining (웹 사용 정보 마이닝 기반의 동적 사용자 프로파일 생성)

  • An, Kye-Sun;Go, Se-Jin;Jiong, Jun;Rhee, Phill-Kyu
    • The KIPS Transactions:PartB
    • /
    • v.9B no.4
    • /
    • pp.389-390
    • /
    • 2002
  • It is important that acquire information about if customer has some habit in electronic commerce application of internet base that led in recommendation service for customer in dynamic web contents supply. Collaborative filtering that has been used as a standard approach to Web personalization can not get rapidly user's preference change due to static user profiles and has shortcomings such as reliance on user ratings, lack of scalability, and poor performance in the high-dimensional data. In order to overcome this drawbacks, Web usage mining has been prevalent. Web usage mining is a technique that discovers patterns from We usage data logged to server. Specially. a technique that discovers Web usage patterns and clusters patterns is used. However, the discovery of patterns using Afriori algorithm creates many useless patterns. In this paper, the enhanced method for the construction of dynamic user profiles using validated Web usage patterns is proposed. First, to discover patterns Apriori is used and in order to create clusters for user profiles, ARHP algorithm is chosen. Before creating clusters using discovered patterns, validation that removes useless patterns by Dempster-Shafer theory is performed. And user profiles are created dynamically based on current user sessions for Web personalization.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF