• Title/Summary/Keyword: Verification Process

Search Result 2,008, Processing Time 0.031 seconds

An Access Code Key for Verification Service Model on the Blockchain in a Door Security (출입문 보안을 위한 블록체인 기반의 출입코드키 검증 서비스 모델)

  • Hong, Ki Hyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1416-1432
    • /
    • 2022
  • The access control system is a system that allows users to selectively enter the building by granting an access key to the user for security. Access keys with weak security are easily exposed to attackers and cannot properly perform the role that authenticates users. Access code keys should be protected from forgery or spoofing. For this reason, access key verification service models is important in security. However, most models manage all access keys on one central server. This method not only interrupts all services due to server errors, but also risks forgery and spoofing in the process of transmitting access keys. Therefore, blockchain algorithms are used to reduce this risk. This paper proposes a blockchain-based access key verification service model that used distributed stored blockchain gateways on storing access keys and authenticates the user's identity based on them. To evaluate the performance of this model, an experiment was conducted to confirm the performance of the access key forgery recovery rate and the blockchain network performance. As a result, the proposed method is 100% forgery recovery rate, and the registration and verification process is evaluated at 387.58 TPS and 136.66 TPS.

Political Economy of Cross-Border Lobbies and the Stringency of the Rules of Origin Verification (해외로비와 원산지규정 사후검증제도의 엄격성에 대한 정치경제학)

  • Seok-Joon Hwang;Uk Hwang;JinKwon Lee
    • Korea Trade Review
    • /
    • v.45 no.1
    • /
    • pp.155-171
    • /
    • 2020
  • In reality, there are numerous [Note: I advise to change the tone to being more certain, as opposed to offering a possibility. You need to emphasize the seriousness of the conditions that your study wants to talk about] non-tariff trade barriers under free trade agreements, with various stakeholders having different trade-off interests. This study focuses on the rules of origin verification and considers cases in which domestic firms, foreign firms, and domestic consumer groups compete politically for their rent protection in the domestic market. As in Gwande et al. (2006), cross-border lobbies are considered possible wherein foreign firms also lobby the government to influence the decision-making process of how stringently to verify the rules of origin. [Note: Starting here, switch to past tense because a: study intentions above can be in present tense, b: study procedures should be in past tense] In this study, we assumed that all stakeholders form interest groups and present political contributions to the government based on their interests. The stringency of the rules of origin verification was then determined through this political process, and we compared this to a socially optimal one in the analysis. It was found that the verification was less stringent when there was cross-border lobbying than the socially optimal one.

Analysis of Verification Methodologies Based on a SoC Platform Design

  • Lee, Je-Hoon;Kim, Sang-Choon
    • International Journal of Contents
    • /
    • v.7 no.1
    • /
    • pp.23-28
    • /
    • 2011
  • In a SoC (system-on-chip) design, a design complexity is a big bottleneck. In order to overcome the design complexity, platform based design method is widely adopted for designers. Most complex SoCs need a heterogeneous design development environment for hardware and software co-design. In this paper, we discuss about some kinds of verification approaches with platform based design methodology at various abstraction levels of SoC design. We separate the verification process to two steps according to the different levels of verification. We employ a flexible SoC design environment to support simultaneous hardware and software development. We demonstrate the verification strategy of a target SoC design, IEEE 802.11a WLAN SoC.

An Implementation of Real-Time Speaker Verification System on Telephone Voices Using DSP Board (DSP보드를 이용한 전화음성용 실시간 화자인증 시스템의 구현에 관한 연구)

  • Lee Hyeon Seung;Choi Hong Sub
    • MALSORI
    • /
    • no.49
    • /
    • pp.145-158
    • /
    • 2004
  • This paper is aiming at implementation of real-time speaker verification system using DSP board. Dialog/4, which is based on microprocessor and DSP processor, is selected to easily control telephone signals and to process audio/voice signals. Speaker verification system performs signal processing and feature extraction after receiving voice and its ID. Then through computing the likelihood ratio of claimed speaker model to the background model, it makes real-time decision on acceptance or rejection. For the verification experiments, total 15 speaker models and 6 background models are adopted. The experimental results show that verification accuracy rates are 99.5% for using telephone speech-based speaker models.

  • PDF

The Precipitation Climate of South Korea and the Dichotomous Categorical Verification Indices (남한 강수 기후와 이분 범주 예보 검증 지수)

  • Lim, Gyu-Ho
    • Atmosphere
    • /
    • v.29 no.5
    • /
    • pp.615-626
    • /
    • 2019
  • To find any effects of precipitation climate on the forecast verification methods, we processed the hourly records of precipitation over South Korea. We examined their relationship between the climate and the methods of verification. Precipitation is an intermittent process in South Korea, generally less than an hour or so. Percentile ratio of precipitation period against the entire period of the records is only 14% in the hourly amounts of precipitation. The value of the forecast verification indices heavily depends on the climate of rainfall. The direct comparison of the index values might force us to have a mistaken appraisal on the level of the forecast capability of a weather forecast center. The size of the samples for verification is not crucial as long as it is large enough to satisfy statistical stability. Our conclusion is still temporal rather than conclusive. We may need the amount of precipitation per minute for the confirmation of the present results.

The Study on the Evaluation Factor for Security of Age Verification Information (연령 검증정보의 안정성을 위한 평가인자에 대한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.127-132
    • /
    • 2014
  • Some laws and regulations may require internet service providers to provide services based on the age of users. Age verification in the online environment should be used as a tool to provide service that is appropriate to child based on age. Using the minimum attribute information, processes on age verification provides the proper guidance to the internet services. However, there is a lack of a globally accepted trust framework for age verification process including evaluation factors for age verification information. In this paper the federation model of user attributes were described and evaluation factors for the age verification information were suggested. Also using the suggested evaluation factors, performance evaluation of federation model of user evaluation was performed. To meet the requirements of evaluation factors, framework of federation model should consider the unlinkability pseudonym support, eavesdropping protection and cloning protection.

Clinical Pathway Verification through Process Mining

  • Jung, Jong-Duk;Kim, Suk-Hoon;Yeo, Hyun-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.115-120
    • /
    • 2018
  • A Clinical Pathway(CP) is standard process to way of treat diseases or injuries which is adapted to each hospital based on National Clinical Practice Guideline(CPG). Since CP is standard guideline for doctors and nurses working in a hospital, making and modifying CP is one of the most important administrational work for hospital and also rare work because once it is fixed, it's not changed whether there are new kind of disease discovered or new treatment is developed. However, in present, patient's waiting time during hospital residence process, is discussed as service competitive for patients. In this research, we utilize process mining tool to verify patients treatment process follows CP with EMR(Electronic Medical Record) in a sample hospital, and suggest modifcation point of CP through verification.

Estimation and experimental verification of grinding wheel wear in surface grinding process (평면 연삭에서의 연삭 숫돌 마모 추정 및 실험적 검증)

  • 김현수;주광훈;홍성욱;이응숙;박천홍
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.11a
    • /
    • pp.285-288
    • /
    • 2000
  • This paper deals with the theoretical estimation and its experimental verification of grinding wheel wear in surface grinding process. A theoretical formulation is provided to predict the grinding wheel wear in surface grinding. The associated surface roughness and grinding force are also investigated both theoretically and experimentally. Through a series of simulations and experiments, it is shown that the predictions are in good agreement with the experimental results.

  • PDF

Verification on Chaotic Behavior of Cutting Force in Metal Cutting (절삭가공시 절삭력 신호의 카오스적거동에 관한 규명)

  • 구세진
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 1996.10a
    • /
    • pp.96-100
    • /
    • 1996
  • So far the analysis and modeling of cutting process is studied commonly assumed as being linear stochastic or chaotic without experimental verification. So we verified force signals of cutting process(ball end-milling) is low-dimensional chaos by calculating Lyapunov Exponents. reconstructing attractor using time delay coordinates and calcula-ting it's fractal dimension.

  • PDF

Verification of the On-Board Control Algorithm (I) (차상 제어 시스템의 알고리즘 검증 (I))

  • 전정우;이재덕;이주훈;박도영;김용주
    • Proceedings of the KSR Conference
    • /
    • 2000.05a
    • /
    • pp.292-299
    • /
    • 2000
  • An OBCS(on-board control system) which controls an operation of high speed train is a distributed control system which centrally supervises and controls a distributed system if independent units. A complicated process of design, implementation and test is needed to develop this system. The OBCS and its control algorithm are designed and verified by using the CASE Tool before it is implemented. Its functions are verified by the OBCS simulator. Hereafter, this verification process for Korean high-speed train being developed is presented.

  • PDF