• Title/Summary/Keyword: Violation

Search Result 859, Processing Time 0.023 seconds

The Design and Implementation of HTML Document Integrity Management System (HTML 문서의 무결성 유지 시스템의 설계 및 구현)

  • 조이기;이영운;황인문;양수영;김원중
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.380-383
    • /
    • 2002
  • It Is difficult to manage broken link with dangling reference, inaccurate reference m the manual site that is consist of HTML documents of much quantity as KLDP(Korean Linux Documentation Project, http:/ /kldp.org) Web site. In this paper. we define relationship and constrain renditions that exist between Web site's HTML documents. And we design and implement HIMS(HTML Document Integrity Management System), which notify user that integrity violation happens or launch trigger operation to keep integrity between HTML documents in case of insert, delete, update.

  • PDF

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

  • Kang, Jin-Suk;Choi, Yong-Sik;Sung, Mee-Young;Shin, Seung-Ho;Jeong, Tai-Keong T.
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.254-258
    • /
    • 2007
  • Recently, ubiquitous computing in being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. In this paper, in order to improve the survivability of its nodes, it should build available simulation surrounding sensor nodes. Also, In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on LFSR(Linear Feedback Shift Register) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.

Ensure intellectual property rights for 3D pringting 3D modeling design (3D프린팅과 3D모델링의 디자인에 대한 지적재산권 침해확인 방안)

  • Lee, Yong-keu;Park, Dae-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.305-308
    • /
    • 2016
  • The 3D printing technology which is called new revolution of 21C is under the spotlight recently. The technology takes effects on general manufacturing industries, as well as the prototypes, education, health care, construction. and other industries. It seems that personalized products will be produced and distributed with the introduction of 3D printers. In the case the possibility of violating intellectual property rights, we propose a system that can prevent the violation.

  • PDF

Metered Signatures: How to Restrict the Signing Capability

  • Kim, Woo-Hwan;Yoon, Hyo-Jin;Cheon, Jung-Hee
    • Journal of Communications and Networks
    • /
    • v.12 no.3
    • /
    • pp.201-208
    • /
    • 2010
  • We propose a new notion of metered signatures. Metered signature is an extension of k-times signatures in which a signer can generate only k signatures. However, the restriction of metered signatures can be more elaborate: It can be used k-times every day or to preserve the order of signed messages in some applications. Any violation of this regulation reveals a secret key or the signature on a predetermined message. The applications includes proxy signatures, limited free downloads, and the rating web site. We give two instances of metered signatures: One is based on the computational Diffie-Hellman problem (CDHP) using a bilinear map and the other is based on the RSA problem. In both schemes, the signature and certificate size and the verification cost are constant with respect to k. Further, we show that the proposed metered signatures admit batch verification of many signatures almost at one verification cost with small security loss.

Contingency Severity Ranking Using Direct Method in Power Systems (전력계통에 있어서 직접법을 활용한 상정사고 위험순위 결정)

  • Lee, Sang-Keun
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.54 no.2
    • /
    • pp.67-72
    • /
    • 2005
  • This paper presents a method to select contingency ranking considering voltage security problems in power systems. Direct method which needs not the detailed knowledge of the post contingency voltage at each bus is used. Based on system operator's experience and knowledge, the membership functions for the MVAR mismatch and allowable voltage violation are justified describing linguistic representation with heuristic rules. Rule base is used for the computation of severity index for each contingency by fuzzy inference. Contingency ranking harmful to the system is formed by the index for security evaluation. Compared with 1P-1Q iteration, this algorithm using direct method and fuzzy inference shows higher computation speed and almost the same accuracy. The proposed method is applied to model system and KEPCO pratical system which consists of 311 buses and 609 lines to show its effectiveness.

A Comparative Study on Reliability Index and Target Performance Measure Based Probabilistic Structural Design Optimizations (신뢰도지수와 목표성능치에 기반한 확률론적 구조설계 최적화기법에 대한 비교연구)

  • 양영순;이재옥
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2000.10a
    • /
    • pp.32-39
    • /
    • 2000
  • Probabilistic structural design optimization, which is characterized by the so-called probabilistic. constraints which introduce permissible probability of violation, is preferred to deterministic design optimization since unpredictable inherent uncertainties and randomness in structural and environmental properties are to be taken quantitatively into account by probabilistic design optimization. In this paper, the well-known reliability index based MPFP(Most Probable Failure Point) search approach and the newly introduced target performance measure based MPTP(Minimum Performance Target Point) search approach are summarized and compared. The present comparison focuses on the number of iterations required for the estimation of probabilistic constraints and a technique for improvement which removes exhaustive iterations is presented as well. A 10 bar truss problem is examined for this.

  • PDF

Simulation of Vehicle-Track-Bridge Dynamic Interaction by Nonlinear Hertzian Contact Spring and Displacement Constraint Equations (비선형 헤르쯔 접촉스프링과 변위제한조건식의 적용에 의한 차량-궤도-교량 동적상호작용 수치해석기법)

  • Chung Keun-Young;Lee Sung-Uk;Min Kyung-Ju
    • Proceedings of the KSR Conference
    • /
    • 2005.11a
    • /
    • pp.191-196
    • /
    • 2005
  • In this study, to describe vehicle-track-bridge dynamic interaction phenomena with 1/4 vehicle model, nonlinear Hertzian contact spring and nonlinear contact damper are introduced. In this approach external loads acting on 1/4 vehicle model are self weight of vehicle and geometry information of running surface. The constraint equation on contact surface is implemented by Penalty method. Also, to improve the numerical stability and to maintain accuracy of solution, the artificial damper and the reaction from constraint violation are introduced. A nonlinear time integration method, in this study, Newmark method is adopted for both equations of vehicles and structure. And to reduce the error caused by inadequate time step size, adaptive time-stepping technique is partially introduced. As the nonlinear Hertzian contact spring has no resistance to tensile force, the bouncing phenomena of wheelset can be described. Thus, it is expected that more versatile dynamic interaction phenomena can be described by this approach and it can be applied to various railway dynamic problems.

  • PDF

Dynamic Collaborative Cloud Service Platform: Opportunities and Challenges

  • Yoon, Chang-Woo;Hassan, Mohammad Mehedi;Lee, Hyun-Woo;Ryu, Won;Huh, Eui-Nam
    • ETRI Journal
    • /
    • v.32 no.4
    • /
    • pp.634-637
    • /
    • 2010
  • This letter presents a model for a dynamic collaboration (DC) platform among cloud providers (CPs) that prevents adverse business impacts, cloud vendor lock-in and violation of service level agreements with consumers, and also offers collaborative cloud services to consumers. We consider two major challenges. The first challenge is to find an appropriate market model in order to enable the DC platform. The second is to select suitable collaborative partners to provide services. We propose a novel combinatorial auction-based cloud market model that enables a DC platform among CPs. We also propose a new promising multi-objective optimization model to quantitatively evaluate the partners. Simulation experiments were conducted to verify both of the proposed models.

On China's Intellectual Property Rights Protection Online

  • Wang, Guo-An;Lim, Yong-Taek
    • International Commerce and Information Review
    • /
    • v.6 no.1
    • /
    • pp.237-247
    • /
    • 2004
  • Online people conduct all kinds of business activities, such as promoting the sales of products and services, reading newspapers, watching TV and movies, and sending business messages by e-mail, by e-voice and by e-fax. Computers with access to the Internet are defined by the United Nations as the fourth media characterized by instantaneousness, openness, limitlessness, boundlessness and globalization. With the development and popularization of the Internet and the advance of the information technology in China, Intellectual Property Rights (IPRs) violations online have frequently occurred in e-business activities. IPRs protection online has posed a great challenge not only for business managers and officials, but also for judges and lawyers because the rapid development of the Internet has created a legal vacuum governed by no laws in IPRs violation and protection online in China.. The paper at first classifies IPRs into several categories, then reveals China's serious problems and challenges of IPRs violations online and stresses the necessity of China's IPRs protection online. Finally it puts forward some suggestions concerning IPRs protection online.

  • PDF

A Case Study of an Activity Based Mathematical Education: A Kernel Density Estimation to Solve a Dilemma for a Missile Simulation

  • Kim, G. Daniel
    • Communications of Mathematical Education
    • /
    • v.16
    • /
    • pp.139-147
    • /
    • 2003
  • While the statistical concept 'order statistics' has a great number of applications in our society ranging from industry to military analysis, it is not necessarily an easy concept to understand for many people. Adding some interesting simulation activities of this concept to the probability or statistics curriculum, however, can enhance the learning curve greatly. A hands-on and a graphic calculator based activities of a missile simulation were introduced by Kim(2003) in the context of order statistics. This article revisits the two activities in his paper and point out a dilemma that occurs from the violation of an assumption on two deviation parameters associated with the missile simulation. A third activity is introduced to resolve the dilemma in the terms of a kernel density estimation which is a nonparametric approach.

  • PDF