• Title/Summary/Keyword: behavior-based systems

Search Result 2,119, Processing Time 0.034 seconds

Impact of Privacy Concern and Institutional Trust on Privacy Decision Making: A Comparison of E-Commerce and Location-Based Service (프라이버시 염려와 제도적 신뢰가 프라이버시 의사결정에 미치는 영향: 전자상거래와 위치기반서비스의 비교)

  • Kim, Sanghee;Kim, Jongki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.1
    • /
    • pp.69-87
    • /
    • 2017
  • This Research Attempted to Clarify the Eeffect of Privacy Concern and Institutional Trust on Privacy Decision based on Privacy Calculus Perspective. We Developed a Research Model Suggesting that the Influence of Privacy Benefit and Privacy risk on the Information Disclosure Behavior and the Influence of Privacy Concern and Institutional Trust on the Privacy Calculus. In this Regard, in Order to Examine the Difference According to the Target whose Personal Information was Collected, an Empirical Analysis was Conducted to Compare the E-commerce Field and LBS(Location Based Service) Field. The Results of Empirical Analysis are as follows. First, it is Founded that other Relations were All Statistically Significant Except the Relation between Privacy Risk and Information Disclosure Behavior in the LBS group. Next, as a Results of Comparison of Constructs in the E-commerce and Institutional trust than the LBS group, Identifying that the Consumers are more Sensitive to the Personal Information Collected in the E-commerce site.

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.

ToyLotos/Ada : Object-Behavior Simulation System for Developing a Real-time Ada Software (ToyLotos/Ada : 실시간 Ada 소프트웨어 개발을 위한 객체행위 시뮬레이션 시스템)

  • Lee, Gwang-Yong;O, Yeong-Bae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.7
    • /
    • pp.1789-1804
    • /
    • 1999
  • This paper presents a simulation-based system for verification and validation(V&V) of design implication of the Visual Real-time Object Model which is produced by existing object's behavior design method. This system can simulate the dynamic interactions using the executable Ada simulation machine, and can detect various logical and temporal problems in the visual real-time object model prior to the real implementation of the application systems. Also, the system can generate the Ada prototype code from the validated specification. This system is implemented by Visual C++ version 4.2. For simulation, this system is using the Ada language because Ada's real-time expression capabilities such as concurrent processes, rendezvous, temporal behavior expression, and etc, are competent compared to other languages. This work contributes to a tightly coupling of methodology-based visual models and formal-based simulation systems, and also contributes to a realization of automated specification V&V.

  • PDF

Vector form intrinsic finite-element analysis of static and dynamic behavior of deep-sea flexible pipe

  • Wu, Han;Zeng, Xiaohui;Xiao, Jianyu;Yu, Yang;Dai, Xin;Yu, Jianxing
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.12 no.1
    • /
    • pp.376-386
    • /
    • 2020
  • The aim of this study was to develop a new efficient strategy that uses the Vector form Intrinsic Finite-element (VFIFE) method to conduct the static and dynamic analyses of marine pipes. Nonlinear problems, such as large displacement, small strain, and contact and collision, can be analyzed using a unified calculation process in the VFIFE method according to the fundamental theories of point value description, path element, and reverse motion. This method enables analysis without the need to integrate the stiffness matrix of the structure, because only motion equations of particles established according to Newton's second law are required. These characteristics of the VFIFE facilitate the modeling and computation efficiencies in analyzing the nonlinear dynamic problem of flexible pipe with large deflections. In this study, a three-dimensional (3-D) dynamical model based on 3-D beam element was established according to the VFIFE method. The deep-sea flexible pipe was described by a set of spatial mass particles linked by 3-D beam element. The motion and configuration of the pipe are determined by these spatial particles. Based on this model, a simulation procedure to predict the 3-D dynamical behavior of flexible pipe was developed and verified. It was found that the spatial configuration and static internal force of the mining pipe can be obtained by calculating the stationary state of pipe motion. Using this simulation procedure, an analysis was conducted on the static and dynamic behaviors of the flexible mining pipe based on a 1000-m sea trial system. The results of the analysis proved that the VFIFE method can be efficiently applied to the static and dynamic analyses of marine pipes.

Study on seismic retrofit of structures using SPSW systems and LYP steel material

  • Zirakian, Tadeh;Zhang, Jian
    • Earthquakes and Structures
    • /
    • v.10 no.1
    • /
    • pp.1-23
    • /
    • 2016
  • Steel plate shear walls (SPSWs) have been shown to be efficient lateral force-resisting systems, which are increasingly used in new and retrofit construction. These structural systems are designed with either stiffened and stocky or unstiffened and slender web plates based on disparate structural and economical considerations. Based on some limited reported studies, on the other hand, employment of low yield point (LYP) steel infill plates with extremely low yield strength, and high ductility as well as elongation properties is found to facilitate the design and improve the structural behavior and seismic performance of the SPSW systems. On this basis, this paper reports system-level investigations on the seismic response assessment of multi-story SPSW frames under the action of earthquake ground motions. The effectiveness of the strip model in representing the behaviors of SPSWs with different buckling and yielding properties is primarily verified. Subsequently, the structural and seismic performances of several code-designed and retrofitted SPSW frames with conventional and LYP steel infill plates are investigated through detailed modal and nonlinear time-history analyses. Evaluation of various seismic response parameters including drift, acceleration, base shear and moment, column axial load, and web-plate ductility demands, demonstrates the capabilities of SPSW systems in improving the seismic performance of structures and reveals various advantages of use of LYP steel material in seismic design and retrofit of SPSW systems, in particular, application of LYP steel infill plates of double thickness in seismic retrofit of conventional steel and code-designed SPSW frames.

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.

Strain-based seismic failure evaluation of coupled dam-reservoir-foundation system

  • Hariri-Ardebili, M.A.;Mirzabozorg, H.;Ghasemi, A.
    • Coupled systems mechanics
    • /
    • v.2 no.1
    • /
    • pp.85-110
    • /
    • 2013
  • Generally, mass concrete structural behavior is governed by the strain components. However, relevant guidelines in dam engineering evaluate the structural behavior of concrete dams using stress-based criteria. In the present study, strain-based criteria are proposed for the first time in a professional manner and their applicability in seismic failure evaluation of an arch dam are investigated. Numerical model of the dam is provided using NSAD-DRI finite element code and the foundation is modeled to be massed using infinite elements at its far-end boundaries. The coupled dam-reservoir-foundation system is solved in Lagrangian-Eulerian domain using Newmark-${\beta}$ time integration method. Seismic performance of the dam is investigated using parameters such as the demand-capacity ratio, the cumulative inelastic duration and the extension of the overstressed/overstrained areas. Real crack profile of the dam based on the damage mechanics approach is compared with those obtained from stress-based and strain-based approaches. It is found that using stress-based criteria leads to conservative results for arch action while seismic safety evaluation using the proposed strain-based criteria leads to conservative cantilever action.

Hybrid FPMS: A New Fairness Protocol Management Scheme for Community Wireless Mesh Networks

  • Widanapathirana, Chathuranga H.;Sekercioglu, Y. Ahmet;Goi, Bok-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1909-1928
    • /
    • 2011
  • Node cooperation during packet forwarding operations is critically important for fair resource utilization in Community Wireless Mesh Networks (CoWMNs). In a CoWMN, node cooperation is achieved by using fairness protocols specifically designed to detect and isolate malicious nodes, discourage unfair behavior, and encourage node participation in forwarding packets. In general, these protocols can be split into two groups: Incentive-based ones, which are managed centrally, and use credit allocation schemes. In contrast, reputation-based protocols that are decentralized, and rely on information exchange among neighboring nodes. Centrally managed protocols inevitably suffer from scalability problems. The decentralized, reputation-based protocols lacks in detection capability, suffer from false detections and error propagation compared to the centralized, incentive-based protocols. In this study, we present a new fairness protocol management scheme, called Hybrid FPMS that captures the superior detection capability of incentive-based fairness protocols without the scalability problems inherently expected from a centralized management scheme as a network's size and density grows. Simulation results show that Hybrid FPMS is more efficient than the current centralized approach and significantly reduces the network delays and overhead.

The Influences on Self-Efficacy to Quality of Mobile Financial Information Systems (자기효능감이 모바일 금융 정보 시스템 품질에 미치는 영향)

  • Lee, Jang-Hyung;Kim, Jong-Won
    • The Journal of Information Systems
    • /
    • v.20 no.4
    • /
    • pp.103-117
    • /
    • 2011
  • The rapid pace of adoption of mobile handsets has created new mobile financial services. The success of mobile financial information systems will depend on consumer self-efficacy and a sound business model. Self-efficacy has been described as the belief that one is capable of performing in a certain manner to attain certain goals. This is directly related to consumer behavior, but it also affects consumer behaviors indirectly through its impact on goals. And self-efficacy influences the challenges that people take on as well as how high they set their goals. The objective of the study to investigates the effect of self-efficacy on mobile financial information systems. In order to do that, self-efficacy, mobile financial information systems reliability, mobile financial information systems use intensity are conceptualized by survey questionnaire. Our empirical analysis based on 462 survey data shows that self-efficacy effects on mobile financial information systems quality. In addition we also found that self-efficacy effects on mobile financial systems reliability and usage intention. And we found that mobile financial information systems reliability effects on mobile financial systems use intention. And we also found that mobile financial information systems usage intention effects mobile financial systems quality.

A Method for Generating a Plant Model Based on Log Data for Control Level Simulation (제어시뮬레이션을 위한 생산시스템 로그데이터 기반 플랜트 모델 생성 방법)

  • Ko, Minsuk;Cheon, Sang Uk;Park, Sang Chul
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.1
    • /
    • pp.21-27
    • /
    • 2013
  • Presented in the paper is a log data based modeling method for effective construction of a virtual plant model which can be used for the virtual PLC (Programmable Logic Controller) simulation. For the PLC simulation, the corresponding virtual plant, consisting of virtual devices, is required to interact with the input and output symbols of a PLC. In other words, the behavior of a virtual device should be the same as that of the real device. Conventionally, the DEVS (Discrete Event Systems Specifications) formalism has been used to represent the behavior a virtual device. The modeling using DEVS formalism, however, requires in-depth knowledge in the simulation area, as well as the significant amount of time and efforts. One of the key ideas of the proposed method is to generate a plant model based on the log data obtained from the production system. The proposed method is very intuitive, and it can be used to generate the full behavior model of a virtual device. The proposed approach was applied to an AGV (Automated Guided Vehicle).