• Title/Summary/Keyword: hierarchical key

Search Result 304, Processing Time 0.027 seconds

A Study on the Identification of Key Role Players in Enhancing Port Competitiveness - Focused on Busan Port -

  • Kim, Gil-Soo
    • Journal of Navigation and Port Research
    • /
    • v.31 no.9
    • /
    • pp.801-806
    • /
    • 2007
  • The analytical hierarchy process (AHP) enables decision makers to represent the interaction of multiple factors in complex and unstructured situations. The process requires the decision maker to develop a hierarchical structure of the factors in the given problem and to provide judgments about the relative importance of each of these factors and ultimately to specify a preference for each decision alternative with respect to each factor. The research presented in this paper applies the AHP to identify key players in promoting port competitiveness. The literature survey revealed four major criteria and 15 sub-criteria. The four factors are cost, service quality, facility/capacity and economic-social variable. 150 questionnaires suitable for AHP analysis were made and 77 were returned. It is found that in terms of cost, the first key player is terminal operator and the second key player is shipping companies calling Busan port; in terms of service quality, the first key player is terminal operator, and the second key player is shipping companies calling Busan port; in terms of facility/capacity, the first key player is port authority and the second key player is terminal operator; in terms of economic-social variable, the first key player is terminal operator, and the second key player is shipping companies calling Busan port.

Public key broadcast encryption scheme using new converting method

  • Jho, Nam-Su;Yoo, Eun-Sun;Rhee, Man-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6B
    • /
    • pp.199-206
    • /
    • 2008
  • Broadcast encryption is a cryptographical primitive which is designed for a content provider to distribute contents to only privileged qualifying users through an insecure channel. Anyone who knows public keys can distribute contents by means of public key broadcast encryption whose technique can also be applicable to many other applications. In order to design public key broadcast encryption scheme, it should devise some methods that convert a broadcast encryption scheme based on symmetric key cryptosystem to a public key broadcast encryption. Up to this point, broadcast encryption scheme on trial for converting from symmetric key setting to asymmetric public key setting has been attempted by employing the Hierarchical Identity Based Encryption (HIBE) technique. However, this converting method is not optimal because some of the properties of HIBE are not quite fitting for public key broadcast schemes. In this paper, we proposed new converting method and an efficient public key broadcast encryption scheme Pub-PI which is obtained by adapting the new converting method to the PI scheme [10]. The transmission overhead of the Pub-PI is approximately 3r, where r is the number of revoked users. The storage size of Pub-PI is O($c^2$), where c is a system parameter of PI and the computation cost is 2 pairing computations.

An Exploratory Research on Hierachical Causality of Personal Value, Benefits Sought and Clothing Product Attributes (의류 구매자의 가치관-추구혜택-제품 속성간의 게층적 인과관계에 관한 탐색적 연구)

  • 안소현;서용한;서문식
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.24 no.5
    • /
    • pp.652-662
    • /
    • 2000
  • Most of established study about consumer behavior was directly connected abstract value with concrete purchase behavior, nevertheless several recognizable process is intervened between abstract concept and concept behavior. Of course researchers suggest hierarchical causality through means-end chain model. However empirical study is insufficient. And it's not certain whether the consumer's personal value affects actual evaluation about product attributes. Thus the purpose of this paper was to explore hierarchical causality of personal value, benefits sought and clothing product attributes and to suggest an alternative approach method. For the empircial study the data sets were collected through 150 female consumers living in Pusan and SAS and LISREL VIII were used for statistical analysis. As the result, hierarchical causality suggested by means-end chain model was positively substantiated. That is, benefits sought is differentiated according to personal value, and actual product attributes are indirectly influenced by personal value through benefits sought. Benefits sought are found to be key mediating variables.

  • PDF

Non-conforming modes for improvement of finite element performance

  • Choi, Chang-Koon;Lee, Tae-Yeol
    • Structural Engineering and Mechanics
    • /
    • v.14 no.5
    • /
    • pp.595-610
    • /
    • 2002
  • This paper presents an efficiency of various non-conforming (NC) modes in development of a series of new finite elements with the special emphasis on 4-node quadrilateral elements. The NC modes have been used as a key scheme to improve the behaviors of various types of new finite elements, i.e., Mindlin plate bending elements, membrane elements with drilling degrees of freedom, flat shell elements. The NC modes are classified into three groups according to the 'correction constants' of 'Direct Modification Method'. The first group is 'basic NC modes', which have been widely used by a number of researchers in the finite element communities. The basic NC modes are effective to improve the behaviors of regular shaped elements. The second group is 'hierarchical NC modes' which improve the behaviors of distorted elements effectively. The last group is 'higher order NC modes' which improve the behaviors of plate-bending elements. When the basic NC modes are combined with hierarchical or higher order NC modes, the elements become insensitive to mesh distortions. When the membrane component of a flat shell has 'hierarchical NC modes', the membrane locking can be suppressed. A number of numerical tests are carried out to show the positive effect of aforementioned various NC modes incorporated into various types of finite elements.

Authentication Mechanism for Secure Binding Update and Fast Handover in the Generalized Hierarchical MIPv6 (일반화된 계층적 MIPv6 환경에서의 안전한 바인딩 업데이트 및 Fast Handover를 위한 인증 메커니즘)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.107-115
    • /
    • 2008
  • In this paper, a secure and efficient binding update protocol as well as a handover protocol are proposed in the generalized hierarchical MIPv6 environment. Contrary to the conventional hierarchical MIPv6 environment where a foreign network is a small-scaled MAP domain, a large-scaled MAP domain consisting of several MAPs which are connected hierarchically is considered in the proposed protocol for the mechanism to support fast and secure mobility. It is also analyzed the security of the proposed protocol under the various attack scenarios.

Unsupervised Motion Pattern Mining for Crowded Scenes Analysis

  • Wang, Chongjing;Zhao, Xu;Zou, Yi;Liu, Yuncai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3315-3337
    • /
    • 2012
  • Crowded scenes analysis is a challenging topic in computer vision field. How to detect diverse motion patterns in crowded scenarios from videos is the critical yet hard part of this problem. In this paper, we propose a novel approach to mining motion patterns by utilizing motion information during both long-term period and short interval simultaneously. To capture long-term motions effectively, we introduce Motion History Image (MHI) representation to access to the global perspective about the crowd motion. The combination of MHI and optical flow, which is used to get instant motion information, gives rise to discriminative spatial-temporal motion features. Benefitting from the robustness and efficiency of the novel motion representation, the following motion pattern mining is implemented in a completely unsupervised way. The motion vectors are clustered hierarchically through automatic hierarchical clustering algorithm building on the basis of graphic model. This method overcomes the instability of optical flow in dealing with time continuity in crowded scenes. The results of clustering reveal the situations of motion pattern distribution in current crowded videos. To validate the performance of the proposed approach, we conduct experimental evaluations on some challenging videos including vehicles and pedestrians. The reliable detection results demonstrate the effectiveness of our approach.

A Handover Authentication Scheme initiated by Mobile Node for Heterogeneous FMIPv6 Mobile Networks (이기종 FMIPv6 기반의 이동 망에서 이동 노드 주도형 핸드오버 인증 기법)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.103-114
    • /
    • 2007
  • The existing handover authentication schemes have authentication delay and overhead of the authentication server since they have been separately studied handover authentication at the link layer and the network layer. This paper proposes a handover authentication scheme initiated by Mobile Node on FMIPv6 based mobile access networks. The main idea of the paper is to generate a session key at the mobile node side, and transfer it to the next Access Router through the authentication server. Also, the scheme has a hierarchical key management at access router. There are two advantages of the scheme. First, the generated session key can be utilized for protecting the binding update messages and also for access authentication. Second, hierarchical key management at the access router reduced the handover delay time. The security aspects on the against PFS, PBS, and DoS attack of proposed scheme are discussed.

Practical Attacks on Hybrid Group Key Management for SOHAN

  • Liew, Jiun-Hau;Ong, Ivy;Lee, Sang-Gon;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.5
    • /
    • pp.549-553
    • /
    • 2010
  • Lim et al. proposed a Hybrid Group Key Management scheme for Hierarchical Self-Organizing Sensor Network in 2008 to provide a secure way to pass down the group key for cluster-based communication. This paper presents two practical attacks on the scheme proposed by Lim et al. by tampering sensor nodes of a cluster to recover necessary secret keys and by exploiting the IDS employed by the scheme. The first attack enables a long-term but slow data fabrication while other attack causes more severe DoS on the access to cluster sensor nodes.

A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET (MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

Key Success Factors of Blockchain Platform for Micro-enterprises

  • YANG, Mei-Hsiang;LEE, Tzong-Ru;CHANG, Tin-Chang
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.6 no.3
    • /
    • pp.283-293
    • /
    • 2019
  • The purposes of the study are threefold: (1) develop key successful factors of blockchain platform for micro-enterprises based on Balanced Scorecard (BSC), (2) find out the correlation between the key successful factors of blockchain platform for micro-enterprises, and (3) understand the perception of micro-enterprise blockchain and the difference between theoretical guidance and practical application. This study combines Interpretative Structural Modeling Method, (ISM) and Decision-Making Trial and Evaluation Laboratory (DEMATEL) to analyze the causal relationships and hierarchical structures of the 12 key successful factors of blockchain platform for micro-enterprises and understand the correlation between factors. The 12 key successful factors developed based on the four perspectives of the Balanced Scorecard, and the questionnaire designs based on the concept of DEMATEL, and then analyzed data by DEMATEL and ISM methods to understand the correlation between key factors. The research results show that the key successful factors of blockchain platform for micro-enterprises include "brand equity", "security and anti-counterfeiting", "sales growth", "transparency and clear", "trust", "consensus mechanism", "traceability", "consistency", "tracking", "innovation management", "international", "organizational adaptation", in which consumer "trust" plays an important role. Micro-enterprises can use blockchain to expand the market, provide customers with better service quality, and bring sales growth to micro-enterprises.