• Title/Summary/Keyword: identity verification

Search Result 137, Processing Time 0.03 seconds

A Case Study on the classroom life and the identity of the Elementary Mathematics Gifted Education (초등수학 영재교육원의 교실 생활과 정체성에 대한 사례연구)

  • Lee, Hak-Ro;Ryu, Sung-Rim
    • Communications of Mathematical Education
    • /
    • v.25 no.1
    • /
    • pp.99-118
    • /
    • 2011
  • For this case study of gifted education, two classrooms in two locations, show life in general of the gifted educational system. And for this case study the identity of teachers and the gifted, help to activate the mathematically gifted education for these research questions, which are as followed: Firstly, how is the gifted education classroom life? Secondly, what kind of identity do the teachers and gifted students bring to mathematics, mathematics teaching and mathematics learning? Being selected in the gifted children's education center solves the research problem of characteristic and approach. Backed by the condition and the permission possibility, 2 selected classes and 2 people, which are coming and going. Gifted education classroom life, the identity of teachers and gifted students in mathematics and mathematics teaching and mathematic learning. It will be for 3 months, with various recordings and vocal instruction between teacher and students. Collected observations and interviews will be analyzed over the course of instruction. The results analyzed include, social participation, structure, and the formation of the gifted education classroom life. The organization of classes were analyzed by the classes conscious levels to collect and retain data. The classes verification levels depended on the program's first class incentive, teaching and learning levels and understanding of gifted math. A performance assessment will be applied after the final lesson and a consultation with parents and students after the final class. The six kinds of social participation structure come out of the type of the most important roles in gifted education accounts, for these types of group discussions and interactions, students must have an interaction or individual activity that students can use, such as a work product through the real materials, which release teachers and other students for that type of questions to evaluate. In order for the development of meaningful mathematical concepts to formulate, mathematical principles require problem solving among all students, which will appear in the resolution or it will be impossible to map the meaning of the instruction from which it was formed. These results show the analysis of the mathematics, mathematics teaching, mathematics learning and about the identity of the teachers and gifted. Gifted education teachers are defined by gifted math, which is more difficult and requires more differentiated learning, suitable for gifted students. Gifted was defined when higher level math was created and challenged students to deeper thinking. Gifted students think that gifted math is creative learning and they are forward or passive to one-way according to the education atmosphere.

A Method of Reusing Kinematic Information for Virtual Facilities (동작 정보를 갖는 가상설비 데이터 재활용 방법론)

  • Ko, Min-Suk;Shin, Hye-Seon;Wang, Gi-Nam;Park, Sang-Chul
    • Korean Journal of Computational Design and Engineering
    • /
    • v.16 no.4
    • /
    • pp.305-313
    • /
    • 2011
  • This paper proposes a method for reusing kinematic design data for virtual facilities, Making a virtual model of a facility involves two major activities: geometric design (virtual model visualization) and kinematic design that should be remodeled frequently whenever design changes occur, Conventionally, a virtual model of an automated facility focuses on the design level, which mainly deals with design verification, alternative comparison, and geometric model diagnosis, Although a design level model can be designed with the information of past models from PLM system, a simulation level model is not sufficient utilized to be reused for kinematic design purpose, We propose a method for reusing kinematic information of a past simulation model to cope with this problem, We use the concept or the 'center of mass', which is a point representing the mean position of the matter in a body or system. And we also use comparison method of a boundary box to identity which 3D objects have to be involved from the design model to a link structure that is contained in the simulation model. Because a proposed method only use not a historical approach but a geometrical approach, it is more effective to apply to the field.

IBC-Based Entity Authentication Protocols for Federated Cloud Systems

  • Cao, Chenlei;Zhang, Ru;Zhang, Mengyi;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1291-1312
    • /
    • 2013
  • Cloud computing changes the service models of information systems and accelerates the pace of technological innovation of consumer electronics. However, it also brings new security issues. As one of the important foundations of various cloud security solutions, entity authentication is attracting increasing interest of many researchers. This article proposes a layered security architecture to provide a trust transmission mechanism among cloud systems maintained by different organizations. Based on the security architecture, four protocols are proposed to implement mutual authentication, data sharing and secure data transmission in federated cloud systems. The protocols not only can ensure the confidentiality of the data transferred, but also resist man-in-the-middle attacks and masquerading attacks. Additionally, the security properties of the four protocols have been proved by S-pi calculus formal verification. Finally, the performance of the protocols is investigated in a lab environment and the feasibility of the security architecture has been verified under a hybrid cloud system.

A Study on the Recognition of Face Based on CNN Algorithms (CNN 알고리즘을 기반한 얼굴인식에 관한 연구)

  • Son, Da-Yeon;Lee, Kwang-Keun
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • Recently, technologies are being developed to recognize and authenticate users using bioinformatics to solve information security issues. Biometric information includes face, fingerprint, iris, voice, and vein. Among them, face recognition technology occupies a large part. Face recognition technology is applied in various fields. For example, it can be used for identity verification, such as a personal identification card, passport, credit card, security system, and personnel data. In addition, it can be used for security, including crime suspect search, unsafe zone monitoring, vehicle tracking crime.In this thesis, we conducted a study to recognize faces by detecting the areas of the face through a computer webcam. The purpose of this study was to contribute to the improvement in the accuracy of Recognition of Face Based on CNN Algorithms. For this purpose, We used data files provided by github to build a face recognition model. We also created data using CNN algorithms, which are widely used for image recognition. Various photos were learned by CNN algorithm. The study found that the accuracy of face recognition based on CNN algorithms was 77%. Based on the results of the study, We carried out recognition of the face according to the distance. Research findings may be useful if face recognition is required in a variety of situations. Research based on this study is also expected to improve the accuracy of face recognition.

Integration of Timestamp Service into Digital Signatures (전자 서명과 시점 확인 서비스의 결합)

  • Chang, Hai-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.2
    • /
    • pp.377-387
    • /
    • 2009
  • Digital signatures not only provide a way of guaranteeing the integrity of data but also establish the identity of the signer. However, basic digital signature format which contains only the signature of the signer does not guarantee the correctness of its creation time, and it can not remain valid over long periods. This paper proposes a system which integrates timestamp service into digital signatures. The system provides online services for the creation and verification of long term digital signatures which can give the guarantee of the correctness of their creation times and can be proved to be valid over long periods. The proposed system can be used in the various areas such as e-commerce contracts, document archival services, and invoice applications, which requires long term digital signatures. The proposed system is tested with the KRISS timestamp service system.

Access Control of Pay TV Program in Digital Satellite Broadcasting System (디지털 위성방송 시스템에서 유료 TV방송 프로그램 접근제어)

  • Park, Jeong-Hyun;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.12
    • /
    • pp.3123-3132
    • /
    • 1997
  • In this paper, we describe access control system for protection of pay TV program in digital DBS(Direct Broadcast satellite) system. We also propose a possible access control system and operation scenario for scrambling and descrambling which are important in access control system. Transport stream structure and option, entitlement checking message and entitlement management message for access control on digital broadcasting system are described in this paper. Especially, the authentication based on Flat-Shamir and Gulllou-Quisquater schemes required for verification of proper subscriber as access control is oriented to smart card number and subscriber ID(Identity). It has less restriction than scheme oriented to descrambler number.

  • PDF

A General Plan for the Preservation and Practical Use of Junkyung and Youngkyung Tombs at Samcheok (삼척 준경묘와 영경묘의 보존 및 활용을 위한 기본계획)

  • Choi, Jang-Soon
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.15 no.1
    • /
    • pp.97-105
    • /
    • 2013
  • This research aims to make the general plan for the preservation and practical use about Junkyung and Youngkyung tombs at Samcheok. The general plan is classified according to three large territories. First, it is necessary for these two tombs to preserve territories and strengthen the historical identity in order to restore the spoiled building such as Subokbang and Surabang by verification and excavation. Second, to preserve the nature and environment of territories surrounding the two tombs is essential for the extension of the essence about these cultural heritage to improve the familiarity and effective utilization by trial programs, which are related to the historical background of the tombs and so forth. Third, supporting and making convenient facilities in the neighborhood near cultural assets is required to install public parks and parking lots for visitors. Additionally, it is needed to advertise successively about these two tombs as the beginning of Chosun Dynasty tombs Also, it is necessary to consider implementing programs because Junkyung and Youngkyung tombs along with Chosun royal tombs in the north of Korea might be designated as World Culture Heritage if Korea should be a unified nation.

Characterization and Expression Profile of CMTM3/CKLFSF3

  • Zhong, Ji;Wang, Yu;Qiu, Xiaoyan;Mo, Xiaoning;Liu, Yanan;Li, Ting;Song, Quansheng;Ma, Dalong;Han, Wenling
    • BMB Reports
    • /
    • v.39 no.5
    • /
    • pp.537-545
    • /
    • 2006
  • CMTM/CKLFSF is a novel family of proteins linking chemokines and TM4SF. In humans, these proteins are encoded by nine genes, CKLF and CMTM1-8/CKLFSF1-8. Here we report the characteristics and expression profile of CMTM3/CKLFSF3. Human CMTM3/CKLFSF3 has a high sequence identity among various species and similar characteristics as its mouse and rat homologues. Established by results both of RT-PCR and Quantitative Real-time PCR, the gene is highly transcribed in testis, leukocytes and spleen. For further verification, we generated a polyclonal antibody against human CMTM3/CKLFSF3 and found that the protein is highly expressed in the testis and some cells of PBMCs. Therefore, CMTM3/CKLFSF3 is an evolutionarily conserved gene that may have important roles in the male reproductive system and immune system. Further studies are necessary to validate its functions in the two systems.

Implementation of Offline Payment Solution using USIM in IMT-2000 (IMT-2000 단말기용 USIM상에서의 오프라인 지불 솔루션 탑재에 관한 연구)

  • 백장미;하남수;홍인식
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.5
    • /
    • pp.849-860
    • /
    • 2003
  • As mobile device is becoming more popular, E-Commerce changes into M-Commerce. Especially, IMT-2000 (International Mobile Telecommunication 2000) service is prepared for M-Commerce and this has USIM (Universal Subscriber Identity Module) as a core of certification of individuality and transactions. As a result, the area of mobile service going to expand by USIM. But, mobile services using USIM leave much to be desired, and developed application don't variety. In this paper, for the efficient design of USIM, the structure of USIM and protocol is analyzed, and secure payment solution in USIM is proposed. Specially, offline payment system is proposed for the verification of proposed protocols including security, saving, and calculation of balance. finally, the simulation of proposed payment system on USIM is performed using Java Card.

  • PDF

Design of Certificate Status Checking Mechanism Using Verification Requester Identity Information (검증 요청자 신원 정보를 이용한 인증서 상태 확인 메커니즘의 설계)

  • Kim, Hyun-Chul;Lee, Jun-Hwan;Han, Myung-Mook;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1257-1260
    • /
    • 2005
  • 인증서 상태 확인은 해당 거래에 사용되는 인증서에 대해 유효한 인증서임을 판별하기 위한 과정으로 인증서 표준이 제정된 이후로 계속적으로 연구되고 있는 분야이다. 현재 가장 보편적으로 이용되는 인증서 상태 확인 기법은 인증서폐지목록(CRL : Certificate Revocation List)을 이용하는 기법이다. 이 기법은 방법 자체가 가지고 있는 시간격차 문제와 물리적 파일 처리의 과부하로 인하여 사용에 많은 제약이 따른다. 이를 해결하기 위해 온라인 인증서 상태 프로토콜(OCSP : OnLine Certificate Status Protocol) 기법이 제시되었다. 이 기법은 CRL 기법의 비 실시간성 문제를 해결한다. 하지만 서비스 요청 서버의 과부하 문제와 구조적 집중화 문제로 인하여 인증서 상태를 확인 하는데 소요되는 시간이 다소 오래 걸린다는 문제가 있다. 본 논문에서는 검증 요청자의 신원정보에 대한 해쉬값을 이용하여 인증서 상태 확인 요청을 하고 이를 통해 인증서 상태 확인 과정을 진행함으로써 통신 부하를 감소시키고 실시간으로 인증서 상태를 확인 할 수 있는 검증 요청자 신원 정보를 이용한 인증서 상태 확인 메커니즘을 제안한다.

  • PDF