• Title/Summary/Keyword: key for identification

Search Result 936, Processing Time 0.03 seconds

Approach of safe RFID system based on Pre-Distribution on Ubiquitous computing environment (유비쿼터스 환경에서 Pre-Distribution을 기반으로 한 안전한 RFID 시스템)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.6
    • /
    • pp.29-36
    • /
    • 2005
  • RFID(Radio Frequency Identification) will be used for recognizing things and offering distinctive information in Ubiquitous environment. But we are not ready to provide security service to RFID. Therefore we propose the approach of safe RFID system which provides the solution for eavesdrop, forgery, and modification based on Pre-Distribution protocol and RC5 security algorithm. First We distributes the secret key to the Tag with the Reader that is major subject on RFID system using Pre-Distribution protocol. Then we will provide to various security services and privacy protection using RC5 security algorithm. The proposed safe RFID system simulated on ATmega128 evaluate environment.

Verifiable self-certified schemes based on ${\gamma}$th -residuosity problem (고차잉여류 문제에 기반한 검증 가능한 자체인증방식)

  • 이보영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.61-70
    • /
    • 1999
  • In this paper we propose the verifiable self-certified schemes(key distribution scheme identification scheme digital signature scheme) based on ${\gamma}$th -residuosity which make up for defects of Girault's self-certified schemes allow the authenticity of public keys to be verified during the use of the keys. The security of our schemes is based on the difficulty of ${\gamma}$th -residuosity problem and discrete logarithm problem simultaneously.

A Study on the Relationship between Cabin Crew's Perceived Organizational Support and Their Work Commitment: Focusing on Low Cost Carrier in Korea (항공사 객실승무원의 조직지원인식과 직무몰입의 관계성 연구: 국내 저비용항공사를 중심으로 )

  • Ji-Eun Kim;Ki-Woong Kim;Sang-Yong Park
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.32 no.1
    • /
    • pp.28-38
    • /
    • 2024
  • Due to globalization, the air transport industry plays a key role in the global economy. In particular, the air transport industry is highly dependent on human resources, and the capabilities of the cabin crews in managing safety and providing service in a cabin depend on the service quality and the success of the company's human resource management. Therefore, systematic support and interest in competitive key personnel are believed as very important factors. Airlines need to improve the work engagement of airline cabin crew through organizational supportive efforts. Thus this paper surveyed 309 cabin crews who worked at low cost carrier and conducted an empirical analysis based on survey results. The study validates hypotheses pertaining the relationship between organizational identification and job commitment of cabin crew according to the airline's perception of organizational support. The comprehensive analysis reveals that perceived organization support has a significantly positive impact on cabin crews' work engagement.

Usability Evaluation of the Size of Small Touch Keys for the Smart Phone (스마트 폰 터치스크린에서의 작은 터치 키의 사용성 연구)

  • Kim, Bo-Ram;Kim, Tae-Il;Lim, Young-Jae;Jung, Eui-S.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.38 no.2
    • /
    • pp.80-88
    • /
    • 2012
  • This paper focuses on small touch key size and spacing that affect the usability of the smart phones. The experiments examined thirty-six different touch key designs, combinations of four touch key sizes (width (mm) ${\times}$height (mm); $4{\times}4$, $4{\times}7$, $7{\times}4$, and $7{\times}7$), and nine spacings (horizontal (mm)${\times}$vertical (mm); $0{\times}0$, $0{\times}1$, $0{\times}3$, $1{\times}0$, $1{\times}1$, $1{\times}3$, $3{\times}0$, $3{\times}1$, and $3{\times}3$). Forty participants volunteered in the experiment. The completion time, error rate, identification discomfort, and control discomfort were measured. The results revealed that the touch key sizes of $7{\times}7$ and $7{\times}4$ provide the best performance in terms of the error rate measure, while the touch key size of $7{\times}7$ provides the best results for other measures. In addition, touch key spacings of $1{\times}1$, $1{\times}3$ and $3{\times}1$ are regarded as the best for all the measures. The results of this study suggest a practical approach for the small touch key design for the smart phones.

Identification and Molecular Analysis of Ixodid Ticks (Acari: Ixodidae) Infesting Domestic Animals and Tick-Borne Pathogens at the Tarim Basin of Southern Xinjiang, China

  • Zhao, Li;Lv, Jizhou;Li, Fei;Li, Kairui;He, Bo;Zhang, Luyao;Han, Xueqing;Wang, Huiyu;Johnson, Nicholas;Lin, Xiangmei;Wu, Shaoqiang;Liu, Yonghong
    • Parasites, Hosts and Diseases
    • /
    • v.58 no.1
    • /
    • pp.37-46
    • /
    • 2020
  • Livestock husbandry is vital to economy of the Tarim Basin, Xinjiang Autonomous Region, China. However, there have been few surveys of the distribution of ixodid ticks (Acari: Ixodidae) and tick-borne pathogens affecting domestic animals at these locations. In this study, 3,916 adult ixodid ticks infesting domestic animals were collected from 23 sampling sites during 2012-2016. Ticks were identified to species based on morphology, and the identification was confirmed based on mitochondrial 16S and 12S rRNA sequences. Ten tick species belonging to 4 genera were identified, including Rhipicephalus turanicus, Hyalomma anatolicum, Rh. bursa, H. asiaticum asiaticum, and Rh. sanguineus. DNA sequences of Rickettsia spp. (spotted fever group) and Anaplasma spp. were detected in these ticks. Phylogenetic analyses revealed possible existence of undescribed Babesia spp. and Borrelia spp. This study illustrates potential threat to domestic animals and humans from tick-borne pathogens.

Wavelet-based automatic identification method of axle distribution information

  • Wang, Ning-Bo;Ren, Wei-Xin;Chen, Zhi-Wei
    • Structural Engineering and Mechanics
    • /
    • v.63 no.6
    • /
    • pp.761-769
    • /
    • 2017
  • Accurately extracting the axle distribution information of a passing vehicle from bridge dynamic responses experiences a key and challenging step in non-pavement bridge weigh-in-motion (BWIM). In this article, the wavelet transformation is adopted and the wavelet coefficient curve is used as a substitute for dynamic response. The driving frequency is introduced and expanded to multi-axle vehicle, and the wavelet coefficient curve on specific scale corresponding to the driving frequency is confirmed to contain obvious axle information. On this basis, an automatic method for axle distribution information identification is proposed. The specific wavelet scale can be obtained through iterative computing, and the false peaks due to bridge vibration can be eliminated through cross-correlation analysis of the wavelet coefficients of two measure points. The integrand function that corresponds to the maximum value of the cross-correlation function is used to identify the peaks caused by axles. A numerical application of the proposed axle information identification method is carried out. Numerical results demonstrate that this method acquires precise axle information from the responses of an axle-insensitive structure (e.g., girder) and decreases the requirement of sensitivity structure of BWIM. Finally, an experimental study on a full-scale simply supported bridge is also conducted to verify the effectiveness of this method.

Design of Blockchain Application based on Fingerprint Recognition Module for FIDO User Authentification in Shoppingmall (지문인식 모듈 기반의 FIDO 사용자 인증기술을 이용한 쇼핑몰에서 블록체인 활용 설계)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, a USB module with fingerprint recognition was designed as a distributed node of blockchain on distributed ID (DID, distributed ID) for user identification. This biometric-linked fingerprint recognition device was verified for the real-time authentication process of authentication transaction with FIDO(Fast IDentity Online) server. Blockchain DID-based services were proposed like as a method of individual TV rating survey, and recommending service for customized shopping channels, and crypto-currency, too. This DID based remote service can be improved by recognizing of channel-changing information through personal identification. The proposed information of production purchase can be shared by blockchain. And customized service can be provided for the utilization of purchase history in shoppingmall using distributed ID. As a result, this blockchain node-device and Samsung S10 Key-srore with FIDO service can be certified for additional transactions through various biometric authentication like fingerprint, and face recognition.

Investigation on the integrated transfer function characteristics for the buffeting response prediction of elongated structures

  • Yi Su;Mingshui Li;Jin Di;Yang Yang;Shaopeng Li
    • Wind and Structures
    • /
    • v.37 no.6
    • /
    • pp.399-412
    • /
    • 2023
  • Previous studies have shown that the integrated transfer function (ITF) is independent of turbulence characteristics and can be effectively applied to predict the buffeting response of elongated structures, assuming that the strip hypothesis is valid. However, existing research has not effectively identified the ITF through segment model vibration tests, and the influence of the 3D effect on the accuracy of the strip hypothesis and the characteristics of the ITF in wind tunnel tests has not been quantitatively studied. A segment model vibration measurement device that can change a test model's span-width ratio was designed in this study. An airfoil section and a streamlined box girder section structure were taken as the background, and their ITFs were effectively identified under different L/B (L denotes the turbulent integral scale and B denotes the structural width) and model span-width ratios. The influence laws of the 3D effect on the accuracy of the strip hypothesis and ITF identification in wind tunnel tests were systematically investigated. The results showed that L/B and the structural span-width ratio are two significant controlling factors that affect the accuracy of the strip hypothesis and ITF identification. The research provides an effective experimental method for accurately predicting the buffeting response of elongated structures based on ITFs identified through segment model vibration tests.

Partial Least Squares Based Gene Expression Analysis in EBV-Positive and EBV-Negative Posttransplant Lymphoproliferative Disorders

  • Wu, Sa;Zhang, Xin;Li, Zhi-Ming;Shi, Yan-Xia;Huang, Jia-Jia;Xia, Yi;Yang, Hang;Jiang, Wen-Qi
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.11
    • /
    • pp.6347-6350
    • /
    • 2013
  • Post-transplant lymphoproliferative disorder (PTLD) is a common complication of therapeutic immunosuppression after organ transplantation. Gene expression profile facilitates the identification of biological difference between Epstein-Barr virus (EBV) positive and negative PTLDs. Previous studies mainly implemented variance/regression analysis without considering unaccounted array specific factors. The aim of this study is to investigate the gene expression difference between EBV positive and negative PTLDs through partial least squares (PLS) based analysis. With a microarray data set from the Gene Expression Omnibus database, we performed PLS based analysis. We acquired 1188 differentially expressed genes. Pathway and Gene Ontology enrichment analysis identified significantly over-representation of dysregulated genes in immune response and cancer related biological processes. Network analysis identified three hub genes with degrees higher than 15, including CREBBP, ATXN1, and PML. Proteins encoded by CREBBP and PML have been reported to be interact with EBV before. Our findings shed light on expression distinction of EBV positive and negative PTLDs with the hope to offer theoretical support for future therapeutic study.

Management Method to Secure Private Key of PKI using One Time Password (OTP를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.12
    • /
    • pp.565-573
    • /
    • 2014
  • We have various e-commerce like on-line banking, stock trading, shopping using a PC or SmartPhone. In e-commerce, two parties use the certificate for identification and non-repudiation but, the attack on the certificate user steadily has been increasing since 2005. The most of hacking is stealing the public certificate and private key files. After hacking, the stolen public certificate and private key file is used on e-commerce to fraud. Generally, the private key file is encrypted and saved only with the user's password, and an encrypted private key file can be used after decrypted with user password. If a password is exposed to hackers, hacker decrypt the encrypted private key file, and uses it. For this reason, the hacker attacks user equipment in a various way like installing Trojan's horse to take over the user's certificate and private key file. In this paper, I propose the management method to secure private key of PKI using One Time Password certification technique. As a result, even if the encrypted private key file is exposed outside, the user's private key is kept safely.