• Title/Summary/Keyword: public-shared network

Search Result 63, Processing Time 0.043 seconds

Secure private key exchange method based on optical interferometry using biometric finger print (생체 지문을 이용한 광학 간섭계에 기반한 안전한 개인키 교환 기법)

  • Jeon, Seok-Hee;Gil, Sang-Keun
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.42-46
    • /
    • 2021
  • A novel key exchange cryptographic method utilizing biometric finger print as a user's private key is proposed. Each unknown users' finger print is encrypted by optical phase-shifting interferometry principle and is changed into two ciphers, which are exchanged with the other party over a public communication network for secret key sharing. The transmitted ciphers generate a complex hologram, which is used to calculate a shared secret key for each user. The proposed method provides high security when applied to a secret key sharing encryption system.

Version-Aware Cooperative Caching for Multi-Node Rendering

  • Cho, Kyungwoon;Bahn, Hyokyung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.30-35
    • /
    • 2022
  • Rendering is widely used for visual effects in animations and movies. Although rendering is computing-intensive, we observe that it accompanies heavy I/O because of large input data. This becomes technical hurdles for multi-node rendering performed on public cloud nodes. To reduce the overhead of data transmission in multi-node rendering, this paper analyzes the characteristics of rendering workloads, and presents the cooperative caching scheme for multi-node rendering. Our caching scheme has the function of synchronization between original data in local storage and cached data in rendering nodes, and the cached data are shared between multiple rendering nodes. We perform measurement experiments in real system environments and show that the proposed cooperative caching scheme improves the conventional caching scheme used in the network file system by 27% on average.

The System Developing Social Network Group by Using Life Logging Data (라이프로깅 데이터를 이용한 소셜 네트워크 그룹 생성 시스템)

  • Jo, Youngho;Woo, Jincheol;Lee, Hyunwoo;Cho, Ayoung;Whang, Mincheol
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.2
    • /
    • pp.13-19
    • /
    • 2017
  • Various life-logging based on cloud service have developed social network according to the advanced technology of smartphone and wearable device. Daily digital life on social networks has been shared information and emotion and developed new social relationships. Recent life-logging has required social relationships beyond extension of personal memory and anonymity for privacy protection. This study is to determine social network group by using life-logging data obtained in daily lives and to categorize emotion behavior with anonymity guarantee. Social network group was defined by grouping similar representative emotional behavior. The public's patterns and trends was able to be inferred by analyzing representative emotion and behavior of the social groups network.

A Study on Attack Detection Technique based on n-hop Node Certification in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 n-hop 노드 인증 기반 공격 탐지 기법에 관한 연구)

  • Yang, Hwan Seok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.3-8
    • /
    • 2014
  • Wireless Ad hoc Network is threatened from many types of attacks because of its open structure, dynamic topology and the absence of infrastructure. Attacks by malicious nodes inside the network destroy communication path and discard packet. The damage is quite large and detecting attacks are difficult. In this paper, we proposed attack detection technique using secure authentication infrastructure for efficient detection and prevention of internal attack nodes. Cluster structure is used in the proposed method so that each nodes act as a certificate authority and the public key is issued in cluster head through trust evaluation of nodes. Symmetric Key is shared for integrity of data between the nodes and the structure which adds authentication message to the RREQ packet is used. ns-2 simulator is used to evaluate performance of proposed method and excellent performance can be performed through the experiment.

Development of Demand Forecasting Model for Public Bicycles in Seoul Using GRU (GRU 기법을 활용한 서울시 공공자전거 수요예측 모델 개발)

  • Lee, Seung-Woon;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.1-25
    • /
    • 2022
  • After the first Covid-19 confirmed case occurred in Korea in January 2020, interest in personal transportation such as public bicycles not public transportation such as buses and subways, increased. The demand for 'Ddareungi', a public bicycle operated by the Seoul Metropolitan Government, has also increased. In this study, a demand prediction model of a GRU(Gated Recurrent Unit) was presented based on the rental history of public bicycles by time zone(2019~2021) in Seoul. The usefulness of the GRU method presented in this study was verified based on the rental history of Around Exit 1 of Yeouido, Yeongdengpo-gu, Seoul. In particular, it was compared and analyzed with multiple linear regression models and recurrent neural network models under the same conditions. In addition, when developing the model, in addition to weather factors, the Seoul living population was used as a variable and verified. MAE and RMSE were used as performance indicators for the model, and through this, the usefulness of the GRU model proposed in this study was presented. As a result of this study, the proposed GRU model showed higher prediction accuracy than the traditional multi-linear regression model and the LSTM model and Conv-LSTM model, which have recently been in the spotlight. Also the GRU model was faster than the LSTM model and the Conv-LSTM model. Through this study, it will be possible to help solve the problem of relocation in the future by predicting the demand for public bicycles in Seoul more quickly and accurately.

Mitochondrial cox1 and cob sequence diversities in Gelidium vagum (Gelidiales, Rhodophyta) in Korea

  • Yoon, Kyung Ju;Kim, Kyeong Mi;Boo, Ga Hun;Miller, Kathy Ann;Boo, Sung Min
    • ALGAE
    • /
    • v.29 no.1
    • /
    • pp.15-25
    • /
    • 2014
  • The number of species of non-native and invasive marine algae is growing, with concomitant public concern about native ecosystems and coastlines. Gelidium vagum, recently introduced from northeast Asia to Europe and North America, commonly occurs from the intertidal to subtidal zones in Korea, China, and Japan. To investigate the level of genetic diversity of native populations, we analyzed mitochondrial cox1 and cob from 108 specimens of G. vagum from Korea, China, eastern Russia, including from the Netherlands and USA. The haplotype network of individual and cox1 + cob datasets revealed no genetic structure in local populations, suggesting genetic flow between Korean populations. Our results corroborate a typical pattern of genetic diversity for introduced species, with low levels in introduced populations and high levels in native populations. All haplotypes were shared between the Netherlands and USA, but not between Korea and the Netherlands / USA except cox1. Additional sampling will identify donor populations in native northeast Asian waters. This is the first report of the utility of the mitochondrial coding cob sequences in red algae.

A Multistage Authentication Strategy for Reliable N-to-N Communication in CGSR based Mobile Ad Hoc Networks (CGSR 기반의 이동 애드 흑 네트워크에서 신뢰성 있는 통신을 위한 노드간 인증 기법)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.659-667
    • /
    • 2005
  • A Mobile Ad Hoc Network(MANET) is a multi hop wireless network with no prepared base stations or centralized administrations, where flocks of peer systems gather and compose a network. Each node operates as a normal end system in public networks. In addition to it, a MANET node is required to work as a router to forward traffic from a source or intermediate node to others. Each node operates as a normal end system in public networks, and further a MANET node work as a router to forward traffic from a source or intermediate node to the next node via routing path. Applications of MANET are extensively wide, such as battle field or any unwired place; however, these are exposed to critical problems related to network management, node's capability, and security because of frequent and dynamic changes in network topology, absence of centralized controls, restricted usage on network resources, and vulnerability oi mobile nodes which results from the special MANET's character, shared wireless media. These problems induce MANET to be weak from security attacks from eavesdropping to DoS. To guarantee secure authentication is the main part of security service In MANET because networks without secure authentication are exposed to exterior attacks. In this paper, a multistage authentication strategy based on CGSR is proposed to guarantee that only genuine and veritable nodes participate in communications. The proposed authentication model is composed of key manager, cluster head and common nodes. The cluster head is elected from secure nodes, and key manager is elected from cluster heads. The cluster head will verify other common nodes within its cluster range in MANET. Especially, ID of each node is used on communication, which allows digital signature and blocks non repudiation. For performance evaluation, attacks against node authentication are analyzed. Based on security parameters, strategies to resolve these attacks are drawn up.

Text Network Analysis of Newspaper Articles on Life-sustaining Treatments (연명의료 관련 신문 기사의 텍스트네트워크분석)

  • Park, Eun-Jun;Ahn, Dae Woong;Park, Chan Sook
    • Research in Community and Public Health Nursing
    • /
    • v.29 no.2
    • /
    • pp.244-256
    • /
    • 2018
  • Purpose: This study tried to understand discourses of life-sustaining treatments in general daily and healthcare newspapers. Methods: A text-network analysis was conducted using the NetMiner program. Firstly, 572 articles from 11 daily newspapers and 258 articles from 8 healthcare newspapers were collected, which were published from August 2013 to October 2016. Secondly, keywords (semantic morphemes) were extracted from the articles and rearranged by removing stop-words, refining similar words, excluding non-relevant words, and defining meaningful phrases. Finally, co-occurrence matrices of the keywords with a frequency of 30 times or higher were developed and statistical measures-indices of degree and betweenness centrality, ego-networks, and clustering-were obtained. Results: In the general daily and healthcare newspapers, the top eight core keywords were common: "patients," "death," "LST (life-sustaining treatments)," "hospice palliative care," "hospitals," "family," "opinion," and "withdrawal." There were also common subtopics shared by the general daily and healthcare newspapers: withdrawal of LST, hospice palliative care, National Bioethics Review Committee, and self-determination and proxy decision of patients and family. Additionally, the general daily newspapers included diverse social interest or events like well-dying, euthanasia, and the death of farmer Baek Nam-ki, whereas the healthcare newspapers discussed problems of the relevant laws, and insufficient infrastructure and low reimbursement for hospice-palliative care. Conclusion: The discourse that withdrawal of futile LST should be allowed according to the patient's will was consistent in the newspapers. Given that newspaper articles influence knowledge and attitudes of the public, RNs are recommended to participate actively in public communication on LST.

Curriculum study of information security awareness for medical institution (의료기관 정보보호 인식교육을 위한 교육과정 연구)

  • Kim, Dong-Won;Han, Keun-Hee
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.151-163
    • /
    • 2019
  • As smart devices and communication technologies have developed rapidly, the healthcare industry in the globe is seeing remarkable issues on medical security. At the same time, personal medical records are being shared in the network, which would raise the risk of information security. This thesis aims to develop the curriculum to raise the awareness of information security among workers in medical institutions by referring to NCS(National Competency Standards) International standards, medical institutions' requirements and educational institutions' curriculums on information security based on proven results from medical devices and systems introduced in the public health centers, territorial branches, community health posts and primary, secondary, tertiary hospitals. Thus, this thesis offers the method to improve information security in healthcare institutions through validation testing conducted by medical practitioners and ICT experts.

A Study on the Promotion of Regional Innovation and Industrial-Academic Cooperation Using Living Labs (리빙랩을 활용한 지역혁신과 산학협력 촉진방안)

  • Kim, Young Mi
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.121-127
    • /
    • 2020
  • Innovation in local industries and the development of public services require, among other things, shared growth with the concept of regional co-prosperity. Regional co-prosperity is essentially aimed at bridging regional balance or regional gaps, which means a relationship that can achieve shared growth through complementary cooperation. In this study, cases using living labs were drawn based on the current status of industry-academic cooperation at the level of regional innovation and its policy implications were sought. Local governments are making various attempts to solve regional problems and enhance the linkage effect of securing mutual competitiveness through co-prosperity cooperation autonomously. In particular, an effective approach has been continued by activating the Living Lab Network, a problem-solving mechanism, focusing on pending regional issues. Above all, one of the strategies for regional development should be linked to the establishment of a cooperative system for win-win cooperation and policy means to support it. The activation of cooperative programs with local universities, companies and local governments and the case of problem-solving using living labs. Therefore, it suggested that active participation by various stakeholders and a cooperative governance model were needed to enable Living Lab.