• Title/Summary/Keyword: real and formal

Search Result 196, Processing Time 0.031 seconds

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

Differential Privacy in Practice

  • Nguyen, Hiep H.;Kim, Jong;Kim, Yoonho
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.3
    • /
    • pp.177-186
    • /
    • 2013
  • We briefly review the problem of statistical disclosure control under differential privacy model, which entails a formal and ad omnia privacy guarantee separating the utility of the database and the risk due to individual participation. It has born fruitful results over the past ten years, both in theoretical connections to other fields and in practical applications to real-life datasets. Promises of differential privacy help to relieve concerns of privacy loss, which hinder the release of community-valuable data. This paper covers main ideas behind differential privacy, its interactive versus non-interactive settings, perturbation mechanisms, and typical applications found in recent research.

The development of Inspection Machine for a blood virus infection (바이러스 감염 판별용 혈액 검사기 개발)

  • Jun, Jae-Min;Seo, Kyu-Tae;Lee, Bo-Hee;Lee, In-Koo;Min, Seung-Ki;Kim, Hak-Jun
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.465-467
    • /
    • 2004
  • This paper deals with the design and analysis of automatic virus infection machine, which can be used in blood testing at veterinary hospital. It consists of the mechanical positioning parts and electrical control parts. Two of driving motor and ball screws are used to move the liquid container into the test position and mix the blood on litmus paper. In addition, a thermal controller is installed to keep the container temperature on constant level. The user interface using with a LCD and some keys are supplied with a 8-bit single chip controller. All of the designs issue related with the mechanism and controllers are discussed in detail. Finally the proposed machine is tested in real experiment with the formal processing to judge the virus infection, and also the usefulness of designed algorithm is verified through the experiments.

  • PDF

Measurement of unburned methanol and formaldehyde emissions from methanol fueled vehicles (메탄올자동차 배기배출물중의 미연메탄올 및 포름알데하이드 측정)

  • 명차리;한상순
    • Journal of the korean Society of Automotive Engineers
    • /
    • v.13 no.5
    • /
    • pp.89-94
    • /
    • 1991
  • In the quantitative analysis of oxygenated exhaust emissions (unburned methanol, formal- dehyde) from methanol fueled vehicles, the oxygen contained in oxygenated exhaust gases lowers the FID (Flame Ionization Detector) response factor of conventional THC analyzer and leads to erroneous HC reading. For correct measurement of various HCs including oxygenated HCs emitted from FFV(Flexible Fuel Vehicle), first of all, the measurement technique of real HC emissions should be established. GC and HPLC-DNPH measuring methods specified by the EPA are used in this paper to analyze unburned methanol and formaldehyde components in the exhaust emissions. In emission test of FFV, unburned methanol and formaldehyde are emitted mostly during cold transient period, and it is shown that formaldehyde emission level is proportional to engine displacements. In view of the HC emission level, vehicle using M85 has 40% advantage over gasoline-fueled vehicle in OMHCE and has a good potential of a low emission vehicle.

  • PDF

Automated annotation of web page contents for rapid creation of Semantic web contents

  • Phuong Tu Minh;Duy Pham Hoang;Kien Trinh Huu
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.376-381
    • /
    • 2004
  • The Semantic Web is an extension of the current Web in which information is given formal and explicit meaning. The Semantic Web enables computer programs to understand information contents and thus facilitates more efficient discovery, automation, integration and sharing of data. To create Semantic Web contents one needs appropriate tools. In this paper, we describe such a toolkit we have constructed. The most important feature of the toolkit is that it makes use of information extraction techniques for automatically annotating web page contents. Experiments with a real life application show promising results and demonstrate the usefulness of the toolkit.

  • PDF

A Study on the Choice of Models for Teaching the Principle of Arithmetic Operations of Integers in the Middle School Mathematics Class (중학교 수학 수업에서 정수의 사칙계산의 원리에 따른 모델 선택에 관한 연구)

  • Kim, Ik-Pyo;Jung, Eun Hee
    • The Mathematical Education
    • /
    • v.51 no.4
    • /
    • pp.429-453
    • /
    • 2012
  • The purpose of the study were to analyze teaching models of arithmetic operations of integers in Korean middle school mathematics textbooks of the first grade and Americans', from which we compare and analyze standards for choice of models of middle school teachers and preservice mathematics teachers. We also analyze the effect of the choice of teaching models for students to understand and appreciate number systems as a coherent body of knowledge. On the basis of that, we would like to find the best model to help students understand and reason the process of formulate the arithmetic operations of natural numbers and integers into the operation of the real number system. Furthermore, we help these series of the study to be applied effectively in the middle school mathematics class in Korea.

A Study of Stage Costume of Peking Opera

  • Lee, Young-Suk
    • The International Journal of Costume Culture
    • /
    • v.6 no.1
    • /
    • pp.38-51
    • /
    • 2003
  • Peking Opera, one of a representative Chinese dramas, is a synthesis of drama and stage art. Peking Opera's stage costume was set up in Qing dynasty though its style was embellished with mainly Ming dynasty's clothing style. The special patterns in the clothing were very important because they classified social rankings. There are two kinds of roles in Peking Opera. Sheng stands for male roles and Dan stands for female roles though Dan had traditionally been acted by male actors with female attire until the ruling of the People's Republic of China. There are five different kinds Peking Opera's stage costume. First, Mang is a formal dress for kings and generals. It is a very delicate long Po with special patterns. It has several names depending on the color and shape of a dragon. Second, Pee is a casual attire for kings, government officials, and their families. It is also a long Po with front opening and symmetrical neckline. Third, Kao is an armor of warrior which is made not for protection in a real war but for ornament of a formal dress. Kao reflects the wearer's authority when the wearer stays still, but it is a comfortable clothing for big dancing moves once the wearer starts dancing. The wearer puts a banner into the shoulder to alarm tension of a war. Fourth, Cheup is an outfit that one wears the left part adjust to the top. There are different lengths of Cheup and it has a straight neckline. There are twenty-one different kinds of Cheup according to its shape and color. Last, Yi is name for the rest of Peking Opera's stage costume other than Mang, Pee, Kao, and Cheup.

  • PDF

Formal Semantics for Lambda Expression of Java (자바 람다식에 대한 형식 의미론)

  • Han Jung Lan
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.5
    • /
    • pp.157-164
    • /
    • 2023
  • Specifying the semantic structure for functional interfaces and lambda expressions, which are the latest features of Java, can be referenced when designing similar functions in the future, and is also required in the process of standardizing or implementing an optimized translator. In this study, action equation 3.0 is newly proposed to express the static and dynamic semantic structure of functional interfaces and lambda expressions by modifying and upgrading the existing expressions to express the semantic structures of java functional interfaces and lambda expressions. Measure the execution time of java programs by implementing the semantic structure specified in action equation 3.0 in java, and prove that action equation 3.0 is a real semantic structure that can be implemented through simulation. The superiority of this action equation 3.0 is to be confirmed by comparing the action equation 3.0 specified in the four areas of readability, modularity, extensibility and flexibility with the existing representative semantic expression methods.

A Reconsideration of Asymmetries of Bracketing Paradoxes in English Derivation: a Corpus-based Approach

  • Kim, Jin-hyung
    • Journal of English Language & Literature
    • /
    • v.55 no.3
    • /
    • pp.475-495
    • /
    • 2009
  • In this paper, I discuss some asymmetries of bracketing paradoxes from a corpus-based perspective. Through a critical examination of previous analyses of bracketing paradoxes, it is demonstrated that the cases of apparent asymmetries of bracketing paradoxes are consistently accounted for when combined with the frequency-based parsability in morphological processing. Based on the relative frequency, this paper argues that bracketing paradoxes are well-atttested when their immediate bases are frequent and productive enough to be accessed as a unit and stored as such in memory. This is an extension of Hay 2002 which conducted a comprehensive survey of differential frequency effects in suffix pairs. A frequency-based approach to bracketing paradoxes adopted in this paper can be a challenge to the conventional formal theory by assuming a major role of language use and have the potential to significantly advance our understanding of the asymmetries observed in the real language world.

A Study on the Cognition and Usage of Traditional Wedding Food in Seoul & Gyeonggi Area (혼례음식에 대한 인식도 조사 및 이용실태에 관한 연구 - 서울.경기지역 중심으로 -)

  • Kim, Jun-Hee;Jin, Yang-Ho
    • Culinary science and hospitality research
    • /
    • v.14 no.2
    • /
    • pp.18-29
    • /
    • 2008
  • This study is to investigate the cognition and usage of traditional wedding food in Seoul & Gyeonggi area. It provides the basic suggestions for developing the best wedding culture, upholding the great wedding tradition. People usually prepared traditional wedding food only because they had to do since they thought it was a formal way to do it at a wedding ceremony. However, there should be more important things to be considered. Firstly, to understand the real meaning of traditional wedding food, we need to inform its meaning by starting campaigns on wedding culture or making booklets of traditional wedding food. Secondly, to prepare the right selections of traditional food, we need to simplify traditional wedding food and consider the modern sense of the products. Thirdly, to improve traditional wedding food, we need to develop diverse menu. By doing it, we can efficiently reduce the cost of wedding food.

  • PDF