• Title/Summary/Keyword: table form

Search Result 440, Processing Time 0.029 seconds

New OTP Authentication Approach based on Table Pattern Schedule (테이블 패턴 스케줄 기반 OTP 인증)

  • Balilo, Benedicto B. Jr.;Gerardo, Bobby D.;Medina, Ruji P.;Byun, Yung-Cheol
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1899-1904
    • /
    • 2017
  • This paper presents a new one-time password approach generated based on $4{\times}4$ pattern schedule. It demonstrates generation of passkey from initial seed of random codes and mapping out in table pattern schedule which will produce a new form of OTP scheme in protecting information or data. The OTP-2FA has been recognized by many organizations as a landmark to authentication techniques. OTP is the solution to the shortcomings of the traditional user name/password authentication. With the application of OTP, some have benefited already while others have had second thoughts because of some considerations like cryptographic issue. This paper presents a new method of algorithmic approach based on table schedule (grid authentication). The generation of OTP will be based on the random parameters that will be mapped out in rows and columns allowing the user to form the XY values to get the appropriate values. The algorithm will capture the values and extract the predefined characters that produce the OTP codes. This scheme can work in any information verification system to enhance the security, trust and confidence of the user.

전달함수를 이용한 유정압테이블 운동정밀도 해석법의 제안 및 이론적 검증

  • 오윤진;박천홍;이후상;홍준희
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 2001.04a
    • /
    • pp.9-14
    • /
    • 2001
  • A new model utilizing a transfer function is introduced in the present paper for analizing motion errors of hydrostatic tables. Relationship between film reaction force in a single hydrostatic pad and form error of a guide rail is derived at various spacial frequencies by finite element analysis, and it is expressed as a transfer function. This transfer function clarifies so called averaging effect of the oil film quantitively. For example, it is found that the amplitide of the film reaction force is reduced as the spacial frequency increases or relative width of the pocket is reduced. Motion errors of a multiple pad table is estimated from transfer function, geometric relationship between each pads and form errors of a guide rail, which is named as Transfer Function Method. Calculated motion errors by TFM show good agreement with motion errors calculated by Multi Pad Method, which is considered entire table as an analysis object. From the results, it is confirmed that the proposed TFM is very effective to analyze the motion errors of hydrostatic tables.

  • PDF

An Analysis of Performance Error of Roundness Measuring Instrument -by phase different method- (眞圓度 測定器의 誤差特性에 대한 解析 -위상차법-)

  • 한응교;허문석;박익근
    • Journal of the korean Society of Automotive Engineers
    • /
    • v.10 no.3
    • /
    • pp.31-37
    • /
    • 1988
  • A phase different method to evaluate the instrument error of roundness measuring instrument and the form error of specimens for the calibration of the instrument is used. An instrument with a rotary table supported by an air bearing was calibrated by using the standard balls as a standard. The calibration was carried out repeatedly by setting the same ball in 12 phase angles(per 30.deg.) on the table and by recording their roundness errors with a magnification of 100,000 times. As a result of data analysis of all the observations, readout at each of 144 orientations(per 2.5.deg.) from recorded data file, the error of performance of the instrument and the specimens are separated. In the particular instrument used in the present experiment, the error of the instrument was determined with the accuracy of 0.0164 (.mu.m) and the form error of the specimens was determined with the accuracy of 0.0264,0.0172(.mu.m), respectively. If the instrument was calibrated by using the above specimens, then the accuracy of the measurement of roundness error can be improved to about 0.017 (.mu.m).

  • PDF

The Design and Implementation of Class Relation Information Tool from C++ Code (C++ 코드로부터 클래스 관련 정보 생성 도구의 설계 및 구현)

  • Jang, Deok-Cheol;Park, Jang-Han
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.3
    • /
    • pp.818-830
    • /
    • 2000
  • Automation tools for program analysis are needed in order to program understand and maintain, extract the characteristics of object-oriented program such as class name, member function and data member. In this paper, we carried out design and implementation of the automation tool for effective maintenance of object-oriented software. Being based on Reverse Engineering, this approach extracts class relationship information from C++ source code and generates object-oriented model of class diagram using UML as the standard object-oriented methodology. Therefore, this paper provides developers visualized including class information, definitions of classes, inheritance relationships, set relationships, and simple reference relationships. Finally in this paper, we propose a method that construct class relationship information to table in analysis state and make form of table construction to link form so tat developers can perform understanding and maintaining program efficiently. And this method enable to restructure and reuse in object-oriented model.

  • PDF

우리 나라 명수법에 대한 소고(II)

  • 김병덕
    • Journal for History of Mathematics
    • /
    • v.12 no.1
    • /
    • pp.53-64
    • /
    • 1999
  • We have studied the idealistic numeration which has been used in Chinese classics of Korea. The form is $\circled4$ of the

    and we name it 'HA-SU numeration' in this thesis.

  • PDF
  • Evaluation of the Recognition and Taste of Table Settings According to an Objective Party (모임별 상차림에 대한 인식도 및 기호도 조사)

    • Kim, Su-In;Park, Yeon-Jin
      • Journal of the Korean Society of Food Culture
      • /
      • v.24 no.1
      • /
      • pp.23-32
      • /
      • 2009
    • This study was conducted to generate fundamental data required by food coordinators and food space creators for planning and directing table settings. The results of this study were then used to suggest an ideal model of table settings for Korean-style food equipped with simple, sophisticated, and practical characteristics. Specifically, this study evaluated the importance of hygiene (safety, cleanness, arrangement), decoration (dignity, form, stylishness, presentation of food on plates), naturalness (seasonal beauty, comfortableness, natural beauty), and modernity (modern style, chic style, urban style). These factors were evaluated according to the preference of the table setting and the characteristics of the meeting, which fit various meal cultures, times, places, and objectives. The results of this study indicate that people prefer hygiene and decoration for family meetings (bansang setting), hygiene and modernity for friendly meetings (simple buffet setting), hygiene and decoration for company meetings (simple buffet setting), and hygiene and decoration for academic meetings (tea party). Hygiene and decoration were highly evaluated in most cases, which indicates that individuals at meetings for special purposes give weight to the meeting's atmosphere, but also consider the hygiene and cleanliness of the food.

    Performance Evaluation of Symbol Timing Algorithm for QPSK Modulation Technique in Digital Receiver (QPSK변조기법을 위한 Digital 수신기의 심볼동기 알고리즘 성능평가)

    • 송재철;고성찬;최형진
      • The Journal of Korean Institute of Communications and Information Sciences
      • /
      • v.17 no.11
      • /
      • pp.1299-1310
      • /
      • 1992
    • Recently, digital realizations of timing recovery circuits for digital data transmission are of growing interest. As a result of digital realization of timing recovery circuits, new digital algorithms for timing error detection are required. In this paper, we present a new digital Angular Form(AF) algorithm which can be directly applied to QPSK modulation technique. AF algorithm is basically developed on the concepts of detected angle form and transition logic table. We evaluated the performance of this algorithm by Monte-Carlo simulation method under Gaussian and Impulsive noise environments. From the performance evaluation result, we show that the performance of AF Algorithm is better than that of Gardner in BER, RMS jitter, S-curve.

    • PDF

    Test Dataset for validating the meaning of Table Machine Reading Language Model (표 기계독해 언어 모형의 의미 검증을 위한 테스트 데이터셋)

    • YU, Jae-Min;Cho, Sanghyun;Kwon, Hyuk-Chul
      • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
      • /
      • 2022.10a
      • /
      • pp.164-167
      • /
      • 2022
    • In table Machine comprehension, the knowledge required for language models or the structural form of tables changes depending on the domain, showing a greater performance degradation compared to text data. In this paper, we propose a pre-learning data construction method and an adversarial learning method through meaningful tabular data selection for constructing a pre-learning table language model robust to these domain changes in table machine reading. In order to detect tabular data sed for decoration of web documents without structural information from the extracted table data, a rule through heuristic was defined to identify head data and select table data was applied. An adversarial learning method between tabular data and infobax data with knowledge information about entities was applied. When the data was refined compared to when it was trained with the existing unrefined data, F1 3.45 and EM 4.14 increased in the KorQuAD table data, and F1 19.38, EM 4.22 compared to when the data was not refined in the Spec table QA data showed increased performance.

    • PDF

    Classifier Integration Model for Image Classification (영상 분류를 위한 분류기 통합모델)

    • Park, Dong-Chul
      • Journal of the Institute of Electronics Engineers of Korea CI
      • /
      • v.49 no.2
      • /
      • pp.96-102
      • /
      • 2012
    • An advanced form of the Partitioned Feature-based Classifier with Expertise Table(PFC-ET) is proposed in this paper. As is the case with the PFC-ET, the proposed classifier model, called Classifier Integration Model(CIM), does not use the entire feature vectors extracted from the original data in a concatenated form to classify each datum, but rather uses groups of features related to each feature vector separately. The proposed CIM utilizes a proportion of selected cluster members instead of the expertise table in PFC-ET to minimize the error in confusion table. The proposed CIM is applied to the classification problem on two data sets, Caltech data set and collected terrain data sets. When compared with PFC model and PFC-ET model. the proposed CIM shows improvements in terms of classification accuracy and post processing efforts.

    Three Steps Polyalphabetic Substitution Cipher Practice Model using Vigenere Table for Encryption (Vigenere 테이블을 이용한 3단계 다중 알파벳 치환 암호화 모델)

    • Nguyen Huu Hoa;Dang Quach Gia Binh;Do Yeong Kim;Young Namgoong;Si Choon Noh
      • Convergence Security Journal
      • /
      • v.22 no.3
      • /
      • pp.33-39
      • /
      • 2022
    • Recently, cyberattacks on infrastructure have been continuously occurring with the starting of neutralizing the user authentication function of information systems. Accordingly, the vulnerabilities of system are increasing day by day, such as the increase in the vulnerabilities of the encryption system. In this paper, an alternative technique for the symmetric key algorithm has been developed in order to build the encryption algorithm that is not easy for beginners to understand and apply. Vigenere Cipher is a method of encrypting alphabetic text and it uses a simple form of polyalphabetic substitution. The encryption application system proposed in this study uses the simple form of polyalphabetic substitution method to present an application model that integrates the three steps of encryption table creation, encryption and decryption as a framework. The encryption of the original text is done using the Vigenère square or Vigenère table. When applying to the automatic generation of secret keys on the information system this model is expected that integrated authentication work, and analysis will be possible on target system. ubstitution alphabets[3].


    (34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
    Copyright (C) KISTI. All Rights Reserved.