• Title/Summary/Keyword: the virtual

Search Result 12,135, Processing Time 0.039 seconds

Privacy Protection for 5G Mobile-based IoT Users (5G 이동 통신 기반의 IoT 사용자를 위한 프라이버시 보호 기법)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.1-7
    • /
    • 2020
  • Recently 5G technology is one of the technologies that has been receiving much positive responses from users as it is integrated with virtual technology. However, 5G's security issues have not been fully resolved and more security is soon required. In this paper, an approach technique is proposed as a probability-based hierarchy to provide personal privacy for 5G-based IoT users more safely. The proposed technique is aimed at not exposing the privacy of IoT users to third parties by using two random keys created personally by IoT users. In order to satisfy both safety and efficiency, the proposed technology divides the privacy of IoT users into two layers. In the first stage, IoT users will control access to intermediate media using anonymous keys generated by IoT users, and in the second stage, information of IoT users registered with servers will be darkened and replicated. The proposed technique has improved the accuracy of the privacy protection of IoT users as they assign weights to layered information after layering users' privacy information on a probabilistic basis.

XOR-based High Quality Information Hiding Technique Utilizing Self-Referencing Virtual Parity Bit (자기참조 가상 패리티 비트를 이용한 XOR기반의 고화질 정보은닉 기술)

  • Choi, YongSoo;Kim, HyoungJoong;Lee, DalHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.156-163
    • /
    • 2012
  • Recently, Information Hiding Technology are becoming increasingly demanding in the field of international security, military and medical image This paper proposes data hiding technique utilizing parity checker for gray level image. many researches have been adopted LSB substitution and XOR operation in the field of steganography for the low complexity, high embedding capacity and high image quality. But, LSB substitution methods are not secure through it's naive mechanism even though it achieves high embedding capacity. Proposed method replaces LSB of each pixel with XOR(between the parity check bit of other 7 MSBs and 1 Secret bit) within one pixel. As a result, stego-image(that is, steganogram) doesn't result in high image degradation. Eavesdropper couldn't easily detect the message embedding. This approach is applying the concept of symmetric-key encryption protocol onto steganography. Furthermore, 1bit of symmetric-key is generated by the self-reference of each pixel. Proposed method provide more 25% embedding rate against existing XOR operation-based methods and show the effect of the reversal rate of LSB about 2% improvement.

Effects that Faith Factor of Social Bonds Have on Cyber Bullying Phenomenon (사회유대의 신념요인이 사이버 불링 가해 현상에 미치는 영향)

  • Lee, Young-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.256-262
    • /
    • 2016
  • A cyber crime has been evolving, as other crimes have. Beyond physical damages such as financial crimes in the cyber world, it has evolved into psychological forms like cyber-bullying. In today's crimes, measures that consider psychological effects of crimes are highly regarded in that fear of crime is considered as well as visible crimes. Accordingly, cyber bullying, which causes psychological damages, needs to be treated very importantly. Because the characteristics of cyber crime is caused by different circumstances from the real world, measures should be taken in different aspects. Rather than physical damages, which can be found in the conventional crimes, cyber crimes cause psychological damages, so the effect that has on inflicting should be specified. Especially, in the environment that virtual reality is ubiquitous through smart phones, it is very difficult to establish measures by considering all the causes of general cyber crimes. Therefore, this study estimated what affects cyber bullying by focusing on personalized faith factor among social bond theory, which can control cyber crimes. As a result, self-controling faith was verified to have a negative effect on cyber bullying, so faith is a very important factor in personalized environment. Thus, it is suggested that the characteristics of cyber space and education of humanism, which can affect individuals' faith should be emphasized.

A Study on Comparison of Massive Data Recording Equipments for VLBI Radio Observation Data (VLBI 전파 관측데이터를 위한 대용량 기록장치 비교에 관한 연구)

  • Oh, Se-Jin;Yeom, Jae-Hwan;Roh, Duk-Gyoo;Jung, Dong-Kyu;Hwang, Ju-Yeon;Oh, Chungsik;Kim, Hyo-Ryoung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.3
    • /
    • pp.125-132
    • /
    • 2018
  • KVN(Korean VLBI Network) introduced the Mark6 system of the MIT haystack observatory as a recorder for data recording up to 32 Gbps for VLBI(Very Long Baseline Interferometry) observation. The Mark6 recorder can record data at up to 32Gbps when two systems and 64 HDDs are installed. However, because of the unique recording method that is characteristic of Mark6, we are introducing a large amount of data into a virtual file system, or using a general RAID method, which causes data loss when reading and transferring files at the highest recording speed or file system have. The Flexbuff system, a software recorder developed by JIVE(Joint Institute for VLBI ERIC), can be configured to operate as a data recorder through RAID configuration and network upgrades. In particular, when installed in the Mark6 system, it can record VLBI data at a maximum speed of 32 Gbps with less loss of data compared to the existing Mark6 by utilizing Mark6 resources well. In this paper, we propose that the existing Mark6 system can be operated as Mark6-Flexbuff by installing jive5ab software, and it is verified through experiment that it can be effectively used for VLBI observation operation through data recording test.

Development of a Test Framework for Functional and Non-functional Verification of Distributed Systems (분산 시스템의 기능 및 비기능 검증을 위한 테스트 프레임워크 개발)

  • Yun, Sangpil;Seo, Yongjin;Min, Bup-Ki;Kim, Hyeon Soo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.107-121
    • /
    • 2014
  • Distributed systems are collection of physically distributed computers linked by a network. General use of wired/wireless Internet enables users to make use of distributed service anytime and anywhere. The explosive growth of distributed services strongly requires functional verification of services as well as verification of non-functional elements such as service quality. In order to verify distributed services it is necessary to build a test environment for distributed systems. Because, however, distributed systems are composed of physically distributed nodes, efforts to construct a test environment are required more than those in a test environment for a monolithic system. In this paper we propose a test framework to verify functional and non-functional features of distributed systems. The suggested framework automatically generates test cases through the message sequence charts, and includes a test driver composed of the virtual nodes which can simulate the physically distributed nodes. The test result can be checked easily through the various graphs and the graphical user interface (GUI). The test framework can reduce testing efforts for a distributed system and can enhance the reliability of the system.

A Case Study of Nitrox Usage in Diving Operation of the Busan-Geoje Fixed Link Immersed Tunnel (거가대교 침매터널 잠수작업에서의 나이트록스 사용 사례 분석)

  • Woo, Dae-Hee;Kang, Sin-Young;Lee, Min-Gu
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.6
    • /
    • pp.790-797
    • /
    • 2015
  • This study tried to evaluate the safety and economical benefit of Nitrox-diving by comparing with Air diving. We used actual diving data which was recorded in construction site of the Busan-Geoje fixed link immersed tunnel in 2010. The study method was to assort and analyze the diving data by divers, depth, breathing air, and diving table. Furthermore, the study examined the possibility of outbreak decompression sickness by comparing Nitrox diving and Air diving in no-decompression limit time, decompression time, working time. As a result, this study confirms that if certain diver breathe Nitrox for diving and oxygen for decompression, not only the risk of decompression sickness could be minimized, but also duration of decompression could be shortened. Moreover, it was estimated that a remarkable difference(more than 3 times) between actual duration of underwater construction period and virtual construction period by using air. As a result, the study confirmed that Nitrox diving is more efficient and economical than Air diving in physically limited and hazardous diving environment.

Location Tracking and Remote Monitoring system of Home residents using ON/OFF Switches and Sensors (ON/OFF 스위치와 센서를 이용한 홈 거주자의 위치추적 및 원격모니터링 시스템)

  • Ahn Dong-In;Kim Myung-Hee;Joo Su-Chong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.1
    • /
    • pp.66-77
    • /
    • 2006
  • In this paper, we researched the searching and tracking locations of a home resident using ON/OFF switches and sensors and designed a remote monitoring system. As an implementation environment, this system is developed on the base of the distributed object group framework we have developed from previous works. In order to trace the moving locations of a home resident, we firstly showed a home structure which attaches ON/OFF switches and sensors to home appliances and indoor facilities being fixed in home. Whenever a home resident opens/closes these objects, the signals operated from ON/OFF switches and sensors are sent to a home server system. In this time, the real locations of ON/OFF switches and sensors that the signals are being occurred must be the current location that he/she stays. A home server system provides the functionalities that map the real location of a resident in home to virtual location designed on remote desk-tops or terminals like PDAs, and that construct a healthcare database consisted of moving patterns, moving ranges, momentum for analyzing the given searching locations and times Finally, this system provides these information for remotely monitoring services.

Spatio-Temporal Query Processing System based on GML for The Mobile Environment (모바일 환경을 위한 GML 기반 시공간 질의 처리 시스템)

  • Kim, Joung-Joon;Shin, In-Su;Won, Seung-Ho;Lee, Ki-Young;Han, Ki-Joon
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.95-106
    • /
    • 2012
  • Recently, with increase and development of the wireless access network area, u-GIS Service is supported in various fields. Especially, spatio-temporal data is used in the mobile environment for the u-GIS service. However, there is no standard for the spatio-temporal data used in different spaces, spatio-temporal data processing technology is necessary to makes interoperability among mobile u-GIS services. Furthermore, it is also necessary to develop the system of gathering, storing, and managing the spatio-temporal data in consideration of small capacity and low performance of mobile devices. Therefore, in this paper, we designed and implemented a spatio-temporal query processing system based on GML to manage spatio-temporal data efficiently in the mobile environment. The spatio-temporal query processing system based on GML can offer a structured storage method which maps a GML schema to a storage table and a binary XML storage method which uses the Fast Infoset technique, so as to support interoperability that is an important feature of GML and increase storage efficiency. we can also provide spatio-temporal operators for rapid query processing of spatio-temporal data of GML documents. In addition, we proved that this system can be utilized for the u-GIS service to implement a virtual scenario.

Pharmacophore Identification for Peroxisome Proliferator-Activated Receptor Gamma Agonists

  • Sohn, Young-Sik;Lee, Yu-No;Park, Chan-In;Hwang, S-Wan;Kim, Song-Mi;Baek, A-Young;Son, Min-Ky;Suh, Jung-Keun;Kim, Hyong-Ha;Lee, Keun-Woo
    • Bulletin of the Korean Chemical Society
    • /
    • v.32 no.1
    • /
    • pp.201-207
    • /
    • 2011
  • Peroxisome proliferator-activated receptors (PPARs) are members of nuclear receptors and their activation induces regulation of fatty acid storage and glucose metabolism. Therefore, the $PPAR\gamma$ is a major target for the treatment of type 2 diabetes mellitus. In order to generate pharmacophore model, 1080 known agonists database was constructed and a training set was selected. The Hypo7, selected from 10 hypotheses, contains four features: three hydrogen-bond acceptors (HBA) and one general hydrophobic (HY). This pharmacophore model was validated by using 862 test set compounds with a correlation coefficient of 0.903 between actual and estimated activity. Secondly, CatScramble method was used to verify the model. Hence, the validated Hypo7 was utilized for searching new lead compounds over 238,819 and 54,620 chemical structures in NCI and Maybridge database, respectively. Then the leads were selected by screening based on the pharmacophore model, predictive activity, and Lipinski's rules. Candidates were obtained and subsequently the binding affinities to $PPAR\gamma$ were investigated by the molecular docking simulations. Finally the best two compounds were presented and would be useful to treat type 2 diabetes.

A Study on Method for Damage Calculation Caused by Bid Rigging in Alternative Tenders for Construction Projects -Utilizing the Difference of the Design Score & Bidding Rate as Factor - (건설공사 대안입찰 담합으로 인한 손해액 산정모델 연구 - 설계점수 및 투찰률 차이 인자 활용 -)

  • Min, Byeong-Uk;Park, Hyung-Keun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.38 no.5
    • /
    • pp.741-749
    • /
    • 2018
  • The purpose of this study is to propose a rational and scientific damage calculation model in relation to damages caused by bid rigging in construction projects. Previous studies and precedents in relation to calculating damages from bid rigging suggest that the main issue was the lack of consideration in standards for deciding successful bids, selection of inadequate standard comparative markets, insufficiency in analyzing the appropriateness of competitive bid price influence factors, and absence of calculation model verification. In order to improve on these issues, a damage calculation method on alternative tenders for construction projects was proposed. For this calculation model, first, a standard market adequate to the successful bid selection standards was determined, second, an appropriate factor was selected by analyzing the correlation between competitive bid price influence factors, and third, a regression analysis was conducted on the selected factor. Lastly, this was demonstrated through verification of appropriateness, significance & normality of the proposed model and application of actual bid rigging cases. Through the proposed calculation model, this study seeks to serve as a base to prevent opportunity damages for parties involved in related court cases by early resolution of disputes and relief from issues of unfair damage burdens on a particular party.