• Title/Summary/Keyword: user response

Search Result 969, Processing Time 0.027 seconds

One Pass Identification processing Password-based

  • Park, Byung-Jun;Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.4
    • /
    • pp.166-169
    • /
    • 2006
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. In this paper, we present a new identification scheme: OPI(One Pass Identification). The security of OPI is based on the square root problem, and OPI is secure: against the well known attacks including pre-play attack, off-line dictionary attack and server comprise. A number of pass of OPI is one, and OPI processes the password and does not need the key. We think that OPI is excellent for the consuming time to verify the prover.

A Wireless Internet Proxy Server Cluster with Enhanced Distillation and Cashing Functions (압축과 캐싱 기능을 향상한 무선 인터넷 프록시 서버 클러스터)

  • Kwak, Hu-Keun;Hwang, Jae-Hoon;Chung, Kyu-Sik
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.103-106
    • /
    • 2004
  • A wireless Internet proxy server cluster has to Distillation and Caching functions in order that a user on wireless internet can use existing wired internet service. Distillation function works to distill HTML documents and included images according to the defined preference by a user. When a user requests repeatedly, Caching function decreases response time by reusing original and distilled images or HTML documents. In this paper, we proposed enhanced distillation and caching functions. We performed experiments using 16 PCs and experimental results show the effectiveness of the proposed system compared to the existing system.

  • PDF

Developing an End-User Computing PDM System for Small and Medium Business (중소기업을 위한 최종 사용자 컴퓨팅 PDM 시스템 개발)

  • Do, Namchul
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.41 no.2
    • /
    • pp.162-172
    • /
    • 2015
  • This paper proposes a Product Data Management (PDM) system architecture that supports end-user computing for small and medium businesses (SMBs) in Korea to build and maintain efficient and sustainable information systems for their product development. Its open database with relational tables enables existing common application programs such as Microsoft office suites to access product data in PDM systems. In addition, the interactive query processor provided by database management systems helps design engineers to build ad hoc queries in standard SQL database language to response different data requirements during their product development. The PDM architecture with the open database allows design engineers or technical staffs in SMBs to build and maintain their application programs for product development by themselves. To show the feasibility of the proposed architecture, this study implemented a prototype PDM system based on the architecture and database, and represents real-world product data with the implemented PDM system.

Security in the Password-based Identification

  • Park, Byung-Jun;Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.346-350
    • /
    • 2007
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBSI(Password Based Secure Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBSI is also excellent in the aspect of the performance.

Study on the change in Economic Efficiency for Developing Mountain Railway Based on User's Willingness to Pay by Age (이용자 연령별 지불의사 수준에 따른 북한산 산악철도 경제성 변화 연구)

  • Lee, Jong-Seong;Eom, Jin-Ki;Moon, Dae-Sup;Lee, Hi-Sung
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.1310-1319
    • /
    • 2010
  • This paper has shown that Linear Induction Motor(LIM) and Rack and pinion type are efficient in selecting railway routes and systems after considering time, geo-spatial characteristics and the floating population by benchmarking domestic and overseas mountain trains. The benefit-cost analysis through the use of modeling on user's willingness to pay is conducted as a means that provides access to tourism resources. this paper concludes that the benefit-cost varies in response to changes in the amount of user's willingness to pay by age. It is expected that this paper serves as a reference data in the introduction stage of the mountain train project implemented by central or local governments with tourism resources in mountainous areas as the mountain train has turned out to be economically efficient while various potential benefits that have not been included in the benefit-cost analysis need to be quantified and remain to be studied further.

  • PDF

Development of a Computer Program for User-Oriented Analysis and Design of Prestressed Concrete Bridges

  • Kim, Tae-Hoon;Choi, Jeong-Ho;Lee, Kwang-Myong;Shin, Hyun-Mock
    • KCI Concrete Journal
    • /
    • v.12 no.2
    • /
    • pp.3-10
    • /
    • 2000
  • A computer program, named NEO-PCBRG, for the analysis and design of prestressed con-crete(PSC) bridges was developed using the finite element method. NEO-PCBRG can predict the response of PSC bridges throughout the various stages of construction and service. NEO-PCBRG has both pre- and post-processing capabilities. Pre-processing refers to all the neces- sary steps required to prepare a virtual prototype, more commonly termed a varied model for analysis. Post-processing here stands for the step in which the results from the analysis are reviewed and interpreted. In order to allow for the easy and convenient execution of the entire procedure, NEO-PCBRG was developed using computer graphics in the Visual Basic pro- gramming language. In conclusion, this study presents a new software architecture for analy-sis using the user-oriented design technique.

  • PDF

Human Memorable Password based Efficient and Secure Identification

  • Park Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.3 no.4
    • /
    • pp.213-216
    • /
    • 2005
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBI(password Based Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBI is also excellent in the aspect of the performance.

Effect of Tactile Feedback for Button GUI on Mobile Touch Devices

  • Shin, Heesook;Lim, Jeong-Mook;Lee, Jong-Uk;Lee, Geehyuk;Kyung, Ki-Uk
    • ETRI Journal
    • /
    • v.36 no.6
    • /
    • pp.979-987
    • /
    • 2014
  • This paper describes new tactile feedback patterns and the effect of their input performance for a button GUI activated by a tap gesture on mobile touch devices. Based on an analysis of touch interaction and informal user tests, several tactile feedback patterns were designed. Using these patterns, three user experiments were performed to investigate appropriate tactile feedback patterns and their input performance during interaction with a touch button. The results showed that a tactile pattern responding to each touch and release gesture with a rapid response time and short falling time provides the feeling of physically clicking a button. The suggested tactile feedback pattern has a significantly positive effect on the number of typing errors and typing task completion time compared to the performance when no feedback is provided.

Efficiency Analysis for Maintenance Management System of Users' Claims in Building (사용자 클레임에 대응하는 건물유지관리체계의 효율성 분석)

  • Kwak, Ro-Yeul;Yim, Dong-Soon
    • Proceedings of the SAREK Conference
    • /
    • 2006.06a
    • /
    • pp.820-825
    • /
    • 2006
  • It is necessary to correspond to building users' claims rapidly as much as possible in order to satisfy user's need, because the final tarket of building maintenance service is user of building. This paper investigates the time taken for receiving users' claims and the time taken for the service organization to respond to the claims in the office building; types of claims and service responses are analysed, through which the response characteristics of the maintenance management organization are evaluated with respect to users' claims. Throughout extensive simulation analysis, important performance measures such as mean time to repair and utilization of maintenance personnels have been investigated.

  • PDF

Comprehensive evaluation method for user interface design in nuclear power plant based on mental workload

  • Chen, Yu;Yan, Shengyuan;Tran, Cong Chi
    • Nuclear Engineering and Technology
    • /
    • v.51 no.2
    • /
    • pp.453-462
    • /
    • 2019
  • Mental workload (MWL) is a major consideration for the user interface design in nuclear power plants (NPPs). However, each MWL evaluation method has its advantages and limitations, thus the evaluation and control methods based on multi-index methods are needed. In this study, fuzzy comprehensive evaluation (FCE) theory was adopted for assessment of interface designs in NPP based on operators' MWL. An evaluation index system and membership functions were established, and the weights were given using the combination of the variation coefficient and the entropy method. The results showed that multi-index methods such as performance measures (speed of task and error rate), subjective rating (NASA-TLX) and physiological measure (eye response) can be successfully integrated in FCE for user interface design assessment. The FCE method has a correlation coefficient compared with most of the original evaluation indices. Thus, this method might be applied for developing the tool to quickly and accurately assess the different display interfaces when considering the aspect of the operators' MWL.