• Title/Summary/Keyword: users' IT capability

Search Result 160, Processing Time 0.05 seconds

Multi-Obfuscation Approach for Preserving Privacy in Smart Transportation

  • Sami S. Albouq;Adnan Ani Sen;Nabile Almoshfi;Mohammad Bin Sedeq;Nour Bahbouth
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.139-145
    • /
    • 2023
  • These days, protecting location privacy has become essential and really challenging, especially protecting it from smart applications and services that rely on Location-Based Services (LBS). As the technology and the services that are based on it are developed, the capability and the experience of the attackers are increased. Therefore, the traditional protection ways cannot be enough and are unable to fully ensure and preserve privacy. Previously, a hybrid approach to privacy has been introduced. It used an obfuscation technique, called Double-Obfuscation Approach (DOA), to improve the privacy level. However, this approach has some weaknesses. The most important ones are the fog nodes that have been overloaded due to the number of communications. It is also unable to prevent the Tracking and Identification attacks in the Mix-Zone technique. For these reasons, this paper introduces a developed and enhanced approach, called Multi-Obfuscation Approach (MOA that mainly depends on the communication between neighboring fog nodes to overcome the drawbacks of the previous approach. As a result, this will increase the resistance to new kinds of attacks and enhance processing. Meanwhile, this approach will increase the level of the users' privacy and their locations protection. To do so, a big enough memory is needed on the users' sides, which already is available these days on their devices. The simulation and the comparison prove that the new approach (MOA) exceeds the DOA in many Standards for privacy protection approaches.

Quality of Service Control for IMT-2000 GPRS (IMT-2000 GPRS의 QoS 제어 방안)

  • 박현화;정동수;배건성
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.437-440
    • /
    • 2000
  • In order to meet the different requirements of a wide variety of user applications, the network should support the different quality of service requirements for different applications. While 3GPP has specified a number of QoS profiles for a 3G-GPRS (or UMTS), the implementation of QoS management is an issue. This paper presents the QoS management functions in the 3G-GPRS. The QoS management involves service manager, translation function, admission/capability control, and subscription control of users, and mapping function, classification function, resource manager, and traffic conditioner of user traffic. It also describes the QoS Management procedure during the session management when setting up the bearers.

  • PDF

Analysis and Design of Security Feature in IMT-2000 (IMT-2000 이동통신시스템의 보안기능 요구 분석 및 설계)

  • 권수근;신경철;김진업;김대식
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.469-472
    • /
    • 2000
  • Security-related issues in mobile communications are increasing. The security requirements of mobile communications for the mobile users include authentication of the mobile user, the data confidentiality, the data confidentiality and the location privacy of mobile user. These services require security features compatible with the wireline networks. However, wireless networks have many restrictions compare to wireline networks such as the limited computational capability of mobile equipment and limited resource(bandwidth) between a mobile user and a fixed network. So, security features for IMT-2000 are designed to meet the limited capacity. In this paper, we analyze the required security features and mechanism, and design network access security feature effective for IMT-2000 Systems. The design includes security functions allocation to each system. Finally, discuss the computational power of each system based on at]coated functions to it

  • PDF

A Methodology for Measuring End-User e-Business Competency

  • Yoon, Chui-Young
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.23-28
    • /
    • 2007
  • In e-Business environment, end-user e-Business capability is necessitated for performing his or her given tasks and improving his or her business performance in an enterprise of e-Business environment. An instrument of an end-user e-Business competency is extracted from the major components of a general competency. Through a pilot test, this study performed factor analysis, and proposed a 16-item instrument that can measure an end-user e-Business competency in e-Business environment. The application of the instrument is confirmed by applying it to measuring e-Business competency of end-users in an enterprise of e-Business environment and by presenting the measurement results for them.

  • PDF

Relative Error Compensation of Robot Using Neural Network (신경 회로망을 이용한 로봇의 상대 오차 보상)

  • Kim, Yeon-Hoon;Jeong, Jae-Won;Kim, Soo-Hyun;Kwak, Yoon-Keun
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.7
    • /
    • pp.66-72
    • /
    • 1999
  • Robot calibration is very important to improve the accuracy of robot manipulators. However, the calibration procedure is very time consuming and laborious work for users. In this paper, we propose a method of relative error compensation to make the calibration procedure easier. The method is completed by a Pi-Sigma network architecture which has sufficient capability to approximate the relative relationship between the accuracy compensations and robot configurations while maintaining an efficient network learning ability. By experiment of 4-DOF SCARA robot, KIRO-3, it is shown that both the error of joint angles and the positioning error of end effector are drop to 15$\%$. These results are similar to those of other calibration methods, but the number of measurement is remarkably decreased by the suggested compensation method.

  • PDF

A Location Technique Based On Calibrated Radio Frequency Propagation Model For Wireless Local Area Networks (교정된 전파전파 모델에 기반한 WLAN 측위 기법)

  • Kim, Hee-Sung;Shim, Ju-Young;Choi, Wan-Sik;Lee, Hyung-Keun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.8
    • /
    • pp.760-766
    • /
    • 2008
  • This paper proposes an efficient location technique to find an indoor location under the IEEE 802.11 wireless local area networks. The proposed method is based on the range measurements obtained from a simple radio frequency propagation model. Thus, unlike the radio frequency fingerprint correlation method, it does not suffer from the computational burden during the real-time location service period and can quickly reply the location requests of many users at the same time. To increase the location accuracy in spite of the frequent non-line-of-sight error occurrences, the proposed method calibrates the distortion of the non-line-of-sight error by a simple measurement surveying procedure that does not require the surveyor's manual interaction. Experimental results show the capability of the proposed method.

An Implementatin of a Multi-Channel Speech Surveillance System Over Telephone Lines

  • Kim, Sung-Soo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.17 no.4E
    • /
    • pp.17-21
    • /
    • 1998
  • This paper presents an implementation of a multi-channel speech surveillance system over telephone lines using TMS320C31 DSP chips. The incoming speech into each telephone line are first compressed simultaneously in real-time by the popular vector-sum excited linear predictive (VSELP) speech coding algorithm at the rate of 8 Kbps. The compressed steech bit streams are then multiplexed with those of other users. The multiplexed speech bit streams are transferred to the system storage equipments with some other required information so that a system operator can later monitor the stored speech data whenever it is necessary. The host program runs under Microsoft Windows95 for an efficient man-machine interface and a future upgrade-ability. We have confirmed that the overall 64-channel system operates satisfactorily in realtime. We also have checked approximately up to 2,880 total hours of recording capability of the system on a playback module and two removable backup drives.

  • PDF

Application of Quality Cost Model ln Quality Improvement Area (품질개선분야에서의 품질코스트모델의 적용)

  • Chung, Young-Bae;Kim, Yon-Soo
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.3
    • /
    • pp.71-78
    • /
    • 2011
  • This parer proposes application of quality costing system in quality improvement area. Cost of quality in quality improvement area provides a valuable of both providing the need for improvement and giving a starting point for project. WQCMS(Web-based Q-Cost Management System) have ability to collect and analyze quality data generated from various different departments in the inside or outside of the enterprise without any limitations, if end-users are able to access wide area network. It provides the capability to integrate quality information from database and to generate various easy analysis reports to management's needs using built-in analysis tool modules with real-time. Web-based quality cost management system to measure the performance of quality improvement activities in the business firms. This paper proposes standard model for quality cost process in quality improvement area.

DRM system design for copyright protection of digital contents in p2p (P2P에서 디지털 콘텐츠 저작권보호를 위한 DRM 시스템 설계)

  • 하태진;조경옥;김종우;한승조
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.728-732
    • /
    • 2004
  • It is evaluated that there is infinit capability of creating new e business using P2P program. but the research for the method to protect the copyright of digital contents is urgent even for development of the p2p service because the problem of copyright protection for digital contents is not solved. In this article, we designed the P2P system which cm give the function of security with technology for copyright management which is made with AES algorism based on PKI when users send digital contants to each other in internet.

  • PDF

A Study on Implementation and Design of Web-based Q-Cost Management System : Part 2; Implementation (웹 기반의 품질코스트 관리시스템 구축 : 제2부; 시스템 구축)

  • Kim Yon-Soo;Chung Young-Bae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.27 no.4
    • /
    • pp.179-186
    • /
    • 2004
  • The purpose of this study is to implement web-based quality cost management system to measure the performance of quality improvement activities in the business firms. Developed WQCMS(Web-based Q-Cost Management System) have ability to collect and analyze quality data generated from various different departments in the inside or outside of the enterprise without any limitations, if end-users are able to access wide area network. It provides the capability to integrate quality information from database and to generate various easy analysis reports to management's needs using built-in analysis tool modules with real-time. The proposed system was developed using Microsoft's .Net technology, ASP.NET and MS-SQL Server 2000. By web-enabling Q-cost management system, the effectiveness of the system management and utilization was realized by easiness of information integration and economical efficiency.