• Title/Summary/Keyword: Complete network

Search Result 516, Processing Time 0.029 seconds

Designing an Efficient and Secure Credit Card-based Payment System with Web Services Based on the ANSI X9.59-2006

  • Cheong, Chi Po;Fong, Simon;Lei, Pouwan;Chatwin, Chris;Young, Rupert
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.495-520
    • /
    • 2012
  • A secure Electronic Payment System (EPS) is essential for the booming online shopping market. A successful EPS supports the transfer of electronic money and sensitive information with security, accuracy, and integrity between the seller and buyer over the Internet. SET, CyberCash, Paypal, and iKP are the most popular Credit Card-Based EPSs (CCBEPSs). Some CCBEPSs only use SSL to provide a secure communication channel. Hence, they only prevent "Man in the Middle" fraud but do not protect the sensitive cardholder information such as the credit card number from being passed onto the merchant, who may be unscrupulous. Other CCBEPSs use complex mechanisms such as cryptography, certificate authorities, etc. to fulfill the security schemes. However, factors such as ease of use for the cardholder and the implementation costs for each party are frequently overlooked. In this paper, we propose a Web service based new payment system, based on ANSI X9.59-2006 with extra features added on top of this standard. X9.59 is an Account Based Digital Signature (ABDS) and consumer-oriented payment system. It utilizes the existing financial network and financial messages to complete the payment process. However, there are a number of limitations in this standard. This research provides a solution to solve the limitations of X9.59 by adding a merchant authentication feature during the payment cycle without any addenda records to be added in the existing financial messages. We have conducted performance testing on the proposed system via a comparison with SET and X9.59 using simulation to analyze their levels of performance and security.

Multicast Routing On High Speed networks using Evolutionary Algorithms (진화 알고리즘을 이용한 초고속 통신망에서의 멀티캐스트 경로배정 방법에 관한 연구)

  • Lee, Chang-Hoon;Zhang, Byoung-Tak;Ahn, Sang-Hyun;Kwak, Ju-Hyun;Kim, Jae-Hoon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.671-680
    • /
    • 1998
  • Network services, such as teleconferencing, remote diagnostics and education, and CSCW require multicasting. Multicast routing methods can be divided into two categories. One is the shortest path tree method and the other is the minimal Steiner tree method. The latter has an advantage over the former in that only one Steiner tree is needed for a group. However, finding a minimal Steiner tree is an NP-complete problem and it is necessary to find an efficient heuristic algorithm. In this paper, we present an evolutionary optimization method for finding minimal Steiner trees without sacrificing too much computational efforts. In particular, we describe a tree-based genetic encoding scheme which is in sharp constast with binary string representations usually adopted in convetional genetic algorithms. Experiments have been performed to show that the presented method can find optimal Steiner trees for given vetwork configurations. Comparitivie studies have shown that the evolutionary method finds on average a better solution than other conventional heustric algorithms.

  • PDF

Preoperative chemoradiation for locally advanced rectal cancer: comparison of three radiation dose and fractionation schedules

  • Park, Shin-Hyung;Kim, Jae-Chul
    • Radiation Oncology Journal
    • /
    • v.34 no.2
    • /
    • pp.96-105
    • /
    • 2016
  • Purpose: The standard radiation dose for patients with locally rectal cancer treated with preoperative chemoradiotherapy is 45-50 Gy in 25-28 fractions. We aimed to assess whether a difference exists within this dose fractionation range. Materials and Methods: A retrospective analysis was performed to compare three dose fractionation schedules. Patients received 50 Gy in 25 fractions (group A), 50.4 Gy in 28 fractions (group B), or 45 Gy in 25 fractions (group C) to the whole pelvis, as well as concurrent 5-fluorouracil. Radical resection was scheduled for 8 weeks after concurrent chemoradiotherapy. Results: Between September 2010 and August 2013, 175 patients were treated with preoperative chemoradiotherapy at our institution. Among those patients, 154 were eligible for analysis (55, 50, and 49 patients in groups A, B, and C, respectively). After the median follow-up period of 29 months (range, 5 to 48 months), no differences were found between the 3 groups regarding pathologic complete remission rate, tumor regression grade, treatment-related toxicity, 2-year locoregional recurrence-free survival, distant metastasis-free survival, disease-free survival, or overall survival. The circumferential resection margin width was a prognostic factor for 2-year locoregional recurrence-free survival, whereas ypN category was associated with distant metastasis-free survival, disease-free survival, and overall survival. High tumor regression grading score was correlated with 2-year distant metastasis-free survival and disease-free survival in univariate analysis. Conclusion: Three different radiation dose fractionation schedules, within the dose range recommended by the National Comprehensive Cancer Network, had no impact on pathologic tumor regression and early clinical outcome for locally advanced rectal cancer.

One time password key exchange Authentication technique based on MANET (MANET 기반 원타임 패스워드 키교환 인증기법)

  • Lee, Cheol-Seung;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1367-1372
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on MANET and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier. The suggested authentication technique requires exponentiation and is applicable in the wireless network environment because it transmits data at a time for key sharing, which proves it is a strong and reliable authentication technique based on the complete MANET.

The Effect of Family-Centered Practice on Children's Self-Efficacy -An Analysis of the Mediating Effect of Family Strengths- (가족중심실천이 아동의 자기효능감에 미치는 영향 -가족강점의 매개효과 분석-)

  • Kang, Mi-Kyung;Noh, Helen
    • Journal of the Korean Society of Child Welfare
    • /
    • no.40
    • /
    • pp.285-322
    • /
    • 2012
  • This study was conducted to explore the effect of family centered practice on children's self-efficacy and to verify the mediating effect of family strengths. Multiple regression analysis and Sobel test were conducted using data provided by children who participated in Children's Hope Network and their primary caretakers. The study results are as follows: First, families rated highly on their level of experience regarding family-centered practice, which show that social workers were faithful in performing family-centered practice. Second, the levels of both children's self-efficacy and family strengths increased significantly after project participation when compared to the levels measured before participation. Third, family-centered practice affected children's self-efficacy only indirectly through family strengths indicating that the level of family strengths had a complete mediating effect. Implications of these results were explored in relation to the importance of family-centered practice and measures to improve social work practice.

Vulnerability AssessmentunderClimateChange and National Water Management Strategy

  • Koontanakulvong, Sucharit;Suthinon, Pongsak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.204-204
    • /
    • 2016
  • Thailand had set the National Water Management Strategy which covered main six areas in the next 12 years, i.e., by priority: (1) water for household, (2) water for agricultural and industrial production, (3) water for flood and drought management, (4) water for quality issue, (5) water from forest conservation and soil erosion protection, (6) water resources management. However due to the climate change impact, there is a question for all strategies is whether to complete this mission under future climate change. If the impact affects our target, we have to clarify how to mitigate or to adapt with it. Vulnerability assessment was conducted under the framework of ADB's (with the parameters of exposure, sensitivity and adaptive capacity) and the assessments were classified into groups due to their different characteristic and the framework of the National Water Management Strategy, i.e., water supply (rural and urban), water for development (agriculture and others), water disasters (floods (flash, overflow), drought, water quality). The assessments identified the parameters concerned and weight factors used for each groups via expert group discussions and by using GIS mapping technology, the vulnerability maps were produced. The maps were verified with present water situation data (floods, drought, water quality). From the analysis result of this water resources management strategy, we found that 30% of all projects face the big impacts, 40% with low impact, and 30% for no impact. It is clear that water-related agencies have to carefully take care approximately 70% of future projects to meet water resources management strategy. It is recommended that additional issues should be addressed to mitigate the impact from climate risk on water resource management of the country, i.e., water resources management under new risk based on development scenarios, relationship with area-based problems, priority definition by viewpoints of risk, vulnerability (impact and occurrence probability in past and future), water management system in emergency case and water reserve system, use of information, knowledge and technology in management, network cooperation and exchange of experiences, knowledge, technique for sustainable development with mitigation and adaptation, education and communication systems in risk, new impact, and emergency-reserve system. These issues will be described and discussed.

  • PDF

Independent Set Bin Packing Algorithm for Routing and Wavelength Assignment (RWA) Problem (경로설정과 파장 배정 문제의 독립집합 상자 채우기 알고리즘)

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.111-118
    • /
    • 2015
  • This paper deals with the routing and wavelength assignment problem (RWAP) that decides the best lightpaths for multiple packet demands for (s,t) in optical communication and assigns the minimum number of wavelengths to given lightpaths. There has been unknown of polynomial-time algorithm to obtain the optimal solution for RWAP. Hence, the RWAP is classified as NP-complete problem and one can obtain the approximate solution in polynomial-time. This paper decides the shortest main and alternate lightpath with same hop count for all (s,t) for given network in advance. When the actual demands of communication for particular multiple packet for (s,t), we decrease the maximum utilized edge into b utilized number using these dual-paths. Then, we put these (s,t) into b-wavelength bins without duplicated edge. This algorithm can be get the optimal solution within O(kn) computational complexity. For two experimental data, the proposed algorithm shows that can be obtain the known optimal solution.

Investigating Major Topics Through the Analysis of Depression-related Facebook Group Posts (페이스북 그룹 게시물 분석을 통한 우울증 관련 주제에 대한 고찰)

  • Zhu, Yongjun;Kim, Donghun;Lee, Changho;Lee, Yongjeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.4
    • /
    • pp.171-187
    • /
    • 2019
  • The study aims to analyze the posts of depression-related Facebook groups to understand major topics discussed by group users. Specifically, the purpose of the study is to identify the topics and keywords of the posts to understand what users discuss about depression. Depression is a mental disorder that is somewhat sensitive in the online community, which is characterized by accessibility, openness and anonymity. The researchers have implemented a natural language-based data analysis framework that includes components ranging from Facebook data collection to the automated extraction of topics. Using the framework, we collected and analyzed 885 posts created in the past one year from the largest Facebook depression group. To derive more complete and accurate topics, we combined both automated and manual (e.g., stop words removal, topic size determination) methods. Results indicate that users discuss a variety of topics including depression in general, human relations, mood and feeling, depression symptoms, suicide, medical references, family and etc.

A Study on Architectural Continuity of the Memorial to the Murdered Jews of Europe (유럽의 학살된 유대인을 위한 기념비 건축의 연속성에 관한 연구)

  • Kim, Myungshig
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.12
    • /
    • pp.83-92
    • /
    • 2019
  • The purpose of this study is to analyze the continuous forms of time and space that work as architectural design principles of the Memorial to the Murdered Jews of Europe (Jewish Memorial). Continuity is divided into two, physical and non-physical attributes. The former extends from small installations to furnitures, finishes, spatial composition, and even spatial networks that complete architecture, and the latter is tied to time, from traditional to historical, developmental, commemorative or memorial elements. They are inherent in architecture as continuous forms. The Jewish Memorial is analyzed by the analysing framework of these two items. The analysis of the two layers can be summarized as follows; physical continuity is found in the space networks of the Memorial's inside and outside, the undulating spaces, the finishes, the small furnitures and installations, the entrances of staircases, the expanded underground of the ground order, and non-physical continuity manifests in the topological variation of spatiality, the morphological development of memorial architecture, the connection of semantic sense of space, and the superposition of historicity and modernity. These forms of continuity do not aestheticize the German enormity history, but make the meaning of the Memorial into non-superficial, in-depth architecture as a monument. Thus, the results of this study show that physical and non-physical continuity should be considered as the important design principles of architecture that makes the Memorial architecture possible.

Study on Detection Technique for Coastal Debris by using Unmanned Aerial Vehicle Remote Sensing and Object Detection Algorithm based on Deep Learning (무인항공기 영상 및 딥러닝 기반 객체인식 알고리즘을 활용한 해안표착 폐기물 탐지 기법 연구)

  • Bak, Su-Ho;Kim, Na-Kyeong;Jeong, Min-Ji;Hwang, Do-Hyun;Enkhjargal, Unuzaya;Kim, Bo-Ram;Park, Mi-So;Yoon, Hong-Joo;Seo, Won-Chan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1209-1216
    • /
    • 2020
  • In this study, we propose a method for detecting coastal surface wastes using an UAV(Unmanned Aerial Vehicle) remote sensing method and an object detection algorithm based on deep learning. An object detection algorithm based on deep neural networks was proposed to detect coastal debris in aerial images. A deep neural network model was trained with image datasets of three classes: PET, Styrofoam, and plastics. And the detection accuracy of each class was compared with Darknet-53. Through this, it was possible to monitor the wastes landing on the shore by type through unmanned aerial vehicles. In the future, if the method proposed in this study is applied, a complete enumeration of the whole beach will be possible. It is believed that it can contribute to increase the efficiency of the marine environment monitoring field.