• 제목/요약/키워드: Correction Security

검색결과 87건 처리시간 0.025초

An Efficient Biometric Identity Based Signature Scheme

  • Yang, Yang;Hu, Yupu;Zhang, Leyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권8호
    • /
    • pp.2010-2026
    • /
    • 2013
  • The combination of biometrics and cryptography gains a lot of attention from both academic and industry community. The noisy biometric measurement makes traditional identity based cryptosystems unusable. Also the extraction of key from biometric information is difficult. In this paper, we propose an efficient biometric identity based signature scheme (Bio-IBS) that makes use of fuzzy extractor to generate the key from a biometric data of user. The component fuzzy extraction is based on error correction code. We also prove that the security of suggested scheme is reduced to computational Diffie-Hellman (CDH) assumption instead of other strong assumptions. Meanwhile, the comparison with existing schemes shows that efficiency of the system is enhanced.

Orthogonal variable spreading factor encoded unmanned aerial vehicle-assisted nonorthogonal multiple access system with hybrid physical layer security

  • Omor Faruk;Joarder Jafor Sadiqu;Kanapathippillai Cumanan;Shaikh Enayet Ullah
    • ETRI Journal
    • /
    • 제45권2호
    • /
    • pp.213-225
    • /
    • 2023
  • Physical layer security (PLS) can improve the security of both terrestrial and nonterrestrial wireless communication networks. This study proposes a simplified framework for nonterrestrial cyclic prefixed orthogonal variable spreading factor (OVSF)-encoded multiple-input and multiple-output nonorthogonal multiple access (NOMA) systems to ensure complete network security. Various useful methods are implemented, where both improved sine map and multiple parameter-weighted-type fractional Fourier transform encryption schemes are combined to investigate the effects of hybrid PLS. In addition, OVSF coding with power domain NOMA for multi-user interference reduction and peak-toaverage power ratio (PAPR) reduction is introduced. The performance of $\frac{1}{2}$-rated convolutional, turbo, and repeat and accumulate channel coding with regularized zero-forcing signal detection for forward error correction and improved bit error rate (BER) are also investigated. Simulation results ratify the pertinence of the proposed system in terms of PLS and BER performance improvement with reasonable PAPR.

Direct Current Control Method Based On One Cycle Controller for Double-Frequency Buck Converters

  • Luo, Quanming;Zhi, Shubo;Lu, Weiguo;Zhou, Luowei
    • Journal of Power Electronics
    • /
    • 제12권3호
    • /
    • pp.410-417
    • /
    • 2012
  • In this paper, a direct current control method based on a one-cycle controller (DCOCC) for double frequency buck converters (DF buck) is proposed. This control method can make the average current through the high frequency and low frequency inductors of a DF buck converter equal. This is similar to the average current control method. However, the design of the loop compensator is much easier when compared with the average current control. Since the average current though the high frequency and low frequency inductors is equivalent, the current stress of the high frequency switches and the switch losses are minimized. Therefore, the efficiency of the DF buck converter is improved. Firstly, the operation principle of DCOCC is described, then the small signal models of a one cycle controller and a DF buck converter are presented based on the state space average method. Eventually, a system block diagram of the DCOCC controlled DF buck is established and the compensator is designed. Finally, simulation and experiment results are given to verify the correction of the theory analysis.

경험적 룰에 의한 송전계통의 거리계전 방식 협조 (Heuristic rule-based coordination of Distance Relaying in Transmission System)

  • 이승재;이병철;윤상현;윤만철;이상옥
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1990년도 하계학술대회 논문집
    • /
    • pp.121-124
    • /
    • 1990
  • Distance relaying is one of the most commonly used protection schemes in the high voltage transmission systems. In this scheme, coordination between the primary and backup relays is very critical for the power system security. This paper reports an rule-based methodology for checking and correction of miscoordination problems in the distance relaying. Diagnosis rules achieving an accurate but simple checking have been developed through the geometric analysis of the impedance characteristics of the distance relays. Heuristic rules having the pratical power for miscoordination correction are suggested. The proposed method has proved very effective through the several case studies on the actual systems.

  • PDF

여성살인범의 심리적 특성에 관한 연구 -분노특성을 중심으로- (A Study on Psychological Characteristics of Female Murderers -FOCUS ON ANGER STYLE-)

  • 김상균
    • 시큐리티연구
    • /
    • 제4호
    • /
    • pp.47-64
    • /
    • 2001
  • The aim of this study is to investigate the anger characteristics and the social psychological characteristics of Homicide by Female. With SPSS win program I analyzed 80 female murderers caught in the correction facility. The analysis results are as follows : Firstly, the age bracket of the female murderers is very high in their thirties(47.5%), they didn't almost graduate from the middle-school(65%). Secondly, they almost married(92.5%) and their job was the housekeeper(52.5%). Thirdly, the female murderers almost killed their husbands(45%) and other victims was people who was familiar with the female murderer. Fourth, the offenders were afraid that the victims had the responsibility for murder(87.5%). Fifthly, according to above analysis, the character type female murderers was almost anger-in type. Finally, My analysis shows us that the anger characteristics between offenders and victims was very similar. With the above research results, I can understand the socio-psychological characteristics of the female murderer. However, this paper has some problems which is the limit of the sampling range and the generalization of research results. In addition, we need to study the comparison with male murderers and female murderers.

  • PDF

RN-ECC Based Fuzzy Vault for Protecting Fingerprint Templates

  • Lee, Dae-Jong;Shin, Yong-Nyuo;Park, Seon-Hong;Chun, Myung-Geun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제11권4호
    • /
    • pp.286-292
    • /
    • 2011
  • Biometrics systems are used in a wide range of areas, including the area of crime prevention, due to their unique characteristics. However, serious problems can occur if biometric information is disclosed to an unauthorized user. To address these issues, this paper proposes a real valued fuzzy vault method, which adopts a real number error correction code to implement a fuzzy vault scheme for protecting fingerprint temples. The proposed method provides the benefit of allowing the private key value to be changed at any time, unlike biometric template such as a fingerprint, which is not easily renewable even if its security has been breached. The validity of the proposed method is verified for fingerprint verification.

전력 계통 이상 상태 Guidance System 개발 (A Development of On-Line Guidance System for Power System)

  • 오승렬;백영식;김정년;한무호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 추계학술대회 논문집 전력기술부문
    • /
    • pp.47-49
    • /
    • 2002
  • Recently, the power system has a trend of a sustaining growth in electric power demand with large-sized formation. In this situation, current states can be definitely comprehended to operate security and economic power system. Also, corrective actions must be performed for the violation of bus voltage and line overload. In the security and economy with on-line, It is desirable that the situations of violation are promptly removed to operate power system effectively. This paper deals with the development of application, Kangyang Steel Works' Power System Guidance System, for voltage and overload correction on base case using Generator-Voltage Sensitivity List(GVSL) and Generator Shifter Factor List(GSFL). Also, to show the superiority and economical efficiency of the proposed application, we simulate the Kangyang Steel Works' Power System.

  • PDF

멀티캐스트 환경에서의 패킷 손실을 고려한 인증기법 설계 및 분석 (A Design and Analysis of Authentication Scheme for Tolerating Packet Loss in the Multicast Environment)

  • 임정미;박철훈;유선영;박창섭
    • 정보보호학회논문지
    • /
    • 제13권6호
    • /
    • pp.163-172
    • /
    • 2003
  • 본 논문에서는 인터넷 멀티캐스트 환경하에서의 멀티미디어 스트리밍 데이터에 대한 인증 메커니즘을 제안한다. 최근, 신뢰성 있는 멀티캐스트 전송에 응용되어지고 있는 패킷 계층에서의 전방 오류수정부호를 멀티캐스트 인증 메커니즘과 연동시킨다. 이와 관련하여, 전송과정에서 일부 패킷들이 손실되어진다고 할지라도 다른 패킷들에 대한 개별 인증에는 영향을 미치지 않게 하기 위하여 Reed-Solomon 삭제부호를 적용한다.

An Updated Evidence-based Practice Review on Teaching Mathematics to Students with Intellectual Disabilities

  • Alhwaiti, Mohammed M.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.255-265
    • /
    • 2022
  • Educational programs for students with intellectual disabilities have undergone drastic changes in pursuit of the general curriculum. Accordingly, teachers in various fields, including mathematics, strive to find effective methods that enhance learning. The objective of this systematic review is to examine the field of teaching mathematics to students with intellectual disabilities to investigate relevant effective teaching strategies and required teaching skills. To achieve this goal, studies published during the period 2018-2021 were reviewed. Findings indicate the inclusion of nine studies that met the inclusion criteria out of 55 studies. The included studies found that the system of least prompts (SLP) in conjunction with feedback and error correction, and schema-based instruction are generally the most effective strategies in teaching mathematical skills to students with intellectual disabilities. Addition is the most targeted skill, followed by subtraction and algebra problem solving. The least targeted skills are multiplication, recognition of geometric shapes, calculating price after discount, rapid recognition of numbers, and rapid problem solving. The paper provides recommendations and suggests venues of future research.

오류 정정 부호를 활용한 고신뢰 차등 프라이버시 기법 (Highly Reliable Differential Privacy Technique Utilizing Error Correction Encoding)

  • 지승하;전소은;이일구
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2024년도 춘계학술발표대회
    • /
    • pp.243-244
    • /
    • 2024
  • IoT 장치의 개수가 급증함에 따라 네트워크 환경에서 송수신되는 데이터 양이 증가하였고, 이에 따라 데이터 전송과정의 보안 강화가 중요해지고 있다. 기존에는 데이터에 인공 노이즈를 추가하는 차등 프라이버시 기법(Differential Privacy, DP)을 적용하여 데이터를 보호하고 있다. 하지만 DP가 적용된 데이터를 수신하는 정상 사용자의 머신러닝 학습 정확도가 감소되는 문제가 있다. 본 논문에서는 고신뢰 데이터 전송을 위한 데이터 인코딩 기반의 DP 기법인 EN-DP (Encoding-based DP) 모델을 제안한다. 실험 결과에 따르면, EN-DP 를 통한 정상 사용자와 공격자 간의 학습 능력 정확도 간극을 종래 모델 대비 최대 17.16% 개선할 수 있음을 입증하였다.