• Title/Summary/Keyword: New Address Information

Search Result 703, Processing Time 0.027 seconds

Privacy-Preservation Using Group Signature for Incentive Mechanisms in Mobile Crowd Sensing

  • Kim, Mihui;Park, Younghee;Dighe, Pankaj Balasaheb
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1036-1054
    • /
    • 2019
  • Recently, concomitant with a surge in numbers of Internet of Things (IoT) devices with various sensors, mobile crowdsensing (MCS) has provided a new business model for IoT. For example, a person can share road traffic pictures taken with their smartphone via a cloud computing system and the MCS data can provide benefits to other consumers. In this service model, to encourage people to actively engage in sensing activities and to voluntarily share their sensing data, providing appropriate incentives is very important. However, the sensing data from personal devices can be sensitive to privacy, and thus the privacy issue can suppress data sharing. Therefore, the development of an appropriate privacy protection system is essential for successful MCS. In this study, we address this problem due to the conflicting objectives of privacy preservation and incentive payment. We propose a privacy-preserving mechanism that protects identity and location privacy of sensing users through an on-demand incentive payment and group signatures methods. Subsequently, we apply the proposed mechanism to one example of MCS-an intelligent parking system-and demonstrate the feasibility and efficiency of our mechanism through emulation.

A Novel Dynamic Optimization Technique for Finding Optimal Trust Weights in Cloud

  • Prasad, Aluri V.H. Sai;Rajkumar, Ganapavarapu V.S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2060-2073
    • /
    • 2022
  • Cloud Computing permits users to access vast amounts of services of computing power in a virtualized environment. Providing secure services is essential. There are several problems to real-world optimization that are dynamic which means they tend to change over time. For these types of issues, the goal is not always to identify one optimum but to keep continuously adapting to the solution according to the change in the environment. The problem of scheduling in Cloud where new tasks keep coming over time is unique in terms of dynamic optimization problems. Until now, there has been a large majority of research made on the application of various Evolutionary Algorithms (EAs) to address the issues of dynamic optimization, with the focus on the maintenance of population diversity to ensure the flexibility for adapting to the changes in the environment. Generally, trust refers to the confidence or assurance in a set of entities that assure the security of data. In this work, a dynamic optimization technique is proposed to find an optimal trust weights in cloud during scheduling.

WACFI: Code Instrumentation Technique for Protection of Indirect Call in WebAssembly (WACFI: 웹 어셈블리에서의 간접호출 명령어 보호를 위한 코드 계측 기술)

  • Chang, Yoonsoo;Kim, Youngju;Kwon, Donghyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.753-762
    • /
    • 2021
  • WebAssembly(WASM) is a low-level instruction format that can be run in a web environment. Since WASM has a excellent performance, various web applications use webassembly. However, according to our security analysis WASM has a security pitfall related to control flow integrity (CFI) for indirect calls. To address the problem in this paper we propose a new code instrumentation scheme to protect indirect calls, named WACFI. Specifically WACFI enhances a CFI technique for indirect call in WASM based on source code anlysis and binary instrumentation. To test the feasibility of WACFI, we applied WACFI to a sound-encoding application. According to our experimental results WACFI only adds 2.75% overhead on the execution time while protecting indirect calls safely.

Beam Tracking Method Using Unscented Kalman Filter for UAV-Enabled NR MIMO-OFDM System with Hybrid Beamforming

  • Yuna, Sim;Seungseok, Sin;Jihun, Cho;Sangmi, Moon;Young-Hwan, You;Cheol Hong, Kim;Intae, Hwang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.280-294
    • /
    • 2023
  • Unmanned aerial vehicles (UAVs) and millimeter-wave frequencies play key roles in supporting 5G wireless communication systems. They expand the field of wireless communication by increasing the data capacities of communication systems and supporting high data rates. However, short wavelengths, owing to the high millimeter-wave frequencies can cause problems, such as signal attenuation and path loss. To address these limitations, research on high directional beamforming technologies continue to garner interest. Furthermore, owing to the mobility of the UAVs, it is essential to track the beam angle accurately to obtain full beamforming gain. This study presents a beam tracking method based on the unscented Kalman filter using hybrid beamforming. The simulation results reveal that the proposed beam tracking scheme improves the overall performance in terms of the mean-squared error and spectral efficiency. In addition, by expanding analog beamforming to hybrid beamforming, the proposed algorithm can be used even in multi-user and multi-stream environments to increase data capacity, thereby increasing utilization in new-radio multiple-input multiple-output orthogonal frequency-division multiplexing systems.

Crop Leaf Disease Identification Using Deep Transfer Learning

  • Changjian Zhou;Yutong Zhang;Wenzhong Zhao
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.149-158
    • /
    • 2024
  • Traditional manual identification of crop leaf diseases is challenging. Owing to the limitations in manpower and resources, it is challenging to explore crop diseases on a large scale. The emergence of artificial intelligence technologies, particularly the extensive application of deep learning technologies, is expected to overcome these challenges and greatly improve the accuracy and efficiency of crop disease identification. Crop leaf disease identification models have been designed and trained using large-scale training data, enabling them to predict different categories of diseases from unlabeled crop leaves. However, these models, which possess strong feature representation capabilities, require substantial training data, and there is often a shortage of such datasets in practical farming scenarios. To address this issue and improve the feature learning abilities of models, this study proposes a deep transfer learning adaptation strategy. The novel proposed method aims to transfer the weights and parameters from pre-trained models in similar large-scale training datasets, such as ImageNet. ImageNet pre-trained weights are adopted and fine-tuned with the features of crop leaf diseases to improve prediction ability. In this study, we collected 16,060 crop leaf disease images, spanning 12 categories, for training. The experimental results demonstrate that an impressive accuracy of 98% is achieved using the proposed method on the transferred ResNet-50 model, thereby confirming the effectiveness of our transfer learning approach.

Trends in the AI-based Banking Conversational Agents Literature: A Bibliometric Review

  • Eden Samuel Parthiban;Mohd. Adil
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.702-736
    • /
    • 2023
  • Artificial Intelligence (AI) and the technologies powered by AI fuel the fourth industrial revolution. Being the primary adopter of such innovations, banking has recently started using the most common AI-based technology, i.e., conversational agents. Although research extensively focuses on this niche area and provides bibliometric understanding for such agents in other industries, a similar review with scientometric insights of the banking literature concerning AI conversational agents is absent till date. Furthermore, in the era following the pandemic, banks are faced with the imperative to provide solutions that align with the changing landscape of remote consumer behavior. As a result, banks are proactively integrating technology-driven solutions, such as automated agents, to effectively address the growing demand for remote customer support. Hence more research is needed to perfect such agents. In order to bridge these existing gaps, the present study undertook a comprehensive examination of two decades' worth of banking literature. A meticulous review was conducted, analyzing approximately 116 papers published from 2003 to 2023. The aim was to provide a scientometric overview of the topic, catering to the research needs of both academic and industrial professionals. Holistically, the study seeks to present a macro-view about the existing trends in AI based banking conversational agents' literature while focusing on quantity, qualitative and structural indicators that are effectively necessary to offer new directions for the AI-based banking solutions. Our study, therefore, presents insights surrounding the literature, using selected techniques related to performance analysis and science mapping.

Development of a Safety Management Support System for Construction Sites Using Pinpoint Weather Forecast Information

  • Moe SHIGAKI;Kentaro HAYAKAWA;Hiroyuki AKITA;Michiko SHIMIZU;Mika SAKURAMOTO
    • International conference on construction engineering and project management
    • /
    • 2024.07a
    • /
    • pp.256-263
    • /
    • 2024
  • The increasing occurrence of abnormal weather conditions such as unusually heavy rains and strong winds adversely affects construction work. However, although these phenomena are localized, conventional weather forecasts have insufficient spatial resolution and update frequency to accurately predict weather conditions at construction sites. To address this issue, we introduced a pinpoint weather forecasting technology that improves spatial resolution and update frequency. The weather information obtained from this technology is processed and provided to construction sites in a comprehensible state, which enables construction workers to better prepare for weather conditions, thereby reducing the risk of accidents and delays. Furthermore, a safety management system was developed based on the relationship between weather and labor accidents. Predicting workplace accidents that are likely to occur on that day based on the impact of weather on the body enabled performing safety awareness activities, such as morning and lunch meetings, from a new perspective, improving safety awareness among construction workers and reducing the number of accidents on construction sites. This paper describes the development process of the proposed system and the utilization of weather forecasting at construction sites, which can be applied to other industries and contribute to improving safety and efficiency in various fields.

Security Knowledge Classification Framework for Future Intelligent Environment (미래 융합보안 인력양성을 위한 보안교육과정 분류체계 설계)

  • Na, Onechul;Lee, Hyojik;Sung, Soyung;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.3
    • /
    • pp.47-58
    • /
    • 2015
  • Recently, new information security vulnerabilities have proliferated with the convergence of information security environments and information and communication technology. Accordingly, new types of cybercrime are on the rise, and security breaches and other security-related incidents are increasing rapidly because of security problems like external cyberattacks, leakage by insiders, etc. These threats will continue to multiply as industry and technology converge. Thus, the main purpose of this paper is to design and present security subjects in order to train professional security management talent who can deal with the enhanced threat to information. To achieve this, the study first set key information security topics for business settings on the basis of an analysis of preceding studies and the results of a meeting of an expert committee. The information security curriculum taxonomy is developed with reference to an information security job taxonomy for domestic conditions in South Korea. The results of this study are expected to help train skilled security talent who can address new security threats in the future environment of industrial convergence.

Energy and Delay-Efficient Multipath Routing Protocol for Supporting Mobile Sink in Wireless Sensor Networks (무선 센서 네트워크에서 이동 싱크를 지원하기 위한 다중 경로 라우팅 프로토콜)

  • Lee, Hyun Kyu;Lee, Euisin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.447-454
    • /
    • 2016
  • The research on multipath routing has been studied to solve the problem of frequent path breakages due to node and link failures and to enhance data delivery reliability in wireless sensor networks. In the multipath routing, mobile sinks such as soldiers in battle fields and rescuers in disaster areas bring about new challenge for handling their mobility. The sink mobility requests new multipath construction from sources to mobile sinks according to their movement path. Since mobile sinks have continuous mobility, the existing multipath can be exploited to efficiently reconstruct to new positions of mobile sinks. However, the previous protocols do not address this issue. Thus, we proposed an efficient multipath reconstruction protocol called LGMR for mobile sinks in wireless sensor networks. The LGMR address three multipath reconstruction methods based on movement types of mobile sinks: a single hop movement-based local multipath reconstruction, a multiple hop movement-based local multipath reconstruction, and a multiple hop movement-based global multipath reconstruction. Simulation results showed that the LGMR has better performance than the previous protocol in terms of energy consumption and data delivery delay.

New Approach for Detecting Leakage of Internal Information; Using Emotional Recognition Technology

  • Lee, Ho-Jae;Park, Min-Woo;Eom, Jung-Ho;Chung, Tai-Myoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4662-4679
    • /
    • 2015
  • Currently, the leakage of internal information has emerged as one of the most significant security concerns in enterprise computing environments. Especially, damage due to internal information leakage by insiders is more serious than that by outsiders because insiders have considerable knowledge of the system's identification and password (ID&P/W), the security system, and the main location of sensitive data. Therefore, many security companies are developing internal data leakage prevention techniques such as data leakage protection (DLP), digital right management (DRM), and system access control, etc. However, these techniques cannot effectively block the leakage of internal information by insiders who have a legitimate access authorization. The security system does not easily detect cases which a legitimate insider changes, deletes, and leaks data stored on the server. Therefore, we focused on the insider as the detection target to address this security weakness. In other words, we switched the detection target from objects (internal information) to subjects (insiders). We concentrated on biometrics signals change when an insider conducts abnormal behavior. When insiders attempt to leak internal information, they appear to display abnormal emotional conditions due to tension, agitation, and anxiety, etc. These conditions can be detected by the changes of biometrics signals such as pulse, temperature, and skin conductivity, etc. We carried out experiments in two ways in order to verify the effectiveness of the emotional recognition technology based on biometrics signals. We analyzed the possibility of internal information leakage detection using an emotional recognition technology based on biometrics signals through experiments.