• Title/Summary/Keyword: Online Network

Search Result 1,282, Processing Time 0.026 seconds

Development of High Speed Scalar Product Operation System for ECC Public Key (타원곡선 공개키 생성을 위한 고속 스칼라곱 연산 시스템 구현)

  • Kim, Kap-Yol;Lee, Chul-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.394-402
    • /
    • 2010
  • At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.

Designing an Efficient and Secure Credit Card-based Payment System with Web Services Based on the ANSI X9.59-2006

  • Cheong, Chi Po;Fong, Simon;Lei, Pouwan;Chatwin, Chris;Young, Rupert
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.495-520
    • /
    • 2012
  • A secure Electronic Payment System (EPS) is essential for the booming online shopping market. A successful EPS supports the transfer of electronic money and sensitive information with security, accuracy, and integrity between the seller and buyer over the Internet. SET, CyberCash, Paypal, and iKP are the most popular Credit Card-Based EPSs (CCBEPSs). Some CCBEPSs only use SSL to provide a secure communication channel. Hence, they only prevent "Man in the Middle" fraud but do not protect the sensitive cardholder information such as the credit card number from being passed onto the merchant, who may be unscrupulous. Other CCBEPSs use complex mechanisms such as cryptography, certificate authorities, etc. to fulfill the security schemes. However, factors such as ease of use for the cardholder and the implementation costs for each party are frequently overlooked. In this paper, we propose a Web service based new payment system, based on ANSI X9.59-2006 with extra features added on top of this standard. X9.59 is an Account Based Digital Signature (ABDS) and consumer-oriented payment system. It utilizes the existing financial network and financial messages to complete the payment process. However, there are a number of limitations in this standard. This research provides a solution to solve the limitations of X9.59 by adding a merchant authentication feature during the payment cycle without any addenda records to be added in the existing financial messages. We have conducted performance testing on the proposed system via a comparison with SET and X9.59 using simulation to analyze their levels of performance and security.

Application of HHT for Online Detection of Inter-Area Short Circuits of Rotor Windings of Turbo-Generators Based on the Thermodynamics Modeling Method

  • Wang, Liguo;Wang, Yi;Xu, Dianguo;Fang, Bo;Liu, Qinghe;Zou, Jing
    • Journal of Power Electronics
    • /
    • v.11 no.5
    • /
    • pp.759-766
    • /
    • 2011
  • This paper focuses on monitoring and predicting the short circuit faults of the rotor windings of large turbo-generator systems. For the purpose of increasing efficiency and decreasing maintenance cost, a method that combines the HHT (Hilbert Huang Transform) with a wavelet has been studied. This method is based on analyzing a classical Albright detecting coil. Due to the Empirical Mode Decomposition (EMD) and the Intrinsic Mode Functions (IMF) of the HHT the exact location of a short circuit of rotor windings may be given. However, a part of the useful information is eliminated by the unreasonable decomposing scale of the wavelet. Based on the thermodynamics modeling method, this study was illustrated with a 50MW turbo-generator system that is installed in Northern China. The analysis results, which have very good agreement with those of a previous study, show that the method of combining the HHT with a wavelet is an effective way to analyze and predict the short circuit faults of the rotor windings of large generators, such as supercritical turbo-generator systems and wind turbo-generator systems. This work can offer a useful reference for analyzing smart grids by improving the power quality of a distribution network that is supplied by a turbo-generator system.

BLE Beacon Based Online Offline Tourism and Solutions for Regional Tourism Activation (지역관광 활성화를 위한 비콘 기반의 온오프라인 관광 솔루션)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.2
    • /
    • pp.21-26
    • /
    • 2016
  • In this paper, it is possible to update the tourist information in real time, on/off-line tour proposes a solution(BBTS) based on a bluetooth beacon can provide tourist information without the need for wireless data network. BBTS consists of a bluetooth based data of the low-power supply system and the beacons and interoperable smart applications. Data supply system consists of the BLE & Beacon Pairing-based / non-pairing data transmission module with integral hardware. Smart application modules that provide indoor location of users information, internal server module and tourist information collection and information guide around comprised of applications. The proposed BBTS is possible that indoor service tourism tourist demand due to utilizing the beacon technology. Outdoor tourist information is designed to be downloaded to the smartphone receives the information received from the beacon APK file to provide services. BBTS system is expected to make a big impact on the smart tourism services industry.

Identifying Influential Users of College Sports Teams' Social Media Accounts (대학스포츠팀 SNS의 영향력 있는 사용자의 분석)

  • Kim, Suk-Kyu;Park, Jae-Ahm;Dittmore, Stephen W.
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.2
    • /
    • pp.1016-1025
    • /
    • 2015
  • This study tried to identify the influential users of college sports teams' Twitter accounts and categorize them into three groups including an official account, media account, and layperson account. A total of 14 Twitter accounts at NCAA Division 1 universities were selected through convenience sampling method. In men's sports, the greatest number of influential users was layperson account followed by media account and official account. In women's sports, the greatest number of influential users was layperson account followed by official account and media account. The results provided the insight of college sports online social network and will expand the growing literature on social media in sport and offer practical data for marketers to use social media more effectively.

A Study on the Performance Evaluation of Elliptic Curve Cryptography based on a Real Number Field (실수체 기반 타원곡선 암호의 성능 평가에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1439-1444
    • /
    • 2013
  • Recently, as the use of the applications like online banking and stock trading is increasing by the rapid development of the network, security of data content is becoming more and more important. Accordingly, public key or symmetric key encryption algorithm is widely used in open networks such as the internet for the protection of data. Generally, public key cryptographic systems is based on two famous number theoretic problems namely factoring or discrete logarithm problem. So, public key cryptographic systems is relatively slow compared to symmetric key cryptography systems. Among public key cryptographic systems, the advantage of ECC compared to RSA is that it offers equal security for a far smaller key. For this reason, ECC is faster than RSA. In this paper, we propose a efficient key generation method for elliptic curve cryptography system based on the real number field.

Status of Document Delivery, Interlibrary Loan Services and Use of Information Technology in Korean Special Libraries (국내 특수 도서관에서의 원문제공과 상호대차 서비스 및 정보기술의 활용 현황)

  • Rieh Hae-young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.31 no.3
    • /
    • pp.53-73
    • /
    • 1997
  • To find out the status of document delivery and interlibrary loan services and the use of information technology in special libraries, questionnaires were sent to 328 special Libraries nation wide with at least 1 librarian, listed In the Korean Libraries Statistics 1994-1995(1996). $46.6\%$ were returned and 152 Questionnaires were analyzed. For document delivery, $61.3\%$ use BLDSC$47.5\%$ use KINITI. 87 libararies $(57.2\%)$ participate In interlibrary loan activities. To send requests, FAX and telephone is used the most, while FAX and print copy is used the most to receive the requested documents. $45-75\%$ use various information technology including online databases, Internet, e-mail, etc., and the use of information technology was related to the budget of the libraries. The costs, budgets, and slowness was the problems raised by the most. To improve the document delivery services, the most urgent thing is establishing cooperative system using BBS or Internet. Network systems to facilitate interlibrary loan should be established ultimately.

  • PDF

Classical Music Review on Instagram: Accumulating Cultural Capital through Inter-Learning (클래식음악 애호가의 인스타그램 리뷰: 상호 학습을 통한 문화자본 축적)

  • Seong, Yeonju
    • Review of Culture and Economy
    • /
    • v.21 no.2
    • /
    • pp.111-139
    • /
    • 2018
  • This study is about classical music lovers who write a lengthy concert review on instagram. The intention and objective of writing a review is discussed in addition to inter-communication between those reviewers. For the analysis, an interview with 8 reviewers are mainly analyzed with their reviews. As a result, it is found that some affordances of Instagram, easiness, randomness, and friendliness affects them to use Instagram more than other social media. Hence, since Instagram is image-based platform, it helps writers to keep their reviews from getting an attention by other users. Because of their sense of inferiority that they are lacking in classical music knowledge, continuous writing and reading of reviews help them accumulating some amount of cultural capital needed for understanding classical music in a proper way.

Investigating Major Topics Through the Analysis of Depression-related Facebook Group Posts (페이스북 그룹 게시물 분석을 통한 우울증 관련 주제에 대한 고찰)

  • Zhu, Yongjun;Kim, Donghun;Lee, Changho;Lee, Yongjeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.53 no.4
    • /
    • pp.171-187
    • /
    • 2019
  • The study aims to analyze the posts of depression-related Facebook groups to understand major topics discussed by group users. Specifically, the purpose of the study is to identify the topics and keywords of the posts to understand what users discuss about depression. Depression is a mental disorder that is somewhat sensitive in the online community, which is characterized by accessibility, openness and anonymity. The researchers have implemented a natural language-based data analysis framework that includes components ranging from Facebook data collection to the automated extraction of topics. Using the framework, we collected and analyzed 885 posts created in the past one year from the largest Facebook depression group. To derive more complete and accurate topics, we combined both automated and manual (e.g., stop words removal, topic size determination) methods. Results indicate that users discuss a variety of topics including depression in general, human relations, mood and feeling, depression symptoms, suicide, medical references, family and etc.

A study of factors on intention of intervention and posting malicious comments (악성댓글 작성과 중재 의도에 대한 요인 연구)

  • Kim, Han-Min;Park, Kyungbo
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.197-206
    • /
    • 2018
  • The harmful effects of online malicious comments are continuously increasing. Many previous studies have confirmed that neutralization of malicious comments is a key predictor. Neutralization is theoretically composed of seven multidimensional concepts, and the significance of neutralization factors varies depending on the type of deviant behavior. This study focuses on the fact that the malicious comment researches have considered the neutralization techniques in a single dimension as opposed to demonstrating the multidimensional neutralization techniques in the deviant behavior research. On the other hand, the role of arbitrator in deviant behavior can contribute to restraining deviant behavior, but the research of intervention intention is relatively lacking in malicious comments research. This study, composed of two complementary studies, tried to find out the related factors of malicious comments and intervention intention. As a result of study, This study revealed that malicious commentator uses the neutralization techniques of condemn the condemners and denial of responsibility. In addition, we found that affective empathy has a significant effect on the intervention intention in malicious comments.