• Title/Summary/Keyword: Operation Problem

Search Result 3,658, Processing Time 0.036 seconds

A Remote Authentication Protocol Using Smartcard to Guarantee User Anonymity (사용자 익명성을 제공하는 스마트카드 기반 원격 인증 프로토콜)

  • Baek, Yi-Roo;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.229-239
    • /
    • 2009
  • To solve user authentication problem, many remote user authentication schemes using password and smart card at the same time have been proposed. Due to the increasing of interest in personal privacy, there were some recent researches to provide user anonymity. In 2004, Das et al. firstly proposed an authentication scheme that guarantees user anonymity using a dynamic ID. In 2005, Chien et al. pointed out that Das et al.'s scheme has a vulnerability for guaranteing user anonymity and proposed an improved scheme. However their authentication scheme was found some weaknesses about insider attack, DoS attack, and restricted replay attack. In this paper, we propose an enhanced scheme which can remove vulnerabilities of Chien et al.'s scheme. The proposed authentication protocol prevented insider attack by using user's Nonce value and removed the restricted replay attack by replacing time stamp with random number. Furthermore, we improved computational efficiency by eliminating the exponentiation operation.

  • PDF

Latissimus Dorsi Transfer in Brachial Plexus Injury for the Elbow Flexion (상완 신경총 손상후 주관절 근력 회복을 위한 광배근 전이술)

  • Han, Chung-Soo;Chung, Duke-Whan;Soh, Jae-Ho
    • Archives of Reconstructive Microsurgery
    • /
    • v.7 no.1
    • /
    • pp.35-40
    • /
    • 1998
  • The incidence of brachial plexus injury is increasing because of the development of motor vehicle but the the results of treatment was reported poor due to its complex anatomical structure and changes of function and sensory during the recovery after trauma. But the results of treatment has been improved by the recently introduced high sensitive diagnostic method that can evaluate accurately the site and extent of the injury and treatment method. Restoration of the elbow flexion is the most important goal of treatment after brachial plexus injury and nerve graft, neurotization and muscle transfer were used for methods of treatment. From December 1992 to May 1994, the author performed 6 cases of latissimus dorsi transfer at the same side for the improvement of elbow flexion in the patients of brachial plexus injury. There were 5 cases of male, one case of female and average age was 22 years old. The causes of injury were traffic accident in 3 cases, gun shot injury, falldown and birth injury in each one case and in all cases, the type of injury were upper arm type. The average follow up period were 1 year 5 months ranging from 12 months to 4 years 5 months. In all cases, active elbow flexion was impossible before operation and average muscle power was grade I. We analysed the active range of motion, muscle power and the functional results. At the last follow up, range of active elbow flexion was average $124^{\circ}$ and flexion contracture was average 11 degrees and the average of muscle power was grade IV. In the functional analysis, there were two cases of excellent, three cases of good and 1 case of fair. There was no complications including wound infection, vascular compromise and donor site problem. The results of latissimus dorsi transfer for improvement elbow flexion in the patients of brachial plexus injury is one of the useful mettled for the restoration of elbow flexion.

  • PDF

Accuracy Estimation of Electro-optical Camera (EOC) on KOMPSAT-1

  • Park, Woon-Yong;Hong, Sun-Houn;Song, Youn-Kyung
    • Korean Journal of Geomatics
    • /
    • v.2 no.1
    • /
    • pp.47-55
    • /
    • 2002
  • Remote sensing is the science and art of obtaining information about an object, area or phenomenon through the analysis of data acquired by a device that is not in contact with the object, area, or phenomenon under investigation./sup 1)/ EOC (Electro -Optical Camera) sensor loaded on the KOMPSAT-1 (Korea Multi- Purpose Satellite-1) performs the earth remote sensing operation. EOC can get high-resolution images of ground distance 6.6m during photographing; it is possible to get a tilt image by tilting satellite body up to 45 degrees at maximum. Accordingly, the device developed in this study enables to obtain images by photographing one pair of tilt image for the same point from two different planes. KOMPSAT-1 aims to obtain a Korean map with a scale of 1:25,000 with high resolution. The KOMPSAT-1 developed automated feature extraction system based on stereo satellite image. It overcomes the limitations of sensor and difficulties associated with preprocessing quite effectively. In case of using 6, 7 and 9 ground control points, which are evenly spread in image, with 95% of reliability for horizontal and vertical position, 3-dimensional positioning was available with accuracy of 6.0752m and 9.8274m. Therefore, less than l0m of design accuracy in KOMPSAT-1 was achieved. Also the ground position error of ortho-image, with reliability of 95%, is 17.568m. And elevation error showing 36.82m was enhanced. The reason why elevation accuracy was not good compared with the positioning accuracy used stereo image was analyzed as a problem of image matching system. Ortho-image system is advantageous if accurate altitude and production of digital elevation model are desired. The Korean map drawn on a scale of 1: 25,000 by using the new technique of KOMPSAT-1 EOC image adopted in the present study produces accurate result compared to existing mapping techniques involving high costs with less efficiency.

  • PDF

Scenarios for Effective Fire Fighting Operations during Tunnel Fires (도로터널 화재시 효과적인 소방활동전략 수립을 위한 시나리오 연구)

  • Kim, Hak kuen;Lee, Ji-hee
    • Fire Science and Engineering
    • /
    • v.31 no.5
    • /
    • pp.107-116
    • /
    • 2017
  • Fires in tunnels are an international concern and fatal accidental fires in tunnels seem to occur on annual. They have the potential to become much worse int the future as more and longer tunnels are constructed and as traffic densities increase. This is a serious problem. The main purpose of this study is to develop operational procedures for fire brigades in road tunnel fires. This study discussed the past to see what can be learned from the incidents that have already done in tunnels. 73 cases of road tunnel fires domestic and outside of Korea were investigated and classified into 4 incident categories. Among them, 4 tunnel fires are highlighted, focusing on the activities of fire brigades and operation. Regarding the establishment of the strategies for fire fighting, 6 kinds of fire scenario curves have been deducted with regard to the relation between intervention time and heat release rate. It made the choice from the defensive or aggressive fire fighting activities depending on two criteria i.e. response limit and maximum response time. Road Tunnel Classification models can be useful when a fire brigade evaluates fire risk levels in the tunnels under its jurisdiction from the firefighting point of view and sets up preventive measures.

Classification of Terrestrial LiDAR Data through a Technique of Combining Heterogeneous Data (이기종 측량자료의 융합기법을 통한 지상 라이다 자료의 분류)

  • Kim, Dong-Moon;Kim, Seong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.9
    • /
    • pp.4192-4198
    • /
    • 2011
  • Terrestrial LiDAR is a high precision positioning technique to monitor the behavior and change of structures and natural slopes, but it has depended on subjective hand intensive tasks for the classification(surface and vegetation or structure and vegetation) of positioning data. Thus it has a couple of problems including lower reliability of data classification and longer operation hours due to the surface characteristics of various geographical and natural features. In order to solve those problems, the investigator developed a technique of using the NDVI, which is a major index to monitor the changes on the surface(including vegetation), to categorize land covers, combining the results with the terrestrial LiDAR data, and classifying the results according to items. The application results of the developed technique show that the accuracy of convergence was 94% even though there was a problem with partial misclassification of 0.003% along the boundaries between items. The technique took less time for data processing than the old hand intensive task and improved in accuracy, thus increasing its utilization across a range of fields.

Architecture of Policy-Based Network Management for Providing Internet Differentiated Service on Mobile IP Environment (이동 IP 환경에서 인터넷 차별화 서비스 제공을 위한 정책기반 네트워크 관리 구조)

  • 강승완;김태경;유상조
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.721-736
    • /
    • 2004
  • Because of increasing the notebook computer and PDA, users' requirement with respect to mobility is growing more and more. However, current IP protocol is not changed IP address and can not deliver IP packets on new location of host in case moving another network. To solve this problem, the IETF has proposed mobile IP. Today users want to be provided suitable QoS in the internet since demand of services is variety. The policy-based network management is method which can solve various problems of QoS, security, and complication of management in IP networks. This paper presents the network topology constitution, operation procedure and architecture of policy-based network management for providing internet DiffServ on mobile IP environment. In this paper we propose policy classes of policy-based DiffServ network management on mobile environment and create policy scenarios using the proposed policy description language to represent the policy classes. Finally, we implemented a policy-based DiffServ network management system on mobile IP environment.

  • PDF

A Study on Privacy Protect Scheme of RFID Provide Synchronization using Random Number (난수를 이용하여 동기화를 제공하는 RFID 프라이버시 보호 기법에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.623-630
    • /
    • 2007
  • With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because of individuals identification is important in ubiquitous environment, RFID, a technology used frequently. RFID, a technology that radio frequency identification, reader send signer, then tag provide user information. RFID has various strengths, such as high recognition rates, quick recognition speed, but Eavesdropping is possible and problem that user information is revealed happens. To solve this, study is proceeded with activity, but, because of low-cost passive tag is limited operation capability, usually used hash function and random number. Also updates value that is used to present session and uses in next session. Therefore, this scheme protects user privacy using random number. And this sheme can offer synchronization by creating variable value without updating value.

  • PDF

최근접 질의를 위한 고차원 인덱싱 방법

  • Kim, Sang-Uk;Aggarwal, Charu;Yu, Philip
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.632-642
    • /
    • 2001
  • The nearest neighbor query is an important operation widely used in multimedia databases for finding the object that is most similar to a given object Most of techniques for processing nearest neighbor queries employ multidimensional indexes for effective indexing of objects. However, the performance of previous multidimensional indexes, which use N-dimensional rectangles or spheres for representing the capsule of the object cluster, deteriorates seriously as th number of dimensions gets higher, In this paper we first point out the fact that the simple representation of capsuler incurs performance degradation in processing nearest neighbor queries. For alleviating this problem,. we propose(1) adopting new axis systems appropriate to a given cluster (2) representing various shapes of capsules by combining rectangles and spheres, and (3) maintaining outliers separately, We also verify the superiority of our approach through performance evaluation by performing extensive experiments.

  • PDF

Availability Analysis of Cluster Web Server System using Software Rejuvenation Method (소프트웨어 재활 기법을 사용한 클러스터 웹서버 시스템의 가용도 분석)

  • 강창훈
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.1
    • /
    • pp.77-84
    • /
    • 2002
  • An cluster system used consist of large number of running servers, one has the problem that does the low availability occured by the high chance of the server failures and it is difficult to provide occuring software aging. In this paper, running cluster web servers consists of n primary servers and k backup servers, based on the operational parameters such as number of running primary servers, number of backup severs, rejuvenation period, rejuvenation time, failure rate of sewers, repair rate of servers, unstable rate of servers. We calculate to evaluate the rejuvenation policy such steady-state probabilities, downtime, availability, and downtime cost. We validate the solutions of mathematical model by experiments based on various operation parameters and find that the software rejuvenation method can be adopted as prventive fault tolerant technique for stability of system. The failure rate and unstable rate of the servers are essential factors for decision making of the rejuvenation policies.

  • PDF

Performance Improvement of the Statistic Signature based Traffic Identification System (통계 시그니쳐 기반 트래픽 분석 시스템의 성능 향상)

  • Park, Jin-Wan;Kim, Myung-Sup
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.243-250
    • /
    • 2011
  • Nowadays, the traffic type and behavior are extremely diverse due to the appearance of various services on Internet, which makes the need of traffic identification important for efficient operation and management of network. In recent years traffic identification methodology using statistical features of flow has been broadly studied. We also proposed a traffic identification methodology using payload size distribution in our previous work, which has a problem of low completeness. In this paper, we improved the completeness by solving the PSD conflict using IP and port. And we improved the accuracy by changing the distance measurement between flow and statistic signature from vector distance to per-packet distance. The feasibility of our methodology was proved via experimental evaluation on our campus network.