• Title/Summary/Keyword: Security Benefit

Search Result 264, Processing Time 0.023 seconds

A Simple Proposal For Ain Makkah Almukkarmah An Application Using Augmented Reality Technology

  • Taghreed Alotaibi;Laila Alkabkabi;Rana Alzahrani;Eman Almalki;Ghosson Banjar;Kholod Alshareef;Olfat M. Mirza
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.115-122
    • /
    • 2023
  • Makkah Al-Mukarramah is the capital of Islamic world. It receives special attention from the Saudi government's rulers to transform it into a smart city for the benefit of millions of pilgrims. One of the 2030 vision objectives is to transform specific cities to smart ones with advanced technological facilitation, Makkah is one of these cities. The history of Makkah is not well known for some Muslims. As a result, we built the concepts of our application "Ain Makkah" to enable visitors of Makkah to know the history of Makkah by using technology. In particular "Ain Makkah" uses Augmented Reality to view the history of Al-Kaaba. A 3D model will overlay Al-Kaaba to show it in the last years. Our project will use Augmented Reality to build a 3D model to overlay Al-Kaaba. Future work will expand the number of historical landmarks of Makkah.

Factors Affecting Continuous Intention to Use Mobile Wallet : Based on Value-based Adoption Model (모바일 지갑의 가치와 지속사용의도의 영향요인 : VAM 모형을 기반으로)

  • Lee, Chungah;Yun, Haejung;Lee, Chunghun;Lee, Choong C.
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.117-135
    • /
    • 2015
  • Mobile wallet that can keep coupons and membership cards for mobile is one of rapidly growing services due to its usability and financial benefit. However, in spite of its rapid growth, the increase of users who do not use continuously it is an important consideration to service providers for making a profit. This study aims to test the effects of factors affecting the continuous use intention of mobile wallet based on VAM (Value-based Adoption Model) which can analyse them in both benefit and sacrifice aspects, so as to suggest considerations to increase the use period of mobile wallet for service providers. The research findings supported the hypotheses regarding to the effects of usefulness, value-expression, perceived security and enjoyment in the benefit aspect and technicality in the sacrifice aspect on perceived value. In addition, the causal path from perceived value to continuous use intention was significant. The study results are expected to be used in marketing or service improvement for short-term users by taking account of emotional factors as well as functional factors.

Analysis of Labor Market Activation Policy and Its Employment Outcomes: the Effects of Employment and Tailored Social Service Provision (한국의 노동시장 활성화 정책 특성과 취업 성과: 취업지원서비스와 맞춤형 사회서비스 중심 정책의 비교)

  • Ryu, Kirak
    • 한국사회정책
    • /
    • v.19 no.3
    • /
    • pp.149-183
    • /
    • 2012
  • This article aims to analyze main features of activation policy and compare major programmes in terms of their impact on employment performances in Korea. Since the introduction of National Basic Living Security Act in 2000, a series of activation policies have been in place for social assistance recipients, low-income employees, and youth unemployed by means of providing tailored employment and social services via in-depth counselling and case management. These activation policies carry both enabling and demanding elements: requiring programme participation in exchange for public assistance benefit receipts on the one hand, and providing various social services to remove barriers to employment through case management on the other hand. Therefore, it merits attention to analyze how various features of activation programmes affect employment outcomes, the effectiveness of delivery system and policy instruments as well. In analyzing employment outcomes of activation policy of which main characteristics lie in provision of employment and social services, this article points out the features and policy instruments of the activation policy that contribute to labor market entry of public assistance recipients and low income employees. In addition, it also delineates the determinants of exit from benefit receipts. Results from statistical analysis show that activation policy with intense employment service helps both benefit recipients and low income employees enter into the labor market at a faster rate. However, tailored social service provision enables social assistance recipients to exit from benefit receipts. These results suggest theoretical and policy relevant implication in regards to redesigning the delivery mechanisms and service instruments of activation policy.

Implementation of Client Authentication System on Transparency Cache (투명 캐시에서의 사용자 인증 시스템 구현)

  • Kim, Seong-Rak;Gu, Yong-Wan
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.181-188
    • /
    • 2002
  • There are recently a lot of inconvenience because every client should be set to the proxy server on the browser in order to control the access by means of the client authentication in the proxy server. The client authentication technology using the transparency cache in this paper will be transparently used for every user in the internet which option of the authentication function is simply set in the cache server. In addition, the administrator will get the benefit since he can control the traffic of each client and strengthen the security. And also, this system is expected to use in the eCRM deeply rotated to the tendency of the client in the field of the e-commerce like shopping mall in the internet since the administrator can monitor the pattern of the client using the internet. This technique can be applied to the company affiliated research center, the EC website, and the military where it is essential for the tight security even though there are no additional security devices.

Secure and Efficient Cooperative Spectrum Sensing Against Byzantine Attack for Interweave Cognitive Radio System

  • Wu, Jun;Chen, Ze;Bao, Jianrong;Gan, Jipeng;Chen, Zehao;Zhang, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3738-3760
    • /
    • 2022
  • Due to increasing spectrum demand for new wireless devices applications, cooperative spectrum sensing (CSS) paradigm is the most promising solution to alleviate the spectrum shortage problem. However, in the interweave cognitive radio (CR) system, the inherent nature of CSS opens a hole to Byzantine attack, thereby resulting in a significant drop of the CSS security and efficiency. In view of this, a weighted differential sequential single symbol (WD3S) algorithm based on MATLAB platform is developed to accurately identify malicious users (MUs) and benefit useful sensing information from their malicious reports in this paper. In order to achieve this, a dynamic Byzantine attack model is proposed to describe malicious behaviors for MUs in an interweave CR system. On the basis of this, a method of data transmission consistency verification is formulated to evaluate the global decision's correctness and update the trust value (TrV) of secondary users (SUs), thereby accurately identifying MUs. Then, we innovatively reuse malicious sensing information from MUs by the weight allocation scheme. In addition, considering a high spectrum usage of primary network, a sequential and differential reporting way based on a single symbol is also proposed in the process of the sensing information submission. Finally, under various Byzantine attack types, we provide in-depth simulations to demonstrate the efficiency and security of the proposed WD3S.

Verifiable Self-Certified Schemes for Authentication Service of Electronic Commerce (전자상거래 인증 서비스를 위한 검증 가능한 자체인증 방식)

  • Joo, Mi-Ri;Lee, Bo-Young;Yang, Hyung-Kyu;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.9
    • /
    • pp.2894-2902
    • /
    • 2000
  • In this paper, for authentication service of electronic commerce, we propose the verifiable self-certified schemes based on the $\gamma^{th}$-residuosity, thich are combine the benefit of certifiction based schemes and Girault's self-certified public keys. The security of our schemes is based on the difficulty of $\gamma^{th}$-residuosity problem and discrete logarithm problem simultaneously.

  • PDF

A Study on the Improvement of Import Clearance System for Express Consignments by Increase of Electronic Commerce (전자상거래 확대에 따른 특송물품 수입통관시스템의 개선방안에 관한 연구)

  • Song, Seon-Uk
    • International Commerce and Information Review
    • /
    • v.6 no.3
    • /
    • pp.183-201
    • /
    • 2004
  • Recently, Electronic commerce market is growing sharply for the expansion of internet and development of means of air transportation. Import Clearance System for express consignments, introduced in Korea, confers some benefit upon express consignments, ie. prompt clearance, simplification of the clearance procedure, exemption of necessary documents. But it has some problems such as lack of social security and trade compliance. So it requires some improvements as follows. Firstly, it has no legal background to clear all articles valued at US$100 or less carried by an express consignment operator. So customs brokers, not express consignment operators, should clear that articles. Secondly, it should be presented necessary documents including commercial invoice to prevent a wrong price declaration in entering express consignments valued at US$100 or less. Thirdly, X-ray inspectors must enhance their inspection ability. Customs must provide education programs for X-ray inspectors to improve their inspection ability. Lastly, Cargo selectivity system for express consignments have to be improved to operate effectively.

  • PDF

Optimal Allocation of FACTS Devices Considering both Corrective and Prevenvite Mode (수정모드를 고려한 예방모드에서의 유연송전기기 최적투입계획 관한 연구)

  • Lim, Nam-Kyu;Song, Hwa-Chang;Lee, Byong-Jun
    • Proceedings of the KIEE Conference
    • /
    • 2000.11a
    • /
    • pp.23-25
    • /
    • 2000
  • In recent deregulation and competitive power market environment, electric utilities plan and operate their systems for economic benefit with secure system condition. Flexible AC transmission system(FACTS) technology opens up new opportunities of controlling power and enhancing the usable capacity of present transmission system. This paper presents a method for security constrained optimal allocation of FAETS considering contingencies for the purpose of enhanced system operation. The proposed scheme uses Benders decomposition to account of both corrective and preventive mode.

  • PDF

Configuration of Mail Delivery System Based on Reinforcement Learning

  • Morishita, Soichiro;Hiraoka, Kazuyuki;Kobayashi, Hidetsune;Mishima, Taketoshi
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.830-833
    • /
    • 2002
  • To solve the internal security problem such as human error and bad faith, the automation of computer system management is significant. For this purpose, we focus attention in the automation of Mail Delivery Service. Today, requirement for reliable mail delivery system becomes larger and larger. However, existing systems are too strict about their configuration. Hence, we propose the method based on Reinforcement Learning (RL) to achieve proper MX record ordering. A measure on validity of the design of system, such as network topology number of servers and so on, is also obtained as side benefit. In order to verify the usability of the presented method, we did on a small model of mail delivery system. As a result, we show that RL is available for determination of the proper MX record ordering. Additionally, we suggest that it is also available for comparing validity of setting of MTA and the network design.

  • PDF

Secure Modulus Data Hiding Scheme

  • Kuo, Wen-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.600-612
    • /
    • 2013
  • In 2006, Zhang and Wang proposed a data hiding scheme based on Exploiting Modification Direction (EMD) to increase data hiding capacity. The major benefit of EMD is providing embedding capacity greater than 1 bit per pixel. Since then, many EMD-type data hiding schemes have been proposed. However, a serious disadvantage common to these approaches is that the embedded data is compromised when the embedding function is disclosed. Our proposed secure data hiding scheme remedies this disclosure shortcoming by employing an additional modulus function. The provided security analysis of our scheme demonstrates that attackers cannot get the secret information from the stegoimage even if the embedding function is made public. Furthermore, our proposed scheme also gives a simple solution to the overflow/underflow problem and maintains high embedding capacity and good stegoimage quality.