• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.034 seconds

An Electric-Field Coupled Power Transfer System with a Double-sided LC Network

  • Xie, Shi-Yun;Su, Yu-Gang;Zhou, Wei;Zhao, Yu-Ming;Dai, Xin
    • Journal of Power Electronics
    • /
    • v.18 no.1
    • /
    • pp.289-299
    • /
    • 2018
  • Electric-field coupled power transfer (ECPT) systems employ a high frequency electric field as an energy medium to transfer power wirelessly. Existing ECPT systems have made great progress in terms of increasing the transfer distance. However, the topologies of these systems are complex, and the transfer characteristics are very sensitive to variations in the circuit parameters. This paper proposes an ECPT system with a double-sided LC network, which employs a parallel LC network on the primary side and a series LC network on the secondary side. With the same transfer distance and output power, the proposed system is simpler and less sensitive than existing systems. The expression of the optimal driving voltage for the coupling structure and the characteristics of the LC networks are also analyzed, including the transfer efficiency, parameter sensitivity and total harmonic distortion. Then, a design method for the system parameters is provided according to these characteristics. Simulations and experiments have been carried out to verify the system properties and the design method.

IP Traceback System using iTrace Message (iTrace 메시지를 이용한 IP 역추적 시스템)

  • Cho, Han-Jin;Chae, Cheol-Joo;Lee, June-Hwan;Lee, Jae-Kwang
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.1
    • /
    • pp.13-20
    • /
    • 2009
  • The rapid growth of the Internet has caused the hacking and virus. There are several vulnerabilities in current firewall and Intrusion Detection Systems of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

  • PDF

Acceptance of Social Media as a Marketing Tool : A Quantitative Study

  • Hooda, Apeksha;Ankur, Ankur
    • Asian Journal of Business Environment
    • /
    • v.8 no.3
    • /
    • pp.5-12
    • /
    • 2018
  • Purpose - The purpose of current paper is to identify features of advertisements at social media that generate the ad-click and to further identify if these advertisements lead to purchase. If no purchase is made, then reasons for not making purchase are identified. Users' purchase experience after users clicked at advertisements are also studied. Research design, data, and methodology - Research design followed is exploratory research, where various factors leading to ad-clicks and generating purchase at social media platform were explored. Raw data was gathered by means of survey among a sample of 185 respondents in India using online structured questionnaire. GLM model and multinomial regression were used to analyze the data. Results - Several factors including endorsement by friends, advertisement aesthetics, product reviews, and aggressive pricing played major role in generating ad-clicks. Major impediment to purchase on were product misrepresentation in advertisement, false discounts, and site security. Female users clicked more on social media advertisements and made more purchases compared to their male counterpart. Conclusions - Social media advertisements have significant positive effect on buying behavior of online customers. Transactions culminating from social media ad-click generated significant positive experience for social media users. Thus, social media can be effective marketing tool.

Design of a Elliptic Curve Crypto-Processor for Hand-Held Devices (휴대 단말기용 타원곡선 암호 프로세서의 설계)

  • Lee, Wan-Bok;Kim, Jung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.728-736
    • /
    • 2007
  • The more improved the Internet and the information technology, the stronger cryptographic system is required which can satisfy the information security on the platform of personal hand-held devices or smart card system. This paper introduces a case study of designing an elliptic curve cryptographic processor of a high performance that can be suitably used in a wireless communicating device or in an embedded system. To design an efficient cryptographic system, we first analyzed the operation hierarchy of the elliptic curve cryptographic system and then implemented the system by adopting a serial cell multiplier and modified Euclid divider. Simulation result shows that the system was correctly designed and it can compute thousands of operations per a secdond.

A Design of HAS-160 Processor for Smartcard Application (스마트카드용 HAS-160 프로세서 설계)

  • Kim, Hae-ju;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.913-916
    • /
    • 2009
  • This paper describes a hardware design of hash processor which implements HAS-160 algorithm adopted as a Korean standard. To achieve a high-speed operation with small-area, the arithmetic operation is implemented using a hybrid structure of 5:3 and 3:2 carry-save adders and a carry-select adder. The HAS-160 processor synthesized with $0.35-{\mu}m$ CMOS cell library has 17,600 gates. It computes a 160-bit hash code from a message block of 512 bits in 82 clock cycles, and has 312 Mbps throughput at 50 MHz@3.3-V clock frequency.

  • PDF

News Article Identification Methods with Fact-Checking Guideline on Artificial Intelligence & Bigdata

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.352-359
    • /
    • 2021
  • The purpose of this study is to design and build fake news discrimination systems and methods using fact-checking guidelines. In other words, the main content of this study is the system for identifying fake news using Artificial Intelligence -based Fact-checking guidelines. Specifically planned guidelines are needed to determine fake news that is prevalent these days, and the purpose of these guidelines is fact-checking. Identifying fake news immediately after seeing a huge amount of news is inefficient in handling and ineffective in handling. For this reason, we would like to design a fake news identification system using the fact-checking guidelines to create guidelines based on pattern analysis against fake news and real news data. The model will monitor the fact-checking guideline model modeled to determine the Fact-checking target within the news article and news articles shared on social networking service sites. Through this, the model is reflected in the fact-checking guideline model by analyzing news monitoring devices that select suspicious news articles based on their user responses. The core of this research model is a fake news identification device that determines the authenticity of this suspected news article. So, we propose news article identification methods with fact-checking guideline on Artificial Intelligence & Bigdata. This study will help news subscribers determine news that is unclear in its authenticity.

Compact E-Cash with Practical and Complete Tracing

  • Lian, Bin;Chen, Gongliang;Cui, Jialin;He, Dake
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3733-3755
    • /
    • 2019
  • E-cash has its merits comparing with other payment modes. However, there are two problems, which are how to achieve practical/complete tracing and how to achieve it in compact E-cash. First, the bank and the TTP (i.e., trusted third party) have different duties and powers in the reality. Therefore, double-spending tracing is bank's task, while unconditional tracing is TTP's task. In addition, it is desirable to provide lost-coin tracing before they are spent by anyone else. Second, compact E-cash is an efficient scheme, but tracing the coins from double-spender without TTP results in poor efficiency. To solve the problems, we present a compact E-cash scheme. For this purpose, we design an embedded structure of knowledge proof based on a new pseudorandom function and improve the computation complexity from O(k) to O(1). Double-spending tracing needs leaking dishonest users' secret knowledge, but preserving the anonymity of honest users needs zero-knowledge property, and our special knowledge proof achieves it with complete proofs. Moreover, the design is also useful for other applications, where both keeping zero-knowledge and leaking information are necessary.

Why Do Mobile Device Users Take a Risky Behavior?: Focusing on Model of the Determinants of Risk Behavior (모바일 기기 사용자는 왜 정보보호에 위험한 행동을 하는가? : 위험행동 결정요인 모델을 중심으로)

  • Kim, Jongki;Kim, Jiyun
    • The Journal of Information Systems
    • /
    • v.28 no.2
    • /
    • pp.129-152
    • /
    • 2019
  • Purpose The purpose of this study is to empirically identify the risky behavior of mobile device users using the Internet of Things on a situational perspective. Design/methodology/approach This study made a design of the research model based on model of the determinants of risk behavior. Data were collected through a survey including hypothetical scenario. SmartPLS 2.0 was used for the structural model analysis and t-test was conducted to compare the between normal and situational behavior. Findings The results were as follows. First, the central roles of risk propriety and risk perception were verified empirically. Second, we identified the role of locus of control as a new factor of impact on risky behavior. Third, mobile risk propensity has been shown to increase risk perception. Fouth, it has been shown that risk perception does not directly affect risky behavior and reduce the relationship between mobile risk propensity and risk behavior. According to the empirical analysis result, Determinants of risk behavior for mobile users were identified based on a theoretical framework. And it raised the need to pay attention to the impact of locus of control on risk behavior in the IS security field. It provided direction to the approach to risky behavior of mobile device users. In addition, this study confirmed that there was a possibility of taking risky behavior in the actual decision-making.

A Study on the Resident Recognition of Common Space in Apartment (공동주택 거주자의 공유공간 인식에 대한 조사 연구)

  • Han, Min-Seung;Whang, Hee-Joon
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.4
    • /
    • pp.45-52
    • /
    • 2019
  • The most ordinary form of residential type in Korea is a plate-type apartment, and the common space in these apartment is attracting as an important factor for enhancing social exchanges among neighbors and forming community consciousness. In addition, it provides a sense of psychological security by enabling natural exchanges and communication in contemporary society. It is desirable to plan the flow of space in such a way that private, semi-private, semi-public, and public spaces are linked. Semi-private and semi-public spaces can be defined as common spaces. Semi-private spaces are strongly recognized in the order of unit household entrance, main entrance, elevator, corridor, staircase, playground, bench, trail, walkway and parking lot, exercise space, main/back gate, the ability to gratify is increased sense of belonging, ownership consciousness formation, defensive function. Semi-public space is strongly recognized in the order of playground, bench, exercise space, trail, main entrance, walkway and parking lot, unit household entrance, main/back gate, corridor, staircase, elevator, the ability to gratify is increase of social contact, Secondary activity space function. In addition, the function to gratify in the common space differs according to gender and age group among resident characteristics, and differs according to corridor type, parking lot type and main entrance type. Therefore, differentiated planning of common space is needed in consideration of these differences in the design of common space in future.

Development of a novel reconstruction method for two-phase flow CT with improved simulated annealing algorithm

  • Yan, Mingfei;Hu, Huasi;Hu, Guang;Liu, Bin;He, Chao;Yi, Qiang
    • Nuclear Engineering and Technology
    • /
    • v.53 no.4
    • /
    • pp.1304-1310
    • /
    • 2021
  • Two-phase flow, especially gas-liquid two-phase flow, has a wide application in industrial field. The diagnosis of two-phase flow parameters, which directly determine the flow and heat transfer characteristics, plays an important role in providing the design reference and ensuring the security of online operation of two-phase flow system. Computer tomography (CT) is a good way to diagnose such parameters with imaging method. This paper has proposed a novel image reconstruction method for thermal neutron CT of two-phase flow with improved simulated annealing (ISA) algorithm, which makes full use of the prior information of two-phase flow and the advantage of stochastic searching algorithm. The reconstruction results demonstrate that its reconstruction accuracy is much higher than that of the reconstruction algorithm based on weighted total difference minimization with soft-threshold filtering (WTDM-STF). The proposed method can also be applied to other types of two-phase flow CT modalities (such as X(𝛄)-ray, capacitance, resistance and ultrasound).