• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.034 seconds

Study of Influence Factors for Prediction of Ground Subsidence Risk

  • Park, Jin Young;Jang, Eugene;Ihm, Myeong Hyeok
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.29-34
    • /
    • 2017
  • This Analyzed case study of measuring displacement, implemented laboratory investigation, and in-situ testing in order to interpret ground subsidence risk rating by excavation work. Since geological features of each country are different, it is necessary to objectify or classify quantitatively ground subsidence risk evaluation in accordance with Korean ground character. Induced main factor that could be evaluated and used to predicted ground subsidence risk through literature investigation and analysis study on research trend related to the ground subsidence. Major factors of ground subsidence might be classified by geological features as overburden, boundary surface of ground, soil, rock and water. These factors affect each other differently in accordance with type of ground that's classified soil, rock, or complex. Then rock could be classified including limestone element or not, also in case of the latter it might be classified whether brittle shear zone or not.

An Adaptive JPEG Steganographic Method Based on Weight Distribution for Embedding Costs

  • Sun, Yi;Tang, Guangming;Bian, Yuan;Xu, Xiaoyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2723-2740
    • /
    • 2017
  • Steganographic schemes which are based on minimizing an additive distortion function defined the overall impacts after embedding as the sum of embedding costs for individual image element. However, mutual impacts during embedding are often ignored. In this paper, an adaptive JPEG steganographic method based on weight distribution for embedding costs is proposed. The method takes mutual impacts during embedding in consideration. Firstly, an analysis is made about the factors that affect embedding fluctuations among JPEG coefficients. Then the Distortion Update Strategy (DUS) of updating the distortion costs is proposed, enabling to dynamically update the embedding costs group by group. At last, a kind of adaptive JPEG steganographic algorithm is designed combining with the update strategy and well-known additive distortion function. The experimental result illustrates that the proposed algorithm gains a superior performance in the fight against the current state-of-the-art steganalyzers with high-dimensional features.

AN ALGORITHM FOR PRIMITIVE NORMAL BASIS IN FINITE FIELDS (유한체에서의 원시 정규기저 알고리즘의 구현과 응용에 관한 연구)

  • 임종인;김용태;김윤경;서광석
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1992.11a
    • /
    • pp.127-130
    • /
    • 1992
  • GF(2m) 이론은 switching 이론과 컴퓨터 연산, 오류 정정 부호(error correcting codes), 암호학(cryptography) 등에 대한 폭넓은 응용 때문에 주목을 받아 왔다. 특히 유한체에서의 이산 대수(discrete logarithm)는 one-way 함수의 대표적인 예로서 Massey-Omura Scheme을 비롯한 여러 암호에서 사용하고 있다. 이러한 암호 system에서는 암호화 시간을 동일하게 두면 고속 연산은 유한체의 크기를 크게 할 수 있어 비도(crypto-degree)를 향상시킨다. 따라서 고속 연산의 필요성이 요구된다. 1981년 Massey와 Omura가 정규기저(normal basis)를 이용한 고속 연산 방법을 제시한 이래 Wang, Troung 둥 여러 사람이 이 방법의 구현(implementation) 및 곱셈기(Multiplier)의 설계에 힘써왔다. 1988년 Itoh와 Tsujii는 국제 정보 학회에서 유한체의 역원을 구하는 획기적인 방법을 제시했다. 1987년에 H, W. Lenstra와 Schoof는 유한체의 임의의 확대체는 원시정규기저(primitive normal basis)를 갖는다는 것을 증명하였다. 1991년 Stepanov와 Shparlinskiy는 유한체에서의 원시원소(primitive element), 정규기저를 찾는 고속 연산 알고리즘을 개발하였다. 이 논문에서는 원시 정규기저를 찾는 Algorithm을 구현(Implementation)하고 이것이 응용되는 문제들에 관해서 연구했다.

  • PDF

Design of Multimedia data Retrieval System based on MPEG-7 (MPEG-7 기반의 멀티미디어 데이터 검색 시스템 설계)

  • Kim, Kyungl-Soo
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.91-96
    • /
    • 2008
  • An increasing in quantity of multimedia data brought a new problem that expected data should be retrieved fast and exactly. The adequate representation is a key element for the efficient retrieval. For this reason, MPEG-7 standard was established for description of multimedia data in 2001. In this paper, we designed a Audio/Image Retrieval System based on MPEG-7 that can retrieve multimedia data like audio, image efficiently. And we integrated high-level and low-level schemas to retrieve datas for users.

  • PDF

On Securing Web-based Educational Online Gaming: Preliminary Study

  • Yani, Kadek Restu;Prihatmanto, Ary Setijadi;Rhee, Kyung-Hyune
    • Annual Conference of KIPS
    • /
    • 2015.10a
    • /
    • pp.767-770
    • /
    • 2015
  • With the deployment of web-based educational game over the internet, the user's registration becomes a critical element. The user is authenticated by the system using username, password, and unique code. However, it cannot be handled properly because the data is transmitted through insecure channel on the network. Hence, security requirement is needed to avoid identity leakage from malicious user. In this paper, we propose a secure communication approach using SSL protocol for an online game. We also describe the security requirements for our approach. In future work, we intend to configure and implement the SSL protocol by enabling HTTPS in web-based online game.

Economic and Information Principles for Cargo Delivery Management in Global Network Supply Chains

  • Savchenko, Liliia;Biletska, Natalia;Buriachenko, Oleksii;Shmahelska, Marina;Коpchykova, Іnnа;Vasylenko, Igor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.443-450
    • /
    • 2021
  • The study is devoted to the formation of a economic principles cargo delivery management in global supply chains. Mathematical model of delivering special categories of goods by road is a key element of these principles. The article analyzes the existing studies on solving the problem of cargo delivery in various aspects. It was noted that the greatest attention is paid to legal regulation, last mile delivery, optimization of routes and delivery schemes, information support, technological innovations, cluster routing, etc. In the developed mathematical model a minimum of total costs of forming loading units and freight shipments was defined as the criterion of optimality of organizing delivery by motor transport. The authors propose the creation of logistics clusters allowing the integration of urban transport flows and global supply chains.

Design of Montgomery Modular Multiplier based on Systolic Array (시스토릭 어레이를 이용한 Montgomery 모듈라 곱셈기 설계)

  • 하재철;문상재
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.135-146
    • /
    • 1999
  • Most public key cryptosystems are constructed based on a modular exponentiation, which is further decomposed into a series of modular multiplications. We design a new systolic array multiplier to speed up modular multiplication using Montgomery algorithm. This multiplier with simple circuit for each processing element will save about 14% logic gates of hardware and 20% execution time compared with previous one.

Cloud Computing Platforms for Big Data Adoption and Analytics

  • Hussain, Mohammad Jabed;Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.290-296
    • /
    • 2022
  • Big Data is a data analysis technology empowered by late advances in innovations and engineering. In any case, big data involves a colossal responsibility of equipment and handling assets, making reception expenses of big data innovation restrictive to little and medium estimated organizations. Cloud computing offers the guarantee of big data execution to little and medium measured organizations. Big Data preparing is performed through a programming worldview known as MapReduce. Normally, execution of the MapReduce worldview requires organized joined stockpiling and equal preparing. The computing needs of MapReduce writing computer programs are frequently past what little and medium measured business can submit. Cloud computing is on-request network admittance to computing assets, given by an external element. Normal arrangement models for cloud computing incorporate platform as a service (PaaS), software as a service (SaaS), framework as a service (IaaS), and equipment as a service (HaaS).

Dual-Band Fractal Antenna with Bandwidth Improvement for Wireless Applications

  • Nsir, Chiraz Ben;Boussetta, Chokri;Ribero, Jean-Marc;Gharsallah, Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.75-80
    • /
    • 2021
  • In this paper, a dual-band Koch Snowflake antenna is proposed for wireless communication systems. Fractal geometry, CPW-feed and stepped ground planes are used to improve the impedance bandwidth. By properly introducing a hexagonal split-ring slot to radiating element, a lower frequency band is generated. The proposed structure is fabricated and tested. Experiment results exhibit dual-band of 0.73-0.98 GHZ and 1.6-3.1 GHz which makes this antenna suitable candidate for GSM900, GSM1800, UTMS2100, Wi-Fi 2400 and LTE2600 bands. In addition, a good radiation pattern, a satisfactory peak gain and a radiation efficiency, which reaches 95%, are achieved.

Quality of Health Information on the Internet

  • Lotfia Mahmoud Refaat Shenishen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.147-151
    • /
    • 2023
  • The article reviews the quality of information on the Internet in general and health information in particular, where the accumulation and steady increase of information available on the Internet, without concern for its quality or importance, and regardless of the target audience, in addition to the lack of evidence of its credibility such as the availability of the name of the editor and references, and the availability of the name of an academic or research body responsible for that information. Add to this the lack of bibliographic data that can help infer the novelty of the information, and verify the element of trust in it . The problem is exacerbated with regard to the health information available on the Internet, due to its danger resulting from the presence of false health information that may cause danger to human health if relied upon. Through this article, the researcher proposes criteria that can help users search for information to measure the degree of quality, trust, and credibility of information in general and health information available on the Internet in particular.