• Title/Summary/Keyword: User Action

Search Result 431, Processing Time 0.023 seconds

A JTAG Protection Method for Mobile Application Processors (모바일 애플리케이션 프로세서의 JTAG 보안 기법)

  • Lim, Min-Soo;Park, Bong-Il;Won, Dong-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.4
    • /
    • pp.706-714
    • /
    • 2008
  • In this paper, we suggest a practical and flexible system architecture for JTAG(Joint Test Action Group) protection of application processors. From the view point of security, the debugging function through JTAG port can be abused by malicious users, so the internal structures and important information of application processors, and the sensitive information of devices connected to an application processor can be leak. This paper suggests a system architecture that disables computing power of computers used to attack processors to reveal important information. For this, a user authentication method is used to improve security strength by checking the integrity of boot code that is stored at boot memory, on booting time. Moreover for user authorization, we share hard wired secret key cryptography modules designed for functional operation instead of hardwired public key cryptography modules designed for only JTAG protection; this methodology allows developers to design application processors in a cost and power effective way. Our experiment shows that the security strength can be improved up to $2^{160}{\times}0.6$second when using 160-bit secure hash algorithm.

Low-Complexity Energy Efficient Base Station Cooperation Mechanism in LTE Networks

  • Yu, Peng;Feng, Lei;Li, Zifan;Li, Wenjing;Qiu, Xuesong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3921-3944
    • /
    • 2015
  • Currently Energy-Saving (ES) methods in cellular networks could be improved, as compensation method for irregular Base Station (BS) deployment is not effective, most regional ES algorithm is complex, and performance decline caused by ES action is not evaluated well. To resolve above issues, a low-complexity energy efficient BS cooperation mechanism for Long Time Evolution (LTE) networks is proposed. The mechanism firstly models the ES optimization problem with coverage, resource, power and Quality of Service (QoS) constraints. To resolve the problem with low complexity, it is decomposed into two sub-problems: BS Mode Determination (BMD) problem and User Association Optimization (UAO) problem. To resolve BMD, regional dynamic multi-stage algorithms with BS cooperation pair taking account of load and geographic topology is analyzed. And then a distributed heuristic algorithm guaranteeing user QoS is adopted to resolve UAO. The mechanism is simulated under four LTE scenarios. Comparing to other algorithms, results show that the mechanism can obtain better energy efficiency with acceptable coverage, throughput, and QoS performance.

Q Learning MDP Approach to Mitigate Jamming Attack Using Stochastic Game Theory Modelling With WQLA in Cognitive Radio Networks

  • Vimal, S.;Robinson, Y. Harold;Kaliappan, M.;Pasupathi, Subbulakshmi;Suresh, A.
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.3-14
    • /
    • 2021
  • Cognitive Radio network (CR) is a promising paradigm that helps the unlicensed user (Secondary User) to analyse the spectrum and coordinate the spectrum access to support the creation of common control channel (CCC). The cooperation of secondary users and broadcasting between them is done through transmitting messages in CCC. In case, if the control channels may get jammed and it may directly degrade the network's performance and under such scenario jammers will devastate the control channels. Hopping sequences may be one of the predominant approaches and it may be used to fight against this problem to confront jammer. The jamming attack can be alleviated using one of the game modelling approach and in this proposed scheme stochastic games has been analysed with more single users to provide the flexible control channels against intrusive attacks by mentioning the states of each player, strategies ,actions and players reward. The proposed work uses a modern player action and better strategic view on game theoretic modelling is stochastic game theory has been taken in to consideration and applied to prevent the jamming attack in CR network. The selection of decision is based on Q learning approach to mitigate the jamming nodes using the optimal MDP decision process

An Interactive Knowledge-based Planning System (인터렉티브 지식베이스 기반의 계획시스템)

  • Jeon, Hyoung-Bae;Han, Eun-Ji;Um, Ky-Hyun;Cho, Kyung-Eun
    • Journal of Korea Game Society
    • /
    • v.9 no.3
    • /
    • pp.139-150
    • /
    • 2009
  • This paper attempts to investigate the establishment of an interactive knowledge base for action planning by virtual agents and an interactive knowledge-based planning system. A fixed knowledge base is unable to properly handle a change in circumstances because fixed planning is only available under a fixed knowledge base. Therefore, this paper proposes the establishment of an interactive knowledge base which is applicable to diverse environments and an artificial intelligence planning system in which an interactive knowledge base is available. The interactive knowledge base proposed in this paper consists of motivation, behavior, object and action. The association relationship between knowledge base and its input is set using an automation tool. With this tool, a user can easily add to or amend the components of the knowledge base. With this knowledge base, a character plans all action items and chooses one of them to take an action. Since a new action can be applicable by updating the knowledge base even when the character environment changes, it is very useful for virtual reality content developers. This paper has established a relationship between scalable interactive knowledge base components and other components and proposes a convenient input tool and a planning system algorithm effective for an interactive knowledge base. The results of this study have been verified through testing in a virtual environment ('virtual library').

  • PDF

Adaptation of Neural Network based Intelligent Characters to Change of Game Environments (신경망 지능 캐릭터의 게임 환경 변화에 대한 적응 방법)

  • Cho Byeong-heon;Jung Sung-hoon;Sung Yeong-rak;Oh Ha-ryoung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.3 s.303
    • /
    • pp.17-28
    • /
    • 2005
  • Recently intelligent characters in computer games have been an important element more and more because they continually stimulate gamers' interests. As a typical method for implementing such intelligent characters, neural networks have been used for training action patterns of opponent's characters and game rules. However, some of the game rules can be abruptly changed and action properties of garners in on-line game environments are quite different according to gamers. In this paper, we address how a neural network adapts to those environmental changes. Our adaptation solution includes two components: an individual adaptation mechanism and a group adaptation mechanism. With the individual adaptation algorithm, an intelligent character steadily checks its game score, assesses the environmental change with taking into consideration of the lastly earned scores, and initiates a new learning process when a change is detected. In multi-user games, including massively multiple on-line games, intelligent characters confront diverse opponents that have various action patterns and strategies depending on the gamers controlling the opponents. The group adaptation algorithm controls the birth of intelligent characters to conserve an equilibrium state of a game world by using a genetic algorithm. To show the performance of the proposed schemes, we implement a simple fighting action game and experiment on it with changing game rules and opponent characters' action patterns. The experimental results show that the proposed algorithms are able to make intelligent characters adapt themselves to the change.

Understanding Privacy Infringement Experiences in Courier Services and its Influence on User Psychology and Protective Action From Attitude Theory Perspective (택배 서비스 이용자의 프라이버시 침해 경험이 심리와 행동에 미치는 영향에 대한 이해: 태도이론 측면)

  • Se Hun Lim;Dan J. Kim;Hyeonmi Yoo
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.99-120
    • /
    • 2023
  • Courier services users' experience of violating privacy affects psychology and behavior of protecting personal privacy. Depending on what privacy infringement experience (PIE) of courier services users, learning about perceived privacy infringement incidents is made, recognition is formed, affection is formed, and behavior is appeared. This paradigm of changing in privacy psychologies of courier services users has an important impact on predicting responses of privacy protective action (PPA). In this study, a theoretical research framework are developed to explain the privacy protective action (PPA) of courier services users by applying attitude theory. Based on this framework, the relationships among past privacy infringement experience (PIE), perceived privacy risk (PPR), privacy concerns (i.e., concerns in unlicensed secondary use (CIUSU), concerns in information error (CIE), concerns in improper access (CIA), and concern in information collection (CIC), and privacy protective action (PPA) are analyzed. In this study, the proposed research model was surveyed by people with experience in using courier services and was analyzed for finding relationships among research variables using structured an equation modeling software, SMART-PLS. The empirical results show the causal relationships among PIE, PPR, privacy concerns (CIUSU, CIE, CIA, and CIC), and PPA. The results of this study provide useful theoretical implications for privacy management research in courier services, and practical implications for the development of courier services business model.

A Study on the User's Response to the Flight Action in 3D Game -Focused on 3D MMORPG Aion- (3D 게임에서 '비행' 행위에 대한 사용자의 반응 연구 -3D MMORPG Aion을 중심으로-)

  • Bae, Kyoung-Mi;Kim, Kyu-Jung;Kim, Inseop
    • Journal of Korea Game Society
    • /
    • v.12 no.6
    • /
    • pp.33-46
    • /
    • 2012
  • This research aimed to analyze the way of how flying movement system and background graphic in MMORPG, which provides movement system, influences on users' psychological behavior in order to enhance user's participation and the completion level of 3D game. This research also analyzed the difference between the user's response to the flying movement and other movement structure in game such as things to board, summons, portal, chase, and etc. With this comparative analysis, this study could clarify the characteristics of the user's desire to fly according to the virtual world' topography in game, the necessity of flying movement for fast movement, the dependence of user on flying system, the immersion according to behavior in process of flying, and expression level of virtual world, and etc. The survey through the case research of MMORPG Aion selected for this research showed flying movement system can have suitable quality by applying users' playing time and absorption in flight process, users' impulse following game level, and users' need to fly as a convenience of flying properly.

User Behavior Classification for Contents Configuration of Life-logging Application (라이프로깅 애플리케이션 콘텐츠 구성을 위한 사용자 행태 분류)

  • Kwon, Jieun;Kwak, Sojung;Lim, Yoon Ah;Whang, Min Cheol
    • Science of Emotion and Sensibility
    • /
    • v.19 no.4
    • /
    • pp.13-20
    • /
    • 2016
  • Recently, life-logging service which has expanded to measure and record the daily life of the users and to share with others are increasing. In particular, as life-logging services based on the application has become popular with the development of wearable-devices and smart-phones, the contents of this service are produced by user behavior and are provided in infographic menu form. The purpose of this paper is to extract user behavior and classify for making contents items of life-logging service. For this paper, the first of all, we discuss the definition and characteristics of life-logging and research the contents based on user behavior related to life-logging by the publications including thesis, articles, and books. Secondly, we extract and classify the user behavior to build the contents for life-logging service. We gather users' action words from publication materials, researches, and contents of existing life-logging service. And then collected words are analyzed by FGI (Focus Group Interview) and survey. As the result, 39 words which suit for contents of life-logging service are extracted by verify suitability. Finally, the extracted 39 words are classified for 19 categories -'Eat', 'Keep house', 'Diet', 'Travel', 'Work out', 'Transit', 'Shoot', 'Meet', 'Feel', 'Talk', 'Care for', 'Drive', 'Listen', 'Go online', 'Sleep', 'Go', 'Work', 'Learn', 'Watch' - which are suggested by the surveys, statistical analysis, and FGI. We will discuss the role and limitations of this results to build contents configuration based on life-logging application in this study.

A study on the Development of TUI(Tangible User Interface) System Model (TUI 시스템 모델 개발에 관한 연구)

  • 임창영;최민영
    • Archives of design research
    • /
    • v.16 no.4
    • /
    • pp.355-364
    • /
    • 2003
  • The TUI system Modeling Language(TML) developed in this research can be used for designing TUI system with concerning about TUI's characters. For design to be concerned about physical property of tangibles and control device and digital media, TML can be a framework to give a definition of each property and be used for designing action and reaction process separately. And it would be the guideline to represent interaction's dynamic property through showing parallel information flows among objects. Finally, for verification TML's suitability, TUI system to which TML was applied was developed.

  • PDF

Learning Relational Instance-Based Policies from User Demonstrations (사용자 데모를 이용한 관계적 개체 기반 정책 학습)

  • Park, Chan-Young;Kim, Hyun-Sik;Kim, In-Cheol
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.5
    • /
    • pp.363-369
    • /
    • 2010
  • Demonstration-based learning has the advantage that a user can easily teach his/her robot new task knowledge just by demonstrating directly how to perform the task. However, many previous demonstration-based learning techniques used a kind of attribute-value vector model to represent their state spaces and policies. Due to the limitation of this model, they suffered from both low efficiency of the learning process and low reusability of the learned policy. In this paper, we present a new demonstration-based learning method, in which the relational model is adopted in place of the attribute-value model. Applying the relational instance-based learning to the training examples extracted from the records of the user demonstrations, the method derives a relational instance-based policy which can be easily utilized for other similar tasks in the same domain. A relational policy maps a context, represented as a pair of (state, goal), to a corresponding action to be executed. In this paper, we give a detail explanation of our demonstration-based relational policy learning method, and then analyze the effectiveness of our learning method through some experiments using a robot simulator.