• 제목/요약/키워드: communication based-on trust

검색결과 267건 처리시간 0.021초

A Study on Modified Consensus Algorithm Considering Private Blockchain Environment-based User Environment (프라이빗 블록체인 기반의 사용자 환경을 고려한 수정된 PBFT 연구)

  • Min, Youn-A
    • Smart Media Journal
    • /
    • 제9권1호
    • /
    • pp.9-15
    • /
    • 2020
  • Recently there have been increasing attempts to apply blockchains to businesses and public institutions. Blockchain is a distributed shared ledger with excellent transparency and security of data and through consensus algorithm, the same data can be shared to all nodes in order. In this paper, Modified PBFT which does not modify the PBFT consensus algorithm is proposed. MPBFT is able to tolerate Byzantine faults on a private blockchain on an asynchronous network. Even with the increase of participating nodes, the network communication cost can be effectively maintained. Modified PBFT takes into account the characteristics of an asynchronous network environment where node-to-node trust is guaranteed. In response to the client's request, PBFT performed the entire participation broadcast several times, but Modified PBFT enabled consensus and authentication through the 2 / N leader. By applying the Modified PBFT consensus algorithm, the broadcast process can be simplified to maintain the minimum number of nodes for consensus and to efficiently manage network communication costs.

A Multimedia Data Security System Based on MPEG Using The Specific of Wireless Device (무선 이동 단말기의 특성을 이용한 MPEG 기반의 멀티미디어 데이터 보안 시스템)

  • Lee, Jong-Kap;Seong, Hong-Seok;Won, Young-Jin;Lee, Jong-Sung;Lim, Seung-Ha;Lim, Young-Hwan
    • 전자공학회논문지 IE
    • /
    • 제46권2호
    • /
    • pp.22-32
    • /
    • 2009
  • In this article, the protection system on wireless mobile communication circumstance for the information providers and the users is recommended. Because of its usefulness and convenience, the users of the wireless mobile communication are growing explosively. However, the function of protecting data systems is not secured enough so, personal information may disclose to the outside, regardless of one's intention. Therefore, the contents protection system, which can provide information to the user or hide it depending on user's identity, is suggested. If so, the providers and the users can trust each other for interchanging information, also the users may safely use contents menu whatever they want by doing simple certification process.

PR-Management and Branding of Media Channels with the Application of Social Networks

  • Shalman, Tatiana;Dobrianska, Viktoriia;Kokhan, Marianna;Pletsan, Khrystyna;Humenchuk, Anatolii
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.70-76
    • /
    • 2021
  • The relevance of intelligence involves the definition of such communication systems of PR-management and branding of media channels with the use of social networks, which are already implemented in practice by modern representatives of professional PR product. The purpose of the investigation is to determine the system of implementation of technologies of PR-management and branding of media channels with the use of social networks based on a survey of PR and brand of different media channels on the basis of a survey of brand managers and PR. 980 respondents from Ukraine took part in the survey. The survey was conducted on the Google-forms platform. The results outline a list of the most popular social networks and messengers for the implementation of PR management and branding technologies, including Facebook, Twitter, Google, LinkedIn, Tumblr; Telegram, WhatsApp, Viber, Skype. It is determined that the criteria of branding analysis are informativeness, centralization/distribution, content, feedback intensity. Identified 2 prospects for the development of branding in an interactive media environment (creation of a presentation system; integration of websites of social media and companies in universal centers). The criteria of general importance of the factors influencing the behavioral intention of consumers to use social media channels are presented (satisfaction, accessibility, perceived usefulness, trust, ease of use, attitude, social influence, self-efficacy). The meaning of the content of social media channels (public, informational and communication) is indicated. The practical significance of the study was to present the links between the criteria, development prospects and the values of branding factors.

A Study on Distributed Cooperation Intrusion Detection Technique based on Region (영역 기반 분산협력 침입탐지 기법에 관한 연구)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • 제14권7호
    • /
    • pp.53-58
    • /
    • 2014
  • MANET can quickly build a network because it is configured with only the mobile node and it is very popular today due to its various application range. However, MANET should solve vulnerable security problem that dynamic topology, limited resources of each nodes, and wireless communication by the frequent movement of nodes have. In this paper, we propose a domain-based distributed cooperative intrusion detection techniques that can perform accurate intrusion detection by reducing overhead. In the proposed intrusion detection techniques, the local detection and global detection is performed after network is divided into certain size. The local detection performs on all the nodes to detect abnormal behavior of the nodes and the global detection performs signature-based attack detection on gateway node. Signature DB managed by the gateway node accomplishes periodic update by configuring neighboring gateway node and honeynet and maintains the reliability of nodes in the domain by the trust management module. The excellent performance is confirmed through comparative experiments of a multi-layer cluster technique and proposed technique in order to confirm intrusion detection performance of the proposed technique.

A Machine Learning Approach for Mechanical Motor Fault Diagnosis (기계적 모터 고장진단을 위한 머신러닝 기법)

  • Jung, Hoon;Kim, Ju-Won
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • 제40권1호
    • /
    • pp.57-64
    • /
    • 2017
  • In order to reduce damages to major railroad components, which have the potential to cause interruptions to railroad services and safety accidents and to generate unnecessary maintenance costs, the development of rolling stock maintenance technology is switching from preventive maintenance based on the inspection period to predictive maintenance technology, led by advanced countries. Furthermore, to enhance trust in accordance with the speedup of system and reduce maintenances cost simultaneously, the demand for fault diagnosis and prognostic health management technology is increasing. The objective of this paper is to propose a highly reliable learning model using various machine learning algorithms that can be applied to critical rolling stock components. This paper presents a model for railway rolling stock component fault diagnosis and conducts a mechanical failure diagnosis of motor components by applying the machine learning technique in order to ensure efficient maintenance support along with a data preprocessing plan for component fault diagnosis. This paper first defines a failure diagnosis model for rolling stock components. Function-based algorithms ANFIS and SMO were used as machine learning techniques for generating the failure diagnosis model. Two tree-based algorithms, RadomForest and CART, were also employed. In order to evaluate the performance of the algorithms to be used for diagnosing failures in motors as a critical railroad component, an experiment was carried out on 2 data sets with different classes (includes 6 classes and 3 class levels). According to the results of the experiment, the random forest algorithm, a tree-based machine learning technique, showed the best performance.

Improvement Strategies for the Standard Records Management System of Korea (표준기록관리시스템의 개선전략 연구)

  • Lee, So-Yeon
    • Journal of Korean Society of Archives and Records Management
    • /
    • 제15권1호
    • /
    • pp.29-52
    • /
    • 2015
  • The current study aims to propose strategies for the improvement of the Standard Records Management System of Korea. Here, benefits from the system and reasons of underusage were derived based on the results taken from the analysis of interviews and answers to open-ended questions in the system usage survey. Issues related to the nine main functions of the system were also reviewed in the process. With this, the improvement strategies related to the aforementioned issues are categorized as (1) simplification of functionalities, (2) quality assurance of records and metadata, (3) strengthening user assistance and communication, and (4) trust building between the National Archives of Korea and records centers of public institutions.

Exploring the Financing Gap Between Young Entrepreneurs and Venture Capitalists

  • Siddiqui, Muhammed Ayub;Majid, Sara
    • Asian Journal of Business Environment
    • /
    • 제3권2호
    • /
    • pp.5-15
    • /
    • 2013
  • Purpose - This pilot study explores the gap between venture capitalists and young business graduates in Pakistan. Though the young graduates remain enthusiastic about choosing entrepreneurship as a profession, their success is subject to financial constraints. Research design, data, methodology - We administered a Likert-scale based questionnaire to 200 business graduates from June to July 2012, and interviewed ten venture capitalists from Islamabad and Lahore-two highly business oriented cities of Pakistan-to collect the data. The survey participation was on a voluntary basis without any financial sponsorship. Findings- There is a communication gap between the two parties (venture capitalists and business graduates), and a lack of trust in the entrepreneurial education and training offered in the educational institutions in Pakistan. The study, however, reveals the leading role of the Government in reducing this gap through certain measures. Conclusions - Some measures that can reduce the gap between venture capitalists and young graduates are: association of business schools with industry; financial institutions'initiatives to financially support the small and medium level projects of the economics and business students during their studies; establishment of placement bureaus in the business schools; and organization of regular open houses in the universities.

Concept Analysis of Support (지지개념 분석)

  • Kang, Kyung-Sook;Kim, Mee-Young;Jang, Su-Hyun;Jeong, Mi-Young
    • Research in Community and Public Health Nursing
    • /
    • 제13권3호
    • /
    • pp.566-573
    • /
    • 2002
  • A concept is a building block of a theory. The purpose of a concept analysis is to clarify the critical attributes of a concept and identify its real meaning, particularly if the concept is not understood in a clear and accurate manner. This study was conducted to analyze the concept of support, which has been adopted from another discipline and unclearly used in nursing science. For concept analysis of this study, Walker and Avant's method was used. Support is defined as a domain with emotional. informational. material and evaluative aspects. Critical attributes of the concept of support included (1) an experience of support between a support provider and a client, (2) communication, (3) a relationship of mutual interchange of emotional, informational, material, evaluative support, and (4) intention, Cases related to the concept of support included model cases and appendix cases (against. boundary, and related). Antecedents of support were anxiety, depression, and loss of self-esteem, and consequences of support were comfort, increase of self-esteem, and trust. Based on these results, a nursing intervention that can provide a better quality of life for the prevention of diseases, health management, and health promotion may be developed in the future.

  • PDF

A Design and Implementation of Store Management Application using Beacon (비콘을 이용한 매장관리 모바일 어플리케이션 설계 및 구현)

  • Moon, Gabin;Jeon, Seonghee;Kim, Sungrim
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제14권2호
    • /
    • pp.1-9
    • /
    • 2018
  • Currently, the record of part-timer is mainly written in handwriting or using excel work schedule, paper work recorder, and time attendance program using POS program. And, work table, commute records, paycheck are managed separately. Time-attendance information is not linked and is managed separately, and payment of wages is often not done accurately. And, it is difficult to pay the wages because it is not able to accurately grasp the state of attendance of part-timer. Therefore, it is necessary to have a transparent wage and work management system based on the trust between the owner and the part-timer. In this paper, we design a system that can perform real-time commute check using beacon, transparent wage management, wage calculation by automatic calculation, and smooth communication between owner and the part-timer. We have also implemented a store management mobile application using Android Studio 2.3, Eclipse, Android 5.1 and Beacon devices in a MySQL environment.

Comparison of Image Duplication Detection Using the Polar Coordinates System and Histogram of Oriented Gradients Methods

  • Gunadi, Kartika;Adipranata, Rudy;Suryajaya, Ivan
    • Journal of information and communication convergence engineering
    • /
    • 제17권1호
    • /
    • pp.67-73
    • /
    • 2019
  • In the current era of digital technology, and with the help of existing software, digital photo manipulation is becoming easier and faster. One example of this is the development of powerful image processing software that makes it easy for a digital image to be manipulated and edited. It is therefore very important to protect and maintain public trust in digital images. Several methods have been developed to detect image manipulation. In this paper, we compare two methods for detecting image duplication due to copy-move actions, namely the polar coordinate system and the histogram of oriented gradients methods. The former is a method based on the transfer of a Cartesian image to a polar form, making it easy to tell whether there are objects that have undergone a copy/move in an image, while the latter is a method for retrieving information related to the distribution, which uses a target in the local area as a tool to represent the shape of the target. We compare the accuracy, speed and memory usage of these two methods.