• 제목/요약/키워드: computer access

검색결과 3,140건 처리시간 0.037초

An Opportunistic Channel Access Scheme for Interweave Cognitive Radio Systems

  • Senthuran, Sivasothy;Anpalagan, Alagan;Kong, Hyung Yun;Karmokar, Ashok;Das, Olivia
    • Journal of Communications and Networks
    • /
    • 제16권1호
    • /
    • pp.56-66
    • /
    • 2014
  • We propose a novel opportunistic access scheme for cognitive radios in an interweave cognitive system, that considers the channel gain as well as the predicted idle channel probability (primary user occupancy: Busy/idle). In contrast to previous work where a cognitive user vacates a channel only when that channel becomes busy, the proposed scheme requires the cognitive user to switch to the channel with the next highest idle probability if the current channel's gain is below a certain threshold. We derive the threshold values that maximize the long term throughput for various primary user transition probabilities and cognitive user's relative movement.

온라인목록(Online Public Access Catalog : OPAC) 이용의 편이도에 관한 연구 (A Study of the Use of Online Public Access Catalogs)

  • 노문자
    • 한국문헌정보학회지
    • /
    • 제19권
    • /
    • pp.151-188
    • /
    • 1990
  • The aims of automation efforts in libraries are the rationalization of interval work and improvement of user services. After a period of exclusive internal computer utilization, later voluntary contact with the computer (e.g., circulation control with self services), patrons of American libraries now have to go to a computer terminal if they want certain information. Online public access catalogs(OPAC) have been used in American libraries since the end of the seventies. But OP AC are accepted by patron only if they have a useful and flexible user interface. This paper briefly describes the use of online catalogs in different type of libraries, categories of user (user, non-user), aspect of catalog use in context with computer experience etc. The disscussion then focuses on the characteristics of the final report of online catalog use study of Council on Library Resources and user problems in searching, as reported in many other catalog use studies.

  • PDF

Novel Self-Reference Sense Amplifier for Spin-Transfer-Torque Magneto-Resistive Random Access Memory

  • Choi, Jun-Tae;Kil, Gyu-Hyun;Kim, Kyu-Beom;Song, Yun-Heub
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제16권1호
    • /
    • pp.31-38
    • /
    • 2016
  • A novel self-reference sense amplifier with parallel reading during writing operation is proposed. Read access time is improved compared to conventional self-reference scheme with fast operation speed by reducing operation steps to 1 for read operation cycle using parallel reading scheme, while large sense margin competitive to conventional destructive scheme is obtained by using self-reference scheme. The simulation was performed using standard $0.18{\mu}m$ CMOS process. The proposed self-reference sense amplifier improved not only the operation speed of less than 20 ns which is comparable to non-destructive sense amplifier, but also sense margin over 150 mV which is larger than conventional sensing schemes. The proposed scheme is expected to be very helpful for engineers for developing MRAM technology.

협업 설계에서의 다중해상도 모델링 응용 (Application of Multi-Resolution Modeling in Collaborative Design)

  • 김태성;한정현
    • 한국컴퓨터그래픽스학회논문지
    • /
    • 제9권2호
    • /
    • pp.1-9
    • /
    • 2003
  • Information assurance(IA) refers to methodologies to protect engineering information by ensuring its availability, confidentiality, integrity, non-repudiation, authentication, access control, etc. In collaborative design, IA techniques are needed to protect intellectual property, establish security privileges and create "need to know" protections on critical features. Aside from 3D watermarking, research on how to provide IA to distributed collaborative engineering teams is largely non-existent. This paper provides a framework for information assurance within collaborative design, based on a technique we call role-based viewing. Such role-based viewing is achieved through integration of multi-resolution geometry and security models. 3D models are geometrically partitioned, and the partitioning is used to create multi-resolution mesh hierarchies. Extracting an appropriately simplified model suitable for access rights for individual designers within a collaborative design environment is driven by an elaborate access control mechanism.

  • PDF

A Proposed Framework for the Automated Authorization Testing of Mobile Applications

  • Alghamdi, Ahmed Mohammed;Almarhabi, Khalid
    • International Journal of Computer Science & Network Security
    • /
    • 제21권5호
    • /
    • pp.217-221
    • /
    • 2021
  • Recent studies have indicated that mobile markets harbor applications (apps) that are either malicious or vulnerable, compromising millions of devices. Some studies indicate that 96% of companies' employees have used at least one malicious app. Some app stores do not employ security quality attributes regarding authorization, which is the function of specifying access rights to access control resources. However, well-defined access control policies can prevent mobile apps from being malicious. The problem is that those who oversee app market sites lack the mechanisms necessary to assess mobile app security. Because thousands of apps are constantly being added to or updated on mobile app market sites, these security testing mechanisms must be automated. This paper, therefore, introduces a new mechanism for testing mobile app security, using white-box testing in a way that is compatible with Bring Your Own Device (BYOD) working environments. This framework will benefit end-users, organizations that oversee app markets, and employers who implement the BYOD trend.

PRIAM: Privacy Preserving Identity and Access Management Scheme in Cloud

  • Xiong, Jinbo;Yao, Zhiqiang;Ma, Jianfeng;Liu, Ximeng;Li, Qi;Ma, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권1호
    • /
    • pp.282-304
    • /
    • 2014
  • Each cloud service has numerous owners and tenants, so it is necessary to construct a privacy preserving identity management and access control mechanism for cloud computing. On one hand, cloud service providers (CSP) depend on tenant's identity information to enforce appropriate access control so that cloud resources are only accessed by the authorized tenants who are willing to pay. On the other hand, tenants wish to protect their personalized service access patterns, identity privacy information and accessing newfangled cloud services by on-demand ways within the scope of their permissions. There are many identity authentication and access control schemes to address these challenges to some degree, however, there are still some limitations. In this paper, we propose a new comprehensive approach, called Privacy pReserving Identity and Access Management scheme, referred to as PRIAM, which is able to satisfy all the desirable security requirements in cloud computing. The main contributions of the proposed PRIAM scheme are threefold. First, it leverages blind signature and hash chain to protect tenant's identity privacy and implement secure mutual authentication. Second, it employs the service-level agreements to provide flexible and on-demand access control for both tenants and cloud services. Third, it makes use of the BAN logic to formally verify the correctness of the proposed protocols. As a result, our proposed PRIAM scheme is suitable to cloud computing thanks to its simplicity, correctness, low overhead, and efficiency.

이동 컴퓨터 환경에서 파일 이주를 이용한 접근 지연 감소 기법 (A Scheme for Reducing File Access Latency with File Migration in Mobile Computing Environments)

  • 한문석;박상윤;엄영익
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제28권11호
    • /
    • pp.581-591
    • /
    • 2001
  • 본 논문은 이동 컴퓨팅 환경에서 다중 이동 클라이언트를 위한 원격 파일 접근 문제를 다루었다. 이러한 환경에서 사용자의 이동성은 파일 접근에 영향을 미치며 이동 호스트는 제한된 용량의 비휘발성 저장 장치를 가진다는 점에서 자원에 대한 심각한 제약이 따른다. 따라서, 통신 및 연산 부하가 파일접근 지연을 야기할 수 있다. 본 논문은 이러한 문제를 해결하기 위하여 파일 이주 기법을 이용하여 접근 지연을 줄일 수 있는 기법을 제안한다. 이 기법의 목표는 모든 이동 호스트들에게 가능하면 신속하게 요청한 파일을 전달하여 접근지연을 최소화하는데 있다. 우리는 이동 호스트의 파일 요청이 있을 때 서버가 파일 이주를 결정하는 주문형 기법을 개발하였다. 시뮬레이션을 통하여 파일 접근 빈도, 파일 크기, 이동성 등이 파일시스템 접근 지연에 미치는 영향을 실험하였다. 시뮬레이션 결과에서 제안된 이주 기법은 파일 접근 빈도가 높고 이동성이 작은 이동 호스트가 요청한 파일에 대한 접근 지연을 줄이는데 효율적이라는 것을 보였다.

  • PDF

Web access prediction based on parallel deep learning

  • Togtokh, Gantur;Kim, Kyung-Chang
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권11호
    • /
    • pp.51-59
    • /
    • 2019
  • 웹에서 정보 접근에 대한 폭발적인 주문으로 웹 사용자의 다음 접근 페이지를 예측하는 필요성이 대두되었다. 웹 접근 예측을 위해 마코브(markov) 모델, 딥 신경망, 벡터 머신, 퍼지 추론 모델 등 많은 모델이 제안되었다. 신경망 모델에 기반한 딥러닝 기법에서 대규모 웹 사용 데이터에 대한 학습 시간이 엄청 길어진다. 이 문제를 해결하기 위하여 딥 신경망 모델에서는 학습을 여러 컴퓨터에 동시에, 즉 병렬로 학습시킨다. 본 논문에서는 먼저 스파크 클러스터에서 다층 Perceptron 모델을 학습 시킬 때 중요한 데이터 분할, shuffling, 압축, locality와 관련된 기본 파라미터들이 얼마만큼 영향을 미치는지 살펴보았다. 그 다음 웹 접근 예측을 위해 다층 Perceptron 모델을 학습 시킬 때 성능을 높이기 위하여 이들 스파크 파라미터들을 튜닝 하였다. 실험을 통하여 논문에서 제안한 스파크 파라미터 튜닝을 통한 웹 접근 예측 모델이 파라미터 튜닝을 하지 않았을 경우와 비교하여 웹 접근 예측에 대한 정확성과 성능 향상의 효과를 보였다.

Debug Port Protection Mechanism for Secure Embedded Devices

  • Park, Keun-Young;Yoo, Sang-Guun;Kim, Ju-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제12권2호
    • /
    • pp.240-253
    • /
    • 2012
  • In this paper we propose a protection mechanism for the debug port. While debug ports are useful tools for embedded device development and maintenance, they can also become potential attack tools for device hacking in case their usage is permitted to hackers with malicious intentions. The proposed approach prevents illicit use of debug ports by controlling access through user authentication, where the device generates and issues authentication token only to the server-authenticated users. An authentication token includes user access information which represents the user's permitted level of access and the maximum number of authentications allowed using the token. The device authenticates the user with the token and grants limited access based on the user's access level. The proposed approach improves the degree of overall security by removing the need to expose the device's secret key. Availability is also enhanced by not requiring server connection after the initial token generation and further by supporting flexible token transfer among predefined device groups. Low implementation cost is another benefit of the proposed approach, enabling it to be adopted to a wide range of environments in demand of debug port protection.

Multiple Access and Inter-Carrier Interference in OFDM-CDMA with Random Sequences

  • Jang Won Mee;Nguyen Lim;Bidarkar Pooja
    • Journal of Communications and Networks
    • /
    • 제7권1호
    • /
    • pp.21-28
    • /
    • 2005
  • In this paper, we analyze the performance of code division multiple access (CDMA) systems with orthogonal frequency division multiplexing (OFDM) that employ random spreading sequences in an additive white Gaussian noise (AWGN) channel. We obtain the probability density function (pdf) of the multiple access interference and extend the results to OFDM-CDMA systems to determine the pdf of multiple access and inter-carrier interference in terms of the number of users, the spreading length, the number of sub-carriers, and the frequency offset. We consider the synchronous downlink of cellular multi-carrier CDMA and derive a Gaussian approximation of the multiple access and inter-carrier interference. Overall the effect of frequency offset is shown to vary with the system loading. The analysis in this paper is critical for further development into fading channels and frequency selective multipath channels.