• 제목/요약/키워드: confirmation

Search Result 1,782, Processing Time 0.022 seconds

Block Chain Conformance in Modular NVIDIA Jetson TX 2 Embedded Products (모듈형 NVIDIA Jetson TX2 임베디드 제품에서의 블록체인 적합성)

  • Choi, Hyo Hyun;Lee, Gyeong young;Won, Son Dong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.297-298
    • /
    • 2018
  • 본 논문에서는 모듈형 NVIDIA Jetson TX2 임베디드 제품에서 채굴을 통해 블록체인의 적합성 여부를 보인다. 범용성과 적합성의 평가기준은 TPS (Transactions Per Second), 블록생성시간(Block Generation Time)과 확정시간(Confirmation Time)이다. 채굴 준비 시 TX2 임베디드 제품의 특성상 하드웨어 드라이버를 자립적으로 설치 할 수 없기 때문에 HOST PC와 함께 사용하였다. HOST PC는 TX2 제품과 호환성이 높은 OS인 Ubuntu 14.04를 사용했으며, 하드웨어 드라이버 설치를 위해 NVIDIA 공식 TX2 제품 소프트웨어 중 JetPack 3.1 Release Version 을 사용하였다. 코인은 이더리움(Ethereum), 라이트코인(Litecoin)과 제트캐쉬(Zcash) 총 3종 코인으로, 채굴 시 나온 결과물로 TX2 제품에서 블록체인의 적합성 여부를 보였다.

  • PDF

Allocation Strategies of Controllable Loads for Load Aggregator in Power Market (부하관리사업자의 부하배분 전략)

  • Lee, C.J.;Cho, K.S.;Kim, H.C.;Park, J.B.;Shin, J.R.;Kim, S.S.
    • Proceedings of the KIEE Conference
    • /
    • 2003.07a
    • /
    • pp.630-632
    • /
    • 2003
  • This paper describes allocation strategies of controllable loads for load aggregator in power market with the direct load control (DLC) program, which is carried out the two-way confirmation procedure. So, it is needed to the priority among the controllable loads to perform effectively and quickly the confirmation task. In this paper, allocation strategies for market operator and/or load aggregator are proposed, which are based on the basic load patterns defined in this paper. To verify the soundness of proposed strategies. case study on a sample system is performed.

  • PDF

Analysis on the Post Acceptance Behavior Model in User Created Contents(UCC) (사용자제작콘텐츠(UCC) 이용자의 수용 후 행동 모델 분석)

  • Jung, Chul-Ho;Chung, Young-Soo
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.2
    • /
    • pp.175-185
    • /
    • 2010
  • The primary objective of this paper is to examine post acceptance behavior model in UCC services. Based on the relevant literature reviews, this study posits six characteristics, that is, expectation confirmation, perceived usefulness, perceived enjoyment, satisfaction, and continuance intention as key variables to describe the post acceptance behavior model in UCC services. Then we constructed a research model and hypotheses about relationship between these variables. A total 286 usable survey responses of UCC service users have been employed in the analysis. The empirical results of this study are summarized as follows. Firstly, expectation confirmation has a positive effect on the perceived usefulness, perceived enjoyment, and satisfaction. Secondly, perceived enjoyment has a positive effect on the satisfaction. Lastly, perceived usefulness, perceived enjoyment, and satisfaction have a positive effect on the continuance intention. These results will be helpful for the UCC services sector to further develop service delivery strategies for strengthening the ongoing relationship with customers. Finally, some possible limits of the present research and future directions for such research were discussed.

  • PDF

An Exploratory Study on the Customer Satisfaction of e-Ticket Process (항공사 e-티켓 이용에 대한 고객 만족에 관한 탐색적 연구)

  • Yoo, Yong-Jae;Park, Jong-Gi;Lee, Seung-Chang
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.14 no.3
    • /
    • pp.40-50
    • /
    • 2006
  • This study investigates how airline customers evaluate e-ticket process newly adopted by many of airlines. Customers are highly satisfied with the easy of confirmation on their itineraries and the channel provided through while they are worry about the likelihood of leakage of personal information during e-ticket process. Highly experienced customers on the usage of e-ticket are more concerned about ancillary aspects such as visual image of I.T.R(Itinerary and Receipt) and travel information than functional aspect such as easy of confirmation on itinerary. And also experienced customers are more likely to repurchase e-ticket and when purchasing tickets they do it through internet and call center of airlines rather than travel agencies and ticket office of airlines.

  • PDF

베이즈주의와 오래된 증거의 문제

  • Yeo, Yeong-Seo
    • Korean Journal of Logic
    • /
    • v.6 no.2
    • /
    • pp.135-158
    • /
    • 2003
  • 베이즈주의는 믿음의 정도라는 확률의 의미해석과 수학적 확률론에 의한 계산체계를 기초로 하여 가설과 증거간의 입증(confirmation) 관계를 명료하게 분석한다. 베이즈주의는 증거 E가 가설 H를 입증한다는 것을 PR(HIE&K)-PR(HIK)>0으로 정의한다. 그러나 이러한 분석이 과연 과학자들의 입증개념을 올바로 반영하고 있는가 하는 비판이 오래된 증거(old evidence)의 문제로부터 제기되었다 오래된 증거는 이미 알려진 정보이기 때문에 완전한 확률 값 1을 부여받는다. 이 때 오래된 증거가 가설을 입증할 수 있는가 하는 질문은 베이즈주의자와 실제 과학자 사이에 서로 다른 답변을 도출한다. 먼저 베이즈주의에 따르면 오래된 증거가 가설을 입증할 수 없다. 그것은 PR(EIK)=1일 때 PR(HIK)=PR(HIE&K)의 결과가 도출되기 때문이다. 하지만 과학사의 여러 예들로부터 제시되는 실제 과학자들의 입증개념에 따르면 오래된 증거가 가설을 입증하고 있다. 필자는 이와 같은 입증개념의 이질성 문제가 다만 어떤 증거가 입증 가능한 것인지를 구분해야 하는 질적인(qualitative) 문제일 뿐만 아니라 증거가 가설을 어느 정도 입증하는지 하는 입증도를 정확하게 측정해야 하는 양적인(quantitative) 문제라는 점을 밝힌다. 특히 필자는 양적인 문제를 해결하면 질적인 문제가 자연히 해결된다는 점을 밝히고, 반 프라센이나 가버가 제안한 전략이 모두 질적인 문제만을 다루기 때문에 부분적인 해결책에 지나지 않는다는 점을 밝힘으로써 오래된 증거의 문제의 본질은 양적인 문제에 있다는 점을 주장한다.

  • PDF

A Study on Stability of Middle Slabs supporting Train Loads in Subway Station (열차하중을 지지하는 지하철정거장 중간슬래브의 안정성 연구)

  • Woo, Jong-Tae;Yhim, Sung-Soon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.3 no.3
    • /
    • pp.195-202
    • /
    • 1999
  • This study present the stability of middle slabs directly supporting train loads in the subway station. According to results of Quality confirmation, mixing and curing conditions are good. But, when effects of hydration heat are analyzed, cracks seems to take place because tensile stress is higher than tensile strength in several points of middle slabs. It is found that vibration by train running don't have an effect on cracks in the structure. The structural analysis shows that there is no problem on the stability of structural body, but the design through 3-dimensional analysis is need to consider columns and opening specially in the subway station structures.

  • PDF

EC-SRP Protocol ; Elliptic Curve Secure Remote Password Protocol (타원곡선을 이용한 안전한 패스워드 프로토콜)

  • 이용기;이정규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.85-102
    • /
    • 1999
  • In this paper, we propose an EC-SRP(Elliptic Curve - Secure Remote Password) protocol that uses ECDLP(Elliptic Curve Discrete Logarithm Problem) instead SRP protocols’s DLP. Since EC-SRP uses ECDLP, it inherits the high performance and security those are the properties of elliptic curve. And we reduced the number of elliptic curve scalar multiplication to improve EC-SRP protocol’s performance. Also we have proved BC-SRP protocol is a secure AKC(Authenticated Key Agreement with Key Confirmation) protocol in a random oracle model.

A Margin-based Face Liveness Detection with Behavioral Confirmation

  • Tolendiyev, Gabit;Lim, Hyotaek;Lee, Byung-Gook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.187-194
    • /
    • 2021
  • This paper presents a margin-based face liveness detection method with behavioral confirmation to prevent spoofing attacks using deep learning techniques. The proposed method provides a possibility to prevent biometric person authentication systems from replay and printed spoofing attacks. For this work, a set of real face images and fake face images was collected and a face liveness detection model is trained on the constructed dataset. Traditional face liveness detection methods exploit the face image covering only the face regions of the human head image. However, outside of this region of interest (ROI) might include useful features such as phone edges and fingers. The proposed face liveness detection method was experimentally tested on the author's own dataset. Collected databases are trained and experimental results show that the trained model distinguishes real face images and fake images correctly.

The Effects of Variety and Visual Cue on PerceivedQuantity and Consumer Attitude toward Participationinto Sales Promotion Events

  • Lee, Changhyun;Kim, Youngchan
    • Asia Marketing Journal
    • /
    • v.21 no.1
    • /
    • pp.65-87
    • /
    • 2019
  • Most studies on how people perceive a given quantity of items were conducted with visual cues exclusively and only offered spatial area based explanations, such as spatial estimation and perceptual grouping theories. This article establishes how people perceive a given quantity when only a written description is provided without any visual cues. Across two studies we show that variety decreases perceived quantity when a variety cue is given, while variety increases perceived quantity when a visual cue is not given. This is because people tend to rely heavily on spatial areas when a visual cue is present and because people are prone to confirmation bias when they are provided with no visual cues but only written descriptions. Furthermore, we highlight that quantity perception has a mediation effect on consumers' attitude-the intention to participate in sales promotional events. Lastly, we summarize the article and discuss its contributions, implications, limitations, and suggestions for future research.

Blockchain-based authentication for IoT

  • Alaa Alsubhi;Jawaher Alhrthi;Wajdi Alhakami
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.198-204
    • /
    • 2024
  • Correspondence security between IoT devices is a significant concern, and the blockchain makes the latest difference by reducing this matter. In the blockchain idea, the larger part or even all organization hubs check the legitimacy and precision of traded information before tolerating and recording them, regardless of whether this information is identified with monetary exchanges or estimations of a sensor or a confirmation message. In assessing the legitimacy of a traded information, hubs should agree to play out an uncommon activity. The chance to enter and record exchanges and problematic cooperation with the framework is fundamentally decreased. To share and access the executives of IoT devices data with disseminated demeanour, another confirmation convention dependent on block-chain is proposed, and it is guaranteed that this convention fulfils client protection saving and security. This paper highlights the recent approaches conducted by other researchers to secure the Internet of Things environments using blockchain. These approaches are studied and compared with each other to present their features and disadvantages.