• Title/Summary/Keyword: full-information

Search Result 3,671, Processing Time 0.031 seconds

A Cryptography Algorithm using Telescoping Series (망원급수를 이용한 암호화 알고리즘)

  • Choi, Eun Jung;Sakong, Yung;Park, Wang Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

Performance Analysis of a Novel Distributed C-ARQ Scheme for IEEE 802.11 Wireless Networks

  • Wang, Fan;Li, Suoping;Dou, Zufang;Hai, Shexiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3447-3469
    • /
    • 2019
  • It is well-known that the cooperative communication and error control technology can improve the network performance, but most existing cooperative MAC protocols have not focused on how to cope with the contention process caused by cooperation and how to reduce the bad influence of channel packet error rate on the system performance. Inspired by this, this paper first modifies and improves the basic rules of the IEEE 802.11 Medium Access Control (MAC) protocol to optimize the contention among the multi-relay in a cooperative ARQ scheme. Secondly, a hybrid ARQ protocol with soft combining is adopted to make full use of the effective information in the error data packet and hence improve the ability of the receiver to decode the data packet correctly. The closed expressions of network performance including throughput and average packet transmission delay in a saturated network are then analyzed and derived by establishing a dedicated two-dimensional Markov model and solving its steady-state distribution. Finally, the performance evaluation and superiority of the proposed protocol are validated in different representative study cases through MATLAB simulations.

Power Allocation for Half-duplex Relay-based D2D Communication with QoS guarantee

  • Dun, Hui;Ye, Fang;Jiao, Shuhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1311-1324
    • /
    • 2019
  • In the traditional cellular network communication, the cellular user and the base station exchange information through the uplink channel and downlink channel. Meanwhile, device-to-device (D2D) users access the cellular network by reusing the channel resources of the cellular users. However, when cellular user channel conditions are poor, not only D2D user cannot reuse its channel resources to access the network, but also cellular user's communication needs cannot be met. To solve this problem, we introduced a novelty D2D communication mechanism in the downlink, which D2D transmitter users as half-duplex (HD) relays to assist the downlink transmission of cellular users with reusing corresponding spectrum. The optimization goal of the system is to make the cellular users in the bad channel state meet the minimum transmission rate requirement and at the same time maximize the throughput of the D2D users. In addition, i for the purpose of improving the efficiency of relay transmission, we use two-antenna architecture of D2D relay to enable receive and transmit signals at the same time. Then we optimized power of base station and D2D relay separately with consideration of backhaul interference caused by two-antenna architectures. The simulation results show that the proposed HD relay strategyis superior to existing HD and full-duplex (FD) models in the aspects of system throughput and power efficiency.

Discovery Layer in Library Retrieval: VuFind as an Open Source Service for Academic Libraries in Developing Countries

  • Roy, Bijan Kumar;Mukhopadhyay, Parthasarathi;Biswas, Anirban
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.4
    • /
    • pp.3-22
    • /
    • 2022
  • This paper provides an overview of the emergence of resource discovery systems and services, along with their advantages, best practices, and current landscapes. It outlines some of the key services and functionalities of a comprehensive discovery model suitable for academic libraries in developing countries. The proposed model (VuFind as a discovery tool) performs like other existing web-scale resource discovery systems, both commercial and open-source, and is capable of providing information resources from different sources in a single-window search interface. The objective of the paper is to provide seamless access to globally distributed subscribed as well as open access resources through its discovery interface, based on a unified index. This model uses Koha, DSpace, and Greenstone as back-ends and VuFind as a discovery layer in the front-end and has also integrated many enhanced search features like Bento-box search, Geodetic search, and full-text search (using Apache Tika). The goal of this paper is to provide the academic community with a one-stop shop for better utilising and integrating heterogeneous bibliographic data sources with VuFind (https://vufind.org/vufind).

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

Knowledge Graph of Administrative Codes in Korea: The Case for Improving Data Quality and Interlinking of Public Data

  • Haklae Kim
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.3
    • /
    • pp.43-57
    • /
    • 2023
  • Government codes are created and utilized to streamline and standardize government administrative procedures. They are generally employed in government information systems. Because they are included in open datasets of public data, users must be able to understand them. However, information that can be used to comprehend administrative code is lost during the process of releasing data in the government system, making it difficult for data consumers to grasp the code and limiting the connection or convergence of different datasets that use the same code.This study proposes a way to employ the administrative code produced by the Korean government as a standard in a public data environment on a regular basis. Because consumers of public data are barred from accessing government systems, a means of universal access to administrative code is required. An ontology model is used to represent the administrative code's data structure and meaning, and the full administrative code is built as a knowledge graph. The knowledge graph thus created is used to assess the accuracy and connection of administrative codes in public data. The method proposed in this study has the potential to increase the quality of coded information in public data as well as data connectivity.

Collaborative Secure Decision Tree Training for Heart Disease Diagnosis in Internet of Medical Things

  • Gang Cheng;Hanlin Zhang;Jie Lin;Fanyu Kong;Leyun Yu
    • Journal of Information Processing Systems
    • /
    • v.20 no.4
    • /
    • pp.514-523
    • /
    • 2024
  • In the Internet of Medical Things, due to the sensitivity of medical information, data typically need to be retained locally. The training model of heart disease data can predict patients' physical health status effectively, thereby providing reliable disease information. It is crucial to make full use of multiple data sources in the Internet of Medical Things applications to improve model accuracy. As network communication speeds and computational capabilities continue to evolve, parties are storing data locally, and using privacy protection technology to exchange data in the communication process to construct models is receiving increasing attention. This shift toward secure and efficient data collaboration is expected to revolutionize computer modeling in the healthcare field by ensuring accuracy and privacy in the analysis of critical medical information. In this paper, we train and test a multiparty decision tree model for the Internet of Medical Things on a heart disease dataset to address the challenges associated with developing a practical and usable model while ensuring the protection of heart disease data. Experimental results demonstrate that the accuracy of our privacy protection method is as high as 93.24%, representing a difference of only 0.3% compared with a conventional plaintext algorithm.

A Study on the Design of Standard Code for Hazardous and Noxious Substance Accidents at Sea (해상 HNS 사고 표준코드 설계에 관한 연구)

  • Ha, Min-Jae;Jang, Ha-Lyong;Yun, Jong-Hwui;Lee, Moonjin;Lee, Eun-Bang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.2
    • /
    • pp.228-232
    • /
    • 2016
  • As the quantity of HNS sea trasport and the number of HNS accidents at sea are increasing recently, the importance of HNS management is emphasized so that we try to develop marine accident case standard code for making HNS accidents at sea databased systemically in this study. First and foremost, we draw the related requisites of essential accident reports along with internal and external decrees and established statistics of classified items for conducting study, and we referred to analogous standard codes obtained from developed countries in order to research code design. Code design is set like 'Accident occurrence ${\rightarrow}$ The initial accident information ${\rightarrow}$ Accident response ${\rightarrow}$ Accident investigation' in accordance with the general flow of marine HNS accidents of in which the accident information is input and queried. We classified initial accident information into the items of five categories and constructed "Preliminary Information Code(P.I.C.)". In addition we constructed accident response in two categories and accident investigation in three categories that get possible after the accident occurrence as called "Full Information(F.I.C.)", including the P.I.C. It is represented in 3 kinds of steps on each topic by departmentalizing the classified majority as classified middle class and classified minority. As a result of coding marine HNS accident and of the code to a typical example of marine HNS accident, HNS accident was ascertained to be represented sufficiently well. We expect that it is feasible to predict possible trouble or accident henceforward by applying code, and also consider that it is valuable to the preparedness, response and restoration in relation to HNS accidents at sea by managing systemically the data of marine HNS accidents which will occur in the future.

Design of Vertical Type MEMS Probe with Branch Springs (분기된 구조를 갖는 수직형 MEMS 프로브의 설계)

  • Ha, Jung-Rae;Kim, Jong-Min;Kim, Byung-Ki;Lee, June-Sang;Bae, Hyeon-Ju;Kim, Jung-Yup;Lee, Hak-Joo;Nah, Wan-Soo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.7
    • /
    • pp.831-841
    • /
    • 2010
  • The conventional vertical probe has the thin and long signal path that makes transfer characteristic of probe worse because of the S-shaped structure. So we propose the new vertical probe structure that has branch springs in the S-shaped probe. It makes closed loop when the probe mechanically connects to the electrode on a wafer. We fabricated the proposed vertical probe and measured the transfer characteristic and mechanical properties. Compared to the conventional S-shaped vertical probe, the proposed probe has the overdrive that is 1.2 times larger and the contact force that is 2.5 times larger. And we got the improved transfer characteristic by 1.4 dB in $0{\sim}10$ GHz. Also we developed the simulation model of the probe card by using full-wave simulator and the simulation result is correlated with measurement one. As a result of this simulation model, the cantilever probe and PCB have the worst transfer characteristic in the probe card.

Analysis and Service Quality Evaluation on NDSL Website (NDSL 웹사이트 분석 및 서비스 품질평가)

  • Lee, Ju-Hyun;Lee, Eung-Bong;Kim, Hwan-Min
    • Journal of Information Management
    • /
    • v.37 no.4
    • /
    • pp.69-91
    • /
    • 2006
  • The purpose of this study is to improve the effectiveness and quality of web service by analyzing the web service problems and suggesting the solutions through the expert service quality evaluation from the point of view of users and website quality evaluation by measurement tools for a whole NDSL website. In case of website analysis, this study analyzed the website completeness of NDSL site and looked into the problem that users can judge by intuition during their use of the site, and evaluated the searchability and usability for web-based service quality evaluation by centering on the service quality of database quality items. After the results of this analysis, it appeared that there was not a big problem on the use. But after searching, several problems were found on loading rates, website completeness, user sensitiveness, the protection of private information, metadata completeness, website accessability, etc. And as a result of the evaluation of website service quality, it does not show the all satisfactory results in the function of search methods and search result printing, mark list and the items related to full-text in the part of searchability and usability. However, comparing with the results of other information organizations, it shows the similar level of quality.