• Title/Summary/Keyword: sensitive information

Search Result 2,333, Processing Time 0.032 seconds

Adaptive Gaussian Mechanism Based on Expected Data Utility under Conditional Filtering Noise

  • Liu, Hai;Wu, Zhenqiang;Peng, Changgen;Tian, Feng;Lu, Laifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3497-3515
    • /
    • 2018
  • Differential privacy has broadly applied to statistical analysis, and its mainly objective is to ensure the tradeoff between the utility of noise data and the privacy preserving of individual's sensitive information. However, an individual could not achieve expected data utility under differential privacy mechanisms, since the adding noise is random. To this end, we proposed an adaptive Gaussian mechanism based on expected data utility under conditional filtering noise. Firstly, this paper made conditional filtering for Gaussian mechanism noise. Secondly, we defined the expected data utility according to the absolute value of relative error. Finally, we presented an adaptive Gaussian mechanism by combining expected data utility with conditional filtering noise. Through comparative analysis, the adaptive Gaussian mechanism satisfies differential privacy and achieves expected data utility for giving any privacy budget. Furthermore, our scheme is easy extend to engineering implementation.

Environment Implementation of Real-time Supervisory System Using Motion Detection Method (동작 검출 기법을 이용한 실시간 감시시스템의 구현)

  • 김형균;고석만;오무송
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.999-1002
    • /
    • 2003
  • In this study, embodied supervisory system that apply motion detection technique to small web camera and detects watch picture. Motion detection technique that use pixel value of car image that use in existing need memory to store background image. Also, there is sensitive shortcoming at increase of execution time by data process of pixel unit and noise. Suggested technique that compare extracting motion information by block unit to do to have complexion that solve this shortcoming and is strong at noise. Because motion information by block compares block characteristic value of image without need frame memory, store characteristic cost by block of image. Also, can get effect that reduce influence about noise and is less sensitive to flicker etc.. of camera more than motion detection that use pixel value in process that find characteristic value by block unit.

  • PDF

A Study on Digital Video Library Development for Semantic-Sensitive Retrieval (시맨틱 검색을 위한 디지털 비디오 라이브러리 구축에 관한 연구)

  • Jang, Sang-Hyun;Lim, Seok-Jong
    • Journal of Information Management
    • /
    • v.37 no.4
    • /
    • pp.93-104
    • /
    • 2006
  • With the advancement of internet and video compression technology, there has been an increasing demand for video, and producted a large quantity contents of UCC. Therefore, Semantic-sensitive retrieval and construction for digital video library is more in demand than ever. However, it is extremely difficult to categorize and label scenes in any video automatically for searching wanted scene. This study proposes a method to extract certain scenes and analyze the video content, and shows the experimental results after categorizing 5 sports news(soccer, baseball, golf, basketball, and volleyball).

Joint Relay Selection and Resource Allocation for Delay-Sensitive Traffic in Multi-Hop Relay Networks

  • Sha, Yan;Hu, Jufeng;Hao, Shuang;Wang, Dan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3008-3028
    • /
    • 2022
  • In this paper, we investigate traffic scheduling for a delay-sensitive multi-hop relay network, and aim to minimize the priority-based end-to-end delay of different data packet via joint relay selection, subcarrier assignment, and power allocation. We first derive the priority-based end-to-end delay based on queueing theory, and then propose a two-step method to decompose the original optimization problem into two sub-problems. For the joint subcarrier assignment and power control problem, we utilize an efficient particle swarm optimization method to solve it. For the relay selection problem, we prove its convexity and use the standard Lagrange method to deal with it. The joint relay selection, subcarriers assignment and transmission power allocation problem for each hop can also be solved by an exhaustive search over a finite set defined by the relay sensor set and available subcarrier set. Simulation results show that both the proposed routing scheme and the resource allocation scheme can reduce the average end-to-end delay.

A Reliable Java Process Group Service under Partitionable Distribured Environments (분할가능 분산환경에서의 신뢰성 있는 자바 프로세서 그룹 서비스)

  • 최혁재;문남두;김현규;박양수;이명주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.196-198
    • /
    • 1998
  • 순수자바기술을 이용한 응용서비스가 정보통신망의 발달과 함께 빠른 속도로 증대되고 있다. 이러한 자바응용 서비스는 네트워크 분할(partition) 및 서버의 실패(crash)와 같은 전산망의 결함에도 불구하고 안정적이고 지속적인 서비스를 제공하는 것이 바람직하다. 이러한 요구사항은 서비스를 제공하는 분산된 서버들을 논리적인 하나의 그룹으로 동작하도록 하는 프로세서 그룹을 이용함으로써 해결될 수 있다. 본 연구에서는 네트웍 분할로 인해 프로세서 그룹이 두 개이상의 구성요소(component)로 나뉘어 지더라도 지속적인 고가용성(high availability)의 지원을 위해 응용서비스의 특성에 따라 기존의 처리결과에 영향을 받아 다음 서비스를 처리해야 한다. history-sensitive 그룹과 기존의 처리결과에 영향을 받지 않는 history-sensitive 그룹의 개념을 도입하여 기존의 프로세서 그룹을 확장한 신뢰성 있는 프로세서를 그룹 서비스에 대해서 살펴본다.

  • PDF

Roles of Brand Loyalty in Determination of Smartphone Purchasing Intention (스마트폰 구매의도 결정에서 브랜드 충성도의 역할)

  • Lee, Woong-kyu;Park, Jin-Hoon
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.125-142
    • /
    • 2017
  • This study aims to identify and analyze the roles of incumbent smartphone's brand loyalty in smartphone adoption considering rational judgments and aesthetics evaluation. For this purpose, two hypotheses are developed based on dual process theory. For the validation of these hypotheses, G4, a smartphone brand from LG, was adopted as the target smartphone. The participants were university students in Korea, non-LG smartphones. In result, two hypotheses were statistically supported. This study showed that users with higher brand loyalty toward incumbent smartphone would be more sensitive to rational judgment while lower brand loyalty more sensitive to aesthetic evaluation.

Electro-conductive polymer by $\gamma$-ray irradiation ($\gamma$-선 조사방식에 의한 전도성 폴리머 제작 특성)

  • ;;;G.A. Mun;V.A. Kovtunets;Z.S. Nurkeeva;V.V. Khutoryanskiy
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.762-765
    • /
    • 2003
  • 에틸렌글리콜(ethyleneglycol)을 이용한 폴리비닐에테르(polyvinyl ether)와 같은 고분자물질을 활용하여 Co$^{30}$ 방사선원으로부터 ${\gamma}$선을 조사시켜, 고분자 물질의 성질을 변화시킴으로써 화학, 전기전자, 환경 및 기타 여러 가지 응용분야에 적용하여 이용할 수 있는 기술을 개발하였다. 이를 바탕으로 관련재료의 단량체(monomer)로부터 중합체(polymer)를 합성하여 water swelling을 시키는 과정에서 각종 (금속) 이온을 흡입-제거하는 방법의 환경복원기술, 흡입 금속이온을 표면에 밀집시켜 금속막을 형성하는 응용기술, 생체조직의 대용물질로 활용하는 의용공학 및 열감지특성(thermal sensitive property) 또는 pH 감지특성(pH sensitive property)을 이용하여 의용기술에 적용하는 polymer 응용기술 등의 폭넓은 활용을 위하여 그 일환으로 전도성 고분자 제조기술로의 활용가능성을 연구하였다.

  • PDF

Secure Attribute-Based Access Control with a Ciphertext-Policy Attribute-Based Encryption Scheme

  • Sadikin, Rifki;Park, Young Ho;Park, Kil Houm
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.1
    • /
    • pp.1-12
    • /
    • 2014
  • An access control system is needed to ensure only authorized users can access a sensitive resource. We propose a secure access control based on a fully secure and fine grained ciphertext-policy attribute-based encryption scheme. The access control for a sensitive resource is ensured by encrypting it with encryption algorithm from the CP-ABE scheme parameterized by an access control policy. Furthermore, the proposed access control supports non-monotone type access control policy. The ciphertext only can be recovered by users whose attributes satisfy the access control policy. We also implement and measure the performance of our proposed access control. The results of experiments show that our proposed secure access control is feasible.

Speed-Sensitive Handover Scheme over IEEE 802.16 Multi-Relay Networks

  • Kim, Dong-Ho;Kim, Soon-Seok;Lee, Yong-Hee
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.403-412
    • /
    • 2010
  • Multi-Relay Networks should accommodate mobile users of various speeds. The cellular system should meet the minimum residency time requirements for handover calls while considering an efficient use of available channels. In this paper, we design speed-sensitive handover under dynamic hierarchical cellular systems, in which mobile users are classified according to the mean speed of mobile users and each class has its cellular layer. In order to meet the minimum residency time, the cell size of each cellular layer is dynamically determined depending on the distributions of mean speeds of mobile users. Since the speed-dependent non-preferred cell can provide a secondary resource, overflow and take-back schemes are adopted in the system. We develop analytical models to study the performance of the proposed system, and show that the optimal cell size improves the blocking probability.

Security of Constant Weight Countermeasures

  • Won, Yoo-Seung;Choi, Soung-Wook;Park, Dong-Won;Han, Dong-Guk
    • ETRI Journal
    • /
    • v.39 no.3
    • /
    • pp.417-427
    • /
    • 2017
  • This paper investigates the security of constant weight countermeasures, which aim to produce indistinguishable leakage from sensitive variables and intermediate variables, assuming a constant Hamming distance and/or Hamming weight leakages. To investigate the security of recent countermeasures, contrary to many related studies, we assume that the coefficients of the simulated leakage models follow a normal distribution so that we may construct a model with approximately realistic leakages. First, using our simulated leakage model, we demonstrate security holes in these previous countermeasures. Subsequently, in contrast to the hypotheses presented in previous studies, we confirm the resistance of these countermeasures to a standard correlation power analysis (CPA). However, these countermeasures can allow a bitwise CPA to leak a sensitive variable with only a few thousand traces.