• Title/Summary/Keyword: user verification

Search Result 593, Processing Time 0.025 seconds

A Study on Implementation of a 64 Channel Signal Generator / Analyzer Module (64채널 신호발생/분석 모듈 구현에 관한 연구)

  • 민경일;정갑천;최종현;박성모
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2609-2612
    • /
    • 2003
  • This paper describes a 64 channel signal generator/analyzer module that is useful for verification and testing of digital circuits. It can perform logic analyzer function and signal generator function at the same time. The 64 Channel module is implemented with single FPGA chip for miniaturization, and an USB interface is used to increase portability of the module. Multiple modules can be used in parallel for the verification of large scale circuits. Moreover, since the module is implemented as a PC based system, one can configure convenient GUI(Graphic User Interface) environment.

  • PDF

Multimodal biometrics system using PDA under ubiquitous environments (유비쿼터스 환경에서 PDA를 이용한 다중생체인식 시스템 구현)

  • Kwon Man-Jun;Yang Dong-Hwa;Kim Yong-Sam;Lee Dae-Jong;Chun Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.4
    • /
    • pp.430-435
    • /
    • 2006
  • In this paper, we propose a method based on multimodal biometrics system using the face and signature under ubiquitous computing environments. First, the face and signature images are obtained by PDA and then these images with user ID and name are transmitted via WLAN(Wireless LAN) to the server and finally the PDA receives verification result from the server. The multimodal biometrics recognition system consists of two parts. In client part located in PDA, user interface program executes the user registration and verification process. The server consisting of the PCA and LDA algorithm shows excellent face recognition performance and the signature recognition method based on the Kernel PCA and LDA algorithm for signature image projected to vertical and horizontal axes by grid partition method. The proposed algorithm is evaluated with several face and signature images and shows better recognition and verification results than previous unimodal biometrics recognition techniques.

A Study on Result Analysis and Survey of User Requirements for Military Sleeping Bag (군용 침낭 사용자 요구에 맞춘 설문조사와 결과 분석)

  • Lee, Jeong Mun
    • Journal of Korean Society for Quality Management
    • /
    • v.42 no.3
    • /
    • pp.339-360
    • /
    • 2014
  • Purpose: The objective of this paper was to analyze the requirements of the end-users by class after carrying out a survey on the user requirements for sleeping bags and utilize the result for effective product development. Methods: The test for difference in means by class was conducted through one sample analysis and one-way ANOVA after the survey result has gone through a reliability verification, and an LSD (Least Significant Difference) test was conducted as a post-mortem method. Results: A significant result was derived from the survey on the user requirements for sleeping bags by method of use, use of combination of sleeping bag components or a sleeping bag alone. Conclusion: The significant result derived from the survey of this paper on the user requirements for sleeping bags can be utilized for effective development of sleeping bags.

Verification of Flight Control Law Similarity and HILS Environment Reliability for Fighter Aircraft (전투기급 비행제어법칙 상사성 및 HILS 환경 신뢰성 검증)

  • Ahn, Seong-Jun;Kim, Chong-Sup;Cho, In-Je;Lee, Eun-Yong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.7
    • /
    • pp.701-708
    • /
    • 2009
  • The flight control law of developed flight control computer(DFLCC) is developed based on operation flight program of advanced trainer aircraft full scale development final configuration. The flight control law design is used common use development tool in GUI(Graphic User Interface) environment. The flight control law transformed to C-Code is reflected in OFP. The OFP is verified by the standardized verification process. But, before standardized verification process, we need preliminary verification process such as similarity of flight control law and reliability of developed HILS. Similarity of flight control law is verified by comparing the aircraft response of advanced trainer aircraft and those of the developed control law. Also, reliability of developed HILS is verified by comparing the aircraft response of HILS and Non-real time simulation result. This paper verifies similarity of developed control law and reliability of HILS environment as comparing aircraft response.

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.

The Verification and Retrieval Method for selection of Compatible Object Model (객체 모델 선택을 위한 검증 및 검색방법)

  • Lim, Myung-Jae;Kwon, Young-Man;Kang, Jeong-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.5
    • /
    • pp.169-174
    • /
    • 2009
  • In this paper, We define convert rules objects and relation presented in object model to the state and operation domain in formal specification. we implement simulation tool in order to verification method of formal specification and to consistency verified model between user's requirement. It is possible to select the suitable model and reduce the costs and efforts on software development.

  • PDF

Verifying Active Network Applications (액티브 네트워크 응용의 검증)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.510-523
    • /
    • 2002
  • The routers in an active network perform customized computations on the messages flowing through them, while the role of routers in the traditional packet network, such as the Internet, is to passively forward packets as fast as possible. In contrast to the Internet, the processing in active networks can be customized on a per user or per application basis. Active networks allow users to inject information into the network, where the information describes or controls a program to be executed for the users by the routers as well as the end hosts. So the network users can realize the active networks by "programming" the network behavior via the programming interface exposed to them. In this paper, we devise a network protocol model and present a verification technique for reasoning about the correctness of an active application defined using the model. The technique is developed in a platform- and language-independent way, and it is algorithmic and can be automated by computer program. We give an example dealing with network auction to illustrate the use of the model and the verification technique.

A Study on GUI Generation for Information System Developer (정보시스템 개발자를 위한 GUI 생성에 대한 연구)

  • 민병도;이재봉;이종석
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.22 no.49
    • /
    • pp.153-161
    • /
    • 1999
  • GUI(Graphic User Interface) have an influence on end-user environments in information system. Consistency is one of the most important GUI characteristics. Consistency should apply across the different media which form the total user interface. User can get a lot of benefits through consistency. To achieve consistency of the total interface, the interface standards are very important. The goals of this study is to suggest GUI's development guidelines through analysis of real fields using ERP package in a electric assembly line. The guidelines fall into four functions: inquiry, registration, modification, deletion. The guidelines can be used for better system development later and as verification tool in GUI development.

  • PDF

Diversification of User Authentication by Writing Applet on Java Card (자바카드 애플릿 설정에 따른 사용자 인증의 다각화)

  • Song, Young-Sang;Shin, In-Chul
    • Journal of IKEEE
    • /
    • v.13 no.4
    • /
    • pp.89-95
    • /
    • 2009
  • Recently, IC cards are used to protect personal information and to have user verification. Among them, the usage of Java Cards which can contain applications after issuing are increasing and installing several applets on Java card is possible. When Java Cards are used, applet works after completing user identification. In this paper, we designed, embodied and verified the mechanism of user identification process according to PIN setting of applets; Stored_PIN, Install_PIN and Update_PIN. These several applications of Java cards will be used for user identification independently or multiply, while using diverse user identification.

  • PDF

A Design of One-time Password Verification System with Enhanced Security Using Certificate (인증서를 이용한 보안성이 강화된 일회용 패스워드 검증 시스템의 설계)

  • Kim, Hyun-Chul;Lee, Chang-Soo;Lee, Kyung-Seok;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.435-441
    • /
    • 2009
  • The one-time password system solves the problem concerning password reuse caused by the repeated utilization of an identical password. The password reuse problem occurs due to the cyclic repetition at the time of password creation, and authentication failure can occur due to time deviation or non-synchronization of the number of authentication. In this study, the password is created asynchronously and exchanged with the user, who then signs using a digital signature in exchange for the password and a valid verification is requested along with the certificate to ensure non-repudiation. Besides this, a verification system for one-time password is proposed and designed to improve security by utilizing the validity verification that is divided into certificate verification and password verification. Comparative analysis shows that the mechanism proposed in this study is better than the existing methods in terms of replay attack, non-repudiation and synchronization failure.