In this paper, we present an on-line electronic payment system for low-value transaction. We use the concept of signcryption for each communication between any pair of entities and offers token updation instantly as a...
详细信息
In this paper, we present an on-line electronic payment system for low-value transaction. We use the concept of signcryption for each communication between any pair of entities and offers token updation instantly as an add-on feature to existing on-line e-cash systems where token is the payment instrument (containing electronic cash) which acts as an electronic wallet. In our system, the token is issued and authenticated by Issuing Bank (token issuer). Merchant verifies the user and sends authenticated transaction details to Issuing Bank. Later Issuing Bank verifies approval of both customer and merchant. The merchant is also verified by its financial institution. Unlike the existing e-payment system question of double spending of e-cash arises because each transaction are made uniquely identifiable and updation is instantly done by Issuing bank. Hence no separate protocols are needed to be developed for handling disputes. The proposed scheme provide anonymity, authenticity, confidentiality and fairness.
Because of distributed nature, grid computing environments are easy targets for intruders looking for possible vulnerabilities to exploit [1]. By impersonating legitimate users, the intruders can use a service's a...
详细信息
Because of distributed nature, grid computing environments are easy targets for intruders looking for possible vulnerabilities to exploit [1]. By impersonating legitimate users, the intruders can use a service's abundant resources maliciously. To combat attackers, intrusion-detection systems (IDSs) can offer additional security measures for these environments by investigating configurations, logs, network traffic, and user actions to identify typical attack behavior. However, IDS must be distributed to work in a grid computing environment. It must monitor each node and, when an attack occurs, alert other nodes in the environment. This kind of communication requires compatibility between heterogeneous hosts, various communication mechanisms, and permission control over system maintenance and updates. We present the problem of grid intrusion; analyze the requirements of a system to detect them. In this paper we are discussing how IDS can be implemented for grid computing environment.
Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this ***’s are based on the beli...
详细信息
Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this ***’s are based on the belief that an intruder’s behavior will be noticeably different from that of a legitimate user.A variety of intrusion detection systems (IDS) have been employed for protecting computers and networks from malicious attacks by using traditional statistical methods to new data mining approaches in last ***,today's commercially available intrusion detection systems are signature- based that are not capable of detecting unknown *** this paper we analyze a classification model for misuse and anomaly attack detection using decision tree algorithm.
We independently have developed low-cost finger vein certification device. The light transmission of a finger differs depending on each person so we need automatic light intensity adjustment system to certificate each...
We independently have developed low-cost finger vein certification device. The light transmission of a finger differs depending on each person so we need automatic light intensity adjustment system to certificate each person. In this paper, we report the automatic system which controls light intensity by feedback control and it is controlled by intensities of captured images. This adjustment system makes possible to capture stable and high contrasted images which shows any finger veins. Moreover, we have developed two types of finger vein certification devices. One is penetrated type and the other is reflection type. The penetrated device shows over 99.9[%] certification rate, and the reflection device shows 98.82[%]. The former shows high certification accuracy, but the reflection device could be smaller than the penetrated device.
The purpose of this study is to implement a search system to improve the coupling efficiency of precision fasteners that require strict control. Currently, mainstream systems in aircraft manufacturing do not consider ...
详细信息
The purpose of this study is to implement a search system to improve the coupling efficiency of precision fasteners that require strict control. Currently, mainstream systems in aircraft manufacturing do not consider the work process or environment. In existing databases, only data on fasteners is viewable; it is inefficient because information such as bore diameter and the required tool manufacturing process is maintained separately. Also the torque required when fastening a fastener, is needed so the system can retrieve data quickly. In this study, we have designed a system that can search for various fastener information efficiently. Also, by implementing an alternative fastener system to calculate the similarity between the fasteners, we can improve the convenience of selecting a replacement fastener in the design department. In this paper, this system is shown to significantly reduce the cost of acquiring information on fasteners, and to provide some degree of benefit in terms of production cost.
Sliding mode control (SMC) has been considered as a powerful method for disturbances rejection. On the other hand, we have presented an equivalent-input disturbance (EID) approach to reject disturbances. This paper ta...
详细信息
Sliding mode control (SMC) has been considered as a powerful method for disturbances rejection. On the other hand, we have presented an equivalent-input disturbance (EID) approach to reject disturbances. This paper takes a dual-stage feed drive as an example to compare these two methods. The example shows that, while the EID approach obtains almost the same disturbance rejection performance for matched disturbances as that of the SMC does, it can reject unmatched disturbances. This shows the superiority of the EID approach over SMC method.
This paper discusses the role of casual attributions and positive emotion in trust repair of *** equation modeling(SEM) was used in our study to analyze 517 valid online *** empirical results indicate that casual attr...
详细信息
This paper discusses the role of casual attributions and positive emotion in trust repair of *** equation modeling(SEM) was used in our study to analyze 517 valid online *** empirical results indicate that casual attributions(locus and stability) have a negative impact on positive emotion;however,controllability opposing our initial expectation has a positive impact on positive *** the same time,positive emotion not only influences trust but also mediates the effect of casual attributions on trust.
In this research we investigate that user's stickiness of virtual community would affect the trust and the stickiness is mediator between trust repair and *** questionnaire through"Happy Farm"from the Fa...
详细信息
In this research we investigate that user's stickiness of virtual community would affect the trust and the stickiness is mediator between trust repair and *** questionnaire through"Happy Farm"from the Facebook,we used the Structural equation modeling(SEM) to analyze the data,in order to understand repair methods and the community trust the persons concerned after the stickiness of the impact of *** result shows that functional and informational of trust repair has positive relationship with stickiness.
This paper proposes an automatic model-based approach that enables adaptive decision making in modern virtual games. It builds upon the Integrated MDP and POMDP Learning AgeNT (IMPLANT) architecture (Tan and Cheng 200...
详细信息
In symbiotic computing approach, digital world and humans interact with each other, based on "basic principle of symbiosis", where they increase information processing ability, activity, and stability by off...
详细信息
暂无评论