• Title/Summary/Keyword: 그룹 인증

Search Result 254, Processing Time 0.025 seconds

ElggSpace: Extension of Elgg SNS for Supporting Collaborative Workspace (ElggSpace: 협업 워크스페이스를 지원하는 Elgg SNS의 확장)

  • Cha, Won-Jun;Park, Jongmoon;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.631-637
    • /
    • 2014
  • Recently, SNS is widely used for various purposes such as fast decision making or effective business process in educational institutions or enterprise as well as general services for social networking. Unfortunately, all of existing general SNS platforms do not provide user groups with workspaces for sharing information in a hierarchical way, nor support the functionality of workspace backup for migrations. In this paper, we present a collaborative workspace environment named ElggSpace which extends the Elgg SNS platform with the C3ware collaborative middleware. With the help of C3ware, ElggSpace systematically supports collaborative workspaces that enable user groups to share massive resource in cloud storages. In addition, ElggSpace allows high-level access controls for resources management and the functionality of resource backup, supporting effective collaboration.

Design and Implementation of Tree-based Reliable Dissemination Multicast Protocol With Differential Control and Key Management (차별 제어와 키 관리 기능을 통한 트리 기반의 신뢰성 있는 멀티캐스트 프로토콜의 설계 및 구현)

  • Kim, Yeong-Jae;Park, Eun-Yong;An, Sang-Jun;Hyeon, Ho-Jae;Han, Seon-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.235-246
    • /
    • 2002
  • While the Internet is suffering from the massive data such as video stream, IP multicast can ease the load of the Internet by enabling one copy of digital information to be received by multiple computers simultaneously. But If multicast is based on UDP, packets are delivered using a best-effort Policy without any reliability, congestion control or flow control. Multicast group members can join or leave a multicast group at will, and multicast uses broadcast mechanism, it's very hard to keep security from unauthorized members. In this paper, we introduce a new reliable multicast protocol TRDMF proper for one-to-many multicast model with reliability, flow control, congestion control and key management.

Experience of middle-aged female workers participating in cardio-cerebrovascular disease prevention management programs using mobile app (중년 여성 근로자의 모바일 앱을 활용한 심뇌혈관질환 예방관리 프로그램 참여 경험)

  • Yang, Hye Kyung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.3
    • /
    • pp.105-113
    • /
    • 2021
  • This study is a qualitative study that conducted one-on-one in-depth interviews and focus group interviews to understand the meaning of the experience of participating in a cardio-cerebrovascular disease prevention management program using a mobile app for middle-aged female workers. The subjects of this study were 26 female workers over 50 years of age who participated in a cardio-cerebrovascular disease prevention program using a mobile app in a department store. Participating experience derived from the research result were 'Pleasure of getting to know', 'Activation of mutually friendly relations', 'health concerns take care of me ', 'Accepting an unfamiliar culture', 'Convenience as if receiving counseling anywhere. Through these results, it was shown that the mobile app improves the will to practice health behavior, and it is suggested that a standard to guarantee that the mobile app is a safe program is necessary to reduce anxiety about unfamiliar programs when installing the mobile app.

A Study on Blockchain-Based Mass NFT Content Minting

  • Byong-Kwon Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.5
    • /
    • pp.49-56
    • /
    • 2023
  • Currently, e-commerce is changing from a digital twin to a metaverse world. The metaverse world is an intermediate form between virtual and real worlds and is operated as a coin-based meta-commerce. In this meta-commerce world, blockchain-based NFT coins are used when trading items (contents). In this study, we studied how to issue a large number of NFT coins (certification) rather than issuing a single type of NFT. The research method was designed to produce content layer-based and automatically create the desired quantity using a mass NFT index and automatic generation method. In this study, a layer overlap method (background, body, etc.) was used with a Phyton-based program for mass minting. As a result, it can be used as a blockchain-based certificate that can prove a group of many people. In addition, the content created with the NFT index was registered on the NFT sales site to confirm its utilization and value.

A Study on the protection of personal information using a Virtual IDs in an anonymous bulletin board (익명 게시판 환경에서 가상 아이디를 이용한 개인정보보호에 관한 연구)

  • Min, So-Yeon;Jang, Seung-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.9
    • /
    • pp.4214-4223
    • /
    • 2012
  • The argument related to the use of real and anonymous names on the Internet bulletin board has recently become a main issue. When using real names, it is possible to violate free discussion and privacy. Also, when using anonymous names, it is possible to have the reverse function of the Internet in regard to the use of malicious replies or the distribution of false ideas. Therefore, this paper has made it possible to prevent the spread of the user's personal information and execute the single log-in process by using the XML-token method which is one of the SSO technologies. Also, by issuing virtual IDs and forming the path when establishing tokens, the anonymous bulletin board which provides anonymity with a conditional tracing process has been suggested. After analyzing the performance of visitor numbers at authentication time, the anonymous bulletin board based on the group signature method showed the average response rate of 0.72 seconds, 0.18 seconds, which was suggested scheme. In the authentication time 4-5 times faster response speed, respectively. Also, since the suggested system does not have to provide a single authentication process or make the user provide his or her signature, the level of user's convenience seems to be much higher. Such a result shows that the system suggested on the anonymous bulletin board has a more appropriate level of user's convenience.

Authentication and Group Key Management Techniques for Secure Communication in IoT (IoT 환경에서 안전한 통신을 위한 인증 및 그룹 키 관리 기법)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.76-82
    • /
    • 2019
  • The development of Internet technology and the deployment of smart devices provide a convenient environment for people, and this is becoming common with the technology called the Internet of Things (IoT). But the development of, and demand for, IoT technology is causing various problems, such as personal information leaks due to the attacks of hackers who exploit it. A number of devices are connected to a network, and network attacks that have been exploited in the existing PC environment are occurring in the IoT environment. When it comes to IP cameras, security incidents (such as distributed denial of service [DDoS] attacks, hacking someone's personal information, and monitoring without consent) are occurring. However, it is difficult to install and implement existing security solutions because memory space and power are limited owing to the characteristics of small devices in the IoT environment. Therefore, this paper proposes a security protocol that can look at and prevent IoT security threats. A security assessment verified that the proposed protocol is able to respond to various security threats that could arise in a network. Therefore, it is expected that efficient operation of this protocol will be possible if it is applied to the IoT environment.

ESG Variables Selection for Container Port Using WNA (워드네트워크 분석을 활용한 컨테이너부두 ESG 변수 선정)

  • Shin, Jong-Bum;Kim, Kyung-Tae;Kim, Hyun-Deok
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.2
    • /
    • pp.15-23
    • /
    • 2023
  • In a situation where the necessity and importance of ESG management is increasing recently, it is judged that selecting important ESG-related variables for container terminals, which are the bases of export and import logistics, among various variables of ESG evaluation agencies will help to establish ESG management strategies for container terminals which led us to proceed with this study. The results of word network analysis are summarized as follows. The weighed degree, that is, the AWD of Environmental management(E) variables, is obtained in the order of Environmental Protection Investment(54), Environmental Awareness Education(45), Work Team Structure(31), Environmental certification(32). Page Ranks, the order of centrality and connectivity index is Environmental Awareness Education(0.0765), Employee Engagement(0.0765), Environmental Protection Investment(0.0761), Work Team Composition(0.0761), and Environmental certification(0.0761). The AWD(Average Weighed Degree) of the Social Responsibility Management(S) variables, followed by Protecting workers' human rights and contributing to local communities(68), Safety Education(63), Safety certification(59), and Responding to infectious diseases(40). Orders by Page Ranks, centrality and connectivity Index, are Protecting workers' human rights and contributing to local communities(0.165), Safety Education(0.153), Safety Certification(0.144) and Responding to infectious diseases(0.102). The AWD of Governance and Ethical management(G) variables, followed by Anti-corruption(27), Transparent management(24), Mutual cooperation between stakeholders(19), and Sustainability reporting(9). Page Ranks, the order of centrality and connectivity index is the Anti Corruption(0.241), Transparent management(0.216), Mutual cooperation between stakeholders(0.174), Directors' roles and responsibilities(0.105), Shareholder protection(0.097) and Sustainability Report(0.096).

Neutron Activation Analysis of Human Hair for Human Health Assessment (인체보건 환경평가를 위한 모발의 중성자방사화분석)

  • Chung, Young-Sam;Kang, Sang-Hoon;Moon, Jong-Hwa;Kang, Young Hwan;Cho, Seung-Yon
    • Analytical Science and Technology
    • /
    • v.14 no.2
    • /
    • pp.131-139
    • /
    • 2001
  • There is personal difference in the concentrations of trace elements in human hair according to human life or history suck as occupation, race, sex, age, food habit, social condition and so on. It is also found that the individual's deviation of elemental concentrations is reflecting the degree of environmental pollutants exposure to human body, intakes of food and metabolism. To compare the degree of accumulation in the hair tissue, human hair samples were collected from five positions of head and analyzed by non-destructive neutron activation analysis with and without washing according to IAEA's recommended method. Analytical quality control is performed using the certified reference material. The relative error of Cu, Cr, Na, Co, Mg, As, Se, Zn and those of Mn, Ca, Fe, Sr are within ${\pm}5%$ and ${\pm}10%$, respectively and the relative standard deviation of elements are within ${\pm}10%$. The deviations between the individuals and hair sampling positions were estimated. The deviation of individual was seven times more than that of positions. Under the defined condition, the difference and the correlation of elemental concentrations were compared with two different groups, office and factory workers. The result can be used as a fundamental data for human health and environment assessment.

  • PDF

Automated Detecting and Tracing for Plagiarized Programs using Gumbel Distribution Model (굼벨 분포 모델을 이용한 표절 프로그램 자동 탐색 및 추적)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.453-462
    • /
    • 2009
  • Studies on software plagiarism detection, prevention and judgement have become widespread due to the growing of interest and importance for the protection and authentication of software intellectual property. Many previous studies focused on comparing all pairs of submitted codes by using attribute counting, token pattern, program parse tree, and similarity measuring algorithm. It is important to provide a clear-cut model for distinguishing plagiarism and collaboration. This paper proposes a source code clustering algorithm using a probability model on extreme value distribution. First, we propose an asymmetric distance measure pdist($P_a$, $P_b$) to measure the similarity of $P_a$ and $P_b$ Then, we construct the Plagiarism Direction Graph (PDG) for a given program set using pdist($P_a$, $P_b$) as edge weights. And, we transform the PDG into a Gumbel Distance Graph (GDG) model, since we found that the pdist($P_a$, $P_b$) score distribution is similar to a well-known Gumbel distribution. Second, we newly define pseudo-plagiarism which is a sort of virtual plagiarism forced by a very strong functional requirement in the specification. We conducted experiments with 18 groups of programs (more than 700 source codes) collected from the ICPC (International Collegiate Programming Contest) and KOI (Korean Olympiad for Informatics) programming contests. The experiments showed that most plagiarized codes could be detected with high sensitivity and that our algorithm successfully separated real plagiarism from pseudo plagiarism.

A Case Study on the Continuous Quality Improvement for Leadership Outcomes Education in Yeungnam University (영남대학교 리더십 학습성과 교육 CQI 방안에 대한 연구)

  • Pyun, Kyung-Hee;Song, Dong-Joo
    • Journal of Engineering Education Research
    • /
    • v.12 no.1
    • /
    • pp.64-72
    • /
    • 2009
  • The objective of the current study is to establish the CQI procedure of leadership outcome education, which is emphasized in engineering education accreditation. Leadership includes many program outcomes, especially soft skills, such as communication skill, team work skill, and etc. This paper studied leadership education program in Yeungnam University. In particular, this research was conducted by using focus group interviews with experts and working level staffs of relevant organizations for the analysis of Yeungnam University curriculum and non-curriculum courses related to leadership education and for the preparation of leadership education CQI method. In addition, we conducted leadership competence diagnosis, leadership education demand survey and satisfaction level survey on the leadership camp participants. Interviews with experts, lecturers and focus group of Dale Carnegie Research Institute Daegu branch that administered the progress of leadership camp were conducted along with analysis of education contents through non-participation observation method during camp period and participant students interviews. The conclusions are summed up as follows: To educate global leaders in true meaning, first, psychological level competence strengthening method and study completing ability improvement method should be considered simultaneously. In particular, for non-capital region universities, emphasis should be given to education for self-confidence and vision establishment. Second, leadership education methods of mid/long term and systematic curricular and extra-curricular type should be pursued. For instance, with the use of engineering design subject completing system, leadership education can be consolidated to engineering subject courses with engineering design projects or the system of mentor-pupil among earlier leadership camp participants and later participants may be utilized. Third, it is determined necessary to pursue and realize practical methods of conducting various intramural leadership related education activities in mid/long term perspective by organizing leadership education advisory group consisting of major, departments and intramural and extramural relevant organization authorities that focus on leadership education.