• Title/Summary/Keyword: 노출제한 방법

Search Result 133, Processing Time 0.028 seconds

Bridge Management System(BMS) of Location Information(LI)-Based for the Mobile Personal Digital Management(PDA) (Mobile PDA(Personal Digital Assistant)를 활용한 위치정보기반의 교량 유지관리 시스템)

  • Yi Sung-Hyun;Lee Tai-Sik;Kim Young-Hyun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.519-522
    • /
    • 2002
  • Currently, in spite of continual efforts, the information utility of the construction industry does not communicate well with other industries. This problem arose from mistaken and misguided efforts on the parts of the construction industry because it left out of consideration construction characteristics which are at the center of construction, and this information system was directly introduced and operated from outside the industry. There were also other mistakes that the existing information systems disregarded in trying to fix these problems. Therefore, this study describes a new process, which proposes to build and utilize a Bridge Management System using the mobile internet concept, to solve the problems of the existing construction information management system.

  • PDF

Probabilistic K-nearest neighbor classifier for detection of malware in android mobile (안드로이드 모바일 악성 앱 탐지를 위한 확률적 K-인접 이웃 분류기)

  • Kang, Seungjun;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.817-827
    • /
    • 2015
  • In this modern society, people are having a close relationship with smartphone. This makes easier for hackers to gain the user's information by installing the malware in the user's smartphone without the user's authority. This kind of action are threats to the user's privacy. The malware characteristics are different to the general applications. It requires the user's authority. In this paper, we proposed a new classification method of user requirements method by each application using the Principle Component Analysis(PCA) and Probabilistic K-Nearest Neighbor(PKNN) methods. The combination of those method outputs the improved result to classify between malware and general applications. By using the K-fold Cross Validation, the measurement precision of PKNN is improved compare to the previous K-Nearest Neighbor(KNN). The classification which difficult to solve by KNN also can be solve by PKNN with optimizing the discovering the parameter k and ${\beta}$. Also the sample that has being use in this experiment is based on the Contagio.

A Study on the Evaluation of the Boarding Environment for the Ship Vibration (on the Basis of ISO-6954 : 2000(E)) (선박의 선내 진동에 의한 승선 환경 평가에 관한 연구 (ISO-6954 : 2000(E)의 평가방법에 기초))

  • Yu, Young-Hun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.13 no.4
    • /
    • pp.107-112
    • /
    • 2007
  • The vibration generated on shipboard is very important because it greatly affects on the comfortable mind of passenger and working conditions of crews. Shipboard vibration is closely concerned with the development of propulsion method and the type of main engine to decide speed of ship. To make the propulsion power, the main engine of ship have continuous explosion process in engine room, so the shipboard vibration is generated. The shipboard vibration causes the physiological and psychological damages to human body. In the case of the human body exposed to the shipboard vibration, the evaluation of human exposure to whole-body vibration is prescribed in ISO 6954 : 2000(E). In this paper, to evaluate the shipboard working environment, two kinds of vibration levels onboard ship were measured and compared with one another between engine rooms, engine control rooms and wheel house by the regulation of ISO 6954 : 2000(E).

  • PDF

Influence on the Tweet Credibility and Attitude Toward Tweet of Tweet Content, Function and Involvement (트윗의 내용과 기능 그리고 관여도가 트윗 신뢰도와 태도에 미치는 영향)

  • Lee, Hyun-Ji;Chung, Donghun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.6
    • /
    • pp.137-147
    • /
    • 2013
  • The purpose of this study is to examine what variables influence on tweet credibility and attitude toward tweet. For this, the present research used the tweet content(information/opinion), tweet function(without URL and RT/URL/RT) and involvement(low/hight) as independent variables and applied a triangular research design which are in-depth interview, survey and computer usability testing software. Main findings are as follows. First, the participants read tweets listed in order regardless of tweet content, function and involvement. Second, there was a significant main effect of the tweet content on the tweet credibility and an interaction effect of those three independent variables on the attitude toward tweet. Finally, the in-depth interview showed that information is perceived to be more credible than opinion and URL>RT>just information or opinion are listed in order on the tweet credibility.

Development of Ball Type Separation Bolt (Ball Type 분리볼트 개발)

  • Kim, Dong-Jin;Kang, Won-Kyu;Lee, Yeung-Cho
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.243-246
    • /
    • 2006
  • Most of the guided weapons have been kept and transferred at the launching tube and fired in case of necessity in these day. Launching tube is a kind of case to protect the guided weapons from external environments and conducted as a guide when they are fired. When we attached the guided weapons to launching tube we usually has used explosive bolt. Explosive bolts have been used explosives when they had to be separated. But when they are separated there are some bad effects; a flame, fragments and pyre-shock. Because of these bad effects there are many restriction to use bolt as joining devices to precision guided weapons. To solve these problems we invented ball type bolt. Unlike explosive bolt, ball type bolt is separated without a flame, fragments and pyre-shock. And it also has a good mechanical properties as much as those of explosive bolt.

  • PDF

Development of Ball Type Separation Bolt (Ball Type 분리볼트 개발)

  • Lee, Yeung-Jo
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2008.05a
    • /
    • pp.179-182
    • /
    • 2008
  • Most of the guided weapons have been kept and transferred at the launching tube and fired in case of necessity in these day. Launching tube is a kind of case to protect the guided weapons from external environments and conducted as a guide when they are fired. When we attached the guided weapons to launching tube we usually has used explosive bolt. Explosive bolts have been used explosives when they had to be separated. But when they are separated there are some bad effects; a flame, fragments and pyro-shock. Because of these bad effects there are many restriction to use bolt as joining devices to precision guided weapons. To solve these problems we invented ball type bolt. Unlike explosive bolt, ball type bolt is separated without a flame, fragments and pyro-shock. And it also has a good mechanical properties as much as those of explosive bolt.

  • PDF

Study on Dynamic Trust-based Access Control in Online Social Network Environment (소셜 네트워크 환경에서 동적 신뢰 중심의 접근 제어 모델에 관한 연구)

  • Baek, Seungsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1025-1035
    • /
    • 2013
  • There has been an explosive increase in the population of OSN(online social network) for 10 years. OSN provides users with many opportunities to have communication among friends, families and goes so far as to make relationships among unknown people having similar belief or interest. However, OSN also produced adverse effects such as privacy breaches, leaking uncontrolled information or disseminating false information. Access control models such as MAC, DAC, RBAC are applied to the OSN to control those problems but those models in OSN are not fit in dynamic OSN environment because user's acts in OSN are unpredictable and static access control imposes burden on users to change access control rules one by one. This paper proposes the dynamic trust-based access control to solve the problems of traditional static access control in OSN.

A design and implementation of Intelligent object recognition system in urban railway (도시철도내 지능형 객체인식 시스템 구성 및 설계)

  • Park, Ho-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.2
    • /
    • pp.209-214
    • /
    • 2018
  • The subway, which is an urban railway, is the core of public transportation. Urban railways are always exposed to serious problems such as theft, crime and terrorism, as many passengers use them. Especially, due to the nature of urban railway environment, the scope of surveillance is widely dispersed and the range of surveillance target is rapidly increasing. Therefore, it is difficult to perform comprehensive management by passive surveillance like existing CCTV. In this paper, we propose the implementation, design method and object recognition algorithm for intelligent object recognition system in urban railway. The object recognition system that we propose is to analyze the camera images in the history and to recognize the situations where there are objects in the landing area and the waiting area that are not moving for more than a certain time. The proposed algorithm proved its effectiveness by showing detection rate of 100% for Selected area detection, 82% for detection in neglected object, and 94% for motionless object detection, compared with 84.62% object recognition rate using existing Kalman filter.

A Study on Service-based Secure Anonymization for Data Utility Enhancement (데이터 유용성 향상을 위한 서비스 기반의 안전한 익명화 기법 연구)

  • Hwang, Chikwang;Choe, Jongwon;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.681-689
    • /
    • 2015
  • Personal information includes information about a living human individual. It is the information identifiable through name, resident registration number, and image, etc. Personal information which is collected by institutions can be wrongfully used, because it contains confidential information of an information object. In order to prevent this, a method is used to remove personal identification elements before distributing and sharing the data. However, even when the identifier such as the name and the resident registration number is removed or changed, personal information can be exposed in the case of a linking attack. This paper proposes a new anonymization technique to enhance data utility. To achieve this, attributes that are utilized in service tend to anonymize at a low level. In addition, the anonymization technique of the proposal can provide two or more anonymized data tables from one original data table without concern about a linking attack. We also verify our proposal by using the cooperative game theory.

Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption (Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안)

  • Lim, Shu-Yun;Pu, Chuan-Chin;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1519-1527
    • /
    • 2007
  • In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Given that nodes have limited resources, symmetric cryptography that is proven to be efficient for low power devices is implemented. Data protection is integrated into a sensor's packet by the means of symmetric encryption with the Dragon stream cipher and incorporating the newly designed Dragon-MAC Message Authentication Code. The proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computational cost of the operations required by the MAC algorithm. In view that Dragon is a word based stream cipher with a fast key stream generation, it is very suitable for a constrained environment. Our protocol regarded the entity authentication and message authentication through the implementation of authenticated encryption scheme in wireless sensor nodes.