• Title/Summary/Keyword: 삭제방법

Search Result 637, Processing Time 0.028 seconds

Survey on Fake Review Detection of E-commerce Sites (전자 상거래 사이트의 가짜 리뷰 판별 기법 조사)

  • Ji, Chengzhang;Zhang, Jinhong;Kang, Dae-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.79-81
    • /
    • 2014
  • People increasingly rely on sources of information from E-commerce reviews. Product reviews is an important determinant of potential customers' buying choices. They are also utilized by product manufacturers to find problems of their products and to collect competitive intelligence information about their competitors. Unfortunately, it is well-known that many online product reviews are not made by genuine costumers of products. Reviewers could write some undeserving positive reviews to promote or fake negative reviews to defame some certain product, and we call them fake product reviews. Fake product review detection makes an attempt to detect fake reviews and removes them to restore the truthful ones for readers. To the best of our knowledge, there is still less published study on this problem. In this paper, we make a survey and an attempt to give a brief overview on fake product review detection. The related work of fake product review detection is presented including web spam and spam email. Then some methods to detect fake reviews are introduced and summarized. The trend of fake product review detection is concluded finally.

  • PDF

A Study on the Institutional Improvement for Establishment of Occupational Identity and Occupational Prestige of Private Security (민간경비의 직업정체성과 직업명망 확립을 위한 제도적 개선방안 연구 : 한국표준직업분류상 경비원 직업분류의 개선을 중심으로)

  • Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.187-203
    • /
    • 2017
  • This study focuses on analyzing the problems of the Korean standard classification of occupations(KSCO), which is a formal and institutional implementation method that affects the occupational identity and Occupational Prestige of Private Security, and suggests ways to improve it. The following should be supplemented. (1) It is necessary to unify occupations related to private security that are classified into simple labor workers. (2) Delete the Technical Security Guards(4123) and create a Security Guard(4123) instead. (3) Facility Security Guards(41230), Convoy Security Guards, Technical Security Guards(41232), Security monitoring and control personnel(41233), and Special Security Guards(National important facility security guard)(41234) will be newly established. (4) Change the name of subclassification and subclassification in simple labor worker of Major Class 9(Code 9), and adjust Security Guards(9421) to the Surveillance Personnel(9421).

Post-endodontic Restoration on Erupting Permanent First Molars Using Endocrown with a Polyglass Composite Resin: Report of Two Cases (맹출 중인 제1대구치의 근관 치료 후 엔도크라운을 통한 수복 증례 보고)

  • Jeong, Hyuntae;Kim, Seonmi;Kim, Jaehwan;Choi, Namki
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.46 no.1
    • /
    • pp.111-118
    • /
    • 2019
  • Post-endodontic restorations are both important and challenging for clinical success in endodontically treated posterior teeth. Several options have been proposed to restore endodontically treated molars. In pediatric dentistry, restoration using conventional single crowns, especially for partially erupted molars with insufficient retentive tooth structure, has proven to be difficult. However, the endocrown presents a conservative and esthetic restorative alternative to conventional crowns with post-and-core, as it acquires additional retention within the pulp chamber. The tooth preparation consists of a circular, equigingival, butt-joint margin and a central retention cavity in the pulp chamber that helps to construct both the crown and core as a single unit. This case report describes the esthetic and conservative endocrown restorations of erupting permanent first molars with extensive coronal destruction.

Data Availability Zone for backup system in Cloud computing service (클라우드 컴퓨팅 서비스 백업을 위한 데이터 가용영역 방법론)

  • Park, Young-ho;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.366-369
    • /
    • 2014
  • Recently been viewed as a core technology of the IT industry, cloud computing services. It is expected that the market for cloud services industry showed a growth rate of 18.9% annually, to form a scale of $ 1,330 billion dollars in 2013, and to form a 1,768 billion dollars in 2015. Growth of cloud computing services industry, provides the operational efficiency and reduce costs for many companies, but the risks associated with it is also increasing. There is a problem that phenomenon is to lose control of the data on features of the cloud service, more data is gathered in one place, when a failure occurs, it is removed simultaneously the data of all devices. therefore, in the present paper is investigate the area a quick recovery with up to the problem and secure data storage INT the cloud computing service is available in only the data in the cloud service possible.

  • PDF

Efficient Re-Establishment Mechanism of Diameter Security Association lost in MIP Application (MIP 환경에서의 Diameter Security Association 정보 분실시의 재설정 기법)

  • 유희종;김말희;김현곤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.39-48
    • /
    • 2003
  • AAA(Authentication, Authorization, Accounting) protocol is a framework that propose functions of AAA on multiple networks and platforms. AAA protocol is extending from previous RADIUS protocol to Diameter protocol. There are some Diameter applications for variety purpose. Diameter CMS Application makes Diameter messages more secure by using PKI. Diameter CMS Application establish DSA(Diameter Security Association) for end to end security. However the Application has some problems to establish DSA(Diameter Security Association), which can make Diameter system unstable. If one system lose DSA information for some system error - for example, reboot -, the secure communication between two nodes may not be possible. At the application such as MIP, even user registration can't be done. In this paper, we propose a mechannism for DSA re-establishment, and also show the result of the implementation.

Determinant Whether the Data Fragment in Unallocated Space is Compressed or Not and Decompressing of Compressed Data Fragment (비할당 영역 데이터 파편의 압축 여부 판단과 압축 해제)

  • Park, Bo-Ra;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.175-185
    • /
    • 2008
  • It is meaningful to investigate data in unallocated space because we can investigate the deleted data. However the data in unallocated space is formed to fragmented and it cannot be read by application in most cases. Especially in case of being compressed or encrypted, the data is more difficult to be read. If the fragmented data is encrypted and damaged, it is almost impossible to be read. If the fragmented data is compressed and damaged, it is very difficult to be read but we can read and interpret it sometimes. Therefore if the computer forensic investigator wants to investigate data in unallocated space, formal work of determining the data is encrypted of compressed and decompressing the damaged compressed data. In this paper, I suggest the method of analyzing data in unallocated space from a viewpoint of computer forensics.

ELKH, Efficient Group Key Management Protocol Using One-Way Function and XOR (일방향 함수와 XOR을 이용한 효율적인 그룹키 관리 프로토콜: ELKH)

  • 권정옥;황정연;김현정;이동훈;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.93-112
    • /
    • 2002
  • Since the multicast group which is composed of various members is dynamic, members of the group frequently join or leave. So, for a new session, group keys are efficiently updated and distributed. In this paper, we describe very simple and new efficient logical key hierarchy(ELKH) protocol which is based on an one-way function. In the previous schemes, when the group controller distributes new created keys or updated keys to the members the information is usally encryted and then transmited over a multicast channel. But ELKH secretes the multicast message by using the one-way function and XOR operator instead of encrypting it. Hence our main construction improves the computational efficiency required from the group controller and group memebers while doesn't increase size of re-keying message when compared to $EHBT^{[12]}$. Assuming the security of an underlying one-way function, we prove that our scheme satisfies forward secrecy and backward secrecy.

User Influence Determination using k-shell Decomposition in Social Networks (소셜 네트워크에서 k-쉘 분해를 이용한 사용자 영향력 판별)

  • Choi, Jaeyong;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.46-54
    • /
    • 2022
  • The existing methods for determining influence in social networks do not accurately determine the influence of users because they do not delete or update existing relationships before they stop in the face of an increasing number of inactive users on social networks. In this paper, we propose a user influence detremination method using the temporal k-shell decomposition technique based on the creation date of users of social networks. To solve the problem of increasing influence of old users in social networks, we apply k-shell decomposition and age-specific order centrality as attenuation coefficients due to aging in neighbors. The age-decaying k-shell decomposition and age-specific order centrality are searched for influential users at the present time by applying the attenuation coefficient and age-dependent weights. Various performance evaluations are performed to show the superiority of the proposed method.

Development of Preventive Self-Management Knowledge Related to Premature Labor (PSMK-PL) Scale for Women of Childbearing Age : An Item Response Theory Approach (가임 여성의 조기진통에 대한 예방적 자가관리 지식 측정 도구 개발: 문항반응이론 적용)

  • Kim, Sun-Hee;Lee, Yu-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.9
    • /
    • pp.439-450
    • /
    • 2022
  • Purpose: This study was to develop the Preventive Self-Management Knowledge related to Premature Labor (PSMK-PL) scale for women of childbearing age. Methods: Preliminary items were developed based on the literature and interview results of those who experienced premature labor. The online survey was conducted and the data of 250 women were analyzed using the DIMTEST and DETECT programs by applying the item response theory. Internal consistency reliability was analyzed with Cronbach's alpha (95% CI). Results: Among the 30 preliminary items, six items were deleted. The difficulty and discrimination of the 24 final three-dimensional scales were all acceptable, respectively. Cronbach's alpha (95% CI) was .89 (.87~.91). Conclusion: The PSMK-PL scale generally consisted of items with validity, and the reliability was acceptable.

Software Formal Verification Methodology using Aspect DEVS Verification Framework (Aspect DEVS 검증 틀을 이용한 소프트웨어 정형 검증 방법론)

  • Choi, Chang-Beom;Kim, Tag-Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.113-122
    • /
    • 2009
  • Software is getting more complex due to a variety of requirements that include desired functions and properties. Therefore, verifying and testing the software are complicated problems. Moreover, if the software is already implemented, inserting and deleting tracing/logging code into the source code may cause several problems, such as the code tangling and the code scattering problems. This paper proposes the Aspect DEVS Verification Framework which supports the verification and testing process. The Aspect DEVS Verification Framework utilizes Aspect Oriented Programming features to handle the code tangling and the code scattering problems. By applying aspect oriented features, a user can find and fix the inconsistency between requirement and implementation of a software without suffering the problems. The first step of the verification process is the building aspect code to make a software act as a generator. The second step is developing a requirement specification using DEVS diagrams and implementing it using the DEVSIM++. The final step is comparing the event traces from the software with the possible execution sequences from DEVS model.