• Title/Summary/Keyword: 서비스수준 평가 기법

Search Result 114, Processing Time 0.03 seconds

A Study on the Applicability of Anonymous Authentication Schemes for Fine-Grained Privacy Protection (개인정보보호를 위한 익명 인증 기법 도입 방안 연구)

  • Ki, Ju-Hee;Hwang, Jung-Yeon;Shim, Mi-Na;Jeong, Dae-Kyeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.195-208
    • /
    • 2010
  • As information communication technologies have highly advanced, a large amount of user sensitive information can be easily collected and unexpectedly distributed. For user-friendly services, a service provider requires and processes more user information. However known privacy protection models take on a passive attitude toward user information protection and often involve serious weaknesses. In reality, information exposure by unauthorised access and mistakenly disclosure occurs frequently. In this paper, we study on the applicability of anonymous authentication services for fine-grained user privacy protection. We analyze authentication schemes and classify them according to the level of privacy newly defined in this paper. In addition, we identify security requirements that a privacy protection scheme based on anonymous authentication can achieve within legal boundary.

An analysis of trends in wetland function assessments and further suggestions (습지 기능 평가의 동향 분석 및 제언)

  • Hong, Mun Gi;Kim, Jae Geun
    • Journal of Wetlands Research
    • /
    • v.19 no.1
    • /
    • pp.1-15
    • /
    • 2017
  • Wetland function assessment is not only a basic step to understand wetland ecosystems in detail but also an important process as a base of the term, ecosystem service to recognize wetland ecosystems as valuable and useful resources and goods for human being. WET (wetland evaluation technique), EMAP (environmental monitoring assessment program)-wetlands, and HGM (hydrogeomorphic method) were developed as pioneer wetland function assessments in U.S. at the end of $20^{th}$-century. RAMs (rapid assessment methods) became a major function assessment tool which is relatively simpler and easier assessment tool at the beginning of $21^{th}$-century. After that, the hierarchy of three levels of assessment (landscape assessment, rapid assessment, and intensive assesment) has been prepared and strategically utilized according to the objectives and purposes of function assessments. In South Korea, RAM and HGM were used to assess wetland functions with reforming a couple of items and contents at 2001. And, modified and reformed function assessments have been developed to complement and improve upon the existing RAMs and HGMs. Via the trend analysis on wetland function assessments, some needs which require supplements in terms of function assessment are pointed out: 1) wetland function assessments using useful indicators such as birds are needed with considering our environmental characteristics. 2) optimized wetland function assessments for coastal wetlands are also needed. 3) the network construction and further expansion to lead communications and co-operations between researchers and policy makers is needed in the field of wetland function assessment.

A Resource Management Scheme Based on Live Migrations for Mobility Support in Edge-Based Fog Computing Environments (에지 기반 포그 컴퓨팅 환경에서 이동성 지원을 위한 라이브 마이그레이션 기반 자원 관리 기법)

  • Lim, JongBeom
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.4
    • /
    • pp.163-168
    • /
    • 2022
  • As cloud computing and the Internet of things are getting popular, the number of devices in the Internet of things computing environments is increasing. In addition, there exist various Internet-based applications, such as home automation and healthcare. In turn, existing studies explored the quality of service, such as downtime and reliability of tasks for Internet of things applications. To enhance the quality of service of Internet of things applications, cloud-fog computing (combining cloud computing and edge computing) can be used for offloading burdens from the central cloud server to edge servers. However, when devices inherit the mobility property, continuity and the quality of service of Internet of things applications can be reduced. In this paper, we propose a resource management scheme based on live migrations for mobility support in edge-based fog computing environments. The proposed resource management algorithm is based on the mobility direction and pace to predict the expected position, and migrates tasks to the target edge server. The performance results show that our proposed resource management algorithm improves the reliability of tasks and reduces downtime of services.

A Self-Guided Approach to Enhance Korean Text Generation in Writing Assistants (A Self-Guided Approach을 활용한 한국어 텍스트 생성 쓰기 보조 기법의 향상 방법)

  • Donghyeon Jang;Jinsu Kim;Minho Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.541-544
    • /
    • 2023
  • LLM(Largescale Language Model)의 성능 향상을 위한 비용 효율적인 방법으로 ChatGPT, GPT-4와 같은 초거대 모델의 output에 대해 SLM(Small Language Model)을 finetune하는 방법이 주목받고 있다. 그러나, 이러한 접근법은 주로 범용적인 지시사항 모델을 위한 학습 방법으로 사용되며, 제한된 특정 도메인에서는 추가적인 성능 개선의 여지가 있다. 본 연구는 특정 도메인(Writing Assistant)에서의 성능 향상을 위한 새로운 방법인 Self-Guided Approach를 제안한다. Self-Guided Approach는 (1) LLM을 활용해 시드 데이터에 대해 도메인 특화된 metric(유용성, 관련성, 정확성, 세부사항의 수준별) 점수를 매기고, (2) 점수가 매겨진 데이터와 점수가 매겨지지 않은 데이터를 모두 활용하여 supervised 방식으로 SLM을 미세 조정한다. Vicuna에서 제안된 평가 방법인, GPT-4를 활용한 자동평가 프레임워크를 사용하여 Self-Guided Approach로 학습된 SLM의 성능을 평가하였다. 평가 결과 Self-Guided Approach가 Self-instruct, alpaca와 같이, 생성된 instruction 데이터에 튜닝하는 기존의 훈련 방법에 비해 성능이 향상됨을 확인했다. 다양한 스케일의 한국어 오픈 소스 LLM(Polyglot1.3B, PolyGlot3.8B, PolyGlot5.8B)에 대해서 Self-Guided Approach를 활용한 성능 개선을 확인했다. 평가는 GPT-4를 활용한 자동 평가를 진행했으며, Korean Novel Generation 도메인의 경우, 테스트 셋에서 4.547점에서 6.286점의 성능 향상이 발생했으며, Korean scenario Genration 도메인의 경우, 테스트 셋에서 4.038점에서 5.795 점의 성능 향상이 발생했으며, 다른 유사 도메인들에서도 비슷한 점수 향상을 확인했다. Self-Guided Approach의 활용을 통해 특정 도메인(Writing Assistant)에서의 SLM의 성능 개선 가능성을 확인했으며 이는 LLM에 비용부담을 크게 줄이면서도 제한된 도메인에서 성능을 유지하며, LLM을 활용한 응용 서비스에 있어 실질적인 도움을 제공할 수 있을 것으로 기대된다.

  • PDF

An Analysis of the Locational Selection Factors of the Small- and Medium-sized Hospitals Using the AHP : Centered on the Spine and Joint Hospitals (AHP를 이용한 중·소 병원 입지선택요인 분석 : 척추·관절 병원중심으로)

  • Kim, Duck Ki;Shim, Gyo-Eon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.5
    • /
    • pp.191-214
    • /
    • 2018
  • This research empirically analyzed the selection factors and the locational selection factors of the medical service facilities according to the gradual increase of the importance of the selection factors and the locational selection factors regarding the establishments of the small- and medium-sized hospitals according to the rapid changes of the socio-economic conditions. By analyzing the priority order according to the levels of the importance of each evaluation item factor through a research related to the selection factors and the locational selection factors of the small- and medium-sized hospitals and by drawing what the important factors that have the influences on the competitiveness of the pre-existent small- and medium-sized hospitals are through the classification of the real estate locational factors and the non-locational factors, the purpose lies in utilizing them as the basic data and materials for the opening strategies of the small- and medium-sized hospitals considering the special, locational characteristics according to the important factors of the selection factors of the small- and medium-sized hospitals, regarding the medical suppliers that have been preparing, for opening the new, small- and medium-sized hospitals. Based on the results of the preceding researches and the researches on the case examples, 28 evaluation factors were arrived at in terms of the level of the medical treatment, the medical services, the accessibilities of the hospitals, the conveniences of the hospitals, and the physical environment. And, regarding the 28 detailed evaluation factors that had been collected, through the interviews with the related experts, the 5 factors of the medical level, the medical service, the expertise of the hospital, the convenience of the hospital, and the physical environment were selected as the upper class evaluation factors. And, according to each upper class, a total of 28 low-part evaluation factors were selected. Regarding the optimal evaluation factors that were selected, the optimal locational factors were selected by carrying out an AHP questionnaire survey investigation with 200 medical experts as the subjects. Regarding the AHP analysis results, similarly with the case examples of the precedent researches, the levels of the importance appeared in the order of the medical level, the medical services, the accessibility of the hospital, the physical environment, and the convenience. And the factors that were related to the facilities of a hospital appeared low. The results of this research can be applied in providing the basis for the decision-makings regarding the selections of the locations of the small- and medium-sized hospitals in the future.

A Backup Node Based Fault-tolerance Scheme for Coverage Preserving in Wireless Sensor Networks (무선 센서 네트워크에서의 감지범위 보존을 위한 백업 노드 기반 결함 허용 기법)

  • Hahn, Joo-Sun;Ha, Rhan
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.339-350
    • /
    • 2009
  • In wireless sensor networks, the limited battery resources of sensor nodes have a direct impact on network lifetime. To reduce unnecessary power consumption, it is often the case that only a minimum number of sensor nodes operate in active mode while the others are kept in sleep mode. In such a case, however, the network service can be easily unreliable if any active node is unable to perform its sensing or communication function because of an unexpected failure. Thus, for achieving reliable sensing, it is important to maintain the sensing level even when some sensor nodes fail. In this paper, we propose a new fault-tolerance scheme, called FCP(Fault-tolerant Coverage Preserving), that gives an efficient way to handle the degradation of the sensing level caused by sensor node failures. In the proposed FCP scheme, a set of backup nodes are pre-designated for each active node to be used to replace the active node in case of its failure. Experimental results show that the FCP scheme provides enhanced performance with reduced overhead in terms of sensing coverage preserving, the number of backup nodes and the amount of control messages. On the average, the percentage of coverage preserving is improved by 87.2% while the additional number of backup nodes and the additional amount of control messages are reduced by 57.6% and 99.5%, respectively, compared with previous fault-tolerance schemes.

Customer Voices in Telehealth: Constructing Positioning Maps from App Reviews (고객 리뷰를 통한 모바일 앱 서비스 포지셔닝 분석: 비대면 진료 앱을 중심으로)

  • Minjae Kim;Hong Joo Lee
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.69-90
    • /
    • 2023
  • The purpose of this study is to evaluate the service attributes and consumer reactions of telemedicine apps in South Korea and visualize their differentiation by constructing positioning maps. We crawled 23,219 user reviews of 6 major telemedicine apps in Korea from the Google Play store. Topics were derived by BERTopic modeling, and sentiment scores for each topic were calculated through KoBERT sentiment analysis. As a result, five service characteristics in the application attribute category and three in the medical service category were derived. Based on this, a two-dimensional positioning map was constructed through principal component analysis. This study proposes an objective service evaluation method based on text mining, which has implications. In sum, this study combines empirical statistical methods and text mining techniques based on user review texts of telemedicine apps. It presents a system of service attribute elicitation, sentiment analysis, and product positioning. This can serve as an effective way to objectively diagnose the service quality and consumer responses of telemedicine applications.

Impacts of Health Insurance Coverage Expansion on Health Care Utilization and Health Status (건강보험 보장성 확대가 의료이용 및 건강수준에 미치는 영향)

  • Bae, Ji-Young
    • Korean Journal of Social Welfare Studies
    • /
    • v.41 no.2
    • /
    • pp.35-65
    • /
    • 2010
  • The purpose of this study is to identify the relationship between health insurance and health by evaluating the impacts of health insurance coverage expansion on health care utilization and health status. To analyze the causal relationship between health insurance and health, this study employed a "difference-in-difference method" that could compare changes in health care utilization and health status across groups in health insurance coverage expansion in 2005. The researcher predicted that the expansion of health insurance coverage would be an exogenous source of variation in the prices of health service use. First, the difference-in-differences estimator between 'illness group' and 'non-illness group' revealed that the increase in coverage of inpatient care services would result from the increases in the stay of length of 'non-illness group' rather than that of 'illness group'. However, the difference-in-differences estimator between 'serious illness group' and 'chronic illness group' identified that the policy change that focuses on expansion of the coverage for 'serious illness' effects on the increases in health care utilization and promotion of health status. In summary, the changes of health insurance coverage focusing on serious illness and inpatient care have positive effects on health care utilization and health status of serious illness group. But, 'non-illness groups' with acute illness receive more benefits from the policy change than 'illness group' with chronic illness.

Automated Driving Aggressiveness for Traffic Management in Automated Driving Environments (자율주행기반 교통운영관리를 위한 ADA 개념 정립 및 적용 기법 개발)

  • LEE, Seolyoung;OH, Minsoo;OH, Cheol;JEONG, Eunbi
    • Journal of Korean Society of Transportation
    • /
    • v.36 no.1
    • /
    • pp.38-50
    • /
    • 2018
  • Emerging automated driving environments will lead to a mixed traffic flow depending on the interaction between automated vehicles (AVs) and manually driven vehicles (MVs) because the market penetration rate (MPR) of AVs will gradually increase over time. Understanding the characteristics of mixed traffic conditions, and developing a method to control both AV and MV maneuverings smoothly is a backbone of the traffic management in the era of automated driving. To facilitate smooth vehicle interactions, the maneuvering of AVs should be properly determined by various traffic and road conditions, which motivates this study. This study investigated whether the aggressiveness of AV maneuvering, defined as automated driving aggressiveness (ADA), affect the performance of mixed traffic flow. VISSIM microscopic simulation experiments were conducted to derive proper ADAs for satisfying both the traffic safety and the operational efficiency. Traffic conflict rates and average travel speeds were used as indicators for the performance of safety and operations. While conducting simulations, level of service(LOS) and market penetration rate(MPR) of AVs were also taken into considerations. Results implies that an effective guideline to manage the ADA under various traffic and road conditions needs to be developed from the perspective of traffic operations to optimize traffic performances.

Periodic-and-on-Event Message-Aware Automotive Intrusion Detection System (Periodic-and-on-Event 메시지 분석이 가능한 차량용 침입탐지 기술)

  • Lee, Seyoung;Choi, Wonsuk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.373-385
    • /
    • 2021
  • To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the modern vehicles provide highly convenient and safe services, it provides many types of attack surfaces; as a result, it makes them vulnerable to cyber attacks. The automotive IDS (Intrusion Detection System) is one of the promising techniques for securing vehicles. However, the existing methods for automotive IDS are able to analyze only periodic messages. If someone attacks on non-periodic messages, the existing methods are not able to properly detect the intrusion. In this paper, we present a method to detect intrusions including an attack using non-periodic messages. Moreover, we evaluate our method on the real vehicles, where we show that our method has 0% of FPR and 0% of FNR under our attack model.