• Title/Summary/Keyword: 웹 2.0/3.0

Search Result 253, Processing Time 0.025 seconds

An Embedded System Design of Collusion Attack Prevention for Multimedia Content Protection on Ubiquitous Network Environment (유비쿼터스 네트워크 환경의 멀티미디어 콘텐츠 보호를 위한 공모공격 방지 임베디드 시스템 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.15-21
    • /
    • 2010
  • This paper proposes the multimedia fingerprinting code insertion algorithm when video content is distributed in P2P environment, and designs the collusion codebook SRP(Small RISC Processor) embedded system for the collusion attack prevention. In the implemented system, it is detecting the fingerprinting code inserted in the video content of the client user in which it requests an upload to the web server and in which if it is certified content then transmitted to the streaming server then the implemented system allowed to distribute in P2P network. On the contrary, if it detects the collusion code, than the implemented system blocks to transmit the video content to the streaming server and discontinues to distribute in P2P network. And also it traces the colluders who generate the collusion code and participates in the collusion attack. The collusion code of the averaging attack is generated with 10% of BIBD code v. Based on the generated collusion code, the codebook is designed. As a result, when the insert quantity of the fingerprinting code is 0.15% upper in bitplane 0~3 of the Y(luminance) element of I-frame at the video compression of ASF for a streaming service and MP4 for an offline offer of video content, the correlation coefficient of the inserted original code and the detected code is above 0.15. At the correlation coefficient is above 0.1 then the detection ratio of the collusion code is 38%, and is above 0.2 then the trace ratio of the colluder is 20%.

Application and Evaluation of Web-based Food Frequency Questionnaire for Korean Adolescents (웹 기반 시스템을 이용한 반정량적 식품섭취빈도 조사지의 적용 및 평가)

  • Yum, Jinhee;Lee, Seungmin
    • Korean Journal of Community Nutrition
    • /
    • v.21 no.5
    • /
    • pp.440-450
    • /
    • 2016
  • Objectives: We previously developed a dish-based semi-quantitative food frequency questionnaire (FFQ) for Korean adolescents and reported that it had reasonable reliability and validity. The objective of the current study was to construct a web-based dietary evaluation system applying the FFQ for Korean adolescents and examine its applicability in the context of reliability and validity. Methods: A web-based food frequency questionnaire system was designed using a comprehensive approach, incorporating not only dietary data survey but also up-to-date nutrition information and individualized eating behavior guidelines. A convenience sample of 50 boys and girls aged 12~18 years agreed to participate in the study and completed the FFQ twice and 3 days of dietary recall on the developed website during a two-month period. The FFQ's reliability and validity was examined using correlation and cross classification analysis. We also measured participants' subjective levels of the web site's usability, visual effect, understanding, and familiarity. Results: Spearman correlation coefficients for reliability ranged from 0.74 (for vitamin A) to 0.94 (for energy). From cross-classification analyses, the proportion of subjects in the same intake quartile was highest for energy (82.0%) and lowest for vitamin A (56.0%). With regard to validity analysis, Spearman correlation coefficients ranged from 0.34 (for fiber) to 0.79 (for energy). The proportions of subjects in the opposite categories between the first FFQ and 3-day diet recall data were generally low from 0.00% (for fat) to 36.2% (for sodium). Average subjective levels of the website's usability, visual effect, understanding, and familiarity were all found to be over 4 points out of 5 points. Conclusions: The web-based dietary evaluation system developed can serve as a valid and attractive tool for administering FFQ to Korean adolescents.

Efficient Wi-Fi Security Protocol Using Dual Tokens (이중토큰을 이용한 효율적인 Wi-Fi 보안 프로토콜)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.417-429
    • /
    • 2019
  • WPA2-PSK uses a 4-way handshake protocol based on a shared secret to establish a secure session between a client and an AP. It has various security problems such as eavesdropping attacks and the secure session establishment process is inefficient because it requires multiple interactions between client and AP. The WPA3 standard has recently been proposed to solve the security problem of WPA2, but it is a small improvement using the same 4-way handshake methodology. OAuth 2.0 token authentication is widely used on the web, which can be used to keep an authenticated state of a client for a long time by using tokens issued to an authenticated client. In this paper, we apply the dual-token based randomized token authentication technology to the Wi-Fi security protocol to achieve an efficient Wi-Fi security protocol by dividing initial authentication and secure session establishment. Once a client is authenticated and equipped with dual tokens issued by AP, it can establish secure session using them quickly with one message exchange over a non-secure channel.

Determinants of participation in UCC services (UCC 서비스 사용자의 참여수준 결정요인분석)

  • Kim, Yeon-Jeong;Jun, Bang-Gi;Kim, Yoo-Jung;Kang, So-Ra
    • Journal of Korea Technology Innovation Society
    • /
    • v.10 no.3
    • /
    • pp.486-508
    • /
    • 2007
  • This study identifies key determinants of participation in UCC services. Incorporating insights from the flow theory, we examine the effects of psychological factors of social presence, self expression, arousal, and challenge as well as web-site characteristics variables of media easiness, contents usability, and immediateness. We have done a sample survey of internet users and collected 260 responses. Using Windows SPSS/PC 12.0 Package, we have performed statistical analyses including a correlation analysis, a factor analysis, and a multiple regression analysis. The result of the study is as follows. Psychological variables of perceived social presence, self expression, arousal, and challenge all show positive significant effect on participation in UCC service. Among web site characteristics, media easiness, which consists of a web structure that is easy-to-use, user friendliness, and personalized service, demonstrates a positive significant effect on participation in UCC services. Immediateness also has a positive significant effect. Some of the practical implications of the result are follows. We should improve user access to platforms of UCC service by opening up platforms. This will heighten perceived challenge which has the strongest influence on participation in UCC services. We need to focus on multimedia services and adjust to the cultural code of netizen who crave for visual expressions and on the spot on-line activities. Also suggested is that contributions made by participants need to be acknowledged through such provisions as profit sharing. Needs for individualized service, which is an aspect of media easiness, should also be addressed. Participants tend to value individuality while at the same time accepting broader trends. Information services need to be customized for individuals. In UCC centered internet businesses, netizen consumers are presumer. They are consumers and producers at the same time, and consumer needs should also be explored for the success of internet businesses.

  • PDF

Secure User Authority Authentication Method in the Open Authorization (Open Authorization에서의 안전한 사용자 권한 인증 방법에 관한 연구)

  • Chae, Cheol-Joo;Lee, June-Hwan;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.289-294
    • /
    • 2014
  • Recently, the various web service and applications are provided to the user. As to these service, because of providing the service to the authenticated user, the user undergoes the inconvenience of performing the authentication with the service especially every time. The OAuth(Open Authorization) protocol which acquires the access privilege in which 3rd Party application is limited on the web service in order to resolve this inconvenience appeared. This OAuth protocol provides the service which is convenient and flexible to the user but has the security vulnerability about the authorization acquisition. Therefore, we propose the method that analyze the security vulnerability which it can be generated in the OAuth 2.0 protocol and secure user authority authentication method.

Developing a Public Services Framework for the Regional Archives in Korea (지방기록물관리기관을 위한 이용자서비스 모형 개발에 관한 연구)

  • Chang, Hye-Rhan;Lee, Myoung-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.3
    • /
    • pp.321-338
    • /
    • 2008
  • To develop a public services framework for the promotion of the public records use of the regional archives in Korea, we analyzed the previous related studies and observed the public services of the renowned overseas regional archives through the we sites. Then, the web 2.0 technology and its application to archives services have been studied. Based on the analysis, a public services framework consisting of 4 phases such as basic services, extended services I, extended services II, interactive services was developed. This framework of 4 phases is not a fixed universal system. Each of the regional archives would select the services they offer according to the budget, personnel, as well as the user community. Finally, community survey, user satisfaction evaluation, and the establishment of specific service guidelines are suggested for the advancement of the public services.

A Study On Web Contents Accessibility of Hospital Web Sites in Korea (국내 의료기관의 규모별 웹 콘텐츠 접근성 현황에 관한 연구)

  • Kim, Jong-Min;Ryu, Hwang-Gun
    • The Korean Journal of Health Service Management
    • /
    • v.4 no.2
    • /
    • pp.33-46
    • /
    • 2010
  • In this study, we investigated web contents accessibility of 60 hospital web sites in Korea. The eight evaluation criteria were used for estimating the web contents accessibility of the web sites. These criteria were as follows: providing an alternative text, providing caption for moving picture, providing a skip navigation, usage of pop-up windows, usage of a summary or a caption tag for data table, providing a page title, providing a label for online form, and usage of java scripts. K-WAH 3.0 was used for estimating five evaluation criteria. According to Internet web contents accessibility guideline 1.0, we estimated the rest three evaluation criteria manually and described good or bad examples for the evaluation results technically. The results show that the web accessibility of hospital web sites is generally insufficient and the constant interests in improvement for accessibility are urgently needed.

Extracting Supporting Evidence with High Precision via Bi-LSTM Network (양방향 장단기 메모리 네트워크를 활용한 높은 정밀도의 지지 근거 추출)

  • Park, ChaeHun;Yang, Wonsuk;Park, Jong C.
    • Annual Conference on Human and Language Technology
    • /
    • 2018.10a
    • /
    • pp.285-290
    • /
    • 2018
  • 논지가 높은 설득력을 갖기 위해서는 충분한 지지 근거가 필요하다. 논지 내의 주장을 논리적으로 지지할 수 있는 근거 자료 추출의 자동화는 자동 토론 시스템, 정책 투표에 대한 의사 결정 보조 등 여러 어플리케이션의 개발 및 상용화를 위해 필수적으로 해결되어야 한다. 하지만 웹문서로부터 지지 근거를 추출하는 시스템을 위해서는 다음과 같은 두 가지 연구가 선행되어야 하고, 이는 높은 성능의 시스템 구현을 어렵게 한다: 1) 논지의 주제와 직접적인 관련성은 낮지만 지지 근거로 사용될 수 있는 정보를 확보하기 위한 넓은 검색 범위, 2) 수집한 정보 내에서 논지의 주장을 명확하게 지지할 수 있는 근거를 식별할 수 있는 인지 능력. 본 연구는 높은 정밀도와 확장 가능성을 가진 지지 근거 추출을 위해 다음과 같은 단계적 지지 근거 추출 시스템을 제안한다: 1) TF-IDF 유사도 기반 관련 문서 선별, 2) 의미적 유사도를 통한 지지 근거 1차 추출, 3) 신경망 분류기를 통한 지지 근거 2차 추출. 제안하는 시스템의 유효성을 검증하기 위해 사설 4008개 내의 주장에 대해 웹 상에 있는 845675개의 뉴스에서 지지 근거를 추출하는 실험을 수행하였다. 주장과 지지 근거를 주석한 정보에 대하여 성능 평가를 진행한 결과 본 연구에서 제안한 단계적 시스템은 1,2차 추출 과정에서 각각 0.41, 0.70의 정밀도를 보였다. 이후 시스템이 추출한 지지 근거를 분석하여, 논지에 대한 적절한 이해를 바탕으로 한 지지 근거 추출이 가능하다는 것을 확인하였다.

  • PDF

Extending Technology Acceptance Model with Social Influence on Korean College Students' Social Commerce Context (한국 대학생의 소셜 커머스 이용행태 연구: 사회적 영향력으로 확장한 기술수용모형을 중심으로)

  • Joo, Jihyuk
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.107-115
    • /
    • 2015
  • The social commerce is an innovative and emerging transaction. It is the result of combination with transaction and social media technology. This study analyzes Korean college students' social commerce behavior through extending technology acceptance model(TAM) with social influence(SI). We confirmed all proposed hypotheses are significant and supported by the given data through PLS path modeling method with SmartPLS. It indicates that SI is an important factor influencing intention to use, so SI should be consider for theorists to enhance explanation and prediction of TAM and for practitioners to earn higher performances as well. Finally, based on the findings, suggestions for future studies are discussed.

Development of Evaluation Framework and Professional Evaluation of Health Information Predictability (건강정보의 예보성 평가준거를 활용한 전문가 평가결과 분석연구)

  • Kang, Min-Sug;Lee, Moo-Sik;Hong, Jee-Young;Kim, Sang-Ha
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2966-2973
    • /
    • 2009
  • In this article, I propose effective strategies for improving the Predictive Health Care. The results of qualitative study on health information show the following order from the highest score: whether health information is scientifically sound ($3.7\pm0.5$), whether people can easily understand health information ($3.6\pm0.5$), and whether health information reflects the public'sconcerns (($3.5\pm0.5$), and whether health information includes enough information to satisfy the public ($2.9\pm0.6$). The most pressing reforms for the effective Predictive Health Care areto provide enough health information and regularly collection of information because the Predictive Health Care has not provided enough information, authoritative information has rarely been offered, and methodological limitations on producing and applying predictive information have not been addressed. Although the Predictive Health Care provides online services like web-based epidemic reporting system, it needs to extend services from the epidemic information to general health information because of lack of promoting the Predictive Health Care and of credibility of information offered so far. Lastly, the Predictive Health Care needs to strengthen efforts to collect information, form common grounds between information and the public's concerns, clarify classification system of information, and offer an easy way for the public to use information.