• Title/Summary/Keyword: 이중 로그인

Search Result 45, Processing Time 0.022 seconds

Functional Evaluation of Tennis Shoes Using Foot-Pressure Distribution (족저압력분석을 활용한 테니스화 기능성평가)

  • Park, Seung-Bum;Lee, Joong-Sook
    • Korean Journal of Applied Biomechanics
    • /
    • v.18 no.4
    • /
    • pp.89-97
    • /
    • 2008
  • The purpose of this study was to analyze the foot-pressure distribution of Tennis Shoes for assessing their functionality. 10 university male students (shoe size: 265mm) who had no history of injury in the lower extremity and a normal gait pattern participated in this study. Four types of tennis shoes, most popular in Korea (A, B, C & D company), were selected and tested. Using the PEDAR-X system and PEDAR-X insoles, 4 different motion stages were analyzed for the foot-pressure distribution: (a) straight running; (b) c-cut($45^{\circ}$ left turn running; (c) forehand stroke; and (d) backhand stroke. Results revealed that in all stages, there were no statistically significant differences among the types of shoes; however, descriptive statistics indicated that functionality of shoe types was somewhat different depending on the type of stages. The order in functionality found was C>A>B>D.

Value Evaluation on the Experience Space of the Age-friendly Product (고령친화용품 체험공간에 대한 가치 평가)

  • Oh, Chan Ohk;Joo, Soo Hyun;Jin, Jae Moon;Kim, Soo Young
    • Design Convergence Study
    • /
    • v.16 no.3
    • /
    • pp.17-37
    • /
    • 2017
  • The purpose of this study is to evaluate the value of the center of age-friendly goods to confirm the public value of the center. 152 elderly participants, either who have utilized the center themselves or who have experienced the center indirectly through the image have participated in the study. The experience of age-friendly product center was evaluated by the contingent valuation method, which is widely used in the public services. A double-bounded dichotomous choice (DB-DC) log-logistic model and a log-normal model were conducted. As the result of the estimation, the truncated mean of the log-logistic model was 3,401 Korean won, with the mean of 4,937 won. In addition, the truncated mean of the log-normal model was 3,433 won, with the mean of 4,144 won. Elderly who have not experienced the center placed a higher value on the center, compared to the experienced elderly. The results imply the necessity to enlarge the opportunity for future suppliers to experience the center for age-friendly products, in order to improve their objective understandings. In addition, the necessity of expanding exhibition products and applying age-friendly designs is proposed, to offer various attractive experiences to elderly.

Partial Rollback in Object-Oriented Database Management Systems (객체지향 데이터베이스 관리 시스템에서의 부분 철회)

  • Kim, Won-Young;Lee, Young-Koo;Whang, Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.27 no.4
    • /
    • pp.549-561
    • /
    • 2000
  • In database management systems(DBMSs), partial rollback is a useful facility that cancels part of the executed operations upon user's requests without a total rollback. Many relational DBMSs(RDBMSs) provide this facility, However, object-orientccd DBMSs (OODBMSs) cannot utilize the previous recovery scl18lne of partial rollback usccd in (RDBMSs) since, unlike RDBMSs, they use a dual buffer consisting of an object buffer and a page buffer. Therefore, a new recovery scheme is required that rolls back the data efficiently in the dual buffer. We propose four partial rollback schemes in OODBMSs that use a dual buffer. We classify the proposed schemes into the single buffer based partial rollback scheme and the dual buffer based partial rollback scheme according to the number of buffers used for partial rollback processing. We further classify them into Uthe page buffer based partial rollback scheme, 2)the object buffccr based partial rollback scheme, 3)the dual buffer based partial rollback scheme using soft log, and 4)the dual buffer based partial rollback scheme using shadows. We evaluate the performance by mathematical analysis and experiments. The results show that the dual buffer based partial rollback scheme using shadows provides the best performance.

  • PDF

Blockchain-based Personal Information Authentication Method using Zero Knowledge Proofs (영지식을 활용한 블록체인 기반 개인정보 인증 기법)

  • Lee, Kwang Kyu
    • Smart Media Journal
    • /
    • v.10 no.3
    • /
    • pp.48-53
    • /
    • 2021
  • The authentication process is a key step that should be used to verify that a user is legitimate, and it should be used to verify that a user is a legitimate user and grant access only to that user. Recently, two-factor authentication and OTP schemes are used by most applications to add a layer of security to the login process and to address the vulnerability of using only one factor for authentication, but this method also allows access to user accounts without permission. This is a known security vulnerability. In this paper, we propose a Zero Knowledge Proofs (ZKP) personal information authentication scheme based on a Smart Contract of a block chain that authenticates users with minimal personal information exposure conditions. This has the advantage of providing many security technologies to the authentication process based on blockchain technology, and that personal information authentication can be performed more safely than the existing authentication method.

개별인증 출입보안시스템 구현 - RFID.지문인식.무게정보 이용 -

  • Lee, Dong-Man;Kim, Sang-Sik;Lee, Jae-Hong
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2009.05a
    • /
    • pp.20-26
    • /
    • 2009
  • 본 연구는 건물 내부에서 외부로 외부에서 내부로 출입하는 출입자를 정확히 파악하기 위하여 보안이 강화된 개별인증 출입보안시스템을 구축하는데 있다. 시스템 구현을 위해서 RFID 기술, 지문인식 기술을 적용한 통합인증단말기와 무게를 측정하는 전자저울을 활용 하였다. 개별 인증이 가능한 출입 인증 보안시스템을 구현한 결과를 요약하면, 첫째, 내부에서 외부로 나오는 경우와 외부에서 내부로 들어가는 경우를 분리한 이중 출입방식으로 외부인이 내부에서 나오는 사람의 인증만으로 쉽게 건물 안으로 진입하는 보안상의 문제점을 해결 하였다. 둘째, 건물 내부 물품을 외부로 유출할 시 무게 차이 때문에 출입문이 차단되어 관리자의 허락 없이는 물품을 밖으로 유출할 수 없게 되어 도난을 방지문제를 해결 하였다. 셋째, 몸무게 정보를 이용하여 출입자들이 동시에 출입문을 통과하지 못하도록 제한하여 모든 출입자의 로그정보를 정확하게 저장할 수 있도록 하였다. 넷째, 데이터베이스에 저장된 출입로그 데이터를 출퇴근 관리프로그램에 지원하여 급여 계산 및 인사 업무에 활용할 수 있도록 하였다. 다섯째, 건물에 화재가 나거나 폭탄 테러와 같은 위험 발생 시 출입자를 정확하게 파악할 수 있게 되어 용의자 파악이 용이하도록 하였다.

  • PDF

An Optimization Technique for Smart-Walk Systems Using Big Stream Log Data (Smart-Walk 시스템에서 스트림 빅데이터 분석을 통한 최적화 기법)

  • Cho, Wan-Sup;Yang, Kyung-Eun;Lee, Joong-Yeub
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.3
    • /
    • pp.105-114
    • /
    • 2012
  • Various RFID-based smart-walk systems have been developed for guiding disabled people. The system sends appropriate message whenever the disabled people arrived at a specific point. We propose universal design concept and optimization techniques for the smart-walk systems. Universal design concept can be adopted for supporting various kinds of disabled such as a blind person, a hearing-impaired person, or a foreigner in a system. It can be supported by storing appropriate messages set in the message database table depending on the kinds of the disabled. System optimization can be done by analyzing operational log(stream) data accumulated in the system. Useful information can be extracted by analyzing or mining the accumulated operational log data. We show various analysis results from the operational log data.

Pet Shop Recommendation System based on Implicit Feedback (암묵적 피드백 기반 반려동물 용품 추천 시스템)

  • Choi, Heeyoul;Kang, Yunhee;Kang, Myungju
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1561-1566
    • /
    • 2017
  • Due to the advances in machine learning and artificial intelligence technologies, many new services have become available. Among such services, recommendation systems have already been successfully applied to commercial services and made profits as in online shopping malls. Most recommendation algorithms in commercial services are based on content analysis or explicit feedback rates as in movie recommendations. However, many online shopping malls have difficulties in content analysis or are lacking explicit feedbacks on their items, which results in no recommendation system for their items. Even for such service systems, user log data is easily available, and if recommendations are possible with such log data, the quality of their service can be improved. In this paper, we extract implicit feedback like click information for items from log data and provide a recommendation system based on the implicit feedback. The proposed system is applied to a real in-service online shopping mall.

HUDF 은하의 형태와 진화

  • Kim, Chang-Yun;Choe, Seok-Hyeon;Jo, Wan-Jin;Han, San;An, Hong-Bae
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.37 no.1
    • /
    • pp.45.1-45.1
    • /
    • 2012
  • 은하의 형태학적 진화 양상을 분석하기 위해 허블 울트라 딥 필드 (Hubble Ultra Deep Field; HUDF)에 있는 밝은 은하를 조사하였다. Coe et al. (2006)의 HUDF 카탈로그에 포함된 적색편이, 적경, 적위, 밝기 등급, 픽셀 면적 값을 사용하여 HUDF은하의 B필터 영상에서 밝은 순서로 1000개의 천체를 선택하고 이로부터 939개의 은하의 육안 분류를 수행하였다. Elmegreen et al. (2005)의 분류 방법에 기초하여 타원 은하, 렌즈 은하, 나선 은하, 올챙이 은하(Tadpole), 이중 은하(Double), 사슬 은하(Chain), 덩어리 은하(Clump cluster)와 그 외의 불규칙 은하로 분류하였다. 이렇게 분류된 은하의 분류형과 은하의 적색이동 사이의 관계를 분석하여 HUDF 은하의 적색편이에 따른 형태학적 진화 양상을 찾아낼 수 있었다. 올챙이 은하, 이중 은하, 사슬형 은하, 덩어리 은하 등 병합 단계에 있는 것으로 추정되는 은하들은 적색편이가 작을수록 그 수가 대체로 감소하는 경향을 보이는 반면, 나선은하들은 적색편이가 작을수록 그 수가 증가하는 경향을 보였다. 또한, 적색편이와 은하 크기 사이의 관계를 보았을 때 낮은 적색 편이에서 나타나는 상대적으로 큰 은하들이 대부분 나선 은하였으며 이러한 결과는 은하 생성의 Bottom-Up 가설로 설명이 가능하다. 이와 함께 은하 형태의 정량적 분석을 위해 각 은하의 CAS와 함께 M20, Gini Coefficient(G)를 구하여 이들과 육안 분류와의 관계를 분석하여, CASGM20, 으로부터 은하의 분류 형을 찾는 방법을 모색하였다.

  • PDF

Generation and Management of Strong Passwords using an Ownership Verified Smartphone (소유권 확인된 스마트폰을 이용한 강력한 패스워드 생성 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.9 no.1
    • /
    • pp.30-37
    • /
    • 2020
  • Enforcing additional authentication to password-based authentication, in addition to attempting to increase the security of the password itself, helps to improve the security of the password authentication scheme. For a well-known problem of using strong passwords that differ from site to site, we propose a scheme for password generation and management with an inherent supplementary authentication. Like the so-called password manager, the scheme retrieves and presents a strong site-specific password whenever requested without requiring the user to remember multiple passwords. Unlike the existing methods, however, the scheme permits the password retrieval process to proceed only through the authenticated user's ownership verified smartphone. Hence, even for sites not enforcing or supporting two-factor authentication, the logon process can benefit from the scheme's assurance of enhanced security with its two-factor equivalent authentication. The scheme can also prevent an attacker from impersonating a user or stealing secrets even when the stored information of the server for password retrieval service or the user's smartphone is leaked.

Design of ALTIBASE(TM) Storage Manager for High Performance and High Availability (고성능 고가용성을 위한 ALTIBASE(TM) 자료저장 관리기의 설계)

  • Jeong, Gwang-Cheol;Lee, Gyu-Ung;Bae, Hae-Yeong
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.949-960
    • /
    • 2003
  • Main memory database systems use the different implementation techniques to sturucture and organize the user dta and system catalogs, since traditional database systems are optimized for the characteristics of disk storage environment. We present, in this paper, the design considerations for our main memory database system $ALTIBASE^{TM}$ that is currently applied to the time-critical applications. We focus on the design issues of storage manager in $ALTIBASE^{TM}$. The major components are introduced, and features and characteristics of transaction management and recovery method are described. We also present the database replication mechanism and its conflict resolution mechanism for high availability and performance. In order to evaluate our transaction performance, we show various experimental reports as measured by the TPS.