• Title/Summary/Keyword: 정보출처

Search Result 187, Processing Time 0.021 seconds

Provable Security of 3GPP Integrity Algorithm f9 (3GPP 무결성 알고리즘 f9의 증명가능 안전성)

  • Hong, Do-won;Shin, Sang-Uk;Ryu, Heui-su;Chung, Kyo-Il
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.573-580
    • /
    • 2002
  • Within the security architecture of the 3GPP system there is a standardised integrity algorithm f9. The integrity algorithm f9 computes a MAC to authenticate the data integrity and data origin of signalling data over a radio access link of W-CDMA IMT-2000. f9 is a variant of the standard CBC MAC based on the block cipher KASUMI. In this paper we provide the provable security of f9 We prove that f9 is secure by giving concrete bound on an adversary's inability to forge in terms of her inability to distinguish the underlying block cipher from a pseudorandom permutation.

Development of Smartphone Application for Concentration Improvement on Android Environment (안드로이드 스마트폰 환경에서 집중력 향상을 위한 어플리케이션 개발)

  • Kim, Gyoung-Ken;Song, Teuk-Seob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.625-627
    • /
    • 2011
  • Smart phone users with an increase in the use of public transportation at this time due to promote the above social minute at a time and place anytime, anywhere without worrying improving concentration and peace of mind when the cost to run this study in order to complete an application at a time and place without giving the necessary content, improved concentration, and by running an application that gives peace of mind to develop.

  • PDF

A Study on Development of Collecting Historical Manuscripts Management System in the National Institute of Korean History (수집사료 관리시스템 개발에 관한 연구: 국사편찬위원회를 중심으로)

  • Yoon, So-Young
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.1
    • /
    • pp.371-387
    • /
    • 2009
  • National Institute of Korean History(NIKH) is the major collecting organization of manuscripts, records for historical research and develops a Collecting Manuscripts Management System. Manuscripts description conforms to records management system, such as provenance information and hierarchical catalog records and business process observes library management system because it is not the public records. Goal system is integrated system containing both. This study proposes development of Collecting Historical Manuscripts Management System in the NIKH and the aspects to achieve successful system operation.

Perceptions of Researchers on Cooperative Utilization of Research Outcomes (R&D 성과물 공동활용에 대한 연구자들의 인식에 관한 연구)

  • Chang, Durk-Hyun;Roh, Ryu-Ha;Lee, Soo-Sang
    • Journal of Information Management
    • /
    • v.39 no.4
    • /
    • pp.1-20
    • /
    • 2008
  • The purpose of this study is to scrutinize the copyright issue under Open Access environment. A survey has been carried out to investigate researchers' awareness and recognitions about such issues. For this, bioinformatics researchers were selected and surveyed. Descriptive statistics method is employed for analysis of collected data. The findings of this study summarized as follow. (1) Although the researchers regarded the Open Access a positive initiative, the perceptions about open access were very low. (2) The researchers demanded possession of copyright depending on type of research information. (3) Many agencies did not required the transfer of copyright to the researcher. Thus, there is a possibility of dispute regarding copyright issues between researchers and agencies. (4) The researchers are willing to participate in open access activity on the assumption that their study is used in legitimate objective. On the basis of these findings, suggestions are added in as an impetus to lower the barrier against a copyright and higher the approach to information seekers and information providers.

A Wrapper System for Extraction and Integration of Web Information (웹 정보의 추출 및 통합을 위한 래퍼 시스템)

  • 정재목;김형주
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.5
    • /
    • pp.551-559
    • /
    • 2003
  • This paper describes the data model and software development of XWS, an XWEET Web-wrapper System for generation wrapper program. To access information from various information sources, one has to convert and integrate source data into the same data model. XWS is developed as a part of XWEET project. We have implemented the XWS system using the Perl programming language stressing efficiency and ease-of-use. XWS has a few distinct features. First, data model and operator used for extracting information from HTML support a unified model of different views of HTML document. Second, it provides a user-friendly interface program to enable wrapper programmer to generate wrapper easily Third, XWS use the high-level script language designed by object-oriented methodology. In this paper, we also present the detail demonstration where it is useful for extracting article information from DBLP site.

CNN-Based Novelty Detection with Effectively Incorporating Document-Level Information (효과적인 문서 수준의 정보를 이용한 합성곱 신경망 기반의 신규성 탐지)

  • Jo, Seongung;Oh, Heung-Seon;Im, Sanghun;Kim, Seonho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.10
    • /
    • pp.231-238
    • /
    • 2020
  • With a large number of documents appearing on the web, document-level novelty detection has become important since it can reduce the efforts of finding novel documents by discarding documents sharing redundant information already seen. A recent work proposed a convolutional neural network (CNN)-based novelty detection model with significant performance improvements. We observed that it has a restriction of using document-level information in determining novelty but assumed that the document-level information is more important. As a solution, this paper proposed two methods of effectively incorporating document-level information using a CNN-based novelty detection model. Our methods focus on constructing a feature vector of a target document to be classified by extracting relative information between the target document and source documents given as evidence. A series of experiments showed the superiority of our methods on a standard benchmark collection, TAP-DLND 1.0.

Development of Social Data Collection and Loading Engine-based Reliability analysis System Against Infectious Disease Pandemic (감염병 위기 대응을 위한 소셜 데이터 수집 및 적재 엔진 기반 신뢰도 분석 시스템 개발)

  • Doo Young Jung;Sang-Jun Lee;MIN KYUNG IL;Seogsong Jeong;HyunWook Han
    • The Journal of Bigdata
    • /
    • v.7 no.2
    • /
    • pp.103-111
    • /
    • 2022
  • There are many institutions, organizations, and sites related to responding to infectious diseases, but as the pandemic situation such as COVID-19 continues for years, there are many changes in the initial and current aspects, and accordingly, policies and response systems are evolving. As a result, regional gaps arise, and various problems are scattered due to trust, distrust, and implementation of policies. Therefore, in the process of analyzing social data including information transmission, Twitter data, one of the major social media platforms containing inaccurate information from unknown sources, was developed to prevent facts in advance. Based on social data, which is unstructured data, an algorithm that can automatically detect infectious disease threats is developed to create an objective basis for responding to the infectious disease crisis to solidify international competitiveness in related fields.

Design and Implementation of a Food Price Information Analysis System Based on Public Big Data (공공 빅데이터 기반의 식품 가격 정보 분석 시스템의 설계 및 구현)

  • Lim, Jongtae;Lee, Hyeonbyeong;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.7
    • /
    • pp.10-17
    • /
    • 2022
  • Recently, with the issue of the 4th Industrial Revolution, many services using big data have been developed. Accordingly, studies have been conducting to utilize public data, which is considered as the most valuable data among big data. In this paper, we design and implement a food price information analysis system based on public big data. The proposed system analyzes the collected food price-related data in various forms from various sources and classifies them according to characteristics. In addition, the proposed system analyzes the factors affecting the price of food through big data analysis techniques and uses them as data to predict the price of food in the near future. Finally, the proposed system provides the user with the analyzed results through data visualization.

A Study on Development and Prospects of Archival Finding Aids (기록 검색도구의 발전과 전망)

  • Seol, Moon-Won
    • The Korean Journal of Archival Studies
    • /
    • no.23
    • /
    • pp.3-43
    • /
    • 2010
  • Finding aids are tools which facilitate to locate and understand archives and records. Traditionally there are two types of archival finding aids: vertical and horizontal. Vertical finding aids such as inventories have multi-level descriptions based on provenance, while horizontal ones such as catalogs and index are tools to guide to the vertical finding aids based on the subject. In the web environment, traditional finding aids are evolving into more dynamic forms. Respecting the principles of provenance and original order, vertical finding aids are changing to multi-entity structures with development of ISAD(G), ISAAR(CPF) and ISDF as standards for describing each entity. However, vertical finding aids can be too difficult, complicated, and boring for many users, who are accustomed to the easy and exciting searching tools in the internet world. Complementing them, new types of finding aids are appearing to provide easy, interesting, and extensive access channels. This study investigates the development and limitation of vertical finding aids, and the recent trend of evolving new finding aids complementing the vertical ones. The study finds three new trends of finding aid development. They are (i) mixture, (ii) integration, and (iii) openness. In recent days, certain finding aids are mixed with stories and others provide integrated searches for the collections of various heritage institutions. There are cases for experimenting user participation in the development of finding aids using Web 2.0 applications. These new types of finding aids can also cause some problems such as decontextualised description and prejudices, especially in the case of mixed finding aids and quality control of user contributed annotations and comments. To solve these problems, the present paper suggests to strengthen the infrastructure of vertical finding aids and to connect them with various new ones and to facilitate interactions with users of finding aids. It is hoped that the present paper will provide impetus for archives including the National Archives of Korea to set up and evaluate the development strategies for archival finding aids.

A Study of Web Forensics Algorithm that used Log History Analysis (로그 히스토리 분석을 사용한 웹 포렌식 알고리즘 연구)

  • Jeung, Jeung-Ki;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.245-254
    • /
    • 2006
  • Web Forensics algorithm used to an extraction of technical Web Forensics data to be adopted to proof data regarding a crime cyber a computer at data of a great number of log History is an essential element. Propose Web Forensics algorithm, and design at these papers, and try to implement in a Web server system of an actual company. And make the Web dispatch Loging system configuration experiment that applied integrity regarding Web log History information or authentication regarding an information source. Design Web Forensics algorithm and the Flow which used for Web log History analyses at server of e-mail, webmail, HTTP (Web BBS, Blog etc.), FTP, Telnet and messengers (MSN, NateOn, Yahoo, DaumTouch. BuddyBuddy, MsLee, AOL, SoftMe) of a company, and implement through coding. Therefore have a purpose of these paper to will contribute in scientific technical development regarding a crime cyber a computer through Web Forensics.

  • PDF