• Title/Summary/Keyword: 판별자

Search Result 487, Processing Time 0.03 seconds

A method for quantitative measuring the degree of damage by personal information leakage (개인 정보 노출에 대한 정량적 위험도 분석 방안)

  • Kim, Pyong;Lee, Younho;Khudaybergenov, Timur
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.395-410
    • /
    • 2015
  • This research defines the degree of the threat caused by the leakage of personal information in a quantitative way. The proposed definition classifies the individual items in a personal data, then assigns a risk value to each item. The proposed method considers the increase of the risk by the composition of the multiple items. We also deals with various attack scenarios, where the attackers seek different types of personal information. The concept of entropy applies to associate the degree of the personal information exposed with the total risk value. In our experiment, we measured the risk value of the Facebook users with their public profiles. The result of the experiment demonstrates that they are most vulnerable against stalker attacks among four possible attacks with the personal information.

Behavior Improvement of Unethical Information-Sharing by The Ethical Program : Social Capital and Ripple Effect (윤리 프로그램을 통한 비윤리적 정보공유 행동의 개선: 사회적 자본과 잔물결 효과)

  • Jung, Byoung-Ho;Kim, Byung-Cho
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.169-182
    • /
    • 2017
  • The purpose of this study is to empirically examine a behavior improvement of unethical information sharing through the ethics program in organization. An unethical behavior of information sharing on organization members is to be get to private interests through divulgence of company's confidential information. An unethical information-sharing of individual is the opportunist and selfish behavior for an expansion of social capital and shows a negative ripple effect in organization. When conducting the research methods, the analysis order performs the cluster, discriminant, t-test and multiple regressions. According to the study, There are differences the behavior of unethical information sharing between opportunist and non-opportunist. The opportunist member for unethical behavior improvement required the program operation both value and compliance oriented program. Non-opportunist member required only the value-oriented program. The upcoming research needs to explore both ethics program's frequency and action of a punished person.

Development of Structure Dynamic Characteristics Analysis System Prototype using Image Processing Technique (영상처리기법을 이용한 구조물 동특성 분석 시스템 프로토타입 개발)

  • Jo, Byung-Wan;Lee, Yun-Sung;Kim, Jung-Hoon;Kim, Do-Keun;Yoon, Kwang-Won
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.3
    • /
    • pp.11-21
    • /
    • 2016
  • Recently, structure safety management techniques using cutting-edge technology(Displacement senor, sensor of acceleration) has emerged as an important issue owing to the aging of infrastructure such as bridge and building. In general, the structural monitoring system for structure safety management is based on IT technology and it is expensive to install. In this paper developed an image-based structure dynamic characteristic analysis system prototype to assess the damage of structure in a more cost-effective way than traditional structure health monitoring system. The inspector can take a video of buildings or other structures with digital camera or any other devices that is passible to take video, and then using NCC calculation for image processing technique to get natural frequency. This system is analysis of damage of the structure using a compare between the frequency response ratio and functions when problems are occurs send alarm to administrator. This system is easier to install and remove than previous monitoring sensor in economical way.

Computer-Aided Diagnosis for Pulmonary Tuberculosis using Texture Features Analysis in Digital Chest Radiography (질감분석을 이용한 폐결핵의 자동진단)

  • Kim, Dae-Hun;Ko, Seong-Jin;Kang, Se-Sik;Kim, Jung-Hoon;Kim, Chang-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.11
    • /
    • pp.185-193
    • /
    • 2011
  • There is no exact standard of detecting pulmonary tuberculosis(TB) in digital image of simple chest radiography. In this study, I experimented on the principal components analysis(PCA) algorithm in the past and suggested six other parameters as identification of TB lesions. The purpose of this study was to develop and test computer aided diagnosis(detection) method for the detection and measurement of pulmonary abnormalities on digital chest radiography. It showed comparatively low recognition diagnosis rate using PCA method, however, six kinds of texture features parameters algorithm showed similar or higher diagnosis rates of pulmonary disease than that of the clinical radiologists. Proposed algorithms using computer-aided of texture analysis can distinguish between areas of abnormality in the chest digital images, differentiate lesions having pulmonary disease. The method could be useful tool for classifying and measuring chest lesions, it would play a major role in radiologist's diagnosis of disease so as to help in pre-reading diagnosis and prevention of pulmonary tuberculosis.

Eddy Current Testing of Weldment by Plus(+) Point Probe (Plus(+) Point Probe를 이용한 용접부 와전류검사)

  • Lee, Hee-Jong;Kim, Yong-Sik;Nam, Mim-Woo;Yoon, Byung-Sik;Kim, Seok-Kon
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.19 no.6
    • /
    • pp.426-432
    • /
    • 1999
  • A plus-point eddy current test(ECT) probe was developed to examine the defects on the welds of pumps, valves, and pipings which are the major components of the electric power plants, non-destructive evaluation (NDE) techniques for detecting and sizing the flaws were studied adapting this probe. Differential plus-point ECT probe is consists of two "I"-type coils crossed each other and has an advantage having a small influence on the sensitivity by lift-off variation to the conventional types of probe. The specimens with crack-like electro discharge machining(EDM) notches on the weld of type 304 stainless-steel were fabricated in order to evaluate the plus-point ECT probe response to the flaws. NDE techniques to detect and size the flaws and estimate the flaw type were established with this specimens.

  • PDF

Development of Hydrologic Data Aquisition and Management System(HDAMS) in Anyangcheon watershed (안양천 유역의 실시간 수문모니터링 자료관리시스템 개발)

  • Lee, Kyoung-Do;Kim, You-Jin;Kim, Nam-Il;Lee, Kil-Seoung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.2029-2033
    • /
    • 2007
  • 오늘날 특정 유역에서의 수문현상 및 수문순환에 대한 분석을 위한 연구가 활발히 진행되고 있다. 이를 위해서는 수문자료의 관측은 반드시 수반되어야 하며, 관측자료의 품질관리 및 원시자료의 관리 등이 요구되고 있는 실정이다. 관측된 수문자료의 품질관리라 함은 자료의 신뢰도 분석과 자료의 보완의 두 과정을 포함한다. 여기서, 신뢰도 분석이라 함은 자료 속에 포함된 불확실성을 판별하는 작업을 의미하며, 자료의 불확실성은 위에서 언급된 자료의 불충분 및 불안정을 제외한 부정확, 불일관성에서 비롯된다. 자료의 보완이라 함은 자료의 신뢰도 분석을 통하여 자료 속에 포함된 불확실한 성분들을 찾아내고, 이를 제거한 후 완전한 자료로 대체하고, 자료가 결측된 경우 공백을 연결함으로써 자료의 완전성을 유지하거나 또는 불충분한 자료를 확장하는 일련의 보완작업이라고 정의한다. 자료의 품질을 결정하는 주요 인자는 크게 관측소 관리의 하드웨어적인 측면과 자료 분석의 소프트웨어적인 측면이 있다. 하드웨어적인 측면에서의 수문자료 품질관리를 위해서 본 과제에서는 현장에 설치된 수위계, 강우량계의 센서 등에 대한 장비를 점검하고, 현장실측을 통해 지속적으로 측정값을 보정해주는 역할을 수행하고 있으며, 소프트웨어적인 측면에서 수문자료의 품질관리를 위해서는 수문자료의 수집 단계부터 시작하여 데이터베이스 저장, 필터링, 통계분석, 웹 및 C/S(Client Server)를 통한 배포 등의 일련의 자료 처리 과정을 수행할 수 있는 수문자료관리 프로그램을 웹 시스템과 C/S로 분류하여 정의내릴 수 있다. 본 연구에서는 수문자료의 관리자 입장에서의 보다 효율적이고 체계적으로 자료를 관리하고 분석하기 위한 방안으로 수문자료관리시스템(Hydrologic Data Aquisition and Management System, HDAMS)을 개발하였다. 이 시스템은 안양천 유역에서 시범 적용하고 있으며, 범용성을 전제로 개발되었다. 또한 수문자료 관리 프로그램의 DB 구조 및 DB 자료를 활용한 다양한 분석기능은 갖도록 설계하였으며 계획된 데이터베이스 구조를 바탕으로 계측기 인터페이스와 사용자 인터페이스, 데이터베이스 간의 연동이 원활히 이루어지도록 개발하고자 한다.

  • PDF

MAC Address Spoofing Attack Detection and Prevention Mechanism with Access Point based IEEE 802.11 Wireless Network (Access Point 기반 무선 네트워크 환경에서의 MAC Address Spoofing 공격 탐지 및 차단 기법)

  • Jo, Je-Gyeong;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.9 no.4
    • /
    • pp.85-96
    • /
    • 2008
  • An authentication procedure on wired and wireless network will be done based on the registration and management process storing both the user's IP address and client device's MAC address information. However, existent MAC address registration/administration mechanisms were weak in MAC Spoofing attack as the attacker can change his/her own MAC address to client's MAC address. Therefore, an advanced mechanism should be proposed to protect the MAC address spoofing attack. But, existing techniques sequentially compare a sequence number on packet with previous one to distinguish the alteration and modification of MAC address. However, they are not sufficient to actively detect and protect the wireless MAC spoofing attack. In this paper, both AirSensor and AP are used in wireless network for collecting the MAC address on wireless packets. And then proposed module is used for detecting and protecting MAC spoofing attack in real time based on MAC Address Lookup table. The proposed mechanism provides enhanced detection/protection performance and it also provides a real time correspondence mechanism on wireless MAC spoofing attack with minimum delay.

  • PDF

A Development of Non-Invasive Body Monitoring IOT Sensor for Smart Silver Healthcare (스마트 실버 헬스케어를 위한 비접촉 인체감지 IOT 센서 개발)

  • Kang, Byung Wuk;Kim, Sang Hee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.1
    • /
    • pp.28-34
    • /
    • 2018
  • This paper is composed of a passenger management system using a temperature sensing module, a PIR sensor module for detecting movement inside a room, and a smart breath sensing module for determining a sleeping state. An embedded sensor module and a communication system integrated the sensing part and the algorithm driving part. As the aging society is accelerating and becoming more upgraded, the social cost of Silver Care increases, and in order to protect privacy, it is necessary to reduce costs by developing efficient smart silver care devices. The proposed non - image human body detection IOT sensor system is implemented by hardware and software and has superior performance compared with conventional image monitoring method.

The Effects of Interaction between Personality and Job Stress on Job Satisfaction: The Comparison between Accidents-laden and Accidents-free Train Drivers (성격과 직무스트레스의 상호작용이 직무만족에 미치는 영향: 사고경험 기관사와 무사고 기관사의 비교)

  • Shin, Tack-Hyun;Song, Sung-Tae
    • Journal of the Korean Society for Railway
    • /
    • v.14 no.5
    • /
    • pp.442-451
    • /
    • 2011
  • The purpose of this article is to find out and analyze the diverse factors that are incurring stress to the railway drivers, and to depict the moderating effects of personality factors(Locus of Control, Self-Efficacy, and Organization-Based Self Esteem) on the causal relationship between job stressors and job satisfaction in two groups(drivers who experienced accidents and drivers who did not). To attain this purpose, the 212 questionnaires received from the drivers of KORAIL, Seoul Metro, and Seoul Metropolitan Rapid Transit. Most crucial finding was that certain aspects of a driver's personalities measured by locus of control, self-efficacy, and organization-based self esteem showed significant moderating effects in predicting the level of job satisfaction, job stress and accidents. This result implies that the drastic testing of personality factors is so important when staffing drivers in the future.

Development of Management Performance Index Building BSC System for Hotels (BSC 시스템 구축을 위한 호텔기업의 성과지표 개발)

  • Chung, Tae-Woong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.234-241
    • /
    • 2008
  • The feature of the hotel business as a labor intensive industry and its heavy dependence on man power is relatively bigger than other industries. the important factors influencing the customer`s decision making are tangible facilities and intangible service qualities. however, the changes in economic situation are also seriously influencing them. So hotels are started to find other IT(information technology) systems. BSC which has been recognized as one of barometers to establish management performance is one of them. The purpose of this study was to develop KPI(key performance indicator) by using the BSC(Balanced Scorecard) for evaluating hotel management performance. This thesis presents customer performance, inner process performance, learning and growing performance as non-financial factors and tries to examine the cause and effect in the hotel industry. Hotels have to know nonfinancial performance which has positively relate to financial performance. To introduce BSC system is not to lead increasing income and bettermenting service quality, satisfacting customer needa for hotels, But to lead developing value enhancement to hotel enterprises and present process.