• Title/Summary/Keyword: 2020 strategy

Search Result 1,322, Processing Time 0.031 seconds

A Robust Method for Speech Replay Attack Detection

  • Lin, Lang;Wang, Rangding;Yan, Diqun;Dong, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.168-182
    • /
    • 2020
  • Spoofing attacks, especially replay attacks, pose great security challenges to automatic speaker verification (ASV) systems. Current works on replay attacks detection primarily focused on either developing new features or improving classifier performance, ignoring the effects of feature variability, e.g., the channel variability. In this paper, we first establish a mathematical model for replay speech and introduce a method for eliminating the negative interference of the channel. Then a novel feature is proposed to detect the replay attacks. To further boost the detection performance, four post-processing methods using normalization techniques are investigated. We evaluate our proposed method on the ASVspoof 2017 dataset. The experimental results show that our approach outperforms the competing methods in terms of detection accuracy. More interestingly, we find that the proposed normalization strategy could also improve the performance of the existing algorithms.

Cross-Border Asset Pledgeability for Enhanced Financial Stability

  • Choi, Gongpil
    • East Asian Economic Review
    • /
    • v.24 no.1
    • /
    • pp.89-124
    • /
    • 2020
  • Even with the sizable Foreign Exchange (FX) holdings and good credit ratings of its top assets, Asia remains vulnerable to various shocks. This paper highlights the limited cross-border asset pledgeability as a significant factor for the lingering vulnerability in Asia. The dichotomy in asset holdings between pledgeable FX and non-pledgeable domestic assets in major economies in Asia has been the source of increasing stabilization costs as well as weakened market momentum in the region. Specifically, the peculiar feature of asset holdings in Asia reflects seriously deficient cross-border asset pledgeability that is left unaddressed. Asset pledgeability contributes toward financial stability via three channels: 1) capital market development by recognizing the role of collateral, 2) increased shock absorption capacity via collateral management, 3) and the newly activated safe asset provision. Therefore, it is crucial to go beyond the usual market development strategy and expand the overall asset pledgeability in the region that has remained unduly depressed.

Nonlinear aerostatic analysis of long-span suspension bridge by Element free Galerkin method

  • Zamiria, Golriz;Sabbagh-Yazdi, Saeed-Reza
    • Wind and Structures
    • /
    • v.31 no.1
    • /
    • pp.75-84
    • /
    • 2020
  • The aerostatic stability analysis of a long-span suspension bridge by the Element-free Galerkin (EFG) method is presented in this paper. Nonlinear effects due to wind structure interactions should be taken into account in determining the aerostatic behavior of long-span suspension bridges. The EFG method is applied to investigate torsional divergence of suspension bridges, based on both the three components of wind loads and nonlinearities of structural geometric. Since EFG methods, which are based on moving least-square (MLS) interpolation, require only nodal data, the description of the geometry of bridge structure and boundaries consist of defining a set of nodes. A numerical example involving the three-dimensional EFG model of a suspension bridge with a span length of 888m is presented to illustrate the performance and potential of this method. The results indicate that presented method can effectively be applied for modeling suspension bridge structure and the computed results obtained using present modeling strategy for nonlinear suspension bridge structure under wind flow are encouragingly acceptable.

Priority Setting in Damage Control Surgery for Multiple Abdominal Trauma Following Resuscitative Endovascular Balloon Occlusion of the Aorta

  • Heo, Yoonjung;Lee, Seok Won;Kim, Dong Hun
    • Journal of Trauma and Injury
    • /
    • v.33 no.3
    • /
    • pp.181-185
    • /
    • 2020
  • Damage control surgery (DCS) is an abbreviated laparotomy procedure that focuses on controlling bleeding to limit the surgical insult. It has become the primary treatment modality for patients with exsanguinating truncal trauma. Herein, we present the case of a 47-year-old woman with liver, kidney, and superior mesenteric vein (SMV) injuries caused by a motor vehicle collision. The patient underwent DCS following resuscitative endovascular balloon occlusion of the aorta (REBOA). In this case report, we discuss the importance of priority setting in DCS for the treatment of multisystem damage of several abdominal organs, particularly when the patient has incurred a combination of major vascular injuries. We also discuss the implications of damage control of the SMV, perihepatic packing, and right-sided medial visceral rotation. Further understanding of DCS, along with REBOA as a novel resuscitation strategy, can facilitate the conversion of uniformly lethal abdominal injuries into rescuable injuries.

Fat grafts enriched with adipose-derived stem cells

  • Hong, Ki Yong
    • Archives of Craniofacial Surgery
    • /
    • v.21 no.4
    • /
    • pp.211-218
    • /
    • 2020
  • Autologous fat grafts are widely used in soft-tissue augmentation and reconstruction. To reduce the unpredictability of fat grafts and to improve their long-term survival, cell-assisted lipotransfer (CAL) was introduced. In this alternative method, autologous fat is mixed and grafted with stromal vascular fraction cells or adipose-derived stem/stromal cells (ASCs). In regenerative medicine, ASCs exhibit excellent therapeutic potential and are also simple to harvest. Although the efficacy of CAL has been demonstrated in experimental and clinical research, studies on its safety in terms of oncologic risk have reported inconclusive results. In order to establish CAL as a viable stem cell therapeutic approach, it will be necessary to demonstrate its oncologic safety in basic and clinical studies. Doing so could transform the paradigm of clinical strategy and practice for the treatment of a wide variety of diseases.

Research on Development Strategy Based on Domestic Sleep Industry Survey

  • Yu, Tae Gyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.59-65
    • /
    • 2020
  • The domestic sleep industry is rapidly increasing in market size as it is linked to sleep apnea in the longterm care insurance for the elderly and domestic IT technology. In addition, due to the aging society, the government's support policy is also increasing, and many domestic companies are focusing on the sleep industry. Therefore, this study intends to examine the development strategies of the domestic sleep industry due to the increased social interest and corporate activities. To this end, a survey of 108 domestic companies was conducted by means of a Frequency Analysis, revealing some problems, such as poor sleep companies, insufficient resources for technology development, and limitations in distribution channels. As a result, it was found that for the development of the domestic sleep industry, strategies to strengthen the ecosystem, such as softening strategies through the sleep technology culture, strengthening ecosystems such as revitalizing industrial connections, and reforming laws and regulations, are urgent.

A Study of Personal Characteristics That Influence Platform Business (플랫폼 서비스 충성도에 영향을 미치는 개인특성연구)

  • Kim, Young Jun;Choi, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.2
    • /
    • pp.51-71
    • /
    • 2020
  • Technological innovation can be both an opportunity and a crisis to take the initiative in the ecosystem, and companies are constantly competing to lead the platform within the ecosystem, including innovation in new products and services, absorption or integration of related industries. To cope with this rapid change in the environment today, it is essential to define the corporate ecosystem and platform business, and to understand the role and characteristics of users. This study seeks to conduct research on the usefulness, enjoyment, technicality, facilitation conditions, and causes of social impact on platform service loyalty to users of Kakao services. And this study will enable platform service providers through apps to use them as the basis for building business strategies in the service introduction phase.

Is a General Quality Model of Software Possible: Playability versus Usability?

  • Koh, Seokha;Jiang, Jialei
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.2
    • /
    • pp.37-50
    • /
    • 2020
  • This paper is very exploratory and addresses the issue 'Is a general quality model of software possible?'. If possible, how specific can/should it be?' ISO 25000 Series SQuaRE is generally regarded as a general quality model which can be applied to most kinds of software. Usability is one of the 8 characteristics of SQuaRE's Product Quality Model. It is the main issue associated with SQuaRE's Quality in Use Model too. it is the most important concept associated software quality since using is the only ultimate goal of software products. Playability, however, is generally regarded as a special type of usability, which can be applied to game software. This common idea contradicts with the idea that SQuaRE is valid for most kinds, at least many kinds, of software. The empirical evidences of this paper show that SQuaRE is too specific to be a general quality model of software.

The Effect of Security Awareness Training on the Use of Biometric Authentication: Focusing on the Protection Motivational Behaviors

  • Jung, Seungmin;Park, Joo Yeon
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.2
    • /
    • pp.1-21
    • /
    • 2020
  • The purpose of this study is to investigate the behavioral factors affecting the security attitude and intention to use biometrics password based on the protection motivation theory. This study also investigates security awareness training to understand trust, privacy, and security vulnerability regarding biometric authentication password. This empirical analysis reveals security awareness training boosts the protection motivational factors that affect on the behavior and intention of using biometric authentication passwords. This study also indicates that biometric authentication passwords can be used when the overall belief in a biometric system is present. After all, security awareness training enhances the belief of biometric passwords and increase the motivation to protect security threats. The study will provide insights into protecting security vulnerability with security awareness training.

A Proposal of Fake-free Ranking Method and Its Application : O2O-based Local Information Providing Service

  • Choe, Jong-gak;Lee, Inbok;Kwon, YongJin
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.57-64
    • /
    • 2020
  • The widespread use of smartphones with a variety of features has enabled mobile Internet-based services. One of these is online-to-offline (O2O) based services that connects online users with offline stores to add value. Applying this O2O strategy to local information retrieval induces online users to be linked to offline regions, thereby enabling the exchange of local-based information and helps create new value. This paper proposes and illustrates the implementation of O2O-based a local information providing service that utilizes photos of the local attraction. Also, we propose a fake-free ranking method to provide reliable local information to users and suggest its application of the service.