• Title/Summary/Keyword: Anonymous system

Search Result 92, Processing Time 0.029 seconds

Filled Skutterudites: from Single to Multiple Filling

  • Xi, Lili;Zhang, Wenqing;Chen, Lidong;Yang, Jihui
    • Journal of the Korean Ceramic Society
    • /
    • v.47 no.1
    • /
    • pp.54-60
    • /
    • 2010
  • This paper shortly reviews our recent work on filled skutterudites, which are considered to be one of the most promising thermoelectric (TE) materials due to their excellent power factors and relatively low thermal conductivities. The filled skutterudite system also provides a platform for studying void filling physics/chemistry in compounds with intrinsic lattice voids. By using ab initio calculations and thermodynamic analysis, our group has made progresses in understanding the filling fraction limit (FFL) for single fillers in $CoSb_3$, and ultra-high FFLs in a few alkali-metal-filled $CoSb_3$ have been predicted and then been confirmed experimentally. FFLs in multiple-element-filled $CoSb_3$ are also investigated and anonymous filling behavior is found in a few specific systems. The calculated and measured FFLs, in both single and multiple-filled $CoSb_3$ systems, show good accordance so far. The thermal transport properties can be understood qualitatively by a phonon resonance scattering model, and it seems that a scaling rule may exist between the lattice thermal resistivity and the resonance frequency of filler atoms in filled system. Even though a few things become clear now, there are still many unsolved issues that call for further work.

The Development of Commercialization in the Idea of the Fashion Design, Issey Miyake (잇세이 미야케의 디자인 발상과 상업화를 위한 전개과정에 대한 연구)

  • Cho, Jung-Mee;Huh, Eun-Joo
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.1
    • /
    • pp.80-91
    • /
    • 2009
  • The purpose of this study is to examine how he successfully connected his ideas of fashion design for art with the commerciality without a conflict about for 40 years. It is expected that this study will be a precedent in the aspect of the symmetry between artistry and commercialization in Issey Miyake's works. We will examine Issey Miyake's idea of fashion design and its development for the commercialization since 1970s that he started to give shape to his ideas in the fashion works to exactly commercialize in the market. 1. Re-creation of tradition(a piece of cloth): throughout the 1970s, Miyake continued to experiment with a variety of Eastern design elements. The elements of Japanese or oriental tradition made him to be at the very center of supreme of the world of fashion. He took advantages of his identity, and developed the tradition for mass produce. 2. Design for mass(Pleats Please): Miyake decided to make clothes for the people, not only for the top class of the society. This thought developed the designs for the mass, which were functional, universal for the modem buyer, and accessible to a wide market. He realized his ideal by the medium of pleats, which were made through industrial processes, while he tried variously the aspect of formative of the pleats in the collections. His designs concept is summarized by the industrial product design and anonymous design. 3. Innovation of manufacturing system(A-POC): Miyake in 1999 developed A-POC. A-POC is used modern computers in conjunction with traditional technology. A-POC does not make only a new cloth but also makes a new manufacturing system of clothes.

A Survey on the Perception and Satisfaction of Korean Traditional Medical Students on Computer-Based Test (컴퓨터기반시험에 대한 한의과대학 학생들의 인식 및 만족도 조사)

  • Kim, Mikyung;Han, Chang-ho
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.25 no.3
    • /
    • pp.57-71
    • /
    • 2021
  • Objectives : Computer-based test (CBT) will be introduced in the national examination of Korean medicine doctors from 2023. This study was aimed to provide some information, including prior considerations, to those preparing for CBT, by presenting a summary of the survey results from participants in a CBT simulation test. Methods : In December 2020, applicants from the graduating class of the college of Korean medicine from four universities participated in the simulation test for CBT. An online anonymous survey on the applicants' preference for CBT versus paper-based tests (PBT) was conducted. The questionnaire consisted of multiple-choice questions on a 5-point Likert scale and free-form questions. Results : A total of 176 students responded to the survey. Their response to CBT was generally positive. The item with the highest agreement was that it should provide a sufficient opportunity to experience CBT in the undergraduate exam (4.38±0.839). Concerns about the possibility of cheating or poor concentration were also detected. In addition to guaranteeing the stability of the CBT system, there were many comments expressing the need to supplement functions within the CBT system, including the memo or highlighter function. Conclusions : This study confirmed the feasibility of CBT including multimedia questions in the field of Korean medicine education and identified overall positive responses from those who experienced the CBT simulation test. Although time is short and there is so much to prepare, we hope this will be a leap forward for effective educational innovation in line with the changing environment of the health care education field.

Gender and healthcare issues related to the Protected Birth Act in Korea (보호출산제 시행과 젠더 및 보건의료 이슈)

  • Jiah Jeong
    • Women's Health Nursing
    • /
    • v.30 no.2
    • /
    • pp.101-106
    • /
    • 2024
  • This paper discusses the implications of the birth notification system and the Protected Birth Act in Korea. Aiming to prevent infanticide and abandonment of infants, the law will enter into force on July 19, 2024 in South Korea. The birth notification system mandates that both parents and the head of the medical institution where the birth occurred must report the event. In parallel, the Protected Birth Act will be implemented, allowing pregnant women in crisis who wish to remain anonymous, the option to give birth outside of a hospital setting in a way that safeguards the life and health of the child. However, many issues are being raised in Korean society in advance of the implementation of the Protected Birth Act. There is widespread concern that the Protected Birth Act fails to protect either women or children, especially as it raises issues regarding the need for legislation to protect children with disabilities and to address gaps for migrant women and children. This paper examines the gender and healthcare issues relating to the Protected Birth Act, focusing on women's health and human rights. The Act continues to perpetuate discrimination against out-of-wedlock pregnancies and upholds the ideology of the traditional family model. Furthermore, the legislative process did not address protective measures for the various reasons behind child abandonment. Critical issues such as women's autonomy, safe pregnancy termination, and paternal responsibility in childbirth are also notably absent. However, with the Act set to take effect soon, it is crucial for healthcare providers to comprehend the rationale and procedures associated with birth notification and the Protected Birth Act, and to prepare for its nationwide implementation. The law defines the socially vulnerable as its main beneficiaries, and it is necessary to strengthen social safety nets to improve their access to healthcare, eliminate prejudice and discrimination against out-of-wedlock pregnancies, and embrace the diversity of our society. We eagerly anticipate future discussions on gender and healthcare issues, as well as amendments to the law that reflect real-world circumstances to provide genuine protection for pregnant women in crisis and their infants.

A Study on Single Sign-On Authentication Model using Multi Agent (멀티 에이전트를 이용한 Single Sign-On 인증 모델에 관한 연구)

  • 서대희;이임영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.997-1006
    • /
    • 2004
  • The rapid expansion of the Internet has provided users with a diverse range of services. Most Internet users create many different IDs and passwords to subscribe to various Internet services. Thus, the SSO system has been proposed to supplement vulnerable security that may arise from inefficient management system where administrators and users manage a number of ms. The SSO system can provide heightened efficiency and security to users and administrators. Recently commercialized SSO systems integrate a single agent with the broker authentication model. However, this hybrid authentication system cannot resolve problems such as those involving user pre-registration and anonymous users. It likewise cannot provide non-repudiation service between joining objects. Consequently, the hybrid system causes considerable security vulnerability. Since it cannot provide security service for the agent itself, the user's private information and SSO system may have significant security vulnerability. This paper proposed an authentication model that integrates a broker authentication model, out of various authentication models of the SSO system, with a multi-agent system. The proposed method adopts a secure multi-agent system that supplements the security vulnerability of an agent applied to the existing hybrid authentication system. The method proposes an SSO authentication model that satisfies various security requirements not provided by existing broker authentication models and hybrid authentication systems.

Implementation of a Learning Support System that Facilitates Teacher-Student Interaction Utilizing a Digital Human (디지털 휴먼을 활용하여 교수-학생 상호작용을 촉진시키는 학습지원 시스템 구현)

  • Gyu-Sung Jung;Chan-Hyeong Im;Hae-Chan Lee;Ra Yun Boo;Soonuk Seol
    • Journal of Practical Engineering Education
    • /
    • v.14 no.3
    • /
    • pp.523-533
    • /
    • 2022
  • During the COVID-19 pandemic, the use of video classes and real-time online education has increased, but the lack of interaction between instructors and learners remains a challenging problem to be resolved. This paper designs and implements a learning support system that utilizes a digital human to improve faculty-student interaction, which plays an important role in increasing the educational effect and satisfaction of real-time online classes. In this paper, a digital human participates in a class as a virtual learner and asks questions raised by other learners through an anonymous chat system to the instructor on behalf of the learners. In addition, as a class facilitator, the digital human analyzes the lecturer's speech in real time and provides it to the learner in the form of a summary of the class, thereby facilitating faculty-student interaction. In order to confirm that the proposed system can be used in actual online real-time classes, we apply our system to Zoom classes. Experimental results show that facilitated Q&A and real-time class summaries are successfully provided through our digital human-based learning support system.

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

Development of a Secure Routing Protocol using Game Theory Model in Mobile Ad Hoc Networks

  • Paramasivan, Balasubramanian;Viju Prakash, Maria Johan;Kaliappan, Madasamy
    • Journal of Communications and Networks
    • /
    • v.17 no.1
    • /
    • pp.75-83
    • /
    • 2015
  • In mobile ad-hoc networks (MANETs), nodes are mobile in nature. Collaboration between mobile nodes is more significant in MANETs, which have as their greatest challenges vulnerabilities to various security attacks and an inability to operate securely while preserving its resources and performing secure routing among nodes. Therefore, it is essential to develop an effective secure routing protocol to protect the nodes from anonymous behaviors. Currently, game theory is a tool that analyzes, formulates and solves selfishness issues. It is seldom applied to detect malicious behavior in networks. It deals, instead, with the strategic and rational behavior of each node. In our study,we used the dynamic Bayesian signaling game to analyze the strategy profile for regular and malicious nodes. This game also revealed the best actions of individual strategies for each node. Perfect Bayesian equilibrium (PBE) provides a prominent solution for signaling games to solve incomplete information by combining strategies and payoff of players that constitute equilibrium. Using PBE strategies of nodes are private information of regular and malicious nodes. Regular nodes should be cooperative during routing and update their payoff, while malicious nodes take sophisticated risks by evaluating their risk of being identified to decide when to decline. This approach minimizes the utility of malicious nodes and it motivates better cooperation between nodes by using the reputation system. Regular nodes monitor continuously to evaluate their neighbors using belief updating systems of the Bayes rule.

Cognitive Impairment, Behavioral Problems, and Mental Health in Institutionalized Korean Elders -An Eligibility Issue for Care Settings- (기관별 입원/입소 노인의 인지.행동장애 및 정신건강 문제에 관한 조사연구 -노인 장기 요양 대상자의 입소기관별 적격성(eligibility) 여부를 중심으로-)

  • Kim, Hyun-Sil;Jung, Young-Mi;Lee, Hung-Sa
    • Journal of Korean Academy of Nursing
    • /
    • v.39 no.5
    • /
    • pp.741-750
    • /
    • 2009
  • Purpose: The purpose of this study was to identify the prevalence of cognitive impairment, behavioral problems, and the state of mental health for elderly Korean people who have been institutionalized. Methods: A cross-sectional, nationwide survey was performed using an anonymous questionnaire. The participants in this study were 2,521 institutionalized elderly Korean people. A proportional stratified random sampling method was employed. Results: 1) Elders admitted to subacute hospitals and long term care (LTC) facilities showed a higher level of cognitive impairment compared to elders admitted to acute care hospitals. 2) Elders confined in LTC facilities showed a higher level of behavioral problems compared to elders in acute or subacute hospitals. 3) Elders admitted to subacute hospitals and LTC facilities showed more serious mental health problems, such as depression or suicidal ideation, compared to elders in acute care hospitals. Conclusion: The results of this study indicate that the severity of cognitive-behavioral or mental health problems do not match well with type of care setting. Therefore, health personnel working with elderly people should be provided guidance on detection and management of cognitive-behavioral and mental health problems. The necessity of a decision support system for eligibility and placement in long-term care is also discussed.