• Title/Summary/Keyword: Confidential Factor

Search Result 20, Processing Time 0.033 seconds

Mailing List Characteristic from Electronic Mail

  • Khaitiyakun, N.;Khunkitti, A.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.917-921
    • /
    • 2004
  • Principle of mailing list was distributed messages to all subscribers in one time. But mailing list operation has constructed a network traffic problem. Because mailing list manager distributed mails without concentrate on subscriber network. If our network has many of subscribers, there will be redundant data in traffic channel. Submailing list has purpose to reduce problems. Analyses of mailing list characteristic in electronic mail were a feature of submailing list system, which manage by human hand (Network Administrator). That will cause trouble for network traffic if Network Administrator could not seek for mailing list characteristic from e-mails in due time. This article will present ideas and recognize methodology for automatic working in submailing list system. Recognize step begin with capture process, which use to trap e-mail information from transfer channel. Next process is preparing raw data into recognition format. Then the third one is recognize part and find out confidential factor. The last process is make decision and determine which electronic mail has properties of mailing list characteristic. Afterward deliver result to submailing list for carry on.

  • PDF

Interaction Intent Analysis of Multiple Persons using Nonverbal Behavior Features (인간의 비언어적 행동 특징을 이용한 다중 사용자의 상호작용 의도 분석)

  • Yun, Sang-Seok;Kim, Munsang;Choi, Mun-Taek;Song, Jae-Bok
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.8
    • /
    • pp.738-744
    • /
    • 2013
  • According to the cognitive science research, the interaction intent of humans can be estimated through an analysis of the representing behaviors. This paper proposes a novel methodology for reliable intention analysis of humans by applying this approach. To identify the intention, 8 behavioral features are extracted from the 4 characteristics in human-human interaction and we outline a set of core components for nonverbal behavior of humans. These nonverbal behaviors are associated with various recognition modules including multimodal sensors which have each modality with localizing sound source of the speaker in the audition part, recognizing frontal face and facial expression in the vision part, and estimating human trajectories, body pose and leaning, and hand gesture in the spatial part. As a post-processing step, temporal confidential reasoning is utilized to improve the recognition performance and integrated human model is utilized to quantitatively classify the intention from multi-dimensional cues by applying the weight factor. Thus, interactive robots can make informed engagement decision to effectively interact with multiple persons. Experimental results show that the proposed scheme works successfully between human users and a robot in human-robot interaction.

A Study on the Correlation between Atypical Form Factor-based Smartphones and Display-dependent Authentication Methods (비정형 폼 팩터 기반 스마트폰과 디스플레이 의존형 사용자 인증기법의 상관관계 연구)

  • Choi, Dongmin
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1076-1089
    • /
    • 2021
  • Among the currently used knowledge-based authentication methods for smartphones, text and graphic-based authentication methods, such as PIN and pattern methods, use a display unit and a touch function of the display unit for input/output of secret information. Recently released smartphone form factors are trying to transform into various forms, away from the conventional bar and slate types because of the material change of the display unit used in the existing smartphone and the increased flexibility of the display unit. However, as mentioned in the study of D. Choi [1], the structural change of the display unit may directly or indirectly affect the authentication method using the display unit as the main input/output device for confidential information, resulting in unexpected security vulnerabilities. In this paper, we analyze the security vulnerabilities of the current mobile user authentication methods that is applied atypical form factor. According to the analysis results, it seems that the existing display-dependent mobile user authentication methods do not consider emerging security threats at all. Furthermore, it is easily affected by changes in the form factor of smartphones. Finally, we propose countermeasures for security vulnerabilities expected when applying conventional authentication methods to atypical form factor-based smartphones.

An Analysis of the Fire Load and Ventilation Factor in Underground Commercial Space (지하상업공간의 환기계수 및 화재하중 분석)

  • Choo Yeun-Hee;Lee Ji-Hee;Hong Won-Hwa
    • Journal of the Korean housing association
    • /
    • v.17 no.2
    • /
    • pp.135-142
    • /
    • 2006
  • The purpose of this study is to obtain the fire safety for underground commercial space with analysing fire loads and ventilation factors. It was adopted the investigation method of field survey with commercial uses for more confidential data. The results of this study can be summarized as follows; 1) The ventilation factor shows $0.04{\sim}0.24m^{1/2}$ and it may develop ventilation-controlled fires which have much fire hazard more than fuel-controlled fires. 2) The highest value of fire load is $158.48kg/m^2$ and appeared in footwear shop which has the value $137.35kg/m^2$ for unfixed combustibles and $21.13kg/m^2$ for fixed combustibles. 3) The average value of burning rates which mean the velocity of fire development and the fire damage range is 0.143. Therefore it is desired to decrease the combustibles of compartment and is needed the method of dispersion arrangement of goods and storage to steel cabinet and so on.

An Effective Mixed Steganography Based on LSB and LDR (LSB와 LDR을 기반한 효과적인 혼합 스테가노그래피)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.561-566
    • /
    • 2019
  • In the Internet space, integrity and security must be maintained for secure and confidential communication, which ensures reliability between sender and receiver. Cryptography is an important factor in maintaining robustness against external attacks. For this purpose, encryption and steganography methods are used. Steganography is a method of hiding confidential information without making statistically significant changes to digital media. I propose a method of transforming the Hangul-Jamo consisting of choseong, jungseong and jongseong, and inserting them into RGB pixel values of the cover image. In order to improve security, a new blending method was used to hide the altered information in the lowest region. In this case, a mixture of LSB and LDR techniques was applied. PSNR was calculated for image quality. The PSNR of the proposed method is 43.225dB, which satisfies the lowest level.

Comparison of Piezocone and Dilatometer Test Results on Inchon International Airport Marine Clay (인천국제공항 부지 해성 점토에 대한 피에조콘과 딜라토미터 시험 결과 비교)

  • 김주형;김영웅;김명모
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2000.03b
    • /
    • pp.677-684
    • /
    • 2000
  • Piezocone test as well as Dilatometer tests are used worldwide to evaluate the engineering properties of clay soils. The common strong point of the two tests is that they can estimate, by the identical test equipment, various properties of soils, which are the unit weight of soils of OCR, K$\sub$o/, undrained shear strength(s$\sub$u/), coefficient of consolidation(c$\sub$h/) and soil classification etc,. A series of the two types of field tests are performed in this study on marine clays with low plasticity at Inchon International Airport construction site to estimate various properties of the soils such as s$\sub$u/, OCR, and c$\sub$h/, which are then compared each other as well as with the results of reference tests. The comparisons show that the way of interpretation is the most critical factor in obtaining confidential results for a certain engineering property for both tests.

  • PDF

동물복지와 식육의 품질

  • Kim, Dong-Hun;Park, Beom-Yeong
    • Proceedings of the Korean Society for Food Science of Animal Resources Conference
    • /
    • 2005.10a
    • /
    • pp.71-84
    • /
    • 2005
  • In recent year, animal welfare is more and more attracted public concern. Many countries have legislated animal welfare laws especially in EU. Now, it is appearing as an international issue in livestock product trade area because of animal welfare standard differences. The concept of animal welfare is not scientific but Ideological. In relation to consumer quality, animal welfare was defined confidential quality attribute. Therefore it is hard to approach to technical quality characteristic. This article reviewed interrelationships of animal welfare and product quality included in animal welfare as a quality factor, the mechanisms of determined quality influenced by animal welfare, relations of the type of animal welfare and quality profiles, and global perspectives.

  • PDF

An Analysis on the Relative Importance of the Risk Factors for the Marine Traffic Environment using Analytic Hierarchy Process

  • Lee, Hong-Hoon;Kim, Chol-Seong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.19 no.3
    • /
    • pp.257-263
    • /
    • 2013
  • The classification of risk factors and the identification of risk acceptance criteria are core works to assess risk levels with high enough confidential level in the field of marine traffic environment. In the previous study work, the twenty kinds of risk factors and its assessment criteria for the domestic marine traffic environment were proposed. In this paper, with these previous studying results, the relative importance of the risk factors were analyzed by questionnaire survey of marine traffic experts using the analytic hierarchy process. The analysis results showed that the relative importance of the visibility restriction is the highest among the twenty kinds of risk factors, and the relative importance of the traffic condition is the highest among the five kinds of risk categories. As results from analysis, it is expected that the approaching method on the relative importance is to be one of basic techniques for the development of risk assessment models in the domestic marine traffic environment.

A Study on the Educational Effectiveness of e-Learning (이러닝 수강생 교육 효과에 관한 연구)

  • Moon, Sook-Kyung;Nam, Sang-Zo
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.1
    • /
    • pp.161-168
    • /
    • 2007
  • In this study, we investigated the effectiveness of e-Learning, and attempted to identify factors affecting educational results. Based on survey data from 712 distance learning participants, we selected and verified factors affecting educational results through a correlation analysis and confidential test. Participants' scores were standardized and considered as a dependent variable representing educational effectiveness. Through several tests using the program AMOS, we suggest the most appropriate structural equation that can verify the causal relation of factors affecting the effectiveness of e-Learning. In result, the most important factor affecting score which is our measurement for educational effectiveness is job-possession. The fidelity has slightly direct influence to the score and the satisfaction has least indirect influence to the score.

USB security solution using 2 fator authentication (2차 인증방식을 이용한 USB보안 솔루션 (USS Solution))

  • Ko, Sang-Hyun;Han, Seok-Jin;Choi, Yoon-SU;Bae, Jong-Su;Lee, Hyun
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.267-270
    • /
    • 2017
  • As IT technology developed, storage media also developed. Among them, USB, which is a removable storage medium, is used not only to have several per person but also to work in various companies. Users store valuable and confidential data within USB. As time went on, the need for security increased. In order to solve this security problem, USB has been introduced to allow users to access internal files by inputting ID and password by embedding a security program in USB. However, the method of storing ID and Password inside is low confidentiality and high risk of information leakage. To solve these problems, we propose a 2 factor authentication system using Radius server in addition to login authentication. The proposed system not only improves the authenticity of the device, but also reduces the risk of infringement of personal information when lost. It also encrypts internal files to increase the confidentiality of internal information.