• Title/Summary/Keyword: Credentials

Search Result 60, Processing Time 0.022 seconds

Analysis on Reports of Qualitative Researches Published in Korean Journal of Women Health Nursing (여성건강간호학회지에 게재된 질적 연구 보고 분석)

  • Lee, Eun-Joo;Song, Ju-Eun;Kim, Myounghee;Kim, Sue;Jun, Eun-Mi;Ahn, Sukhee;Oh, Hyun-Ei;Cheon, Suk-Hee
    • Women's Health Nursing
    • /
    • v.18 no.4
    • /
    • pp.321-332
    • /
    • 2012
  • Purpose: This research was aimed to analyze the reports of qualitative researches published in Korean Journal of Women Health Nursing (KJWHN). Methods: Twenty qualitative researches using in-depth interviews or focus groups published in KJWHN during from 2002 to 2011 were selected for analysis. Selected reports were analyzed by consolidated criteria for reporting qualitative research (COREQ), which were a reporting guideline for qualitative researches, and consisted of thirty two items and three domains, i.e., (1) research team and reflexivity, (2) study design, and (3) data analysis and reporting. Results: Personal characteristics related to credentials, gender and interviewer's bias or assumption were less reported than other items in the 1st domain. In the 2nd domain, descriptions such as a presence of non-participants, pilot test for interview guide development, and transcript return to participants were less reported than other items. In the 3rd domain, items related to number of data coder, participants checking of the finding, and clarity of minor themes were less reported than other items. Conclusion: It could be concluded that COREQ is a useful guideline for reporting of qualitative studies. From these results, we suggest that full items of COREQ should be considered and described when researchers report qualitative research.

Establishment of Western-style Court Dress and its Formal Characteristics in the Meiji Period of Japan (일본 메이지기 [明治期] 문관대례복의 성립과 형태적 특징)

  • Lee, Kyung-Mee
    • Journal of the Korean Society of Costume
    • /
    • v.60 no.5
    • /
    • pp.71-87
    • /
    • 2010
  • The purpose of the study is analyzing Japanese modern costume, through examining legislation process and the relics of Chickimkwan's and Juimkwan's court costume. The results of the study are as follows. First, the proposer of civil court costume, established in 1872, was Iwakura Mission dispatched to America and Europe. The Mission realized the importance of preparing western-style costume in civilization from experience wearing traditional clothing at ceremony of presenting credentials in America. Afterwards, the Mission proposed that the government accept western-style as civil court costume and became first wearers in Japanese in England. Second, the difference, between ordinance and actual clothes worn by Iwakura Mission, occurred in process of legislation in 1872. That might be considered as trial and error in introducing different culture. The coexistence of England and French styles was unified into French style by the revision of civil court costume in 1886. Third, the pattern of paulownia embroidered on civil court costume was utilized as symbol of Japan. While the costume of Chickimkwan was embroidered by the pattern of 7 and 5 leaves paulownia, that of Juimkwan was 5 and 3 leaves expressing their grades. Fourth, relics research showed how formed manufacturer information and enacted design were in embroidery. The relics seemed to be manufactured in Japan, because emblem of Mitsukosi tailor was embroidered on inner part of the back of collar of Chickimkwan in Nara Women's University, Japan and that of Yamasaki on left inner pocket of Juimkwan in the Independence Hall, Korea. The embroider techniques comprised forming by filler particles according to the design, filling up coiled gold threads and expressing stem with gold threads and spangles. As preemptive study, establishment process of Japanese civil court costume in this study will help understand form characteristics appeared in civil court costume act of Korean Empire.

Dictionary Attack on Huang-Wei's Key Exchange and Authentication Scheme (Huang-Wei의 키 교환 및 인증 방식에 대한 사전공격)

  • Kim, Mi-Jin;Nam, Jung-Hyun;Won, Dong-Ho
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.83-88
    • /
    • 2008
  • Session initiation protocol (SIP) is an application-layer prolocol to initiate and control multimedia client session. When client ask to use a SIP service, they need to be authenticated in order to get service from the server. Authentication in a SIP application is the process in which a client agent present credentials to another SIP element to establish a session or be granted access to the network service. In 2005, Yang et al. proposed a key exchange and authentication scheme for use in SIP applications, which is based on the Diffie-Hellman protocol. But, Yang et al.'s scheme is not suitable for the hardware-limited client and severs, since it requires the protocol participant to perform significant amount of computations (i.e., four modular exponentiations). Based on this observation. Huang and Wei have recently proposed a new efficient key exchange and authentication scheme thor improves on Yang et al.'s scheme. As for security, Huang and Wei claimed, among others, that their scheme is resistant to offline dictionary attacks. However, the claim turned out to be untrue. In this paper, we show thor Huang and Wei's key exchange and authentication scheme is vulnerable to on offline dictionary attack and forward secrecy.

  • PDF

Use of Music Technology in Music Therapy (음악치료에서의 음악테크놀로지 활용)

  • Park, Ye Seul
    • Journal of Music and Human Behavior
    • /
    • v.12 no.2
    • /
    • pp.61-77
    • /
    • 2015
  • The purpose of this study was to investigate music therapists'use and perception of computer-based music technology. Questionnaires were distributed either electronically or in-person to 367 music therapists with credentials. Of the 367 initially distributed questionnaires, 101 were returned and 61 were analyzed after excluding 40 incomplete responses. The survey was comprised of two sections: the use of music technology and perceived importance of music technology in music therapy practice. The results showed that 65.6% of the respondents had used music technology in their clinical practice. The most frequently used type of music technology was Finale, followed by Garage band, and Cubase. With regard to the areas where music technology was used, it was implemented primarily for adolescents for musical or emotional goals, and was applied most frequently as a musical resource. In addition, most respondents showed a positive attitude toward music technology and added that they would need to be trained to use music technology for their clinical practice. These results provide practical information on how music therapists use and perceive computer-based music technology, and its implication for music therapy clinical practice.

A Study on Secure and Improved Single Sign-On Authentication System against Replay Attack (재전송 공격에 안전하고 개선된 Single Sign-On 인증 시스템에 관한 연구)

  • Kim, Hyun-Jin;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.769-780
    • /
    • 2014
  • In general, internet users need to remember several IDs and passwords when they use diverse web sites. From an effective management perspective, SSO system was suggested to reduce user inconvenience. Kerberos authentication, which uses centralized system management, is a typical example of a broker-based SSO authentication model. However, further research is required, because the existing Kerberos authentication system has security vulnerability problems of password and replay attacks. In SSO authentication systems, a major security vulnerability is the replay attack. When user credentials are seized by attackers, an authorized session can be obtained through a replay attack. In this paper, an improved SSO authentication model based on the broker-based model and a secure lightweight SSO mechanism against credential replay attack is proposed.

The ABC in Chick Lit: the Consumption of Asian America in The Dim Sum of All Things

  • Chung, Hyeyurn
    • English & American cultural studies
    • /
    • v.18 no.1
    • /
    • pp.53-92
    • /
    • 2018
  • This essay aims to examine chick lit written within the Asian American context. For the most part, the chick lit genre has been typically regarded as a site to study contemporary white women's experiences and to debate the genres' credentials as feminist literature. Though some may disagree, there is general consensus that chick lit has fallen out of vogue after reaching its peak in the first decade of the new millenium.; nevertheless, it is being revisited by readers and critics alike as it has recently re-emerged as a location upon which to examine how race and gender inform notions of national belonging and female subject formation in the twenty-first century. To this end, this essay reads Kim Wong Keltner's The Dim Sum of All Things (2004). Keltner's protagonist Lindsey Owyang is yet another twentysomething "chick" looking for love, self, independence, and success in the huge megalopolis of San Francisco. What sets Lindsey apart from the chick prototype is that she is a third-generation ABC (American-born Chinese) and issues relevant to Asian America frequently make their way into Lindsey's narrative. Though it is generally considered as standing a "few notches above the standard chick-lit fare" (Stover n. pag), I would argue that meaningful reflections on many of the major pillars of Asian American literature, history, and cultural politics are glossed over in favor of cursory musings about the daily vicissitudes of Lindsey's life. This essay thus takes to task Ferriss's claim that a "serious" consideration of chick lit "brings into focus many of the issues facing contemporary women and contemporary culture - issues of identity, of race and class, of femininity and feminism, of consumerism and self-image" (2). I contend that a close examination of Keltner's The Dim Sum of All Things discloses that the chick lit format undermines a "serious consideration" of Asian American issues by presenting in particular a highly problematic representation of race and of Asian American femininity.

Functional Characterization of khadi Yeasts Isolates for Selection of Starter Cultures

  • Motlhanka, Koketso;Lebani, Kebaneilwe;Garcia-Aloy, Mar;Zhou, Nerve
    • Journal of Microbiology and Biotechnology
    • /
    • v.32 no.3
    • /
    • pp.307-316
    • /
    • 2022
  • Yeasts play an important role in spontaneous fermentation of traditional alcoholic beverages. Our previous study revealed that a mixed-consortia of both Saccharomyces and non-Saccharomyces yeasts were responsible for fermentation of khadi, a popular, non-standardized traditional beverage with an immense potential for commercialization in Botswana. Functional characterization of isolated fermenting yeasts from mixed consortia is an indispensable step towards the selection of potential starter cultures for commercialization of khadi. In this study, we report the characterization of 13 khadi isolates for the presence of brewing-relevant phenotypes such as their fermentative capacity, ability to utilize a range of carbon sources and their ability to withstand brewing-associated stresses, as a principal step towards selection of starter cultures. Khadi isolates such as Saccharomyces cerevisiae, Saccharomycodes ludwigii and Candida ethanolica showed good brewing credentials but Lachancea fermentati emerged as the isolate with the best brewing attributes with a potential as a starter culture. However, we were then prompted to investigate the potential of L. fermentati to influence the fruity aromatic flavor, characteristic of khadi. The aroma components of 18 khadi samples were extracted using headspace solid phase micro-extraction (HS-SPME) and identified using a GC-MS. We detected esters as the majority of volatile compounds in khadi, typical of the aromatic signature of both khadi and L. fermentati associated fermentations. This work shows that L. fermentati has potential for commercial production of khadi.

A Learner-Centered Approach for University Liberal Art Education Empowered Blockchain Technology (블록체인 기술에 의하여 강화된 학습자 중심의 대학 교양교육 체제 연구)

  • Kyun, Suna;Jang, Jiyoung
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.107-123
    • /
    • 2021
  • Recently, there have been a number of researchers in the field of education who are actively exploring the educational applications of Blockchain technology, even though it is still in its infancy. Some researchers have been investigating its application in educational administration to issue academic credentials' or maintain student records with distributed ledger, which is the basis of Blockchain technology. Whereas, others have been examining its application in redesigning learning systems that are being used in various contexts, including online learning and lifelong education. In that vein, this paper aims to discuss a liberal arts education system which will be supported by Blockchain-based 'smart contracts'. At present, active efforts are being made to innovate liberal arts education in Korea, centered around government-funded university innovation projects and there have been reports of great achievements. However, if the Blockchain technology is applied to innovating the liberal arts education, we will innovate not only the liberal arts education but also university education as a whole. In this paper, there are suggestions on how to build a learner-centered educational environment where a liberal arts education system is supported by Blockchain-based smart contracts. First of all, the current innovation in liberal arts education and its limitations are discussed, followed by ways in which Blockchain-based smart contracts can reframe the liberal arts education system. Last but not least, the paper addresses implications of the Blockchain technology applications in liberal arts education, along with their future prospects.

Energy-efficient intrusion detection system for secure acoustic communication in under water sensor networks

  • N. Nithiyanandam;C. Mahesh;S.P. Raja;S. Jeyapriyanga;T. Selva Banu Priya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1706-1727
    • /
    • 2023
  • Under Water Sensor Networks (UWSN) has gained attraction among various communities for its potential applications like acoustic monitoring, 3D mapping, tsunami detection, oil spill monitoring, and target tracking. Unlike terrestrial sensor networks, it performs an acoustic mode of communication to carry out collaborative tasks. Typically, surface sink nodes are deployed for aggregating acoustic phenomena collected from the underwater sensors through the multi-hop path. In this context, UWSN is constrained by factors such as lower bandwidth, high propagation delay, and limited battery power. Also, the vulnerabilities to compromise the aquatic environment are in growing numbers. The paper proposes an Energy-Efficient standalone Intrusion Detection System (EEIDS) to entail the acoustic environment against malicious attacks and improve the network lifetime. In EEIDS, attributes such as node ID, residual energy, and depth value are verified for forwarding the data packets in a secured path and stabilizing the nodes' energy levels. Initially, for each node, three agents are modeled to perform the assigned responsibilities. For instance, ID agent verifies the node's authentication of the node, EN agent checks for the residual energy of the node, and D agent substantiates the depth value of each node. Next, the classification of normal and malevolent nodes is performed by determining the score for each node. Furthermore, the proposed system utilizes the sheep-flock heredity algorithm to validate the input attributes using the optimized probability values stored in the training dataset. This assists in finding out the best-fit motes in the UWSN. Significantly, the proposed system detects and isolates the malicious nodes with tampered credentials and nodes with lower residual energy in minimal time. The parameters such as the time taken for malicious node detection, network lifetime, energy consumption, and delivery ratio are investigated using simulation tools. Comparison results show that the proposed EEIDS outperforms the existing acoustic security systems.

Study on the Application of a Decentralized Identity System within University Based on Zero-Knowledge Proof for Self-Sovereign Identity Assurance (자기주권 신원 보장을 위한 영지식증명 기반의 대학 내 DID 시스템 적용방안 연구)

  • Im Sung Sik;Kim Seo Yeon;Kim Dong Woo;Han Su Jin;Lee Ki Chan;Oh Soo Hyun
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.141-150
    • /
    • 2024
  • With the increasing frequency of incidents related to personal information leaks, there is a growing concern about personal information protection. Moreover, with the emergence of blockchain technology, there is a heightened interest in self-sovereign identity models applied through blockchain, with ongoing research on Decentralized Identifiers (DID) to achieve this. However, despite universities storing and utilizing significant information such as personal data, their computer systems are operated and managed based on centralized systems, leading to annual occurrences of personal data breaches. Therefore, this paper proposes and implements a DID-based computing system applicable within universities. Additionally, it establishes and executes prominent services within the university context. The proposed system ensures users' self-sovereign identities through verifiable credentials, enabling the establishment of a secure integrated information system within the university, departing from traditional centralized systems.