• Title/Summary/Keyword: Data journal

Search Result 188,479, Processing Time 0.131 seconds

Dual Image Reversible Data Hiding Scheme Based on Secret Sharing to Increase Secret Data Embedding Capacity (비밀자료 삽입용량을 증가시키기 위한 비밀 공유 기반의 이중 이미지 가역 정보은닉 기법)

  • Kim, Pyung Han;Ryu, Kwan-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.9
    • /
    • pp.1291-1306
    • /
    • 2022
  • The dual image-based reversible data hiding scheme embeds secret data into two images to increase the embedding capacity of secret data. The dual image-based reversible data hiding scheme can transmit a lot of secret data. Therefore, various schemes have been proposed until recently. In 2021, Chen and Hong proposed a dual image-based reversible data hiding scheme that embeds a large amount of secret data using a reference matrix, secret data, and bit values. However, in this paper, more secret data can be embedded than Chen and Hong's scheme. To achieve this goal, the proposed scheme generates polynomials and shared values using secret sharing scheme, and embeds secret data using reference matrix and septenary number, and random value. Experimental results show that the proposed scheme can transmit more secret data to the receiver while maintaining the image quality similar to other dual image-based reversible data hiding schemes.

Predictive Memory Allocation over Skewed Streams

  • Yun, Hong-Won
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.2
    • /
    • pp.199-202
    • /
    • 2009
  • Adaptive memory management is a serious issue in data stream management. Data stream differ from the traditional stored relational model in several aspect such as the stream arrives online, high volume in size, skewed data distributions. Data skew is a common property of massive data streams. We propose the predicted allocation strategy, which uses predictive processing to cope with time varying data skew. This processing includes memory usage estimation and indexing with timestamp. Our experimental study shows that the predictive strategy reduces both required memory space and latency time for skewed data over varying time.

An Exploratory Study on the Data Warehousing Methodology and Success (데이터 웨어하우징 방법론과 성공간의 관계에 대한 탐색적 연구)

  • Lee, Young-Sook;Lee, Dong-Man
    • Asia pacific journal of information systems
    • /
    • v.12 no.4
    • /
    • pp.21-36
    • /
    • 2002
  • This study empirically examined the effects of data warehousing methodology on the success of data warehousing. Research model and two hypotheses were set up to identify the relationships among two types of data warehousing methodology(top-down/bottom-up, dw configuration) and success based on the investigations of such theories as data warehousing, data warehousing methodology, IS success and so forth. And the survey instrument(questionnaire) was developed to collect data. Ultimately 183 questionnaires from 61 korean firms were collected. Findings showed that two types of data warehousing methodology affect significant effect on the success of data warehousing.

Development of data analysis and experiment evaluation supporting system(DAEXESS) (실험데이타 분석 및 평가지원시스템(DAEXESS) 개발)

  • 이현철;오인석;심봉식
    • Journal of the Ergonomics Society of Korea
    • /
    • v.16 no.1
    • /
    • pp.119-126
    • /
    • 1997
  • Most of human factors experiments in nuclear industry domain produe lots of experimental data, thus much time is reauired to analyze the data. DAEXESS was developed to reduce resource demands necessary for the analysis work through systematic data analysis requirements and automated data processing based on computer technology. Physilolgical data, human behavior recording data, system log data and verbal protocl can be collected, synthesized and easily analyzed with with respect to time domain in DAEXESS so that analyser is able to look into inte- grated information on operating context. DAEXESS assists analyser to carry out qualitative and quantitative data analysis easily.

  • PDF

Blending between machining data of surfaces (가공데이터로 주어진 곡면 간의 블렌딩)

  • Ju, Sang-Yoon;Jun, Cha-Soo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.10 no.1
    • /
    • pp.108-113
    • /
    • 1993
  • This paper proposes a method for obtaining blend surfaces between machining data of surfaces. This blending algorithm consists of trangation, detection, tracing, construction of blend surfaces, and generation of machining data for the blend surfaces. Inpus of the algorithm are a blend radius and machining data of surfaces to be blended. CL data as well as CC data can be applied as an input machining data of the algorithm.

  • PDF

Component Development and Importance Weight Analysis of Data Governance (Data Governance 구성요소 개발과 중요도 분석)

  • Jang, Kyoung-Ae;Kim, Woo-Je
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.41 no.3
    • /
    • pp.45-58
    • /
    • 2016
  • Data are important in an organization because they are used in making decisions and obtaining insights. Furthermore, given the increasing importance of data in modern society, data governance should be requested to increase an organization's competitive power. However, data governance concepts have caused confusion because of the myriad of guidelines proposed by related institutions and researchers. In this study, we re-established the concept of ambiguous data governance and derived the top-level components by analyzing previous research. This study identified the components of data governance and quantitatively analyzed the relation between these components by using DEMATEL and context analysis techniques that are often used to solve complex problems. Three higher components (data compliance management, data quality management, and data organization management) and 13 lower components are derived as data governance components. Furthermore, importance analysis shows that data quality management, data compliance management, and data organization management are the top components of data governance in order of priority. This study can be used as a basis for presenting standards or establishing concepts of data governance.

A Novel Sensor Data Transferring Method Using Human Data Muling in Delay Insensitive Network

  • Basalamah, Anas
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.21-28
    • /
    • 2021
  • In this paper, a novel data transferring method is introduced that can transmit sensor data without using data bandwidth or an extra-processing cycle in a delay insensitive network. The proposed method uses human devices as Mules, does not disturb the device owner for permission, and saves energy while transferring sensor data to the collection hub in a wireless sensor network. This paper uses IP addressing technique as the data transferring mechanism by embedding the sensor data with the IP address of a Mule. The collection hub uses the ARP sequence method to extract the embedded data from the IP address. The proposed method follows WiFi standard in its every step and ends when data collection is over. Every step of the proposed method is discussed in detail with the help of figures in the paper.

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

Data Visualization and Visual Data Analytics in ITSM

  • Donia Y. Badawood
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.68-76
    • /
    • 2023
  • Nowadays, the power of data analytics in general and visual data analytics, in particular, have been proven to be an important area that would help development in any domain. Many well-known IT services best practices have touched on the importance of data analytics and visualization and what it can offer to information technology service management. Yet, little research exists that summarises what is already there and what can be done to utilise further the power of data analytics and visualization in this domain. This paper is divided into two main parts. First, a number of IT service management tools have been summarised with a focus on the data analytics and visualization features in each of them. Second, interviews with five senior IT managers have been conducted to further understand the usage of these features in their organisations and the barriers to fully benefit from them. It was found that the main barriers include a lack of good understanding of some visualization design principles, poor data quality, and limited application of the technology and shortage in data analytics and visualization expertise.

A Study on Data Resource Management Comparing Big Data Environments with Traditional Environments (전통적 환경과 빅데이터 환경의 데이터 자원 관리 비교 연구)

  • Park, Jooseok;Kim, Inhyun
    • The Journal of Bigdata
    • /
    • v.1 no.2
    • /
    • pp.91-102
    • /
    • 2016
  • In traditional environments we have called the data life cycle DIKW, which represents data-information-knowledge-wisdom. In big data environments, on the other hand, we call it DIA, which represents data-insight-action. The difference between the two data life cycles results in new architecture of data resource management. In this paper, we study data resource management architecture for big data environments. Especially main components of the architecture are proposed in this paper.

  • PDF