• Title/Summary/Keyword: Enhanced security

Search Result 578, Processing Time 0.029 seconds

The Influence of the COVID-19 Anxiety and Dietary Lifestyles on the Drone Food Delivery Service Attitude (COVID-19 불안감과 식생활 라이프스타일에 따른 드론 음식배달 서비스에 대한 소비자 태도)

  • Zhao, Jun Wei;Park, Hyun Jung
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • This study investigates the impact of COVID-19 anxiety on dietary lifestyle and the effect of different dietary lifestyle on the intention to use drone food delivery services. A questionnaire survey was conducted among 356 Chinese consumers aware of drone food delivery services. Results show that First, COVID-19 anxiety significantly impacted dietary lifestyle, including health pursuit, safety pursuit, and convenience pursuit. Second, the dietary lifestyle of health pursuit, fashion pursuit, and convenience pursuit positively affected service perceptions, including perceived safety and perceived rapidity, perceived compatibility. The dietary lifestyle of taste pursuit positively associated with safety of drone food delivery service, while the dietary lifestyle of safety pursuit positively related to safety and rapidity of drone food delivery services. Third, the perceptions related to security, rapidity, and compatibility of drone food delivery services enhanced service usage intention. Results show that COVID-19 anxiety was positively associated with dietary lifestyle, influencing consumer attitudes toward drone food delivery services.

The Strategy of Russia's Political Elites to Maintain Dominance Through the Overhaul of Electoral System (선거제도 개편을 통한 러시아 정치 엘리트의 지배력 유지 전략)

  • Siheon Kim;Seho Jang
    • Analyses & Alternatives
    • /
    • v.7 no.1
    • /
    • pp.7-43
    • /
    • 2023
  • This study examines and identified a series of strategies of Russia's political elites to maintain and strengthen their dominance by reviewing the case of revisions in the election laws of Russia in 2014. At that time, a mixed-member electoral system was newly introduced, and on the surface, it seemed that the new system was a step toward meeting the demands of the people for "enhanced democracy". However, in 2016 and 2021, the ruling party of Russia won the general elections by making the most of the factors that could distort the election results inherent in the mixed-member electoral system. Therefore, this study aimed to analyze whether the revision of election laws was a mere vehicle used by the ruling party, United Russia, to maintain its political power, or whether it was a leap forward to achieve democracy. The study result indicate that the revision of election laws in 2014 was part of the policy responses to the internal conflicts in the circle of Russia's political elites, which had been rising since 2008, as well as to the public resistance. In other words, it was confirmed that the revision of election laws was one of the measures taken to "minimize competition" and "reproduce political power on a stable basis".

Establishment and Management of an Educational Outcome Cohort at the Keimyung University School of Medicine (계명대학교 의과대학 교육성과 코호트의 구축과 운영 사례 )

  • Soongu Kim;Aehwa Lee;Garam Lee;Ilseon Hwang
    • Korean Medical Education Review
    • /
    • v.25 no.2
    • /
    • pp.109-113
    • /
    • 2023
  • An educational outcome cohort has been established at Keimyung University School of Medicine to help make educational policy decisions and improve educational programs based on data. The purpose of the educational outcome cohort is to support educational policy decisions for achieving graduation outcomes smoothly and to accomplish the intended human resources development of the university through objective analyses and regular monitoring, providing continuous feedback. The data collected for the educational outcome cohort include the student identifications of freshmen, entrance exam scores, premedical and medical school grades, titles and forms of student academic research, the results of psychological testing, scholarship recipient lists, volunteer clubs, and so forth. The data are collected using an information utilization agreement approved by the Institutional Review Board, and the collected data are encrypted and stored on a dedicated computer for enhanced personal information security. Proposals to access and utilize the educational outcome cohort data must be discussed and approved by the Educational Outcome Cohort Committee, which decides on the scope and method of utilization. The collected and managed educational outcome cohort data have been used to develop comparative programs to improve students' competency and to support admission policy decisions through an analysis of the characteristics and performance of medical school students. The establishment and utilization of the educational outcome cohort will play an important role in determining the School of Medicine's educational policies and suggesting new directions for educational policies in the future.

Directions for Policy to the Fourth Industrial Revolution based on Hyper-Connected Society and Smart Technology (초연결사회와 스마트기술에 따른 4차산업혁명의 정책방향)

  • Eun-Yeol Oh;Jun-Ok Shin
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.45-54
    • /
    • 2023
  • This study aims to examine trends so far and proactively seek future policy directions because the degree of implementation of hyper-connected society and smart technology at home and abroad cannot be overlooked at present in Korea. The method of the study focused on differentiating it from this study through literature research and comparison of major previous studies. As a result of the study, data security and maintenance, enhanced privacy of users and users, and related policy directions for entering a super-aged society were identified in the era of the 4th industrial revolution in Korea according to hyper-connected society and smart technology. Research limitations were difficulties in obtaining data and technical limitations in statistical quantification through trend analysis, although research analysis should be approached through quantitative and quantitative methods. It needs to be supplemented in future studies.

Enhanced ACGAN based on Progressive Step Training and Weight Transfer

  • Jinmo Byeon;Inshil Doh;Dana Yang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.3
    • /
    • pp.11-20
    • /
    • 2024
  • Among the generative models in Artificial Intelligence (AI), especially Generative Adversarial Network (GAN) has been successful in various applications such as image processing, density estimation, and style transfer. While the GAN models including Conditional GAN (CGAN), CycleGAN, BigGAN, have been extended and improved, researchers face challenges in real-world applications in specific domains such as disaster simulation, healthcare, and urban planning due to data scarcity and unstable learning causing Image distortion. This paper proposes a new progressive learning methodology called Progressive Step Training (PST) based on the Auxiliary Classifier GAN (ACGAN) that discriminates class labels, leveraging the progressive learning approach of the Progressive Growing of GAN (PGGAN). The PST model achieves 70.82% faster stabilization, 51.3% lower standard deviation, stable convergence of loss values in the later high resolution stages, and a 94.6% faster loss reduction compared to conventional methods.

Pig production in Latin America

  • Luciano Roppa;Marcos Elias Duarte;Sung Woo Kim
    • Animal Bioscience
    • /
    • v.37 no.4_spc
    • /
    • pp.786-793
    • /
    • 2024
  • Latin America is a culturally, geographically, politically, and economically diverse region. Agriculture in Latin America is marked by a remarkable diversity of production systems, reflecting various agroecological zones, farm sizes, and technological levels. In the last decade, the swine industry increased by 30.6%, emerging as a great contributor to food security and economic development in Latin America. Brazil and Mexico dominate the pig production landscape, together accounting for 70% of sow inventory in the region. The swine industry in Latin America is predominantly comprised of small and medium-sized farms, however, in the past 30 years, the number of pig producers in Brazil dropped by 78%, whereas pork production increased by 326%. Similar to the global pork industry, the growing demand for pork, driven by population growth and changing dietary habits, presents an opportunity for the industry with an expected growth of 16% over the next decade. The export prospects are promising, however subject to potential disruptions from global market conditions and shifts in trade policies. Among the challenges faced by the swine industry, disease outbreaks, particularly African Swine Fever (ASF), present significant threats, necessitating enhanced biosecurity and surveillance systems. In 2023, ASF was reported to the Dominican Republic and Haiti, Porcine Reproductive and Respiratory Syndrome (PRRS) in Mexico, Costa Rica, the Dominican Republic, Colombia, and Venezuela, and Porcine Epidemic Diarrhea (PED) in Mexico, Peru, the Dominican Republic, Colombia, and Ecuador. Additionally, feed costs, supply chain disruptions, and energy expenses have affected mainly the smaller and less efficient producers. The swine industry is also transitioning towards more sustainable and environmentally friendly practices, including efficient feed usage, and precision farming. Ensuring long-term success in the swine industry in Latin America requires a holistic approach that prioritizes sustainability, animal welfare, and consumer preferences, ultimately positioning the industry to thrive in the evolving global market.

Technology Trends in CubeSat-Based Space Laser Communication (큐브위성 기반 우주 레이저 통신 기술 동향)

  • Chanil Yeo;Young Soon Heo;Siwoong Park;Hyoung Jun Park
    • Journal of Space Technology and Applications
    • /
    • v.4 no.2
    • /
    • pp.87-104
    • /
    • 2024
  • CubeSats are being utilized in various fields such as Earth observation, space exploration, and verification of space science and technology due to their low cost, short development period, enhanced mission-oriented performance, and ability to perform various missions through constellation and formation flights. Recently, as the availability of CubeSats has increased and their application areas have expanded, the demand for high-speed transmission of large amounts of data obtained by CubeSats has increased unprecedentedly. Laser-based free space optical communication technology is capable of transmitting large amounts of data at high speeds compared to the existing radio communication methods, and provides various advantages such as use of unlicensed spectrum, low cost, low power, high security characteristics, and of use a small communication platform. For this reason, it is suitable as a high-performance communication technology to support CubeSat missions. In this paper, we will present the core components and characteristics of CubeSat-based space laser communication system, and recent research trends, as well as representative technology development results.

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.

QR-Code Based Mutual Authentication System for Web Service (웹 서비스를 위한 QR 코드 기반 상호 인증 시스템)

  • Park, Ji-Ye;Kim, Jung-In;Shin, Min-Su;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.207-215
    • /
    • 2014
  • Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.

Design of Secure Scheme based on Bio-information Optimized for Car-sharing Cloud (카 쉐어링 클라우드 환경에서 최적화된 바이오 정보 기반 보안 기법 설계)

  • Lee, Kwang-Hyoung;Park, Sang-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.469-478
    • /
    • 2019
  • Car-sharing services have been settled on as a new type of public transportation owing to their enhanced convenience, expanded awareness of practical consumption patterns, the inspiration for environmental conscientiousness, and the diffusion of smart phones following the economic crisis. With development of the market, many people have started using such services. However, security is still an issue. Damage is expected since IDs and passwords are required for log-in when renting and controlling the vehicles. The protocol suggested in this study uses bio-information, providing an optimized service, and convenient (but strong) authentication with various service-provider clouds registering car big data about users through brokers. If using the techniques suggested here, it is feasible to reduce the exposure of the bio-information, and to receive service from multiple service-provider clouds through one particular broker. In addition, the proposed protocol reduces public key operations and session key storage by 20% on mobile devices, compared to existing car-sharing platforms, and because it provides convenient, but strong, authentication (and therefore constitutes a secure channel), it is possible to proceed with secure communications. It is anticipated that the techniques suggested in this study will enhance secure communications and user convenience in the future car-sharing-service cloud environment.