• Title/Summary/Keyword: False-Information

Search Result 1,370, Processing Time 0.031 seconds

Cortex M3 Based Lightweight Security Protocol for Authentication and Encrypt Communication between Smart Meters and Data Concentrate Unit (스마트미터와 데이터 집중 장치간 인증 및 암호화 통신을 위한 Cortex M3 기반 경량 보안 프로토콜)

  • Shin, Dong-Myung;Ko, Sang-Jun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.111-119
    • /
    • 2019
  • The existing smart grid device authentication system is concentrated on DCU, meter reading FEP and MDMS, and the authentication system for smart meters is not established. Although some cryptographic chips have been developed at present, it is difficult to complete the PKI authentication scheme because it is at the low level of simple encryption. Unlike existing power grids, smart grids are based on open two-way communication, increasing the risk of accidents as information security vulnerabilities increase. However, PKI is difficult to apply to smart meters, and there is a possibility of accidents such as system shutdown by sending manipulated packets and sending false information to the operating system. Issuing an existing PKI certificate to smart meters with high hardware constraints makes authentication and certificate renewal difficult, so an ultra-lightweight password authentication protocol that can operate even on the poor performance of smart meters (such as non-IP networks, processors, memory, and storage space) was designed and implemented. As a result of the experiment, lightweight cryptographic authentication protocol was able to be executed quickly in the Cortex-M3 environment, and it is expected that it will help to prepare a more secure authentication system in the smart grid industry.

Automatic Detection of Type II Solar Radio Burst by Using 1-D Convolution Neutral Network

  • Kyung-Suk Cho;Junyoung Kim;Rok-Soon Kim;Eunsu Park;Yuki Kubo;Kazumasa Iwai
    • Journal of The Korean Astronomical Society
    • /
    • v.56 no.2
    • /
    • pp.213-224
    • /
    • 2023
  • Type II solar radio bursts show frequency drifts from high to low over time. They have been known as a signature of coronal shock associated with Coronal Mass Ejections (CMEs) and/or flares, which cause an abrupt change in the space environment near the Earth (space weather). Therefore, early detection of type II bursts is important for forecasting of space weather. In this study, we develop a deep-learning (DL) model for the automatic detection of type II bursts. For this purpose, we adopted a 1-D Convolution Neutral Network (CNN) as it is well-suited for processing spatiotemporal information within the applied data set. We utilized a total of 286 radio burst spectrum images obtained by Hiraiso Radio Spectrograph (HiRAS) from 1991 and 2012, along with 231 spectrum images without the bursts from 2009 to 2015, to recognizes type II bursts. The burst types were labeled manually according to their spectra features in an answer table. Subsequently, we applied the 1-D CNN technique to the spectrum images using two filter windows with different size along time axis. To develop the DL model, we randomly selected 412 spectrum images (80%) for training and validation. The train history shows that both train and validation losses drop rapidly, while train and validation accuracies increased within approximately 100 epoches. For evaluation of the model's performance, we used 105 test images (20%) and employed a contingence table. It is found that false alarm ratio (FAR) and critical success index (CSI) were 0.14 and 0.83, respectively. Furthermore, we confirmed above result by adopting five-fold cross-validation method, in which we re-sampled five groups randomly. The estimated mean FAR and CSI of the five groups were 0.05 and 0.87, respectively. For experimental purposes, we applied our proposed model to 85 HiRAS type II radio bursts listed in the NGDC catalogue from 2009 to 2016 and 184 quiet (no bursts) spectrum images before and after the type II bursts. As a result, our model successfully detected 79 events (93%) of type II events. This results demonstrates, for the first time, that the 1-D CNN algorithm is useful for detecting type II bursts.

What's Different about Fake Review? (조작된 리뷰(Fake Review)는 무엇이 다른가?)

  • Jung Won Lee;Cheol Park
    • Information Systems Review
    • /
    • v.23 no.1
    • /
    • pp.45-68
    • /
    • 2021
  • As the influence of online reviews on consumer decision-making increases, concerns about review manipulation are also increasing. Fake reviews or review manipulations are emerging as an important problem by posting untrue reviews in order to increase sales volume, causing the consumer's reverse choice, and acting at a high cost to the society as a whole. Most of the related prior studies have focused on predicting review manipulation through data mining methods, and research from a consumer perspective is insufficient. However, since the possibility of manipulation of reviews perceived by consumers can affect the usefulness of reviews, it can provide important implications for online word-of-mouth management regardless of whether it is false or not. Therefore, in this study, we analyzed whether there is a difference between the review evaluated by the consumer as being manipulated and the general review, and verified whether the manipulated review negatively affects the review usefulness. For empirical analysis, 34,711 online book reviews on the LibraryThing website were analyzed using multilevel logistic regression analysis and Poisson regression analysis. As a result of the analysis, it was found that there were differences in product level, reviewer level, and review level factors between reviews that consumers perceived as being manipulated and reviews that were not. In addition, manipulated reviews have been shown to negatively affect review usefulness.

Development of Cloud and Shadow Detection Algorithm for Periodic Composite of Sentinel-2A/B Satellite Images (Sentinel-2A/B 위성영상의 주기합성을 위한 구름 및 구름 그림자 탐지 기법 개발)

  • Kim, Sun-Hwa;Eun, Jeong
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_1
    • /
    • pp.989-998
    • /
    • 2021
  • In the utilization of optical satellite imagery, which is greatly affected by clouds, periodic composite technique is a useful method to minimize the influence of clouds. Recently, a technique for selecting the optimal pixel that is least affected by the cloud and shadow during a certain period by directly inputting cloud and cloud shadow information during period compositing has been proposed. Accurate extraction of clouds and cloud shadowsis essential in order to derive optimal composite results. Also, in the case of an surface targets where spectral information is important, such as crops, the loss of spectral information should be minimized during cloud-free compositing. In thisstudy, clouds using two spectral indicators (Haze Optimized Tranformation and MeanVis) were used to derive a detection technique with low loss ofspectral information while maintaining high detection accuracy of clouds and cloud shadowsfor cabbage fieldsin the highlands of Gangwon-do. These detection results were compared and analyzed with cloud and cloud shadow information provided by Sentinel-2A/B. As a result of analyzing data from 2019 to 2021, cloud information from Sentinel-2A/B satellites showed detection accuracy with an F1 value of 0.91, but bright artifacts were falsely detected as clouds. On the other hand, the cloud detection result obtained by applying the threshold (=0.05) to the HOT showed relatively low detection accuracy (F1=0.72), but the loss ofspectral information was minimized due to the small number of false positives. In the case of cloud shadows, only minimal shadows were detected in the Sentinel-2A/B additional layer, but when a threshold (= 0.015) was applied to MeanVis, cloud shadowsthat could be distinguished from the topographically generated shadows could be detected. By inputting spectral indicators-based cloud and shadow information,stable monthly cloud-free composited vegetation index results were obtained, and in the future, high-accuracy cloud information of Sentinel-2A/B will be input to periodic cloud-free composite for comparison.

Index-based Searching on Timestamped Event Sequences (타임스탬프를 갖는 이벤트 시퀀스의 인덱스 기반 검색)

  • 박상현;원정임;윤지희;김상욱
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.468-478
    • /
    • 2004
  • It is essential in various application areas of data mining and bioinformatics to effectively retrieve the occurrences of interesting patterns from sequence databases. For example, let's consider a network event management system that records the types and timestamp values of events occurred in a specific network component(ex. router). The typical query to find out the temporal casual relationships among the network events is as fellows: 'Find all occurrences of CiscoDCDLinkUp that are fellowed by MLMStatusUP that are subsequently followed by TCPConnectionClose, under the constraint that the interval between the first two events is not larger than 20 seconds, and the interval between the first and third events is not larger than 40 secondsTCPConnectionClose. This paper proposes an indexing method that enables to efficiently answer such a query. Unlike the previous methods that rely on inefficient sequential scan methods or data structures not easily supported by DBMSs, the proposed method uses a multi-dimensional spatial index, which is proven to be efficient both in storage and search, to find the answers quickly without false dismissals. Given a sliding window W, the input to a multi-dimensional spatial index is a n-dimensional vector whose i-th element is the interval between the first event of W and the first occurrence of the event type Ei in W. Here, n is the number of event types that can be occurred in the system of interest. The problem of‘dimensionality curse’may happen when n is large. Therefore, we use the dimension selection or event type grouping to avoid this problem. The experimental results reveal that our proposed technique can be a few orders of magnitude faster than the sequential scan and ISO-Depth index methods.hods.

The Utility of Chest CT in Staging of Esophageal Cancer (식도암의 병기 결정에 있어 흉부 CT의 유용성)

  • 홍성범;장원채;김윤현;김병표;최용선;오봉석
    • Journal of Chest Surgery
    • /
    • v.37 no.12
    • /
    • pp.992-998
    • /
    • 2004
  • Background: The decision of staging of esophageal cancer have great effect on the resectability of the lesion and estimation of the patient's prognosis. Today, CT is one of the most popular modality for staging of esophageal cancer. However, it has some limitations because of false-positive or false-negative findings on cancer staging. The purpose of this study was to analyze the efficacy of CT in preoperative staging of esophageal cancer. Material and Method: We retrospectively analysed the difference of staging of esophageal cancer between CT and histopathological findings for the 114 patients with histologically proven esophageal cancer who underwent operation at the department of thoracic and cardiovascular surgery, Chonnam national university hospital, between January 1999 and June 2003. We evaluated the efficacy of chest CT in the staging of esophageal cancer compared to postoperative histopathologic findings by calculating sensitivity, specificity, accuracy, and reproducibility of chest CT to detect abnormality. Result: The reproducibilities between chest CT and histopathologic findings were 0.32 (p<0.01) for primary tumor (T), 0.36 (p<0.01) for lymph node invasion (N), and 0.62 (p<0.01) for distant metastasis (M). The reproducibilities between chest CT and histopathologic findings for lymph node invasion (N) and distant metastasis (M) were superior to that of primary tumor (T). The accuracy of primary tumor (T) was 65.8% and 98.2% in group III and IV, which was significantly higher than that of group I and II (78.9% and 62.3%). In general, specificity of chest CT for TNM staging was superior to sensitivity. Conclusion: In conclusion, preoperative CT scanning can provide important information on lymph node invasion and metastasis of lesion than primary tumor invasion.

The Signaling Effect of Stock Repurchase on Equity Offerings in Korea (자기주식매입의 유상증자에 대한 신호효과)

  • Park, Young-Kyu
    • The Korean Journal of Financial Management
    • /
    • v.25 no.1
    • /
    • pp.51-84
    • /
    • 2008
  • We investigate the signaling effect of repurchase preceding new equity issue using Korean data. In a short time span, firms announce stock repurchases and equity offerings. The proximity of two events in Korean firms indicates that those are not independent of each other. In this paper, we test the signaling effect of repurchase on equity offerings on the two measures. One is announcement effect, which is measured as CAR(0, +2). The other is the effectiveness which is measured as CAR(0, +30) because the price movement during this window influences on the price of new issues. Previous studies that stock repurchase convey positive signal to equity offerings-Billet and Xue(2004) and Jung(2004)-construct sample without the limit of time interval between two events. This causes the unclear relation between those because of the long time interval. In this study we consider only samples of being within one year each other to reduce this problem and clarify the signal of repurchase on equity offerings. Korean firms are allowed to repurchase own shares with two different method. One is direct repurchase as same as open market repurchase. The other is stock stabilization fund and stock trust fund which trust company or bank buy and sell their shares on the behalf of firms. Generally, the striking different characteristic between direct repurchase and indirect repurchase is following. Direct repurchase is applied by more strict regulation than indirect repurchase. Therefore, the direct repurchase is more informative signal to the equity offering than the indirect repurchase. We construct two sample firms- firms with direct repurchase preceding-equity offerings and indirect repurchase-preceding equity offering, and one control firms-equity offerings only firms-to investigate the announcement effect and the effectiveness of repurchases. Our findings are as follows. Direct repurchase favorably affect the price of new issues favorably. CAR(0, +2) of firms with direct repurchase is not different from that of equity offerings only firms but CAR(0, +30) is higher than that of equity offerings only firms. For firms with indirect repurchase and equity offerings, Both the announcement effect and the effectiveness does not exist. Jung(2004) suggest the possibilities of how indirect stock repurchase can be regarded as one of unfair trading practices on based on the survey results that financial managers of some of KSE listed firms have been asked of their opinion on the likelihood of the stock repurchase being used in unfair trading. This is not objective empirical evidence but opinion of financial managers. To investigate whether firms announce false signal before equity offerings to boost the price of new issues, we calculate the long-run performance following equity offerings. If firms have announced repurchase to boost the price of new issues intentionally, they would undergo the severe underperformance. The empirical results do not show the severer underperformance of both sample firms than equity offerings only firms. The suggestion of false signaling of repurchase preceding equity offerings is not supported by our evidence.

  • PDF

The Differentiation of Benign from Maligant Soft Tissue Lesions using FDG-PET: Comparison between Semi-quantitative Indices (FDG-PET을 이용한 악성과 양성 연부조직 병변의 감별: 반정량적 지표간의 비교)

  • Choi, Joon-Young;Lee, Kyung-Han;Choe, Yearn-Seong;Choi, Yong;Kim, Sang-Eun;Seo, Jai-Gon;Kim, Byung-Tae
    • The Korean Journal of Nuclear Medicine
    • /
    • v.31 no.1
    • /
    • pp.90-101
    • /
    • 1997
  • The purpose of this study is to evaluate the diagnostic accuracy of various quantitative indices for the differentiation of benign from malignant primary soft tissue tumors by FDG-PET. A series of 32 patients with a variety of histologically or clinically confirmed benign (20) or malignant (12) soft tissue lesions were evaluated with emission whole body (5min/bed position) PET after injection of [$^{18}F$]FDG. Regional 20min transmission scan for the attenuation correction and calculation of SUV was performed in 16 patients (10 benign, 6malignant) followed by dynamic acquisition for 56min. Postinjection transmission scan for the attenuation correction and calculation of SUV was executed in the other 16 patients (10 benign, 6 malignant). The following indices were obtained. the peak and average SUV (pSUV, aSUV) of lesions, tumor-to-background ratio acquired at images of 51 min p.i. ($TBR_{51}$), tumor-to-background ratio of areas under time-activity curves ($TBR_{area}$) and the ratio between the activities of tumor ROI at 51 min p. i. and at the time which background ROI reaches maximum activity on the time-activity curves ($T_{51}/T_{max}$). The pSUV, aSUV, $TBR_{51}$, and $TBR_{area}$ in malignant lesions were significantly higher than those in benign lesions. We set the cut-off values of pSUV, aSUV, $TBR_{51},\;TBR_{area}$ and $T_{51}/T_{max}$ for the differentiation of benign and malignant lesions at 3.5, 2.8, 5.1, 4.3 and 1.55, respectively. The sensitivity, specificity and accuracy were 91.7%, 80.0%, 84.4% by pSUV and aSUV, 83.3%, 85.0%, 84.4% by $TBR_{51}$, 83.3%, 100%, 93.8% by $TBR_{area}$ and 66.7%, 70.0%, 68.8% by $T_{51}/T_{max}$. The time-activity curves did not give additional information compared to SUV or TBR. The one false negative was a case with low-grade fibrosarcoma and all four false positives were cases with inflammatory change on histology. The visual, analysis of FDG-PET also detected the metastatic lesions in malignant cases with comparable accuracy In conclusion, all pSUV, aSUV, $TBR_{51}$, and $TBR_{area}$ are useful metabolic semi-quantitative indices with good accuracy for the differentiation of benign from malignant soft-tissue lesions.

  • PDF

Geo-surface Environmental Changes and Reclaimed Amount Prediction Using Remote Sensing and Geographic Information System in the Siwha Area (원격탐사와 지리정보시스템을 이용한 시화지구 일대의 지표환경변화와 토공량 예측연구)

  • Yang, So-Yeon;Song, Moo-Young;Hwang, Jeong
    • The Journal of Engineering Geology
    • /
    • v.9 no.2
    • /
    • pp.161-176
    • /
    • 1999
  • The objectives of this study are to analyze the changes of geo-surface topography in the Siwha embankment and the Ahsan city area by the image processing of Landsat Thematic Mapper data, and to estimate the reclaimed amount of the exposed tidal flat in the Siwha area using the GIS. False color composite, Tasseled cap, NVDI(normalized difference vegetation index), and supervised classification techniques were used to analyze the distribution of sediments and the aspect of topographical variations caused by artificial human actions. The total amount of the exposed tidal flat was estimated on the basis of the database snch as aerial photography, hydrographic chart, geological map, and scheme drawing in the Siwha area. The possible excavation regions for a seawall were predicted analyzing the supervised classification image of Landsat TM data. Tasseled cap images were used to observe the distribution of sediments. The difference of the NDVI images between spring and summer seasons indicates that deciduous and coniferous forests were distributed over the whole areas. The total fill-volume of the exposed Siwha tidal flat and the fill-volume of the construction planning seawall were calculated as $581,485,354\textrm{m}^3{\;}and{\;}3,387,360\textrm{m}^3$, respectively, from the digital terrain analysis. Daebu Island, Sunkam Island, and the part of Songsan-myeon were chosen as the cut area to make the seawall, and their cut-volumes were estimated as $5,229,576\textrm{m}^3,{\;}79,227,072\textrm{m}^3,{\;}and{\;}47,026,008\textrm{m}^3$, respectively. Therefore, the cut-volume of Daebu Island alone among three areas was sufficient to make the seawall.

  • PDF

A Study on the Critical Success Factors of Social Commerce through the Analysis of the Perception Gap between the Service Providers and the Users: Focused on Ticket Monster in Korea (서비스제공자와 사용자의 인식차이 분석을 통한 소셜커머스 핵심성공요인에 대한 연구: 한국의 티켓몬스터 중심으로)

  • Kim, Il Jung;Lee, Dae Chul;Lim, Gyoo Gun
    • Asia pacific journal of information systems
    • /
    • v.24 no.2
    • /
    • pp.211-232
    • /
    • 2014
  • Recently, there is a growing interest toward social commerce using SNS(Social Networking Service), and the size of its market is also expanding due to popularization of smart phones, tablet PCs and other smart devices. Accordingly, various studies have been attempted but it is shown that most of the previous studies have been conducted from perspectives of the users. The purpose of this study is to derive user-centered CSF(Critical Success Factor) of social commerce from the previous studies and analyze the CSF perception gap between social commerce service providers and users. The CSF perception gap between two groups shows that there is a difference between ideal images the service providers hope for and the actual image the service users have on social commerce companies. This study provides effective improvement directions for social commerce companies by presenting current business problems and its solution plans. For this, This study selected Korea's representative social commerce business Ticket Monster, which is dominant in sales and staff size together with its excellent funding power through M&A by stock exchange with the US social commerce business Living Social with Amazon.com as a shareholder in August, 2011, as a target group of social commerce service provider. we have gathered questionnaires from both service providers and the users from October 22, 2012 until October 31, 2012 to conduct an empirical analysis. We surveyed 160 service providers of Ticket Monster We also surveyed 160 social commerce users who have experienced in using Ticket Monster service. Out of 320 surveys, 20 questionaries which were unfit or undependable were discarded. Consequently the remaining 300(service provider 150, user 150)were used for this empirical study. The statistics were analyzed using SPSS 12.0. Implications of the empirical analysis result of this study are as follows: First of all, There are order differences in the importance of social commerce CSF between two groups. While service providers regard Price Economic as the most important CSF influencing purchasing intention, the users regard 'Trust' as the most important CSF influencing purchasing intention. This means that the service providers have to utilize the unique strong point of social commerce which make the customers be trusted rathe than just focusing on selling product at a discounted price. It means that service Providers need to enhance effective communication skills by using SNS and play a vital role as a trusted adviser who provides curation services and explains the value of products through information filtering. Also, they need to pay attention to preventing consumer damages from deceptive and false advertising. service providers have to create the detailed reward system in case of a consumer damages caused by above problems. It can make strong ties with customers. Second, both service providers and users tend to consider that social commerce CSF influencing purchasing intention are Price Economic, Utility, Trust, and Word of Mouth Effect. Accordingly, it can be learned that users are expecting the benefit from the aspect of prices and economy when using social commerce, and service providers should be able to suggest the individualized discount benefit through diverse methods using social network service. Looking into it from the aspect of usefulness, service providers are required to get users to be cognizant of time-saving, efficiency, and convenience when they are using social commerce. Therefore, it is necessary to increase the usefulness of social commerce through the introduction of a new management strategy, such as intensification of search engine of the Website, facilitation in payment through shopping basket, and package distribution. Trust, as mentioned before, is the most important variable in consumers' mind, so it should definitely be managed for sustainable management. If the trust in social commerce should fall due to consumers' damage case due to false and puffery advertising forgeries, it could have a negative influence on the image of the social commerce industry in general. Instead of advertising with famous celebrities and using a bombastic amount of money on marketing expenses, the social commerce industry should be able to use the word of mouth effect between users by making use of the social network service, the major marketing method of initial social commerce. The word of mouth effect occurring from consumers' spontaneous self-marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers; in this context, the word of mouth effect should be managed as the CSF of social commerce. Third, Trade safety was not derived as one of the CSF. Recently, with e-commerce like social commerce and Internet shopping increasing in a variety of methods, the importance of trade safety on the Internet also increases, but in this study result, trade safety wasn't evaluated as CSF of social commerce by both groups. This study judges that it's because both service provider groups and user group are perceiving that there is a reliable PG(Payment Gateway) which acts for e-payment of Internet transaction. Accordingly, it is understood that both two groups feel that social commerce can have a corporate identity by website and differentiation in products and services in sales, but don't feel a big difference by business in case of e-payment system. In other words, trade safety should be perceived as natural, basic universal service. Fourth, it's necessary that service providers should intensify the communication with users by making use of social network service which is the major marketing method of social commerce and should be able to use the word of mouth effect between users. The word of mouth effect occurring from consumers' spontaneous self- marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers. in this context, it is judged that the word of mouth effect should be managed as CSF of social commerce. In this paper, the characteristics of social commerce are limited as five independent variables, however, if an additional study is proceeded with more various independent variables, more in-depth study results will be derived. In addition, this research targets social commerce service providers and the users, however, in the consideration of the fact that social commerce is a two-sided market, drawing CSF through an analysis of perception gap between social commerce service providers and its advertisement clients would be worth to be dealt with in a follow-up study.