• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.021 seconds

Performance Improvement for Increased Communication Speed in Anonymous Network using GeoIP (GeoIP를 이용한 익명 네트워크에서 통신 속도 향상을 위한 성능 개선)

  • Park, Kwang-Cheol;Lim, Young-Hwan;Lim, Jong-In;Park, Won-Hyung
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.75-85
    • /
    • 2011
  • Although progress in information technology has made our life prosperous. But it accompanied a number of adverse effects in various aspects. Especially, internet according to the increasing requirements for privacy and security, IP concealment network technologies to ensure the anonymity are constantly being developed. IP concealment network technologies is aiding the user to bypass the blocked sites can be used to access for information gathering, and they could be used for a malicious hacker to hide his attacks. However, due to complex routing path, local communication bandwidth sangyiham, and internode encryption there are also disadvantages that communication speed is significantly less. In this paper, the research for improving the performance of anonymous networks is to proceed by the communication speed measurement that using GeoIP the particular country with high-bandwidth is Specified or path length is limited.

Study on the K-scale reflecting the confidence of survey responses (설문 응답에 대한 신뢰도를 반영한 K-척도에 관한 연구)

  • Park, Hye Jung;Pi, Su Young
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.1
    • /
    • pp.41-51
    • /
    • 2013
  • In the Information age, internet addiction has been a big issue in a modern society. The adverse effects of the internet addiction have been increasing at an exponential speed. Along with a great variety of internet-connected device supplies, K-scale diagnostic criteria have been used for the internet addiction self-diagnose tests in the high-speed wireless Internet service, netbooks, and smart phones, etc. The K-scale diagnostic criteria needed to be changed to meet the changing times, and the diagnostic criteria of K-scale was changed in March, 2012. In this paper, we analyze the internet addiction and K-scale features on the actual condition of Gyeongbuk collegiate areas using the revised K-scale diagnostic criteria in 2012. The diagnostic method on internet addiction is measured by the respondents' subjective estimation. Willful error of the respondents can be occurred to hide their truth. In this paper, we add the survey response to the trusted reliability values to reduce response errors on the K-scale on the K-scale, and enhance the reliability of the analysis.

3D Point Clouds Encryption Method and Analysis of Encryption Ratio in Holographic Reconstruction Image (3D 공간정보 암호화 기법과 홀로그래픽 복원영상의 암호화 효율 분석)

  • Choi, Hyun-Jun;Seo, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1703-1710
    • /
    • 2017
  • This paper propose a 3D point clouds (depth) security technique for digital holographic display service. Image contents encryption is a method to provide only authorized right owners with the original image information by encrypting the entire image or a part of the image. The proposed method detected an edge from a depth and performed quad tree decomposition, and then performed encryption. And encrypts the most significant block among the divided blocks. The encryption effect was evaluated numerically and visually. The experimental results showed that encrypting only 0.43% of the entire data was enough to hide the constants of the original depth. By analyzing the encryption amount and the visual characteristics, we verified a relationship between the threshold for detecting an edge-map. As the threshold for detecting an edge increased, the encryption ratio decreased with respect to the encryption amount.

Design of intelligent reporting platform for school violence eradication (학교폭력 근절을 위한 지능형 리포팅 플랫폼 설계)

  • Ryu, Chang-su;Ryu, Kwong-ryol;Hur, Chang-wu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.535-537
    • /
    • 2013
  • Recently, the quality of the incident of school violence is getting worse and the frequency of its occurrence is gradually increasing. One of the biggest reasons that violence in schools does not reduce is because the attitude that they mean to hide damage from the violence, thus the improvement of such conditions enables school violence to decrease in the short-term effect. This study designed an intelligent reporting platform to prevent additional violence and victim's suicide, by related agencies and parents reporting the circumstance of school violence real-time, as both victims and attackers register real-time troubles anonymously, at any time, anywhere, then are provided 1:1 counseling and customized services, and all contents of the counseling are accumulated in the intelligent reporting platform.

  • PDF

A Experimental Study on the Translation from Korean Digital Topographic Maps to Distributed Objects (수치지형도의 객체화 변환에 관한 연구)

  • 황철수
    • Spatial Information Research
    • /
    • v.7 no.2
    • /
    • pp.255-269
    • /
    • 1999
  • This is an experimental study to translate the Korean digital topographic maps into distributable information-hide objects, which are designed with object-oriented development's key features ; encapsulation, polymorphism, inheritance, In order to achieve this goal , the characteristics of the data mode and inter-relationships of digital topographic maps are investigated . As a result, it is revealed that the current Korean digital topographic maps, which is organized into so many individual layers of mixed spatial and attributed data, have to explicit and concrete hierarchies in spatial data model and data definition . Due to this limitation , data layer stage and object class stage are integrated. And ISCO(the is-computer -of relationships) mechanism is mainly used to develop the objects of digital topogrpahic maps, which is implemented with spatial primitive classes. the designed objects are coded with JAVA and then testified in web interface.

  • PDF

Design Characteristics of New Senior Women's Coat (뉴 시니어 여성코트의 디자인 특성)

  • Bae, Siyeon;Lee, Kyoung-Hee
    • Fashion & Textile Research Journal
    • /
    • v.17 no.2
    • /
    • pp.157-167
    • /
    • 2015
  • This study was initiated to understand design and detail characteristics of coats that targeted new senior women by analyzing shape, color, fabric and detail. For the new senior, youthful appearance has more appeal than products that represent elder's style. Among, the coat can be effectively utilized as a trendy fashion item that targets seniors since it is more useful to hide figures than pants, blouses or jackets. The objectives of this research were to: First, examine design characteristics of new senior women's coat. Second, understand design characteristics of new senior women's coat. Third, analyze the relationship between the design of collars and details according to type of new senior women's coat. Photographs collected were categorized according to type of coat. Three types of coat (balmacaan, redingote and trench) were chosen to analyze with the highest frequency. The results of analyzing shape, length, color and fabric of the products made in domestic and foreign brands were similar; however, the collar and way of fastening showed significant results that required specific analysis since the design elements were related to maincoat characteristics in protecting against the cold. The depth of the V-zone can change without change of collar width and design changes in V-zone that influence the coat image that lead to changes in sleeve type and length (or fastening and closing position) method.

A Brute-force Technique for the Stepping Stone Self-Diagnosis of Interactive Services on Linux Servers (리눅스 서버에서 인터렉티브 서비스 Stepping Stone 자가진단을 위한 brute-force 기법)

  • Kang, Koo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.41-51
    • /
    • 2015
  • In order to hide their identities, intruders on the Internet often attack targets indirectly by staging their attacks through intermediate hosts known as stepping stones. In this paper, we propose a brute-force technique to detect the stepping stone behavior on a Linux server where some shell processes remotely logged into using interactive services are trying to connect other hosts using the same interactive services such as Telnet, Secure Shell, and rlogin. The proposed scheme can provide an absolute solution even for the encrypted connections using SSH because it traces the system calls of all processes concerned with the interactive service daemon and their child processes. We also implement the proposed technique on a CentOS 6.5 x86_64 environment by the ptrace system call and a simple shell script using strace utility. Finally the experimental results show that the proposed scheme works perfectly under test scenarios.

A Phenomenological Research on Experiences of Prisoners' Families - Driven into Blame and Survival Situation - (수용자 가족의 경험에 관한 현상학적 연구 - 비난과 생존 사이에서 -)

  • Choi, Kyoung Ok;Lee, Kyung Rim
    • Korean Journal of Social Welfare
    • /
    • v.69 no.2
    • /
    • pp.89-115
    • /
    • 2017
  • This study aims to provide evidence for supporting the families of people in prison, through understanding their families who have suffered for their imprisonment This research was conducted with seven family members with their spouse, son or daughter, or sibling in prison. The Giorigi's approach of analysis for the phenomenological qualitative research was used to explore the essence of the experiences of prisoners' families. This qualitative research drew five components on the basis of the experiences of prisoners' families : 'Living with the bridle named as the family of a prisoner', 'The pain having to hide from the public', 'Having ambivalence', and 'condemn the sin, but no the sinner', 'Picking oneself up'. The essential subjection of their experiences was interpreted into 'Face life, , with being under a yoke'. The findings suggest that the practical intervention of social welfare is needed to support the psychological, emotional, and social recovery of the prisoners' families.

  • PDF

Temporal Variations of Heterotrophic- and Photosynthetic Dinoflagellates at a Single Station in Jangmok Bay in Summer 2003 (2003년 하계 장목만 단일정점에서 종속영양 와편모류와 광합성 와편모류 현존량의 시간적 변화)

  • Lee, Won-Je;Yang, Un-Jin
    • Journal of Environmental Science International
    • /
    • v.19 no.5
    • /
    • pp.607-615
    • /
    • 2010
  • We investigated the temporal variations of heterotrophic dinoflagellates (hereafter HDNF) and photosynthetic dinoflagellates (hereafter PDNF) from 14 June to 4 September 2003 at a single station in Jangmok Bay. We took water samples 47 times from 2 depths (surface and bottom layers) at hide tide. A total of 63 species were encountered and in general the most abundant genera were Prorocentrum and Protoperidinium. The abundance of PDNF and HDNF was in the range of $0.04{\sim}55.8{\times}10^4$ cells/L and in the range of $0.01{\sim}4.35{\times}10^4$ cells/L, respectively. The mean abundance of PDNF was approximately 7 times higher than that of HDNF, and was higher in the surface layer where has enough irradiance for photosynthesis than in the bottom layer. The total dinoflagellate abundance was higher in the NLP (nitrogen limitation period) than in the SLP (silicate limitation period), and the abundance in the hypoxic conditions was similar to that in the normal conditions. The Shannon-Weaver species diversity index were slightly higher in the bottom layer, the SLP and the hypoxic conditions. The PDNF abundance were correlated with temperature, DO, total inorganic nitrogen and phosphate in the whole water column, and the HDNF abundance was significantly correlated with temperature, salinity and DO. This study shows that the dinoflagellate abundance might be affected by abiotic factors such as irradiance, temperature, salinity, DO and the concentrations of inorganic nutrients, and provides baseline information for further studies on plankton dynamics in Jangmok Bay.

Improved Authentication Protocol for Privacy Protection in RFID Systems (프라이버시 보호를 위한 개선된 RFID 인증 프로토콜)

  • Oh, Sejin;Lee, Changhee;Yun, Taejin;Chung, Kyungho;Ahn, Kwangseon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.1
    • /
    • pp.12-18
    • /
    • 2013
  • In 2012, Woosik Bae proposed a DAP3-RS(Design of Authentication Protocol for Privacy Protection in RFID Systems) using the hash function and AES(Advanced Encryption Standard) algorithm to hide Tag's identification and to generates variable data in every session. He argued that the DAP3-RS is safe from spoofing attack, replay attack, traffic analysis and etc. Also, the DAP3-RS resolved problem by fixed metaID of Hash-Lock protocol using AES algorithm. However, unlike his argue, attacker can pass authentication and traffic analysis using by same data and fixed hash value on the wireless. We proposed authentication protocol based on AES algorithm. Also, our protocol is secure and efficient in comparison with the DAP3-RS.