• 제목/요약/키워드: Information Use Environments

검색결과 1,191건 처리시간 0.03초

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

Implementaion and Use of a COM Component for Distribution Number Generation

  • 오창혁;정석인;이미라
    • Journal of the Korean Data and Information Science Society
    • /
    • 제13권1호
    • /
    • pp.17-23
    • /
    • 2002
  • Microsoft's component technology, COM, is introduced and a COM object for generating distribution numbers is implement ed. Examples using the object in various language environments are given. A strategy for statistical software development using components is discussed.

  • PDF

무선 센서 네트워크망에서의 효율적인 키 관리 프로토콜 분석 (Analyses of Key Management Protocol for Wireless Sensor Networks in Wireless Sensor Networks)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2005년도 추계종합학술대회
    • /
    • pp.799-802
    • /
    • 2005
  • In this paper, we analyses of Key Management Protocol for Wireless Sensor Networks in Wireless Sensor Networks. Wireless sensor networks have a wide spectrum of civil military application that call for security, target surveillance in hostile environments. Typical sensors possess limited computation, energy, and memory resources; therefore the use of vastly resource consuming security mechanism is not possible. In this paper, we propose a cryptography key management protocol, which is based on identity based symmetric keying.

  • PDF

과학적 탐구학습을 지원하는 가상현실 시스템 개발에 관한 연구 (The Development of the Virtual Reality System for Augmenting Scientific Inquiry Learning Environments)

  • 임재원;김석환;조용주;박경신
    • 정보처리학회논문지B
    • /
    • 제15B권2호
    • /
    • pp.95-102
    • /
    • 2008
  • 상호작용적인 가상현실 기술은 실제 환경의 제약을 극복할 수 있으며 사용자에게 흥미와 적극적인 참여를 유도하여 과학적 탐구학습에도 적극 활용되고 있다. 그러나 기존 연구에서는 주로 특정 교안에 대한 응용 프로그램의 개발에 중점을 두고 있어서 다른 교안을 위한 탐구학습가상환경 개발에 쉽게 활용하기 어려웠다. 이에 본 연구에서는 과학적 탐구학습 가상환경의 개발을 도와주는 통합적인 가상현실 시스템 SASILE (System for Augmenting Scientific Inquiry Learning Environments)을 개발하였다. 본 논문에서는 먼저 가상현실을 활용한 과학적 탐구학습 관련 연구를 살펴보고, 제안하는 시스템의 구조와 구현에 대해서 설명한다. 그리고 이 시스템을 이용하여 가상현실 모양성에서 한옥에 나타난 대류현상에 대한 과학적 탐구학습 환경 개발 사례와 가상환경 화성 암석의 성분을 측정하여 운석이 떨어진 곳을 찾는 화성 탐사 개발사례를 설명한다. 마지막으로 이 시스템의 향후 연구 방향에 대해 논한다.

Euclidian Distance Minimization of Probability Density Functions for Blind Equalization

  • Kim, Nam-Yong
    • Journal of Communications and Networks
    • /
    • 제12권5호
    • /
    • pp.399-405
    • /
    • 2010
  • Blind equalization techniques have been used in broadcast and multipoint communications. In this paper, two criteria of minimizing Euclidian distance between two probability density functions (PDFs) for adaptive blind equalizers are presented. For PDF calculation, Parzen window estimator is used. One criterion is to use a set of randomly generated desired symbols at the receiver so that PDF of the generated symbols matches that of the transmitted symbols. The second method is to use a set of Dirac delta functions in place of the PDF of the transmitted symbols. From the simulation results, the proposed methods significantly outperform the constant modulus algorithm in multipath channel environments.

역공학을 이용한 소프트웨어 재사용 시스템에 관한 연구 (A study on Software Reuse System Using Reverse Engineering)

  • 최은만
    • 한국정보처리학회논문지
    • /
    • 제4권1호
    • /
    • pp.97-106
    • /
    • 1997
  • 소프트웨어 재 사용 기법은 기존의 시스템을 개발하는데 사용된 다양한 형태의 정보와 지식을 다른 시스템 개발에 재적용함으로써 생산성을 향상할 수 있고 유지보 수를 쉽게 할 수 있다. 본 논문에서는 C 및 C++로 개발된 원시 코드를 대상으로 역공 학을 이용하여 재사용 가능한 부품을 수출하고 이 부품을 저장 및 검색, 합성하여 사 용할 수 있는 재사용 시스템 CSORUS(C and C++ SOurce ReUse System)를 설계 및 구현 하였다. 역공학을 이용하여 재사용 부품을 구축할 경우 실무 분야에서 적용되어 검증 받은 신뢰도가 높은 부품이므로 재사용 부품의 신뢰도와 새로운 시스템의 유지보수를 쉽게 할 수 있다면 장점이 있다.

  • PDF

하둡 분산 환경 기반 프라이버시 보호 빅 데이터 배포 시스템 개발 (Development of a Privacy-Preserving Big Data Publishing System in Hadoop Distributed Computing Environments)

  • 김대호;김종욱
    • 한국멀티미디어학회논문지
    • /
    • 제20권11호
    • /
    • pp.1785-1792
    • /
    • 2017
  • Generally, big data contains sensitive information about individuals, and thus directly releasing it for public use may violate existing privacy requirements. Therefore, privacy-preserving data publishing (PPDP) has been actively researched to share big data containing personal information for public use, while protecting the privacy of individuals with minimal data modification. Recently, with increasing demand for big data sharing in various area, there is also a growing interest in the development of software which supports a privacy-preserving data publishing. Thus, in this paper, we develops the system which aims to effectively and efficiently support privacy-preserving data publishing. In particular, the system developed in this paper enables data owners to select the appropriate anonymization level by providing them the information loss matrix. Furthermore, the developed system is able to achieve a high performance in data anonymization by using distributed Hadoop clusters.

A Mixed-Method Approach to Explore the Motivations and Constraints of Kiosks Consumers

  • Taehyee Um;Hyunji Kim;Jumi RHee;Namho Chung
    • Asia pacific journal of information systems
    • /
    • 제32권1호
    • /
    • pp.92-124
    • /
    • 2022
  • Providing services using kiosks is actively carried out between suppliers and consumers. These service processes have recently begun to play a dominant role in transactions. However, previous self-service technology (SST) studies or kiosks have not fully reflected the changing environment surrounding these different technologies. To cover the updated business environments, we combined qualitative and quantitative research methods. Through qualitative research and a review of previous studies, the variables emphasized as motivations and constraints for kiosks use and those that can be newly illuminated were selected for this study. We then applied the variables to the research model to assess their influence. In terms of the motivations for using kiosks, the results suggest that perceived usefulness and compatibility as service quality, forced use, and perceived service providers' efficiency as provider polices, absorptive capacity, and habit as an individual characteristic and social influence as a subjective norm have a significant effect on the attitude toward kiosks. In terms of constraints, difficult to use and need for interaction predicts the attitude toward kiosks. Attitude toward kiosks, perceived behavioral control, and social influence are directly related to the intention to use kiosks. Lastly, intention to use kiosks plays a significant role as an antecedent of revisit intention. Using these empirical results, we propose both academic and practical implications for future kiosks use.

An Extended Multi-Server-Based User Authentication and Key Agreement Scheme with User Anonymity

  • Li, Chun-Ta;Lee, Cheng-Chi;Weng, Chi-Yao;Fan, Chun-I
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권1호
    • /
    • pp.119-131
    • /
    • 2013
  • With the explosive growth of computer networks, many remote service providing servers and multi-server network architecture are provided and it is extremely inconvenient for users to remember numerous different identities and passwords. Therefore, it is important to provide a mechanism for a remote user to use single identity and password to access multi-server network architecture without repetitive registration and various multi-server authentication schemes have been proposed in recent years. Recently, Tsaur et al. proposed an efficient and secure smart card based user authentication and key agreement scheme for multi-server environments. They claimed that their scheme satisfies all of the requirements needed for achieving secure password authentication in multi-server environments and gives the formal proof on the execution of the proposed authenticated key agreement scheme. However, we find that Tsaur et al.'s scheme is still vulnerable to impersonation attack and many logged-in users' attack. We propose an extended scheme that not only removes the aforementioned weaknesses on their scheme but also achieves user anonymity for hiding login user's real identity. Compared with other previous related schemes, our proposed scheme keeps the efficiency and security and is more suitable for the practical applications.

ERP 플랫폼 비교와 인터넷 활용방안 (Comparisn of ERP Platforms and its Utilization to Internet)

  • 서재학;홍계표;남인길
    • 한국산업정보학회논문지
    • /
    • 제4권4호
    • /
    • pp.15-24
    • /
    • 1999
  • 급변하는 시장 경제체제에서 많은 기업들은 경쟁력 유지를 위하여 ERP시스템을 도입 구축하고 있다. 그러나 이들이 구축하여 활용하고 있는 ERP 정보는 그 활용범위가 기업 내에 국한되어 효율성이 떨어진다. 본 논문에서는 클라이언트/서버 환경에서 개발 운용되고 있는 ERP 시스템 구성과 인터넷 적용을 위한 구성요소 및 플랫폼에 대해 비교하고 인터넷환경에서 기업의 판매정보 및 고객정보, 생산능력정보, 재무구조 등을 활용함으로써 영업력 강화와 고객에 대한 신뢰도 향상의 새로운 부가가치 창출을 위한 인터넷활용의 전략적 방안을 제안하였다.

  • PDF