• Title/Summary/Keyword: Information weakness

Search Result 789, Processing Time 0.031 seconds

Possible Continuity and Change of North Korea Though Analysis of, Kim Jong-un's New Year's Message (북한 신년사 분석을 통한 김정은 시대 지속과 변화)

  • Lee, Sung Choon
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.75-87
    • /
    • 2014
  • It may be meaningful that analysis of possible continuity and change of North Korea's Kim Jong-un's ruling in its third year. For this analysis, for the application more rational and statistical analysis methods, this study takes advantage of the new years' messages of Kim Il Sung, Kim Jong Il, and Kim Jong-un. In North Korea, the new years' messages are rare enough to give influence to every field of the North Korea's community and the New Year's message performs tutorial role throughout the whole year. The said messages of Il Sung, Kim Jong Il, and Kim Jong-un regimes have been researched and comprehensively summarized. The summarized New Year's Message by Kim Il Sung, Kim Jong Il, and Kim Jong Un are separated, compared and analyzed by the regime by presentation method, configured information, and others followed by New Year message's characteristics and implications of each North Korean regime that have been investigated. Based on the results of this analysis of Kim Jong-un era, possibility of its continuation and change is forecasted. Above all, for possible continuation of the ruling, sticking to the governing socialist way and military-first politics are presented. For possible causes of change, such the four factors as partial opening to overcome economic problems, the North Korean nuclear issue, influx of the nature of capitalism, and Kim Jung-un's control weakness have been presented. Such the factors of possible change and continuation of the North Korea Kim Jung-un ruling are expected to work as a combination of factors. The issue of continuation and change of North Korea Kim Jong-un's control is a key point for us to solve the issues between North and South Koreas. In the situation that the whole people of South Korea have a national consensus in the effort of gathering the public opinion, it is a high time that we needed to have much flexibility to actively cope with the North Korean issues.

A Design for Realtime Monitoring System and Data Analysis Verification TA to Improve the Manufacturing Process Using HW-SW Integrated Framework (HW-SW 통합 프레임워크를 활용한 제조공정 개선을 위한 실시간 모니터링 시스템과 데이터 분석검증 TA설계)

  • Kim, Jae Chun;Jin, Seon A;Park, Young Hee;Noh, Seong Yeo;Lee, Hyun Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.357-370
    • /
    • 2015
  • Massive data occurred in a manufacturing place is able to fulfill very important roll to improve the manufacturing process. Domestic manufacturing business has been making an multilateral effort to react the change of manufacturing circumstance, but it undergoes many difficulties due to technical weakness. Coatings is a type of paint. It protect products by forming a film layer on the products and assigns various properties to those. The research of coatings is one of the fields studied actively in the polymer industry. The importance of the coatings in various industries is more increased. However, the industry still performs a mixing process in dependence on operator's experiences. In this paper, we propose a design for realtime monitoring system and data analysis verification TA to improve the manufacturing process using HW-SW integrated framework. Analysis results from the proposed framework are able to improve the coatings formulation process by collecting more quantitative reference data for work and providing it to work place. In particular, the framework may reduce the deterioration and loss cost which are caused by absence of a standard data as a accurate formulation criteria. It also may suggest a counterplan regarding errors which can be occurred in the future by deriving a standard calibration equation from the analysis using R and Design of Experiments about an error data generated in the mixing step.

A Study on Security Level-based Authentication for Supporting Multiple Objects in RFID Systems (다중 객체 지원을 위한 RFID 시스템에서 보안 레벨 기반의 인증 기법에 관한 연구)

  • Kim, Ji-Yeon;Jung, Jong-Jin;Jo, Geun-Sik;Lee, Kyoon-Ha
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • RFID systems provide technologies of automatic object identification through wireless communications in invisible ranges and adaptability against various circumstances. These advantages make RFID systems to be applied in various fields of industries and individual life. However, it is difficult to use tags with distinction as tags are increasingly used in life because a tag usually stores only one object identifier in common RFID applications. In addition, RFID systems often make serious violation of privacy caused by various attacks because of their weakness of radio frequency communication. Therefore, information sharing methods among applications are necessary for expansive development of RFID systems. In this paper, we propose efficient RFID scheme. At first, we design a new RFID tag structure which supports many object identifiers of different applications in a tag and allows those applications to access them simultaneously. Secondly, we propose an authentication protocol to support the proposed tag structure. The proposed protocol is designed by considering of robustness against various attacks in low cost RFID systems. Especially, the proposed protocol is focused on efficiency of authentication procedure by considering security levels of applications. In the proposed protocol, each application goes through one of different authentication procedures according to their security levels. Finally, we prove efficiency of th proposed scheme compared with the other schemes through experiments and evaluation.

  • PDF

An Embedded Watermark into Multiple Lower Bitplanes of Digital Image (디지털 영상의 다중 하위 비트플랜에 삽입되는 워터마크)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.6 s.312
    • /
    • pp.101-109
    • /
    • 2006
  • Recently, according to the number of internet in widely use and the development of the related application program, the distribution and use of multimedia content(text, images, video, audio etc.) is very easy. Digital signal may be easily duplicated and the duplicated data can have same quality of original data so that it is difficult to warrant original owner. For the solution of this problem, the protection method of copyright which is encipher and watermarking. Digital watermarking is used to protect IP(Intellectual Property) and authenticate the owner of multimedia content. In this paper, the proposed watermarking algerian embeds watermark into multiple lower bitplanes of digital image. In the proposed algorithm, original and watermark images are decomposed to bitplanes each other and the watermarking operation is executed in the corresponded bitplane. The position of watermark image embedded in each bitplane is used to the watermarking key and executed in multiple lower bitplane which has no an influence on human visual recognition. Thus this algorithm can present watermark image to the multiple inherent patterns and needs small watermarking quantity. In the experiment, the author confirmed that it has high robustness against attacks of JPEG, MEDIAN and PSNR but it is weakness against attacks of NOISE, RNDDIST, ROT, SCALE, SS on spatial domain when a criterion PSNR of watermarked image is 40dB.

MR Imaging of Carpal Tunnel Syndrome : The Usefulness of MRI in Treatment Decisions (수근관 증후군의 자기공명 영상 : 치료 결정의 유용성)

  • Lee, Kyu-Yong;Lee, Young Joo;Kim, Seung Hyun;Song, Hyoung Gon;Kim, Juhan
    • Annals of Clinical Neurophysiology
    • /
    • v.4 no.2
    • /
    • pp.114-118
    • /
    • 2002
  • Backgrounds : Carpal tunnel syndrome (CTS) is a common condition that is usually diagnosed by electrophysiologic studies. However, CTS provide limited information to determine the causes of CTS and to choose the treatment method. We evaluated diagnostic sensitivity of MR imaging and treatment decisions by MR imaging in electrodiagnosed CTS. Methods : 14 patients (26 wrists) with electrodiagnosed CTS were studied using MR imaging. In 26 wrists for which axial T1 & T2 weighted images were obtained at 1.5T with a decided wrist coil. Previously described MR imaging of CTS such as increased median nerve signal, flattening of median nerve, reticular bowing, tenosynovitis and space occupying lesions were retrospectively evaluated. Degree of improvement was evaluated by global symptom score (GSS). The GSS rated symptoms from 0 (no symptoms) to 10 (severe) in each of five categories: pain, numbness, paresthesia, weakness/clumsiness, and nocturnal awakening. Subjects' GSS was recorded at baseline, 2 weeks, 1 month, 6 months after treatment. We decided to medical treatment that showed mainly inflammatory sign such as increased median nerve signal, tenosinovitis and to surgical treatment such as space occupying lesion, high canal pressure sign. Results : MR imaging showed that increased median nerve signal were in 20 wrists (77%), flattening of median nerve were in 6 wrists (23%), reticular bowing were in 3 wrists (12%), tenosynovitis were in 8 wrists (32%), decreased canal size in 2 wrists (7.6%), space occupying lesion were in 1 wrist (4%). A good outcome was revealed in 21 wrists by medical treatment that showed mainly increased median nerve signal, tenosynovitis. The mean GSS were 27.7 at baseline, 11.2 at 2 weeks, 11.0 at 6 months in medical treatment group. Another 5 wrist had surgical treatment shown by ganglion and high canal pressure sign such as median nerve flattening, reticular bowing, decreased canal size: 3 wrists had good prognosis, but 2 wrists (one patient) had no significant improvement due to small carpal tunnel size. Conclusions : Our results are in agreement with most previously described MR imaging signs of CTS. MR imaging plays an important role in several cases and especially in the assessment of failure of surgical treatment. Knowledge of MR findings may permit more rational choice of treatment.

  • PDF

Development of Evaluation Tool on Music Casting Based on Customer Experience (고객경험을 기반으로 한 인터넷 음악 방송 사이트 평가도구의 개발)

  • 박수정;김현정;변진식
    • Archives of design research
    • /
    • v.17 no.2
    • /
    • pp.289-300
    • /
    • 2004
  • Recently, web casting on the internet has been expanding in number and size. Web Casting is different from the conventional television broadcasting since it can transmit various types of information through multimedia and it also can include interaction between users and broadcasting server. User experience by interaction becomes more important. Therefore, it is needed to win over customers by supplying satisfied experience through creative and different services, especially when there are consider competitions among music casting sites. In order to know how to make customers satisfied, we have to try to inspect what real customers in the Web Sites are acting and thinking, namely 'customer experience'. The 'customer experience' means every experience what users are expecting, doing, thinking and feeling when they stay in the Web site and online. In this thesis, the evaluation Guideline for music casting websites is developed by understanding customer experience on the music casting websites. The process of understanding customer experience was implemented through user observation methods, such as web Diary, group interview, and questionnaire. As a result of the study, 67 evaluation Guidelines with weight rate in 6 categories which are searching music, listening music, music video, music broadcasting, music mailing and other contents are developed. It can be used to analyze strengths and weakness of music casting sites and to establish business strategy for the more satisfied customer experience.

  • PDF

Creativity Styles of Elementary Science Gifted Students (초등과학영재들의 창의성 유형 분석)

  • Park, Shin-Gyu;Chung, Won-Woo;Park, Young-Kwan;Hong, Soon-Cheon;Park, Kyung-Me;Kim, Jung-Wook
    • Journal of Gifted/Talented Education
    • /
    • v.21 no.4
    • /
    • pp.885-905
    • /
    • 2011
  • The purpose of this study is to examine creativity styles of elementary science gifted students through the Torrance Tests of Creative Thinking (TTCT). For this study, the TTCT-Figural Form A was used, with data form 206 elementary science gifted students, which included 56 urban students, 115 suburban students, and 35 rural students. Confirmatory factor analyses were conducted to examine a two-factor model of creativity styles based on Kim's (2006). Level of creativity was analyzed on the basis of the creativity styles and the numbers of creativity styles were analyzed according to region, grade, and gender. The results are as follows: Factor innovative was loaded by fluency and originality; factor adaptive loaded by elaboration, abstractness of titles, and creative strength; and both factor innovative and factor adaptive loaded by resistance to premature closure. The percentage of adaptive styles is higher than the innovative styles. Urban had more adaptors than rural. There were more adaptors in 6th grade than 5th grade. Gifted female adaptors had significantly higher creative potential than gifted male adaptors and gifted female innovators also showed higher creative potential than gifted male innovators. Creativity styles can give more information about individuals' strengths and weakness so that do an important role in understanding characteristics of gifted students.

The Development and Validation of a Children's Play Disposition Scale (아동 놀이성향척도 개발 및 타당화 연구)

  • Sung, Jihyun;Byun, Hye-weon;Nam, Ji-hae
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.4
    • /
    • pp.606-620
    • /
    • 2017
  • The purpose of this study was to develop and validate a Children's Play Disposition Scale(CPDS) which could be used to evaluate children's play patterns and preferences. The participants of this study were parents of 437 5-7-year-old children (age range from 51months to 106months). Preliminary items were developed through a review of relevant research, multiple intelligence theory and scales, confirmation of item adequacy and content validity. After the content validity was confirmed by experts, these items were edited down to a final list of 27 items representing 6 factors identified by exploratory factor analysis. The 6 factors of the scale consists of initiative, linguistic activity, logical-mathematical activity, art and craft, physical activity, and sensitivity respectively. Concurrent validity was established by using correlations between each factor of the CPDS and sub-factors and the total scores of Multiple Intelligence Checklist for preschoolers (Multiple Intelligence Institute Co., Ltd, 2008) and Multiple Intelligence Checklist for elementary schoolers (Multiple Intelligence Institute Co., Ltd, 2007). In addition, the reliability of each factor, as measured by Cronbach's ${\alpha}$, ranged from .53 to .79. The CPDS provides the developmental and educational information for strengthening children's developmental forte and for supporting children's developmental weakness. This scale can be used on developing children's play contents and guiding play methods in the future.

English Phoneme Recognition using Segmental-Feature HMM (분절 특징 HMM을 이용한 영어 음소 인식)

  • Yun, Young-Sun
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.3
    • /
    • pp.167-179
    • /
    • 2002
  • In this paper, we propose a new acoustic model for characterizing segmental features and an algorithm based upon a general framework of hidden Markov models (HMMs) in order to compensate the weakness of HMM assumptions. The segmental features are represented as a trajectory of observed vector sequences by a polynomial regression function because the single frame feature cannot represent the temporal dynamics of speech signals effectively. To apply the segmental features to pattern classification, we adopted segmental HMM(SHMM) which is known as the effective method to represent the trend of speech signals. SHMM separates observation probability of the given state into extra- and intra-segmental variations that show the long-term and short-term variabilities, respectively. To consider the segmental characteristics in acoustic model, we present segmental-feature HMM(SFHMM) by modifying the SHMM. The SFHMM therefore represents the external- and internal-variation as the observation probability of the trajectory in a given state and trajectory estimation error for the given segment, respectively. We conducted several experiments on the TIMIT database to establish the effectiveness of the proposed method and the characteristics of the segmental features. From the experimental results, we conclude that the proposed method is valuable, if its number of parameters is greater than that of conventional HMM, in the flexible and informative feature representation and the performance improvement.

A Partial Encryption Method for the Efficiency and the Security Enhancement of Massive Data Transmission in the Cloud Environment (클라우드 환경에서의 대용량 데이터 전송의 효율성과 보안성 강화를 위한 부분 암호화 방법)

  • Jo, Sung-Hwan;Han, Gi-Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.9
    • /
    • pp.397-406
    • /
    • 2017
  • In case of using the existing encrypted algorithm for massive data encryption service under the cloud environment, the problem that requires much time in data encryption come to the fore. To make up for this weakness, a partial encryption method is used generally. However, the existing partial encryption method has a disadvantage that the encrypted data can be inferred due to the remaining area that is not encrypted. This study proposes a partial encryption method of increasing the encryption speed and complying with the security standard in order to solve this demerit. The proposed method consists of 3 processes such as header formation, partial encryption and block shuffle. In step 1 Header formation process, header data necessary for the algorithm are generated. In step 2 Partial encryption process, a part of data is encrypted, using LEA (Lightweight Encryption Algorithm), and all data are transformed with XOR of data in the unencrypted part and the block generated in the encryption process. In step 3 Block shuffle process, the blocks are mixed, using the shuffle data stored with the random arrangement form in the header to carry out encryption by transforming the data into an unrecognizable form. As a result of the implementation of the proposed method, applying it to a mobile device, all the encrypted data were transformed into an unrecognizable form, so the data could not be inferred, and the data could not be restored without the encryption key. It was confirmed that the proposed method could make prompt treatment possible in encrypting mass data since the encryption speed is improved by approximately 273% or so compared to LEA which is Lightweight Encryption Algorithm.