KSII Transactions on Internet and Information Systems (TIIS)
/
v.16
no.10
/
pp.3438-3457
/
2022
As location-based services (LBS) are widely used in vehicular ad-hoc networks (VANETs), location privacy has become an utmost concern. Spatial cloaking is a popular location privacy protection approach, which uses a cloaking area containing k-1 collaborative vehicles (CVs) to replace the real location of the requested vehicle (RV). However, all CVs are assumed as honest in k-anonymity, and thus giving opportunities for dishonest CVs to submit false location information during the cloaking area construction. Attackers could exploit dishonest CVs' false location information to speculate the real location of RV. To suppress this threat, an edge-assisted Trusted Collaborative Anonymity construction scheme called TCA is proposed with trust mechanism. From the design idea of trusted observations within variable radius r, the trust value is not only utilized to select honest CVs to construct a cloaking area by restricting r's search range but also used to verify false location information from dishonest CVs. In order to obtain the variable radius r of searching CVs, a multiple linear regression model is established based on the privacy level and service quality of RV. By using the above approaches, the trust relationship among vehicles can be predicted, and the most suitable CVs can be selected according to RV's preference, so as to construct the trusted cloaking area. Moreover, to deal with the massive trust value calculation brought by large quantities of LBS requests, edge computing is employed during the trust evaluation. The performance analysis indicates that the malicious response of TCA is only 22% of the collaborative anonymity construction scheme without trust mechanism, and the location privacy leakage is about 32% of the traditional Enhanced Location Privacy Preserving (ELPP) scheme.
Cho, Sung Kyum;LoCascio, Sarah Prusoff;Kim, Sungjoong
Asian Journal for Public Opinion Research
/
v.9
no.2
/
pp.188-211
/
2021
Decreasing response rates to traditional survey methods, like face-to-face and telephone interviews, have led survey practitioners around the world to seek new ways of conducting surveys in recent years." The COVID-19 pandemic exacerbated this problem because it made conducting face-to-face interviews even more difficult than before. For example, it made conducting face-to-face surveys infeasible in 2020 in South Korea, and so the Korean Academic Multimode Open Survey (KAMOS) was unable to conduct a planned face-to-face survey to recruit new panel members. The entire 8,514-member panel, established via two-stage probability-based sampling from 2016 to 2019, was invited to take three online/telephone surveys in 2020. Of these panel members, 1,352 responded to at least one survey in 2020. To test to what extent the panel remained representative of the adult South Korean population, we compared the two groups of panel members: those who responded to at least one survey in 2020 and those who did not. After weighting both groups on the basis of age, sex, and geographical area, we analyzed their responses to some of the questions that were asked during multiple rounds of the face-to-face panel-recruiting interviews. Using Cohen's d for survey items that could be analyzed numerically and Cramér's V for categorical items, we were able to conclude that the respondents to the 2020 surveys were equivalent to the non-respondents in terms of both demographics and in the answers they originally gave to substantive questions on a variety of topics related to social science or public opinion research, including questions about quality of life, societal issue, and politics (Cohen's d items <0.2, 95% CI; Cramér's V items <0.1, 95% CI). This analysis may provide a model for others who wish to test the continued representativeness of their panel or who would like to use a different survey mode or change some other aspect of their methodology and test whether it is equivalent to their former methodology. Our success in building a panel that retained its representativeness may be useful to those in other countries where face-to-face surveys had previously been the norm but are becoming increasingly difficult to conduct.
This study studies the effect of social welfare service quality on facility reuse for users of social welfare facilities. The purpose of this study is to study the effect of the parallel triple mediation effect of facility image user loyalty and facility satisfaction. To this end 219 users of social welfare facilities were analyzed using SPSS 23.0 for Windows and Process macro. As a result, first the variables of service quality facility image user loyalty facility satisfaction and facility reuse all formed significant positive relationships. Second facility image user loyalty and facility satisfaction had multiple mediating effects. This study presented a new model using multivariate in response to social welfare facilities in pandemic situations.
Guaranteeing the quality and integrity of structural health monitoring (SHM) data is very important for an effective assessment of structural condition. However, sensory system may malfunction due to sensor fault or harsh operational environment, resulting in multiple types of data anomaly existing in the measured data. Efficiently and automatically identifying anomalies from the vast amounts of measured data is significant for assessing the structural conditions and early warning for structural failure in SHM. The major challenges of current automated data anomaly detection methods are the imbalance of dataset categories. In terms of the feature of actual anomalous data, this paper proposes a data anomaly detection method based on data-level and deep learning technique for SHM of civil engineering structures. The proposed method consists of a data balancing phase to prepare a comprehensive training dataset based on data-level technique, and an anomaly detection phase based on a sophisticatedly designed network. The advanced densely connected convolutional network (DenseNet) and Transformer encoder are embedded in the specific network to facilitate extraction of both detail and global features of response data, and to establish the mapping between the highest level of abstractive features and data anomaly class. Numerical studies on a steel frame model are conducted to evaluate the performance and noise immunity of using the proposed network for data anomaly detection. The applicability of the proposed method for data anomaly classification is validated with the measured data of a practical supertall structure. The proposed method presents a remarkable performance on data anomaly detection, which reaches a 95.7% overall accuracy with practical engineering structural monitoring data, which demonstrates the effectiveness of data balancing and the robust classification capability of the proposed network.
Fu-Li Chen;Peter Y. Chen;Chi-Chen Chen;Tao-Hsin Tung
Safety and Health at Work
/
v.13
no.4
/
pp.394-400
/
2022
Background: Impacts of exposure are generally monitored and recorded after injuries or illness occur. Yet, absence of conventional after-the-effect impacts (i.e., lagging indicators), tend to focus on physical health and injuries, and fail to inform if workers are not exposed to safety and health hazards. In contrast to lagging indicators, leading indicators are proactive, preventive, and predictive indexes that offer insights how effective safety and health. The present study is to validate an extended Voluntary Protection Programs (VPP) that consists of six leading indicators. Methods: Questionnaires were distributed to 13 organizations (response rate = 93.1%, 1,439 responses) in Taiwan. Cronbach α, multiple linear regression and canonical correlation were used to test the reliability of the extended Voluntary Protection Programs (VPP) which consists of six leading indicators (safe climate, transformational leadership, organizational justice, organizational support, hazard prevention and control, and training). Criteria-related validation strategy was applied to examine relationships of six leading indicators with six criteria (perceived health, burnout, depression, job satisfaction, job performance, and life satisfaction). Results: The results showed that the Cronbach's α of six leading indicators ranged from 0.87 to 0.92. The canonical correlation analysis indicated a positive correlation between the six leading indicators and criteria (1st canonical function: correlation = 0.647, square correlation = 0.419, p < 0.001). Conclusions: The present study validates the extended VPP framework that focuses on promoting safety and physical and mental health. Results further provides applications of the extended VPP framework to promote workers' safety and health.
Within the discipline of International Relations (IR), the literatures on global governance (GG) and great power management (GPM) at best ignore each other, and at worst treat the other as a rival or enemy. On the one hand, the GPM literature, like both realism in all its forms, and neoliberalism, takes for granted the ongoing, disproportionate influence of the great powers in the management of the international system/society, and does not look much beyond that. On the other hand, the GG literature emphasizes the roles of smaller states, non-state actors and intergovernmental organizations (IGOs), and tends to see great powers more as part of the problem than as part of the solution. This paper argues that the rise to prominence of a non-traditional security agenda, and particularly of human security, has triggered a de facto merger of GPM and GG that the IR literature usually treated as separate and often opposed theories. We use the Ebola crisis of 2014-15 to show how an issue framed as human security brought about a multi-actor response that combined the key elements of GPM and GG. The security framing overrode many of the usual inhibitions between great powers and non-state actors in humanitarian crises, including even the involvement of great power military forces. Through examining broadly the way in which the Ebola crisis is tackled, we argue that in an age of growing human security challenges, GPM and GG are necessarily and fruitfully merging. The role of great powers in this new human security environment is moving away from the simple means and ends of traditional GPM. Now, great powers require the ability to cooperate and coordinate with multiple-level actors to make the GG/GPM nexus more effective and sustainable. In doing so they can both provide crucial resources quickly, and earn respect and status as responsible great powers. IGOs provide legitimation and coordination to the GPM/GG package, and non-state actors (NSAs) provide information, specialist knowledge and personnel, and links into public engagement. In this way, the unique features of the Ebola crisis provide a model for how the merger of GPM and GG might be taken forward on other shared-fate threats facing global international society.
BACKGROUND/OBJECTIVES: Sustainability has become one of the top priorities in the foodservice industry. With an increase in consumer interest in sustainability and educational opportunities in higher education, it is important to know what sustainable practices are implemented in campus dining and how sustainable practices affect consumers' responses. This study aims to identify the key sustainable practices in the campus dining context, and investigate the relationship by applying the stimulus-organism-response framework to determine whether the key sustainable practices influence consumers' perception and behavioral intentions. SUBJECTS/METHODS: The self-administered online survey was distributed to college students in 8 dining halls at a large southeastern university in the United States from September 20-October 10, 2019. A total of 382 valid questionnaires were collected, and factor analysis and multiple regressions were utilized to test the research model. RESULTS: This study identified 4 dimensions of campus sustainability with a total of sustainable practices: sustainable food, waste management, energy/water conservation, and recycling/reuse. Three dimensions of sustainable campus practices (i.e., sustainable food, waste management, recycling/reuse) played a significant role in consumers forming a perceived value while energy/water conservation did not significantly influence the consumers' perceived value toward the campus dining. Waste management was identified as the most important practice to enhance consumers' perceived value (β = 0.330). Using sustainable food and recycling/reuse were ranked second and third, respectively (β = 0.262, β = 0.154). The findings confirmed the significant positive relationship between perceived value and revisit intentions. CONCLUSIONS: The findings support the inclusion of dining sustainability as a critical component in explaining college students' perceived value and revisit intention toward campus dining. Furthermore, this study provides practical implications for university administrators and foodservice operators to consider the key sustainable practices to meet the consumers' value and revisit intentions.
The Transactions of the Korea Information Processing Society
/
v.13
no.2
/
pp.76-90
/
2024
Although artificial intelligence (AI) can be utilized in various domains such as smart city, healthcare, it is limited due to concerns about the exposure of personal and sensitive information. In response, the concept of distributed machine learning has emerged, wherein learning occurs locally before training a global model, mitigating the concentration of data on a central server. However, overall learning phase in a collaborative way among multiple participants poses threats to data privacy. In this paper, we systematically analyzes recent trends in privacy protection within the realm of distributed machine learning, considering factors such as the presence of a central server, distribution environment of the training datasets, and performance variations among participants. In particular, we focus on key distributed machine learning techniques, including horizontal federated learning, vertical federated learning, and swarm learning. We examine privacy protection mechanisms within these techniques and explores potential directions for future research.
Importance: Experimental autoimmune encephalomyelitis (EAE) is an animal model of multiple sclerosis characterized by inflammation within the central nervous system. However, inflammation in non-neuronal tissues, including the lungs, has not been fully evaluated. Objective: This study evaluated the inflammatory response in lungs of EAE mice by immunohistochemistry and histochemistry. Methods: Eight adult C57BL/6 mice were injected with myelin oligodendrocyte glycoprotein35-55 to induce the EAE. Lungs and spinal cords were sampled from the experimental mice at the time of sacrifice and used for the western blotting, histochemistry, and immunohistochemistry. Results: Histopathological examination revealed inflammatory lesions in the lungs of EAE mice, characterized by infiltration of myeloperoxidase (MPO)- and galectin-3-positive cells, as determined by immunohistochemistry. Increased numbers of collagen fibers in the lungs of EAE mice were confirmed by histopathological analysis. Western blotting revealed significantly elevated level of osteopontin (OPN), cluster of differentiation 44 (CD44), MPO and galectin-3 in the lungs of EAE mice compared with normal controls (p < 0.05). Immunohistochemical analysis revealed both OPN and CD44 in ionized calcium-binding adapter molecule 1-positive macrophages within the lungs of EAE mice. Conclusions and Relevance: Taken together, these findings suggest that the increased OPN level in lungs of EAE mice led to inflammation; concurrent increases in proinflammatory factors (OPN and galectin-3) caused pulmonary impairment.
We tested how adjuvants effect in a cancer vaccine model using an epitope derived from an autoactivation loop of membrane-type protease serine protease 14 (PRSS14; loop metavaccine) in mouse mammary tumor virus (MMTV)-polyoma middle tumor-antigen (PyMT) system and in 2 other orthotopic mouse systems. Earlier, we reported that loop metavaccine effectively prevented progression and metastasis regardless of adjuvant types and TH types of hosts in tail-vein injection systems. However, the loop metavaccine with Freund's complete adjuvant (CFA) reduced cancer progression and metastasis while that with alum, to our surprise, were adversely affected in 3 tumor bearing mouse models. The amounts of loop peptide specific antibodies inversely correlated with tumor burden and metastasis, meanwhile both TH1 and TH2 isotypes were present regardless of host type and adjuvant. Tumor infiltrating myeloid cells such as eosinophil, monocyte, and neutrophil were asymmetrically distributed among 2 adjuvant groups with loop metavaccine. Systemic expression profiling using the lymph nodes of the differentially immunized MMTV-PyMT mouse revealed that adjuvant types, as well as loop metavaccine can change the immune signatures. Specifically, loop metavaccine itself induces TH2 and TH17 responses but reduces TH1 and Treg responses regardless of adjuvant type, whereas CFA but not alum increased follicular TH response. Among the myeloid signatures, eosinophil was most distinct between CFA and alum. Survival analysis of breast cancer patients showed that eosinophil chemokines can be useful prognostic factors in PRSS14 positive patients. Based on these observations, we concluded that multiple immune parameters are to be considered when applying a vaccine strategy to cancer patients.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.