• Title/Summary/Keyword: Online Registration

Search Result 67, Processing Time 0.025 seconds

Fashion Category Oversampling Automation System

  • Minsun Yeu;Do Hyeok Yoo;SuJin Bak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.31-40
    • /
    • 2024
  • In the realm of domestic online fashion platform industry the manual registration of product information by individual business owners leads to inconvenience and reliability issues, especially when dealing with simultaneous registrations of numerous product groups. Moreover, bias is significantly heightened due to the low quality of product images and an imbalance in data quantity. Therefore, this study proposes a ResNet50 model aimed at minimizing data bias through oversampling techniques and conducting multiple classifications for 13 fashion categories. Transfer learning is employed to optimize resource utilization and reduce prolonged learning times. The results indicate improved discrimination of up to 33.4% for data augmentation in classes with insufficient data compared to the basic convolution neural network (CNN) model. The reliability of all outcomes is underscored by precision and affirmed by the recall curve. This study is suggested to advance the development of the domestic online fashion platform industry to a higher echelon.

A Study of Domain Name Disputes Resolution with the Korea-U.S. FTA Agreement (한미자유무역협정(FTA)에 따른 도메인이름 분쟁해결의 개선방안에 관한 연구)

  • Park, Yu-Sun
    • Journal of Arbitration Studies
    • /
    • v.17 no.2
    • /
    • pp.167-187
    • /
    • 2007
  • As Korea has reached a free trade agreement with the United States of America, it is required to provide an appropriate procedure to ".kr" domain name disputes based on the principles established in the Uniform Domain Name Dispute Resolution Policy(UDRP). Currently, Internet address Dispute Resolution Committee(IDRC) established under Article 16 of the Act on Internet Address Resources provides the dispute resolution proceedings to resolve ".kr" domain name disputes. While the IDRC's proceeding is similar to the UDRP administrative proceeding in procedural aspects, the Domain Name Dispute Mediation Policy that is established by the IDRC and that applies to disputes involving ".kr" domain names is very different from the UDRP for generic Top Level Domain (gTLD) in substantial aspects. Under the Korea-U.S. Free Trade Agreement(KORUS FTA), it is expected that either the Domain Name Dispute Mediation Policy to be amended to adopt the UDRP or the IDRC to examine the Domain Name Dispute Mediation Policy in order to harmonize it with the principles established in the UDRP. It is a common practice of cybersquatters to warehouse a number of domain names without any active use of these domain names after their registration. The Domain Name Dispute Mediation Policy provides that the complainant may request to transfer or delete the registration of the disputed domain name if the registrant registered, holds or uses the disputed domain name in bad faith. This provision lifts the complainant's burden of proof to show the respondent's bad faith because the complainant is only required to prove one of the three bad faiths which are registration in bad faith, holding in bad faith, or use in bad faith. The aforementioned resolution procedure is different from the UDRP regime which requires the complainant, in compliance with paragraph 4(b) of the UDRP, to prove that the disputed domain name has been registered in bad faith and is being used in bad faith. Therefore, the complainant carries heavy burden of proof under the UDRP. The IDRC should deny the complaint if the respondent has legitimate rights or interests in the domain names. Under the UDRP, the complainant must show that the respondent has no rights or legitimate interests in the disputed domain name. The UDRP sets out three illustrative circumstances, any one of which if proved by the respondent, shall be evidence of the respondent's rights to or legitimate interests in the domain name. As the Domain Name Dispute Mediation Policy provides only a general provision regarding the respondent's legitimate rights or interests, the respondent can be placed in a very week foundation to be protected under the Policy. It is therefore recommended for the IDRC to adopt the three UDRP circumstances to guide how the respondent can demonstrate his/her legitimate rights or interests in the disputed domain name. In accordance with the KORUS FTA, the Korean Government is required to provide online publication to a reliable and accurate database of contact information concerning domain name registrants. Cybersquatters often provide inaccurate contact information or willfully conceal their identity to avoid objection by trademark owners. It may cause unnecessary and unwarranted delay of the administrative proceedings. The respondent may loss the opportunity to assert his/her rights or legitimate interests in the domain name due to inability to submit the response effectively and timely. The respondent could breach a registration agreement with a registrar which requires the registrant to submit and update accurate contact information. The respondent who is reluctant to disclose his/her contact information on the Internet citing for privacy rights and protection. This is however debatable as the respondent may use the proxy registration service provided by the registrar to protect the respondent's privacy.

  • PDF

Automatic Client Authentication Method in All-In-One Services (올인원 서비스에서 자동적인 고객 인증 기법)

  • Kim, Namyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.1-5
    • /
    • 2016
  • The all-in-one service, for example, mobile wallet enables users to have credit card, membership card, and coupon in one place. It has been one of important o2o services with offline payment. In order to take advantage of mobile commerce, it is necessary to authenticate clients automatically without entering their passwords. This paper proposes an automatic client authentication method in all-in-one service. At registration, clients receives and stores an authentication ticket from a company, which contains an user's identifier and password encrypted by company's symmetric key. Client can be authenticated by transferring authentication tickets to companies at service requests.

A Decentralized Copyright Management Model using Mydata Concept (마이데이터 개념을 활용한 탈중앙화 저작권 관리 모델)

  • Kim, Hyebin;Shin, Weon;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.2
    • /
    • pp.262-273
    • /
    • 2020
  • This paper analyzes the existing copyright management and copyright sharing model and discusses the limitations. It then proposes a consortium Blockchain-based copyright management model in which the service platform participates as a node, and discusses how to combine the My Data concept with Blockchain and smart contracts. Also, Blockchain-based CP-ABE is introduced and applied to the proposed model as a way for users to define access policies and store copyright data in encrypted form on the storage of the online service providers (OSP). Compared with the existing copyright management model, the proposed model allows the copyright holder to focus on copyright registration, license content design, and sharing, as the data subject. And it is expected to be able to transparently manage the usage records and the basis for the settlement of the copyrighted data that are shared and used on each platform.

Many-to-One Encryption and Authentication Scheme and Its Application

  • Lin, Xi-Jun;Wu, Chuan-Kun;Liu, Feng
    • Journal of Communications and Networks
    • /
    • v.10 no.1
    • /
    • pp.18-27
    • /
    • 2008
  • This paper is to study a subclass of group-oriented cryptographic scheme: Many-to-one encryption and authentication scheme. The many-to-one encryption and authentication scheme is to solve a practical problem, i.e., the scenario that the number of the receivers is very small compared with the number of the senders and a receiver may serve millions of senders. Compared with the traditional methods, the burdens of the receiver and the KGC are reduced greatly. How to revoke a sender from his receiver's legitimate sender group is also proposed and it is efficient compared with some traditional methods. The proposed scheme is proven in the random oracle models. The computational complexity of our scheme is independent of the number of the senders. At the end of the paper, an example is given to show how to use our scheme in online software registration and update.

Simple Credit Card Payment Protocols Based on SSL and Passwords (SSL과 패스워드 기반의 신용카드 간편결제 프로토콜)

  • Kim, Seon Beom;Kim, Min Gyu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.563-572
    • /
    • 2016
  • Recently, a plenty of credit card payment protocols have been proposed in Korea. Several features of proposed protocols include: using passwords for user authentication in stead of official certificate for authenticity, and no need to download additional security module via ActiveX into user's devices. In this paper, we suggest two new credit card payment protocols that use both SSL(Security Socket Layer) as a standardized secure transaction protocol and password authentication to perform online shopping and payment. The first one is for the case where online shopping mall is different from PG(Payment Gateway) and can be compared to PayPal-based payment methods, and the second one is for the case where online shopping mall is the same as PG and thus can be compared to Amazon-like methods. Two proposed protocols do not require users to perform any pre-registration process which is separate from an underlying shopping process, instead users can perform both shopping and payment into a single process in a convenient way. Also, users are asked to input a distinct payment password, which increases the level of security in the payment protocols. We believe that two proposed protocols can help readers to better understand the recent payment protocols that are suggested by various vendors, and to analyze the security of their payment protocols.

A Legal Review of Personal Information Protection for Invigorating Online Targeted Advertising: Focusing on the Concept of Personal Information (온라인 맞춤형 광고 활성화를 위한 개인 정보 보호에 대한 법적 고찰: '개인 정보'의 개념을 중심으로)

  • Cho, Jae-Yung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.492-497
    • /
    • 2019
  • This study analysed the legal concept of personal information(PI), which was not differentiated from behavioral information, and established it clearly for invigorating online targeted advertising(OTA), which draw attention in big data era; by selecting Guidelines of Assessment of Data Breach Incident Factors and Guidelines of Measures for No-Identifying Personal Information based on Personal Information Protection Act(PIPA) and Enforcement Decree of the PIPA. As a result, PI was defined as any kind of information relating to (1)a living individual(not group, corporate body or things etc.); (2)makes possibly identify the individual by his or her identifiers such as name, resident registration number, image, etc. (not included if not identify the individual); and (3)including information like attribute values which makes possibly identify any specific individual, if not by itself, but combined with other information which can be actually collected and combined). Specifically, PI includes basic, proper distinguishable, sensitive and other PI. It is suggested that PI concept should be researched continually with digital technology development; the effectiveness of the Guidelines of PI Protection in OTA, the legal principles of PI protection from not only users' but business operators' perspectives and the differentiation between PI and behavioral information in OTA should be researched.

Evaluation of the Geometric Accuracy of Anatomic Landmarks as Surrogates for Intrapulmonary Tumors in Image-guided Radiotherapy

  • Li, Hong-Sheng;Kong, Ling-Ling;Zhang, Jian;Li, Bao-Sheng;Chen, Jin-Hu;Zhu, Jian;Liu, Tong-Hai;Yin, Yong
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.13 no.5
    • /
    • pp.2393-2398
    • /
    • 2012
  • Objectives: The purpose of this study was to evaluate the geometric accuracy of thoracic anatomic landmarks as target surrogates of intrapulmonary tumors for manual rigid registration during image-guided radiotherapy (IGRT). Methods: Kilovolt cone-beam computed tomography (CBCT) images acquired during IGRT for 29 lung cancer patients with 33 tumors, including 16 central and 17 peripheral lesions, were analyzed. We selected the "vertebrae", "carina", and "large bronchi" as the candidate surrogates for central targets, and the "vertebrae", "carina", and "ribs" as the candidate surrogates for peripheral lesions. Three to six pairs of small identifiable markers were noted in the tumors for the planning CT and Day 1 CBCT. The accuracy of the candidate surrogates was evaluated by comparing the distances of the corresponding markers after manual rigid matching based on the "tumor" and a particular surrogate. Differences between the surrogates were assessed using 1-way analysis of variance and post hoc least-significant-difference tests. Results: For central targets, the residual errors increased in the following ascending order: "tumor", "bronchi", "carina", and "vertebrae"; there was a significant difference between "tumor" and "vertebrae" (p = 0.010). For peripheral diseases, the residual errors increased in the following ascending order: "tumor", "rib", "vertebrae", and "carina"; There was a significant difference between "tumor" and "carina" (p = 0.005). Conclusions: The "bronchi" and "carina" are the optimal surrogates for central lung targets, while "rib" and "vertebrae" are the optimal surrogates for peripheral lung targets for manual matching of online and planned tumors.

Yearly Update of the List of Plant Diseases in Korea (6.2 Edition, 2024) (한국식물병명목록의 연간 현황 보고(6.2판, 2024년 개정본))

  • Jaehyuk Choi;Seon-Hee Kim;Young-Joon Choi;Gyoung Hee Kim;Ju-Yeon Yoon;Byeong-Yong Park;Hyun Gi Kong;Soonok Kim;Sekeun Park;Chang-Gi Back;Hee-Seong Byun;Jang Kyun Seo;Jun Myoung Yu;Dong-Hyeon Lee;Mi-Hyun Lee;Bong Choon Lee;Seung-Yeol Lee;Seungmo Lim;Yongho Jeon;Jaeyong Chun;Insoo Choi;In-Young Choi;Hyo-Won Choi;Jin Sung Hong;Seung-Beom Hong
    • Research in Plant Disease
    • /
    • v.30 no.2
    • /
    • pp.103-113
    • /
    • 2024
  • Since 2009, the Korean Society of Plant Pathology has established the Committee on Common Names of Plant Disease to systematically review and determine plant disease names and related terminologies. The committee published the 6th edition of the List of Plant Diseases in Korea (LPDK) in 2022, and the list has been made publicly accessible online. The online database has significantly enhanced user accessibility, expedited update processes, and improved interoperability with other databases. As a result, the 6.1 edition of the list was released by online LPDK in 2023, detailing new disease names added over the preceding year and revisions to existing names. Subsequently, in 2024, the 6.2 edition was published, encompassing 6,765 diseases caused by 2,503 pathogen taxa across 1,432 host species. The public release of the online database has, however, introduced several challenges and tasks. Addressing these issues necessitates the development of modern, standardized nomenclature guidelines and a robust system for the registration of new disease names. Open communication and collaboration among the diverse members of the Korean Society of Plant Pathology are required to ensure the reliability of the LPDK.

Development and Improvement of the Online Article Contribution Management System Based on KISTI-ACOMS for the Korean Society of Crop Science (KISTI-ACOMS를 기반으로 한 한국작물학회 온라인논문투고관리시스템 개발 및 개선 방안)

  • Park Jae-Won;Kang Mu-Yeong;Yoon Hwa-Mook
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.49 no.6
    • /
    • pp.552-562
    • /
    • 2004
  • KISTI(Korea Institute of Science and Technology Information) has developed the ${\ulcorner}$KITTI­ACOMS (KISTI-Article COntribution Management System)${\lrcorner}$ as part of the national project for automating the process of processing academic information by societies, in order to convert journals published by academic societies in Korea into an electronic form and make them accessible on the Internet. This system has been developed in the year 2001 and has since been distributed to societies free of charge. The number of societies requesting the service has risen recently, which prompted us to take more recommendations of the societies that adopt this system into account in expanding and standardizing the area of service being provided by the system. This paper will investigate the functions of KISTI-ACOMS constructed for use in the Korean Society of Crop Science and list the functions and requirements for the next system to enhance the on-line paper management system.