• Title/Summary/Keyword: Private matching

Search Result 55, Processing Time 0.028 seconds

Analysis of the Firm Support Effects of the Innovation Procurement Policy Using Propensity Score Matching and Difference in Differences (성향점수매칭(PSM)-이중차분(DID) 결합모형을 이용한 혁신조달 정책의 기업지원 효과 분석)

  • Juwon Kim;Wonik Park
    • Journal of Technology Innovation
    • /
    • v.31 no.3
    • /
    • pp.201-230
    • /
    • 2023
  • The Innovation Procurement Policy was introduced as part of the strategic public procurement policy to improve firms' innovation capabilities and enhance the public sector's ability to solve social problems by designating and purchasing so-called 'innovative products.' The pilot procurement project for innovative products was first introduced in 2019, and the policy system for designating and discovering innovative products by government departments, as well as the priority purchase system, was established in 2020. Hence, this study conducted a quantitative analysis focusing on the effectiveness of the innovation procurement system in supporting firms after it was fully implemented. For this purpose, corporate financial and employment data from 2017 to 2021 were used, and propensity score matching(PSM) and difference-in-difference(DID) methods were utilized as analytical tools. The study found that the innovation procurement system contributed to corporate growth and employment and created additional public and private sales channels. Moreover, it is necessary to enhance the innovation procurement system, such as matching innovative product-producing companies with existing SME support policies, for companies to become self-sustaining after the innovative product designation ends.

Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center (개인정보 오.남용 방지 및 보호를 위한 정보공유센터 프레임워크)

  • Ko, Yu-Mi;Choi, Jae-Won;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.391-400
    • /
    • 2012
  • This study focused on the role of the center for private information, which can manage and share the personal data from data breach incidents. Especially, this study addresses on the importance of establishing information management systems for preventing secondary misappropriation of breached personal data and private information. The database of breached personal data can be used for reducing privacy worries of potential victims of secondary misuse of personal data. Individuals who use the same IDs and passwords on multiple websites may find this service more effective and necessary. The effectiveness of this breached data center on reducing secondary privacy infringement may differ depending on the extend of data being shared and the conditions of data submission. When businesses experienced data breach and submission of data to this center is required by the law, the accuracy and effectiveness of this service can be enhanced. In addition, centralized database with high quality data set can increase matching for private information and control the secondary misappropriation of personal data or private information better.

A Simple Fingerprint Fuzzy Vault for FIDO

  • Cho, Dongil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5674-5691
    • /
    • 2016
  • Fast IDentity Online(FIDO) supports biometric authentications in an online environment without transmitting biometric templates over the network. For a given FIDO client, the "Fuzzy Vault" securely stores biometric templates, houses additional biometric templates, and unlocks private keys via biometrics. The Fuzzy Vault has been extensively researched and some vulnerabilities have been discovered, such as brute force, correlation, and key inversions attacks. In this paper, we propose a simple fingerprint Fuzzy Vault for FIDO clients. By using the FIDO feature, a simple minutiae alignment, and point-to-point matching, our Fuzzy Vault provides a secure algorithm to combat a variety of attacks, such as brute force, correlation, and key inversions. Using a case study, we verified our Fuzzy Vault by using a publicly available fingerprint database. The results of our experiments show that the Genuine Acceptance Rate and the False Acceptance Rate range from 48.89% to 80% and from 0.02% to 0%, respectively. In addition, our Fuzzy Vault, compared to existing similar technologies, needed fewer attempts.

A Study on the Algorithm of Address Symmetric using Cadastral Map (지적도를 이용한 주소정제 알고리즘 연구)

  • Yoon, Hun-Hoo;Jeong, Jong-Chul
    • Spatial Information Research
    • /
    • v.13 no.2 s.33
    • /
    • pp.185-194
    • /
    • 2005
  • The purpose of this study is to create address standardization through an Algorithm based on cadastral maps, as well as to establish a method of transforming one information area to all of the domestic areas in relation to the geographic information system. To do this, it analyzed the current level of e-government cadastral data and their integration strategy with addresses of both the administrator and the cadastral data. This study will provide a more efficient method for co-operative work between private sector and public sector. In addition, we can expect that the information strategy of local government will become more active.

  • PDF

Job Preference Analysis and Job Matching System Development for the Middle Aged Class (중장년층 일자리 요구사항 분석 및 인력 고용 매칭 시스템 개발)

  • Kim, Seongchan;Jang, Jincheul;Kim, Seong Jung;Chin, Hyojin;Yi, Mun Yong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.247-264
    • /
    • 2016
  • With the rapid acceleration of low-birth rate and population aging, the employment of the neglected groups of people including the middle aged class is a crucial issue in South Korea. In particular, in the 2010s, the number of the middle aged who want to find a new job after retirement age is significantly increasing with the arrival of the retirement time of the baby boom generation (born 1955-1963). Despite the importance of matching jobs to this emerging middle aged class, private job portals as well as the Korean government do not provide any online job service tailored for them. A gigantic amount of job information is available online; however, the current recruiting systems do not meet the demand of the middle aged class as their primary targets are young workers. We are in dire need of a specially designed recruiting system for the middle aged. Meanwhile, when users are searching the desired occupations on the Worknet website, provided by the Korean Ministry of Employment and Labor, users are experiencing discomfort to search for similar jobs because Worknet is providing filtered search results on the basis of exact matches of a preferred job code. Besides, according to our Worknet data analysis, only about 24% of job seekers had landed on a job position consistent with their initial preferred job code while the rest had landed on a position different from their initial preference. To improve the situation, particularly for the middle aged class, we investigate a soft job matching technique by performing the following: 1) we review a user behavior logs of Worknet, which is a public job recruiting system set up by the Korean government and point out key system design implications for the middle aged. Specifically, we analyze the job postings that include preferential tags for the middle aged in order to disclose what types of jobs are in favor of the middle aged; 2) we develope a new occupation classification scheme for the middle aged, Korea Occupation Classification for the Middle-aged (KOCM), based on the similarity between jobs by reorganizing and modifying a general occupation classification scheme. When viewed from the perspective of job placement, an occupation classification scheme is a way to connect the enterprises and job seekers and a basic mechanism for job placement. The key features of KOCM include establishing the Simple Labor category, which is the most requested category by enterprises; and 3) we design MOMA (Middle-aged Occupation Matching Algorithm), which is a hybrid job matching algorithm comprising constraint-based reasoning and case-based reasoning. MOMA incorporates KOCM to expand query to search similar jobs in the database. MOMA utilizes cosine similarity between user requirement and job posting to rank a set of postings in terms of preferred job code, salary, distance, and job type. The developed system using MOMA demonstrates about 20 times of improvement over the hard matching performance. In implementing the algorithm for a web-based application of recruiting system for the middle aged, we also considered the usability issue of making the system easier to use, which is especially important for this particular class of users. That is, we wanted to improve the usability of the system during the job search process for the middle aged users by asking to enter only a few simple and core pieces of information such as preferred job (job code), salary, and (allowable) distance to the working place, enabling the middle aged to find a job suitable to their needs efficiently. The Web site implemented with MOMA should be able to contribute to improving job search of the middle aged class. We also expect the overall approach to be applicable to other groups of people for the improvement of job matching results.

The Matching Principle, Discretionary Accrual and Cost of Capital (수익비용대응, 재량적 발생액 및 자기자본비용)

  • Lee, Kyu-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.483-488
    • /
    • 2019
  • This study first examines whether the high matching principle reduces the cost of equity, and then examines the effect on discretionary accruals and capital cost. According to previous studies, the higher the response to revenue cost, the higher the earnings quality. The higher the quality of earnings, the lower the information risk, and the lower the information risk, the lower the capital cost of enterprise. Discretionary accruals can play two roles in opposing each other. One is that managers use the discretionary accruals to provide private information about the future of the corporation to the market, thus enhancing the usefulness of the earnings. The other is that managers can use the discretionary accruals opportunistically to distort earnings and provide misinformed information to investors, thus reducing the usefulness of earnings. The results of this study represents that the higher the responding to the revenue cost, the less the cost of equity. In the case of firms with high revenue response, we examine whether discretionary accruals reduce the cost of equity capital. As a result of the study, the higher the responding to the revenue cost, the lower the cost of equity capital. Companies with higher matching principle have been shown to reduce their capital costs by using discretionary accruals.

A Multibit Tree Bitmap based Packet Classification (멀티 비트 트리 비트맵 기반 패킷 분류)

  • 최병철;이정태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3B
    • /
    • pp.339-348
    • /
    • 2004
  • Packet classification is an important factor to support various services such as QoS guarantee and VPN for users in Internet. Packet classification is a searching process for best matching rule on rule tables by employing multi-field such as source address, protocol, and port number as well as destination address in If header. In this paper, we propose hardware based packet classification algorithm by employing tree bitmap of multi-bit trio. We divided prefixes of searching fields and rule into multi-bit stride, and perform a rule searching with multi-bit of fixed size. The proposed scheme can reduce the access times taking for rule search by employing indexing key in a fixed size of upper bits of rule prefixes. We also employ a marker prefixes in order to remove backtracking during searching a rule. In this paper, we generate two dimensional random rule set of source address and destination address using routing tables provided by IPMA Project, and compare its memory usages and performance.

A Study on the Algorithm of Address Symmetric using Cadastral Map (지적도를 이용한 주소정제 알고리즘 연구)

  • Yoon, Hun-Joo;Ryu, Jung-Hee;Kim, So-Hee;Kim, Hyun-Jong;Jeong, Jong-Chul
    • 한국지형공간정보학회:학술대회논문집
    • /
    • 2004.10a
    • /
    • pp.147-154
    • /
    • 2004
  • The purpose of this study is to create address standardization through an Algorithm based on cadastral maps, as well as to establish a method of transforming one information area to all of the domestic areas in relation to the geographic information system. To do this, it analyzed the current level of e-government cadastral data and their integration strategy with addresses of both the administrator and the cadastral data. By doing this it is be able to suggest an application method for the Algorithm. The algorithm proposed from this study have a built-in GUI and correlate addresses between the administration and the cadastral map, it can analyze matching success rates. This study is to provide a more efficient method for co-operative work between private sector and public sector. In addition, we can expect that the information strategy of local government will become more active.

  • PDF

The use of tissue fiducial markers in improving the accuracy of post-prostatectomy radiotherapy

  • Chao, Michael;Ho, Huong;Joon, Daryl Lim;Chan, Yee;Spencer, Sandra;Ng, Michael;Wasiak, Jason;Lawrentschuk, Nathan;McMillan, Kevin;Sengupta, Shomik;Tan, Alwin;Koufogiannis, George;Cokelek, Margaret;Foroudi, Farshad;Khong, Tristan-Scott;Bolton, Damien
    • Radiation Oncology Journal
    • /
    • v.37 no.1
    • /
    • pp.43-50
    • /
    • 2019
  • Purpose: The aim of this retrospective study was to investigate the use of a radiopaque tissue fiducial marker (TFM) in the treatment of prostate cancer patients who undergo post-prostatectomy radiotherapy (PPRT). TFM safety, its role and benefit in quantifying the set-up uncertainties in patients undergoing PPRT image-guided radiotherapy were assessed. Materials and Methods: A total of 45 consecutive PPRT patients underwent transperineal implantation of TFM at the level of vesicourethral anastomosis in the retrovesical tissue prior to intensity-modulated radiotherapy. Prostate bed motion was calculated by measuring the position of the TFM relative to the pelvic bony anatomy on daily cone-beam computed tomography. The stability and visibility of the TFM were assessed in the initial 10 patients. Results: No postoperative complications were recorded. A total of 3,500 images were analysed. The calculated prostate bed motion for bony landmark matching relative to TFM were 2.25 mm in the left-right, 5.89 mm in the superior-inferior, and 6.59 mm in the anterior-posterior directions. A significant 36% reduction in the mean volume of rectum receiving 70 Gy (rV70) was achieved for a uniform planning target volume (PTV) margin of 7 mm compared with the Australian and New Zealand Faculty of Radiation Oncology Genito-Urinary Group recommended PTV margin of 10 mm. Conclusion: The use of TFM was safe and can potentially eliminate set-up errors associated with bony landmark matching, thereby allowing for tighter PTV margins and a consequent favourable reduction in dose delivered to the bladder and rectum, with potential improvements in toxicities.

Detecting ShellCode Using Entropy (엔트로피를 이용한 ShellCode 탐지 방법)

  • Kim, Woosuk;Kang, Sunghoon;Kim, Kyungshin;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.3
    • /
    • pp.87-96
    • /
    • 2014
  • Hackers try to achieve their purpose in a variety of ways, such as operating own website and hacking a website. Hackers seize a large amount of private information after they have made a zombie PC by using malicious code to upload the website and it would be used another hacking. Almost detection technique is the use Snort rule. When unknown code and the patterns in IDS/IPS devices are matching on network, it detects unknown code as malicious code. However, if unknown code is not matching, unknown code would be normal and it would attack system. Hackers try to find patterns and make shellcode to avoid patterns. So, new method is needed to detect that kinds of shellcode. In this paper, we proposed a noble method to detect the shellcode by using Shannon's information entropy.