• Title/Summary/Keyword: Security mechanisms

Search Result 401, Processing Time 0.025 seconds

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.

Implementation of Smartphone Adaptor for Real-Time Live Simulations (실시간 Live 시뮬레이션을 위한 스마트폰 연동기 구현)

  • Kim, Hyun-Hwi;Lee, Kang-Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.1
    • /
    • pp.9-20
    • /
    • 2013
  • Defense M&S for weapons effectiveness is a realistic way to support virtual warfare similar to real warfare. As the war paradigm becomes platform-centric to network-centric, people try to utilize smartphones as the source of sensor, and command/control data in the simulation-based weapons effectiveness analysis. However, there have been limited researches on integrating smartphones into the weapon simulators, partly due to high modeling cost - modeling cost to accomodate client-server architecture, and re-engineering cost to adapt the simulator on various devices and platforms -, lack of efficient mechanisms to exchange large amount of simulation data, and low-level of security. In this paper, we design and implement Smartphone Adaptor to utilize smartphones for the simulationbased weapons effectiveness analysis. Smartphone Adaptor automatically sends sensor information, GPS and motion data of a client's smartphone to a simulator and receives simulation results from the simulator on the server. Also, we make it possible for data to be transferred safely and quickly through JSON and SEED. Smartphone Adaptor is applied to OpenSIM (Open simulation engine for Interoperable Models) which is an integrated simulation environment for weapons effectiveness analysis, under development of our research team. In this paper, we will show Smartphone Adaptor can be used effectively in constructing a Live simulation, with an example of a chemical simulator.

Hippocratic XML Databases: A Model and Access Control Mechanism (히포크라테스 XML 데이터베이스: 모델 및 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.684-698
    • /
    • 2004
  • The Hippocratic database model recently proposed by Agrawal et al. incorporates privacy protection capabilities into relational databases. Since the Hippocratic database is based on the relational database, it needs extensions to be adapted for XML databases. In this paper, we propose the Hippocratic XML database model, an extension of the Hippocratic database model for XML databases and present an efficient access control mechanism under this model. In contrast to relational data, XML data have tree-like hierarchies. Thus, in order to manage these hierarchies of XML data, we extend and formally define such concepts presented in the Hippocratic database model as privacy preferences, privacy policies, privacy authorizations, and usage purposes of data records. Next, we present a new mechanism, which we call the authorization index, that is used in the access control mechanism. This authorization index, which is Implemented using a multi-dimensional index, allows us to efficiently search authorizations implied by the authorization granted on the nearest ancestor using the nearest neighbor search technique. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 13.6 times over the top-down access control strategy and by up to 20.3 times over the bottom-up access control strategy The major contributions of our paper are 1) extending the Hippocratic database model into the Hippocratic XML database model and 2) proposing an efficient across control mechanism that uses the authorization index and nearest neighbor search technique under this model.

Analysis of Labor Market Activation Policy and Its Employment Outcomes: the Effects of Employment and Tailored Social Service Provision (한국의 노동시장 활성화 정책 특성과 취업 성과: 취업지원서비스와 맞춤형 사회서비스 중심 정책의 비교)

  • Ryu, Kirak
    • 한국사회정책
    • /
    • v.19 no.3
    • /
    • pp.149-183
    • /
    • 2012
  • This article aims to analyze main features of activation policy and compare major programmes in terms of their impact on employment performances in Korea. Since the introduction of National Basic Living Security Act in 2000, a series of activation policies have been in place for social assistance recipients, low-income employees, and youth unemployed by means of providing tailored employment and social services via in-depth counselling and case management. These activation policies carry both enabling and demanding elements: requiring programme participation in exchange for public assistance benefit receipts on the one hand, and providing various social services to remove barriers to employment through case management on the other hand. Therefore, it merits attention to analyze how various features of activation programmes affect employment outcomes, the effectiveness of delivery system and policy instruments as well. In analyzing employment outcomes of activation policy of which main characteristics lie in provision of employment and social services, this article points out the features and policy instruments of the activation policy that contribute to labor market entry of public assistance recipients and low income employees. In addition, it also delineates the determinants of exit from benefit receipts. Results from statistical analysis show that activation policy with intense employment service helps both benefit recipients and low income employees enter into the labor market at a faster rate. However, tailored social service provision enables social assistance recipients to exit from benefit receipts. These results suggest theoretical and policy relevant implication in regards to redesigning the delivery mechanisms and service instruments of activation policy.

Improvement of Face Recognition Algorithm for Residential Area Surveillance System Based on Graph Convolution Network (그래프 컨벌루션 네트워크 기반 주거지역 감시시스템의 얼굴인식 알고리즘 개선)

  • Tan Heyi;Byung-Won Min
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.1-15
    • /
    • 2024
  • The construction of smart communities is a new method and important measure to ensure the security of residential areas. In order to solve the problem of low accuracy in face recognition caused by distorting facial features due to monitoring camera angles and other external factors, this paper proposes the following optimization strategies in designing a face recognition network: firstly, a global graph convolution module is designed to encode facial features as graph nodes, and a multi-scale feature enhancement residual module is designed to extract facial keypoint features in conjunction with the global graph convolution module. Secondly, after obtaining facial keypoints, they are constructed as a directed graph structure, and graph attention mechanisms are used to enhance the representation power of graph features. Finally, tensor computations are performed on the graph features of two faces, and the aggregated features are extracted and discriminated by a fully connected layer to determine whether the individuals' identities are the same. Through various experimental tests, the network designed in this paper achieves an AUC index of 85.65% for facial keypoint localization on the 300W public dataset and 88.92% on a self-built dataset. In terms of face recognition accuracy, the proposed network achieves an accuracy of 83.41% on the IBUG public dataset and 96.74% on a self-built dataset. Experimental results demonstrate that the network designed in this paper exhibits high detection and recognition accuracy for faces in surveillance videos.

Intelligent Transportation System (ITS) research optimized for autonomous driving using edge computing (엣지 컴퓨팅을 이용하여 자율주행에 최적화된 지능형 교통 시스템 연구(ITS))

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.23-29
    • /
    • 2024
  • In this scholarly investigation, the focus is placed on the transformative potential of edge computing in enhancing Intelligent Transportation Systems (ITS) for the facilitation of autonomous driving. The intrinsic capability of edge computing to process voluminous datasets locally and in a real-time manner is identified as paramount in meeting the exigent requirements of autonomous vehicles, encompassing expedited decision-making processes and the bolstering of safety protocols. This inquiry delves into the synergy between edge computing and extant ITS infrastructures, elucidating the manner in which localized data processing can substantially diminish latency, thereby augmenting the responsiveness of autonomous vehicles. Further, the study scrutinizes the deployment of edge servers, an array of sensors, and Vehicle-to-Everything (V2X) communication technologies, positing these elements as constituents of a robust framework designed to support instantaneous traffic management, collision avoidance mechanisms, and the dynamic optimization of vehicular routes. Moreover, this research addresses the principal challenges encountered in the incorporation of edge computing within ITS, including issues related to security, the integration of data, and the scalability of systems. It proffers insights into viable solutions and delineates directions for future scholarly inquiry.

Effects of Different Physical Frequency on Food-Dependent Exercise Induced Allergy Anaphylaxis (FDEIA) and Related Mechanisms (운동빈도의 차이가 식이유도 운동알레르기 질환과 관련기전에 미치는 영향)

  • Kim, Cheol-Woo;Kwak, Yi-Sub
    • Journal of Life Science
    • /
    • v.22 no.7
    • /
    • pp.897-903
    • /
    • 2012
  • Food allergies have become a serious health concern in the past two decades, especially in developed countries. Foods associated with allergies include vegetables, some fruits, shellfish, wheat, egg, chicken, and nuts. To describe the specific fundamentals, etiological factors, and clinical manifestations, we analyzed the different physical frequency on spleen index in sensitized and regular exercise-trained mice. We also conducted a proliferation assay of lymphocytes to OVA, ROS, ASAS, and we determined the cytokine levels. Female BALB/c mice were bred in the animal laboratory of the P and D university under controlled conditions ($22{\pm}2^{\circ}C$, RH 45-55%, and a 12-hour photoperiod). The animals were 6 weeks old at the start of the study and were fed a standard commercial chow diet from 09:00 to 15:00 for the 8-week study period. All animals had access to distilled deionized water ad libitum. They were divided into four groups: a control group (S; control sensitized, n=25), a low-frequency training group (F2, n=25), a mid-frequency training group (F3, n=25), and a high-frequency training group (F5, n=25) following the treatment of exercise time per week. The results were as follows: The mice spleen index showed the highest grade in the F5 group compared with the other groups; this level showed in an exercise frequency-dependent manner. In the proliferation assay of OVA, the F5 group showed the highest grade compared with the other groups; this level was also showed in an exercise frequency-dependent manner. Peritoneal ROS and ASAS showed a statistically significant increase in the F5 group and decreased in the F2 group compared with the S group. However, there were no significant differences in the F3 group. The highest level of IL-4 was found in the F5 group compared with the other groups. However, the highest level of INF-${\gamma}$ was in the F2 group. The results suggest that FDEIA is positively correlated with the frequency of exercise due to the direct effect of physical exercise on peritoneal ROS and the cytokine profile. Further research is needed on the specific mechanism underlying the combined effects of exercise intensity and frequency on physical-induced allergy anaphylaxis.

Determination of Types and Element on Parking Ramp (주차장 램프 형식 결정 및 제원 산정에 관한 연구)

  • Kwon, Sung-Dae;Kim, Yoon-Mi;Nam, Chang-Kyu;Ha, Tae-Jun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.5
    • /
    • pp.2021-2031
    • /
    • 2013
  • Due to the rapid economic growth within the nation, the quality of life of individuals have improved dramatically. The scope of living activities of individuals have also extended, resulting in a rapidly increasing demand for automobiles. The number of vehicles registered in Korea is rapidly increasing and will reach 188.71 million as of December 2012. Compared to the registered residents of 50.94 million provided by the Ministry of Public Administration and Security, the registered population reflects about 4 people per every automobile. Due to the high demands for vehicles, the demands for parking lots in collective housing and businesses are also increasing. In reality, the current state of expansion of parking lots are underground, due to the limited available space on ground level. Specifically, the slope of a parking lot cannot exceed 17% linear slope and 14% curved slope according to the 'parking lot laws', however studies show that the driver feels at risk for safety when stopped on the parking ramp while driving in the parking lot. This study seeks to examine the suitability of parking lot ramps, concerning the safety aspects of the driver. First, the ramp type was categorized as linear or curved, then test drives were performed based on variations of slopes, slant distances, directions and points. A survey was administered to the driver after the completion of the test drive, in order to element design for an ideal ramp. In the case of curved ramp, the results of the estimate suggests a counterclockwise, slope at a maximum of 12% incline. The maximum slope for a linear ramp was analyzed to be between 13~14%, suggesting that slope greater than 15% need to be eliminated. In conclusion, it is anticipated that the element design parking ramp reported in this study will help to serve as a reference for future parking lot related guidelines, and provide cost effective traffic safety mechanisms in future parking lot businesses to follow.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

A Comparative Study of Korean Home Economic Curriculum and American Practical Problem Focused Family & Consumer Sciences Curricula (우리나라 가정과 교육과정과 미국의 실천적 문제 중심 교육과정과의 비교고찰)

  • Kim, Hyun-Sook;Yoo, Tae-Myung
    • Journal of Korean Home Economics Education Association
    • /
    • v.19 no.4
    • /
    • pp.91-117
    • /
    • 2007
  • This study was to compare the contents and practical problems addressed, the process of teaching-learning method, and evaluation method of Korean Home Economics curriculum and of the Oregon and Ohio's Practical Problem Focused Family & Consumer Sciences Curricula. The results are as follows. First, contents of Korean curriculum are organized by major sub-concepts of Home Economics academic discipline whereas curricular of both Oregon and Ohio states are organized by practical problems. Oregon uses the practical problems which integrate multi-subjects and Ohio uses ones which are good for the contents of the module by integrating concerns or interests which are lower or detailed level (related interests). Since it differentiates interest and module and used them based on the basic concept of Family and Consumer Science, Ohio's approach could be easier for Korean teachers and students to adopt. Second, the teaching-learning process in Korean home economics classroom is mostly teacher-centered which hinders students to develop higher order thinking skills. It is recommended to use student-centered learning activities. State of Oregon and Ohio's teaching-learning process brings up the ability of problem-solving by letting students clearly analyze practical problems proposed, solve problems by themselves through group discussions and various activities, and apply what they learn to other problems. Third, Korean evaluation system is heavily rely on summative evaluation such as written tests. It is highly recommended to facilitate various performance assessment tools. Since state of Oregon and Ohio both use practical problems, they evaluate students mainly based on their activity rather than written tests. The tools for evaluation include project documents, reports of learning activity, self-evaluation, evaluation of discussion activity, peer evaluation in a group for each students for their performance, assessment about module, and written tests as well.

  • PDF