• 제목/요약/키워드: Sensitive Data

검색결과 2,476건 처리시간 0.026초

Synthesis and pH-Dependent Micellization of a Novel Block Copolymer Containing s- Triazine Linkage

  • Pal Ravindra R.;Lee Doo Sung
    • Macromolecular Research
    • /
    • 제13권5호
    • /
    • pp.373-384
    • /
    • 2005
  • Novel pH-sensitive moieties containing an s-triazine ring were synthesized with sulfonamide and secondary amino groups. The synthesized pH-sensitive moieties were used for the synthesis of a pH-sensitive amphiphilic ABA triblock copolymer. The pH-sensitive triblock copolymer was composed of diblock copolymers, methoxy poly(ethylene glycol)-poly ($\varepsilon$-caprolactone-co-D,L-lactide) (MPEG-PCLA), and pH-sensitive moiety. These copolymers could be dissolved molecularly in both acidic and basic aqueous media at room temperature due to secondary amino and sulfonamide groups. The synthesized s-triazine rings containing pH-sensitive compounds were characterized by ${^1}H-NMR,\;{^13}C-NMR$, and LC/MSD spectral data. The synthesized diblock and triblock copolymers were also characterized by ${^1}H-NMR$ and GPC analyses. The critical micelle concentrations at various pH conditions were determined by fluorescence technique using pyrene as a probe. Furthermore, the micellization and demicellization study of the triblock copolymer was done with pH-sensitive groups. The sensitivity towards pH change was further established by acid-base titration.

Does National Distance Affect Different Industries in Different Ways? A Test of the Ghemawat CAGE Model

  • Kim, Hak Cho;Kwon, Jong-Wook;Zhou, Zhibin;Heo, Ji Hyun
    • Journal of Korea Trade
    • /
    • 제23권7호
    • /
    • pp.13-33
    • /
    • 2019
  • Purpose - This study empirically investigated whether national distances (Cultural, Administrative, Geographic and Economic distance) have different effects on industries in different ways. Design/methodology - The empirical model utilized industry level export trade data to examine the differentiated effects of each national distance. By using direct measurement and covering 75 countries, this paper analyzes the effect of distances in different industries. More specifically, this study classified the industries into a more-sensitive/less-sensitive scale. Findings - The empirical results showed the complicated impacts of national distances on trade. Trade in industries that are more sensitive to cultural and administrative distances was not decreased as greatly as trade in industries that are less sensitive to cultural and administrative distances. Also, industries that are more sensitive to geographic distance showed a stronger negative impact on trade than less sensitive industries. Lastly, economic distance decreased trade for industries that are more sensitive to economic distance, while economic distance did not significantly increase trade for industries that are less sensitive to economic distance. Originality/value - As the first study to empirically find out whether national distance has different effects on industries, this study updated the measurements of national distance.

클라우드 환경에서의 암호화 데이터에 대한 효율적인 Top-K 질의 수행 기법 (Efficient Top-K Queries Computation for Encrypted Data in the Cloud)

  • 김종욱
    • 한국멀티미디어학회논문지
    • /
    • 제18권8호
    • /
    • pp.915-924
    • /
    • 2015
  • With growing popularity of cloud computing services, users can more easily manage massive amount of data by outsourcing them to the cloud, or more efficiently analyse large amount of data by leveraging IT infrastructure provided by the cloud. This, however, brings the security concerns of sensitive data. To provide data security, it is essential to encrypt sensitive data before uploading it to cloud computing services. Although data encryption helps provide data security, it negatively affects the performance of massive data analytics because it forbids the use of index and mathematical operation on encrypted data. Thus, in this paper, we propose a novel algorithm which enables to efficiently process a large amount of encrypted data. In particular, we propose a novel top-k processing algorithm on the massive amount of encrypted data in the cloud computing environments, and verify the performance of the proposed approach with real data experiments.

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

감도전자장치에 영향을 주는 기하학적 인수의 이론적 연구와 측정 (Theoretical Investigations and measuring Techniques of Geometrical Factor influencing Sensitive Electronic Devices)

  • 이시규
    • 전기의세계
    • /
    • 제14권1호
    • /
    • pp.5-12
    • /
    • 1965
  • In the designs of the sensitive electronic devices such as phase sensitive detector, X-ray diffractometer, and neutron diffractometers, we must take into account the geometrical factors in a coil systems and extraneous stray fields. Input wave forms in such a sensitive electronic devices are often altered by the influence of these factors. Since the magnitude of the stray fields is generally very small, this affection may be removed by applying a good shielding but it is not ease to remove the affection from a geometrical factor. This affection must be however calculated by the theoretical methods and analytical solution in the equation of these factors. The fundamental purpose of this paper lie in the theoretical calculations and practical measurements of the geometrical factor in the coil systems, finite solenoid, and four point prove. In the heoretical calculations, the geometrical factors in the coil systems were calculated by applying the elliptic functions and in the contact points were calculated by applying the elliptic functions and in the contact points were calculated by applying the eigen functions and the infinite series. The measurements were carried out by using the sensitive electronic device made from author's design, as shown in the Fig. 9. The result of this work has verified the essential correctness of theoretical investigations and measuring techniques of geometrical factors on the design of sensitive electronic devices. It also has several advantages such that: (1) all the data obtained may give effective data to designer to work on the field of sensitive electronic devices or microelectronic devices, (2) it has evidently explained the characteristics of electrical investigations and physical definition, and has removed the conventional error of geometrical factors in the coil systems and contact points.

  • PDF

변위감응형 충격흡수기의 차량 동력학적 특성에 관한 연구 (A Study on the Vehicle Dynamic Characteristic of Displacement Sensitive Shock Absorber)

  • 이춘태;곽동훈;정봉호;이진걸
    • 한국정밀공학회지
    • /
    • 제20권1호
    • /
    • pp.187-195
    • /
    • 2003
  • The performance of shock absorber is directly related to the car behaviour and performance, both for handling and ride comfort. The displacement sensitive shock absorber has two modes of damping force (i.e. soft and hard) according to the position of piston. In this study, a mathematical nonlinear dynamic model is introduced to predict the performance of displacement sensitive shock absorber. Especially in this paper, the transient zone is considered and the simulation result is well fit with experimental data. And the vehicle dynamic characteristic of displacement sensitive shock absorber is presented using quarter car simulation model. The simulation results of frequency response are compared with passive shock absorber.

생성적 적대 신경망(GAN)을 이용한 한국어 문서에서의 문맥의존 철자오류 교정 (Context-Sensitive Spelling Error Correction Techniques in Korean Documents using Generative Adversarial Network)

  • 이정훈;권혁철
    • 한국멀티미디어학회논문지
    • /
    • 제24권10호
    • /
    • pp.1391-1402
    • /
    • 2021
  • This paper focuses use context-sensitive spelling error correction using generative adversarial network. Generative adversarial network[1] are attracting attention as they solve data generation problems that have been a challenge in the field of deep learning. In this paper, sentences are generated using word embedding information and reflected in word distribution representation. We experiment with DCGAN[2] used for the stability of learning in the existing image processing and D2GAN[3] with double discriminator. In this paper, we experimented with how the composition of generative adversarial networks and the change of learning corpus influence the context-sensitive spelling error correction In the experiment, we correction the generated word embedding information and compare the performance with the actual word embedding information.

Filtered Randomized Response Technique

  • Choi, Kyoung-Ho
    • Communications for Statistical Applications and Methods
    • /
    • 제13권2호
    • /
    • pp.319-326
    • /
    • 2006
  • Randomized response technique is a survey technique for eliminating evasive answer bias. This technique is popular in social survey for sensitive issues. In this paper we present a simple and obvious procedure for estimating the population proportion of a sensitive group. Here, we shows the weak point in the method of Kim and Warde (2005). Also, it is found that the proposed procedure is more efficient than the ones of Warner (1965) and Kim and Warde (2005). Lastly we discuss the conditions that the suggested method will be more efficienct.

음성 트래픽을 위한 동적우선권제어방식의 성능분석 (Performance Analysis of a Dynamic Priority Control Scheme for Delay-Sensitive Traffic)

  • 김도규;김용규;조석팔
    • 한국음향학회지
    • /
    • 제19권8호
    • /
    • pp.3-11
    • /
    • 2000
  • 음성의 특성은 지연에 매우 민감한 (delay-sensitive) 트래픽으로 시스템에서 손실에 민감한 (loss-sensitive) 다른 트래픽과 동일한 방식으로 서비스되어서는 두 트래픽 모두의 QoS (Quality of Service)를 만족시킬 수 없다. 효율적인 트래픽의 처리를 위해서는 시스템의 상태에 따라 손실에 민감한 트래픽에 영향을 적게 주면서 지연민감 트래픽의 성능도 만족하는 것이 바람직하다. 본 논문에서 도입한 동적우선권제어함수 (Dynamic Priority Control Function, DPCF)는 시스템의 상태에 따라 각 트래픽에 우선권을 동적으로 할당하여 서비스 스케줄링을 제어하는 함수f(·)로 기존의 우선권 제어방식을 더욱 일반화시킨 방식이다. 클래스 1의 손실민감 트래픽과 음성과 같은 클래스 2의 지연민감 트래픽을 수용하는 시스템에 TBPJ (Threshold-based Bernoulli Priority Jump) 방식의 DPCF을 적용하여 성능을 분석하였다. DPCF은 각 시스템에 대기하고 있는 트래픽의 양과 시스템의 가용 용량인 버퍼의 threshold에 따라 각 트래픽 클래스에 우선권을 동적으로 할당하여 서비스가 이루어지도록 한다. 성능분석을 통하여 TBPJ 제어방식이 기존의 우선권 제어 방식보다 성능 및 효율성에 있어서 우수함을 입증하였다. 즉 성능을 분석한 결과 손실민감 트래픽의 성능저하는 미미하고 지연민감 트래픽의 성능향상은 현저히 개선된 것을 확인하였다.

  • PDF

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권2호
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.