• Title/Summary/Keyword: Sensitive data

Search Result 2,488, Processing Time 0.033 seconds

Synthesis and pH-Dependent Micellization of a Novel Block Copolymer Containing s- Triazine Linkage

  • Pal Ravindra R.;Lee Doo Sung
    • Macromolecular Research
    • /
    • v.13 no.5
    • /
    • pp.373-384
    • /
    • 2005
  • Novel pH-sensitive moieties containing an s-triazine ring were synthesized with sulfonamide and secondary amino groups. The synthesized pH-sensitive moieties were used for the synthesis of a pH-sensitive amphiphilic ABA triblock copolymer. The pH-sensitive triblock copolymer was composed of diblock copolymers, methoxy poly(ethylene glycol)-poly ($\varepsilon$-caprolactone-co-D,L-lactide) (MPEG-PCLA), and pH-sensitive moiety. These copolymers could be dissolved molecularly in both acidic and basic aqueous media at room temperature due to secondary amino and sulfonamide groups. The synthesized s-triazine rings containing pH-sensitive compounds were characterized by ${^1}H-NMR,\;{^13}C-NMR$, and LC/MSD spectral data. The synthesized diblock and triblock copolymers were also characterized by ${^1}H-NMR$ and GPC analyses. The critical micelle concentrations at various pH conditions were determined by fluorescence technique using pyrene as a probe. Furthermore, the micellization and demicellization study of the triblock copolymer was done with pH-sensitive groups. The sensitivity towards pH change was further established by acid-base titration.

Does National Distance Affect Different Industries in Different Ways? A Test of the Ghemawat CAGE Model

  • Kim, Hak Cho;Kwon, Jong-Wook;Zhou, Zhibin;Heo, Ji Hyun
    • Journal of Korea Trade
    • /
    • v.23 no.7
    • /
    • pp.13-33
    • /
    • 2019
  • Purpose - This study empirically investigated whether national distances (Cultural, Administrative, Geographic and Economic distance) have different effects on industries in different ways. Design/methodology - The empirical model utilized industry level export trade data to examine the differentiated effects of each national distance. By using direct measurement and covering 75 countries, this paper analyzes the effect of distances in different industries. More specifically, this study classified the industries into a more-sensitive/less-sensitive scale. Findings - The empirical results showed the complicated impacts of national distances on trade. Trade in industries that are more sensitive to cultural and administrative distances was not decreased as greatly as trade in industries that are less sensitive to cultural and administrative distances. Also, industries that are more sensitive to geographic distance showed a stronger negative impact on trade than less sensitive industries. Lastly, economic distance decreased trade for industries that are more sensitive to economic distance, while economic distance did not significantly increase trade for industries that are less sensitive to economic distance. Originality/value - As the first study to empirically find out whether national distance has different effects on industries, this study updated the measurements of national distance.

Efficient Top-K Queries Computation for Encrypted Data in the Cloud (클라우드 환경에서의 암호화 데이터에 대한 효율적인 Top-K 질의 수행 기법)

  • Kim, Jong Wook
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.8
    • /
    • pp.915-924
    • /
    • 2015
  • With growing popularity of cloud computing services, users can more easily manage massive amount of data by outsourcing them to the cloud, or more efficiently analyse large amount of data by leveraging IT infrastructure provided by the cloud. This, however, brings the security concerns of sensitive data. To provide data security, it is essential to encrypt sensitive data before uploading it to cloud computing services. Although data encryption helps provide data security, it negatively affects the performance of massive data analytics because it forbids the use of index and mathematical operation on encrypted data. Thus, in this paper, we propose a novel algorithm which enables to efficiently process a large amount of encrypted data. In particular, we propose a novel top-k processing algorithm on the massive amount of encrypted data in the cloud computing environments, and verify the performance of the proposed approach with real data experiments.

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.97-104
    • /
    • 2022
  • In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

Theoretical Investigations and measuring Techniques of Geometrical Factor influencing Sensitive Electronic Devices (감도전자장치에 영향을 주는 기하학적 인수의 이론적 연구와 측정)

  • S. K. Lee
    • 전기의세계
    • /
    • v.14 no.1
    • /
    • pp.5-12
    • /
    • 1965
  • In the designs of the sensitive electronic devices such as phase sensitive detector, X-ray diffractometer, and neutron diffractometers, we must take into account the geometrical factors in a coil systems and extraneous stray fields. Input wave forms in such a sensitive electronic devices are often altered by the influence of these factors. Since the magnitude of the stray fields is generally very small, this affection may be removed by applying a good shielding but it is not ease to remove the affection from a geometrical factor. This affection must be however calculated by the theoretical methods and analytical solution in the equation of these factors. The fundamental purpose of this paper lie in the theoretical calculations and practical measurements of the geometrical factor in the coil systems, finite solenoid, and four point prove. In the heoretical calculations, the geometrical factors in the coil systems were calculated by applying the elliptic functions and in the contact points were calculated by applying the elliptic functions and in the contact points were calculated by applying the eigen functions and the infinite series. The measurements were carried out by using the sensitive electronic device made from author's design, as shown in the Fig. 9. The result of this work has verified the essential correctness of theoretical investigations and measuring techniques of geometrical factors on the design of sensitive electronic devices. It also has several advantages such that: (1) all the data obtained may give effective data to designer to work on the field of sensitive electronic devices or microelectronic devices, (2) it has evidently explained the characteristics of electrical investigations and physical definition, and has removed the conventional error of geometrical factors in the coil systems and contact points.

  • PDF

A Study on the Vehicle Dynamic Characteristic of Displacement Sensitive Shock Absorber (변위감응형 충격흡수기의 차량 동력학적 특성에 관한 연구)

  • 이춘태;곽동훈;정봉호;이진걸
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.1
    • /
    • pp.187-195
    • /
    • 2003
  • The performance of shock absorber is directly related to the car behaviour and performance, both for handling and ride comfort. The displacement sensitive shock absorber has two modes of damping force (i.e. soft and hard) according to the position of piston. In this study, a mathematical nonlinear dynamic model is introduced to predict the performance of displacement sensitive shock absorber. Especially in this paper, the transient zone is considered and the simulation result is well fit with experimental data. And the vehicle dynamic characteristic of displacement sensitive shock absorber is presented using quarter car simulation model. The simulation results of frequency response are compared with passive shock absorber.

Context-Sensitive Spelling Error Correction Techniques in Korean Documents using Generative Adversarial Network (생성적 적대 신경망(GAN)을 이용한 한국어 문서에서의 문맥의존 철자오류 교정)

  • Lee, Jung-Hun;Kwon, Hyuk-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.10
    • /
    • pp.1391-1402
    • /
    • 2021
  • This paper focuses use context-sensitive spelling error correction using generative adversarial network. Generative adversarial network[1] are attracting attention as they solve data generation problems that have been a challenge in the field of deep learning. In this paper, sentences are generated using word embedding information and reflected in word distribution representation. We experiment with DCGAN[2] used for the stability of learning in the existing image processing and D2GAN[3] with double discriminator. In this paper, we experimented with how the composition of generative adversarial networks and the change of learning corpus influence the context-sensitive spelling error correction In the experiment, we correction the generated word embedding information and compare the performance with the actual word embedding information.

Filtered Randomized Response Technique

  • Choi, Kyoung-Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.13 no.2
    • /
    • pp.319-326
    • /
    • 2006
  • Randomized response technique is a survey technique for eliminating evasive answer bias. This technique is popular in social survey for sensitive issues. In this paper we present a simple and obvious procedure for estimating the population proportion of a sensitive group. Here, we shows the weak point in the method of Kim and Warde (2005). Also, it is found that the proposed procedure is more efficient than the ones of Warner (1965) and Kim and Warde (2005). Lastly we discuss the conditions that the suggested method will be more efficienct.

Performance Analysis of a Dynamic Priority Control Scheme for Delay-Sensitive Traffic (음성 트래픽을 위한 동적우선권제어방식의 성능분석)

  • 김도규;김용규;조석팔
    • The Journal of the Acoustical Society of Korea
    • /
    • v.19 no.8
    • /
    • pp.3-11
    • /
    • 2000
  • This paper considers the performance of a dynamic priority control function (DPCF) of a threshold-based Bernoulli priority jump (TBPJ) scheme. Loss-sensitive and delay-sensitive traffics are applied to a system with a TBPJ scheme that is a general state-dependent Bernoulli scheduling scheme. Loss-sensitive and delay-sensitive traffics represent sound and data, respectively. Under the TBPJ scheme, the first packet of the loss-sensitive traffic buffer goes into the delay-sensitive traffic buffer with Bernoulli probability p according to system states which represent the buffer thresholds and the number of packets waiting for scheduling. Performance analysis shows that TBPJ scheme obtains large performance build-up for the delay-sensitive traffic without performance degradation for the loss-sensitive traffic. TBPJ scheme shows also better performance than that of HOL scheme.

  • PDF

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.