• Title/Summary/Keyword: Service identity

Search Result 520, Processing Time 0.037 seconds

Gache(加髢) Culture and Position of East Asia Women in the 18th and 19th Centuries (18~19세기 동아시아 여성의 가체문화와 의미)

  • Yim, Lynn
    • Human Ecology Research
    • /
    • v.57 no.3
    • /
    • pp.395-406
    • /
    • 2019
  • This study examined what meaning East Asian women showed in their costume history through a discourse of hair adornments such as wigs and that Gache was not just a luxury decoration. In addition, we examined Gache hair trends with Eonjeun-meori (braid wraps around the entire head) in the Joseon dynasty (Korea), Gigye(旗?) hair in the Quing dynasty (China) and Mage(?) hair in the Edo period (Japan) during the $18^{th}$ and $19^{th}$ centuries. The significance of the phenomenon of East Asian Gache culture in the $18^{th}$ and $19^{th}$ centuries was analyzed from the internal desires of women. The details are as follows. First, the magnification by the hair decoration was identified with self-authority and used as a sign to express self-respect or a desire for self-esteem. The extended Gache was an external body extension to raise self-authority and increase activeness. Second, self-satisfaction through showing off was associated with a women's search for identity. There was excessive consumption to boast status, wealth and femininity, but the mania continued because women obtained psychological satisfaction by feeling that their sacrifices for the Confucian order were compensated. Third, the frenzy of Gache was accepted as a way for women to resist social regulations and find themselves as main participants in social activities. Showing their appearance in East Asian Gache culture was a way of inner self-searching and a process for women to find themselves as a social entity.

Security Analysis on the Implementation Vulnerabilities of I-PIN (주민등록번호 대체수단에 대한 구현 취약점 분석)

  • Choi, Youn-Sung;Lee, Yun-Ho;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.145-185
    • /
    • 2007
  • A resident registration number is used to confirm and prove his/her identity in a government/non-governmental agency. It is a essential requirement to become the registered member on internet website in Korea. It is serious problem that the resident registration number and name are outflowed in internet and misused by others. So the MIC(Ministry of Information and Communication) in Korea plans and operates the identification system using I-PIN that integrate 5 alternative methods of resident registration number. In this paper, we analyze the problem about the method of 5 I-PIN services and show the security analysis on the implementation vulnerabilities of I-PIN services. we also analyze 17 websites that provides identification system using I-PIN. Finally, we analyze the overall problem of I-PIN service and propose the countermeasure about the problem.

An Implementation of the Security Service on Internet Mail System (인터넷 메일 시스템에서의 정보보호 서비스 구현)

  • 강명희;신효영;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.107-122
    • /
    • 1997
  • Most of the currently used electronic mail system has the threat of security such as illegal leak of message, forgery, uncertain identity, denial of sending and receiving, and so forth. The security for this system is not satisfied yet, thus we explore these problems. In this thesis, we implement the security services for internet mail system which cover the weakness for traditional mail system. This system provides not only security services which PEM and PGP provides (i.e message confidentiality, message integrity, originator authentication, non-repudiation of origin), but also message replay prevention. and non-denial of recipient using certification of contents. In addition, this system increases security of the digital signature by signing with signature block formatting on the creation of it. And it increases security of the digital enveloping by encrypting with encryption block formatting of message encryption key.

An efficient privacy-preserving data sharing scheme in social network (소셜 네트워크에 적합한 효율적인 프라이버시 보호 데이터 공유 기법)

  • Jeon, Doo-Hyun;Chun, Ji-Young;Jeong, Ik-Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.447-461
    • /
    • 2012
  • A social network service(SNS) is gaining popularity as a new real-time information sharing mechanism. However, the user's privacy infringement is occurred frequently because the information that is shared through a social network include the private information such as user's identity or lifestyle patterns. To resolve this problem, the research about privacy preserving data sharing in social network are being proceed actively. In this paper, we proposed the efficient scheme for privacy preserving data sharing in social network. The proposed scheme provides an efficient conjunctive keyword search functionality. And, users who granted access right to storage server can store and search data in storage server. Also,, our scheme provide join/revocation functionality suited to the characteristics of a dynamic social network.

A Study on Classification & Description of Art Archives : Focused on "The Art Archives, Seoul Museum of Art" (예술기록에 관한 분류·기술 사례 연구 서울시립 미술아카이브를 중심으로)

  • Kim, Ji Ah
    • The Korean Journal of Archival Studies
    • /
    • no.74
    • /
    • pp.79-117
    • /
    • 2022
  • In recent years, the term "art archives" has become increasingly popular, with the growing use of archives in exhibitions and program planning within domestic cultural and arts institutions. The need for art archives has been raised for reasons such as establishing the identity of art and culture and providing basic resources for academic research; however, they are now being recognized as a direct resource and service for users. Accordingly, research has also been conducted on the values, policies, and management practices of art archives in the archiving field. Nevertheless, there is a lack of research on management methodologies that can be applied to institutions that manage art archives. In particular, for the efficient use of art archives, classification, organization, and systematic management of descriptive areas must be preceded. But, There are different methods of managing art archives depending on the type of collection, the management institution, and the characteristics of the collection resources, which, in turn, makes it difficult to apply a consistent methodology for classification and description. Based on actual cases from The Art Archives, Seoul Museum of Art, this study examined the types and categories of arts, and presented the establishment of a classification system and archival description rules.

A Horticultural Therapy Program Focusing on Gardening Activities to Promote Psychological, Emotional and Social Health of the Elderly Living in a Homeless Living Facility for a Long Time: A Pilot Study

  • Kim, Yong Hyun;Lee, So-Hyeon;Park, Chul-Soo;Bae, Hwa-ok;Kim, Yun Jeong;Huh, Moo Ryong
    • Journal of People, Plants, and Environment
    • /
    • v.23 no.5
    • /
    • pp.565-576
    • /
    • 2020
  • Background and objective: The elderly living in homeless living facilities for a long time suffer from various mental health problems. This study aims to determine the psychological, emotional, and social effects of a horticultural therapy program composed of gardening activities, which was designed based on the semantic structures of life for the homeless elderly living in the facilities for a long time. Methods: A total of 12 subjects (6 in the control group and 6 in the experimental group) participated in the study. The horticultural therapy program consisted mainly of gardening activities, and a total of 16 sessions were conducted once a week for 16 weeks, 60-90 minutes per session. The subjects were tested to evaluate their self-esteem, depression, and horticultural activities. The data were analyzed using the Mann-Whitney U test, Wilcoxon rank test, and Friedman test, which were nonparametric tests, conducted at a 95% significance level. Results: First, in the case of self-esteem, a significant difference was found between the groups, 20.00 points (SD = 5.69) in the control group, and 25.50 points (SD = 3.73) in the experimental group (p = .034). Second, in the case of depression, no statistically significant difference was found in the posttest. Finally, in the case of the horticultural activity evaluation, the scores of most variables gradually and significantly increased during the program [Verbal interaction during activity (p = .006), Self-concept and identity (p = .006), Need-drive adaptation (p < .001), Interpersonal and social relations (p < .001)]. Conclusion: These results support that the horticultural therapy program could help the elderly improve psychological relaxation, emotional stability, and social relationships. In order to generalize the results, it is suggested to increase the number of subjects or conduct additional repetitive experiments in further research.

CNN-based Adaptive K for Improving Positioning Accuracy in W-kNN-based LTE Fingerprint Positioning

  • Kwon, Jae Uk;Chae, Myeong Seok;Cho, Seong Yun
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.11 no.3
    • /
    • pp.217-227
    • /
    • 2022
  • In order to provide a location-based services regardless of indoor or outdoor space, it is important to provide position information of the terminal regardless of location. Among the wireless/mobile communication resources used for this purpose, Long Term Evolution (LTE) signal is a representative infrastructure that can overcome spatial limitations, but the positioning method based on the location of the base station has a disadvantage in that the accuracy is low. Therefore, a fingerprinting technique, which is a pattern recognition technology, has been widely used. The simplest yet widely applied algorithm among Fingerprint positioning technologies is k-Nearest Neighbors (kNN). However, in the kNN algorithm, it is difficult to find the optimal K value with the lowest positioning error for each location to be estimated, so it is generally fixed to an appropriate K value and used. Since the optimal K value cannot be applied to each estimated location, therefore, there is a problem in that the accuracy of the overall estimated location information is lowered. Considering this problem, this paper proposes a technique for adaptively varying the K value by using a Convolutional Neural Network (CNN) model among Artificial Neural Network (ANN) techniques. First, by using the signal information of the measured values obtained in the service area, an image is created according to the Physical Cell Identity (PCI) and Band combination, and an answer label for supervised learning is created. Then, the structure of the CNN is modeled to classify K values through the image information of the measurements. The performance of the proposed technique is verified based on actual data measured in the testbed. As a result, it can be seen that the proposed technique improves the positioning performance compared to using a fixed K value.

Building guidance-sign system to improve efficiency of waste separate collection at movie theatres - Focusing on Megabox Movie Theater in Seoul - (국내 영화관의 효율적인 쓰레기 분리수거 촉진을 위한 사인 디자인 체계 연구 - 메가박스 사례를 중심으로 -)

  • Paik, Jinkyung;Hwang, Sangmi;Chun, Eunyoung
    • Design Convergence Study
    • /
    • v.14 no.4
    • /
    • pp.53-64
    • /
    • 2015
  • The purpose of this research is to examine and find solutions with garbage problems in movie theaters for the betterment of pleasant environment to customers. The object of investigation includes three most popular movie theaters in Seoul. Analyzing current status of separating garbage and guidance notice was carried out. Also investigation of awareness on separating garbage and guidance notice has been done. The findings on inquiry are as follows. Customers tend not to separate garbage and guidance notice was not as effective. Also, separate garbage collection was very ineffective especially the food garbage. We carried out investigation on placement of guidance notice regarding recycling bin. We tried to find solutions for this problem and proposed better design. This design is emphasized on the use of particular space only. In addition, this design is focused mainly on one the three movie theaters for integration of identity. Through this design, it ought to provide clean environment and reduces inefficiencies regarding financial and time.

Verification of VIIRS Data using AIS data and automatic extraction of nigth lights (AIS 자료를 이용한 VIIRS 데이터의 야간 불빛 자동 추출 및 검증)

  • Suk Yoon;Hyeong-Tak Lee;Hey-Min Choi;;Jeong-Seok Lee;Hee-Jeong Han;Hyun Yang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.104-105
    • /
    • 2023
  • 해양 관측과 위성 원격탐사를 이용하여 시공간적으로 다양하게 변하는 생태 어장 환경 및 선박 관련 자료를 획득할 수 있다. 이번 연구의 주요 목적은 야간 불빛 위성 자료를 이용하여 광범위한 해역에 대한 어선의 위치 분포를 파악하는 딥러닝 기반 모델을 제안하는 것이다. 제안한 모델의 정확성을 평가하기 위해 야간 조업 어선의 위치를 포함하고 있는 AIS(Automatic Identification System) 정보와 상호 비교 평가 하였다. 이를 위해, 먼저 AIS 자료를 획득 및 분석하는 방법을 소개한다. 해양안전종합시스템(General Information Center on Maritime Safety & Security, GICOMS)으로부터 제공받은 AIS 자료는 동적정보와 정적정보로 나뉜다. 동적 정보는 일별 자료로 구분되어있으며, 이 정보에는 해상이동업무식별번호(Maritime Mobile Service Identity, MMSI), 선박의 시간, 위도, 경도, 속력(Speed over Ground, SOG), 실침로(Course over Ground, COG), 선수방향(Heading) 등이 포함되어 있다. 정적정보는 1개의 파일로 구성되어 있으며, 선박명, 선종 코드, IMO Number, 호출부호, 제원(DimA, DimB, DimC, Dim D), 홀수, 추정 톤수 등이 포함되어 있다. 이번 연구에서는 선박의 정보에서 어선의 정보를 추출하여 비교 자료로 사용하였으며, 위성 자료는 구름의 영향이 없는 깨끗한 날짜의 영상 자료를 선별하여 사용하였다. 야간 불빛 위성 자료, 구름 정보 등을 이용하여 야간 조업 어선의 불빛을 감지하는 심층신경망(Deep Neural Network; DNN) 기반 모델을 제안하였다. 본 연구의결과는 야간 어선의 분포를 감시하고 한반도 인근 어장을 보호하는데 기여할 것으로 기대된다.

  • PDF

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments (이동통신 환경에서 임시 익명 아이디를 이용한 위치 불추적 서비스와 지불 프로토콜에 관한 연구)

  • 김순석;김성권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.78-92
    • /
    • 2003
  • In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.