• Title/Summary/Keyword: Shared use

Search Result 683, Processing Time 0.027 seconds

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

A Comparative Study on the Influence of Creation Shared Value Activities on Continuous Use Intention in Korean-Chinese Library Big Data Service: Focusing on Brand Quality and Social Resistance

  • Dong, JingWen
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.129-137
    • /
    • 2019
  • In this paper, we propose the purpose of this study is to examine whether the library's creation shared value activities in China and Korea affect brand quality, social status, and the influence of each variable according to the Chinese and Korean groups. To achieve the purpose of this study, the survey was conducted using questionnaires to users who have used the Big Data Sharing Service in Korean and Chinese libraries. A total of 500 questionnaires were distributed to participants in the study, and 460 of the recovered questionnaire were used in the final analysis, which eliminated unfaithful responses. The data collected through the survey were analyzed as frequency analysis, reliability analysis, confirmed factor analysis, and structured model using statistical programs SPSS22 and AMOS22. The results of the research identified through the empirical analysis of this study are as follows. First, the CSV activities of the library's big data have a significant influence on the brand quality and social status. Second, brand quality and social resistance has a significant positive effect on continuous use intention. Third, the influence of the CSV activities in Korean and Chinese libraries has been found to be partly different. Through the conclusion and discussion section, the theoretical implications of this study, practical implications and in-depth discussions on the limitations of the study and its future direction were presented.

Contract-based Access Control Method for NFT Use Rights

  • Jeong, Yoonsung;Ko, Deokyoon;Seo, Jungwon;Park, Sooyong;Kim, Seong-Jin;Kim, Bum-Soo;Kim, Do-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.11
    • /
    • pp.1-11
    • /
    • 2022
  • In this paper, we propose an NFT(Non-Fungible Token)-based access control method for safely sharing data between users in blockchain environment. Since all data stored in the blockchain can be accessed by anyone due to the nature of the technology, it is necessary to control access except for authorized users when sharing sensitive data. For that, we generate each data as NFT and controls access to the data through the smart contract. In addition, in order to overcome the limitations of single ownership of the existing NFT, we separated the NFT into ownership and use rights, so that data can be safely shared between users. Ownership is represented as an original NFT, use rights is represented as a copied NFT, and all data generated as NFT is encrypted and uploaded, so data can be shared only through the smart contract with access control. To verify this approach, we set up a hypothetical scenario called Building Information Modeling (BIM) data trade, and deployed a smart contract that satisfies 32 function call scenarios that require access control. Also, we evaluated the stability in consideration of the possibility of decryption through brute-force attack. Through our approach, we confirmed that the data can be safely shared between users in blockchain environment.

Evaluation of Mobility and Safety of Operating an Overlap Phase on a Shared-Left-Turn Lane Using a Microscopic Traffic Simulation Model (미시교통시뮬레이션모형을 이용한 공용 좌회전 차로의 중첩현시운영의 이동성과 안전성 평가 연구)

  • Yun, Il-Soo;Han, Eum;Woo, Seok-Cheol;Yoon, Jung-Eun;Park, Sung-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.5
    • /
    • pp.15-26
    • /
    • 2012
  • Government agencies including the national police agency have executed diverse efforts including continuous improvements of traffic facilities and operation methods, education, enforcements in order to improve traffic operation systems; nevertheless there have been continuous criticisms on irrationality in traffic signal and road facility operation. One of the reasons may be the lack of systematic preliminary evaluations on various alternatives. However, there was no appropriate tool to evaluate the mobility and safety of thus alternatives in a systematic way. Therefore, this study proposes the systematic use of microscopic traffic simulation models as a comprehensive evaluation tool. In addition, this study verified the potential of using a microscopic traffic simulation model using the case of operating an overlap phase on a shared-left-turn lane through a systematic way where the evaluation was conducted through data collection, building networks, calibrating microscopic simulation models, producing performance measures, evaluating mobility and safety, and so on. As a result, the operation of overlap phase on a shared-left-turn lane showed no big difference from other operation scenarios such as leading left-turn on exclusive left turn lane in terms of mobility. However the operation of overlap phase on a shared-left-turn lane decreased safety by increasing potential conflicts.

Study on Social-consciousness about the folk Remedies of Oriental Medicine Doctors (민간요법에 대한 한의사의 의식형태 조사연구)

  • Oh Se Chang;Kwon Young Kyu;Kim Kwang Joong
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.17 no.1
    • /
    • pp.25-30
    • /
    • 2003
  • On the ground of researches in social consciousness about the folk remedies, both of them, people and oriental medicine doctors, feel strongly the relative importance and the necessity of the folk remedies. But the folk remedy had not groped for proper adoption and not shared in the benefits actually. Therefore the oriental medicine doctors present a direct guide for use, instead of leaving people to use improperly. And the oriental medicine doctors are in need of making a guide for efficient use of the folk remedies at the existing disease types.

The effects of using listening comprehension strategies on TOEIC listening comprehension and moderator model (듣기 전략 사용 선호도가 TOEIC 듣기 성취도에 미치는 영향과 매개 변인과의 관계)

  • Lee, Jeong-Ah
    • English Language & Literature Teaching
    • /
    • v.15 no.4
    • /
    • pp.345-364
    • /
    • 2009
  • This study attempts to provide a comprehensive framework for listening strategy use among university students in Korea in relation to TOEIC listening scores. In particular, this study tests whether motivation, based on the self-determination theory, mediates listening strategy use on listening comprehension (LC) process and whether reading comprehension ability moderates the use of listening strategy in LC achievement. One hundred seventy six freshmen students participated in the study during their first semester required English course. Self-report questionnaires were used to assess students' motivation and LC strategy use. The responses were statistically analyzed via the moderator and mediator model. The results indicate that internalized motivation mediates the use of listening strategy in LC achievement; however, reading comprehension skill doesn't affect students' use of listening strategies in relation to listening skill achievement. In other words, students who have internalized motivation were able to utilize listening strategies effectively in terms of achievement of the TOEIC listening skills. The findings of the current study offer in-depth understanding of the relationship among use of LC strategies, intrinsic motivation, and listening skill achievement shared by the mediator and moderator models.

  • PDF

Effective management method of OVSF code using Dynamic Common Channel at Inter-frequency/inter-system handover in UTRR (비동기 시스템의 Inter-frequency/inter-system handover에서 Dynamic Common Channel을 이용한 효율적인 OVSF(Orthogonal Variable Spreading Factor) code 이용 방안)

  • 이종원;구연상;유인호;예정화
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.13-16
    • /
    • 2000
  • This paper introduces a more effective usage of the limited OVSF cod in compressed mode which is used during inter-frequency/inter-system handover in UTRA(Universal mobile telecommunications system) Terrestrial Radio Access). The usager is to use dynamic common channel which is shared by several users during the compressed mode.

  • PDF

Quasi-Shared Output Buffered Switch (준 공유 출력 버퍼형 스위치 구조)

  • 남승엽;성단근;안윤영
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.283-286
    • /
    • 2000
  • One major drawback of conventional output buffered switches is that the speed of writing cells into output buffer should be N times faster than input link speed. This paper proposes a new output buffer switch that divides one output buffer into several buffers and virtually shares the divided buffers by using a distributor. The proposed switch makes it possible to reduce the memory speed. The proposed switch is evaluated in terms of the average cell latency compared with the input buffered switches which use the arbitration alogorithms, i.e., iSLIP or wrapped wave front arbiter(WWFA).

  • PDF

A low-power VLSI architecture of 4D TCM decoder for ADSL (ADSL용 4D TCM Decoder 저전력 구조 설계 연구)

  • 이금형;김재석
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.871-874
    • /
    • 1999
  • We propose a low complexity M-D(multidimensional) TCM decoder VLSI architecture for ADSL System. We use the shared subset decoder module by modifying the whole decoding procedure. We reduce power consumption by using the MSA (modulo set area) operation, which removes multiplication in 4D metric calculation. Also the proposed TCM decoder reduces chip area. It can be adopted in high-speed xDSL system.

  • PDF

A Hybrid Blockchain-based Identity Management Framework for Devices in Microgrid (마이크로그리드에서 장치들을 위한 하이브리드 블록 체인 기반 식별 관리 프레임워크)

  • Cabacas, Regin A.;Ra, In-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2019.05a
    • /
    • pp.7-8
    • /
    • 2019
  • This paper presents a hybrid blockchain-based Identity Management Framework for devices in Microgrid. It incorporates the use of a Public and Private Blockchain platform to store and authenticate Microgrid device identities. It also emphasizes the shared responsibility of the manufacturers to provide the first layer of authentication for the devices they produce. Identities of each device are stored in the private and public Blockchain and authenticated using physically unclonable functions (PUF) and cryptographic functions.

  • PDF