• Title/Summary/Keyword: Thesis Data

Search Result 972, Processing Time 0.021 seconds

Big Signature Method for Plagiarism Detection (표절 탐지를 위한 비트 시그니처 기법)

  • Kim, Woosaeng;Kang, Kyucheol
    • Journal of Information Technology Applications and Management
    • /
    • v.24 no.1
    • /
    • pp.1-10
    • /
    • 2017
  • Recently, the problem of plagiarism has emerged as a big social issue because not only literature but also thesis become the target of plagiarism. Even the government requires conformation for plagiarism of high-ranking official's thesis as a standard of their ethical morality. Plagiarism is not just direct copy but also paraphrasing, rewording, adapting parts, missing references or wrong citations. This makes the problem more difficult to handle adequately. We propose a plagiarism detection scheme called a bit signature in which each unique word of document is represented by 0 or 1. The bit signature scheme can find the similar documents by comparing their absolute and relative bit signatures. Experiments show that a bit signature scheme produces better performance for document copy detection than existing similar schemes.

The Study Of Optimum Method About The Architecture, Construction, And Maintenance Through The Construction Of Zero Energy House (제로 에너지 하우스 구축을 통한 설계, 시공, 유지관리 최적 방안에 관한 연구 및 제안)

  • Kim, Sun-Geun;Kwon, Soon-Wook
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.11
    • /
    • pp.42-50
    • /
    • 2014
  • In the thesis, the case of zero energy house construction applied with various Active factors and Passive factors which is the real residence as a standard not a normal experimental residence was evaluated, analyzed, and organized. The thesis can be the base data to construct another similar case of zero energy house.

Research of method prevent to illegal use of Credit Card (신용카드 부정사용 거래 예방을 위한 대처 방안 연구)

  • Pu, Chang Hee;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.147-156
    • /
    • 2012
  • Most people in our society use credit card instead of cash or check, so credit card is very important economic method. Credit card supposed to be safe, but hackers hack credit card for illegal deal. Also hackers make fake credit card and issue fake credit card to other people. In this thesis it will study and analyze damage case for safe credit card deal. It will use safe credit card system to insert variety of information and data of using pattern in artificial intelligence network, so print out the possibility of risk and monitor the risk of credit card user's deal pattern, so if one of user's pattern is different than normal pattern, it will pop up message in consultant's screen. This thesis will study and suggest way of prevent from illegal deal and user friendly credit card checking system.

The Design and Implementation of Manhole Management System Using Wireless Communication (무선 통신을 이용한 맨홀 관리시스템 설계 및 구현)

  • Lee, Sangyoon;Lee, Yougkwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.53-61
    • /
    • 2017
  • How to manage manhole is to estimate the part without observation and maintain the sewer. To get the information about current flow rate, visiting and measuring specific manhole is positively necessary. Also, there are some problems that accurate measurement of flow rate is difficult and obtaining the information about real-time whole flow rate is impossible. This thesis will easily grasp the accurate location and type of manhole to solve the problems, and provide the manhole system conveying information through direct radio communication with a manhole cover to renewal information of manhole properly. Besides, it intends to save the information about management of waterworks, maintenance of facilities, data for flow rate, and structure of manhole. Using these, it is supposed to offer how to handle manhole. Thus, this thesis delivers the information to manhole and into central servers directly without wire and provides the system and management method for effective maintenance of manhole.

A study on the Visual Impact of Pavilions In Natural Landscapes (자연경과지 내에서 정자의 시각적 영향에 관한 연구)

  • 서주환
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.23 no.2
    • /
    • pp.17-28
    • /
    • 1995
  • The purpose of this thesis is to suggest basic objective data for landscape planning and design through the quantitative analysis of the visual impact of pavilion situated in natural landscapes. For this, naturality and visual preference scores of landscape s1ides were measured by questionnaires, visual volumes of pavilion in the natural landscape were evaluated using the Mesh analysis and images structure was analyzed by the factor analysis algorithm The results of this thesis can be summarized as follow. Landscape slides No. 27 and 9 were ranked more highly for naturality, and slides No.22, 28, 6 and 4 were ranked more highly for visual preference. Factors covering the spatial image of the natural landscape were found to be the evaluation, the tidiness and the space volume. By using the control method for the number of factors, T. V., were obtained as 59.0%. For all experimental landscape slides, the factors of evaluation and tidiness were found to be the main factors determining the naturality and visual preference. The naturality and actor scores and the visual preference and factor scores were found to exepress the regression relation.

  • PDF

The Study for Establishment of Security Threat Measures for Secure NFC Service (안전한 NFC 서비스 활용 활성화를 위한 보안 위협 대책 마련을 위한 고찰)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.4
    • /
    • pp.219-228
    • /
    • 2018
  • The utilization of NFC has been continuously increasing due to the spread of smart phones and the development of short-range wireless communication networks. However, it has been suggested that stability and security of convenient NFC short-range wireless communications can be unstable and problematic. The unstable causes for NFC are the lack of security technologies for NFC, the controversy about personal information infringement, and the lack of social awareness on security breach against data settlement. NFC service can be conveniently used by simply touching other NFC devices and NFC tags through the NFC device. This thesis analyzes that NFC authentication technology, which is convenient for user are one of the unstable causes of security of NFC. This thesis suggest that ministry should research countermeasures and promote how users can use NFC safely. It also suggests that users should have awareness when they use payment and authentication service through NFC to prevent from security threat.

Design and Implementation of Web Security Module for a Safe Data Transmission in Heterogeneous Systems (이기종 시스템에서 안전한 데이타 전송을 보장하는 웹 보안 모듈의 설계 및 구현)

  • Kim, Ki-Sung;Kim, Kwang;Heu, Shin
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1238-1246
    • /
    • 2005
  • This thesis is written with web security module for safe data transmission between heterogeneous systems(ex. OS). Web system has allowed users to have great convenience and a lot of information. Though web service business has been progressed much, because of the limitation of it's own system, lots of loss, derived from data spillage which is the weakest point of security, has also followed. Suggested security module is realized by two module. One for server security module for web server, the other is client security module for client. The security structure, suggested on this thesis guarantee safe data transmission by only simple installation of modules in clients and servers. for speed sensitive transmission between web server and browser, Triple-DES, symmetric encryption system suitable for fast encryption communication, is adapted. To solve problems caused from key management, Diffie-Hellman's key exchange algorithm is adapted. By this method, all symmetric encryption troubles from key distribution and management, speed could be work out a solution. And Diffie-Hellman type algorithm secures Authentication for safe data Protection.

R&D Monitoring and Novel Technology Exploration Concerning Research Area about Fire in High-rise Building (고층 건물 화재 관련 R&D 위상 분석 및 신기술 탐색 연구)

  • Shim, We;Choi, Jaekyung;Chung, Hyunsang;Heo, Yoseob;Seo, Seongho
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.23 no.2_2
    • /
    • pp.271-280
    • /
    • 2020
  • Due to the development of the urban economy, high-density buildings and skyscrapers have continued to increase in order to alleviate high population densities and to make efficient use of urban space. However, a fire in a high-rise building is a disaster that can lead to massive casualties and property damage because of the difficulty of firefighting and escaping. Various studies have been conducted on these high-rise buildings because they are sympathetic to these difficulties all over the world. In this paper, trends of researches and technologies related to fire in high-rise buildings are analyzed synthetically through thesis and patent data. In other words, we explored the trends of various studies that have been carried out so far through the thesis, and performed technical monitoring on actual implemented technology and newly implemented technologies through patent data. Through this research, we have studied the present and the future of technology for high-rise building fire.

Generation and Verification of a Real Estate Contract Digital Signature Based on XML Security (XML 보안 기반의 부동산 계약서 전자서명 생성 및 검증)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.147-153
    • /
    • 2008
  • Talking about reliability of I-commerce, the security services such as data integrity and non-repudiation are the most crucial elements. This thesis implemented the real estate contract digital signature system that makes this real estate E-commerce Possible. The technical background used in this thesis for the security services is XML (extensible Markup Language) signature technique, which is a signature technique that applies XML on the existing digital signature algorithm. The advantage of using XML signature technique is that it is very efficient since signing for the partial data is possible, and it is easy to apply to the XML-based I-commerce system which is most commonly used.

Design and Implementation of Integrated Query System for e-Business Registries (e-비즈니스 레지스트리 통합 질의 시스템 설계 및 구현)

  • 김계용;이규철
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.1
    • /
    • pp.127-146
    • /
    • 2003
  • With the spread of Internet, e-business using Internet technology is being actively developed and operated. Currently, on behalf of the international e-business framework, International standard such as ebXML and Web Service is being advanced. We are able to publish and search business information through ebXML and Web Service and then actual trading between partners is accomplished. By the way, it is Registry that play an important part in e-business. Registry is an e-business infrastructure for enabling building, deploying, and the discovery of business Information. We can do e-business through Registries dynamically and share the resources. Representatives of Registry are ebXML and UDDI used as an international standard. We will meet with some problems when using Registries. ebXML Is focused on B2B collaborations and Web Service Is focused on application integrations. So we must use ebXML and Web Service characteristically, and sometimes use all at need. ebXML and Web Service contain business information by Registry specific way. So When using the services offered by ebXML and Web Service, we should access each Registry by using Registry specific tools. This thesis intended to integrate business information from ebXML Registry and UDDI Registry to accomplish e-business conveniently This thesis defined the common data model as well as integrated query language for integrated access to ebXML and Web Service along with design and implementation of the system.

  • PDF