• Title/Summary/Keyword: Total Authentication

Search Result 51, Processing Time 0.025 seconds

A Study on the Status of Data Repositories in the Field of Geoscience and Ways to Obtain Coretrustseal Certification: Focusing on re3data.org and Coretrustseal best practices (Geoscience 분야 데이터 리포지터리 현황과 Coretrustseal 인증 획득 방안에 관한 연구 - re3data.org와 Coretrustseal 인증 모범사례를 중심으로 -)

  • Juseop Kim
    • Journal of Korean Library and Information Science Society
    • /
    • v.54 no.2
    • /
    • pp.89-110
    • /
    • 2023
  • A data repository is being used as a tool for sharing and preserving research data. This study was conducted to investigate the current status of data repositories and to propose methods for obtaining Coretrustseal certification. In order to achieve the purpose of the study, the current status of data repositories in the field of Geoscience was investigated at re3data.org, and 10 best practices that obtained Coretrustseal certification were analyzed among the repositories. First, as a result of identifying the current status of repositories, the United States, Germany, and Canada accounted for 66% of the total repositories by country, and in the case of CTS certification, the proportion of the United States, Europe, and Germany was 58%. Next, as a way to secure CTS certification, necessary details and requirements in terms of data policy, organizational infrastructure, and technical infrastructure were presented. It is hoped that the results of this study will be helpful in establishing and operating domestic data repositories and obtaining CTS certification.

PSS Movement Prediction Algorithm for Seamless hando (휴대인터넷에서 seamless handover를 위한 단말 이동 예측 알고리즘)

  • Lee, Ho-Jeong;Yun, Chan-Young;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.12 s.354
    • /
    • pp.53-60
    • /
    • 2006
  • Handover of WiBro is based on 802.16e hard handover scheme. When PSS is handover, it is handover that confirm neighbor's cell condition and RAS ID in neighbor advertisement message. Serving RAS transmits HO-notification message to neighbor RAS. Transmiting HO-notification message to neighbor RAS, it occurs many signaling traffics. Also, When WiBro is handover, It occurs many packet loss. Therefore, user suffer service degradation. LPM handover is supporting seamless handover because it buffers data packets during handover. So It is proposed scheme that predicts is LPM handover and reserves target RAS with pre-authentication. These schemes occur many signaling traffics. In this paper, we propose PSS Movement Prediction to solve signaling traffic. Target RAS is decided by old data in history cache. When serving RAS receives HO-notification-RSP message to target RAS, target RAS inform to crossover node. And crossover node bicast data packet. If handover is over, target RAS forward data packet. Therefore, It reduces signaling traffics but increase handover success rate. When history cache success, It decrease about 48% total traffic. But When history cache fails, It increase about 6% total traffic

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.

Quantitative Effectiveness Analysis of Vehicle Inspection (자동차검사제도의 정량적 효과분석)

  • Jo, Han-Seon;Sim, Jae-Ik;Kim, Jong-Ryong
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.3
    • /
    • pp.65-74
    • /
    • 2007
  • Vehicle inspection is a system to help all vehicles function safely through periodic maintenance. Vehicle inspections have been performed since 1962 in Korea by the government in order to reduce traffic accidents due to vehicle defects. Also, vehicle inspections may help protect citizens against uninsured vehicles and illegal vehicle remodeling by discovering and disclosing those vehicles. The prime objective of vehicle inspection is to guarantee all vehicles drive safely on the road by inspecting and fixing items which can affect traffic accidents. In addition, vehicle inspections may help to improve the public order related to vehicle operations and prevent crime through the confirmation of vehicle identity and authentication of ownership. Although there are many benefits of vehicle inspection. there are some negative opinions of the system. In this study, a methodology to analyze the effectiveness of the vehicle inspection system quantitatively in terms of traffic safety was developed. According to the developed methodology. accidents were reduced by 23.735, which is 11% of the total number of accidents in 2005.

The Effects of Information Transfer of Personal Information Security Breaches (개인정보 유출의 정보전이 효과)

  • Park, Sang-Soo;Lee, Hyun-Chul
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.193-224
    • /
    • 2018
  • Purpose Targeting Korean companies listed on Korean securities markets (i.e., KOSPI and KOSDAQ markets), this study aims to shed lights the effects of personal information security breaches on stock prices of information security companies. Interestingly, this study is, to the best of our knowledge, the first to examine the information transfer effect on personal information security breaches of companies. Design / Methodology /Approach To examine the information transfer effect of personal information security breaches, our study employs the event study commonly used in financial studies. To this end, we investigate a variety of events of personal information security breaches of companies listed on the KOPSI stock market and the KOSDAQ market. We collect the total samples of one hundred and twelve with forty seven of events of personal information security breaches by thirty companies and sixty five of information security companies. Findings The principal findings from the empirical study are as follows. First, for companies of personal information security breaches, our event study presents the significantly negative AAR (averaged abnormal return) value on the event day at the 5 % level and the highly significant negative CAAR(cumulative averaged abnormal return) value on the event day and the day after the event day at the 1 % level. The results suggest that personal information breaches significantly contribute to an decrease in value of the information breached companies. The cross sectional regressions in this study estimate the significantly negative coefficient for the ME/BE variable, the proxy for a growth opportunity at the 5 % level. This suggests a reverse relation between the growth opportunity of companies and their value. As for the various samples of the information security companies categorized by physical security, network and system security, security application software, code authentication, system integration, we find the significantly positive AAR on the day after the event day at the 5% level, only for the network and system security-companies. This addresses that the information transfer effect followed by personal information breaches is uniquely observable for companies categorized into network and system companies. The regressions for the network and system companies estimate the significantly positive coefficient for the NS dummy variable (i.e., the dummy of the network and system security companies) at the standard level. This allows us to identify appropriate times needed to make the information transfer effect realized from personal information breached companies to information security companies.

A Study on the Satisfaction Recognition of the Employees of the Social Enterprise in JeollaNamdo (전남지역 사회적기업종사자의 만족도인식 연구)

  • Jeong, Mun-Gyung
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.133-140
    • /
    • 2016
  • The study has been implemented for finding out a revitalization of the social enterprise to be continuously developed. In this research, social enterprise employees residing in JeollaNamdo were selected as the research members. The polled papers had 210 copies of total and 180 copies of recovery. The response results were written as a rule of their own way with advanced visit to them explaining how to write down. The collected data were analysed with T-test and ANOVA. As a result of the research, the system effectiveness of social enterprise is shown to influence the satisfaction of employees. Therefore, it is shown that the certification system and priority purchase system of local government can be effective. Second, it is shown that the satisfaction of employees of the social enterprise influences the satisfaction of employees. Therefore, it is shown that the need of finding out a new business item for a social enterprise to grow influences positively on the satisfaction of employees. Third, operation difficulty of the social enterprise is not shown to influence the satisfaction of employees. In other words, the satisfaction of employees is not influenced by a difficulty arising from not receiving the official recognition from local government on the social enterprise.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

A Study on the Effect of Social Enterprises Characterics on Financial and Social Performance (사회적기업의 특성이 재무적 성과와 사회적 성과에 미치는 영향: CEO 특성을 중심으로)

  • Hwang, Sooo-Young;Kim, Yong-Duck
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2018.11a
    • /
    • pp.165-175
    • /
    • 2018
  • Since the 1997 financial crisis, large scale unemployment and poverty have become serious, and public and social job creation projects have been carried out. However, with the limitations of low-wage and short-term jobs, the need for long-term and high quality jobs gradually began to attract attention. In recent years, social enterprises have grown both quantitatively and qualitatively and interest in social enterprises has increased. And also it is interested in the determinants of success and failure of social enterprises in the academic field. In this study, we examined the effects of social enterprise characteristics on financial and social performance, and we analyzed empirically by using social enterprises registered in the Korea Social Enterprise Agency. The financial performance of the social enterprise is measured by the net income ratio, operating income ratio, and the return on asset. The social performance of the social enterprise is measured by total number of workers and the employment rate of the vulnerable social groups. The characteristics of the social enterprise include the CEO characteristics (gender, age, experience in operating the social enterprise), the firm size, and the elapsed time of the authentication. The results of the empirical analysis are as follows. First, as a result of analysis for the effect on financial performance, we found that the financial performance have a statistically significant positive relationship with firm size, organizational form, government subsidies and capital adequacy ratio. And it is found that the social performance have a statistically significant negative relationship with CEO age, credit debt dependence. Second, as a result of analysis for the effect on social performance, we foumd that total number of workers have a significant positive relationships with CEO gender, CEO age, and firm size, government subsidies, while total number of workers have a significant negative relationship with certification type and industry dummy. On the other hand, the employment rate of the vulnerable social groups have a siginificant positive relationship with CEO gender and certification type and It have not statistically significant relationship with the government subsidies and the firm size.

  • PDF

The Impact of Social Enterprises on the Financial and Social Performance: An Empirical Analysis in Korea (재무적·사회적 성과를 결정하는 사회적기업의 특성)

  • Hwang, Soo-Young;Kim, Yong-Deok;Koo, Inhyouk
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.14 no.2
    • /
    • pp.61-72
    • /
    • 2019
  • Since the financial crisis in 1997, large scale unemployment and poverty have become serious, but there has been a surge in public and social job creation projects. However, with the limitations of low-wage and short-term jobs, the need for long-term, high quality jobs gradually began to garner attention. In recent years, social enterprises have grown both quantitatively and qualitatively and interest in social enterprises has increased; more specifically, scholars are interested in the determinants of success and failure of social enterprises in the academic field. In this study, we examined the effects of social enterprise characteristics on financial and social performance. In particular, we empirically analyzed social enterprises registered in the Korea Social Enterprise Agency. The financial performance of the social enterprise was measured using the net income ratio, operating income ratio, and the return on asset. The social performance of the social enterprise was measured by the total number of workers and the employment rate of vulnerable social groups. The characteristics of the social enterprise included CEO characteristics (gender, age, experience in operating the social enterprise), firm size, and the elapsed time of authentication. The results of the empirical analysis are as follows. First, as a result of analysis for the effect on financial performance, we found that the financial performance has a statistically significant, positive relationship with firm size, organizational form, government subsidies, and capital adequacy ratio. And we found that the social performance has a statistically significant, negative relationship with CEO age and credit debt dependence. Second, as a result of analysis for the effect on social performance, we found that the total number of workers had a significant, positive relationship with CEO gender and CEO age, as well as firm size, government subsidies; whereas the total number of workers had a significant, negative relationship with certification type and industry dummy. Comparatively, the employment rate of the vulnerable social groups had a significant, positive relationship with CEO gender and certification type, but there was no statistically significant relationship with the government subsidies or firm size.

Chemical Composition and Physiological Activity of Opuntia ficus-indica depending on Different Cultivation Regions (재배지역별 보검선인장 줄기의 영양성분 및 생리활성 평가)

  • Lee, Sang Hoon;Jeong, Yun Sook;Song, Jin;Hwang, Kyung-A;Noh, Geon Min;Hwang, In Guk
    • The Korean Journal of Food And Nutrition
    • /
    • v.29 no.4
    • /
    • pp.521-528
    • /
    • 2016
  • This study was conducted to investigate changes in the proximate composition, antioxidant activities, and ${\alpha}$-glucosidase inhibitory activity of Opuntia ficus-indica (OFI) cladodes cultivated in Jeju (JJ1, JJ2, JJ3) and Jeonnam (JN1, JN2). The difference in the proximate composition (crude protein, lipid and ash content) of OFI between the two regions was not significant. Ca, Mg and Na were the major mineral components of OFI. The ascorbic acid content of OFI ranged from 57.87 to 143.72 mg/100 g. A 70% ethanol extract was used to investigate the antioxidant content and activity as well as the ${\alpha}$-glucosidase inhibitory activity. The total polyphenol and flavonoid contents of OFI were 38.69~55.29 and 3.33~4.03 mg/g, respectively. The antioxidant activities based on the DPPH and ABTS free radical scavenging assays were 45.19~61.52% and 39.15~51.96%, respectively, at a concentration of 1 mg/mL. The inhibitory activity of OFI extracts against rat intestinal ${\alpha}$-glucosidase was 29.72~45.73% at 1 mg/mL concentration, and JN1 showed the highest ${\alpha}$-glucosidase inhibitory activity. This information could be very useful for authentication of Opuntia species with the highest potential as sources of nutritional and therapeutic elements.