• Title/Summary/Keyword: User Identification

Search Result 577, Processing Time 0.034 seconds

An Advanced Scheme for Searching Spatial Objects and Identifying Hidden Objects (숨은 객체 식별을 위한 향상된 공간객체 탐색기법)

  • Kim, Jongwan;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1518-1524
    • /
    • 2014
  • In this paper, a new method of spatial query, which is called Surround Search (SuSe) is suggested. This method makes it possible to search for the closest spatial object of interest to the user from a query point. SuSe is differentiated from the existing spatial object query schemes, because it locates the closest spatial object of interest around the query point. While SuSe searches the surroundings, the spatial object is saved on an R-tree, and MINDIST, the distance between the query location and objects, is measured by considering an angle that the existing spatial object query methods have not previously considered. The angle between targeted-search objects is found from a query point that is hidden behind another object in order to distinguish hidden objects from them. The distinct feature of this proposed scheme is that it can search the faraway or hidden objects, in contrast to the existing method. SuSe is able to search for spatial objects more precisely, and users can be confident that this scheme will have superior performance to its predecessor.

Analyzing Effects on Firms' Market Value of Personal Information Security Breaches (개인정보 유출이 기업의 주가에 미치는 영향)

  • Kim, JeongYeon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.1-12
    • /
    • 2013
  • With the increases of requirement for user identification in Internet services, we should let the service companies know my personal information. If the shared personal information with them are used in not-allowed area or delivered to un-authorized persons, we may have practical harms in several fields such as financial related operations. Korean Government has introduced new management method for personal information, but it is not hard to find the personal information management issues from Korean news papers. The proper measurement should be delivered to related companies to help them to decide investment for security. This paper review the indirect measurement method of demages by check the stock prices of related company for personal information management issue. We check the relationship between change of stock price and the information management issue. The result shows there are no changes in stock market. Korean government added strong regulations for personal information management though. To prevent further personal information issues, we should recognize the indirect damages properly and let the company pay higher reparations for any personal information abuse.

An Investigation on Non-Relevance Criteria for Image in Failed Image Search (이미지 검색 실패에 나타난 비적합성 평가요소 규명에 관한 연구)

  • Chung, EunKyung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.50 no.1
    • /
    • pp.417-435
    • /
    • 2016
  • Relevance judgment is important in terms of improving the effectiveness of information retrieval systems, and it has been dominant for users to search and use images utilizing internet and digital technologies. However, in the field of image retrieval, there have been only a few studies in terms of identifying relevance criteria. The purpose of this study aims to identify and characterize the non-relevance criteria from the failed image searches. In order to achieve the purpose of this study, a total of 135 participants were recruited and a total of 1,452 criteria items were collected for this study. Analyses and identification on the data set found thirteen criteria such as 'topicality', 'visual content', 'accuracy', 'visual feature', 'completeness', 'appeal to user', 'focal point', 'bibliographic information', 'impression', 'posture', 'face feature', 'novelty', and 'time frame'. Among these criteria, 'visual content' and 'focal point' were introduced in this current study, while 'action' criterion identified in previous studies was not shown in this current study. When image needs and image uses are analyzed with these criteria, there are distinctive differences depending on different image needs and uses.

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.

Design of the Covered Address Generation using the Super Increasing Sequence in Wireless Networks (무선 네트워크에서의 초증가 수열을 통한 주소 은닉 기법 설계)

  • Choun, Jun-Ho;Kim, Sung-Chan;Jang, Kun-Won;Do, Kyung-Hwa;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.411-416
    • /
    • 2007
  • The General security method of wireless network provides a confidentiality of communication contents based on the cryptographic stability against a malicious host. However, this method exposes the logical and physical addresses of both sender and receiver, so transmission volume and identification of both may be exposed although concealing that content. Covered address scheme that this paper proposes generates an address to which knapsack problem using super increasing sequence is applied, and replaces the addresses of sender and receiver with addresses from super increasing sequence. Also, proposed method changes frequently secret addresses, so a malicious user cannot watch a target system or try to attack the specific host. Proposed method also changes continuously a host address that attacker takes aim at. Accordingly, an attacker who tries to use DDoS attack cannot decide the specific target system.

Face Recognition Evaluation of an Illumination Property of Subspace Based Feature Extractor (부분공간 기반 특징 추출기의 조명 변인에 대한 얼굴인식 성능 분석)

  • Kim, Kwang-Soo;Boo, Deok-Hee;Ahn, Jung-Ho;Kwak, Soo-Yeong;Byun, Hye-Ran
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.681-687
    • /
    • 2007
  • Face recognition technique is very popular for a personal information security and user identification in recent years. However, the face recognition system is very hard to be implemented due to the difficulty where change in illumination, pose and facial expression. In this paper, we consider that an illumination change causing the variety of face appearance, virtual image data is generated and added to the D-LDA which was selected as the most suitable feature extractor. A less sensitive recognition system in illumination is represented in this paper. This way that consider nature of several illumination directions generate the virtual training image data that considered an illumination effect of the directions and the change of illumination density. As result of experiences, D-LDA has a less sensitive property in an illumination through ORL, Yale University and Pohang University face database.

Study on Utilization between Layout Plan Elements of Privately Owned Public Space and Land Shape in Apartment type Factory -Focusing on apartment type factory in western Seoul- (아파트형공장의 대지 형태와 공개공지 배치계획요소에 관한 연구 -서울시 서부지역 아파트형공장의 사례를 중심으로-)

  • Lee, Sang-Kyoon;Oh, Seok-Heon;Oh, Joon-Gul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.2
    • /
    • pp.1140-1148
    • /
    • 2014
  • Due to Seoul city population growth, urbanization and industrial structure change, apartment type factory was introduced. The purpose of this study, by analyzing the relationship between land shape of apartment type factory and privately owned public space, draw the elements to increase publicness. Draw land shape and private owned public space layout plan elements with advanced research and analysis through cases. As a result of analysis, land shape of the square and the front-side connected arrangement of the privately owned public space are good for the increase of publicness, rectangular land shape good that front-side connected arrangement and front-back arrangement, to consider in terms of user identification and access via the link should be good.

Chemical Risk Assessment Screening Tool of a Global Chemical Company

  • Tjoe-Nij, Evelyn;Rochin, Christophe;Berne, Nathalie;Sassi, Alessandro;Leplay, Antoine
    • Safety and Health at Work
    • /
    • v.9 no.1
    • /
    • pp.84-94
    • /
    • 2018
  • Background: This paper describes a simple-to-use and reliable screening tool called Critical Task Exposure Screening (CTES), developed by a chemical company. The tool assesses if the exposure to a chemical for a task is likely to be within acceptable levels. Methods: CTES is a Microsoft Excel tool, where the inhalation risk score is calculated by relating the exposure estimate to the corresponding occupational exposure limit (OEL) or occupational exposure band (OEB). The inhalation exposure is estimated for tasks by preassigned ART1.5 activity classes and modifying factors. Results: CTES requires few inputs. The toxicological data, including OELs, OEBs, and vapor pressure are read from a database. Once the substance is selected, the user specifies its concentration and then chooses the task description and its duration. CTES has three outputs that may trigger follow-up: (1) inhalation risk score; (2) identification of the skin hazard with the skin warnings for local and systemic adverse effects; and (3) status for carcinogenic, mutagenic, or reprotoxic effects. Conclusion: The tool provides an effective way to rapidly screen low-concern tasks, and quickly identifies certain tasks involving substances that will need further review with, nevertheless, the appropriate conservatism. This tool shows that the higher-tier ART1.5 inhalation exposure assessment model can be included effectively in a screening tool. After 2 years of worldwide extensive use within the company, CTES is well perceived by the users, including the shop floor management, and it fulfills its target of screening tool.

Development of the Computer-Assisted HACCP System Program and Developing HACCP-Based Evaluation Tools of Sanitation for Institutional Foodservice Operations (단체급식의 HACCP 전산프로그램 및 위생관리 평가도구 개발)

  • 이정숙;홍희정;곽동경
    • Korean Journal of Community Nutrition
    • /
    • v.3 no.4
    • /
    • pp.655-667
    • /
    • 1998
  • The Computer-assisted Hazard Analysis and Critical Control Point(HACCP) program has been developed for a systematic implementation of HACCP principles in identifying, assessing and controlling hazards in institutional foodservics operations. The HACCP-based sanitation evaluation tool has been developed, based on the results of the computerized assisted HACCP program in 4 service sites of C contracted foodservice company, including 2 general hospitals with 650-beds, one office operation of 400 meals per day, and one factory foodservice of 1,000 meals per day. All database files and processing programs were created by using Unify Vision tool with Windows 95 of user environments. The results of this study can be summarized as follows : 1. This program consists of the pre-stage for HACCP study and the implementation stage of the HACCP system. 1) The pre-stage for HACCP study includes the selection of menu items, the development of the HACCP recipe, the construction of product flow diagrams, and printing the HACCP recipes and product flow diagrams. 2) The implementation of the HACCP system includes the identification of microbiological hazards, the determination of critical control points based on the decision tree base files. 3) The HACCP-based sanitation evaluation tool consisted of 3 dimensions of time-temperature relationship, personal hygiene, and equipment-facility sanitation. The Cronbach's alphas calculation indicated that the tool was reliable. The results showed that the focus groups rated the mean of importance in time-temperature relationship, personal hygiene, and equipment-facility sanitation as 4.57, 4.59 and 4.55 respectively. Based on the results, this HACCP-based sanitation evaluation tool was considered as an effective tool for assuring product quality. This program will assist foodservice managers to encourage a standardized approach in the HACCP study and to maintain a systematic approach for ensuring that the HACCP principles are applied correctly.

  • PDF

A Model for Self-Authentication Based on Decentralized Identifier (탈중앙화 신원증명에 기반한 본인 인증 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.66-74
    • /
    • 2021
  • With the development of the Internet, user authentication technology that proves me online is improving. Existing ID methods pose a threat of personal information leakage if the service provider manages personal information and security is weak, and the information subject is to the service provider. In this study, as online identification technology develops, we propose a DID-based self-authentication model to prevent the threat of leakage of personal information from a centralized format and strengthen sovereignty. The proposed model allows users to directly manage personal information and strengthen their sovereignty over information topics through VC issued by the issuing agency. As a research method, a self-authentication model that guarantees security and integrity is presented using a decentralized identifier method based on distributed ledger technology, and the security of the attack method is analyzed. Because it authenticates through DID Auth using public key encryption algorithms, it is safe from sniffing, man in the middle attack, and the proposed model can replace real identity card.