• Title/Summary/Keyword: confidential data

Search Result 147, Processing Time 0.025 seconds

A Study on Preference for telecommuting Center design Criteria (텔레커뮤팅 센터의 실내공간계획요소에 대한 선호 조사 연구)

  • 하미경;권미연
    • Korean Institute of Interior Design Journal
    • /
    • no.20
    • /
    • pp.91-97
    • /
    • 1999
  • Telecommuting becomes a new form of work according to the development of information technology. Therefore, the purpose of this study is to provide basic data for the interior space planning of telecommuting centers by means of surveying office workers' opinions. The major findings of this research are as follows. The opinion about whether to use telecommuting center if provided is showed highly positively. In the matter of space type of telecommuting center, 'mixing type I (open plan office but division with high partition)' is the most preferred, the next, is 'closed type'. The most preferred type of workstation is 'independent type', the next is 'X type' and the third is 'link type'. Preferred partition height is '1,300-1,500mm'. When planning telecommuting center, the most important element of space plan is 'size and layout of workstation' and the second is 'private space for confidential work'. In public workplace, the most important element 'refreshment space', and the second one is 'mailing system'.

  • PDF

Use of Duckweed (Lemna gibba) Growth-Inhibition Test to Evaluate the Toxicity of Chromate in Korea (환경독성 평가를 위한 좀개구리밥(Lemna gibba)의 성장저해시험법에 관한 연구)

  • 김은주;이성규
    • Environmental Analysis Health and Toxicology
    • /
    • v.16 no.4
    • /
    • pp.205-209
    • /
    • 2001
  • Lemna gibba was newly cultured and provided for toxicity tests. In this study, the chromate toxicity tests for Lemna gibba were performed according to the OECD Lemna growth inhibition test guideline. The test species was Lemna gibba, and the tests were repeated 5 times. To evaluate the toxicity test results, the average specific growth rate, EC50, 95% confidential limit, and variances were calculated. The test performance was analyzed by the doubling time and test statistics. The average values of EC50 data determined by logistic and linear interpolation curves were 25.9 ppm and 35.4 ppm respectively (by chromate concentration). The doubling time of all controls were below 2.5 day, so all tests passed the criteria for the test performance. This study introduced a new test method, Lemna growth inhibition test, which is provided for the hazard assessment of aquatic environment.

  • PDF

A novel architecture for localized key management in wireless sensor networks

  • Raazi, Syed Muhammad Khaliq-ur-Rahman;Lee, Sung-Young;Song, Young-Jae;Lee, Young-Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1091-1092
    • /
    • 2007
  • Wireless sensor networks (WSN) can be used in military surveillance, in which highly confidential data needs to be transmitted. In effect, security becomes a very important aspect in such networks. We present an efficient key management scheme for WSN. Our scheme is an improvement over SHELL [1] and mostly relies on communication within a cluster of nodes.

  • PDF

Analysis of Radio Environments Allocated to HF Ocean Surface Radar in Korea (고주파(HF) 해양레이더 운용에 분배된 국내 주파수 전파 환경 분석)

  • Song, Kyu-Min
    • Ocean and Polar Research
    • /
    • v.38 no.4
    • /
    • pp.325-330
    • /
    • 2016
  • Partial high frequency bands were allocated to the operation of ocean surface radars that monitor the sea surface currents and waves in WRC-12. On that basis, government-related organizations revised the table of domestic frequency allocation. In order to study radio environments in the allocated bands for ocean radar, tests of the radio signal spectrum were carried at 7-sites using the receiver of the ocean surface radar system operated with a shutdown of the transmitter for 10-60 min. The results showed that no serious radio noises occur at 25 and 43 MHz bands, indicating a good radio environment for the ocean surface radar operation. However, at 13 MHz band, it was difficult to generate stable and confidential data from the ocean surface radar because serious radio noises occurred continuously.

High Capacity Information Hiding Method Based on Pixel-value Adjustment with Modulus Operation

  • Li, Teng;Zhang, Yu;Wang, Sha;Sun, Jun-jie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1521-1537
    • /
    • 2021
  • Through information hiding technique, secret message can be hidden in pictures. Stego-image quality and hiding capacity are two important metrics for information hiding. To enhance these metrics, many schemes were proposed by scholars in recent years. Some of them are effective and successful, but there is still a room for further improvement. A high capacity information hiding scheme (PAMO, Pixel-value Adjustment with Modulus Operation Algorithm) is introduced in this paper. PAMO scheme uses pixel value adjustment with modulus operation to hide confidential data in cover-image. PAMO scheme and some referenced schemes are implemented in Python and experiments are carried out to evaluate their performance. In the experiments, PAMO scheme shows better performance than other methods do. When secret message length is less than 72000 bits, the highest hiding capacity of PAMO can reach 7 bits per pixel, at the same time the PSNR of stego-images is greater than 30 dB.

Development of Prediction Model of Subcontract's Bidding-Ratio for Private Apartment Projects (민간 공동주택 하도급 낙찰률 예측모델 개발)

  • Jang, Ki-Suk;Koo, Kyo-Jin
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2021.11a
    • /
    • pp.250-251
    • /
    • 2021
  • A subcontract work order is the basis of the construction process and consists of the root and trunk of the construction industry. The construction process through a subcontract work order is an important element of project success, and it is the basic unit of creating profit in the construction industry. Therefore, correct analysis and forecasting of subcontract work orders allow correct estimation of construction cost and profit which is the foundation of corporate decision making. This study has started to provide predictions of subcontractor's bidding-ratio for decision-making. Since the actual project data has been used in this study, the contribution level of the model is highly expected in actual field. The statistical confidential level of adjusted decision coefficient is concluded low because of limited sample numbers. However, its accuracy and confidence level can be increased through increasing sample numbers, considering more variables, and studying of reducing error.

  • PDF

Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques

  • Gadde, Swetha;Amutharaj, J.;Usha, S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.342-347
    • /
    • 2022
  • On Cloud, the important data of the user that is protected on remote servers can be accessed via internet. Due to rapid shift in technology nowadays, there is a swift increase in the confidential and pivotal data. This comes up with the requirement of data security of the user's data. Data is of different type and each need discrete degree of conservation. The idea of data security data science permits building the computing procedure more applicable and bright as compared to conventional ones in the estate of data security. Our focus with this paper is to enhance the safety of data on the cloud and also to obliterate the problems associated with the data security. In our suggested plan, some basic solutions of security like cryptographic techniques and authentication are allotted in cloud computing world. This paper put your heads together about how machine learning techniques is used in data security in both offensive and defensive ventures, including analysis on cyber-attacks focused at machine learning techniques. The machine learning technique is based on the Supervised, UnSupervised, Semi-Supervised and Reinforcement Learning. Although numerous research has been done on this topic but in reference with the future scope a lot more investigation is required to be carried out in this field to determine how the data can be secured more firmly on cloud in respect with the Machine Learning Techniques and cryptographic methods.

New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption

  • Mohammed Abdul Majeed;Rossilawati Sulaiman;Zarina Shukur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.170-191
    • /
    • 2024
  • The transmission of confidential data using cover media is called steganography. The three requirements of any effective steganography system are high embedding capacity, security, and imperceptibility. The text file's structure, which makes syntax and grammar more visually obvious than in other media, contributes to its poor imperceptibility. Text steganography is regarded as the most challenging carrier to hide secret data because of its insufficient redundant data compared to other digital objects. Unicode characters, especially non-printing or invisible, are employed for hiding data by mapping a specific amount of secret data bits in each character and inserting the character into cover text spaces. These characters are known with limited spaces to embed secret data. Current studies that used Unicode characters in text steganography focused on increasing the data hiding capacity with insufficient redundant data in a text file. A sequential embedding pattern is often selected and included in all available positions in the cover text. This embedding pattern negatively affects the text steganography system's imperceptibility and security. Thus, this study attempts to solve these limitations using the Part-of-speech (POS) tagging technique combined with the randomization concept in data hiding. Combining these two techniques allows inserting the Unicode characters in randomized patterns with specific positions in the cover text to increase data hiding capacity with minimum effects on imperceptibility and security. Format-preserving encryption (FPE) is also used to encrypt a secret message without changing its size before the embedding processes. By comparing the proposed technique to already existing ones, the results demonstrate that it fulfils the cover file's capacity, imperceptibility, and security requirements.

Work Pressure and Safety Behaviors among Health Workers in Ghana: The Moderating Role of Management Commitment to Safety

  • Amponsah-Tawaih, Kwesi;Adu, Michael Appiah
    • Safety and Health at Work
    • /
    • v.7 no.4
    • /
    • pp.340-346
    • /
    • 2016
  • Background: safety and healthy working environment has received numerous research attention over the years. Majority of these researches seem to have been conducted in the construction industry, with little attention in the health sector. Nonetheless, there are couple of studies conducted in Africa that suggest pressure in hospitals. Therefore the aim of the study was to examine how pressure influence safety behavior in the hospitals. With reference to the relevance of safety behavior in primary health care delivery, there was the need for the study. Method: Data was obtained from 422 public hospital employees. Respondents were assured that all information would be kept confidential to increase the response rate and acquire more accurate information. Collection of questionnaires from participants took four weeks (20 working days), after which the data was analyzed. Results: The result of the study showed that work pressure correlated negatively with safety behavior. General safety climate significantly correlated positively with safety behavior and negatively with work pressure, although the effect size for the latter was smaller. Hierarchical regression analysis showed management commitment to safety to moderate the relationship between work pressure and safety behavior. Conclusion: When employees perceive safety communication, safety systems and training to be positive, they seem to comply with safety rules and procedures than voluntarily participate in safety activities.

The Study on the Pregnancy Experiences of Unmarried Mothers (미혼모의 임신경험에 관한 탐색적 연구)

  • Han Young-Ran;Yang Soon-Ok
    • Journal of Korean Public Health Nursing
    • /
    • v.11 no.2
    • /
    • pp.194-208
    • /
    • 1997
  • The pregnancy experiences of unmarried mother threatens womens' health by social prejudices. This study was motivated by the fact that nurses do not have much understanding of the pregnancy experiences of unmarried mother and cannot provided fully supportive care of them. This study was done to understand the subjective expriences of pregnancy by unmarried mother. To do this, the grounded theory methodology was used. The research participants were selected from unmarried mothers admitted to the social welfare center in Korea. All interviewee were six and between 17 to 24 years old women. Their confidential information was insured. The data were analyzed in the framework of Grounded Theory methodology as mapped out by Strauss(l991). 21 concepts, 11 sub-category and 6 category were confirmed in the analysis. In the process of data analysis, 'sufferd pregnancy process' was founded to be the core phenomenon. In Conclusion, through their suffered pregnancy experiences, unmarried mothers had been a process to grow up, planned for the future and became a mature woman. This study supports the need to develop a role model for nurses in providing appropriate support to the unmarried mother, which will lead to an improvement in the physical and mental health of the unmarried mothers.

  • PDF