• Title/Summary/Keyword: data library

Search Result 2,822, Processing Time 0.025 seconds

A Crypto-processor Supporting Multiple Block Cipher Algorithms (다중 블록 암호 알고리듬을 지원하는 암호 프로세서)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Bae, Gi-Chur;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2093-2099
    • /
    • 2016
  • This paper describes a design of crypto-processor that supports multiple block cipher algorithms of PRESENT, ARIA, and AES. The crypto-processor integrates three cores that are PRmo (PRESENT with mode of operation), AR_AS (ARIA_AES), and AES-16b. The PRmo core implementing 64-bit block cipher PRESENT supports key length 80-bit and 128-bit, and four modes of operation including ECB, CBC, OFB, and CTR. The AR_AS core supporting key length 128-bit and 256-bit integrates two 128-bit block ciphers ARIA and AES into a single data-path by utilizing resource sharing technique. The AES-16b core supporting key length 128-bit implements AES with a reduced data-path of 16-bit for minimizing hardware. Each crypto-core contains its own on-the-fly key scheduler, and consecutive blocks of plaintext/ciphertext can be processed without reloading key. The crypto-processor was verified by FPGA implementation. The crypto-processor implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,500 gate equivalents (GEs), and it can operate with 55 MHz clock frequency.

Comparative Analysis of KoMCI 2004 and KCI 2004 Impact Factors (KoMCI(Korean Medical Citation Index)와 KCI(Korea Citation Index)의 2004년도 영향력지표값 비교분석)

  • Sun, Huh;Lee, Choon-Shil
    • Journal of Information Management
    • /
    • v.36 no.3
    • /
    • pp.183-193
    • /
    • 2005
  • Korean Academy of Medical Sciences began developing Korean Medical Citaton Index(KoMCI) database in 2002, and has announced the impact factors of Korean medical journals published since 2000. In July 2005, Korea Research Foundation also announced the KCI impact factor of journals covering all subject areas for the 2003 and 2004. We compared the impact factor(IF), impact factor excluding self-citation(ZIF), and self-citation impact factor(SIF) of KoMCI 2004 and KCI 2004 in order to disclose why there is such a great difference in the values of impact factors between two databases. Out of 72 medical journals in both database, 59 journals were compared after excluding the missing data in KCI. Mean IF of KoMCI 2004 was 0.2 and that of KCI 2004 was 0.03(p=0.0000). Mean ZIF of KoMCI was 0.06 and that of KCI was 0.01(p=0.000). Mean SIF of KoMCI was 0.139 and that of KCI was 0.02(p=0.0000). We presumed that the major difference in the impact factor values was originated from the fact that KCI does not control the authority of journal names cited in the references. We strongly recommend that it is necessary to control the authority especially if Korea Research Foundation wants to ensure the validity and reliability of KCI data in the evaluation of korean journals.

Detecting Adversarial Example Using Ensemble Method on Deep Neural Network (딥뉴럴네트워크에서의 적대적 샘플에 관한 앙상블 방어 연구)

  • Kwon, Hyun;Yoon, Joonhyeok;Kim, Junseob;Park, Sangjun;Kim, Yongchul
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.57-66
    • /
    • 2021
  • Deep neural networks (DNNs) provide excellent performance for image, speech, and pattern recognition. However, DNNs sometimes misrecognize certain adversarial examples. An adversarial example is a sample that adds optimized noise to the original data, which makes the DNN erroneously misclassified, although there is nothing wrong with the human eye. Therefore studies on defense against adversarial example attacks are required. In this paper, we have experimentally analyzed the success rate of detection for adversarial examples by adjusting various parameters. The performance of the ensemble defense method was analyzed using fast gradient sign method, DeepFool method, Carlini & Wanger method, which are adversarial example attack methods. Moreover, we used MNIST as experimental data and Tensorflow as a machine learning library. As an experimental method, we carried out performance analysis based on three adversarial example attack methods, threshold, number of models, and random noise. As a result, when there were 7 models and a threshold of 1, the detection rate for adversarial example is 98.3%, and the accuracy of 99.2% of the original sample is maintained.

A Study on the Utilization of Librarian Recommendation System and Bestseller List (사서추천제도와 베스트셀러 목록의 활용성에 관한 연구)

  • Nam, Young Joon
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.311-334
    • /
    • 2021
  • The purpose of this study is to present the theoretical basis and quantified objective standards for the establishment of collection management policy. The study results are summarized as follows. Most of the study books were in the form of periodicals as a steady seller. Most of the steady sellers were textbooks which published periodically. As a modern novel, a steady seller was able to confirm the phenomenon of dependence on a specific author. Bestsellers were investigated to be influenced by publishers and authors. Books of publishers that publish comics and children's textbooks had a significant correlation with the selection of bestsellers. The average number of recommended books borrowed per recommended book was 14,871. The average number of loans per book selected as a bestseller was 53,531. Based on the loan data, about 80-82% of all top-tier loans were covered by 90%, and about 27-29% of all top-ranked loans were covered by 50%. This shows that the Pareto Principle can be firmly applied to public library lending patterns. Loans in the field of literature accounted for 50.6% of the total loans. Among literature, Korean literature accounted for 51.3% of the total. The natural sciences were generating more loans with a relatively small pool of literature compared to other subject fields.

A Literature Review on Application of Signature Materials in Nuclear Forensics according to Domestic Nuclear Facilities and Fuel Cycle (국내 원자력시설 및 핵연료 주기에 따른 핵감식 표지물질 활용에 대한 고찰)

  • Jeon, Yeoryeong;Gwon, Da Yeong;Han, Jiyoung;Choi, Woo Cheol;Kim, Yongmin
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.1
    • /
    • pp.37-43
    • /
    • 2021
  • Republic of Korea has many nuclear facilities in the country, and Democratic People's Republic of Korea(North Korea) locates in the surrounding country. Therefore, it is necessary to construct the target facility's nuclear forensic data in a preemptive response to the changing international situation. For this reason, this study suggests "signature" materials used to understand the origins and sources of nuclear and other radioactive materials, taking into account domestic nuclear facilities and the nuclear fuel cycle. In domestic, pressurized light water reactors and pressurized heavy water reactors are in operation, and enriched and natural uranium are used as fuels. In the front-end fuel cycle, the signature materials can be nature uranium and UF6 in the uranium enrichment process. The domestic back-end fuel cycle adopts a non-circulating cycle excluding the reprocessing process, and the primary signature material is spent nuclear fuel. According to IAEA recommendation, the importance of these materials as the signature and characteristic contents are suggested in this study. To prove the integrity of nuclear material and build a national nuclear forensics library, it is necessary to grasp the signature material and acquire the characteristic data considering the domestic nuclear facilities and the nuclear fuel cycle.

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

A Study on the Development of Personality Education Program Using Media in Middle School (미디어 활용 중학교 인성교육 프로그램 개발 연구)

  • Lee, Yeonhee
    • Trans-
    • /
    • v.12
    • /
    • pp.141-171
    • /
    • 2022
  • This study was conducted to understand media and cultivate personality by using media as data for personality education. To achieve this purpose, the Personality Education Promotion Act and the Korea Educational Development Institute's personality virtues were selected as educational elements, and a personality education program using media was developed in combination with the middle school curriculum. For this study, first, in order to extract personality virtues, 13 personality virtues were finally selected as educational elements by comparing and synthesizing the personality virtues of the Personality Education Promotion Act and the Korea Education Development Institute. The final personality virtues selected are self-esteem, courage, sincerity, self-regulation, wisdom, consideration, communication, courtesy, social responsibility, cooperation, citizenship, justice, and respect for human rights. Second, in order to select media and set the direction of development of personality education programs, the process of collecting media data was confirmed, and the direction and goal of the program were set by analyzing the middle school curriculum. Third, in order to propose a method of applying a personality education program using media, the personality grafting unit was selected by referring to the commentary on all subjects of the 2015 revised curriculum.

Design of detection method for malicious URL based on Deep Neural Network (뉴럴네트워크 기반에 악성 URL 탐지방법 설계)

  • Kwon, Hyun;Park, Sangjun;Kim, Yongchul
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.5
    • /
    • pp.30-37
    • /
    • 2021
  • Various devices are connected to the Internet, and attacks using the Internet are occurring. Among such attacks, there are attacks that use malicious URLs to make users access to wrong phishing sites or distribute malicious viruses. Therefore, how to detect such malicious URL attacks is one of the important security issues. Among recent deep learning technologies, neural networks are showing good performance in image recognition, speech recognition, and pattern recognition. This neural network can be applied to research that analyzes and detects patterns of malicious URL characteristics. In this paper, performance analysis according to various parameters was performed on a method of detecting malicious URLs using neural networks. In this paper, malicious URL detection performance was analyzed while changing the activation function, learning rate, and neural network structure. The experimental data was crawled by Alexa top 1 million and Whois to build the data, and the machine learning library used TensorFlow. As a result of the experiment, when the number of layers is 4, the learning rate is 0.005, and the number of nodes in each layer is 100, the accuracy of 97.8% and the f1 score of 92.94% are obtained.

Comparison of Outlines by Image Analysis for Derivation of Objective Validation Results: "Ito Hirobumi's Characters on the Foundation Stone" of the Main Building of Bank of Korea (이미지 분석법을 활용한 형상정보의 비교와 객관적 검증결과의 도출사례: 한국은행 본관 정초석 '이토 히로부미 글씨'의 검증)

  • Yoo, Woo Sik
    • Journal of Conservation Science
    • /
    • v.36 no.6
    • /
    • pp.511-518
    • /
    • 2020
  • There have been reports that the "jeongcho (定礎)" letters of the foundation stone at the historical site No. 280 of the "Main Building of the Bank of Korea in Seoul" were written by Prince Ito Hirobumi (伊藤博文), the first Resident-General of Japan in Korea. An on-site investigation by an advisory group consisting of three experts in calligraphy; revealed that the two characters of '定礎' inscribed on the foundation stone are the characteristics of Ito Hirobumi's handwriting, judging from the writing style and habits observed in the collections of the Central Library of Hamamatsu City, Japan. It was reported that his writing was confirmed by the experts, but no basis was provided. To provide more objective and quantitative supporting data, rather than qualitative judgment based on feeling, it is necessary to present the basis for judgment through quantitative image comparison results through image analysis. In this paper, using image analysis software, Ito Hirobumi's calligraphy writing and the inscribed characters of the foundation stone were compared and analyzed to confirm the contents of the press release. The character comparison process and character area measurement results are a good example showing that if objective judgment basis data are needed in a similar situation, an objective judgment basis can be prepared through quantification using image analysis.

KOMUChat: Korean Online Community Dialogue Dataset for AI Learning (KOMUChat : 인공지능 학습을 위한 온라인 커뮤니티 대화 데이터셋 연구)

  • YongSang Yoo;MinHwa Jung;SeungMin Lee;Min Song
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.219-240
    • /
    • 2023
  • Conversational AI which allows users to interact with satisfaction is a long-standing research topic. To develop conversational AI, it is necessary to build training data that reflects real conversations between people, but current Korean datasets are not in question-answer format or use honorifics, making it difficult for users to feel closeness. In this paper, we propose a conversation dataset (KOMUChat) consisting of 30,767 question-answer sentence pairs collected from online communities. The question-answer pairs were collected from post titles and first comments of love and relationship counsel boards used by men and women. In addition, we removed abuse records through automatic and manual cleansing to build high quality dataset. To verify the validity of KOMUChat, we compared and analyzed the result of generative language model learning KOMUChat and benchmark dataset. The results showed that our dataset outperformed the benchmark dataset in terms of answer appropriateness, user satisfaction, and fulfillment of conversational AI goals. The dataset is the largest open-source single turn text data presented so far and it has the significance of building a more friendly Korean dataset by reflecting the text styles of the online community.