• Title/Summary/Keyword: identity based

Search Result 2,344, Processing Time 0.031 seconds

Collaboration Among Design Fields With a Focus on the Fashion Industry (패션산업을 중심으로 한 디자인 영역간의 콜레보레이션)

  • Jeong, Hoon-Sil;Kim, Young-In
    • Journal of the Korean Society of Costume
    • /
    • v.58 no.6
    • /
    • pp.110-123
    • /
    • 2008
  • The objectives of this study are to define the fundamental notions of collaboration in design field. The results of this study are summarized as follows: Firstly, collaboration means a cooperative work which are cooperatively done by collabarator and collaboratee on the equal status within a certain period of time, based on core ability of each of them. This cooperative work is presented with a visual image based on the identity of participants, and it creates an added value. Collaboration is different from convergence and hybrid in the methodological aspects and from brand alliance and strategic alliance in the aspects of the subject of project. Secondly, collaboration has been developing through step of using the specific ability, step of sharing each core abilities, and step of fusing their identities, in a view of the sphere of cooperative work and the intimate relations in reciprocity. Thirdly, according to strategic purpose, collaboration can be classified into value ascending collaboration, image changing collaboration, business-field extension collaboration, and event collaboration. Fourthly, production methods of collaboration consist of limited edition method, premium line method, common line method, producing a collaborative product, and so on. Fifthly, differentiation effect, image upgrade effect, production of higher value-added products, sale increase, diversification of business, sharing the targets, and promotion effect are achievable through collaboration. Sixthly, to make progress in collaboration successfully, the compatibility of combination between collaborator and collaboratee, the superiority of collaboratee, definitude of collaboration, the fit method of collaboration, the novelty of collatoration, possibility of issuing of collaboration, and perfection of collabo-product must be the points which deserve our attention.

Detection of Barley yellow mosaic virus from Soil Using Nested PCR (Nested PCR 기법을 이용한 토양으로부터 Barley yellow mosaic virus 검출)

  • Lee, Joong-Hwan;Son, Chang-Gi;Kwon, Joong-Bae;Nam, Hyo-Hun;Kim, Yeong-Tae;Lee, Bong-Choon;Shin, Dong-Bum
    • Research in Plant Disease
    • /
    • v.23 no.1
    • /
    • pp.65-68
    • /
    • 2017
  • Barley yellow mosaic virus (BaYMV), which is transmitted by the root-inhabiting protist Polymyxa graminis, causes a soil-borne disease. In this study, we detected BaYMV from soil using two-step nested polymerase chain reaction (PCR). Specific primers based on a coat protein region of BaYMV segment RNA1 were used in the first round of amplification. Based on the sequenced amplicon, an inner primer was designed for the second round of amplification. A PCR product of 372 bp exhibited 98%-100% nucleotide sequence identity with the coat protein region of BaYMV segment RNA1. In this study, we propose an easy method for the detection of BaYMV from soil, may considerably assist in accurate fungus-transmitted virus diagnosis and subsequent disease forecasting. This is the first report on the detection of BaYMV from soil.

An Offline Electronic Payment System Based on an Untraceable Blind Signature Scheme

  • Kutubi, Md. Abdullah Al Rahat;Alam, Kazi Md. Rokibul;Tahsin, Rafaf;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2628-2645
    • /
    • 2017
  • This paper proposes a new offline electronic payment (e-payment) system that satisfies the major security requirements of e-payment, i.e. anonymity, unlinkability, unforgeability, double spending control, conditional traceability, and fraud prevention. The central idea is the use of Hwang et al.'s RSA-based untraceable blind signature (BS), which disables the link between the e-coin and its owner and ensures the anonymity of both the customer and the merchant. It attaches an expiration, a deposit and the transaction dates to each e-coin in order to manage the database of the bank effectively, to correctly calculate the interest on the e-coin and to aid arbitration if a dishonest customer attempts to double-spend the coin. It also ensures the anonymity of the customer as long as the coin is spent legitimately. Only when a fraudulent e-coin transaction is detected can the bank, with the help of the central authority (a trusted entity), determine the identity of the dishonest customer. The system is referred to as offline since the bank does not need to be concurrently involved in transactions between a customer and a merchant. Finally, analyses of the performance of the prototype and the primary security requirements of the proposed system are also presented.

The Brand Value of Place Names: Topics in Economic Geography (지명의 브랜드 가치: 경제지리학적 접근)

  • Choo, Sungjae;Kim, Heesu
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.18 no.4
    • /
    • pp.431-449
    • /
    • 2015
  • Motivated by the finding that place names are highly capable of acting as one of the most conspicuous brands in the economy, this study has explored the essential nature of the brand value of place names and has suggested possible methodology to evaluate this value. As the place name brand has multidimensional elements mirroring the attributes of place, its understanding should be framed in terms both of users of place names as a subject and of place as an object. In order to evaluate the brand value of place names, the possibility of adopting the concept of customer-based brand equity, which is centered on the perception and assessment of customers, has been reviewed and more detailed items of evaluation have been addressed. A few future research topics are suggested: the nature of brand value; its relevance to place identity; the influence of place marketing; the significance of exposing place names to the public; the effect of geographic indication on brand value; delineating the spatial boundary of geographic indication items.

  • PDF

On Ethnic Images shown in Japanese Designers' Collections - Focused on Design Comparison between Issey Miyake and Yohji Yamamoto (일본 디자이너 컬렉션에 나타난 에스닉 이미지 - 이세이 미야케와 요지 야마모토의 디자인 비교를 중심으로)

  • Byun, Mi-Yeon;Lee, Ji-Eun;Lee, In-Seong
    • Korean Journal of Human Ecology
    • /
    • v.15 no.5
    • /
    • pp.823-833
    • /
    • 2006
  • The globalization phenomenon of the 21st century has acted as the catalyst to accept diversity, and a new cultural code, ethnic, has emerged in the modem society by the pursuit of diversity throughout the whole society and culture. Unlike preceding studies focusing on ethnic concepts and design development, this study attempted comparative analyses on ethnic trends shown in the collections of two designers, Issey Miyake and Yohji Yamamoto, who have strong ethnic consciousness. It is considered the comparative analysis on the two designers' collections with ethic images will be a guide to indicate the fashion philosophy of the two designers in the category of Japan, and this will be useful as basic data for the establishment of the globalization identity which is needed in the future fashion industry. The study results are as follows. First, it was found that the ethnic code has been so widely accepted by the world designers in a very positive form to accept foreign cultures that the ethnic code is now showing an aspect of eclecticism. Second, designer Issey Miyake has been pursuing his own ethnic style based on his philosophy to liberate humans through continuous researches and efforts on clothes. Third, Yohji Yamamoto has been pursuing a Japanese ethnic style as a designer who has expressed the unique beauty of Japan from the characteristics of Japanese traditional clothes. Fourth, as a result of comparative analyses on collections, they both have pursued an ethnic style based on the unique national characteristics of Japan, but it was also found that their fashion philosophy has developed differently in the same category of ethnic trend.

  • PDF

OTP-Based Transaction Verification Protocol Using PUFs (PUF를 이용한 OTP 기반 거래 검증 프로토콜)

  • Lee, Jonghoon;Park, Minho;Jung, Souhwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.6
    • /
    • pp.492-500
    • /
    • 2013
  • The One-Time Password(OTP) Generator is used as a multi-factor authentication method to ensure secure transaction during e-Financial transaction in the bank and securities company. The OTP based e-Financial Transaction Verification Protocol ensures secure e-financial transaction through confirming the user's identity using OTP authentication information and counters not only Man-in-the-Browser(MITB) attacks but also memory hacking attacks. However, it is possible to generate correct OTPs due to potential of stealing sensitive information of the OTP generator through intelligent phishing, pharming, social engineering attacks. Therefore, it needs another scheme to prevent from above threats, and this paper proposes advanced scheme using Physical Unclonable Functions(PUFs) to solve these problems. First, it is impossible to generate the same OTP values because of the hysically unclonable features of PUFs. In addition, it is impossible to clone OTP generator with hardware techniques. Consequently, the proposed protocol provides stronger and more robust authentication protocol than existing one by adding PUFs in the OTP generator.

Improved Two-Party ID-Based Authenticated Key Agreement Protocol (개선된 두 참여자간 식별자 기반 인증된 키 동의 프로토콜)

  • Vallent, Thokozani Felix;Kim, Hae-Jung;Yoon, Eun-Jun;Kim, Hyunsung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.7
    • /
    • pp.595-604
    • /
    • 2013
  • Devising a secure authenticated key agreement (AKA) protocol for two entities communicating over an open network is a matter of current research. McCullagh et al. proposed a new two-party identity-based AKA protocol supporting both key escrow and key escrow-less property instantiated by either in a single domain or over two distinct domains. In this paper, we show that their protocol over two distinct domains suffers from masquerading attack and therefore does not satisfy the claimed security. The attack is made possible due to the lack of sufficient authentication of entity and integrity assurance in the protocol. We then propose an efficient verifiable key agreement protocol by including signature primitive in the authentication procedure to solve the problem of McCullagh et al.'s protocol.

A Study on Model of Constructing the Cultural Database System. (GIS 기반의 문화데이터베이스구축 방안 연구)

  • 문병채;박현욱
    • Spatial Information Research
    • /
    • v.11 no.2
    • /
    • pp.185-201
    • /
    • 2003
  • The purpose of this study is to seek the methods of constructing a cultural information system based on GIS. It is impossible for regional culture to be formed apart from its surrounding space, so a study of culture should be based on realizing the features of its space. It is important to note that the elements composing a culture complicatedly interact with each other in their function and continuously change. Also they are interrelated in space and plentiful in their amount. Nevertheless, those studies practised so far in relation to culture and constructing cultural database are too limited in establishing cultural area or community life area required to recognize the regional identity So it is now essential that we should study the methods of cultural expression surpassing objective historical and cultural site maps instead of simple maps depicting historical remains or sites. From this viewpoint, this study tries to find various cultural phenomena in relation to their space through seeking the methods of constructing the cultural database model using XML. In addition, this study tries to construct a base for increasing the utilization of information in making the cultural contents.

  • PDF

Design and Implementation of Distance Learner's Attendance Checking System Based on PC Camera (PC 카메라 기반 원격교육 학습자 출석 확인 시스템의 설계 및 구현)

  • Koo, DukHoi
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.3
    • /
    • pp.283-289
    • /
    • 2012
  • A distance learning is diffusing rapidly in society. It is more difficult to confirm a learner's identity and learning processing in a distance learning. Distance learning has a checking attendance system because a teacher and student do not meet face to face. There are some checking attendance systems such as login check, SMS authenticating system, unexpected quiz, and so on. However, existing checking attendance system has some problems to check learner's attendance in a whole lesson. Therefore, this study designed and developed learner's attendance system based on PC camera's shot of certification in a whole lesson. This attendance checking system can judge real attendance of learners in a distance learning and distance evaluation. The system is expected to make trust of a distance learning higher.

  • PDF

Study on The Confidence Level of PCA-based Face Recognition Under Variable illumination Condition (조명 변화 환경에서 PCA 기반 얼굴인식 알고리즘의 신뢰도에 대한 연구)

  • Cho, Hyun-Jong;Kang, Min-Koo;Moon, Seung-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.2
    • /
    • pp.19-26
    • /
    • 2009
  • This paper studies on the recognition rate change with respect to illumination variance and the confidence level of PCA(Principal Component Analysis) based face recognition by measuring the cumulative match score of CMC(Cumulative Match Characteristic). We studied on the confidence level of the algorithm under illumination changes and selection of training images not only by testing multiple training images per person with illumination variance and single training image and but also by changing the illumination conditions of testing images. The experiment shows that the recognition rate drops for multiple training image case compared to single training image case. We, however, confirmed the confidence level of the algorithm under illumination variance by the fact that the training image which corresponds to the identity of testing image belongs to upper similarity lists regardless of illumination changes and the number of training images.