• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.094 seconds

Analyzing Faceted Navigations of OPAC in Korean University Libraries (국내 대학도서관 OPAC의 패싯 내비게이션 분석에 관한 연구)

  • Yoo, Yeong-Jun
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.2
    • /
    • pp.189-205
    • /
    • 2013
  • This research analyzed how the main requisites of faceted navigation as names of facets, subterms of facets, order of facets, too many results were user-centric. On the research method, this research analyzed the results of the three keywords retrieved in the 15 university libraries' catalogs and how was user's familiarity to the terms. Although domestic universities have serviced facet navigation, the names of the facet of publication date and series title in format and the terms under the facets as multimedia and nonbook material, media material are too difficult intuitively to understand and there were lots of formal terms used in cataloging rules and the terms librarians have usually used. Because of the terms, there is high possibility to deteriorate users' satisfaction and usability to library catalog in future. Even though they serviced facet navigation, there was also weakness as too many results and the university libraries need to use relevance ranking method to solve the weakness. This research has found the possibility of being used too many of levels of the facets and this may also badly affect the users' experience to library catalog.

Weakness of Andriod Smartphone Applications against Electromagnetic Analsysis (안드로이드 기반 스마트폰 어플리케이션의 전자기파분석 공격 취약성)

  • Park, JeaHoon;Kim, Soo Hyeon;Han, Daewan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1017-1023
    • /
    • 2013
  • With the growing use of smartphones, many secure applications are performed on smartphones such as banking, payment, authentication. To provide security services, cryptographic algorithms are performed on smartphones' CPU. However, smartphone's CPU has no considerations against side-channel attacks including Electromagnetic Analysis (EMA). In DesignCon 2012, G. Kenworthy introduced the risk of cryptographic algorithms operated on smartphone against EMA. In this paper, using improved experimental setups, we performed EMA experiments on androin smartphones' commercial secure applications. As a result, we show that the weakness of real application. According to the experimental setups, we picked up the operation of w-NAF scalar multiplication from the operation of Google's Play Store application using radiated EM signal. Also, we distinguished scalar values (0 or not) of w-NAF scalar multiplication.

A Study on the Fingerprint-based User Authentication Protocol Considering both the Mobility and Security in the Telematics Environment (텔레메틱스 환경에서 이동성과 보안성을 고려한 지문정보를 이용한 사용자 인증 프로토콜에 관한 연구)

  • Kim, Tae-Sub;Oh, Ryong;Lee, Sang-Joon;Lee, Sung-Ju;Kim, Hak-Jae;Chung, Yong-Wha;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11A
    • /
    • pp.1128-1137
    • /
    • 2007
  • Recently, according to being advanced internet, mobile communication technique, Telematics environment which users in vehicle can use internet service in LAN(Local Area Network) via mobile device has being realized. In this paper, we propose the remote user authentication protocol to solve these issues. Additionally, we use biometrics(fingerprint) for our user authentication protocol cause it can provide to avoid critical weakness that can be lost, stolen, or forgotten and to make authentication easily. In our user authentication protocol, to protect the biometric we use session key which is generated from master key distributed in our key distribution protocol. In particular, we propose secure protocol between APs considering weakness of security in mobile environment. Based on implementation of our proposed protocol, we conform that our proposed protocols are secure from various attack methods and provide real-time authentication.

Design and Implementation of Modified Web Contents Detection System (웹 컨텐츠 변경 탐지 시스템의 설계 및 구현)

  • 김영선;장덕철
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.91-97
    • /
    • 2004
  • As the electronic commercial transaction is being transacted by contents which can get an illegal intrusion from the outside, we sincerely require security for them. We must consider a protection countermeasure about intrusion from protection of the passive form to protection intrusion of the active one. So the security is required against hackers illegality intrusion into the contents. As soon as the intrusion happens about the contents, the tools providing the monitor of contents are required to minimize the damage to the systems. Modified web contents detection system in this paper prevents the loss of resources and manpower required through individually monitoring on the web. Also, this paper offers rapid support of security that it analyzes the weakness of contents security of the web environment and the cause of the problem with the leakage of information. So this system has the pur pose of protecting the weakness of contents security and the leakage of information.

  • PDF

A Course Scheduling Multi-Agent System For Ubiquitous Web Learning Environment (유비쿼터스 웹 학습 환경을 위한 코스 스케줄링 멀티 에이전트 시스템)

  • Han, Seung-Hyun;Ryu, Dong-Yeop;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.365-373
    • /
    • 2005
  • Ubiquitous learning environment needs various new model of e-learning as web based education system has been proposed. The demand for the customized courseware which is required from the learners is increased. the needs of the efficient and automated education agents in the web-based instruction are recognized. But many education systems that had been studied recently did not service fluently the courses which learners had been wanting and could not provide the way for the learners to study the learning weakness which is observed in the continuous feedback of the course. In this paper we propose a multi-agent system for course scheduling of learner-oriented using weakness analysis algorithm via personalized ubiquitous environment factors. First proposed system analyze learner's result of evaluation and calculates learning accomplishment. From this accomplishment the multi-agent schedules the suitable course for the learner. The learner achieves an active and complete learning from the repeated and suitable course.

  • PDF

A Study on the Evaluation of Synthetic Seakeeping Performance of a Ship Using Real Time Weather Data (실시간 기상정보를 이용한 선박의 종합내항성능 평가에 관한 연구)

  • 김순갑;이상민;이충로
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 1998.04a
    • /
    • pp.90-100
    • /
    • 1998
  • There is a limitation for a ship which is sailing on sea to gather weather and seastate informations. To make up for this weakness , land organizations can gather wider variety of information and evaluate the seakeeping performance on ship. and supply this information to the ship. In this study, calculated the response amplitude of ship motions with the weather information provided in real time, the norminal speed loss with obtaining increased of resistance caused by wave and stochastic process of the seakeeping performance elements. And the results have been achieved to develop a system whichcan evaluate the synthetic seakeeping performance. Using this system , the results have been studied to determine the feasibility of using this simulation inactual operation onboard ship.

  • PDF

A Study on Edge Detection using Weighted Value with Threshold (임계값에 따른 가중치를 이용한 에지 검출에 관한 연구)

  • Lee, Chang-Young;Hwang, Yeong-Yeun;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.886-888
    • /
    • 2013
  • An edge includes information of objects such as magnitude, orientation, and location. Conventional edge detection methods to detect those edge are methods using Sobel, Prewitt, Roberts, Laplacian operator. Existing methods use fixed weighted mask to detect edges, and their edge detection characteristics are insufficient. Therefore, to remedy weakness of conventional methods, in this paper, an edge detection algorithm using weight with standard deviation and thresholds is proposed.

  • PDF

Feature Selection for Multi-Class Support Vector Machines Using an Impurity Measure of Classification Trees: An Application to the Credit Rating of S&P 500 Companies

  • Hong, Tae-Ho;Park, Ji-Young
    • Asia pacific journal of information systems
    • /
    • v.21 no.2
    • /
    • pp.43-58
    • /
    • 2011
  • Support vector machines (SVMs), a machine learning technique, has been applied to not only binary classification problems such as bankruptcy prediction but also multi-class problems such as corporate credit ratings. However, in general, the performance of SVMs can be easily worse than the best alternative model to SVMs according to the selection of predictors, even though SVMs has the distinguishing feature of successfully classifying and predicting in a lot of dichotomous or multi-class problems. For overcoming the weakness of SVMs, this study has proposed an approach for selecting features for multi-class SVMs that utilize the impurity measures of classification trees. For the selection of the input features, we employed the C4.5 and CART algorithms, including the stepwise method of discriminant analysis, which is a well-known method for selecting features. We have built a multi-class SVMs model for credit rating using the above method and presented experimental results with data regarding S&P 500 companies.

A Study on the Evaluation of Synthetic Seakeeping Performance of a Ship Using Real Time Weather Data (실시간 기상정보를 이용한 선박의 종합내항성능 평가에 관한 연구)

  • Kim, Soon-Kap;Lee, Sang-Min;Lee, Choong-Ro
    • Journal of the Korean Institute of Navigation
    • /
    • v.22 no.2
    • /
    • pp.23-32
    • /
    • 1998
  • There is a limitation for a ship which is sailing on sea to gather weather and seastate informations. To make up for this weakness, land organizations can gather wider variety of information and evaluate the seakeeping performanceon ship. And supply this information to the ship. In this study, calculated the response amplitude of shp motions with the weather information provided in real time, the nominal speed loss with obtaining increase of resistance caused by wave and stochastic process of the seakeeping performance elements. And the results have been achieved to develop a system which can evaluate the synthetic seakeeping performance. Using this system, the results have been studied to determine the feasibility of using simulation in actural operation onboard ship.

  • PDF

Analysis of Difference Between the Process Capability Indices and the Process Incapability Indices. (공정능력지수와 비공정능력지수의 차이분석)

  • 양정문;이보근;김정자
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.21 no.45
    • /
    • pp.347-356
    • /
    • 1998
  • For assessing the capability of a process, the quantification of process location and variation is central to understanding the quality of units produced from the manufacturing process. Conventional process capability indices is insufficient to drive out the information for process condition, furthermore it is very difficult to evaluate the process capability accurately when the target value is not consistent with the center of specification, and/or the shape of distribution is changed, but the process incapability indices is enable to provide more detailed information to evaluate the process capability by dividing information about the process mean and variance. In this paper, we have a brief review and comparison about these indices, provide an understanding of the relationships between the process capability indices and the incapability indices. And we explore the strengths and weakness of these indices as they apply to normally distributed process, and to examine the effect that non-normality has on these indices.

  • PDF