• Title/Summary/Keyword: journal profiling analysis

Search Result 645, Processing Time 0.028 seconds

A Study on the Intellectual Structure Analysis by Keyword Type Based on Profiling: Focusing on Overseas Open Access Field (프로파일링에 기초한 키워드 유형별 지적구조 분석에 관한 연구 - 국외 오픈액세스 분야를 중심으로 -)

  • Kim, Pan Jun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.4
    • /
    • pp.115-140
    • /
    • 2021
  • This study divided the keyword sets searched from LISTA database focusing on the overseas open access fields into two types (controlled keywords and uncontrolled keywords), and examined the results of performing an intellectual structure analysis based on profiling for the each keyword type. In addition, these results were compared with those of an intellectual structural analysis based on co-word analysis. Through this, I tried to investigate whether similar results were derived from profiling, another method of intellectual structure analysis, and to examine the differences between co-word analysis and profiling results. As a result, there was a similar difference to the co-word analysis in the results of intellectual structure analysis based on profiling for each of the two keyword types. Also, there were also noticeable differences between the results of intellectual structural analysis based on profiling and co-word analysis. Therefore, intellectual structure analysis using keywords should consider the characteristics of each keyword type according to the research purpose, and better results can be expected to be used based on profiling than co-word analysis to more clearly understand research trends in a specific field.

Analysis of Structured and Unstructured Data and Construction of Criminal Profiling System using LSA (LSA를 이용한 정형·비정형데이터 분석과 범죄 프로파일링 시스템 구현)

  • Kim, Yonghoon;Chung, Mokdong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.1
    • /
    • pp.66-73
    • /
    • 2017
  • Due to the recent rapid changes in society and wide spread of information devices, diverse digital information is utilized in a variety of economic and social analysis. Information related to the crime statistics by type of crime has been used as a major factor in crime. However, statistical analysis using only the structured data has the difficulty in the investigation by providing limited information to investigators and users. In this paper, structured data and unstructured data are analyzed by applying Korean Natural Language Processing (Ko-NLP) and the Latent Semantic Analysis (LSA) technique. It will provide a crime profile optimum system that can be applied to the crime profiling system or statistical analysis.

The Effect of Investigators' Perception of the Importance of Investigative Elements on Their Intention to Use Profiling: Mediating Effect of Attitude toward Profiling (수사관의 수사요소 중요도 인식이 프로파일링 활용 의도에 미치는 영향: 프로파일링에 대한 태도의 매개효과)

  • Shin, Sangwha;Yoon, Sangyeon
    • Korean Journal of Forensic Psychology
    • /
    • v.13 no.1
    • /
    • pp.75-97
    • /
    • 2022
  • Profiling is recognized as a representative application area of domestic criminal psychology, and the National Police Agency profiler is firmly established as a profession. However, compared to the social awareness, the recognition and utilization within the police is not high. In this study, we tried to identify factors affecting the intention to use profiling by identifying the perception of investigators who request and use profiling from a profiler when a violent incident occurs. To this end, the relationship between the perception of the importance of factors considered by investigators in the criminal investigation process and the attitude toward profiling on the intention to use profiling was verified through the path model. As a result of a survey of 340 police investigators, the investigator's perception of the importance of investigation elements was divided into two factors: the importance of normative investigative elements (evidence collection and legal judgment, etc.) and factual investigative elements (criminal analysis, criminal information system analysis, etc.). Among them, the importance of factual investigative elements were found to have a positive effect on the intention to use it by mediating the attitude toward profiling. On the other hand, in the case of the importance of normative investigative elements, it was found to have a negative effect on the attitude toward profiling. These results suggest that the perception that investigators have about investigation, which is their main work area, plays a role in determining whether to request profiling as well as attitude towards profiling. Based on the research results, strategies necessary to activate the use of profiling were discussed.

Novel Deep Learning-Based Profiling Side-Channel Analysis on the Different-Device (이종 디바이스 환경에 효과적인 신규 딥러닝 기반 프로파일링 부채널 분석)

  • Woo, Ji-Eun;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.987-995
    • /
    • 2022
  • Deep learning-based profiling side-channel analysis has been many proposed. Deep learning-based profiling analysis is a technique that trains the relationship between the side-channel information and the intermediate values to the neural network, then finds the secret key of the attack device using the trained neural network. Recently, cross-device profiling side channel analysis was proposed to consider the realistic deep learning-based profiling side channel analysis scenarios. However, it has a limitation in that attack performance is lowered if the profiling device and the attack device have not the same chips. In this paper, an environment in which the profiling device and the attack device have not the same chips is defined as the different-device, and a novel deep learning-based profiling side-channel analysis on different-device is proposed. Also, MCNN is used to well extract the characteristic of each data. We experimented with the six different boards to verify the attack performance of the proposed method; as a result, when the proposed method was used, the minimum number of attack traces was reduced by up to 25 times compared to without the proposed method.

A Study on the Analysis of Intellectual Structure of Electronic Records Research in Korea Using Profiling (프로파일링 기법을 이용한 국내 전자기록 분야 지적구조 분석)

  • Kim, Pan Jun;Suh, Hye-Ran
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.12 no.2
    • /
    • pp.29-50
    • /
    • 2012
  • This study aims to analyze electronic records research domains and trends and to suggest future direction of electronic records research in Korea. One hundred and sixty one articles published in seven domestic journals from 1999 to 2011 were statistically analysed to find out the productivity of electronic records research. Analysis of intellectual structure using descriptor profiling and author profiling as a technique of text mining were performed with those same papers. Some proposals on the future research direction in this field were made.

Multi-Level Characterization of Protein Glycosylation

  • Hua, Serenus;Oh, Myung Jin;An, Hyun Joo
    • Mass Spectrometry Letters
    • /
    • v.4 no.1
    • /
    • pp.10-17
    • /
    • 2013
  • Recent developments in MS-based glycomics and glycoproteomics have rapidly advanced the field and pushed the boundaries of glyco-analysis into new territories. This review will lay out current workflows and strategies for characterization of the glycoproteome, including (in order of increasing complexity and information content) preliminary site mapping, compositional glycan profiling, isomer-specific glycan profiling, glycosite-specific glycopeptide profiling, and finally, glycoproteomic profiling.

Booting Process Profiling Tool for Baseboard Management Controllers (베이스보드 매니지먼트 컨트롤러를 위한 부팅 과정 프로파일링 도구)

  • Jaeseop Kim;Minho Park;Jiman Hong
    • Smart Media Journal
    • /
    • v.11 no.11
    • /
    • pp.84-91
    • /
    • 2022
  • Baseboard Management Controller(BMC) supports server monitoring, maintenance, and control functions using various communication interfaces. However, if an unexpected problem occurs during the device driver initialization process, the BMC may not operate normally. Therefore, a boot process profiling tool that accurately analyzes the device driver initialization process and provides a function to check the analysis result is essential. Existing boot process profiling tools do not specifically provide the device driver initialization process and results required for BMC boot process analysis, forcing developers to use a combination of tools to analyze the boot process in detail. In this paper, we propose an integrated profiling tool for BMC's booting process. The proposed tool provides device driver initialization process analysis, CPU and memory usage analysis, and kernel version management functions. Users can easily analyze the booting process using the proposed tool, and the analysis result can be used to shorten the booting time. Also, the proposed tool is implemented in Linux-based BMC, and it is shown that the proposed tool is more efficient than the existing profiling tool.

Elastohydrodynamic Lubrication Analysis on the Cam-Roller for a Marine Diesel Engine with Consideration of Roller Profiling (롤러 프로파일링을 고려한 박용 디젤기관 캠-롤러사이의 탄성유체윤활해석)

  • 구영필;조용주
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.24 no.6
    • /
    • pp.147-154
    • /
    • 2000
  • A numerical procedure to analyze 3-dimensional elastohydrodynamic lubrication was applied on the cam-roller contact of the valve mechanism for a marine diesel engine. Both the pressure distribution and the film thickness between the cam and roller follower were calculated for each time step of the whole cycle. The pressure spike is shown at the outlet of the roller edge and it is getting higher as the external load is increased. An effective profiling method for the roller edge was suggested using the results of elastohydrodynamic lubrication analysis and the peak pressure was removed completely with the new profiling.

  • PDF

Side Channel Attack on Block Cipher SM4 and Analysis of Masking-Based Countermeasure (블록 암호 SM4에 대한 부채널 공격 및 마스킹 기반 대응기법 분석)

  • Bae, Daehyeon;Nam, Seunghyun;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.39-49
    • /
    • 2020
  • In this paper, we show that the Chinese standard block cipher SM4 is vulnerable to the side channel attacks and present a countermeasure to resist them. We firstly validate that the secret key of SM4 can be recovered by differential power analysis(DPA) and correlation power analysis(CPA) attacks. Therefore we analyze the vulnerable element caused by power attack and propose a first order masking-based countermeasure to defeat DPA and CPA attacks. Although the proposed countermeasure unfortunately is still vulnerable to the profiling power attacks such as deep learning-based multi layer perceptron(MLP), it can sufficiently overcome the non-profiling attacks such as DPA and CPA.

Design of an Effective Deep Learning-Based Non-Profiling Side-Channel Analysis Model (효과적인 딥러닝 기반 비프로파일링 부채널 분석 모델 설계방안)

  • Han, JaeSeung;Sim, Bo-Yeon;Lim, Han-Seop;Kim, Ju-Hwan;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1291-1300
    • /
    • 2020
  • Recently, a deep learning-based non-profiling side-channel analysis was proposed. The deep learning-based non-profiling analysis is a technique that trains a neural network model for all guessed keys and then finds the correct secret key through the difference in the training metrics. As the performance of non-profiling analysis varies greatly depending on the neural network training model design, a correct model design criterion is required. This paper describes the two types of loss functions and eight labeling methods used in the training model design. It predicts the analysis performance of each labeling method in terms of non-profiling analysis and power consumption model. Considering the characteristics of non-profiling analysis and the HW (Hamming Weight) power consumption model is assumed, we predict that the learning model applying the HW label without One-hot encoding and the Correlation Optimization (CO) loss will have the best analysis performance. And we performed actual analysis on three data sets that are Subbytes operation part of AES-128 1 round. We verified our prediction by non-profiling analyzing two data sets with a total 16 of MLP-based model, which we describe.