• Title/Summary/Keyword: journal profiling analysis

Search Result 652, Processing Time 0.022 seconds

Power Trace Selection Method in Template Profiling Phase for Improvements of Template Attack (프로파일링 단계에서 파형 선별을 통한 템플릿 공격의 성능 향상)

  • Jin, Sunghyun;Kim, Taewon;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.15-23
    • /
    • 2017
  • Template attack is a powerful side-channel analysis technique which can be performed by an attacker who has a test device that is identical to target device. Template attack is consisted of building template in profiling phase and matching the target device using template that were calculated in profiling phase. One methods to improve the success rate of template attack is to better estimate template which is consisted sample mean and sample covariance matrix of gaussian distribution in template profiling. However restriction of power trace in profiling phase led to poor template estimation. In this paper, we propose new method to select noisy power trace in profiling phase. By eliminating noisy power trace in profiling phase, we can construct more advanced mean and covariance matrix which relates to better performance in template attack. We proved that the proposed method is valid through experiments.

A Study on the Effectiveness of Criminal Profiling (범죄자 프로파일링의 효용성 평가)

  • Jung, Se-Jong
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.686-694
    • /
    • 2014
  • Criminal profiling, also known as offender profiling is designed to predict the characteristics of unknown criminal perpetrator through an analysis of the crime scene. Until now, there has been conflict about the effectiveness of criminal profiling among academics. In this study, 113 police investigators', working in serious crime divisions, were interviewed about their experiences with criminal profiling, and their belief about its effectiveness. 63.7% of the respondents agreed that criminal profiling is a valuable investigative tool and 62.8% agreed that profilers are valuable to criminal investigations. A total of 31.8% agreed that profilers help the police identify offenders and 15.0% agreed that there is no risk of profiler misdirecting and investigation. 61.5% of the respondents who had reported using a profile agreed that profiling is helpful and 71.4% told that they would use profiling again in the future.

Enhancing industrial security of casino business by developing criminal profiling of deviant behaviors in casino (범죄 프로파일링 기법을 활용한 카지노 위반 행동 분석과 카지노 산업보안 증대 방안 연구)

  • Lee, Chang-Hun;Lee, Seung-Hoon
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.113-146
    • /
    • 2016
  • Criminal profiling is a effective and efficient measure for enhancing industrial security of casino business. Particularly, developing criminal profiling of deviant behaviors in casino will help security management to become more effective and efficient in practical ways. Unfortunately, however, there is lack of empirical profiling study in this regard. To fill the vacuum of literature on this topic, this study was purported to create offender profiles of different types of deviant behaviors in casino based on various theories and techniques in criminal profiling literature, such as investigative psychology, linkage analysis, and behavioral evidence analysis. To fulfill the purposes, this study collected behavioral evidence from 90 casino security officers in South Korea. Offenders' behavioral evidence was analyzed to develop offender profiles of seven different types of deviant behaviors, and then the profiles were compared with each profiles that security officers focus on to identify offenders during their work hours. Results showed that, first, there were unique profiles of each type of seven different categories of deviant behaviors in terms of offenders' ways of speaking and acting, their appearance and attitudes. In addition, this study found that there were some amount of gaps between actual offenders' profiles and profiles that security officers have in mind. Based on the results, this study provided policy implications in terms of managing casino industrial security, education and training for security officers, and future study on casino security.

  • PDF

A Bibliometric Analysis of Research Trends on Disaster in Korea (국내 재난 관련 연구 동향에 대한 계량정보학적 분석)

  • Lee, Jae Yun;Kim, Soojung
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.4
    • /
    • pp.103-124
    • /
    • 2016
  • This study aims to investigate the research trends of disaster in Korea through a bibliometric analysis. To do that, it analyzed 772 scholarly articles published from 2002 to 2016, retrieved from KCI (Korean Citation Index) database. For analysis, discipline profiling analysis, journal profiling analysis, and co-word analysis methods were used. The study found that the number of scholarly articles on disaster has increased, especially after Sewol ferry disaster occurred in 2004. The major discipline areas were identified as 'policy sciences/public administration' area, 'engineering' area, 'GIS/telecommunication' area, and 'medical/humanities/social sciences' area. In terms of time series, the proportion of scholarly articles published in 'policy sciences/public administration' area has decreased since 2014 and at the same time, discipline areas have been diversified including law, medical, and journalism.

A Study on Empirical Model for the Prevention and Protection of Technology Leakage through SME Profiling Analysis (중소기업 프로파일링 분석을 통한 기술유출 방지 및 보호 모형 연구)

  • Yoo, In-Jin;Park, Do-Hyung
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.171-191
    • /
    • 2018
  • Purpose Corporate technology leakage is not only monetary loss, but also has a negative impact on the corporate image and further deteriorates sustainable growth. In particular, since SMEs are highly dependent on core technologies compared to large corporations, loss of technology leakage threatens corporate survival. Therefore, it is important for SMEs to "prevent and protect technology leakage". With the recent development of data analysis technology and the opening of public data, it has become possible to discover and proactively detect companies with a high probability of technology leakage based on actual company data. In this study, we try to construct profiles of enterprises with and without technology leakage experience through profiling analysis using data mining techniques. Furthermore, based on this, we propose a classification model that distinguishes companies that are likely to leak technology. Design/methodology/approach This study tries to develop the empirical model for prevention and protection of technology leakage through profiling method which analyzes each SME from the viewpoint of individual. Based on the previous research, we tried to classify many characteristics of SMEs into six categories and to identify the factors influencing the technology leakage of SMEs from the enterprise point of view. Specifically, we divided the 29 SME characteristics into the following six categories: 'firm characteristics', 'organizational characteristics', 'technical characteristics', 'relational characteristics', 'financial characteristics', and 'enterprise core competencies'. Each characteristic was extracted from the questionnaire data of 'Survey of Small and Medium Enterprises Technology' carried out annually by the Government of the Republic of Korea. Since the number of SMEs with experience of technology leakage in questionnaire data was significantly smaller than the other, we made a 1: 1 correspondence with each sample through mixed sampling. We conducted profiling of companies with and without technology leakage experience using decision-tree technique for research data, and derived meaningful variables that can distinguish the two. Then, empirical model for prevention and protection of technology leakage was developed through discriminant analysis and logistic regression analysis. Findings Profiling analysis shows that technology novelty, enterprise technology group, number of intellectual property registrations, product life cycle, technology development infrastructure level(absence of dedicated organization), enterprise core competency(design) and enterprise core competency(process design) help us find SME's technology leakage. We developed the two empirical model for prevention and protection of technology leakage in SMEs using discriminant analysis and logistic regression analysis, and each hit ratio is 65%(discriminant analysis) and 67%(logistic regression analysis).

Student-oriented Multi-dimensional Analysis System using Educational Profiling (교육 프로파일링을 활용한 학생 맞춤형 다차원 분석 시스템)

  • Kim, Ki-Bong;Shin, Hyun-Seong
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.263-270
    • /
    • 2016
  • In this study, it was attempted to develop a grade-customized statistical analysis system that can be operated by a teacher without professional knowledge of statistics by utilizing profiling in the education sector. For this, with the convergence of techniques of profiling into the education sector, it examined the elements necessary for building a customized student multidimensional analysis system. Referring to the overall configuration and the current state to build multidimensional analysis system utilizing practical profiling, it showed the implementation result of the algorithm applied to each statistical method, and presented the differences and superiority to existing systems. Once the system based on the proposed techniques is built, considering differences of students' needs and abilities and clarifying precise objectives and standards, with the improvement of satisfaction in public education, it is possible not only to reduce expense of prior and private learning but also realize self-directed learning suitable to one's learning ability and aptitude.

Study of Metabolic Profiling Changes in Colorectal Cancer Tissues Using 1D 1H HR-MAS NMR Spectroscopy

  • Kim, Siwon;Lee, Sangmi;Maeng, Young Hee;Chang, Weon Young;Hyun, Jin Won;Kim, Suhkmann
    • Bulletin of the Korean Chemical Society
    • /
    • v.34 no.5
    • /
    • pp.1467-1472
    • /
    • 2013
  • Metabolomics is a field that studies systematic dynamics and secretion of metabolites from cells to understand biological pathways based on metabolite changes. The metabolic profiling of intact human colorectal tissues was performed using high-resolution magic angle spinning (HR-MAS) NMR spectroscopy, which was unnecessary to extract metabolites from tissues. We used two different groups of samples, which were defined as normal and cancer, from 9 patients with colorectal cancer and investigated the samples in NMR experiments with a water suppression pulse sequence. We applied target profiling and multivariative statistical analysis to the analyzed 1D NMR spectra to identify the metabolites and discriminate between normal and cancer tissues. Cancer tissue showed higher levels of arginine, betaine, glutamate, lysine, taurine and lower levels of glutamine, hypoxanthine, isoleucine, lactate, methionine, pyruvate, tyrosine relative to normal tissue. In the OPLS-DA (orthogonal partial least square discriminant analysis), the score plot showed good separation between the normal and cancer groups. These results suggest that metabolic profiling of colorectal cancer could provide new biomarkers.

Profiling Approach for the Choice between Speculation and Postponement Strategy in Supply Chain Management (공급사슬관리의 예측전략과 지연전략 선택을 위한 프로파일링 접근법)

  • Kang, Sung-Wook;Kim, Gyu-Bae
    • Journal of Distribution Science
    • /
    • v.12 no.4
    • /
    • pp.47-54
    • /
    • 2014
  • Purpose - The postponement strategy, which delays the form, place, and production of products as late as possible, has been widely considered as a competitive supply chain management scheme in an era of mass customization and modular manufacturing. An interesting business phenomenon is that not all manufacturing/logistics firms choose the postponement strategy. Given that postponement is a counter-measure to speculation, which has some advantages under certain environments, the current imprudent inclination toward the postponement strategy may cause firms to lose the potential of the speculation strategy, an alternative strategy in supply chain management. Building on the logistics and manufacturing literature, this study examines characteristics of two contrasting strategies, postponement and speculation, and major factors favoring each strategy. Research design, data, and methodology - We apply the profiling approach to two business cases, HP printer and LG mobile phone. The profiling approach is a method of choosing a particular strategy aligned with environmental factors. While various approaches have been used to check the fit between a business strategy and environmental factors, the literature on manufacturing strategy and logistics has commonly adopted the profiling approach. Major factors used in profiling variables are derived from the literature. Two samples, HP printer and LG mobile phone, are selected, because they represent major characteristics appropriate for each strategy. The profiling is based on data from semi-organized interviews with managers. Results - The profiling approach shows that the postponement strategy is a suitable one for HP printers. Most factors, such as product life cycle, large production volume, low-price, product value, and monetary density, support delaying end products until as late as possible. Despite some exceptions, such as delivery time and economy of scale, our analysis states that the overall profile of HP printer is favorable for the postponement strategy. On the other hand, LG mobile phone may adapt the speculation strategy. Although it has large production volume and low delivery frequency, most characteristics support the speculation strategy for this product. An interesting finding is that, despite common perception that advanced technology products such as mobile telephones favor the postponement strategy, profiling proposes the speculation strategy for this product. Conclusions - Our analysis shows that speculation is not the universal option for supply chain management, and that, when choosing a specific strategy, one should consider many factors simultaneously. A major implication of our work is to emphasize the role of environmental factors such as supply chain variables in choosing an inventory strategy, and the importance of fit rather than solely strategic orientation. A theoretical contribution is to demonstrate the benefit of the simultaneous consideration of business variables in choosing specific strategies. For practitioners, our work leads us to consider the existence and the potential of speculation as a counter-measure to postponement. In addition, the comprehensive framework in this research may be instantly used in examining a practical strategy.

Analyzing the Research Fronts of Women's Studies in Korea Using Citation Image Makers Profiling (인용 이미지 구축자 프로파일링을 이용한 국내 여성학 분야 연구 전선 분석)

  • Kim, Jo-Ah;Lee, Jae Yun
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.2
    • /
    • pp.201-225
    • /
    • 2016
  • A new technique for revealing the research fronts of a interdisciplinary discipline has been developed. Citation image makers profiling (CIMP) determines the relationships between research papers with the title words of the citing documents. We adapted this new technique to analyze the research fronts and hot topics in women's studies of Korea. By Korean Citation Index (KCI) data in 2015, we selected 148 papers cited more than 9 times as the core documents of women's studies. Analysis of intellectual structure using citation image makers profiling was performed with the 148 core documents and those citing papers. Document co-citation analysis was hindered by citation data sparsity, while CIMP method successfully revealed the structure of research fronts of Korean women's studies including 2 divisions and 6 subdivisions. The CIMP method suggested in this study has good potential to discover the characteristics of research fronts of interdisciplinary research domains.

Metabolomic Analysis of Ethyl Acetate and Methanol Extracts of Blueberry (Ethyl Acetate와 Methanol을 이용한 블루베리 추출물 대사체 분석)

  • Jo, Young-Hee;Kim, Sugyeong;Kwon, Da-Ae;Lee, Hong Jin;Choi, Hyung-Kyoon;Auh, Joong-Hyuck
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.43 no.3
    • /
    • pp.419-424
    • /
    • 2014
  • Metabolite profiling of blueberry (cultivar "Spartan") was performed by extraction using different solvents, methanol and ethyl acetate, through metabolomic analysis using LC-MS/MS. Unsupervised classification method (PCA) and supervised prediction model (OPLS-DA) provided good categorization of metabolites according to the extraction solvents. Metabolites of the anthocyanin family, including delphinidin hexoside, delphinidin, 5-O-feruloylquinic acid, malvidin hexoside, malvidin-3-arabinoside, petunidin-3-arabinoside, and petunidin hexoside, were mainly detected in methanol fractions, whereas those of the flavonoid family, including chlorogenic acid, chlorogenic acid dimer, 6,8-di-C-arabinopyranosyl-luteolin, and luteolin were successfully prepared in the ethyl acetate fraction. Thus, metabolomic analysis of blueberry extracts allows for the simple profiling of whole and distinctive metabolites for future applications.