• Title/Summary/Keyword: security component

Search Result 407, Processing Time 0.021 seconds

Effects of Design Factors of the Instrument Cluster Panel on Consumers' Affection Applying Robust Design (강건 설계기법을 이용한 자동차 게이지 클러스터의 디자인 요소와 고객 감성에 관한 연구)

  • Jung, Ga-Hun;Park, Sung-Joon;Kim, Seong-M.;Jung, Eui-S.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.1
    • /
    • pp.25-31
    • /
    • 2010
  • It is known from consumer surveys that the interior design of cars greatly influences on consumers' affection. Most notably, the instrument panel which occupies the driver's attention while driving would be one of the main components that affect consumer's affection, but the designer does not often put due importance to this design component. The purpose of this study is to define consumers' affection on the instrument cluster panel in terms of its design factors: color of panel lighting and layout of meters as independent factors. Semantic differentials or affective adjectives that are related to the instrument panel were first derived from surveys, existing studies and the available literature. Then, representative affective factors were drawn using factor analysis and multi-dimensional scaling (MDS). Evaluation of the instrument panel was performed and analyzed by Taguchi's robust design to provide more robust results under various noise factors which are color and material of car interior. Experiment revealed that consumers had five affective factors on the instrument panel and luxurious, charming, and visible affections are grouped into a factor and unique and dynamic affections in another factor. Evaluation of the instrument panel by Taguchi's robust design found that the white color of panel lighting and the panel with four meters was the most preferred design in terms of both the affection of luxury and uniqueness.

Estimate of Simulation for Recent Typhoons (최근 태풍의 Simulation 평가)

  • Oh, Jong Seop
    • Journal of Korean Society of Disaster and Security
    • /
    • v.8 no.1
    • /
    • pp.39-46
    • /
    • 2015
  • This study is concerned with the estimation of fluctuation wind velocity spectrum and turbulence characteristics in the major cities reflecting the recent meteorological with typhoon wind velocity about 2003 (Maemi) 2010 (Kompasu) 2012 (Tembin). The purpose of this paper is to present spectral analysis for longitudinal component fluctuating velocity obtained by Monte Carlo Simulation method. In the processes of analysis, the longitudinal velocity spectrums are compared widely used spectrum models with horizontal wind velocity observations data obtained at Korea Meteorological Adminstration (KMA) and properties of the atmospheric air for typhoon fluctuating wind data are estimated to parameters with turbulency intensity, shear velocity, probability distribution and roughness length.

The Impact of TANF on Income and Poverty : analyses by sub-component (미국 TANF정책이 소득 및 빈곤에 미친 영향: 하부조항별 분석)

  • Yoo, Ji-Young
    • Korean Journal of Social Welfare
    • /
    • v.59 no.4
    • /
    • pp.111-136
    • /
    • 2007
  • The National Basic Livelihood Security(NBLS) System implemented from October 2000 has expanded cash assistance to cover the poor who are able to work in our country. Although the cash assistance for them has positive aspects of providing basic livelihood security for all people, but many scholars have also pointed out its negative aspects such as a decrease in labor supply among the poor. In order to provide policy implications for the cash assistance program of our country as well as the US, this paper examines the impact of Temporary Assistance for Needy Families(TANF) on poverty among single mothers and their families using data from March Current Population Survey of $1991{\sim}2002$. TANF imposes strong work requirements and time limits to recipients as conditions for cash assistance, which are major sub-components of TANF. Therefore, this paper analyzes TANF by looking at work requirements and time limits separately, not by looking at TANF as a single policy. The research findings show that work requirements significantly decreased income and increased poverty among single mothers. Although time limits show income increasing effects and poverty decreasing effects, it seems further studies on time limits are needed at this point. The research findings of this paper provide important lessons for welfare to work cash assistance of our country as well as the US.

  • PDF

The Effect of VDI Technical Characteristics on Interaction and Work Performance (VDI 기술특성이 상호작용과 업무성과에 미치는 영향에 관한 실증적 연구)

  • Kwak, Young;Shin, Min Soo
    • Journal of Information Technology Services
    • /
    • v.20 no.4
    • /
    • pp.95-111
    • /
    • 2021
  • Recently, many organizations are actively adopting VDI (Virtual Desktop Infrastructure), an IT-based business system, to build a non-face-to-face business environment for smart-work. However, most of the existing research on VDI has focused on the satisfaction of system service quality or the use of IT resources and investment for VDI introduction. However, research on effective management and utilization of factors according to the characteristics of VDI technology is urgently required. This study is an empirical research study on how VDI technology characteristics affect interactions and work performance by identifying differences in utilization factors between general organization members and IT managers, presenting standards for business utilization and management. This study proposed a model and hypothesis that the system technology characteristics for VDI use are mediated by interactions in which users respond to functions appropriate to their work. In order to verify the hypothesis, a questionnaire survey was conducted on 188 people of companies and institutions that have adopted and used VDI through a questionnaire survey. Data analysis was performed with partial least squares (PLS), a structural equation modeling (SEM) technique that uses a component-based approach to estimation. As a result of the empirical analysis, the same environmental function for performing work, N-th security, and remote access function factors for non-face-to-face work have a significant effect on interactivity, and IT managers have an additional significant effect on the management technology characteristics of resource reallocation. Has been shown to affect. The results of this study aim to minimize trial and error due to new introduction by presenting considerations for future VDI introduction through case analysis.

Establishment of electronic attendance using PCA face recognition (PCA 얼굴인식을 활용한 전자출결 환경 구축)

  • Park, Bu-Yeol;Jin, Eun-Jeong;Lee, Boon-Giin;Lee, Su-Min
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.4
    • /
    • pp.174-179
    • /
    • 2018
  • Currently, various security technologies such as fingerprint recognition and face recognition are being developed. However, although many technologies have been developed, the field of incorporating technologies is quite limited. In particular, it is easy to adapt modern security technologies into existing digital systems, but it is difficult to introduce new digital technologies in systems using analog systems. However, if the system can be widely used, it is worth replacing the analog system with the digital system. Therefore, the selected topic is the electronic attendance system. In this paper, a camera is installed to a door to perform a Haar-like feature training for face detecting and real-time face recognition with a Eigenface in principal component analysis(PCA) based face recognition using raspberry pi. The collected data was transmitted to the smartphone using wireless communication, and the application for the viewer who can receive and manage the information on the smartphone was completed.

Automatic Categorization of Islamic Jurisprudential Legal Questions using Hierarchical Deep Learning Text Classifier

  • AlSabban, Wesam H.;Alotaibi, Saud S.;Farag, Abdullah Tarek;Rakha, Omar Essam;Al Sallab, Ahmad A.;Alotaibi, Majid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.281-291
    • /
    • 2021
  • The Islamic jurisprudential legal system represents an essential component of the Islamic religion, that governs many aspects of Muslims' daily lives. This creates many questions that require interpretations by qualified specialists, or Muftis according to the main sources of legislation in Islam. The Islamic jurisprudence is usually classified into branches, according to which the questions can be categorized and classified. Such categorization has many applications in automated question-answering systems, and in manual systems in routing the questions to a specialized Mufti to answer specific topics. In this work we tackle the problem of automatic categorisation of Islamic jurisprudential legal questions using deep learning techniques. In this paper, we build a hierarchical deep learning model that first extracts the question text features at two levels: word and sentence representation, followed by a text classifier that acts upon the question representation. To evaluate our model, we build and release the largest publicly available dataset of Islamic questions and answers, along with their topics, for 52 topic categories. We evaluate different state-of-the art deep learning models, both for word and sentence embeddings, comparing recurrent and transformer-based techniques, and performing extensive ablation studies to show the effect of each model choice. Our hierarchical model is based on pre-trained models, taking advantage of the recent advancement of transfer learning techniques, focused on Arabic language.

Legal System of Blockchain and Domestic and Foreign Blockchain Legal System - Focusing on Industrial Revitalization - (블록체인의 법률체계와 국내외 블록체인 법제 현황 -산업 활성화를 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.67-75
    • /
    • 2019
  • As 4th industrial revolution has emerged as a hot topic, the blockchain technology capable of enabling super intelligence as a premiere has been an attracting attention. With the interest in blockchains, various platforms using blockchains are emerging. Reflecting this trend, several countries including US, EU, China, and Japan are preparing blockchain and related laws or amending existing laws. In Korea, the platform business based on blockchain is being done, but the related laws are insufficient. In this study, we first present the legal system of the blockchain, examine each component, and then compare the current state of the legal system in US, EU, China, and Japan based on the blockchain legal system. Finally, we propose a brief improvement plan of the legal system for industrial development by commercialization of blockchain. In the future, we would like to study the individual legal system about the blockchain.

A Flexible Approach for Efficient Elliptic Curve Multi-Scalar Multiplication on Resource-constrained Devices (자원이 제약된 장치에서 효율적인 타원곡선 다중 상수배의 구현을 위한 유연한 접근)

  • Seo, Seog-Chung;Kim, Hyung-Chan;Ramakrishna, R.S.
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.95-109
    • /
    • 2006
  • Elliptic Curve Cryptosystem (ECC) is suitable for resource-constrained devices such as smartcards, and sensor motes because of its short key size. This paper presents an efficient multi-scalar multiplication algorithm which is the main component of the verification procedure in Elliptic Curve Digital Signature Algorithm (ECDSA). The proposed algorithm can make use of a precomputed table of variable size and provides an optimal efficiency for that precomputed table. Furthermore, the given scalar is receded on-the-fly so that it can be merged with the main multiplication procedure. This can achieve more savings on memory than other receding algorithms. Through experiments, we have found that the optimal sizes of precomputed tables are 7 and 15 when uP+vQ is computed for u, v of 163 bits and 233 bits integers. This is shown by comparing the computation time taken by the proposed algorithm and other existing algorithms.

Video Data Collection Scheme From Vehicle Black Box Using Time and Location Information for Public Safety (사회 안전망 구축을 위한 시간과 위치 정보 기반의 차량 블랙박스 영상물 수집 기법)

  • Choi, Jae-Duck;Chae, Kang-Suk;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.771-783
    • /
    • 2012
  • This paper proposes a scheme to collect video data of the vehicle black box in order to strengthen the public safety. The existing schemes, such as surveillance system with the fixed CCTV and car black box, have privacy issues, network traffic overhead and the storage space problems because all video data are sent to the central server. In this paper, the central server only collects the video data related to the accident or the criminal offense using the GPS information and time in order to investigation of the accident or the criminal offense. The proposed scheme addresses the privacy issues and reduces network traffic overhead and the storage space of the central server since the central server collects the video data only related to the accident and the criminal offense. The implementation and experiment shows that our service is feasible. The proposed service can be used as a component of remote surveillance system to prevent the criminal offense and to investigate the criminal offense.

Classes in Object-Oriented Modeling (UML): Further Understanding and Abstraction

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.139-150
    • /
    • 2021
  • Object orientation has become the predominant paradigm for conceptual modeling (e.g., UML), where the notions of class and object form the primitive building blocks of thought. Classes act as templates for objects that have attributes and methods (actions). The modeled systems are not even necessarily software systems: They can be human and artificial systems of many different kinds (e.g., teaching and learning systems). The UML class diagram is described as a central component of model-driven software development. It is the most common diagram in object-oriented models and used to model the static design view of a system. Objects both carry data and execute actions. According to some authorities in modeling, a certain degree of difficulty exists in understanding the semantics of these notions in UML class diagrams. Some researchers claim class diagrams have limited use for conceptual analysis and that they are best used for logical design. Performing conceptual analysis should not concern the ways facts are grouped into structures. Whether a fact will end up in the design as an attribute is not a conceptual issue. UML leads to drilling down into physical design details (e.g., private/public attributes, encapsulated operations, and navigating direction of an association). This paper is a venture to further the understanding of object-orientated concepts as exemplified in UML with the aim of developing a broad comprehension of conceptual modeling fundamentals. Thinging machine (TM) modeling is a new modeling language employed in such an undertaking. TM modeling interlaces structure (components) and actionality where actions infiltrate the attributes as much as the classes. Although space limitations affect some aspects of the class diagram, the concluding assessment of this study reveals the class description is a kind of shorthand for a richer sematic TM construct.