• Title/Summary/Keyword: 조작 정보

Search Result 1,428, Processing Time 0.029 seconds

A Blockchain Network Construction Tool and its Electronic Voting Application Case (블록체인 자동화도구 개발과 전자투표 적용사례)

  • AING TECKCHUN;KONG VUNGSOVANREACH;Okki Kim;Kyung-Hee Lee;Wan-Sup Cho
    • The Journal of Bigdata
    • /
    • v.6 no.2
    • /
    • pp.151-159
    • /
    • 2021
  • Construction of a blockchain network needs a cumbersome and time consuming activity. To overcome these limitations, global IT companies such as Microsoft are providing cloud-based blockchain services. In this paper, we propose a blockchain-based construction and management tool that enables blockchain developers, blockchain operators, and enterprises to deploy blockchain more comfortably in their infrastructure. This tool is implemented using Hyperledger Fabric, one of the famous private blockchain platforms, and Ansible, an open-source IT automation engine that supports network-wide deployment. Instead of complex and repetitive text commands, the tool provides a user-friendly web dashboard interface that allows users to seamlessly set up, deploy and interact with a blockchain network. With this proposed solution, blockchain developers, operators, and blockchain researchers can more easily build blockchain infrastructure, saving time and cost. To verify the usefulness and convenience of the proposed tool, a blockchain network that conducts electronic voting was built and tested. The construction of a blockchain network, which consists of writing more than 10 setting files and executing commands over hundreds of lines, can be replaced with simple input and click operations in the graphical user interface, saving user convenience and time. The proposed blockchain tool will be used to build trust data infrastructure in various fields such as food safety supply chain construction in the future.

Cortex M3 Based Lightweight Security Protocol for Authentication and Encrypt Communication between Smart Meters and Data Concentrate Unit (스마트미터와 데이터 집중 장치간 인증 및 암호화 통신을 위한 Cortex M3 기반 경량 보안 프로토콜)

  • Shin, Dong-Myung;Ko, Sang-Jun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.111-119
    • /
    • 2019
  • The existing smart grid device authentication system is concentrated on DCU, meter reading FEP and MDMS, and the authentication system for smart meters is not established. Although some cryptographic chips have been developed at present, it is difficult to complete the PKI authentication scheme because it is at the low level of simple encryption. Unlike existing power grids, smart grids are based on open two-way communication, increasing the risk of accidents as information security vulnerabilities increase. However, PKI is difficult to apply to smart meters, and there is a possibility of accidents such as system shutdown by sending manipulated packets and sending false information to the operating system. Issuing an existing PKI certificate to smart meters with high hardware constraints makes authentication and certificate renewal difficult, so an ultra-lightweight password authentication protocol that can operate even on the poor performance of smart meters (such as non-IP networks, processors, memory, and storage space) was designed and implemented. As a result of the experiment, lightweight cryptographic authentication protocol was able to be executed quickly in the Cortex-M3 environment, and it is expected that it will help to prepare a more secure authentication system in the smart grid industry.

LAN Based MFD Interface for Integrated Operation of Radio Facilities using Fishery Vessel (어선용 무선설비의 통합운용을 위한 LAN 기반 MFD 인터페이스)

  • In-ung Ju;In-suk Kang;Jeong-yeon Kim;Seong-Real Lee;Jo-cheon Choi
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.6
    • /
    • pp.496-503
    • /
    • 2022
  • In the reality that the fishing population is decreasing and the single-man fishing vessels is increasing, mandatory equipment for navigation and radio equipments for the safety of fishing boats has continued to be added. Therefore, many equipment such as navigation, communication and fishing are installed in the narrow steering room, so it is very confusing and a number of monitors are placed in the front, which is a factor that degrades the function of maritime observation. To solve this problem, we studied an interface that integrates and operates to major radio facilities such as very high frequency-digital selective calling equipment (VHF-DSC), automatic identification system (AIS) and fishing boat location transmission device (V-pass) into one multi function display (MFD) based on LAN. In addition, IEC61162-450 UDP packets and IEC61162 sentence were applied to exchange data through link between MFD and radio equipments, and additional messages needed for each equipment and function were defined. The integrated MFD monitor is easily operated by the menu method, and the performance of the interface was evaluated by checking the distress and emergency communication functions related to maritime safety and the message transmission status by equipment.

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.

Fun of Animation-on the Correlation among the Perceptive fun, the Cognitive fun and the Psychological fun (애니메이션의 재미 - 감각적 재미, 인지적 재미, 심리적 재미의 상관관계)

  • Sung, Re-A
    • Cartoon and Animation Studies
    • /
    • s.33
    • /
    • pp.99-126
    • /
    • 2013
  • This study is meant to be seeing how fun of animation works by reviewing it theoretically and coordinating it to suggest the structure which integrates fun of animation and validates the proposed fun model. After reviewing fun theoretically, the fun of animation could be able to coordinate that fun of animation is consist of perceptive fun, cognitive fun, and psychological fun. Perceptive fun is induced by visual, auditory and other sensory information and it is directly affected the image, sound, and movement. Cognitive fun can be obtained by reasoning and interpretation to mobilize their knowledge with sensuously perceived stimulation and it is directly affected the story. Psychological fun occurs when the audience see the animation. The psychological fun is the psychological emotional state when the audience watches animation by relieving psychological congestion. It consists of fun of unfamiliarity or identification. By suggesting research model and validating it how the perceptive fun, cognitive fun, and psychological fun affects each other, perceptive fun enhances cognitive fun and psychological fun. Although cognitive fun enhances psychological fun, cognitive fun enhances psychological fun twice than perceptive fun. Also when perceptive fun affects psychological fun, cognitive fun shows the indirect effect as a parameter. In conclusion, perceptive fun affects psychological fun directly and be enhanced through cognitive fun. Fun of animation can be experienced when perceptive fun caused by accepting sensory information of animation instantly, cognitive fun caused by interpretation and understanding sensory information of animation, and psychological fun caused by relieving psychological identity through recognition fuses and acts as one. An animation emphasized a certain element is difficult to be loved by the audience. In this reason, an harmonical combination among the elements of story, image, sound and movement are important to combinate harmoniously for a successful animation to make the audiences fun by arising funny emotions.

A study on Establishment and Management of the CCTV in Operating Room (수술실 CCTV 설치 및 운영에 대한 고찰)

  • Kim, Minji
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.1
    • /
    • pp.109-132
    • /
    • 2019
  • Recently, medical accidents related to surgical procedures have increased. In addition, the media reported that some of these accidents were involved in health crimes. Patient-advocate groups have called for mandatory establishment and management of CCTV in operating rooms. There is a lot of discussion among the interested parties, so it is necessary to review the relevant laws and regulations. The purpose of this study is to identify the characteristics of CCTV in operating rooms and to review legislations related to establishment and management of the CCTV in operating rooms. Medical institutions use CCTV for management of facilities and patient safety and install it in operating rooms optionally. The Constitution guarantees the privacy and the privacy of correspondence of every citizen, but it can be limited by the law for public welfare. Currently, however, there is no existing law about establishment and management of the CCTV in operating rooms and it can be defect of legal system. Under the current legislations, it is likely that the Self-determination can be violated due to the characteristic of healthcare provider when CCTV is mandatorily installed in operating room. In addition, the regulations on access and leakage of confidential information known by operator are insufficient. So that, the safety of the visual data might be threatened. Furthermore, unless the period and the place of storage of the visual data are clearly defined, it is highly unlikely to meet the original purpose of patient safety and prevention of medical accidents. This study is meaningful as there is few previous study on this topic although the need for legal review about this is growing and several bills are being proposed. It is expected that the results of this study can be utilized as basic data for enactment or amendment of the laws and regulations about establishment and management of CCTV in operating rooms.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

Differences in Ability to Predict the Success of Motor Action According to Dance Expertise - Focusing on Pirouette En Dehors (무용 숙련성에 따른 동작결과예측 능력의 차이: 삐루엣 앙 디올 동작을 중심으로)

  • Han, Siwan;Ryu, Je-Kwang;Yi, Woojong;Yang, Jonghyun
    • Korean Journal of Cognitive Science
    • /
    • v.29 no.2
    • /
    • pp.121-135
    • /
    • 2018
  • Dancers' motions are perceived by observers through visual processes with visual information forming the basis for the observers' appreciation and evaluation of the dancers' motions. There have been many discussions as to whether or not observers' personal athletic capabilities form an essential basis for accurate assessment of the motions of others but, so far, no valid conclusions have been reached. The purpose of this study is to investigate how the ability to predict motions of others varies depending on the athletic expertise of the observers. Participants of this research were ballet dancers of varying athletic expertise. Twenty seven participants were divided into three groups with nine in each: beginners, intermediate experts and experts. The participants watched the same dance video and then evaluated whether the motion would be successful or not. The movement related visual information required to evaluate the success of the motion was systematically adjusted by controlling the length of the video. Using the temporal occlusion method, this study measured the response accuracy of the participants by category of expertise. Under the circumstance with insufficient visual information to utilize, the experts showed higher rates of correct response than the intermediate experts and the beginners. The beginners showed higher rates of wrong response than the experts and the intermediate experts. These results showed that the ability to predict success or failure of a dance motion varied depending on motion expertise of the observers, although they had similar level of expertise in perception. Participants considered to have high athletic expertise showed high prediction ability on the result of the motion. In addition, high expertise in perception reduced the likelihood that participants would make hasty responses under the circumstance with insufficient information and helped to reduce wrong response rate. In conclusion, this study showed that motor expertise and perceptual expertise contribute to prediction accuracy of observed motions.

A Study on Intuitive IoT Interface System using 3D Depth Camera (3D 깊이 카메라를 활용한 직관적인 사물인터넷 인터페이스 시스템에 관한 연구)

  • Park, Jongsub;Hong, June Seok;Kim, Wooju
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.2
    • /
    • pp.137-152
    • /
    • 2017
  • The decline in the price of IT devices and the development of the Internet have created a new field called Internet of Things (IoT). IoT, which creates new services by connecting all the objects that are in everyday life to the Internet, is pioneering new forms of business that have not been seen before in combination with Big Data. The prospect of IoT can be said to be unlimited in its utilization. In addition, studies of standardization organizations for smooth connection of these IoT devices are also active. However, there is a part of this study that we overlook. In order to control IoT equipment or acquire information, it is necessary to separately develop interworking issues (IP address, Wi-Fi, Bluetooth, NFC, etc.) and related application software or apps. In order to solve these problems, existing research methods have been conducted on augmented reality using GPS or markers. However, there is a disadvantage in that a separate marker is required and the marker is recognized only in the vicinity. In addition, in the case of a study using a GPS address using a 2D-based camera, it was difficult to implement an active interface because the distance to the target device could not be recognized. In this study, we use 3D Depth recognition camera to be installed on smartphone and calculate the space coordinates automatically by linking the distance measurement and the sensor information of the mobile phone without a separate marker. Coordination inquiry finds equipment of IoT and enables information acquisition and control of corresponding IoT equipment. Therefore, from the user's point of view, it is possible to reduce the burden on the problem of interworking of the IoT equipment and the installation of the app. Furthermore, if this technology is used in the field of public services and smart glasses, it will reduce duplication of investment in software development and increase in public services.

Influence of identifiable victim effect on third-party's punishment and compensation judgments (인식 가능한 피해자 효과가 제3자의 처벌 및 보상 판단에 미치는 영향)

  • Choi, InBeom;Kim, ShinWoo;Li, Hyung-Chul O.
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.2
    • /
    • pp.135-153
    • /
    • 2020
  • Identifiable victim effect refers to the tendency of greater sympathy and helping behavior to identifiable victims than to abstract, unidentifiable ones. This research tested whether this tendency also affects third-party's punishment and compensation judgments in jury context for public's legal judgments. In addition, through the Identifiable victim effect in such legal judgment, we intended to explain the effect of 'the bill named for victim', putting the victim's real name and identity at the forefront, which is aimed at strengthening the punishment of related crimes by gaining public attention and support. To do so, we conducted experiments with hypothetical traffic accident scenarios that controlled legal components while manipulating victim's identifying information. In experiment 1, each participant read a scenario of an anonymous victim (unidentifiable condition) or a nonanonymous victim that included personal information such as name and age (identifiable condition) and made judgments on the degree of punishment and compensation. The results showed no effect of identifiability on third-party's punishment and compensation judgments, but moderation effect of BJW was obtained in the identifiable condition. That is, those with higher BJW showed greater tendency of punishment and compensation for identifiable victims. In Experiment 2, we compared an anonymous victim (unidentifiable condition) against a well-conducted victim (positive condition) and ill-conducted victim (negative condition) to test the effects of victim's characteristics on punishment for offender and compensation for victims. The results showed lower compensation for an ill-conducted victim than for an anonymous one. In addition, across all conditions except for negative condition, participants made punishment and compensation judgments higher than the average judicial precedents of 10-point presented in the rating scale. This research showed that victim's characteristics other than legal components affects third-party's legal decision making. Furthermore, we interpreted third-party's tendency to impose higher punishment and compensation with effect of 'the bill named for victim' and proposed social and legal discussion for and future research.

  • PDF