• Title/Summary/Keyword: Distribution Information

Search Result 11,984, Processing Time 0.041 seconds

Conjugation of Landsat Data for Analysis of the Land Surface Properties in Capital Area (수도권 지표특성 분석을 위한 Landsat 자료의 활용)

  • Jee, Joon-Bum;Choi, Young-Jean
    • Journal of the Korean earth science society
    • /
    • v.35 no.1
    • /
    • pp.54-68
    • /
    • 2014
  • In order to analyze the land surface properties in Seoul and its surrounding metropolitan area, several indices and land surface temperature were calculated by the Landsat satellites (e.g., Landsat 5, Landsat 7, and Landsat 8). The Landsat data came from only in the fall season with Landsat 5 on October 21, 1985, Landsat 7 on September 29, 2003, and Landsat 8 on September 16, 2013. The land surface properties used are the indices that represented Soil Adjusted Vegetation Index (SAVI), Modified Normalized Difference Wetness Index (MNDWI), Normalized Difference Wetness Index (NDWI), Tasseled cap Brightness, Tasseled cap Greenness, Tasseled cap Wetness Index, Normalized Difference Vegetation Index (NDVI) and Normalized Difference Built-up Index (NDBI) and the land surface temperature of the area in and around Seoul. Most indices distinguish very well between urban, rural, mountain, building, river and road. In particular, most of the urbanization is represented in the new city (e.g., Ilsan) around Seoul. According to NDVI, NDBI and land surface temperature, urban expansion is displayed in the surrounding area of Seoul. The land surface temperature and surface elevation have a strong relationship with the distribution and structure of the vegetation/built-up indices such as NDVI and NDBI. While the NDVI is positively correlated with the land surface temperature and is also negatively correlated with the surface elevation, the NDBI have just the opposite correlations, respectively. The NDVI and NDBI index is closely associated with the characteristics of the metropolitan area. Landsat 8 and Landsat 5 have very strong correlations (more than -0.6) but Landsat 7 has a weak one (lower than -0.5).

A Comparative Analysis of Cataloging Records Related to Korea in the Major Asia-Pacific University Libraries (아태지역 주요 대학도서관의 한국관련 목록레코드 비교 분석)

  • Kim, Jeong-Hyen
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.3
    • /
    • pp.301-323
    • /
    • 2015
  • This study was conducted to analyze the characteristics of records related to Korea shown in the cataloging records of major 10 Asia-Pacific university libraries. The results are as follows. To begin with, Korea-related records in most university libraries are very poor except for some libraries and are generally 2 times less than Japan related records. There are even 6 times less in 2 libraries. Second, most libraries organize records in MARC 21 format rather than UNIMARC, and apply subject headings of the national library, or go together with LCSH. Third, Korean materials usually write Korean in Roman characters, but 5 libraries are marked with the original Korean language and available Hangeul search. Forth, on investigation of the subject distribution in sub criteria of Korea-related records, subject related to 'history', 'economy', and 'politics' is largely shown in the highest rate. Fifth, Among the Korea-related subject heading, the terms such as 'Taekwondo', 'Kimchi', 'Dokdo', 'Donghae', 'Duman-gang', 'Baekdu-san' have different meanings in different libraries. However, these terms agree to LCSH in most libraries except for neighboring countries's libraries.

A Comparative Analysis of Cataloging Record Related to Korea in the Major European University Libraries (유럽 주요 대학도서관의 한국관련 목록레코드 비교 분석)

  • Kim, Jeong-Hyen
    • Journal of Korean Library and Information Science Society
    • /
    • v.45 no.3
    • /
    • pp.191-212
    • /
    • 2014
  • This research was conducted to analyze the actual condition of records related to Korea shown in the catalog of major 10 European university libraries. The results are as follows. To begin with, most libraries apply subject headings of the national library, or go together with LCSH, and organize records in MARC 21 format rather than UNIMARC. Second, Korean materials usually Romanize Korean words, but three libraries are only marked with the original Korean language and available Korean search. Third, Korea-related records in most university libraries are very poor except for some libraries and are generally 2 times less than Japan related records. There are even 6 times less in 2 libraries. Forth, on investigation of the subject distribution in sub criteria of Korea-related records, subject related to 'history', 'politics', and 'economy' is largely shown in the highest rate. Fifth, Among the Korea-related subject heading, the terms such as 'Taekwondo', 'Kimchi', 'Dokdo', 'Donghae', 'Duman-gang', 'Baekdu-san' have different meanings in different libraries. However, these terms agree to LCSH in most libraries except for some libraries.

Analysis of Library Related Campaign Promises of the Candidates for the Heads of Metropolitan Governments and the Superintendents of Education (광역자치단체장 및 교육감 후보자들의 도서관 관련 공약 분석 - 제1~6회 전국동시지방선거를 중심으로 -)

  • Cho, Yong-Wan
    • Journal of Korean Library and Information Science Society
    • /
    • v.49 no.1
    • /
    • pp.149-171
    • /
    • 2018
  • The aim of this study is to investigate the library related campaign promises of the candidates for the heads of metropolitan governments and the superintendents of education between 1st and 6th nationwide local election in Korea. To do this, the library related campaign promises of 346 candidates were analyzed by analysing the official gazettes for elections digitally archived in National Election Commission of Korea. As a result, the campaign promises of the candidates were insufficient both in quality and quantity. The candidates for the heads of metropolitan governments showed low ratio of the library related campaign promises, excessive concentration on construction or installation of libraries and higher preference for small libraries than public libraries. The candidates for the superintendents of education showed relatively balanced distribution of the election promises on library fields. But the campaign promises related public libraries were insufficient and the campaign promises of school libraries did not reflect the major elements of school libraries and the context of school libraries in Korea.

Matchmaker: Fuzzy Vault Scheme for Weighted Preference (매치메이커: 선호도를 고려한 퍼지 볼트 기법)

  • Purevsuren, Tuvshinkhuu;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.301-314
    • /
    • 2016
  • Juels and Sudan's fuzzy vault scheme has been applied to various researches due to its error-tolerance property. However, the fuzzy vault scheme does not consider the difference between people's preferences, even though the authors instantiated movie lover' case in their paper. On the other hand, to make secure and high performance face authentication system, Nyang and Lee introduced a face authentication system, so-called fuzzy face vault, that has a specially designed association structure between face features and ordinary fuzzy vault in order to let each face feature have different weight. However, because of optimizing intra/inter class difference of underlying feature extraction methods, we can easily expect that the face authentication system does not successfully decrease the face authentication failure. In this paper, for ensuring the flexible use of the fuzzy vault scheme, we introduce the bucket structure, which differently implements the weighting idea of Nyang and Lee's face authentication system, and three distribution functions, which formalize the relation between user's weight of preferences and system implementation. In addition, we suggest a matchmaker scheme based on them and confirm its computational performance through the movie database.

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages (HyMES에 대한 결합 확률 분포 기반 단일 파형 분석)

  • Park, ByeongGyu;Kim, Suhri;Kim, Hanbit;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1099-1112
    • /
    • 2018
  • The field of post-quantum cryptography (PQC) is an active area of research as cryptographers look for public-key cryptosystems that can resist quantum adversaries. Among those categories in PQC, code-based cryptosystem provides high security along with efficiency. Recent works on code-based cryptosystems focus on the side-channel resistant implementation since previous works have indicated the possible side-channel vulnerabilities on existing algorithms. In this paper, we recovered the secret key in HyMES(Hybrid McEliece Scheme) using a single power consumption trace. HyMES is a variant of McEliece cryptosystem that provides smaller keys and faster encryption and decryption speed. During the decryption, the algorithm computes the parity-check matrix which is required when computing the syndrome. We analyzed HyMES using the fact that the joint distributions of nonlinear functions used in this process depend on the secret key. To the best of our knowledge, we were the first to propose the side-channel analysis based on joint distributions of leakages on public-key cryptosystem.

Cluster-based Pairwise Key Establishment in Wireless Sensor Networks (센서 네트워크에서의 안전한 통신을 위한 클러스터 기반 키 분배 구조)

  • Chun Eunmi;Doh Inshil;Oh Hayoung;Park Soyoung;Lee Jooyoung;Chae Kijoon;Lee Sang-Ho;Nah Jaehoon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.473-480
    • /
    • 2005
  • We can obtain useful information by deploying large scale sensor networks in various situations. Security is also a major concern in sensor networks, and we need to establish pairwise keys between sensor nodes for secure communication. In this paper, we propose new pairwise key establishment mechanism based on clustering and polynomial sharing. In the mechanism, we divide the network field into clusters, and based on the polynomial-based key distribution mechanism we create bivariate Polynomials and assign unique polynomial to each cluster. Each pair of sensor nodes located in the same cluster can compute their own pairwise keys through assigned polynomial shares from the same polynomial. Also, in our proposed scheme, sensors, which are in each other's transmission range and located in different clusters, can establish path key through their clusterheads. However, path key establishment can increase the network overhead. The number of the path keys and tine for path key establishment of our scheme depend on the number of sensors, cluster size, sensor density and sensor transmission range. The simulation result indicates that these schemes can achieve better performance if suitable conditions are met.

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.

An Efficient Query-based XML Access Control Enforcement Mechanism (효율적인 질의 기반 XML 접근제어 수행 메커니즘)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • As XML is becoming a de facto standard for distribution and sharing of information, the need for an efficient yet secure access of XML data has become very important. To enforce the fine-level granularity requirement, authorization models for regulating access to XML documents use XPath which is a standard for specifying parts of XML data and a suitable language for both query processing. An access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query access. Developing an efficient mechanism for XML databases to control query-based access is therefore the central theme of this paper. This work is a proposal for an efficient yet secure XML access control system. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form which is guaranteed to have no access violations using tree-aware metadata of XML schemes and set operators supported by XPath 2.0. The scheme can be applied to any XML database management system and has several advantages over other suggested schemes. These include implementation easiness, small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

Development of the Dryer with a Heat Source of Carbon Nanofibers (탄소나노섬유를 열원으로 적용한 세탁물 건조기의 개발)

  • Lee, Jung-Hwan;Won, Sang-Yeon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.3
    • /
    • pp.25-34
    • /
    • 2018
  • This paper presents a heating source of carbon nanofibers for the efficiency and the drying performance of laundry dryer, and focuses on the applicability-evaluation of its source. To design the proposed heating module, experiments were conducted in terms of surface temperature and surface temperature distribution characteristics of carbon nanofiber lamps. The surface temperature of the lamps increased linearly with increment of a current to flow a lamp and revealing the increasing pattern as the length of the ramps is shorter. The proposed heating source was evaluated based on drying efficiency, moisture evaporation rate at laundry, and internal temperature of a drum during drying process. The drying efficiency satisfied a 45% which is specified in KS C 9319. The moisture evaporation rate and the internal temperature of the drum were respectively 98.88% and $61.1^{\circ}C$, which are similar to that of S's company dryer. From the evaluation and actual drying test results, the proposed carbon nanofiber lamp heating module is considered to be applicable as a heat source for laundry dryer in terms of drying efficiency and drying performance. it is possible to obtain a heat source at a high temperature, an excellent calorific value, an improvement in drying performance, and an effect of sterilizing laundry due to the emission of far-infrared rays. In addition to the applicability, the difference of the drying efficiency between the dryers was analyzed in detail based on the power consumption of the heat sources.