• Title/Summary/Keyword: Form of Communication

Search Result 2,219, Processing Time 0.03 seconds

A Text Mining-based Intrusion Log Recommendation in Digital Forensics (디지털 포렌식에서 텍스트 마이닝 기반 침입 흔적 로그 추천)

  • Ko, Sujeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.6
    • /
    • pp.279-290
    • /
    • 2013
  • In digital forensics log files have been stored as a form of large data for the purpose of tracing users' past behaviors. It is difficult for investigators to manually analysis the large log data without clues. In this paper, we propose a text mining technique for extracting intrusion logs from a large log set to recommend reliable evidences to investigators. In the training stage, the proposed method extracts intrusion association words from a training log set by using Apriori algorithm after preprocessing and the probability of intrusion for association words are computed by combining support and confidence. Robinson's method of computing confidences for filtering spam mails is applied to extracting intrusion logs in the proposed method. As the results, the association word knowledge base is constructed by including the weights of the probability of intrusion for association words to improve the accuracy. In the test stage, the probability of intrusion logs and the probability of normal logs in a test log set are computed by Fisher's inverse chi-square classification algorithm based on the association word knowledge base respectively and intrusion logs are extracted from combining the results. Then, the intrusion logs are recommended to investigators. The proposed method uses a training method of clearly analyzing the meaning of data from an unstructured large log data. As the results, it complements the problem of reduction in accuracy caused by data ambiguity. In addition, the proposed method recommends intrusion logs by using Fisher's inverse chi-square classification algorithm. So, it reduces the rate of false positive(FP) and decreases in laborious effort to extract evidences manually.

Analysis of Emotional Colors in The Mise-en-scene of The Film (영화 <로얄 테넌바움> 미장센에 나타난 감성색채 이미지 분석)

  • Shim, Hyung-Keun
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.5
    • /
    • pp.261-270
    • /
    • 2020
  • In film, color is a tool for storytelling and a metaphor for a story's theme. This study constructs efficient and objective data by analyzing color images of movies delivered to the audience. This Research the visual perception process of color in films and studies the processes accepted by the audience. Through this research process, we examine the emotional response caused by the visual stimulus of film color and quantify the visual factor through color in the film as a factor that effectively induces the emotional response of viewers who watch the movie. This study analyzes the mise-en-scene of Wes Anderson's film, Royal Tenenbaum, and studies the role of communication in cinematic colors. Quantitative analysis of color distribution data is performed using computer color analysis program on the colors displayed through 10 chapters of mise en scene. Through color analysis, it was analyzed that Anderson composed the movie scenes in red and yellow red (YR) with low saturation and medium brightness. Through this analysis, we study how color is used throughout the film and how the quantitative form of its use is to be used as the psychological factor controlling audience's emotion.

Design of Contactless Power Transmission Device Using Cavity Resonator (공동공진기를 이용한 무접점 전력 전송 장치 설계)

  • Chang, Tae-Soon;Kim, Yong-Nam;Hur, Jung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.11
    • /
    • pp.1025-1033
    • /
    • 2011
  • In this paper, we introduce the contactless power transmission device for transmitting the power with the resonant characteristic of the cavity resonator. When transmitting the power, the contactless power transmission device begins to work in the condition where the transceiver adheres closely. The transceiver is electrically separated because there is no conductive terminal outside and the size of the receiver required for the electric power transmission can be minimized. The cavity resonator comprises slots for the input port and output port in the upper side conductor plate of the cavity and forms the input port and output port using the stripline structure at this upper part. The some of output port is separated from it and the electric power receiver is formed thus the union can be possible. The rest except electric power receiver become the electric power transmitter, which includes the input port of stripline-slot coupling, cavity, and the slot of the output port. If the transmitter and the receiver are combined, they become the form in which the electricity is transferred from the input port to the output port in a cavity resonator. The center frequency of the contactless power transmitter manufactured is 5.782 GHz. and $S_{21}$ is measured as -1.07 dB. It is confirmed that the high electric power transfer rate is approximately 78 %.

Security Threats and Potential Security Requirements in 5G Non-Public Networks for Industrial Applications

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.105-114
    • /
    • 2020
  • In this paper, we address security issues in 5G non-public networks for industrial applications. In contrast to public networks that offer mobile network services to the general public, 5G non-public networks provide 5G network services to a clearly defined user organization or groups of organizations, and they are deployed on the organization's defined premises, such as a campus or a factory. The main goal of this paper is to derive security threats and potential security requirements in the case that 5G non-public networks are built for discrete and process industries according to the four deployment models of 5G-ACIA (5G Alliance for Connected Industries and Automation). In order to clarify the scope of this paper, we express the security toolbox to be applied to 5G non-public networks in the form of the defense in depth concept. Security issues related to general 5G mobile communication services are not within the scope of this paper. We then derive the security issues to consider when applying the 5G-ACIA deployment models to the industrial domain. The security issues are divided into three categories, and they are described in the order of overview, security threats, and potential security requirements.

A Study on the Process of Pacific Park Development in NYC -Focusing on the Changes & Responds Shown in the Development Process- (뉴욕시 퍼시픽 파크 개발의 진행과정에 대한 분석적 고찰 -개발 진행상의 변화 및 위기대응과정을 중심으로-)

  • Lee, Woo Hyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.745-752
    • /
    • 2020
  • The purpose of this study is to analyze the development progress of Pacific Park (formerly Atlantic Yard) in Brooklyn, New York City. Along with the Hudson Yards Development in Manhattan, Pacific Park is one of New York City's leading large-scale urban development projects using space right above an existing railway and has attracted worldwide attention. With the resurgence of large-scale development, its advanced form has received social attention. In particular, the development was evaluated as an exemplary development using the Community Benefits Agreement, which benefits local residents. Unfortunately, due to various difficulties, the development has been struggling from delays and changes away from the early stages, which have also caused social concerns and criticism. In this regard, this study examines the development through the process and the public sector's responses to the risk-inducing factors and reactions. The theoretical background of the US urban redevelopment is examined, and the specific changes and major contents of the project are analyzed. The following implications were drawn based on changes and responses in the development process: 1) securing the flexibility and mandatoryness of developers, 2) comprehensive control of the development site, 3) communication with and responding to the public, 4) securing additional financial resources, and 5) verification of new technologies.

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Son, Hong;Jo, In-June;Ju, Young-Ji;Lee, Dal-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.667-671
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can been through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working Group is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, I design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

Feedback Phenomenon in Technology Art (예술 공학의 피드백)

  • Kim Hyung-Gi
    • Science of Emotion and Sensibility
    • /
    • v.8 no.4
    • /
    • pp.423-433
    • /
    • 2005
  • The computer hardware development has provided many chances of emergence between art and technology. In many cases today's interactive artworks cannot be completed without audience's participation. The interactive production process with technical supplementation can be celled feedback. Mr. Nam Jun Paik showed 'Participant TV' that interacts with audience's response in real time. It means artwork changes with the constantly changing value from the data set from human visual perception. Dan Graham showed another feedback related work, which delays 5second playback in mirror that implies consequence of time. Today's media art has to sublimate coincidence, time ant audience into philosophical artwork through consonance that comes with video and sound as we can see from Bill Viola. Stelarc produced artworks. That use input data that is weak signals from brain, muscles. Through a terminal display with player, body expanded meaning of media. Jeffrey Shaw's 'Legible City' provided a fabrication of the reality with the interaction of bicycle's pedal speed and steering direction that is controlled by 4river. RE:MARK used microphone as input device as Edmond Couchot's 'Je same a la vent' and Nam Jun Paik's 'Participant TV' did. There is no communication without feedback between human being. The reality makes audience involved into artworks. That is the reason why feedback has to be natural. Through the feedback process, the originality of the idea is altered by audience. The feedback is not just part of flesh of artwork rather skeleton of it. Technological showoff cannot be art itself The perfection of technological application plan helps feedback that interacts with audience naturally in order that audience hoes not feel the feedback as artificial plan. Interactive media art has to be evolved into new media form with new integration feedback technology.

  • PDF

An efficient cloud security scheme for multiple users (다중 사용자를 위한 효율적인 클라우드 보안 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.2
    • /
    • pp.77-82
    • /
    • 2018
  • Recently, as cloud services become popular with general users, users' information is freely transmitted and received among the information used in the cloud environment, so security problems related to user information disclosure are occurring. we propose a method to secure personal information of multiple users by making personal information stored in the cloud server and a key for accessing the shared information so that the privacy information of the multi users using the cloud service can be prevented in advance do. The first key used in the proposed scheme is a key for accessing the user 's personal information, and is used to operate the information related to the personal information in the form of a multi - layer. The second key is the key to accessing information that is open to other users than to personal information, and is necessary to associate with other users of the cloud. The proposed scheme is constructed to anonymize personal information with multiple hash chains to process multiple kinds of information used in the cloud environment. As a result of the performance evaluation, the proposed method works by allowing third parties to safely access and process the personal information of multiple users processed by the multi - type structure, resulting in a reduction of the personal information management cost by 13.4%. The efficiency of the proposed method is 19.5% higher than that of the existing method.

"Poor Theatre, Poor Art" - Jerzy Grotowsky's Play and Arte Povera ('가난한 연극, 가난한 미술' - 그로토프스키 연극이론과 아르테 포베라)

  • Kang, Young-Joo
    • The Journal of Art Theory & Practice
    • /
    • no.5
    • /
    • pp.109-133
    • /
    • 2007
  • What a concept of theatricality in modern art became more controversial is through a review "art and object-hood" on Michael Fried's minimal art, as having been already known broadly. As he had been concerned, the art following the minimalism is accepting as the very important elements such as the introduction of temporality, the stage in the exhibition space, and the audience's positive participation, enough to be no exaggeration to say that it was involved in almost all the theatricality. Particularly even in the installation art and the environment art, which have substantially positioned since the 1970s, the space is staged, and the audience's participation is greatly highlighted due to the temporal character and the site-specific in works. In such way, the theatricality in art work is today regarded as one of the most important elements. In this context, it is thought to have significance to examine theatricality, which is shown in the works of Arte Povera artists, who had been active energetically between 1967-1971. That is because the name of this group itself is what was borrowed from "Poor Theatre" in Jerzy Grotowski, who is a play director and theorist coming from Poland, and because of having many common points in the aspect of content and form. It reveals that the art called Arte Povera is sharing many critical minds in the face of commanding the field called a play and other media. Grotowski's theatre theory is very close to the theory and substance in Arte Povera in a sense that liberates a play, which was locked in literature, above all, renews the relationship between stage and seat and between actor and audience, and pursues a human being's change in consciousness through this. That is because Arte Povera also emphasizes the communication with the audience through appealing to a human being's perception and through the direct and living method, not the objective art concept of centering on the work. In addition, the poor play or poor art all has tendency that denies a system, which relies upon economic and cultural system, and seeks for what is anti-cultural, elemental, and fundamental. It is very similar even in a sense that focuses on the exploration process itself rather than the result, excludes the transcendental concept, and attaches importance to empiricism. However, Arte Povera accepts contradictoriness and complexity, and suggests eclecticism and tolerance, thereby being basically the nomadic art and the art difficult to be captured constitutively. On the other hand, there is difference in a sense that the poor play is characterized by purity, asceticism, seriousness, and solemnity. If so, which significance does this theatricality, which was introduced to art, ultimately have? As all the arts desire to be revealed with invisible things beyond the visual thing, theatricality comes to play a very important role at this time. If all the artists and audiences today came to acquire actual or virtual freedom much more, that can be said to be a point attributable to that art relied upon diverse conditions in a play.

  • PDF

A Study on Research Data Creation and Management by Researchers in Mechanical Engineering (기계공학분야 연구자들의 연구데이터 생산과 관리에 관한 연구)

  • Park, Yunmi;Kim, Jihyun
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.21 no.4
    • /
    • pp.137-162
    • /
    • 2021
  • This study aimed to examine the perception and experience of researchers in the field of mechanical engineering on research data creation and management, and suggest implications for research data management and services in the field. Research data management and services of domestic and foreign research institutes were investigated, and in-depth interviews were conducted with researchers belonging to domestic mechanical engineering research institutes to analyze the perception and conduction of research data creation and management according to four major categories: "research data, accountable conducting of research and compliance with research ethics, utility and effectiveness of research data management, and the value of sharing research data." To ensure effective research data management and services in mechanical engineering, it is necessary to conduct a data investigation on the process, type, and form of production to collect explicit metadata and implicit contextual information. It is also necessary to propose a plan to recognize research results using the publication of data journals and to prepare infrastructure such as a cloud-based system that supports safe data management and communication between researchers. In addition, it suggests that it is important for various officials in the research field to allocate roles and responsibilities for research data management and services at the organizational level.