• Title/Summary/Keyword: Information release

Search Result 783, Processing Time 0.026 seconds

Applications of Seismic Disaster Simulation Technology on Risk Management

  • Yeh, Chin-Hsun
    • 한국방재학회:학술대회논문집
    • /
    • 2010.02a
    • /
    • pp.16-24
    • /
    • 2010
  • This paper introduces the applications of Taiwan Earthquake Loss Estimation System (TELES), which is developed by the National Center for Research on Earthquake Engineering (NCREE). Seismic disaster simulation technology (SDST) integrates geographical information system to assess the distribution of ground shaking intensity, ground failure probability, building damages, casualties, post-quake fires, debris, lifeline interruptions, economic losses, etc. given any set of seismic source parameters. The SDST may integrate with Taiwan Rapid Earthquake Information Release System (TREIRS) developed by Central Weather Bureau (CWB) to obtain valuable information soon after large earthquakes and to assist in decision-making processes to dispatch rescue and medical resources more efficiently. The SDST may also integrate with probabilistic seismic source model to evaluate various kinds of risk estimates, such as average annual loss, probable maximum loss in one event, and exceeding probability curves of various kinds of losses, to help proposing feasible countermeasures and risk management strategies.

  • PDF

Optimal Software Release Using Time and Cost Benefits via Fuzzy Multi-Criteria and Fault Tolerance

  • Srivastava, Praveen Ranjan
    • Journal of Information Processing Systems
    • /
    • v.8 no.1
    • /
    • pp.21-54
    • /
    • 2012
  • As we know every software development process is pretty large and consists of different modules. This raises the idea of prioritizing different software modules so that important modules can be tested by preference. In the software testing process, it is not possible to test each and every module regressively, which is due to time and cost constraints. To deal with these constraints, this paper proposes an approach that is based on the fuzzy multi-criteria approach for prioritizing several software modules and calculates optimal time and cost for software testing by using fuzzy logic and the fault tolerance approach.

Partial Encryption Technique of Digital Contents (디지탈 컨텐츠의 부분 암호화 기법)

  • Hwang, Seon-Tae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.82-87
    • /
    • 2002
  • In the rapidly growing e-business area, the protection of information from hacking or tapping becomes very serious issue. Therefore, the more effective, convenient and secure methods are required to make the e-business more active. in this study, we develop the effective method of protecting digital contents on the public key infrastructure. To do this, we propose the partial encryption scheme to reduce the encryption time, and therefore, to release the server's workload. Our suggested scheme is believed to bring the strong competition to the portal service agents.

Analyses of Framework for Enhanced RFID Security and Privacy (개선된 RFID 보안 및 비밀성을 위한 프레임워크의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.885-888
    • /
    • 2009
  • Radio Frequency IDentification (RFID) is a method of remotely storing and retrieving data using small and inexpensive devices called RFID tags. In this paper we propose a proxy agent framework that uses a personal device for privacy enforcement and increased protection against eavesdropping, impersonation and cloning attacks. Using the proxy model a user decides when and where information carried in a tag will be released. In particular, the user can put tags under her/his control, authenticated requests, release tags, transfer them to new owners, and so on. In this paper, we analyses a new type of simple a framework for enhancing RFID security by means of a proxy, a personal device that assumes control of a user's tags.

  • PDF

A Study on the records management and release of information : based on legislation of self-government (기록물관리와 정보공개에 관한 연구 - 자치법규를 중심으로 -)

  • Kang, Hye-ra;Chang, Woo-Kwon
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2016.08a
    • /
    • pp.87-92
    • /
    • 2016
  • 이 연구는 기록물관리와 정보공개 간의 연관성과 관련된 규정을 파악하는데 있다. 이를 위해 특별시 광역시 도의 지자체 정보공개와 관련된 89개의 자치법규를 분석하였다. 조사결과 자치법규의 조항요소 측면에서 '정보공개심의회'와 '행정정보의 공표'가 가장 많이 규정되었으며, '다른 법률과의 관계'에서는 정보공개의 비대상이 되는 정보만 나타났다. 기록관의 역할에 대해서는 '총괄부서(전담부서)의 명확한 표기의 필요성'과 '기록관 업무의 구분 필요성'이 기술되었다. 업무 협업에서는 '처리과'와 '기록관'의 정보(기록물)를 구분하고 있으며, 이에 대한 협력체계를 나타내었다.

  • PDF

The Effect of Rating Dispersion on Purchase of Experience Goods based on the Korean Movie Box Office Data

  • Chen, Lian;Choi, Kang Jun;Lee, Jae Young
    • Asia Marketing Journal
    • /
    • v.21 no.1
    • /
    • pp.1-21
    • /
    • 2019
  • Online platforms often provide rating information to customers to relieve the uncertainty they encounter when purchasing experience goods. Prior research has focused mostly on the roles of rating volume and the valence of an average rating among the various possibilities. However, less frequently investigated is the effect of rating dispersion, which may be associated with uncertainty regarding how well a product fits a customer's personal preference, on new trials of experience goods. In this study, we examine the effect of rating dispersion on new trials of experience goods and identify the conditions which intensify or reduce the effect. Empirical analyses of movie box office sales data and online rating data reveal three interesting findings. First, movie sales decrease as movie ratings become increasingly dispersed. Second, the negative effect of rating dispersion on movie sales is more pronounced with more rating volume. Third, this negative effect weakens when additional information about a movie is available (i.e., higher average rating, greater star power, and time since its release). We discuss the academic and practical implications of our findings.

A Pragmatic Framework for Predicting Change Prone Files Using Machine Learning Techniques with Java-based Software

  • Loveleen Kaur;Ashutosh Mishra
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.457-496
    • /
    • 2020
  • This study aims to extensively analyze the performance of various Machine Learning (ML) techniques for predicting version to version change-proneness of source code Java files. 17 object-oriented metrics have been utilized in this work for predicting change-prone files using 31 ML techniques and the framework proposed has been implemented on various consecutive releases of two Java-based software projects available as plug-ins. 10-fold and inter-release validation methods have been employed to validate the models and statistical tests provide supplementary information regarding the reliability and significance of the results. The results of experiments conducted in this article indicate that the ML techniques perform differently under the different validation settings. The results also confirm the proficiency of the selected ML techniques in lieu of developing change-proneness prediction models which could aid the software engineers in the initial stages of software development for classifying change-prone Java files of a software, in turn aiding in the trend estimation of change-proneness over future versions.

A Study on Environmental Information System for Hazard Identification of Air Pollutants (환경정보 검색 시스템의 활용에 관한 연구 : 대기오염 물질의 위험성 확인을 중심으로)

  • Kim, Sun-Jeong;Shin, Dong-Chun;Chung, Yong;Koo, Ja-Kon
    • Journal of Environmental Impact Assessment
    • /
    • v.5 no.1
    • /
    • pp.107-121
    • /
    • 1996
  • The objective of this study is to establish the application method of environmental information system which is related to hazard identification for Health Risk Assessment. For establishing the environmental information system, fourteen hazardous chemicals were chosen and applicated to the database network such as RTKNET(Right Know Net), MSDS(Material Safety Data Sheets), TRI(Toxic Release Inventory), IRIS, AIRS, etc. The searching method of environmental information is classified to three sections such as the domestic commercial information company, international database agencies, and internet. Recently the importance of environmental information is being emphasized because it is essential 10 use database system in the field of environmental studies. Most of the foreign research organizations are communicating actively for information exchange, and the improvement of the quality of research. It is required to accumulate the data and develop them to database for future research.

  • PDF

A Study on Strengthening Records Management as a Solution to the Nonexistence of Information (정보부존재 해결방안으로서 기록 생산단계 강화방안 연구)

  • Gwon, Hyeon Jin;Lee, Young Hak
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.18 no.4
    • /
    • pp.25-43
    • /
    • 2018
  • As nonexisting information affects actual information release rate, the study noted that the absence of records leads to the "nonexistence of information." Therefore, in this research, it was argued that records management should be thoroughly controlled from the stage of record production to solve problems such as the loss/damage/neglect/destruction/misclassification/ reduction of preservation periods and more. Through the management from the production stage, it is expected that the nonexistence of information problem will not occur and can be used as a tool for a demonstration of why the nonexistence of information exists even if such information occurs.

Building More Secure Femtocell with Improved Proxy Signature (개선된 위임 서명 방식을 이용해서 더 안전한 펨토셀 환경 구축)

  • Choi, Hyoung-Kee;Han, Chan-Kyu;Kim, Seung-Ryong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.75-86
    • /
    • 2014
  • Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP defines new architecture and security requirement for Release 9 to deal with femtocell, Home eNode B referred as HeNB. In this paper, we analyze the HeNB security with respect to mutual authentication, access control, and secure key agreement. Our analysis pointed out that a number of security vulnerabilities have still not been addressed and solved by 3GPP technical specification. These include eavesdropping, man-in-the-middle attack, compromising subscriber access list, and masquerading as valid HeNB. To the best of our knowledge, any related research studying HeNB security was not published before. Towards this end, this paper proposes an improved authentication and key agreement mechanism for HeNB which adopts proxy-signature and proxy-signed proxy-signature. Through our elaborate analysis, we conclude that the proposed not only prevents the various security threats but also accomplishes minimum distance from use-tolerable authentication delay.