• Title/Summary/Keyword: Information share

Search Result 2,818, Processing Time 0.031 seconds

A Study of Natural Language Plagiarism Detection

  • Ahn, Byung-Ryul;Kim, Heon;Kim, Moon-Hyun
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.325-329
    • /
    • 2005
  • Vast amount of information is generated and shared in this active digital As the digital informatization is vividly going on now, most of documents are in digitalized forms, and this kind of information is on the increase. It is no exaggeration to say that this kind of newly created information and knowledge would affect the competitiveness and the future of our nation. In addition to that, a lot of investment is being made in information and knowledge based industries at national level and in reality, a lot of efforts are intensively made for research and development of human resources. It becomes easier in digital era to create and share the information as there are various tools that have been developed to create documents along with the internet, and as a result, the share of dual information is increasing day in and day out. At present, a lot of information that is provided online is actually being plagiarized or illegally copied. Specifically, it is very tricky to identify some plagiarism from tremendous amount of information because the original sentences can be simply restructured or replaced with similar words, which would make them look different from original sentences. This means that managing and protecting the knowledge start to be regarded as important, though it is important to create the knowledge through the investment and efforts. This dissertation tries to suggest new method and theory that would be instrumental in effectively detecting any infringement on and plagiarism of intellectual property of others. DICOM(Dynamic Incremental Comparison Method), a method which was developed by this research to detect plagiarism of document, focuses on realizing a system that can detect plagiarized documents and parts efficiently, accurately and immediately by creating positive and various detectors.

  • PDF

A Study on the Intention and Behavior of Sharing Information in Online World: Focusing on Moderating Effect of Information Importance (온라인상에서 정보공유 의도 및 행동에 미치는 영향에 관한 연구 - 정보 중요성의 조절효과를 중심으로 -)

  • Kim, Gu
    • Informatization Policy
    • /
    • v.20 no.1
    • /
    • pp.22-41
    • /
    • 2013
  • The purpose of this paper is to examine the effect of interpersonal face-to-face offline on identification-based trust and reciprocity norm in online world, and the effect of identification-based trust and reciprocity norm on the intention and behavior of sharing information in online world. To understand the moderating role, the importance of information was established as a moderating variable, and an empirical analysis was conducted, focusing on the undergraduate. The results of this study are as follows. It was found that interpersonal face-to-face in offline world affects identification-based trust and reciprocity norm in online positively. A reciprocity norm of identification-based trust and reciprocity norm in online world affected by interpersonal face-to-face in offline world has a positive effect on the intention and behavior of sharing information in online, but showed that identification-based trust does not affect them significantly. And reciprocity norm has significant relationship with information sharing behavior through the intention to share information. It was found to be a partial moderating effect of importance of information on the relationship among the reciprocity norm and the intention and behavior of sharing information.

  • PDF

Development of Internet based Ship Technical Information Management System (인터넷 기반의 선박 기술정보 관리시스템 개발)

  • Lee S.-S.;Lee J.-K.;Park B. J,;Kim S.-Y.
    • Korean Journal of Computational Design and Engineering
    • /
    • v.10 no.2
    • /
    • pp.89-96
    • /
    • 2005
  • In this paper, Internet based ship technical information management system has been developed as a means to accumulate, manage, share and utilize various distributed applications and information used for ship design and building. The information managed in the system are data from whole life cycle including concept design, basic design, detailed design, construction, operation and maintenance. In addition, using the developed system, integrated system framework is also proposed to integrate applications and database in concurrent engineering environment.

Healthcare System for Elbow Disease (팔꿈치 질환을 위한 Healthcare System)

  • Shin, Seong-Yoon;Cho, Gwang-Hyun;Cho, Seung-Pyo;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.420-421
    • /
    • 2022
  • In this paper, we discuss the abnormalities of flexion and extension in common elbow diseases. In addition, it is linked with the healthcare system to share medical information.

  • PDF

BioPlace: A Web-Based Collaborative Environment for Effective Genome Research

  • Ahn, Geon-Tae;Kim, Jin-Hong;Kang, Kyung-Mi;Lee, Myung-Joon;Han, In-Seob
    • Journal of Microbiology and Biotechnology
    • /
    • v.14 no.5
    • /
    • pp.1081-1085
    • /
    • 2004
  • Genome research has become very popular in most nations. In order to enhance the efficiency of collaboration among genome research groups, ways to store and share data, communicate with each other, be guided through right research strategies, and to easily use well-established databases. In addition, since techniques and softwares for genome research groups are well established, a similar research road map could commonly be applied. In this study, we developed a web-based work place for effective genome research, named 'BioPlace.' From the beginning of writing a proposal, research members can work on the same environment with convenient aid to share files or data. BioPlace provides various ways of collaboration methods among genome researchers. The BioPlace system supports two types of workplaces, namely 'Personal Workspace' and 'Team Workspace.' For each BioPlace user, a Persona] Workspace is provided, while a Team Workspace is provided for each group with the same purpose. In addition, BioPlace provides a 'General Research Road Map' for genome research, and several Korean user interfaces for BLAST, PDB, and Primer3. We expect that BioPlace may facilitate collaboration of genome research among the experienced scientists and help beginners in many different ways as well.

Security Weaknesses in Harn-Lin and Dutta-Barua Protocols for Group Key Establishment

  • Nam, Jung-Hyun;Kim, Moon-Seong;Paik, Ju-Ryon;Won, Dong-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.751-765
    • /
    • 2012
  • Key establishment protocols are fundamental for establishing secure communication channels over public insecure networks. Security must be given the topmost priority in the design of a key establishment protocol. In this work, we provide a security analysis on two recent key establishment protocols: Harn and Lin's group key transfer protocol and Dutta and Barua's group key agreement protocol. Our analysis shows that both the Harn-Lin protocol and the Dutta-Barua protocol have a flaw in their design and can be easily attacked. The attack we mount on the Harn-Lin protocol is a replay attack whereby a malicious user can obtain the long-term secrets of any other users. The Dutta-Barua protocol is vulnerable to an unknown key-share attack. For each of the two protocols, we present how to eliminate their security vulnerabilities. We also improve Dutta and Barua's proof of security to make it valid against unknown key share attacks.

IoE Service Process Research to Maximize Efficient Information Storage and Utilization (효율적인 정보 저장과 활용을 극대화하기 위한 IoE 서비스 프로세스 연구)

  • Chang, Young-Hyun;Oh, Sang-Yeb;Ko, Chang-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.31-35
    • /
    • 2015
  • The IoE service process for maximizing efficiency of information storage and utilization classifies in step five which are interconnected, data collection, storage, organize, analyze, and share. Two key processing elements are store and forward. Keeping the useful knowledge in safe location is "store processing", and utilization of stored useful knowledge is defined as "forward processing" during the IoE service process. Where, past experience data can tell us how to prepare the future utilization. That is, past experience is organized store processing, and preparation for the future is shared forward processing through analysis. To maximize the utilization and storage of information effectively, the various methodologies for IoE service process propose and research in this paper.

Motion Recognition of Mobile Phone for data sharing based on Google Cloud Message Service (Google 클라우드 메시지 서비스 기반의 데이터 공유를 위한 모바일 폰의 모션 인식)

  • Seo, Jung-Hee;Park, Hung-Bog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.205-212
    • /
    • 2019
  • With the rapid spread of mobile phones, users are continuously interested in using the mobile phone in connection with personal activities. Also, increasingly users want to share (transmit and receive) and save data more easily and simply in the mobile environment. This paper suggests motion recognition of mobile phone to share personal information with any people located within a certain distance using location-based service with GCM service. The suggested application is based on Google Cloud Messaging which enables asynchronous communication with the mobile applications executed in Android operating system. The requirements of light-weight mechanism can be satisfied as it is possible to access sharing of personal information easily, simply and in real time through all mobile devices anywhere.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

Zero-Watermarking Algorithm in Transform Domain Based on RGB Channel and Voting Strategy

  • Zheng, Qiumei;Liu, Nan;Cao, Baoqin;Wang, Fenghua;Yang, Yanan
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1391-1406
    • /
    • 2020
  • A zero-watermarking algorithm in transform domain based on RGB channel and voting strategy is proposed. The registration and identification of ownership have achieved copyright protection for color images. In the ownership registration, discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD) are used comprehensively because they have the characteristics of multi-resolution, energy concentration and stability, which is conducive to improving the robustness of the proposed algorithm. In order to take full advantage of the characteristics of the image, we use three channels of R, G, and B of a color image to construct three master shares, instead of using data from only one channel. Then, in order to improve security, the master share is superimposed with the copyright watermark encrypted by the owner's key to generate an ownership share. When the ownership is authenticated, copyright watermarks are extracted from the three channels of the disputed image. Then using voting decisions, the final copyright information is determined by comparing the extracted three watermarks bit by bit. Experimental results show that the proposed zero watermarking scheme is robust to conventional attacks such as JPEG compression, noise addition, filtering and tampering, and has higher stability in various common color images.