• Title/Summary/Keyword: Manipulation information

Search Result 563, Processing Time 0.031 seconds

The Analysis on Establishment of National Consilience Complex in Korea (보건 및 의료분야 중심의 국가 복합과학기술타운조성 연구)

  • Kim, Jong-Kwon
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2011.04a
    • /
    • pp.113-127
    • /
    • 2011
  • The information technology intensive society rapidly moves from manufacturing industry to information technology industry. This paradigm of Robot is depending on intelligent Robot instead of labor. The conventional Robot worked through environmental variation and shift of job. This Robot is unactively response to men's mandate. And, this Robot have had iterative jobs through manipulation of men. But, this intelligent Robot have new technology through society paradigm shift. The outstanding feature of this Robot is perception function and cognition, mobility and manipulation. The definition of original Robot means forceful and tedious, slavery job. This is from robota, robotnick of the Czech Republic. Karel Capek, a playwriter of the Czech Republic use of this letter at 'Rossum's Universal Robots. The service of U-Health is the fusion of Information Technology and Medical Service. The U-Health provides for doing about household's medical behavior. Conclusionally, the Chungbuk has merit on establishment of national consilience complex such as Medical Robot and U-Health.

  • PDF

A Study on New Alternatives for Overflowing Internet Information and Blocking Harmful Information (인터넷 정보과잉과 유해정보 차단을 위한 새로운 대안 연구)

  • Kim, Sang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.81-86
    • /
    • 2019
  • Problems related to information overload and harmful information have already expanded to national social problems as well as personal problems. This study explores the causes of Internet addiction, exposure to harmful information, malicious comments, fake information/information manipulation, and new alternatives that have recently been felt as social problems. Assuming that existing technologies/policies were not applied effectively, psychological cause analysis was performed for the fundamental problem approach. As a result, internal problems such as obsession with knowledge/understanding of wrong information/black and white stereotypes and prejudice were analyzed as main causes. Each proposed solution aims to help improve national technology/policy regarding internet addiction and blocking harmful information.

A Study on User Interface Design According to 3D Menu Type and Control Type for 3D Displays

  • Kim, Jae-Ho;Jung, Sung-Wook;Choe, Jae-Ho;Jung, Eui-S.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.4
    • /
    • pp.551-562
    • /
    • 2011
  • Objective: We proposed an effective 3D menu manipulation alternative with a usability test. This was performed in a 3D environment with 3D menu and control manipulation methods. Background: As 3D stereoscopic displays became generalized, various 3D applications were being used not just movies, games, but also mobile contents and advertisements. However, when a user interface was designed in a 3D environment, it was lacked that a clear standard and result of an efficiency and usability as like a 2D environment. Method: We implemented 9 kinds of 3D menu types based on 3D menu hierarchies, menu layouts and dimensions. And we extracted 3 representative control types in a 3D environment. We performed usability evaluation with full factorial design for 27 menu alternatives with 2 types of menu manipulation tasks. In this condition, we measured the performance time, subjective discomfort and eye-fatigue. Results: A control type had the significant effect, and the effect of menu types had the different result depending on given tasks. Conclusion: This experiment showed the interaction of menu and control types depended on 3D menu manipulation tasks were significant in a 3D user interface design. Therefore, as a purpose of a 3D menu manipulation task, 3D menu types and control types were should be considered. Application: We supposed this result was should be applied in a 3D menu contents design.

An Attack of Defeating Keyboard Encryption Module using Javascript Manipulation in Korean Internet Banking (자바스크립트 변조를 이용한 국내 인터넷 뱅킹 키보드 암호화 모듈 우회 공격)

  • Lee, Sung-hoon;Kim, Seung-hyun;Jeong, Eui-yeob;Choi, Dae-seon;Jin, Seung-hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.941-950
    • /
    • 2015
  • Internet banking is widely used in our life with the development of the internet. At the same time, phishing attacks to internet banking have been increased by using malicious object to make unfair profit. People using internet banking service in Korea is required to install security modules such as anti-virus and keyboard protection. However phishing attack technique has been progressed and the advanced technique such as memory hacking defeats the security module of internet banking service. In this paper, we describe internet banking security modules provided by Korean internet banks and analyze how keyboard encryption module works. And we propose an attack to manipulate account transfer information using javascript. Although keyboard protection module provides two functions that protect leakage and manipulation of account transfer information submitted by users against the malicious program of hackers. Our proposed technique can manipulate the account transfer information and result html pages.

Digital Watermarking using the Channel Coding Technique (채널 코딩 기법을 이용한 디지털 워터마킹)

  • Bae, Chang-Seok;Choi, Jae-Hoon;Seo, Dong-Wan;Choe, Yoon-Sik
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3290-3299
    • /
    • 2000
  • Digital watermarking has similar concepts with channel coding thechnique for transferring data with minimizing error in noise environment, since it should be robust to various kinds of data manipulation for protecting copyrights of multimedia data. This paper proposes a digital watermarking technique which is robust to various kinds of data manipulation. Intellectual property rights information is encoded using a convolutional code, and block-interleaving technique is applied to prevent successive loss of encoded data. Encoded intelloctual property rithts informationis embedded using spread spectrum technique which is robust to cata manipulation. In order to reconstruct intellectual property rights information, watermark signalis detected by covariance between watermarked image and pseudo rando noise sequence which is used to einbed watermark. Embedded intellectual property rights information is obtaned by de-interleaving and cecoding previously detected wtermark signal. Experimental results show that block interleaving watermarking technique can detect embedded intellectial property right informationmore correctly against to attacks like Gaussian noise additon, filtering, and JPEG compression than general spread spectrum technique in the same PSNR.

  • PDF

Manipulation System for Nutrition Counseling Based on Internet (인터넷 영양상담관리 시스템)

  • Hong, Sun-Myeong;Kim, Gon
    • Journal of the Korean Dietetic Association
    • /
    • v.10 no.3
    • /
    • pp.284-292
    • /
    • 2004
  • The purpose of this study was to develop a manipulation system for nutrition counseling based on internet. This system offers convenient user interface and the synthetic counseling results with various utilities. This system consists of the general information of clients, the anthropometry data and the calculation of obesity and body index, the state of eating habits, calorie expenditure, clinical symptoms, the convenient method for analysis of nutrients, biochemical data and nutrition prescription. Having interoperability, these functions preserve the information of clients and manage the historical data. This system can insert, store, print out and generate the synthetic information of clients to provide a suitable and efficient nutrition counseling information. With accumulated client data, It does the nutrition education and counseling simultaneously. As it is developed based on internet, it provides friendly user interface. Also, Managing clients' information connected to database, it can provide a systematic and formal information. It is possible for the system to retrieve information and counsel in real time. It is expected that the nutrition counseling management system can improve the national health with animated nutrition counseling.

  • PDF

An Empirical Study for Performance Evaluation of Web Personalization Assistant Systems (웹 기반 개인화 보조시스템 성능 평가를 위한 실험적 연구)

  • Kim, Ki-Bum;Kim, Seon-Ho;Weon, Sung-Hyun
    • The Journal of Society for e-Business Studies
    • /
    • v.9 no.3
    • /
    • pp.155-167
    • /
    • 2004
  • At this time, the two main techniques for achieving web personalization assistant systems generally concern direct manipulation and software agents. While both direct manipulation and software agents are intended for permitting user to complete tasks rapidly, efficiently, and easily, their methodologies are different. The central debate involving these web personalization techniques originates from the amount of control that each allows to, or holds back from, the users. Direct manipulation can provide users with comprehensibel, predictable and controllable user interfaces that give them a feeling of accomplishnent and responsibility. On the other hand, the intelligent software components, the agents, can assist users with artificial intelligence by monitoring or retrieving personal histories or behaviors. In this empirical study, two web personalization assistant systems are evaluated. One of them, WebPersonalizer, is an agent based user personalization tool; the other, AntWorld, is a collaborative recommendation tool which provides direct manipulation interfaces. Through this empirical study, we have focused on two different paradigms as web personalization assistant systems : direct manipulation and software agents. Each approach has its own advantages and disadvantages. We also provide the experimental result that is worth referring for developers of electronic commerce system and suggest the methodologies for conveniently retrieving necessary information based on their personal needs.

  • PDF

A Study on Countermeasures for Personal Data Breach and Security Threats of Social Network Game (소셜 네트워크 게임(SNG) 서비스의 개인정보 유출 및 보안위협 대응방안에 관한 연구)

  • Lee, Sang Won;Kim, Huy Kang;Kim, Eun Jin
    • Journal of Korea Game Society
    • /
    • v.15 no.1
    • /
    • pp.77-88
    • /
    • 2015
  • As the smart phone market is drastically expanding, there is a steady growth of recent vicious activities such as data manipulation, billing fraud, identity theft, and leakage of personal information that are security threats to Social Network Games(SNG). Due to the threats, Strong development standard is required for security enhancement of SNG. Nonetheless, short life-spans, additional expenses, and the necessities to provide a sound game service hinders developers from reaching their security goals. Therefore, this research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services. In addition, the research presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.

Development of the Financial Account Pre-screening System for Corporate Credit Evaluation (분식 적발을 위한 재무이상치 분석시스템 개발)

  • Roh, Tae-Hyup
    • The Journal of Information Systems
    • /
    • v.18 no.4
    • /
    • pp.41-57
    • /
    • 2009
  • Although financial information is a great influence upon determining of the group which use them, detection of management fraud and earning manipulation is a difficult task using normal audit procedures and corporate credit evaluation processes, due to the shortage of knowledge concerning the characteristics of management fraud, and the limitation of time and cost. These limitations suggest the need of systemic process for !he effective risk of earning manipulation for credit evaluators, external auditors, financial analysts, and regulators. Moot researches on management fraud have examined how various characteristics of the company's management features affect the occurrence of corporate fraud. This study examines financial characteristics of companies engaged in fraudulent financial reporting and suggests a model and system for detecting GAAP violations to improve reliability of accounting information and transparency of their management. Since the detection of management fraud has limited proven theory, this study used the detecting method of outlier(upper, and lower bound) financial ratio, as a real-field application. The strength of outlier detecting method is its use of easiness and understandability. In the suggested model, 14 variables of the 7 useful variable categories among the 76 financial ratio variables are examined through the distribution analysis as possible indicators of fraudulent financial statements accounts. The developed model from these variables show a 80.82% of hit ratio for the holdout sample. This model was developed as a financial outlier detecting system for a financial institution. External auditors, financial analysts, regulators, and other users of financial statements might use this model to pre-screen potential earnings manipulators in the credit evaluation system. Especially, this model will be helpful for the loan evaluators of financial institutes to decide more objective and effective credit ratings and to improve the quality of financial statements.

Introduction of Integrated Management of Satellite Imagery Information

  • Chae, Gee-Ju;Yoon, Geun-Won;Hwang, Tae-Hyun;Park, Jong-Hyun
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.197-201
    • /
    • 2002
  • The high prices of satellite images prevent researchers from studying remote sensing and most non-professional people doesn't have the simple and easy solutions for the manipulation of satellite images. "Integrated Management of Satellite Imagery Information" project which will be promoted by ETRI (Electronics and Telecommunications Research Institute) will provide the solutions for the above mentioned problems. We will introduce the archiving center in this study. This includes the data construction, storage, management and distribution. We first review the background for this archiving center and introduce the interior and foreign institutes which archive and distribute satellite images. We review our H/W system and S/W system briefly. Finally, the further service of our project will be suggested. Since we will distribute the satellite images (Landsat, SPOT, JERS, Corona, Kompast-1) and will receive Landsat7 ETM+ in 2003 you, this will help the professional work dealing with the satellite image and attract the non-professional people for simple and easy manipulation solutions of satellite image.

  • PDF