• Title/Summary/Keyword: Mutual text

Search Result 80, Processing Time 0.023 seconds

A Study on Analysis of the Trend of Blockchain by Key Words Network Analysis (키워드 네트워크 분석 방법을 활용한 블록체인 트렌드 분석에 관한 연구)

  • Cho, Seong-Hwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.550-555
    • /
    • 2018
  • This study aims to identify and compare contents and keywords used in articles related to blockchain applications to various industries. The text mining and Semantic Network Analysis, as methods of keyword network analysis, were used to analyze articles including terms of 'finance' 'energy' and 'logistics', which media and government frequently mentioned as areas that can apply blockchain technologies. For this study, data were collected from 43,093 articles from January, 2017 through July, 2018. Data crawling was carried out by using Python BeautifulSoup and data cleaning was performed in order to eliminate mutual redundancies of the three terms. After that, text mining and semantic network analysis were performed using Textom and UCInet for network analysis between keywords. The results showed that all the three terms were similar in terms of 'technology', but there were differences in the contents of 'government policy' or 'industry' issues. In addition, there were differences in frequencies and centralities of these terms.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

An Evaluation of Effort for Developing the RIA-Based Cyber Education System (RIA 기반 가상교육 시스템의 개발 노력 평가)

  • Lee Bu-Kwon;Yoo Kyeong-Jong;Seo Yeong-Geon
    • Journal of Digital Contents Society
    • /
    • v.4 no.1
    • /
    • pp.91-99
    • /
    • 2003
  • With the improvement of the web-technology, web-based cyber education is progressing from the text-based to the hyper-based including multimedia, and from one way of simply giving the contents to the learner to another way of providing mutual interaction between instructors and learners. There are several fields using the dynamic application and multimedia contents. RIA(Rich Internet Application), which. is the new paradigm of the web, provides clients with more effective and rich contents, combining the dynamic application and multimedia contents. With the existing web script language, a lot of time and efforts will be very needed to provide learners with various and rich contents. In this paper, we compare the efforts in developing the RIA based education system with the Non-RIA based education system, then experiment the characteristics of the RIA based education system

  • PDF

A study on the development of CAI program and its application for improving problem-solving - Focused on circular equations - (문제해결력 신장을 위한 CAI프로그램 개발 및 적용에 관한 연구 - 원의 방정식을 중심으로 -)

  • 박달원;홍성기
    • Journal of the Korean School Mathematics Society
    • /
    • v.2 no.1
    • /
    • pp.231-242
    • /
    • 1999
  • The focus of this development program is to input multimedia materials into learning according to the trend of recent social changes and to maximize the learning effect for improving problem-solving by offering familiar teaching materials. The expecting effects of this study are as follows: 1. This program helps students acquire mathematical concepts and principles about circular equation through concrete examples using a variety of media - text, voice, sound, and animation and so on - , makes it possible individual learning which was difficult for students to expect at the existing multitude class as progressing learning each unit on the screen and the perfect learning by offering FEED BACK 2. This program varied the difficulty of learning contents to learn according to learning abilities of learners by using animation and making the most of merits of computer and was able to improve learning effect by studying in a mutual way with managing learning procedure nonsuccessively. 3. Class using CAI program about developed circular equation unit has a positive effect on improving problem-solving by becoming from teacher centered class to student centered one. 4. This program makes students understand the contents of auxiliary learning in multimedia computer more efficiently, and cultivate abilities to adopt in accordance with changes in the future society by forming familiar computer mind.

  • PDF

The proposal of improved secure cookies system based on public-key certificate (인증서 기반의 개선된 보안 쿠키의 설계와 구현)

  • 양종필;이경현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1090-1096
    • /
    • 2002
  • The HTTP does not support continuity for browser-server interaction between successive visits or a user due to a stateless feature. Cookies were invented to maintain continuity and state on the Web. Because cookies are transmitted in plain and contain text-character strings encoding relevant information about the user, the attacker can easily copy and modify them for his undue profit. In this paper, we design a secure cookies scheme based on X.509 public key certificate for solving these security weakness of typical web cookies. Our secure cookies scheme provides not only mutual authentication between client and server but also confidentiality and integrity of user information. Additionally, we implement our secure cookies scheme and compare it to the performance with SSL(Secure Socket Layer) protocol that is widely used for security of HTTP environment.

Design and Analysis of the Wireless LAN Security Model using Block Cipher (블록 암호를 이용한 무선랜 보안 모델)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.25-30
    • /
    • 2011
  • WEP is proposed networks dominate the market in the future wireless LAN encryption and authentication features to provide a secure protocol. However, WEP does not suggest a specific measures when generating the initial values used for the creation cipher text, the initial value problem because tile size and no-encryption if you have been raised about the safety issue. In this paper pointed out the vulnerabilities of WEP and the proposed improvement plan for this improvement was proposed based on the initial value to avoid re-creating the initial value of the system and using a block cipher in CBC mode for confidentiality and to provide mutual authentication New WLAN security model was proposed.

An Analysis of Allegorian Characteristics of Piranesi's Etching Works (피라네지 공간의 알레고리적 특성에 관한 연구)

  • Lim, Ki-Taek;Lim, Kwang-Sung
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.1 s.54
    • /
    • pp.3-11
    • /
    • 2006
  • After the 60's, The discourse of the Art of Reception, semiotics, and epistemology have been made steady progress. Especially, the Art of Reception which emphasizes the role of reader in the process of understanding the text, had made the significant role of the Border Dismantling in the Architecture. Its concept can be difined as the free interpretation of each individuals on the art works, that abhors the one-directional systems between reader and writer. This study analyzes the meaning of 'Borderness dismantling' as a molting the center of the world of God, center of Ideology, center of ration in the pluralized and center-cracked world. and also means vague border, no limitation, and overcoming, which make people participate together to overcome the estrangement. The process of study inquire into the phenomenon of fragmentization, indeterminacy, continuitiness, hybridization, mutual penetration, Rhizome and complex allegorization(the process of humanization) Looking back of architectural history, in the origin of those phenomenon, there is the etching works of Piranesi. Many contemporary architects had been affected by his works, and re-interpret and make come true of his visions. This study analyze the meanings of his working process and consequences on contemporary architecture.

A Study on Modeling Index Literatures and Index Techniques for Establishing DB of Korean Acupuncture, Moxibustion and Surgical Techniques (한국 침구외과 지표기술 및 지표문헌 DB 구축을 위한 범위 설정과 모델링 연구 - 침구기법과 외과적 수기법을 중심으로 -)

  • Cha, Wung-Seok;Kim, Min-Seon;Kim, Dong-Ryul;Ahn, Sang-Woo
    • The Journal of Korean Medical History
    • /
    • v.28 no.2
    • /
    • pp.73-85
    • /
    • 2015
  • This paper is the result of a research conducted for "Knowledge Resource Development by Excavation and preservation and DB Establishment of Traditional Home Remedy", a part of Korean Medicine knowledge infrastructure establishment and Korean Medicine therapy development project executed by Korea Institute of Oriental Medicine. This paper is a part of the plans to standardize Korean acupuncture and moxibustion and surgical techniques in order to make new techniques derived from Korean traditional medicine patentable, as presented in the Nagoya Protocol. By first reviewing traditional text sources and classifying them into index literature and index techniques, we can see a mutual relationship between these two categories. Based on current research papers, this study has established a total of 121 pieces of index literature as well as extracted 64 types of index techniques in acupuncture and surgery technique. Both index literature and index technique have been concurrently visualized in this paper in the "Korean Acupuncture & Moxibustion Technique and Surgical Manipulation Base Map".

A Speech Homomorphic Encryption Scheme with Less Data Expansion in Cloud Computing

  • Shi, Canghong;Wang, Hongxia;Hu, Yi;Qian, Qing;Zhao, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2588-2609
    • /
    • 2019
  • Speech homomorphic encryption has become one of the key components in secure speech storing in the public cloud computing. The major problem of speech homomorphic encryption is the huge data expansion of speech cipher-text. To address the issue, this paper presents a speech homomorphic encryption scheme with less data expansion, which is a probabilistic statistics and addition homomorphic cryptosystem. In the proposed scheme, the original digital speech with some random numbers selected is firstly grouped to form a series of speech matrix. Then, a proposed matrix encryption method is employed to encrypt that speech matrix. After that, mutual information in sample speech cipher-texts is reduced to limit the data expansion. Performance analysis and experimental results show that the proposed scheme is addition homomorphic, and it not only resists statistical analysis attacks but also eliminates some signal characteristics of original speech. In addition, comparing with Paillier homomorphic cryptosystem, the proposed scheme has less data expansion and lower computational complexity. Furthermore, the time consumption of the proposed scheme is almost the same on the smartphone and the PC. Thus, the proposed scheme is extremely suitable for secure speech storing in public cloud computing.

Modality and implication of chinese minority group's cultural change: focused on hui-zu's culture and yi-zu's culture (중국(中國) 소수민족(少數民族) 문화접변(文化接變) 양상(樣相)의 변화(變化): 회족(回族)과 이족(彝族)의 문화(文化)를 중심으로)

  • Kim, dug sam
    • Cross-Cultural Studies
    • /
    • v.29
    • /
    • pp.153-176
    • /
    • 2012
  • This study focused on concretely how minority group's attitude accepting han-zu's culture changes. In the past, minority group's culture and han-zu's culture were acculturated spontaneously, not forcibly. But as the people's republic of china was founded and control of chinese government was intensified, control and interference of minority group area became aggressive, and acculturation became compulsory. However, after chinese economic reform, by economic affluence and modernization and urbanization according to economic affluence, acculturation of minority group's culture and han-zu's culture is changing from forced acculturation to spontaneous acculturation. Still there are some areas where mutual friction lasts because of forced acculturation. But except some areas the stream is changing rapidly to spontaneous acculturation. In the text, this study investigated process and present state of acculturation focused on hui-zu that implemented aggressive acceptance of han-zu's culture relatively early. Then this study investigated yi-zu society and cultural change focused on their spontaneous acculturation. In the modern society setting a high value on convenience and personal happiness rather than ideology and value, value of race becomes less attractive to young people of minority group who know modern civilization and convenience of city. In this respect, maybe hui-zu society is future of yi-zu society and minority group society.