• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.031 seconds

User Authentication Method using Vibration Cue on Smartphone (진동 큐를 이용한 스마트폰 사용자 인증 방식)

  • Lee, Jong-Hyeok;Choi, Ok-Kyung;Kim, Kang-Seok;Yeh, Hong-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.3
    • /
    • pp.167-172
    • /
    • 2012
  • Mobile phone devices and memory card can be robbed and lost due to the carelessness that might be caused to leak personal information, and also company's confidential information can be disclosed. Therefore, the importance of user authentication to protect personal information is increasing exponentially. However, there are the limitations that criminals could easily obtain and abuse information about individuals, because the input method of personal identification number or the input method of password might not be safe for Shoulder Surfing Attack(SSA). Although various biometric identification methods were suggested to obstruct the SSA, it is the fact that they also have some faults due to the inconvenience to use in mobile environments. In this study, more complemented service for the user authentication was proposed by applying Keystroke method in the mobile environments to make up for the faults of existing biometric identification method. Lastly, the effectiveness and validity of this study were confirmed through experimental evaluations.

A Study on the Oral Health Belief and Oral Health Education Awareness of Workers in the Workplace (사업장 근로자의 구강건강신념과 구강보건교육 인식에 관한 조사연구)

  • Moon, Seon-Jeong;Ku, In-Young;Choi, Hwa-Young;Ka, Kyung-Hwan
    • The Korean Journal of Health Service Management
    • /
    • v.9 no.3
    • /
    • pp.159-174
    • /
    • 2015
  • Objectives : A survey was conducted to investigate oral health belief and education awareness of oral health of workers in the workplace and to obtain the basic data necessary to promote their oral health and design an oral health education program. Methods : This study conducted a self-administered survey. Results : The following conclusion was made. For oral health beliefs based on the type of work that the workers did, workers in production and technical services had more benefits than those in other fields(security, guard, etc.), and workers on night duty had more oral health hygiene problems than that of regular day-time workers. The longer the period of service was, the more sensitive and serious the workers were and the less beneficial the work was; workers working for eight hours or less had higher levels of importance than those working for ten hours. They were well aware of the need for oral health education but were less aware of the need for an oral health room. Conclusions : It is necessary to emphasize oral health beliefs when developing an oral health education program that promotes oral health for workers in the workplace. If an oral health education program attempts to reflect the concerns of workers in the workplace and provides preferred contents and methods on oral health education, the program is expected to promote the active and positive participation of the workers.

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

The Information a Dental Technician Needs for Esthetic Prosthesis (심미 보철을 위해 기공사가 필요로 하는 정보들)

  • Park, Hyung Rang
    • Journal of the Korean Academy of Esthetic Dentistry
    • /
    • v.7 no.1
    • /
    • pp.64-70
    • /
    • 1998
  • Recently as the interest on Esthetic Dental Prosthesis is arising, the domains of Esthetic Dentistry is being widely investigated. Esthetic Dental Prosthesis is influenced greatly by the shape, color, tooth arrangement of the teeth and the facial features(including the lips). So the degree to which these characters harmonize will be the professional esthetical standard while the satisfaction of the patient will be another esthetical measure. The reason for this is that each and every one of us has a different standard of what is considered beautiful. Of course it doesn't mean that every standard is correct. Then what does Esthetical Prosthesis mean and what should the standard be? This must be defined as a prosthesis that satisfies the basic requirements - margin, contour, occlusion, and at the same time it should restore the shape, color, and tooth arrangement which the client(patient) would love to have. As Esthetic Prosthesis contains its subjective meaning a great deal, it shouldn't be simply distinguished between the beauty of the teeth itself or ugliness. Also in some case, it needs surgical treatment to make it harmonious in the whole aspect so that one may keep the feeling of satisfaction and security. Then what is the shape, color, tooth arrangement that each individual wants? There is an indefinite variety. For example, considering arrangement both regular and irregular is considered beautiful by each different individual. Regular arrangement may be the standard of beauty for some, while irregular arrangement may be thought of as natural looking and beautiful. That is why there must be enough communication with the patient and an agreement be made at the clinic before a diagnostic plan and actual surgery. The treatment plan as mentioned above must be sent to the dental laboratory. In this research, by using case studies, I am going to the importance and appropriateness of the data and information for the dental technician's esthetic prosthesis.

  • PDF

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.

Factor Analysis of the Cloud Service Adoption Intension of Korean Firms: Applying the TAM and VAM (TAM과 VAM을 적용한 기업의 클라우드 서비스 채택의도의 영향요인 분석)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.155-160
    • /
    • 2013
  • The global recession circumstances, cloud computing has emerged as a new paradigm in the business IT sector. This paper explores the analysis of cloud service adoption Intension of Korean firms. Especially, we focus on Infrastructure as a Service (IaaS) among cloud services and apply TAM (Technology Acceptance Model) and VAM (Value-based Adoption Model) to analyze cloud service adoption intension The proposed exploratory model tests a number of hypotheses to understand the importance factors of IaaS adoption intension with TAM and VAM included additional cloud service characteristics such as scalability, agility, security, efficiency and reliability. Eventually, the findings of this study can not only help company users gain insights into IaaS adoption, but also help cloud service providers to develop their service effectively and improve marketing strategy in B2B cloud service market.

A Study on Geotechnical Centrifuge Testing Method for Seismic Performance Evaluation of Large Embankment Dams (대형 댐의 지진응답특성평가를 위한 원심모형시험 기법 연구)

  • Kim, Nam-Ryong;Lim, Jeong-Yeul;Im, Eun-Sang
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.20 no.4
    • /
    • pp.201-209
    • /
    • 2016
  • Damages of large embankment dams by recent strong earthquakes in the world highlight the importance of seismic security of dams. Some of recent dam construction projects for water storage and hydropower are located in highly seismic zone, hence the seismic performance evaluation is an important issue. While state-of-the-art numerical analysis technology is generally utilized in practice for seismic performance evaluation of large dams, physical modeling is also carried out where new construction technology is involved or numerical analysis technology cannot simulate the behavior appropriately. Geotechnical centrifuge modeling is widely adopted in earthquake engineering to simulate the seismic behavior of large earth structures, but sometimes it can't be applied for large embankment dams due to various limitations. This study proposes a dynamic centrifuge testing method for large embankment dams and evaluated its applicability. Scaling relations for a case which model scale and g-level are different could be derived considering the stress conditions and predominant period of the structure, which is equivalent to previously suggested scaling relations. The scaling principles and testing method could be verified by modified modeling of models using a model at different acceleration levels. Finally, its applicability was examined by centrifuge tests for an embankment dam in Korea.

A Study on the POE (Post Occupancy Evaluation) according to the Residential Environment of Mixed-use Apartment Complexes In Seoul

  • Ha, Man Joon
    • International Journal of High-Rise Buildings
    • /
    • v.9 no.2
    • /
    • pp.197-212
    • /
    • 2020
  • In this study, POE(Post Occupancy Evaluation) evaluation indexes were selected into six categories through the consideration of theories and prior research. Therefore, qualitative supply can be achieved through POE according to the aspect of residential environment after the quantitative supply of mixed-use apartment complex by the population concentration in Seoul due to industrialization and urbanization. As the evaluation elements, detailed survey contents were selected for livability, convenience, comfort, safety, economy, and sociality. Based on the survey contents, six elements were evaluated and analyzed using Data coding and Likert scale after surveying 12 complexes (Urban areas and non-urban areas) in Seoul. As a result of the study, six categories selected as the POE showed that importance of quality of life and safety was developed in high recognition according to high satisfaction with convenience and safety. Sociality showed the lowest satisfaction in the following order : livability, comfort, economy and sociality. Residents' sense of community, interaction with neighborhood, etc., showed low satisfaction, and it seems that it is necessary to improve and supplement the system for the development of mixed-use apartment complex in the future. The detailed characteristics of livability showed high satisfaction of the living room, the front door and the main room which are main uses of housing, and low satisfaction in storage size. The analysis of convenience is that convenient public transportation was the highest, and educational environment and additional facilities were the lowest, showing the advantages and disadvantages of location characteristics. As a result of the analysis of comfort, satisfaction with the landscape area was low and it seems that green space is needed for the development of mixed-use apartment complex in the future. Lastly, regarding the safety, the satisfaction of the access control, the location of security office, etc. were high, however separation of circulation was low. Therefore, it is necessary to clearly separate the circulation between the residence and other facilities in the mixed-use apartment complex.

Monitoring on Crop Condition using Remote Sensing and Model (원격탐사와 모델을 이용한 작황 모니터링)

  • Lee, Kyung-do;Park, Chan-won;Na, Sang-il;Jung, Myung-Pyo;Kim, Junhwan
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.5_2
    • /
    • pp.617-620
    • /
    • 2017
  • The periodic monitoring of crop conditions and timely estimation of crop yield are of great importance for supporting agricultural decision-makings, as well as for effectively coping with food security issues. Remote sensing has been regarded as one of effective tools for crop condition monitoring and crop type classification. Since 2010, RDA (Rural Development Administration) has been developing technology for monitoring on crop condition using remote sensing and model. These special papers address recent state-of-the-art of remote sensing and geospatial technologies for providing operational agricultural information, such as, crop yield estimation methods using remote sensing data and process-oriented model, crop classification algorithm, monitoring and prediction of weather and climate based on remote sensing data,system design and architecture of crop monitoring system, history on rice yield forecasting method.

Development of Framework for Effectiveness Measurement of LVC Synthetic Battlefield Training System (LVC 합성전장 훈련체계 효과도 측정 프레임워크 개발)

  • Kwon, Kybeom;Min, Seungin;Yee, Kwanjung;Seol, Hyeonju;Oh, Jihyun;Sim, Inbo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.21 no.5
    • /
    • pp.704-713
    • /
    • 2018
  • The purpose of this study is to develop a systematic framework that can scientifically and quantitatively evaluate the effectiveness of an LVC training system. The proposed framework is based on QFD(Quality Function Development) methodology. The process of developing the framework begins with identifying various needs of stakeholders related to the introduction of the LVC training system. Then the effectiveness areas and factors are derived based on the needs. The measured effectiveness for each factors on alternatives by L, V, C systems are finally synthesized into the one overall effectiveness of each training system for relative comparison among them. In addition, we developed an Excel$^{TM}$-based tool based on the proposed framework methodology to provide an ease-of-use environment for rapid evaluation on the effectiveness of each training system with the given stakeholder need importance combinations, training scenarios and assets. The suggested framework and the measurement tool are expected to be useful for efficient knowledge-based decision making on an acquisition of the LVC training system.