• 제목/요약/키워드: Sensitive information

검색결과 2,324건 처리시간 0.029초

Implementation of Qualitative Unrelated Question Model for Obtaining Sensitive Information at On-Line Survey

  • Park, Hee-Chang;Myung, Ho-Min
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 한국데이터정보과학회 2002년도 춘계학술대회
    • /
    • pp.107-118
    • /
    • 2002
  • This paper is planned to use randomized response technique which is an indirect response technique on internet as a way of obtaining much more precise information, not revealing secrets of responsors, considering that respondents are generally reluctant to answer in a survey to get sensitive information targeting employees, customers, etc.

  • PDF

우선순위제어기능을 가진 ATM스위치의 성능 분석 (Performance Analysis of ATM Switch with Priority Control Mechanisms)

  • 장재신;신병철;박권철
    • 한국통신학회논문지
    • /
    • 제18권8호
    • /
    • pp.1190-1200
    • /
    • 1993
  • 본 연구에서는 입력이 시간 지연에 민감한 트래픽과 손실에 민감한 트래픽으로 이루어진 경우의 우선순위제어기능을 가진 출력버퍼형의 ATM 스위치의 성능을 분석하였다. 손실우선순위제어 메카니즘으로는 부분 버퍼공유 방법을 택했고, 시간우선순위제어 메카니즘으로는 HOL(Head Of Line)우선순위 제어메카니즘을 택했다. 손실에 민감한 트래괵은 포아송 프로세스로 모델링하였고 시간 지연에 민간한 트래픽은 MMPP로 모델링하였다. 손실우선순위제어에서는 손실우선순위제어 메카니즘을 사용할때 손실에 민간한 트래픽의 셀손실률이 감소함을 확인하였고, 시간우선순위제어에서는 HOL 우선순위제어 메카니즘을 사용할때 시간 지연에 민감한 트래픽의 평균 시간지연이 간소함도 확인하였다. 이 결과로부터 시간우선순위제어와 손실우선순위제어를 동시에 사용하면 시간 지연에 민감한 트래괵과 손실에 민감한 트래픽의 서비스질을 동시에 만족하게 할 수가 있다는 것을 확인하였다.

  • PDF

동적우선권제어함수 기반 TBPJ 트래픽 제어방식의 성능분석 (Performance Analysis of Threshold-based Bernoulli Priority Jump Traffic Control Scheme)

  • 김도규
    • 한국정보처리학회논문지
    • /
    • 제7권11S호
    • /
    • pp.3684-3693
    • /
    • 2000
  • 본 논문에서는 다양한 트래픽을 수용해야 하는 차세대 인터넷에서 핵심적인 기능을 담당하는 고속 패킷스위치를 위한 동적우선권제어함수(Dynamic Priority Control Function)이 개념을 도입하고 TBPJ(Threshold-based Bernoulli Priority Jump) 방식에 대한 성능분석을 하였다. 동적우선권제어함수(Dynamic Priority Control Function)는 시스템의 상태에 따라 각 트래픽에 우선권을 동적으로 할당하여 패킷의 스케쥴링(scheduling)을 제어하는 함수 f(.)이다. 클래스 1의 손실민감(loss-sensitive) 트래픽과 클래스 2의 지연민감(delay-sensitive) 트래픽이 고속 패킷스위치의 모든 입력포트에 동일하게 입력되고 스위칭속도(switching capacity)가 m인 $N\timesN$용량의 고속 패킷스위치에 TBPJ 방식의 DPCF 함수를 적용하여 성능을 분석하였다. 이때 스위치는 유한한 크기의 입력 버퍼와 무한크기의 출력버퍼로 구성되어 있고 슬롯 단위로 동기방식(synchronous)으로 동작한다고 가정하였다. TBPJ 방식은 각 입력버퍼에 대기하고 있는 현재 트래픽의 양과 시스템 버퍼의 문턱값(threshold)에 따라 서비스 순위를 동적으로 할당하여 효율적인 스케쥴링이 이루어지도록 한다. 성능분석을 통하여 TBPJ 제어방식이 기존의 우선권 제어 방식보다 성능 및 효율성에 있어서 우수함을 입증하였다. 즉 TBPJ 방식을 적용하여 성능을 분석한 결과 손실민감 트래픽의 QoS(Quality of Service)를 만족시키기 위하여 패킷스위치를 스위치플랜으로 구현하는 경우 병렬로 (즉 m=2) 구성하면 충분하다는 것을 확인하였다.

  • PDF

Cross Talk among Pyroelectric Sensitive Elements in Thermal Imaging Device

  • Bang Jung Ho;Yoon Yung Sup
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 학술대회지
    • /
    • pp.780-783
    • /
    • 2004
  • The two-dimensional modeling of the non-stationary thermal state and voltage responsivity of the sensitive elements usually used in solid-state pyroelectric focal plane arrays are presented. Temperature distributions under periodical thermal excitation and the response of the thermal imaging device, which is composed of the pyroelectric sensitive elements mounted on a single silicon substrate, are numerically calculated. The sensitive element consists of a covering metal layer, infrared polymer absorber, front metal contact, sensitive pyroelectric element, the interconnecting column and the bulk silicon readout. The results of the numerical modeling show that the thermal crosstalk between sensitive elements to be critical especially at low frequency (f < 10Hz) of periodically modulated light. It is also shown that the use of our models gives the possibility to improve the design, operating regimes and sensitivity of the device.

  • PDF

A Novel Mobility Management Scheme for Time Sensitive Communications in 5G-TSN

  • Kim, Jae-Hyun
    • 한국컴퓨터정보학회논문지
    • /
    • 제27권10호
    • /
    • pp.105-113
    • /
    • 2022
  • 본 논문에서는 5G 시스템과 IEEE 시간 민감형 네트워킹(TSN)에 대해서 소개 분석하고 초저지연 네트워크를 지원하기 위하여 5G-TSN에서 시간 민감형 통신을 위한 새로운 이동성 관리 방안을 제안한다. 시간 민감형 네트워킹(TSN)은 이더넷 기반의 저지연, 높은 신뢰성, 결정형 통신을 제공할 수 있는 핵심 요소 기술로써 산업 자동화와 산업용 사물인터넷(IIoT) 분야의 유망한 미래 기술이다. TSN 지원 단말이 TSN 비서비스 영역에서 TSN 서비스 영역으로 이동했을 때, 단말은 관련 이동성 관리가 적절히 수행되지 못하기 때문에 신속하게 TSN 서비스를 받을 수 없다. TSN 서비스 영역의 이동성 상황의 경우, 제안하는 방안은 기존 5G 이동통신망에서의 방안과 비교하여 TSN 서비스 및 초저지연 통신을 즉시 제공받기 위해서 TSN 서비스 사용 가능성을 네트워크에 알리고, 초기 등록을 동작시킨다.

개인정보 처리방침(Privacy Policy) 공개에 관한 주요 4개국 법제 비교분석 (A Comparative Analysis of the Legal Systems of Four Major Countries on Privacy Policy Disclosure)

  • 정태철;권헌영
    • 한국IT서비스학회지
    • /
    • 제22권6호
    • /
    • pp.1-15
    • /
    • 2023
  • This study compares and analyzes the legal systems of Korea, the European Union, China, and the United States based on the disclosure principles and processing policies for personal data processing and provides references for seeking improvements in our legal system. Furthermore, this research aims to suggest institutional implications to overcome data transfer limitations in the upcoming digital economy. Findings on a comparative analysis of the relevant legal systems for disclosing privacy policies in four countries showed that Korea's privacy policy is under the eight principles of privacy proposed by the OECD. However, there are limitations in the current situation where personal information is increasingly transferred overseas due to direct international trade e-commerce. On the other hand, the European Union enacted the General Data Protection Regulation (GDPR) in 2016 and emphasized the transfer of personal information under the Privacy Policy. China also showed differences in the inclusion of required items in its privacy policy based on its values and principles regarding transferring personal information and handling sensitive information. The U.S. CPRA amended §1798.135 of the CCPA to add a section on the processing of sensitive information, requiring companies to disclose how they limit the use of sensitive information and limit the use of such data, thereby strengthening the protection of data providers' rights to sensitive information. Thus, we should review our privacy policies to specify detailed standards for the privacy policy items required by data providers in the era of digital economy and digital commerce. In addition, privacy-related organizations and stakeholders should analyze the legal systems and items related to the principles of personal data disclosure and privacy policies in major countries so that personal data providers can be more conveniently and accurately informed about processing their personal information.

Distinction between Cold-sensitive and -tolerant Jute by DNA Polymorphisms

  • Hossain, Mohammad Belayat;Awal, Aleya;Rahman, Mohammad Aminur;Haque, Samiul;Khan, Haseena
    • BMB Reports
    • /
    • 제36권5호
    • /
    • pp.427-432
    • /
    • 2003
  • Jute is the principal coarse fiber for commercial production and use in Bangladesh. Therefore, the development of a high-yielding and environmental-stress tolerant jute variety would be beneficial for the agro economy of Bangladesh. Two molecular fingerprinting techniques, random-amplified polymorphic DNA (RAPD) and amplified-fragment length polymorphism (AFLP) were applied on six jute samples. Two of them were cold-sensitive varieties and the remaining four were cold-tolerant accessions. RAPD and AFLP fingerprints were employed to generate polymorphism between the cold-sensitive varieties and cold-tolerant accessions because of their simplicity, and also because there is no available sequence information on jute. RAPD data were obtained by using 30 arbitrary oligonucleotide primers. Five primers were found to give polymorphism between the varieties that were tested. AFLP fingerprints were generated using 25 combinations of selective-amplification primers. Eight primer combinations gave the best results with 93 polymorphic fragments, and they were able to discriminate the two cold-sensitive and four cold-tolerant jute populations. A cluster analysis, based on the RAPD and AFLP fingerprint data, showed the population-specific grouping of individuals. This information could be useful later in marker-aided selection between the cold-sensitive varieties and cold-tolerant jute accessions.

한국어 어휘 의미망(alias. KorLex)의 지식 그래프 임베딩을 이용한 문맥의존 철자오류 교정 기법의 성능 향상 (Performance Improvement of Context-Sensitive Spelling Error Correction Techniques using Knowledge Graph Embedding of Korean WordNet (alias. KorLex))

  • 이정훈;조상현;권혁철
    • 한국멀티미디어학회논문지
    • /
    • 제25권3호
    • /
    • pp.493-501
    • /
    • 2022
  • This paper is a study on context-sensitive spelling error correction and uses the Korean WordNet (KorLex)[1] that defines the relationship between words as a graph to improve the performance of the correction[2] based on the vector information of the word embedded in the correction technique. The Korean WordNet replaced WordNet[3] developed at Princeton University in the United States and was additionally constructed for Korean. In order to learn a semantic network in graph form or to use it for learned vector information, it is necessary to transform it into a vector form by embedding learning. For transformation, we list the nodes (limited number) in a line format like a sentence in a graph in the form of a network before the training input. One of the learning techniques that use this strategy is Deepwalk[4]. DeepWalk is used to learn graphs between words in the Korean WordNet. The graph embedding information is used in concatenation with the word vector information of the learned language model for correction, and the final correction word is determined by the cosine distance value between the vectors. In this paper, In order to test whether the information of graph embedding affects the improvement of the performance of context- sensitive spelling error correction, a confused word pair was constructed and tested from the perspective of Word Sense Disambiguation(WSD). In the experimental results, the average correction performance of all confused word pairs was improved by 2.24% compared to the baseline correction performance.

버킷과 블룸필터를 혼합한 민감한 데이터 보안 (The Secure Algorithm on the Sensitive data using Bloom filter and bucket method)

  • 유천영;김지홍
    • 한국정보통신학회논문지
    • /
    • 제16권5호
    • /
    • pp.939-946
    • /
    • 2012
  • 최근 개인정보 유출 사건과 관련된 사고가 사회적 이슈가 되고 있다. 민감한 개인정보를 암호화하여 데이터를 보호한다면 정보 유출이 확실히 줄어들 것이다. 본 논문에서는 데이터 보호를 위한 기존의 연구 방법을 분석하고, 블룸필터 방식에 버킷을 혼합한 복합적인 방법으로 민감한 정보를 암호화하기 위하여 제안하였다. 가장 많이 사용되는 튜플 암호화 방식에 버킷인덱스 방식을 적용한 방식이다. 이 방식은 버킷정보로 인하여 데이터의 분포가 노출된다는 단점을 가진다. 이러한 버킷인덱스 방식의 데이터 노출 특성을 방지하기 위하여, 본 논문에서는 버킷인덱스와 블룸필터를 적용한 복합적인 암호화방식을 제안한다. 제안된 방식의 특징은 데이터의 노출을 방지할 뿐 아니라 데이터베이스의 검색성능을 향상시킨다.

A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security Applications

  • Mohammad Y. Khanafseh;Ola M. Surakhi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.79-88
    • /
    • 2024
  • The information retrieval domain deals with the retrieval of unstructured data such as text documents. Searching documents is a main component of the modern information retrieval system. Locality Sensitive Hashing (LSH) is one of the most popular methods used in searching for documents in a high-dimensional space. The main benefit of LSH is its theoretical guarantee of query accuracy in a multi-dimensional space. More enhancement can be achieved to LSH by adding a bit to its steps. In this paper, a new Dynamic Locality Sensitive Hashing (DLSH) algorithm is proposed as an improved version of the LSH algorithm, which relies on employing the hierarchal selection of LSH parameters (number of bands, number of shingles, and number of permutation lists) based on the similarity achieved by the algorithm to optimize searching accuracy and increasing its score. Using several tampered file structures, the technique was applied, and the performance is evaluated. In some circumstances, the accuracy of matching with DLSH exceeds 95% with the optimal parameter value selected for the number of bands, the number of shingles, and the number of permutations lists of the DLSH algorithm. The result makes DLSH algorithm suitable to be applied in many critical applications that depend on accurate searching such as forensics technology.