• Title/Summary/Keyword: data and information security

Search Result 4,523, Processing Time 0.031 seconds

Design of OpenScenario Structure for Content Creation Service Based on User Defined Story (사용자 정의 스토리 기반 콘텐츠 제작 서비스를 위한 오픈 시나리오 언어 구조 설계)

  • Lee, Hyejoo;Kwon, Ki-Ryong;Lee, Suk-Hwan;Park, Yun-Kyong;Moon, Kyong Deok
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.170-179
    • /
    • 2016
  • It is a story-based content creation service that provides any user with some proper contents based on a story written by the user in order to utilize a lot of contents accumulated on Internet. For this service, the story has to be described in computer-readable representation. In this paper, analyzing the structure of scenario, as known as screenplay or scripts, a structure of story representation, which is referred to as OpenScenario, is defined. We intend users to produce their own contents by using massive contents on Internet by the proposed method. The proposed method's OpenScenario consists two main parts, OSD (OpenScenario Descriptors) which is a set of descriptors to describe various objects of shots such as visual, aural and textual objects and OSS (OpenScenario Scripts) which is a set of scripts to add some effects such as image, caption, transition between shots, and background music. As an usecase of proposed method, we describe how to create new content using OpenScenario and discuss some required technologies to apply the proposed method effectively.

A Secure and Efficient Method for Detecting Malicious Nodes in MANET (MANET에서 악의적인 노드의 안전하고 효율적인 검출 방안)

  • Lee KangSeok;Choi JongOh;Ji JongBok;Song JooSeok
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.617-622
    • /
    • 2005
  • Lately, the MANET research has focused on providing routing services with security and previous schemes have been proposed for detecting malicious nodes in a MANET. However, they still include some problems which malicious nodes cannot be found when they falsely report other nodes as malicious. Accordingly, we propose a novel and efficient scheme for detecting malicious nodes using report messages and a report table which is consisted of node ID both for suspecting and reporting when the malicious nodes behave normally during the route discovery, but the other hand they drop and modify packets, or falsely report other nodes as malicious during the data transmission. Our proposed scheme is applicable to not only DSR but aiso AODV. And we provide some simulation results of our proposed scheme by comparing general AODV with our proposed scheme. Simulation results show that our Proposed scheme outperforms general AODV in terms of average packet loss ratio and packet delivery ratio.

A Public-key Cryptography Processor supporting P-224 ECC and 2048-bit RSA (P-224 ECC와 2048-비트 RSA를 지원하는 공개키 암호 프로세서)

  • Sung, Byung-Yoon;Lee, Sang-Hyun;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.522-531
    • /
    • 2018
  • A public-key cryptography processor EC-RSA was designed, which integrates a 224-bit prime field elliptic curve cryptography (ECC) defined in the FIPS 186-2 as well as RSA with 2048-bit key length into a single hardware structure. A finite field arithmetic core used in both scalar multiplication for ECC and exponentiation for RSA was designed with 32-bit data-path. A lightweight implementation was achieved by an efficient hardware sharing of the finite field arithmetic core and internal memory for ECC and RSA operations. The EC-RSA processor was verified by FPGA implementation. It occupied 11,779 gate equivalents (GEs) and 14 kbit RAM synthesized with a 180-nm CMOS cell library and the estimated maximum clock frequency was 133 MHz. It takes 867,746 clock cycles for ECC scalar multiplication resulting in the estimated throughput of 34.3 kbps, and takes 26,149,013 clock cycles for RSA decryption resulting in the estimated throughput of 10.4 kbps.

A Study on Occupational Stress of the VTS Operators (해상교통관제사의 스트레스 수준 측정에 관한 연구)

  • Kim, Yu-Sun;Park, Young-Soo;Jo, So-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.38 no.6
    • /
    • pp.615-621
    • /
    • 2014
  • VTS operators may suffer from acute, chronic, or traumatic stress caused by their workload and working environments associated with task or combination of task. This study intended to measure the level of VTS operator' stress and find out factors influencing it by understanding their characteristics during carrying out their task. For this purpose, analyzed the data collected through conducting survey on VTS operators as the Korea Occupational Stress(KOSS) and Psychological Well-being Index(PWI). As a result, VTS operators are experiencing higher level of psychological stress than the national average. And the factors to cause VTS operators' occupational stress can be summarized as follows; working environment factors, shift work especially night duty, workload, etc. This study provides the fundamental information for understanding human factors of VTS operator' occupational stress.

Architecture Evaluation Utilizing CBAM and AHP (생체인식 소프트웨어의 품질 평가모듈에 관한 연구)

  • Yang, Hae-Sool;Lee, Man-Ho;Yoon, Young-Mi
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.699-708
    • /
    • 2006
  • The latest biometric field have marched fast with security technology of IT. As importance of present biometrics is realized, internal and external biometrics software market is trend that is soaring. Accordingly, high reliability of biometric software and request of high quality software are enlarged. Evaluation items and criteria must be established for biometric software quality assurance. In this paper, we development the evaluation module for biometric software test based on ISO/IEC 12119 that is the standard about software quality requirement and test, and ISO/IEC 9126 that is standard about evaluation of software product, and ISO/IEC 14598-6 that is the standard about construction of the evaluation module. Constituents of biometric software products(product descriptor, user document program and data) is subject to the quality evaluation module that we developed in this paper, we can expect improvement in the quality of software by using with a standard such as ISO/IEC 9126-3 that can be used in software development process.

Effects of Foot Bath on Leg Edema and Fatigue among College Students (족욕요법이 대학생의 하지부종과 피로감에 미치는 효과)

  • Seo, Sukyong;Yoon, Minyoung;Yeon, Seunguk
    • Journal of the Korean Society of School Health
    • /
    • v.30 no.1
    • /
    • pp.21-28
    • /
    • 2017
  • Purpose: This study was conducted to examine the effect of foot-bath on lower extremities edema and fatigue among college students in Korea. Methods: This study used an quasi-experimental design with 56 participants (30 for experiments and 26 for controls). The experimental group performed 20-minute foot bath before sleep three times for one week. All subjects were directed to use their smart-phones to fill out a questionnaire about fatigue. Leg circumference was measured 10 minutes after foot bath. The test was performed from April 30th to May 22th in 2016. Data was analyzed using t-test and $x^2$ test. Results: We found no difference in general characteristics between the experimental group and the control group. Left leg edema of the experimental group decreased by $16.63{\pm}14.57mm$ (p<.001). The experimental group's right leg-edema decreased by $13.10{\pm}13.97mm$ (p<.001). There was no statistically significant difference in their fatigue level when comparing before and after the foot baths. Conclusion: We found that doing foot baths for two weeks could have positive effects in reducing leg-edema among college students. Foot bath may be applied as an effective nursing intervention to decrease leg edema among young people. The results are based on a limited number of study samples and a short-term intervention. Further research can be performed with extended population and a prolonged study period.

Factors Affecting Depression in the Elderly during the COVID-19 Pandemic (COVID-19 펜데믹 상황에서 노인 우울에 영향을 미치는 요인)

  • Ju-youn Hong;Young-bok Cho
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.761-770
    • /
    • 2023
  • This study was conducted to identify factors affecting depression in the elderly using three-year Community Health Survey data from 2020, when COVID-19 was declared an epidemic. Differences in depression according to general characteristics, health behavior, subjective health level, and medical use among 220,921 elderly were analyzed using complex samples t-test and ANOVA, and multiple regression analysis was performed to identify factors affecting depression it was carried out. As a result of the study, the level of depression among elderly women was found to be high, with an average of 1.21±0.01 for elderly men and 1.74±0.02 for elderly women, and there was a difference in generation type, with depression being higher in the first generation for elderly men and the third generation for elderly women. Variables that had a great influence on depression were the experience of depression and perceived stress.

Market Efficiency in Real-time : Evidence from the Korea Stock Exchange (한국유가증권시장의 실시간 정보 효율성 검증)

  • Lee, Woo-Baik;Choi, Woo-Suk
    • The Korean Journal of Financial Management
    • /
    • v.26 no.3
    • /
    • pp.103-138
    • /
    • 2009
  • In this article we examine a unique data set of intraday fair disclosure(FD) releases to shed light on market efficiency within the trading day. Specifically, this paper analyze the response of stock prices on fair disclosure disseminated in real-time through KIND(Korea Investor's Network for Disclosure) on Korea stock exchange during the period from January 2003 to September 2004. We find that the prices of stock experiences a statistically and economically significant increase beginning seconds after the fair disclosure is initially announced and lasting approximately two minutes. The stock price responds more strongly to fair disclosure on smaller firm but the response to fair disclosure on the largest firm stock is more gradual, lasting five minutes. We also examine the profitability of a short-term trading strategy based on dissemination of fair disclosure. After controlling for trading costs we find that trader who execute a trade following initial disclosure generate negative profits, but trader buying stock before initial disclosure realize statistically significant positive profit after two minute of disclosure. Summarizing overall results, our evidence supports that security prices on Korea stock exchange reflects all available information within two minutes and the Korea stock market is semi-strongly efficient enough that a trader cannot generate profits based on widely disseminated news unless he acts almost immediately.

  • PDF

Study on Customer Satisfaction Performance Evaluation through e-SCM-based OMS Implementation (e-SCM 기반 OMS 구현을 통한 고객 만족 성과평가에 관한 연구)

  • Hyungdo Zun;ChiGon Kim;KyungBae Yoon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.891-899
    • /
    • 2024
  • The Fourth Industrial Revolution is centered on a personalized demand fulfillment economy and is all about transformation and flexible processing that can deliver what customers want in real time across space and time. This paper implements the construction and operation of a packaging platform that can instantly procure the required packaging products based on real-time orders and evaluates its performance. The components of customer satisfaction are flexible and dependent on the situation which requires efficient management of enterprise operational processes based on an e-SCM platform. An OMS optimized for these conditions plays an important role in maximizing and differentiating the efficiency of a company's operations and improving its cost advantage. OMS is a system of mass customization that provides efficient MOT(Moment of Truth) logistics services to meet the eco-friendly issues of many individual customers and achieve optimized logistics operation goals to enhance repurchase intentions and sustainable business. OMS precisely analyzes the collected data to support information and decision-making related to efficiency, productivity, cost and provide accurate reports. It uses data visualization tools to express data visually and suggests directions for improvement of the operational process through statistics and prediction analysis.

The Access Control Platform of the IoT Service Using the CapSG (CapSG를 이용한 IoT 서비스 접근제어 플랫폼)

  • Kim, Jin-Bo;Jang, Deresa;Kim, Mi-Sun;Seo, Jae-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.9
    • /
    • pp.337-346
    • /
    • 2015
  • There is great need for efficient user rights management method to provide a flexible service on variety protocols, domains, applications of IoT environments. In this paper, we propose a IoT service platform with CapSG to provide efficient access control for IoT various services of the environment. CapSG uses a token including authentication and access rights to perform authentication and access control service entity providing services. In addition, the generated token for service management, delegation, revocation, and provides a function such as denied. Also, it provides functions such as generation, delegation, disposal and rejection for service token management. In this paper, it provides the flexibility and efficiency of the access control for various services require of the IoT because of it is available to access control specific domain service by using the token group for each domain and is designed to access control using specific service token of tokens group.