• Title/Summary/Keyword: exchange of information

Search Result 3,556, Processing Time 0.032 seconds

Confidence interval forecast of exchange rate based on bootstrap method during economic crisis (경제위기시 환율신뢰구간 예측 알고리즘 개발)

  • Kim, Tae-Yoon;Kwon, O-Jin
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.5
    • /
    • pp.895-902
    • /
    • 2011
  • This paper is mainly concerned about providing confidence prediction interval for exchange rate during economic crisis. Our proposed method is to use block bootstrap method for prediction interval for next day. It is shown that block bootstrap method is particularly effective for interval prediction of exchange rate during economic crisis.

Efficient password-based key exchange protocol (효율적인 패스워드 기반 키 분배 프로토콜)

  • Won, Dong-Kyu;Ahn, Gi-Bum;Kwak, Jin;Won, Dong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1759-1762
    • /
    • 2003
  • 최근 키 분배 프로토콜과는 다르게 하드웨어에 암호키를 저장하여 사용하는 것과 달리, 사용자가 기억할 수 있는 길이의 패스워드(password)를 사용해 서버와의 인증과 키 교환을 동시에 수행하는 패스워드 기반 키 분배 프로토콜이 제안되고 있다. 본 논문에서는 이러한 패스워드 기반의 키 분배 프로토콜 중 BPKA(Balanced Password-authenticated Key Agreement)에 속하는 DH-EKE(Diffie-Hellman Encrypted Key Exchange), PAK(Password-Authenticated Key exchange), SPEKE(Simple Password Exponential Key Exchange) 프로토콜을 비교 분석하고, 이를 바탕으로 기존의 BPKA 프로토콜에 비해 적은 연산량을 가지면서 사용자와 서버가 각기 다른 정보를 갖는 패스워드-검증자 기반 프로토콜을 제안한다. 본 논문에서 제안하는 패스워드 기반 키 분배 프로토콜의 안전성 분석을 위해 Active Impersonation 과 Forward Secrecy, Off-line dictionary attack, Man-in-the -middle Attack 등의 공격모델을 적용하였다.

  • PDF

Classification Model of Food Groups in Food Exchange Table Using Decision Tree-based Machine Learning

  • Kim, Ji Yun;Kim, Jongwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.51-58
    • /
    • 2022
  • In this paper, we propose a decision tree-based machine learning model that leads to food exchange table renewal by classifying food groups through machine learning for existing food and food data found by web crawling. The food exchange table is the standard for food exchange intake when composing a diet such as diet and diet, as well as patients who need nutritional management. The food exchange table, which is the standard for the composition of the diet, takes a lot of manpower and time in the process of revision through the National Health and Nutrition Survey, making it difficult to quickly reflect food changes according to new foods or trends. Since the proposed technique classifies newly added foods based on the existing food group, it is possible to organize a rapid food exchange table reflecting the trend of food. As a result of classifying food into the proposed model in the study, the accuracy of the food group in the food exchange table was 97.45%, so this food classification model is expected to be highly utilized for the composition of a diet that suits your taste in hospitals and nursing homes.

Public Acceptance of a Health Information Exchange in Korea

  • Park, Hayoung;Park, Jong Son;Lee, Hye Rin;Kim, Soomin
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.359-370
    • /
    • 2018
  • Objectives: We assessed the public acceptance of a health information exchange (HIE) and examined factors that influenced the acceptance and associations among constructs of the Technology Acceptance Model (TAM). Methods: We collected data from a survey of 1,000 individuals in Korea, which was administered through a structured questionnaire. We assessed the validity and reliability of the survey instrument with exploratory factor analysis and Cronbach's alpha coefficients. We computed descriptive statistics to assess the acceptance and performed regression analyses with a structural equation model to estimate the magnitude and significance of influences among constructs of TAM. Results: Eighty-seven percent of the respondents were willing to use the technology, and the average level of agreement with the need for the technology was 4.16 on a 5-point Likert scale. The perception of ease of use of the technology significantly influenced perceptions of usefulness and attitudes about the need for HIE. Perceptions of usefulness influenced attitude and behavioral intention to use HIE, and attitude influenced intention. Age showed a wide range of influences throughout the model, and experience with offline-based information exchange and health status also showed noteworthy influences. Conclusions: The public acceptance of HIE was high, and influences posited by TAM were mostly confirmed by the study results. The study findings indicated a need for an education and communication strategy tailored by population age, health status, and prior experience with offline-based exchange to gain public buy-in for a successful introduction of the technology.

NutriSonic web expert system for meal management and nutrition counseling with nutrient time-series analysis, e-food exchange and easy data transition

  • Hong, Soon-Myung;Cho, Jee-Ye;Lee, Jin-Hee;Kim, Gon;Kim, Min-Chan
    • Nutrition Research and Practice
    • /
    • v.2 no.2
    • /
    • pp.121-129
    • /
    • 2008
  • This study was conducted to develop the NutriSonic Web Expert System for Meal Management and Nutrition Counseling with Analysis of User's Nutritive Changes of selected days and food exchange information with easy data transition. This program manipulates a food, menu and meal and search database that has been developed. Also, the system provides a function to check the user's nutritive change of selected days. Users can select a recommended general and therapeutic menu using this system. NutriSonic can analyze nutrients and e-food exchange ("e" means the food exchange data base calculated by a computer program) in menus and meals. The expert can insert and store a meal database and generate the synthetic information of age, sex and therapeutic purpose of disease. With investigation and analysis of the user's needs, the meal planning program on the internet has been continuously developed. Users are able to follow up their nutritive changes with nutrient information and ratio of 3 major energy nutrients. Also, users can download another data format like Excel files (.xls) for analysis and verify their nutrient time-series analysis. The results of analysis are presented quickly and accurately. Therefore it can be used by not only usual people, but also by dietitians and nutritionists who take charge of making a menu and experts in the field of food and nutrition. It is expected that the NutriSonic Web Expert System can be useful for nutrition education, nutrition counseling and expert meal management.

Efficient QoS Policy Implementation Using DSCP Redefinition: Towards Network Load Balancing (DSCP 재정의를 통한 효율적인 QoS 정책 구현: 네트워크 부하 분산을 위해)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.715-720
    • /
    • 2023
  • The military is driving innovative changes such as AI, cloud computing, and drone operation through the Fourth Industrial Revolution. It is expected that such changes will lead to a rapid increase in the demand for information exchange requirements, reaching all lower-ranking soldiers, as networking based on IoT occurs. The flow of such information must ensure efficient information distribution through various infrastructures such as ground networks, stationary satellites, and low-earth orbit small communication satellites, and the demand for information exchange that is distributed through them must be appropriately dispersed. In this study, we redefined the DSCP, which is closely related to QoS (Quality of Service) in information dissemination, into 11 categories and performed research to map each cluster group identified by cluster analysis to the defense "information exchange requirement list" on a one-to-one basis. The purpose of the research is to ensure efficient information dissemination within a multi-layer integrated network (ground network, stationary satellite network, low-earth orbit small communication satellite network) with limited bandwidth by re-establishing QoS policies that prioritize important information exchange requirements so that they are routed in priority. In this paper, we evaluated how well the information exchange requirement lists classified by cluster analysis were assigned to DSCP through M&S, and confirmed that reclassifying DSCP can lead to more efficient information distribution in a network environment with limited bandwidth.

Testing the exchange rate data for the parameter change based on ARMA-GARCH model

  • Song, Junmo;Ko, Bangwon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.24 no.6
    • /
    • pp.1551-1559
    • /
    • 2013
  • In this paper, we analyze the Korean Won/Japanese 100 Yen exchange rate data based on the ARMA-GARCH model, and perform the test for detecting the parameter changes. As a test statistics, we employ the cumulative sum (CUSUM) test for ARMA-GARCH model, which is introduced by Lee and Song (2008). Our empirical analysis indicates that the KRW/JPY exchange rate series experienced several parameter changes during the period from January 2000 to December 2012, which leads to a fitting of AR-IGARCH model to the whole series.

Wireless Security Transmission Using Algorithm of Multiple-Key Exchange (다중 키 교환 알고리즘을 이용한 무선 보안 전송 기법)

  • Ryu, Dong-Ju;Kim, Gwang-Hyun;Noh, Bong-Nam
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.807-810
    • /
    • 2005
  • Constructed network test environment of wireless base for confidentiality guarantee of data and safe transmission that is transmited at Mobile node of Wireless Network environment in this paper. And, progressed research about IKEv2's Multiple-Key Exchange mechanism for efficient security transmission that use IPSec that is built-in to basis to IPv6 of Mobile environment. Have several key to single terminal to solve that is seam at hand off packet transmission process of Mobile Node in Wireless Network and Re-setting for Key and Re-exchange problem that happen frequently and studied technology that move. Key exchange protocol that is used for an experiment loads basically in MIPv6 and used IKEv2 protocol that is used for management and distribution of reliable encryption key between both end. Using network simulator of SSFNet(Scalable Simulation Framework Network Models) in this paper Key exchange delay value of IKEv2's security transmission analyzing comparison Performance measure and studied about problem and improvement way accordingly.

  • PDF

A Study on the Application of CIM for KPX's next Control Center (전력거래소 차기시스템 Common Information Model 적용에 관한 연구)

  • Park, Min-Ryung;Choi, Young-Min;Lee, Jin-Su;Lee, Gun-Woong
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.384-385
    • /
    • 2011
  • 전력거래소는 전력산업 국가전략과제 중 하나로 추진된 한국형에너지관리시스템(이후 K-EMS)의 개발(2005~2010)을 성공적으로 완수하였으며 이를 바탕으로 차기계통운영시스템(이후 차기EMS)의 설계 및 도입(2011~2014)을 위한 작업을 진행 중에 있다. 차기EMS는 EMS를 중심으로 신규 시스템과 기존 시스템이 통합, 연계되어 사용자가 필요한 데이터를 원활하게 제공할 수 있는 서비스 중심 인프라스트럭쳐를 지향하고 있으며 이를 구현하기 위한 주요 기술 중 하나로 전력계통 모델링을 위해 IEC 국제표준규격인 CIM(Common Information Model)을 적용하였다. CIM은 차기시스템의 핵심 설비인 차기EMS와 차기MOS 간 공통 플랫폼을 제공하여 시스템의 신뢰성 뿐 아니라 유지보수 비용 측면에서의 개선을 기대할 수 있다. 차기EMS는 CIM의 적용을 통해 CIM을 채택한 이 기종 시스템과의 연계를 위한 호환성 및 유연성을 가진 시스템으로 개발될 것이다.

  • PDF

Authenticated Key Exchange Protocol for the Secure and Efficient (안전하고 효율적으로 인증된 키 교환 프로토콜)

  • Park, Jong-Min;Park, Byung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1843-1848
    • /
    • 2010
  • The Key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, Key confirmation, and Key freshness. In this paper, we propose Two authenticated key exchange protocols Two Pass EKE-E(Encrypted Key Exchange-Efficient) and Two Pass EKE-S(Encrypted Key Exchange-Secure) are introduced. A basic idea of the protocols is that a password can be represented by modular addition N, and the number of possible modular addition N representing the password is $2^N$ The Two Pass EKE-E is secure against the attacks including main-in-the-middle attack and off-line dictionary attack, and the performance is excellent so as beyond to comparison with other authenticated key exchange protocols. The Two Pass EKE-S is a slight modification of the Two Pass EKE-E. The Two Pass EKE-S provides computational in feasibility for learning the password without having performed off line dictionary attack while preserving the performance of the Two Pass EKE-E.