• Title/Summary/Keyword: non-user

Search Result 1,492, Processing Time 0.033 seconds

A Study on the Effect of Trust on the Delivery App. Service to Emotional & Rational Factor & User's Word of Mouth (배달앱 서비스 이용자의 신뢰가 감성, 이성적 요인과 구전에 미치는 영향 요인 연구)

  • Ha, Youn-Soo;Lee, Sang-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.85-98
    • /
    • 2021
  • Domestic delivery app services are taking a leap forward as the non-face-to-face culture spreads due to the COVID 19 situation and the industrial scale is also growing. In the expanding delivery app service market, we try to verify the structural relationship between variables by empirically analyzing the influencing factors of users' trust in rational and emotional factors. Delivery app service users trust and discriminate parameters in the relationship between rational and emotional factors. Satisfaction according to the trust of a valid delivery app service and service expansion model through word of mouth was designed. It was verified through a hypothesis whether it had an effect, and it can be used as a variety of service strategies for delivery app service users.

Performance Analysis of Transport Time and Legal Stability through Smart OTP Access System for SMEs in Connected Industrial Parks

  • Kim, Ilgoun;Jeong, Jongpil
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.224-241
    • /
    • 2021
  • According to data from the National Police Agency, 75.5 percent of dead traffic accidents in Korea are truck accidents. About 1,000 people die in cargo truck accidents in Korea every year, and two to three people die in cargo truck accidents every day. In the survey, Korean cargo workers answer poor working conditions as an important cause of constant truck accidents. COVID 19 is increasing demand for non-face-to-face logistics. The inefficiency of the Korean transportation system is leading to excessive work burden for small logistics The inefficiency of the Korean transportation system is causing excessive work burden for small individual carriers. The inefficiency of the Korean transportation system is also evidenced by the number of deaths from logistics industry disasters that have risen sharply since 2020. Small and medium-sized Korean Enterprises located in CIPs (Connected Industrial Parks) often do not have smart access certification systems. And as a result, a lot of transportation time is wasted at the final destination stage. In the logistics industry, time is the cost and time is the revenue. The logistics industry is the representative industry in which time becomes money. The smart access authentication system architecture proposed in this paper allows small logistics private carriers to improve legal stability, and SMEs (Small and Medium-sized Enterprises) in CIPs to reduce logistics transit time. The CIPs smart access system proposed in this paper utilizes the currently active Mobile OTP (One Time Password), which can significantly reduce system design costs, significantly reduce the data capacity burden on individual cell phone terminals, and improve the response speed of individual cell phone terminals. It is also compatible with the OTP system, which was previously used in various ways, and the system reliability through the long period of use of the OTP system is also high. User customers can understand OTP access systems more easily than other smart access systems.

Refunds Reusable Online Electronic Check System (거스름의 재사용이 가능한 온라인 전자수표시스템)

  • 김상진;최이화;오희국
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.73-85
    • /
    • 2001
  • Electronic check schemes are more efficient than electronic coin scheme with respect to computational costs and the amount of information exchanged. In spite of these, difficulties in making a refund reusable and in representing the face value of a check have discouraged its development. In this paper, a new online electronic check system is presented, which solves the above problems. This system uses the partially blind signature to provide user anonymity and to represent the face value of a check. The partially blind signature enables us to make the format of refunds and initially withdrawn checks identical. Thus, it allows refunds to be reused to buy goods without any limitatiosn. Both initially withdrawn checks and refunds in our system guarantee untraceability as well as unlinkability. We also use a one-time secret key as the serial number of a check to increase the efficiency of payments. The presented check system also provides multiple offline shopping sessions to minimize the number of online messages handled by a bank. During the multiple offline shopping session, we use a one-way accumulator to provide non-repudiation service. We also analyze our new systems our new system\`s security, efficiency, and atomicity.

Fuzzy Fingerprint Vault using Multiple Polynomials (다중 다항식을 이용한 지문 퍼지볼트)

  • Moon, Dae-Sung;Choi, Woo-Yong;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.125-133
    • /
    • 2009
  • Security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non.invertible transformed version. Thus, even if the transformed version is compromised, its valid biometric data are securely remained. Fuzzy vault mechanism was proposed to provide cryptographic secure protection of critical data(e.g., encryption key) with the fingerprint data in a way that only the authorized user can access the critical data by providing the valid fingerprint. However, all the previous results cannot operate on the fingerprint image with a few minutiae, because they use fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use adaptive degree of polynomial considering the number of minutiae. Also, we apply multiple polynomials to operate the fingerprint with a few minutiae. Based on the experimental results, we confirm that the proposed approach can enhance the security level and verification accuracy.

On Artifact Analysis for User Behaviors in Collaboration Tools - Using differential forensics for distinct operating environments (협업 툴의 사용자 행위별 아티팩트 분석 연구 - 운영환경에 따른 differential forensic 개념을 이용하여)

  • Kim, Young-hoon;Kwon, Tae-kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.353-363
    • /
    • 2021
  • As the Untact era is rapidly changing, collaboration tools are increasing their utilization and value as digital technologies for non-face-to-face work. While instant messenger-based collaboration tools support a variety of functions, crime and accident concerns are also increasing in proportion to their convenience, such as information leakage and security incidents. Meanwhile, the digital forensics perspective on collaborative tools is not enough, so forensics research is needed. This study analyzes significant artifacts in the two operating environments through Windows and Android forensics research on Microsoft Teams, the collaboration tool with the highest share in the world. Also, based on differences in artifacts and data attributes according to the operating environment, by applying 'differential forensic', we proved that the usefulness of evidence can be improved by presenting a complementary analysis method and timeline configuration through information linkage.

The Principle and Trends of CRISPR/Cas Diagnosis (CRISPR/Cas 진단의 원리와 현황)

  • Park, Jeewoong;Kang, Bong Keun;Shin, Hwa Hui;Shin, Jun Geun
    • Journal of Biomedical Engineering Research
    • /
    • v.42 no.3
    • /
    • pp.125-142
    • /
    • 2021
  • The POCT (point-of-care test) sensing that has been a fast-developing field is expected to be a next generation technology in health care. The POCT sensors for the detection of proteins, small molecules and especially nucleic acids have lately attracted considerable attention. According to the World Health Organization (WHO), the POCT methods are required to follow the ASSURED guidelines (Affordable, Sensitive, Specific, User- friendly, Robust and rapid, Equipment-free, Deliverable to all people who need the test). Recently, several CRISPR (Clustered Regularly Interspaced Short Palindromic Repeats) based diagnostic techniques using the sensitive gene recognition function of CRISPR have been reported. CRISPR/Cas (Cas, CRISPR associated protein) systems based detection technology is the most innovative gene analysis technology that is following the ASSURED guidelines. It is being re-emerged as a powerful diagnostic tool that can detect nucleic acids due to its characteristics that enable rapid, sensitive and specific analyses of nucleic acid. The first CRISPR-based diagnosis begins with the discovery of the additional function of Cas13a. The enzymatic cleavage occurs when the conjugate of Cas protein and CRISPR RNA (crRNA) detect a specific complementary sequence of the target sequence. Enzymatic cleavage occurs on not only the target sequence, but also all surrounding non-target single-stranded RNAs. This discovery was immediately utilized as a biosensor, and numerous sensor studies using CRISPR have been reported since then. In this review, the concept of CRISPR, the characteristics of the Cas protein required for CRISPR diagnosis, the current research trends of CRISPR diagnostic technology, and some aspects to be improved in the future are covered.

Development ofn Sharing Space Access Management System based on Mobile Key and RCU(Room Control Unit) (모바일 키 및 RCU에 기반한 공유공간 출입관리 시스템 개발)

  • Jung, Sang-Joong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.4
    • /
    • pp.202-208
    • /
    • 2020
  • Recently, the importance of non-face-to-face has been emphasized due to COVID-19, and the use of sharing spaces is also expanding. The use of uncontact check-in technology for access control of sharing spaces reduces waiting time and optimizes workers' efficiency, resulting in operational cost savings. In this paper, we propose a sharing space access management system based on a mobile key and RCU (Room Control Unit), access to the facility using a mobile key, and monitor the facility using an RCU. Proposal system is for shared accommodation, rental field (residence, sale-selling hotel), shared office, etc. when there is a one-time visitor on a specific day and time, the corresponding password is delivered to the mobile platform to expose and key the existing password. It is supported by a field-adaptive system that can reduce discomfort such as delivery. In order to test the operation of the proposed integrated system, tests were conducted according to scenarios to understand the overall status of the user's reservation, check-in, and check-out, and a 100% success rate was derived for each item by setting performance indicators to prove test reliability.

Artificial Neural Network Method Based on Convolution to Efficiently Extract the DoF Embodied in Images

  • Kim, Jong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.51-57
    • /
    • 2021
  • In this paper, we propose a method to find the DoF(Depth of field) that is blurred in an image by focusing and out-focusing the camera through a efficient convolutional neural network. Our approach uses the RGB channel-based cross-correlation filter to efficiently classify the DoF region from the image and build data for learning in the convolutional neural network. A data pair of the training data is established between the image and the DoF weighted map. Data used for learning uses DoF weight maps extracted by cross-correlation filters, and uses the result of applying the smoothing process to increase the convergence rate in the network learning stage. The DoF weighted image obtained as the test result stably finds the DoF region in the input image. As a result, the proposed method can be used in various places such as NPR(Non-photorealistic rendering) rendering and object detection by using the DoF area as the user's ROI(Region of interest).

Study of the Optical System Design of a Reflective LED Stand to Reduce Glare (눈부심 감소를 위한 반사형 LED 스탠드 광학계 설계에 관한 연구)

  • Kong, Mi-Seon;Jung, Mee-Suk
    • Korean Journal of Optics and Photonics
    • /
    • v.31 no.6
    • /
    • pp.334-343
    • /
    • 2020
  • In this paper, a study of the design of a lighting optical system to form indirect light was conducted, to reduce the glare caused by the hot spot of the LED. In the case of using an LED for indoor lighting, glare is caused because of the high luminance and non-uniform luminance distribution. In particular, LED stands are located close to the user's eyes and are used for a long time, so research to reduce glare is essential. Therefore, in this paper an optical system structural study and the design of an LED stand for glare reduction were conducted. Afterward, the luminance analysis and comparison to an existing LED stand product confirmed that the reflective LED stand proposed in this paper had better performance in terms of glare.

Web Monitoring based Encryption Web Traffic Attack Detection System (웹 모니터링 기반 암호화 웹트래픽 공격 탐지 시스템)

  • Lee, Seokwoo;Park, Soonmo;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.449-455
    • /
    • 2021
  • This paper proposes an encryption web transaction attack detection system based on the existing web application monitoring system. Although there was difficulty in detecting attacks on the encrypted web traffic because the existing web traffic security systems detect and defend attacks based on encrypted packets in the network area of the encryption section between the client and server, by utilizing the technology of the web application monitoring system, it is possible to detect various intelligent cyber-attacks based on information that is already decrypted in the memory of the web application server. In addition, since user identification is possible through the application session ID, statistical detection of attacks such as IP tampering attacks, mass web transaction call users, and DDoS attacks are also possible. Thus, it can be considered that it is possible to respond to various intelligent cyber attacks hidden in the encrypted traffic by collecting and detecting information in the non-encrypted section of the encrypted web traffic.