• Title/Summary/Keyword: use for information

Search Result 27,359, Processing Time 0.056 seconds

A Study on the Factors Affecting Continuance Use of Knowledge Management System (지식관리시스템의 지속적 사용에 영향을 미치는 요인에 관한 연구)

  • Lee, Hong-Jae
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.3
    • /
    • pp.219-238
    • /
    • 2011
  • The purpose of this study is to examine the causal relationships among knowledge management system(KMS) quality, perceived ease of use, perceived usefulness, attitude, and continuance use of KMS. The results of data analysis by structured equation model(SEM) indicate that KMS quality significantly influences individual's perceived ease of use and perceived usefulness. Perceived ease of use affects individual's perceived usefulness on KMS. Individual's perceived ease of use and perceived usefulness affect on the creation of a positive attitude, and attitude affects continuance use of KMS. Based on the results, theoretical and practical implications of this study are discussed.

Design and Implementation of Web-based Hierarchical Network Management System using SSL (SSL을 이용한 웹기반 계층적 네트워크 관리 시스템의 설계 및 구현)

  • 황일선;이명선;유기성;김종근;조강홍;정진욱
    • Convergence Security Journal
    • /
    • v.2 no.1
    • /
    • pp.1-15
    • /
    • 2002
  • Network management system exchanges information between management servers to manage other network as well as local network for MSP(Management Service Provider) business. Because communication line that is used here is communication line that several users use, other user can steal a important information that are passed through communication line. For these information include important information of administrator or equipments, These information should be protected. Usually it is use much SSL to security of communication and it wish to protect information using SSL in communication between management servers' or communication between server and client at network management system to use much SSL for security of communication.

  • PDF

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

Audio-Visual Content Analysis Based Clustering for Unsupervised Debate Indexing (비교사 토론 인덱싱을 위한 시청각 콘텐츠 분석 기반 클러스터링)

  • Keum, Ji-Soo;Lee, Hyon-Soo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.27 no.5
    • /
    • pp.244-251
    • /
    • 2008
  • In this research, we propose an unsupervised debate indexing method using audio and visual information. The proposed method combines clustering results of speech by BIC and visual by distance function. The combination of audio-visual information reduces the problem of individual use of speech and visual information. Also, an effective content based analysis is possible. We have performed various experiments to evaluate the proposed method according to use of audio-visual information for five types of debate data. From experimental results, we found that the effect of audio-visual integration outperforms individual use of speech and visual information for debate indexing.

A Use Case Modeling of Telecommunication Network Fault Correction for the Component-Based Software Development (TMN 컴포넌트 기반 소프트웨어 개발을 위한 망 장애해결 Use Case 모델링)

  • Kim, Hyo-Soo;Shin, Jeong-Gyll;Lee, Yong-Kwon;Baek, Cheong-Ho
    • Annual Conference of KIPS
    • /
    • 2003.05b
    • /
    • pp.751-754
    • /
    • 2003
  • 통신산업환경의 변화 즉 통신시장의 개방화, 글로벌화 및 경쟁체제의 돌입으로 통신사업자는 기존의 단위시설의 운용관리 개념에서 네트워크관리, 서비스관리, 사업관리개념으로 통합 발전되고 있는 국제 표준권고의 통신망의 운용 경영 방식인 TMN(Telecommunications Management Network)에 부합한 개방형 운용정보공유 및 일원화된 통신망 운용관리시스템 구축 및 관리로 전환하려는 추세이다. 본 연구에서는 TMN 컴포넌트 기반 소프트웨어 개발을 위한 망 장애 해결 Use Case 모델링을 설계하였다.

  • PDF

Private Key Recovery on Bitcoin with Duplicated Signatures

  • Ko, Ju-Seong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.1280-1300
    • /
    • 2020
  • In the modern financial sector, interest in providing financial services that employ blockchain technology has increased. Blockchain technology is efficient and can operate without a trusted party to store all transaction information; additionally, it provides transparency and prevents the tampering of transaction information. However, new security threats can occur because blockchain technology shares all the transaction information. Furthermore, studies have reported that the private keys of users who use the same signature value two or more times can be recovered. Because private keys of blockchain identify users, private key leaks can result in attackers stealing the ownership rights to users' property. Therefore, as more financial services use blockchain technology, actions to counteract the threat of private key recovery must be continually investigated. Private key recovery studies are presented here. Based on these studies, duplicated signatures generated by blockchain users are defined. Additionally, scenarios that generate and use duplicated signatures are applied in an actual bitcoin environment to demonstrate that actual bitcoin users' private keys can be recovered.

Effects of Utilizing of Weather and Climate Information on Farmer's Income (기상·기후 정보 활용이 농가 소득에 미치는 효과 분석)

  • Jeong, Hak-Kyun
    • Journal of Climate Change Research
    • /
    • v.9 no.3
    • /
    • pp.283-291
    • /
    • 2018
  • The purpose of this study is to analyze the effects of useof weather and climate information on farmer income. To accomplish the objective of the study a farm survey was conducted, whose target respondents were local correspondents and reporters of the Korea Rural Economic Institute. The ordered logit model was employed for empirical analysis on determining whether use of weather and climate information affects farmer income. The analysis results show that the greater is farmer use of short-range weather forecasts, the higher is the income. The results also show higher farmers income with use of short-range special weather forecasts. Based upon the empirical results, the dissemination of more precise weather and climate information is suggested to increase farmer income.

Secure Authentication Scheme with Anonymity for Wireless Environments

  • Xiu, Anna;Li, Kun;Kim, Hyoung-Joong
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.1033-1036
    • /
    • 2011
  • With the development of wireless networks and the use of mobile devices, mobile user's privacy issue is becoming more and more important. Privacy includes ID anonymity and unlinkability. Unlinkability requires that any two temporary IDs which have been used before should not be associated with each other. In other words, these temporary IDs should be generated in such a way that no direct relationship among them should be derived. The existing schemes only focus on ID anonymity of mobile users. In this paper, we proposed a scheme not only holding all the merits of previous works, but also achieving unlinkability which is guaranteed by using one-time-use temporary ID. And the mobile user can also updates its one-time-use temporary ID with the help of the visited foreign agent.

Geometric Image Compensation Method for a Portable Projector Based on Prewarping Using 2D Homography

  • Cho, Jinsoo;Won, Jongkil;Bae, Jongwoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2299-2311
    • /
    • 2013
  • As portable multimedia devices become more popular and smaller, the use of portable projectors is also rapidly increasing. However, when portable projectors are used in mobile environments in which a dedicated planar screen is not available, the problem of geometric distortion of the projected image often arises. In this paper, we present a geometric image compensation method for portable projectors to compensate for geometric distortions of images projected on various types of planar or nonplanar projection surfaces. The proposed method is based on extraction of the two-dimensional (2D) geometric information of a projection area, setting of the compensation area, and prewarping using 2D homography. The experimental results show that the proposed method allows effective compensation for waved and arbitrarily shaped projection areas, as well as tilted and bent surfaces that are often found in the mobile environment. Furthermore, the proposed method is more computationally efficient than conventional image compensation methods that use 3D geometric information.

A Study on the Usefulness of Wireless Internet for Effective Library Information Service (도서관정보의 무선인터넷 서비스에 관한 연구)

  • Sung, Kee-Joo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.34 no.3
    • /
    • pp.25-36
    • /
    • 2000
  • This paper starts by describing the wireless internet service as a new function in the internet age. It then discusses the usefulness of wireless internet for improveing library information service. Recently the use of wireless internet service, as a major internet service in the future, has been rapidly increased because it can be provided various type of information using individual's cellulasphone without the time and space restrictions. Therefore, wireless internet service will be of great use for decentralization and rapidness of library function as well as improvement of user service by providing various interface of information retrieval.

  • PDF