RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Avoidance of similarity and brand attachment of Generation X in sportswear brand loyalty: The roles of self-congruity

        Goi Chai Lee,Chieng Fayrene Yew Leh,Goi Mei Teh 한국마케팅과학회 2023 마케팅과학연구 Vol.33 No.1

        The purpose of this study is to examine the effects of avoidance of similarity, self-congruity, and brand attachment on Generation X’s sportswear brand loyalty. This study also examines whether selfcongruity plays a role in the relationship between avoidance of similarity and brand attachment. A total of 368 valid data were used in this study and collected from Generation X participants. The hypotheses were tested using Structural Equation Modeling with the AMOS 22.0. The findings show that avoidance of similarity influences self-congruity, self-congruity influences brand attachment, avoidance of similarity influences brand attachment, and brand attachment directly influences brand loyalty. In addition, Self-congruity was found to partially mediate the relationship between avoidance of similarity and brand attachment. This study adds to the growing body of knowledge about avoidance of similarity and self-congruity as important drivers of brand attachment and brand loyalty.

      • KCI등재

        Application of Multivariate Statistics and Geostatistical Techniques to Identify the Distribution Modes of the Co, Ni, As and Au-Ag ore in the Bou Azzer-East Deposits (Central Anti-Atlas Morocco)

        Souiri, Muhammad,Aissa, Mohamed,Gois, Joaquim,Oulgour, Rachid,Mezougane, Hafid,El Azmi, Mohammed,Moussaid, Azizi The Korean Society of Economic and Environmental G 2020 자원환경지질 Vol.53 No.4

        The polymetallic Co, Ni, Cu, As, Au, and Ag deposits of Bou Azzer East are located in the western part of the Bou Azzer inlier in the Central Anti Atlas, Morocco. Six stages of emplacement of the mineralization have been identified. Precious metals (native gold and electrum) are present in all stages of this deposit except the early nickeliferous stage. From the Statistical analysis of the Co, As, Ni, Au, and Ag contents of a set of 501 samples, shows that the Pearson correlation coefficient between As-Co elements (0.966) is the highest followed by that of the Au-Ag couple (0.506). Principal component analysis (PCA) and hierarchical ascending classification (HAC) of the grades show, that Ni is associated with the pair (As-Co) and Cu is rather related to the pair (Au-Ag). The kriging maps show that the highest values of the Co, As and Ni appear in the contact of the serpentinite with other facies, as for those of Au and Ag, in addition to anomalous zones concordant with those of Co, Ni and As, they show anomalies at the extreme South and North of the study area. The development of the anomalous Au and Ag zones is mainly along the N40-50°E and N145°E directions.

      • KCI등재

        Mode identifiability of a multi-span cable-stayed bridge utilizing stabilization diagram and singular values

        C.W. Kim,Y. Goi 국제구조공학회 2016 Smart Structures and Systems, An International Jou Vol.17 No.3

        This study investigates the mode identifiability of a multi-span cable-stayed bridge in terms of a benchmark study using stabilization diagrams of a system model identified using stochastic subspace identification (SSI). Cumulative contribution ratios (CCRs) estimated from singular values of system models under different wind conditions were also considered. Observations revealed that wind speed might influence the mode identifiability of a specific mode of a cable-stayed bridge. Moreover the cumulative contribution ratio showed that the time histories monitored during strong winds, such as those of a typhoon, can be modeled with less system order than under weak winds. The blind data Acc 1 and Acc 2 were categorized as data obtained under a typhoon. Blind data Acc 3 and Acc 4 were categorized as data obtained under wind conditions of critical wind speeds around 7.5 m/s. Finally, blind data Acc 5 and Acc 6 were categorized as data measured under weak wind conditions.

      • KCI등재후보

        An Analysis of Group Key Agreement Schemes based on the Bellare-Rogaway Model in Multi-party Setting

        ( Meng-hui Lim ),( Bok-min Goi ),( Sang Gon Lee ) 한국인터넷정보학회 2011 KSII Transactions on Internet and Information Syst Vol.5 No.4

        Group key agreement protocols derive a shared secret key for a group of users to ensure data confidentiality or/and integrity among the users in the subsequent communications. In this paper, we inspect two group key agreement schemes which have been proposed by Shi et al. and Zheng et al. in 2005 and 2007 respectively. Although both schemes were claimed to be secure in a heuristic way, we reveal several flaws using the Bellare-Rogaway security model extended to multi-party setting by Bresson et al. These flaws are found to be originated from inappropriate selection of key derivation function, inadvertent exclusion of partners` identities from the protocol specification and insufficient consideration in preserving known temporary information security and key freshness properties. Furthermore, we suggest and discuss proper countermeasures to address such flaws.

      • SCOPUSKCI등재
      • SCOPUSKCI등재

        표피모반에서 속발된 다발성기저세포암의 1 예

        송계용,노병인,원문섭,최문섭,장진요 대한피부과학회 1982 大韓皮膚科學會誌 Vol.20 No.3

        Basal cell epithelioma arising from epidermis and its appendages is a common skin tumor. But multiple occurence of basal cell epitheliomas and that of arising in an epidermal nevi are extremely rsre. Since the first report by Toyama and Kojima in 1937, only few cases were reported in the world literatures. We observed a case of multiple basal cell epitheliomas arising in an epidermal nevi in a 54-year-old female patient who had rhomboidal verrucous patch on the right side of the cheek and arciform erythematous verrucous eruption from the right side of the eyebrow to the lower eyelid. Clinical features were not compatible with any type of basal cell epithelioma. But histological finding revealed basal cell epithelioma with epidermal nevi. Literatures were briefly reviewed.

      • Bayesian model update for damage detection of a steel plate girder bridge

        Xin Zhou,Feng-Liang Zhang,Yoshinao Goi,Chul-Woo Kim 국제구조공학회 2023 Smart Structures and Systems, An International Jou Vol.31 No.1

        This study investigates the possibility of damage detection of a real bridge by means of a modal parameter-based finite element (FE) model update. Field moving vehicle experiments were conducted on an actual steel plate girder bridge. In the damage experiment, cracks were applied to the bridge to simulate damage states. A fast Bayesian FFT method was employed to identify and quantify uncertainties of the modal parameters then these modal parameters were used in the Bayesian model update. Material properties and boundary conditions are taken as uncertainties and updated in the model update process. Observations showed that although some differences existed in the results obtained from different model classes, the discrepancy between modal parameters of the FE model and those experimentally obtained was reduced after the model update process, and the updated parameters in the numerical model were indeed affected by the damage. The importance of boundary conditions in the model updating process is also observed. The capability of the MCMC model update method for application to the actual bridge structure is assessed, and the limitation of FE model update in damage detection of bridges using only modal parameters is observed.

      • SCISCIESCOPUS

        Biometric cryptosystems: A new biometric key binding and its implementation for fingerprint minutiae-based representation

        Jin, Zhe,Teoh, Andrew Beng Jin,Goi, Bok-Min,Tay, Yong-Haur Elsevier 2016 Pattern recognition Vol.56 No.-

        <P><B>Abstract</B></P> <P>Despite fuzzy commitment (FC) is a theoretically sound biometric-key binding scheme, it relies on error correction code (ECC) completely to mitigate biometric intra-user variations. Accordingly, FC suffers from the security–performance tradeoff. That is, the larger key size/higher security always trades with poor key release success rate and vice versa. Additionally, the FC is highly susceptible to a number of security and privacy attacks. Furthermore, the best achievable accuracy performance of FC is constrained by the simple distance metrics such as Hamming distance to measure the dissimilarity of binary biometric features. This implies many efficient matching algorithms are to be abandoned. In this paper, we propose an ECC-free key binding scheme along with cancellable transforms for minutiae-based fingerprint biometrics. Apart from that, the minutiae information is favorably protected by a strong non-invertible cancellable transform, which is crucial to prevent a number of security and privacy attacks. The scheme is not limited to binary biometrics as demanded in FC but instead can be applied to various types of biometric features and hence a more effective matcher can be chosen. Experiments conducted on FVC2002 and FVC2004 show that the accuracy performance is comparable to state-of-the-arts. We further demonstrate that the proposed scheme is robust against several major security and privacy attacks.</P> <P><B>Highlights</B></P> <P> <UL> <LI> A new ECC-free biometric key binding scheme and the realization in fingerprint biometrics are proposed. </LI> <LI> A modified randomized GHE in constructing the cancellable transform is proposed. </LI> <LI> We performed several security and privacy analysis for the proposed scheme, like privacy attacks ARM and SKI. </LI> <LI> The proposed scheme can be applied to variety of biometric feature representations, not only binary string and matcher. </LI> </UL> </P>

      • A Triaxial Accelerometer-Based Normal and Abnormal Gaits Classifier

        Yea-Dat Chuah,Bok-Min Goi,Ryoichi Komiya 보안공학연구지원센터 2016 International Journal of Bio-Science and Bio-Techn Vol.8 No.6

        Simulated gait experiments have provided evidence of the possibility of falls when test subjects experienced abnormal gait (fluctuating gait cycle). Falls will lead to increased healthcare and social cost. This study explored the possibility to classify normal gaits (stable gait cycle) and abnormal gaits. A triaxial accelerometer was used to capture 3-dimensional values of trunk acceleration data for 144 healthy subjects. Normal and abnormal gait experiments were carried out and the experiment data was analyzed statistically. Quantitative analysis results revealed significant differences between the values of trunk acceleration of normal and abnormal gaits. The values of trunk acceleration of abnormal gaits in medio-lateral, anterior-posterior and vertical directions are 257%, 376% and 217% larger than those of a normal gait respectively. A threshold based algorithm to classify normal and abnormal gaits was proposed and evaluated by the developed prototype classifier using the smartphone. The prototype classifier has achieved 100% accuracy in the ability to classify normal and abnormal gaits.

      • Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication

        Jin, Zhe,Lim, Meng-Hui,Teoh, Andrew Beng Jin,Goi, Bok-Min,Tay, Yong Haur IEEE 2016 IEEE transactions on systems, man, and cybernetics Vol.46 No.10

        <P>The ISO/IEC 19794-2-compliant fingerprint minutiae template is an unordered and variable-sized point set data. Such a characteristic leads to a restriction for the applications that can only operate on fixed-length binary data, such as cryptographic applications and certain biometric cryptosystems (e.g., fuzzy commitment). In this paper, we propose a generic point-to-string conversion framework for fingerprint minutia based on kernel learning methods to generate discriminative fixed length binary strings, which enables rapid matching. The proposed framework consists of four stages: 1) minutiae descriptor extraction; 2) a kernel transformation method that is composed of kernel principal component analysis or kernelized locality-sensitive hashing for fixed length vector generation; 3) a dynamic feature binarization; and 4) matching. The promising experimental results on six datasets from fingerprint verification competition (FVC)2002 and FVC2004 justify the feasibility of the proposed framework in terms of matching accuracy, efficiency, and template randomness.</P>

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼