9,074 research outputs found
How to Compare the Scientific Contributions between Research Groups
We present a method to analyse the scientific contributions between research
groups. Given multiple research groups, we construct their journal/proceeding
graphs and then compute the similarity/gap between them using network analysis.
This analysis can be used for measuring similarity/gap of the topics/qualities
between research groups' scientific contributions. We demonstrate the
practicality of our method by comparing the scientific contributions by Korean
researchers with those by the global researchers for information security in
2006 - 2008. The empirical analysis shows that the current security research in
South Korea has been isolated from the global research trend
Hybrid Spam Filtering for Mobile Communication
Spam messages are an increasing threat to mobile communication. Several
mitigation techniques have been proposed, including white and black listing,
challenge-response and content-based filtering. However, none are perfect and
it makes sense to use a combination rather than just one. We propose an
anti-spam framework based on the hybrid of content-based filtering and
challenge-response. There is the trade-offs between accuracy of anti-spam
classifiers and the communication overhead. Experimental results show how,
depending on the proportion of spam messages, different filtering %%@
parameters should be set.Comment: 6 pages, 5 figures, 1 tabl
Exploring Factors That Influence Students’ Behaviors in Information Security
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students’ information security behaviors. Based on the concept of fear arousal in the presence of a threatened event, a well-founded theory known as Protection Motivation Theory (PMT) is adopted in the research model. Social norms and habit factors are integrated to the model as a means to assess students’ behaviors of information security. A survey of 202 responses is used to test the designed model using structural equation modeling to analyze relationships among variables. Results indicated that students are very motivated to practice information security if they perceive high levels of severity, response efficacy, response costs and self-efficacy. Their intentions, however, are not affected by perceived vulnerability or by social influence. Our findings suggest that PMT is a valuable model for predicting students’ attitudes towards information security and that their motivation is influenced by education in security awareness and understanding severity of such issues
Synchrotron Radiation-Based X-Ray Study on Energy Storage Materials
Understanding the electrochemical processes responsible for energy storage in batteries is critical for designing of next-generation batteries. The conventional laboratory-scale characterization instruments provide limited information required for better understanding of electrochemical reaction mechanisms. Synchrotron radiations have very high brilliance and broad energy range extending from far-IR through the hard X-ray region. The availability of synchrotron radiation is driving technical and theoretical advances in scattering and spectroscopic techniques from last couple of decades. These advances in synchrotron radiation-based characterization techniques have made it possible to study the underpinning issues of energy storage materials. An electrochemical road map based on much more knowledge-driven approach can be drawn by utilizing synchrotron-based element-specific spectroscopic as well as scattering techniques. Herein, we introduce various scenarios where synchrotron radiation-based characterization methods provide inherent advantages and flexibility in obtaining detailed mechanistic information along with structural studies
- …