http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Gafurov Dilshodjon,Ho Young Shin,KiSu Kim 한국산업경영학회 2013 한국산업경영학회 발표논문집 Vol.2013 No.-
Smartphones being all in one featured mobile devices are spreading faster than ever. No doubt, attackers have revealed several vulnerabilities of smartphones and they are becoming a target for malware writers as their counterpart PCs. This jeopardizes the mobile life of over one billion smartphone users who are far from malware awareness. The objective of this study is to extend prior models to mobile technology by analyzing the users' behavior in dealing with the smartphone malware threat. This paper attempts to understand individuals' cognitive process in the context of fear. We test a theoretical model based on Protection Motivation Theory (PMT) using data collected from 352 respondents. Employing statis tical packages (SPSS and PLS), we found that all latent factors significantly determine the smartphone users' behavioral intention in adopting the recommended action against malware threat. Findings suggest that response efficacy has the greatest influence' Our analytical results manifest strong support for the proposed model. The theoretical framework and given implications of our study can be generalized and applied within the domain of smartphone security to persuade users adopt protective measures against malicious attacks.
Gafurov, Khusanbek,Chung, Tai-Myoung Korea Information Processing Society 2019 Journal of information processing systems Vol.15 No.4
Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantly sense the physical world and share the data for further processing. At the core of IoT lies the early technology of radio frequency identification (RFID), which provides accurate location tracking of real-world objects. With its small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furniture and the like as well as to animals, plants, and even humans. This phenomenon is the beginning of new applications and services for the industry and consumer market. IoT is regarded as a fourth industrial revolution because of its massive coverage of services around the world from smart homes to artificial intelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there will be several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite the growing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoid causing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layered models, security characteristics, potential applications, and related supporting technologies of IoT such as 5G, MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.
RELIABILITY TEST DESIGN Of REMANUFACTURED STEERING GEAR OIL SEAL
Alisher Gafurov,Jung Do-Hyun,Song Hyun-Seok 한국신뢰성학회 2011 한국신뢰성학회 학술대회논문집 Vol.2011 No.6
This paper describes a reliability/durability test of the remanufactured steering gear units. There used to be government restrictions to remanufacture certain types of automotive components regarding safety of passengers. Nevertheless, scientific approach to sustainability and remanufacturing process provided solid evidence of highly beneficial sides of reusing the products. Failure mode analysis of the steering gear unit is performed and main failure is found out. The unit is remanufactured by fixing the failure and its quality is assessed through designing a new sequence of loading events. Oil leakage is witnessed as a possible failure and its volume is measured. Conclusions based on laboratory condition durability test are given at the end.
Khusanbek Gafurov,정태명 한국정보처리학회 2019 Journal of information processing systems Vol.15 No.4
Internet of Things (IoT) is the paradigm of network of Internet-connected things as objects that constantlysense the physical world and share the data for further processing. At the core of IoT lies the early technologyof radio frequency identification (RFID), which provides accurate location tracking of real-world objects. Withits small size and convenience, RFID tags can be attached to everyday items such as books, clothes, furnitureand the like as well as to animals, plants, and even humans. This phenomenon is the beginning of newapplications and services for the industry and consumer market. IoT is regarded as a fourth industrialrevolution because of its massive coverage of services around the world from smart homes to artificialintelligence-enabled smart driving cars, Internet-enabled medical equipment, etc. It is estimated that there willbe several dozens of billions of IoT devices ready and operating until 2020 around the world. Despite thegrowing statistics, however, IoT has security vulnerabilities that must be addressed appropriately to avoidcausing damage in the future. As such, we mention some fields of study as a future topic at the end of the survey. Consequently, in this comprehensive survey of IoT, we will cover the architecture of IoT with various layeredmodels, security characteristics, potential applications, and related supporting technologies of IoT such as 5G,MEC, cloud, WSN, etc., including the economic perspective of IoT and its future directions.
Dilshodjon Gafurov,Ho Young Shin,Kisu Kim 한국전략마케팅학회 2014 마케팅논집 Vol.22 No.3
하나의 모바일 기기에 모든 기능을 담은 스마트폰의 사용이 빠른 속도로 확산됨에 따라 스마트폰도 PC와 같이 악성코드 작성자들의 표적이 되고 있다. 그 결과 악성코드를 잘 인식하지 못하고 있는 15억 스마트폰 사용자들의 스마트폰 사용을 위협하고 있다. 본 연구의 목적은 악성코드 위협을 줄이기 위한 스마트폰 사용자들의 위험통제행위의도를 이해하는데 있다. 본 연구에서는 심리학에서 사용되어 온 보호동기이론을 이용하여 스마트폰 사용자들의 위험통제행위의도에 대한 연구모형을 개발하였다. 연구결과 지각된 위협의 심각성과 지각된 위협의 취약성 모두 스마트폰 사용자들의 반응효능감과 자기효능감에 부의 영향을 미치고, 반응효능감과 자기효능감 모두 행위의도에 정의 영향을 미치는 것으로 나타났다. 본 연구는 스마트폰 사용자들의 정보보안행위의도를 이해하는데 기여하고, 나아가 본 연구 결과는 스마트폰 사용자들의 정보보안행위의도를 높이기 위한 정책적 시사점도 제공하고 있다. Smartphones being all in one featured mobile devices are spreading faster than ever. No doubt, attackers have revealed several vulnerabilities of smartphones and they are becoming a target for malware writers as their counterpart PCs. This jeopardizes the mobile life of over one and half billion smartphone users who are far from malware awareness. The objective of this study is to extend prior models to mobile technology by analyzing the smartphone users’ behavioral intention in accepting danger control actions to reduce malware threat. This paper attempts to understand individuals’ cognitive process in the context of fear in decentralized IT security environment. We test a theoretical model based on Protection Motivation Theory. We found that all latent factors significantly determine the smartphone users’ behavioral intention in adopting the recommended action against malware threat. Findings suggest that response efficacy has the greatest influence. Our analytical results manifest strong support for the proposed model. The theoretical framework and given implications of our study can be generalized and applied within the domain of smartphone security to understand users’ threat control behavior and persuade them adopt protective measures against smartphone malware threat.
Anton Nailevich Gafurov,Thanh Huy Phung,Beyong-Hwan Ryu,Inyoung Kim,Taik-Min Lee 한국정밀공학회 2023 International Journal of Precision Engineering and Vol.10 No.2
Screen printing has been adopted for fabricating a wide variety of electronic devices. However, the printing defects and reliability have been an obstacle for industrialization of printed electronics. In this research, the artificial intelligence (AI) model was developed and integrated with the in-house roll-to-roll screen printing system to detect smearing defect, which is one of the main defects of screen printing. The U-Net architecture was adopted, and a total of 19 models were designed with model sizes ranging from 8E + 3 to 3E + 7 number of parameters. Their performances as validation mean Intersection over Union (IoU) were analyzed, and the optimal model was chosen with a validation mean IoU of 95.1% and a number of parameters of 8E + 6. The printed line images were evaluated by the AI model for various printing conditions, such as printed line widths, printing paste premixing, printing speeds, and printed line directions, which showed that the model could effectively detect the smearing defects. Also, the AI model capabilities were investigated for repeated printing, which demonstrated that it can be used for the reliability assessment of the screen printing process.