• Title/Summary/Keyword:

Search Result 30, Processing Time 0.024 seconds

Application of the IoT Concept in the Field of Medical Devices: Development of a Prototype of a Mechanotherapeutic Simulator and Software for Its Control

  • Lasek, Mikhail Petrovich;Karmanov, Vladislav Nikolaevich;Makarov, Roman Vladimirovich;Makarov, Pavel Andreevich;Gryaznov, Dmitriy Yurievich;Ustyugov, Vladimir Aleksandrovich
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.63-66
    • /
    • 2022
  • The article discusses the application of the IoT concept in the sensitive field of medical devices on the example of a developed prototype of a mechanotherapeutic simulator. Mechanotherapy is a complex of therapeutic, preventive, and restorative exercises conducted using simulators, specially designed for developing movements in individual joints. Mechanotherapy is used for the early and painless restoration of joint mobility, to prevent complications associated with prolonged immobilization of the injured area of extremities. Using the mechanotherapy simulator allows developing the joint painlessly, which accelerates the metabolism in the injured area, and soft tissues are restored to normal. The article provides information about the electronic components that ensure the wireless operation of the device and describes in detail the applied software as well as the client application for a mobile device.

Representation of Male Character and Cinematic Space in 2000s Korean Division Films -Focusing on the , , (2000년대 분단영화의 남성인물 관계 및 공간 표상 -<공동경비구역 JSA>, <의형제>, <공작>을 중심으로)

  • Yoo, Jae Eung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.213-222
    • /
    • 2019
  • This article aimed at change patterns of representations of male character and cinematic space in 2000s korean division films. The concept of division film is the unique particularity film in the narrative and representation about Korean division. The Gancheop is the special character of korean films and have been reproduced in a variety of ways. In the past, Korean films have been dealt with Korean Civil War and 'special nature' of inter-korean ties. But in the 2000s, the representation of Gancheop in films has begun to change and filmed in a variety of genres such like comedy, thriller, romance and so on. , , are consistent with close relationship of male characters. The relationship is represented as friend, brother, partner. The meaning of these changes symbolizes our concept of national unification.

A Security Reference Model for the Construction of Mobile Banking Services based on Smart Phones

  • Shin, Yong-Nyuo;Shin, Woo-Chang
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.229-237
    • /
    • 2011
  • As smart phones have become widely adopted, they have brought about changes in individual lifestyles, as well as significant changes in the industry. As the mobile technology of smart phones has become associated with all areas of industry, it is not only accelerating innovation in other industries such as shopping, healthcare service, education, and finance, but is also creating new markets and business opportunities. The preparation of thorough security measures for smart phones is increasing in demand. While offering excellent mobility and convenience, smart phones can be exposed to a range of violation threats. In particular, it is necessary to make efforts to develop a security system that can preemptively cope with potential security threats in the banking service area, which requires a high level of reliability. This paper suggests a security reference model that is considered for the smart phone-based joint mobile banking development project being undertaken by the Bank of Korea in 2010. The purpose of this study is to make a security reference model for a reliable smart phone-based mobile financial service, by recognizing the specific security threats directed toward smart phones, and providing countermeasures to these security threats. The proposed mobile banking security reference model is useful in improving system security by systematically analyzing information security threats to the mobile financial service, and by presenting the guideline for the preparation of countermeasures.

A Study on Confrontation a Plan of Policing Policy with the Development Globalization (세계화의 진전에 따른 치안정책의 대응방안)

  • Lee, Jin-Moon
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.251-272
    • /
    • 2000
  • Attempts have also been made to locate security in the so-called 'policingdivision of labour' In order to understand this, it is necessary to identify some of the links which exist between public police organizations and the private security sector. Such links can be divided into six types : 1) Interpersonal links, 2) Joint operations, 3) Exchange of services, 4) Granting of special powers, 5) Public bodies hiring private personnel, 6) New organizational. Van Reenen provides a useful outline of the different dimensions of future Glibalization of policing. Developments, he suggests, are likely to proceed in four directions : 1) Co-operation : at this level, the nature and powers of national police systems are not required to change, co-operation occurring between self-standing forces. 2) Horizontal integration : this arises when officers obtain authority to operate in another country, or where government officials from one country get authority over the police in another country. 3) Vertical integration : this exists when a police organization is created which can operate within the area of the EC as a whole. 4) Competition : the internationalization of policing in Europe presents itself, more and more, as a market in which different policing systems trade their products.

  • PDF

A study on Improved Convergence Security Monitoring System model (융합보안관제시스템 개선에 관한 연구)

  • Lee, Dong-Hwi;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.3-12
    • /
    • 2011
  • According to the NIS, damages due to leaking industrial technology are reaching tens of trillion won. The type of damages are classified according to insider leaks, joint research, and hacking, illegal technology leaks and collaborated camouflaged. But 80% of them turned out to be an insider leak about connecting with physical security. The convergence of IT and non IT is accelerating, and the boundaries between all area are crumbling. Information Security Industry has grown continuously focusing Private Information Security which is gradually expanding to Knowledge Information Security Industry, but Information Security Industry hereafter is concentrated with convergence of IT Security Technology and product, convergence of IT Security and Physical Security, and IT convergence Industry Security. In this paper, for preventing company information leaks, logical security and physical security both of them are managed at the same level. In particular, using convergence of physical security systems (access control systems, video security systems, and others) and IT integrated security control system, convergence security monitoring model is proposed that is the prevention of external attacks and insider leaks, blocked and how to maximize the synergy effect of the analysis.

Tasks and Development plan of R.O.K. Navy to support Korean government's 『Indo-Pacific Strategy』 (한국의 『인도-태평양 전략』 지원을 위한 해군의 역할·발전방안 고찰)

  • Ji, Young
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.83-107
    • /
    • 2023
  • To Republic of Korea in the Indo-Pacific region, the stability and prosperity of the area are directly coupled with national survival, interest. Currently, on account of strategic competition between U.S.A, and China in this area as well as supranational·non-conventional threats, the security environment is unstable, required joint/allied responses. So, lots of states inside(U.S.A., Japan, ASEAN, etc.), also, out of this Indo-Pacific area like EU-NATO, open their own strategy related in Indo-Pacific issues to be involved. R.O.K. government took its own line with publishing self strategy following this international trend, it can be shown korean government's strong intend to join in the pending security issues in this region with 'strategic clarity'. Now, R.O.K. Navy has to back up governments, policy. First, R.O.K. Navy should strengthen the relationship inside and take part in the multilateral cooperation of security. Second, to convey this deterrence message to potential threats, Navy is required to show of forces and have combined exercises. Also, as naval forces of advanced countries, Korea, Navy should be taken action in non-traditional threats, and help developing states improve their sea power. To fulfill this tasks in the wide ocean area, Navy need five inherent characteristics(mobility, flexibility, sustainability, capability of presence and projection). In the end, this paper propose the development plan following operational environment (SWOT) analysis as well.

  • PDF

The Korean Nationalist Characteristics of the Korean Blockbuster Films: Focusing on and (한국형 블록버스터 영화의 한국 민족주의적 특성: <공동경비구역 JSA>와 <한반도>를 중심으로)

  • Ryu, Jae-Hyung
    • Korean journal of communication and information
    • /
    • v.59
    • /
    • pp.116-137
    • /
    • 2012
  • What is 'nation' and 'nationalism?' What does 'korean nationalism' mean? And how is korean nationalism represented through a chain of films called 'the korean blockbuster films?' The purpose of this study is to answer to these questions. The characteristics of the korean blockbuster films have been studied for quite a long time and the researchers have agreed with the context about nationalism in a large sense. However, majority of the studies ends up in the journalistic or impressionistic criticism without any theoretical discussion. Few theoretical criticisms also have founded on the formation process of nation of the Western Europe and their nationalism. Hence I would like to add the discourse of korean nationalism and to seize more accurately the social/cultural/historical peculiarity of the korean blockbuster films. In addition, as non-nationalist narratives have recently emerged, korean blockbuster films are entering to the evolution process. On this, the significance of this study seems to exist in providing a cornerstone to the expected evolution theory of the korean blockbuster films by means of complementation and reestablishment of nationalism of their first generation. and , presenting socio-historical peculiarity of the Korean nation, are examined by the close textual analysis.

  • PDF

Methodology for Computer Security Incident Response Teams into IoT Strategy

  • Bernal, Alejandro Enciso;Monterrubio, Sergio Mauricio Martinez;Fuente, Javier Parra;Crespo, Ruben Gonzalez;Verdu, Elena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1909-1928
    • /
    • 2021
  • At present, the Colombian government shares information on threats or vulnerabilities in the area of cybersecurity and cyberdefense, from other government agencies or departments, on an ad-hoc basis but not in real time, with the surveillance entities of the Government of the Republic of Colombia such as the Joint Command of Cybernetic Operations (CCOCI) and the Cybernetic Emergencies Response Team of Colombia (ColCERT). This research presents the MS-CSIRT (Management System Computer Security Incident Response Teams) methodology, that is used to unify the guidelines of a CSIRT towards a joint communication command in cybersecurity for the surveillance of Information Technology (IT), Technological Operations (TO), Internet Connection Sharing (ICS) or Internet of Things (IoT) infrastructures. This methodology evaluates the level of maturity, by means of a roadmap, to establish a CSIRT as a reference framework for government entities and as a guide for the areas of information security, IT and TO to strengthen the growth of the industry 4.0. This allows the organizations to draw a line of cybersecurity policy with scope, objectives, controls, metrics, procedures and use cases for the correct coordination between ColCERT and CCOCI, as support entities in cybersecurity, and the different companies (ICS, IoT, gas and energy, mining, maritime, agro-industrial, among others) or government agencies that use this methodology.

This paper asks whether the Republic of Korea (ROK) Navy should Study on ROK Navy's Strategy Planning - Concerning to JOAC, ASB Concept of US Armed Forces - (한국 해군의 전략 수립 방향 연구 - 미군의 JOAC, ASB 개념 분석과 한국 해군에의 함의-)

  • Na, Sung-Min
    • Strategy21
    • /
    • s.32
    • /
    • pp.5-35
    • /
    • 2013
  • The purpose of this thesis is to suggest how to plan ROK(Republic of Korea) Navy's strategy concerning to JOAC(Joint Operation Access Concept) and ASB(Air-Sea Battle) concept of US(United States) armed forces. Since 2006, US armed forces has been developing CONOPS(Concepts of Operations), JOAC & ASB. These concepts will not only affect security environment for Korea Peninsula and West Pacific Area, but also will be affected to ROK Navy's Strategy. Therefore, Korea Navy has to consider and review those concepts and should discuss the way to secure peace of Korea Peninsula. JOAC & ASB have been developed for securing operational access ability of US armed forces against enemy forces. A2/AD(Anti-Access, Area-Denial) is the strategy of possible enemy forces against US forces' approaching into the operation area and impede operations within area. US forces had to overcome enemy's A2/AD strategy in coming century to protect national interest and sustain global leadership. The main concept of JOAC & ASB is "Cross-domain Synergy", which means 'to eliminate duplicate and improve joint operability containing space and cyber operation area.' Korea Navy's acceptance of JOAC & ASB without any revising is not a rational choice. Without the amendment some problems can be occurred by the Korea navy's acceptance for the original version of JOAC & ASB. Those are "Missing differences of operation environment between Korea and US", "Impediment from neighbor nations, especially PRC (People's Republic of China)", and "Impediment inside from Korea armed forces". Therefore, Korea Navy has to evaluate and find out the way to solve for JOAC & ASB to apply for their strategy and minimise those possible problems above. This thesis is expected to be the solution.

  • PDF

Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages (HyMES에 대한 결합 확률 분포 기반 단일 파형 분석)

  • Park, ByeongGyu;Kim, Suhri;Kim, Hanbit;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1099-1112
    • /
    • 2018
  • The field of post-quantum cryptography (PQC) is an active area of research as cryptographers look for public-key cryptosystems that can resist quantum adversaries. Among those categories in PQC, code-based cryptosystem provides high security along with efficiency. Recent works on code-based cryptosystems focus on the side-channel resistant implementation since previous works have indicated the possible side-channel vulnerabilities on existing algorithms. In this paper, we recovered the secret key in HyMES(Hybrid McEliece Scheme) using a single power consumption trace. HyMES is a variant of McEliece cryptosystem that provides smaller keys and faster encryption and decryption speed. During the decryption, the algorithm computes the parity-check matrix which is required when computing the syndrome. We analyzed HyMES using the fact that the joint distributions of nonlinear functions used in this process depend on the secret key. To the best of our knowledge, we were the first to propose the side-channel analysis based on joint distributions of leakages on public-key cryptosystem.