• Title/Summary/Keyword: 네트워크컴퓨터

Search Result 4,221, Processing Time 0.033 seconds

A Study on Fuzzy Searching Algorithm and Conditional-GAN for Crime Prediction System (범죄예측시스템에 대한 퍼지 탐색 알고리즘과 GAN 상태에 관한 연구)

  • Afonso, Carmelita;Yun, Han-Kyung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.149-160
    • /
    • 2021
  • In this study, artificial intelligence-based algorithms were proposed, which included a fuzzy search for matching suspects between current and historical crimes in order to obtain related cases in criminal history, as well as conditional generative adversarial networks for crime prediction system (CPS) using Timor-Leste as a case study. By comparing the data from the criminal records, the built algorithms transform witness descriptions in the form of sketches into realistic face images. The proposed algorithms and CPS's findings confirmed that they are useful for rapidly reducing both the time and successful duties of police officers in dealing with crimes. Since it is difficult to maintain social safety nets with inadequate human resources and budgets, the proposed implemented system would significantly assist in improving the criminal investigation process in Timor-Leste.

Blocking and investigation of child pornography using child pornography profiling system of National Police Agency (경찰청 아동음란물프로파일링 시스템을 이용한 아동음란물 차단 및 수사 방안)

  • Lee, Sang Duk
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.97-108
    • /
    • 2018
  • Computer technology and Internet advances enable easy massive file transfer by messenger, email, and web hard service users this means that a child pornography file owner who is illegally possessing itself can quickly transfer that to other users However there are currently no specific ways to prevent or block the distribution of child pornography between messenger, email, and web hard service users. in this paper, we propose a method to prevent the distribution of child pornography using the MD5, SHA-1 hash value stored in the 'police Child pornography Profiling system' and to identify the child pornography suspects using the subscriber information. the user extracts the hash value of the file before distributing the file, compared it with police system, and if it has the same value, blocks the transmission of the file and sends warning to the owner. the service provider sends the subscriber information to investigation agency child pornography owners can conduct a quick and accurate investigation.

Design of the Personalized User Authentication Systems (개인 맞춤형 사용자 인증 시스템 설계)

  • Kim, Seong-Ryeol
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.143-148
    • /
    • 2018
  • In this paper, we propose a personalized user authentication system (PUAS) that can be used in multiple stages in user authentication by customizing the password keyword to be used in user authentication. The proposal concept is that the user oneself defines the password keyword to be used in user authentication so as to cope with a passive retransmission attack which reuses the password obtained when the server system is accessed in user authentication. The authentication phase is also designed so that it can be expanded in multiple stages in a single step. Also, it is designed to store user-defined password related information in an arbitrary encrypted place in the system, thereby designing to disable the illegal access of the network. Therefore, even if an intruder accesses the system using the proposed system, it is possible to generate personal authentication information by generating a password keyword through unique personal information possessed only by an individual and not know the place where the generated authentication information is stored, It has a strong security characteristic.

Development of Lora Wireless Network Based Water Supply Control System for Bare Ground Agriculture (자가 충전 및 장거리 무선 네트워크를 지원하는 노지 농작물 관수 자동화 시스템 설계)

  • Joo, Jong-Yui;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1373-1378
    • /
    • 2018
  • In order to solve the problems such as reduction of agriculture population, aging and declining of grain self sufficiency rate, agriculture ICT convergence technology utilizing IoT technology is actively being developed. Agricultural ICT technology only concentrates on facility houses, and there is no automated control system in the field of cultivation. In this paper, we propose an irrigation control system that automatically controls the solenoid valves and water pumps in a large area with Lora wireless communication. The proposed system does not require a separate power source by using a small solar panel, and it is very convenient to install and operate supporting wireless auto setup by plug-and-play method. Therefore, it is expected that it will contribute to the reduction of labor force, quality of agricultural products, and productivity improvement.

Performance Evaluation of One Class Classification to detect anomalies of NIDS (NIDS의 비정상 행위 탐지를 위한 단일 클래스 분류성능 평가)

  • Seo, Jae-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.15-21
    • /
    • 2018
  • In this study, we try to detect anomalies on the network intrusion detection system by learning only one class. We use KDD CUP 1999 dataset, an intrusion detection dataset, which is used to evaluate classification performance. One class classification is one of unsupervised learning methods that classifies attack class by learning only normal class. When using unsupervised learning, it difficult to achieve relatively high classification efficiency because it does not use negative instances for learning. However, unsupervised learning has the advantage for classifying unlabeled data. In this study, we use one class classifiers based on support vector machines and density estimation to detect new unknown attacks. The test using the classifier based on density estimation has shown relatively better performance and has a detection rate of about 96% while maintaining a low FPR for the new attacks.

LTE Load Balancer for Emergency Based on Raspberry Pi and OpenWRT (라즈베리 파이를 활용한 OpenWRT 기반 LTE 비상망 로드밸런서)

  • Baek, Seung-Hyun;Jang, Min-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.1
    • /
    • pp.97-110
    • /
    • 2019
  • Recently, the 4th Industrial Revolution has been emerged and various products are developed and commercialized in preparation of the communication failure. Many solutions are underway in Back-Up Network for IDC Servers, but not in the personal or sensor for low-power system use. Therefore we used the OpenWRT Firmware in Raspberry Pi which can be easily obtained in online market, and it created a low-power load balancer. Therefore, we developed the device that uses LTE Antenna based on USB Interface for communication fault notification and important data. The equipment used in this paper is easy to buy in online shop for anyone. Also, it can be applied in other vendors' boards by using USB. We hope that this paper will contribute to the stability of individual sensor networks.

A Study on the Concept of the Cyber Warfare and the Plan of Reaction (사이버전의 개념과 대응방안에 관한 연구)

  • Park, Chan-soo;Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.521-524
    • /
    • 2014
  • Because of the development of computers and networks, the use of the internet has been rapidly increased. The smart devices, such as smart phones and tablet PCs, have made an epoch-making changes, which have brought people's daily lives to the cyber world and life values have been improved. The cyber world not only just changed individual's lives, but also affected all areas and the world. The recent global trends reside mainly in protection of energy sources, and nation's dependency of the information system such as politic, economic and national security. Since major national infrastructure becomes a stragic attack target, the importance of cyber warfare has rised as an effective way to attact enermy. This article explores the concept of cyber warfare and national cyber capability, and then figure out the plan of reaction to minimize damages with best protection when cyber warfare occurs.

  • PDF

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

An Environment Information Management System for Cultivation in Agricultural Facilities using Augmented Reality (증강현실 기반 농업용 환경 정보 관리 시스템)

  • Kim, Min-ji;Kim, Jong-Ho;Koh, Jin-Gwang;Lee, Sung-Keun;Lee, Jae-Hak
    • The Journal of Bigdata
    • /
    • v.3 no.2
    • /
    • pp.113-121
    • /
    • 2018
  • In this study, an augmented reality(AR)-based information management system for agricultural facility is proposed. Using a variety of sensed data transmitted by Lora-based wireless networks deployed at the agricultural facility, this system is capable of augmenting the sensed data and displaying them on the user's smartphone screen to provide visualized information to user. When users point their smartphone camera to the agricultural facility, the environment information collected from numerous sensors installed at the facility would be visualized and appear on the screen. Unlike traditional system which requires user to search a specific facility and then select sensor(s) to obtain the environment information, the proposed system shows the information on smartphone screen by augmenting it with real image captured by camera without doing a series of time-taking selection process. Since the way of acquiring information is through image or video, this system contributes to convenient monitoring and efficient management for agricultural facility.

Space-Efficient Compressed-Column Management for IoT Collection Servers (IoT 수집 서버를 위한 공간효율적 압축-칼럼 관리)

  • Byun, Siwoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.1
    • /
    • pp.179-187
    • /
    • 2019
  • With the recent development of small computing devices, IoT sensor network can be widely deployed and is now readily available with sensing, calculation and communi-cation functions at low cost. Sensor data management is a major component of the Internet of Things environment. The huge volume of data produced and transmitted from sensing devices can provide a lot of useful information but is often considered the next big data for businesses. New column-wise compression technology is mounted to the large data server because of its superior space efficiency. Since sensor nodes have narrow bandwidth and fault-prone wireless channels, sensor-based storage systems are subject to incomplete data services. In this study, we will bring forth a short overview through providing an analysis on IoT sensor networks, and will propose a new storage management scheme for IoT data. Our management scheme is based on RAID storage model using column-wise segmentation and compression to improve space efficiency without sacrificing I/O performance. We conclude that proposed storage control scheme outperforms the previous RAID control by computer performance simulation.