• Title/Summary/Keyword: 네트워크 신뢰도

Search Result 2,124, Processing Time 0.032 seconds

Parallelization of Genome Sequence Data Pre-Processing on Big Data and HPC Framework (빅데이터 및 고성능컴퓨팅 프레임워크를 활용한 유전체 데이터 전처리 과정의 병렬화)

  • Byun, Eun-Kyu;Kwak, Jae-Hyuck;Mun, Jihyeob
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.10
    • /
    • pp.231-238
    • /
    • 2019
  • Analyzing next-generation genome sequencing data in a conventional way using single server may take several tens of hours depending on the data size. However, in order to cope with emergency situations where the results need to be known within a few hours, it is required to improve the performance of a single genome analysis. In this paper, we propose a parallelized method for pre-processing genome sequence data which can reduce the analysis time by utilizing the big data technology and the highperformance computing cluster which is connected to the high-speed network and shares the parallel file system. For the reliability of analytical data, we have chosen a strategy to parallelize the existing analytical tools and algorithms to the new environment. Parallelized processing, data distribution, and parallel merging techniques have been developed and performance improvements have been confirmed through experiments.

Technology and Policy for Blockchain-based Spectrum Sharing (블록체인 기반의 전파 공유 기술과 전파 정책)

  • Shin, Na Yeon;Nam, Ji-Hyun;Choi, Ye Jin;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.13-21
    • /
    • 2019
  • The restricted network or the unbalanced distribution of spectrum is causing the problems of lack of spectrum resources and deterioration of the service quality. In addition, the existing centralized radio sharing method has not been a fundamental solution for radio sharing and is inefficient in terms of cost, convenience, and security. In this paper, we propose a blockchain-based spectrum sharing as a low-cost, trustworthy, high-efficiency platform that can distribute and share spectrum resources, and propose policies to realize this. In the spectrum sharing platform, spectrum information about Wi-Fi AP and LTE mobile hotspot is registered in the blockchain, and spectrum sharers and users can conclude peer-to-peer spectrum sharing contract quickly and efficiently through smart contract. The pay for the shared spectrum resources and reward for spectrum quality management open platform ecosystem to activate the circulation-sharing and it can provide a convenient and efficient public wireless infrastructure.

Effects of Independent Operator's Company Selection Attributes on Economic and Non-Economic Satisfaction, Trust, and Recommendation in the Network Marketing Industry (네트워크 마케팅 산업에서 독립 사업자의 기업 선택 속성이 경제적 및 비경제적 만족과 신뢰, 추천의도에 미치는 영향)

  • Roh, Hyun-Sik
    • The Korean Journal of Franchise Management
    • /
    • v.10 no.1
    • /
    • pp.19-32
    • /
    • 2019
  • Purpose - Since the opening of Korea's distribution market, the domestic network marketing market has been continuing to grow. In this context, research on network marketing independent operators, which plays the most important role in the network marketing industry, is insufficient. This study was to identify the effects of Independent Operator's Company Selection Attributions on the Economic and Non-Economic Satisfaction, Trust, and Recommendation. The results will provide strategic direction, theoretical and practical implications for companies and operators in the network marketing industry. Research design, data, and methodology - In order to verify the research hypotheses, the data were collected from Independent Operators of Network marketing industry using questionnaires. The pretest was conducted from January 8 to 19, 2018, and the main survey was conducted from February 1 to 28. A total of 210 questionnaires, of which 193 copies were collected. The data were analyzed with SPSS 21.0. and AMOS 21.0. Results - The results are as follows; product competitiveness and system competitiveness have significant effects on economic satisfaction and non-economic satisfaction. Economic and non-economic satisfaction have significant effects on business trust. Economic and non-economic satisfaction did not influence recommendation intention directly, but influence it indirectly. Business trust has a significant effect on business recommendation intention. Conclusions - After starting network marketing business as an independent operator, the competitiveness of the company is meaningless, and product competitiveness and system competitiveness are important factors for economic and non-economic satisfaction. Therefore, network marketing companies and independent operators should prioritize product competitiveness and system competitiveness between business development. The findings show that trust in the business is very important for active business Recommendation to others. Therefore, network marketing firms and independent operators need to make efforts to meet economic and non-economic satisfaction, which have a significant impact on business trust.

Technical Trends of AI Military Staff to Support Decision-Making of Commanders (지휘관들의 의사결정지원을 위한 AI 군참모 기술동향)

  • Lee, C.E.;Son, J.H.;Park, H.S.;Lee, S.Y.;Park, S.J.;Lee, Y.T.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.1
    • /
    • pp.89-98
    • /
    • 2021
  • The Ministry of National Defense aims to create an environment in which transparent and reasonable defense policies can be implemented in real time by establishing the vision of smart defense innovation based on the Fourth Industrial Revolution and promoting innovation in technology-based defense operation systems. Artificial intelligence (AI) based defense technology is at the level of basic research worldwide, includes no domestic tasks, and involves classified military operation data and command control/decision information. Further, it is needed to secure independent technologies specialized for our military. In the army, military power continues to decline due to aging and declining population. In addition, it is expected that there will be more than 500,000 units should be managed simultaneously, to recognize the battle situation in real time on the future battlefields. Such a complex battlefield, command decisions will be limited by the experience and expertise of individual commanders. Accordingly, the study of AI core technologies supporting real-time combat command is actively pursued at home and abroad. It is necessary to strengthen future defense capabilities by identifying potential threats that commanders are likely to miss, improving the viability of the combat system, ensuring smart commanders always win conflicts and providing reasonable AI digital staff based on data science. This paper describes the recent research trends in AI military staff technology supporting commander decision-making, broken down into five key areas.

A Video Encryption Based Approach for Privacy Protection of Video Surveillance Service (개인정보보호를 위한 영상 암호화 아키텍처 연구)

  • Kim, Jeongseok;Lee, Jaeho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.307-314
    • /
    • 2020
  • The video surveillance service is being widely deployed around our lives and the service stores sensitive data such as video streams in the cloud over the Internet or the centralized data store in an on-premise environment. The main concerning of these services is that the user should trust the service provider how secure the video or data is stored and handled without any concrete evidence. In this paper, we proposed the approach to protecting video by PKI (public key infrastructure) with a blockchain network. The video is encrypted by a symmetric key, then the key is shared through a blockchain network with taking advantage of the PKI mechanism. Therefore, the user can ensure the sensitive data is always kept secure and traceable in its lifecycle.

A Proposal for the Practical and Secure Electronic Voting Protocol (실용적이고 안전한 전자투표 프로토콜에 관한 연구)

  • 김순석;이재신;김성권
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.21-32
    • /
    • 2000
  • We have seen a lot of developments on computer application areas with the wide spread use of computers and the rapid growth of communication network. It is necessary to use a cryptographic technique for electronic voting, but, at present, despite of its importance electronic voting protocols so far have many shortcomings. In this paper, with the assumption of a trustable voting centers we propose a large-scale and practical electronic voting protocol satisfying protocol requirements, such as secureness, fairness, privacy of voter and correctness. Voters are able to get a vote without revealing their voted information by using the blinding technique. We can find the injustice between a voter and the tallier by using undeniable challenge and responsible protocol. Also, we proposes a secure protocol that compensates a integrity of electronic voting and protects a privacy of voter from outer attacks as using a anonymity of voter.

A Proposal of Key Management Structure for Providing a Integrated Multicast Service ` (통합 멀티캐스트 서비스 지원을 위한 키 관리 구조 제안)

  • 박희운;이임영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.89-103
    • /
    • 2001
  • Through the increment of requirement for group oriented communication services, the multicast infrastructure based on a wire and wireless network has become a widely discussed researching topic. However the research of the security properties safety, efficiency and scaleability in a multicast structure, has not been enough. In this study, we propose a scalable secure multicast key management structure based on PKI(Public Key Infrastructure), IPSec, domain subgroup and structural two mode scheme to provide a integrated multicast service. Also we discuss and propose the digital nominative group signature a refreshing method for satisfying the security and trusty on the network. At the base of this work we certify to the usability of new proposed scheme from comparing it with conventional schemes in the part of safety, efficiency and scaleability.

IC Card Security System for CEPS in Internet (CEPS 인터넷 서비스를 위한 IC카드 기반의 보안 시스템 구축)

  • Lee, Jong-Hoo;Ra, Eun-Ju;Baek, Sang-Soo;Ji, Seok-Jin;Lee, Yong;Ryu, Jae-Chul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.23-37
    • /
    • 2002
  • As the world-wide use of the Internet increases rapidly due to development of computer network the Electronic Commerce for business by treating it is growing as compared to the traditional one for the information exchange in the academic and research areas. The Electronic Payment System used for EC includes the Payment Broker System and the Electronic Purse System. And usually Electronic Purse System operates with IC cards. Saving the money in IC card has a high portability and security. Therefore, the Electronic purse System based on IC card is recently issued in the EC. In this paper, we design and implement of a IC card security system for Common Electronic Purse Specifications in Internet. CEPS is a Electronic Purse System proposed VISA, and conform EMV(Europay Mastercard VISA) security structure. With our system, users easily use Electronic Purse System with only Web browser and IC card. Original EMV paid no regard to using in the Internet. But our system, conforming to CEPS and EMV, is easily used in the Internet.

Level of Service Evaluation of Pedestrian Road Using Micro-Simulation (미시적 교통 시뮬레이션을 활용한 보행자도로 서비스 수준 평가)

  • Park, Soon Yong;Cho, Hyerim;Cho, Ga Young;Yun, Ilsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.26-36
    • /
    • 2020
  • The use of existing macroscopic research of pedestrian behavior on the walking link as data is limited in determining an individual pedestrian's moving route and the level of service. In macroscopic studies, it is difficult to make quantitative indices, such as pedestrian flow rate, occupied space, density, and speed for determining the level of service on pedestrian roads. Therefore, the microscopic pedestrian route is required to establish appropriate pedestrian policies. In this study, the Yeok-Sam subway station network was examined using a micro-simulation VISSIM, which was then calibrated and validated statistically. The Pedestrian Road's Level of Service of Yeok-Sam subway station area was evaluated using the pedestrian speed as the evaluating index on the Korean highway capacity handbook.

A Study on the Blockchain-Based Insurance Fraud Prediction Model Using Machine Learning (기계학습을 이용한 블록체인 기반의 보험사기 예측 모델 연구)

  • Lee, YongJoo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.270-281
    • /
    • 2021
  • With the development of information technology, the size of insurance fraud is increasing rapidly every year, and the method is being organized and advanced in conspiracy. Although various forms of prediction models are being studied to predict and detect this, insurance-related information is highly sensitive, which poses a high risk of sharing and access and has many legal or technical constraints. In this paper, we propose a machine learning insurance fraud prediction model based on blockchain, one of the most popular technologies with the recent advent of the Fourth Industrial Revolution. We utilize blockchain technology to realize a safe and trusted insurance information sharing system, apply the theory of social relationship analysis for more efficient and accurate fraud prediction, and propose machine learning fraud prediction patterns in four stages. Claims with high probability of fraud have the effect of being detected at a higher prediction rate at an earlier stage, and claims with low probability are applied differentially for post-reference management. The core mechanism of the proposed model has been verified by constructing an Ethereum local network, requiring more sophisticated performance evaluations in the future.