• Title/Summary/Keyword: 네트워크 신뢰도

Search Result 2,124, Processing Time 0.026 seconds

Automation System for Sharing CDM Data (CDM 데이터 공유를 위한 자동화 시스템)

  • Jeong, Chae-Eun;Kang, Yunhee;Park, Young B.
    • Journal of Platform Technology
    • /
    • v.8 no.3
    • /
    • pp.3-9
    • /
    • 2020
  • As the need for sharing for research purposes in the medical field increases, the use of a Common Data Model (CDM) is increasing. However, when sharing CDM data, there are some problems in that access control and personal information in the data are not protected. In this paper, in order to solve this problem, access to CDM data is controlled by using an encryption method in a blockchain network, and information of CDM data is recorded to enable tracking. In addition, IPFS was used to share a large amount of CDM data, and Celery was used to automate the sharing process. In other words, we propose a multi-channel automation system in which the information required for CDM data sharing is shared by a trust-based technology, a distributed file system, and a message queue for automation. This aims to solve the problem of access control and personal information protection in the data that occur in the process of sharing CDM data.

  • PDF

Base Station Cooperation Scheme for Low-Latency Two-Way Communication (저지연 양방향 통신을 위한 기지국 협력 전송)

  • Kim, Dong Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.751-758
    • /
    • 2020
  • As the application fields using various types of communication, including the Internet of Things, have emerged, the form of communication has been diversified. Some applications require fast feedback and the others continue to send data regardless of whether it is received or not. Transmitting data in one way can be acknowledged by the opposite direction response. These information exchanges form a two-way communication. For applications that need to issue commands remotely, such as network control systems, it is important to give a fast response because the sender decides the next action based on the response from the recipient. In this paper, we propose the base station (BS) cooperation to improve the latency performance of the two-way communication in cellular networks. We design the two-way communication strategy utilizing cooperating BSs with the same direction of traffic as well as bidirectional traffic. We show that the proposed scheme improves the latency performance than the previous works.

A Study on Application of Autonomous Traffic Information Based on Artificial Intelligence (인공지능 기반의 자율형 교통정보 응용에 대한 연구)

  • Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.6
    • /
    • pp.827-833
    • /
    • 2022
  • This study aims to prevent secondary traffic accidents with high severity by overcoming the limitations of existing traffic information collection systems through analysis of traffic information collection detectors and various algorithms used to detect unexpected situations. In other words, this study is meaningful present that analyzing the 'unexpected situation that causes secondary traffic accidents' and 'Existing traffic information collection system' accordingly presenting a solution that can preemptively prevent secondary traffic accidents, intelligent traffic information collection system that enables accurate information collection on all sections of the road. As a result of the experiment, the reliability of data transmission reached 97% based on 95%, the data transmission speed averaged 209ms based on 1000ms, and the network failover time achieved targets of 50sec based on 120sec.

Stretchable Strain Sensors Using 3D Printed Polymer Structures Coated with Graphene/Carbon Nanofiber Hybrids (그래핀/탄소나노섬유 코팅된 3D 프린팅 고분자 구조를 이용한 신축성 스트레인 센서)

  • Na, Seung Chan;Lee, Hyeon-Jong;Lim, TaeGyeong;Yun, Jeongmin;Suk, Ji Won
    • Composites Research
    • /
    • v.35 no.4
    • /
    • pp.283-287
    • /
    • 2022
  • Stretchable strain sensors have been developed for potential future applications including wearable devices and health monitoring. For practical implementation of stretchable strain sensors, their stability and repeatability are one of the important aspects to be considered. In this work, we utilized 3D printed polymer structures having kirigami patterns to improve the stretchability and reduce the hysteresis. The polymer structures were coated with graphene/carbon nanofiber hybrids to make a robust electrical network. The stretchable strain sensors showed a high gauge of 36 at a strain of 32%. Because of the kirigami structures and the robust graphene/carbon nanofiber coating, the sensors also exhibited stable resistance responses at various strains ranging from 1% to 30%.

Analysis of the Relationship between Service Quality, Satisfaction and Repurchase Intention of On-line Fashion Shopping Malls and the Moderating Effect of Online Reviews (중국 온라인 패션쇼핑몰의 서비스 품질, 만족, 재구매의도간의 관계 및 온라인 리뷰의 조절효과 분석)

  • Jiang, Bao-Zhi;Lee, Young-sook;Lee, Jieun
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.47-54
    • /
    • 2022
  • The development of the Internet of Things led to new services that did not exist before. This required a change to the existing network. This study aims to verify the service quality, satisfaction, repurchase intention relationship, and the moderating effect of online reviews of Chinese consumers using fashion shopping malls. The results of the study showed that from the perspective of consumers in their 20s and 30s in China, the type, reliability, convenience, and interaction of service quality had a positive effect on customer satisfaction and repurchase intention. In addition, negative reviews among online reviews had a great influence on repurchase intention. Based on the results of the study, it will help improve the effect on online product reviews and in-depth understanding of the acceptance of online product reviews for online fashion shopping malls, and establish strategies for fashion companies to effectively manage online product reviews information.

Anonymous Blockchain Voting Model using the Master Node Network (마스터 노드 네트워크를 사용한 블록체인 익명 투표 모델)

  • Cho, Jae-Han;Lee, Lee-Sub;Choi, Chang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.394-402
    • /
    • 2021
  • Electronic voting systems have been widely used in many countries around the world since the mid-1990s. In recent years, studies have applied blockchain to existing electronic voting systems in order to provide reliability, fairness, and transparency for voters. This approach is highly useful as a technology that promotes decentralized citizen participation. However, the existing electronic voting systems using blockchain have not sufficiently considered anonymity. Lack of anonymity acts as an important constraint in cases of small- and medium-sized voting, which is often required in decentralized citizen participation. In this study, we propose a model that provides anonymity to a voting system using blockchain by applying the concept of the master node in Dash cryptocurrency. First, we define the differences in the requirements of the transfer and voting systems in blockchain. We propose a parallel and autonomous model and algorithm to provide anonymity in the blockchain-that is, a decentralized development environment. In addition, a discussion of security and the environment for the proposed model is described.

An Enhancement of The Enterprise Security for Access Control based on Zero Trust (제로 트러스트 기반 접근제어를 위한 기업 보안 강화 연구)

  • Lee, Seon-A;Kim, Beomseok;Lee, Hyein;Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.265-270
    • /
    • 2022
  • With the advent of the Fourth Industrial Revolution, the paradigm of finance is also changing. As remote work becomes more active due to cloud computing and coronavirus, the work environment changes and attack techniques are becoming intelligent and advanced, companies should accept new security models to further strengthen their current security systems. Zero trust security increases security by monitoring all networks and allowing strict authentication and minimal access rights for access requesters with the core concept of doubting and not trusting everything. In addition, the use of NAC and EDR for identification subjects and data to strengthen access control of the zero trust-based security system, and strict identity authentication through MFA will be explained. Therefore, this paper introduces a zero-trust security solution that strengthens existing security systems and presents the direction and validity to be introduced in the financial sector.

Sports Media Value in New Media Platform Era: The Role of Media Engagement and Empathy (뉴미디어 플랫폼 시대의 스포츠미디어 가치: 미디어 인게이지먼트와 공감의 역할)

  • Choi, Eui-Yul;Jeon, Yong-Bae;Kim, Hyun-Duck
    • Journal of the Korean Applied Science and Technology
    • /
    • v.39 no.3
    • /
    • pp.433-441
    • /
    • 2022
  • The purpose of this study is to investigate the relationship between media engagement, media empathy, and media value of MCN sports broadcasting. To achieve this purpose, a survey was conducted on 324 MCN sports broadcast viewers. Exploratory factor analysis was performed to confirm validity, and Cronbach's α test was performed to investigate reliability. In addition, correlation analysis was performed to verify discriminant validity, and linear regression analysis was performed to verify the research hypothesis, and the following conclusions were drawn. Media engagement had a positive effect on media value. Media engagement had a positive effect on media empathy. Media empathy has a positive effect on media value.

How to Prove the Identity of Artist When Creating Non-fungible Tokens (대체불가능 토큰을 생성할 때 어떻게 예술가의 신원을 증명할까?)

  • Kim, Taekyung;Yang, Ji Yeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.669-676
    • /
    • 2022
  • Non-fungible tokens (NFTs) have the advantage of being able to reliably manage details after minting, but how can ideas be protected before being converted to NFTs? The use of NFTs to increase the value of digital assets is increasing, but the problem of creating and selling NFTs without the consent of the creator is also increasing. Existing methods for protecting creators include a method of using a traditional authentication system and a method of using a social network, but each has limitations. Therefore, in this study, an identity token utilization method is proposed as a way to supplement the existing limitations. When an identity token is used, a certified NFT is issued through an existing identity authentication authority, so the verification of the authenticity of the token becomes clear. In addition, in inheritance and transfer, it becomes possible to respond to legal problems related to the transfer of creative rights.

A Study on How to Build a Zero Trust Security Model (제로 트러스트 보안모델 구축 방안에 대한 연구)

  • Jin Yong Lee;Byoung Hoon Choi;Namhyun Koh;Samhyun Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.189-196
    • /
    • 2023
  • Today, in the era of the 4th industrial revolution based on the paradigm of hyper-connectivity, super-intelligence, and superconvergence, the remote work environment is becoming central based on technologies such as mobile, cloud, and big data. This remote work environment has been accelerated by the demand for non-face-to-face due to COVID-19. Since the remote work environment can perform various tasks by accessing services and resources anytime and anywhere, it has increased work efficiency, but has caused a problem of incapacitating the traditional boundary-based network security model by making the internal and external boundaries ambiguous. In this paper, we propse a method to improve the limitations of the traditional boundary-oriented security strategy by building a security model centered on core components and their relationships based on the zero trust idea that all actions that occur in the network beyond the concept of the boundary are not trusted.