• Title/Summary/Keyword: 노출제한

Search Result 396, Processing Time 0.027 seconds

Research of Monitoring of Conservation Condition and Investigation Method of National Designated Heritage - Focusing on Regular Monitoring of National Designated Movable Cultural Heritage - (국가지정 지류문화재의 보존현황 파악 및 조사방안 연구 - 국가지정 동산문화재 정기조사를 중심으로 -)

  • Jeong, Seon-Hwa;Park, Sang-Kyu
    • Korean Journal of Heritage: History & Science
    • /
    • v.49 no.4
    • /
    • pp.196-217
    • /
    • 2016
  • This study was conducted to identify the state of conservation of the national paper heritages and to seek ways of conservation management, focusing on regular monitoring directly performed by the government on the national movable cultural heritages. Subjects for the investigation were limited to investigations conducted by both the Cultural Heritage Conservation Center and the Artistic Heritage Division in 2014 and 2015. Paper heritages are easily affected by temperature, humidity, lighting, etc. due to the nature of the material and can easily be damaged by physical strength; therefore stable conservation environment is essential and regular investigation on movable cultural heritages conducted according to the Cultural Heritage Protection Act is necessary to protect from contamination, being torn, bending, friction, or loss. Losing a chance for timely proper treatment will bring irrevocable result therefore strict management is necessary; continuous monitoring is also needed after treatment. Analysis on the pigments, materials and structures, detailed investigation, data establishment for conservation of cultural heritages and regular investigation should be done. Detailed data on the national cultural heritages will be a base of more reasonable conservation management system for the national paper heritages and will realize continuous improvement on regular investigation practice.

Secure Training Support Vector Machine with Partial Sensitive Part

  • Park, Saerom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.1-9
    • /
    • 2021
  • In this paper, we propose a training algorithm of support vector machine (SVM) with a sensitive variable. Although machine learning models enable automatic decision making in the real world applications, regulations prohibit sensitive information from being used to protect privacy. In particular, the privacy protection of the legally protected attributes such as race, gender, and disability is compulsory. We present an efficient least square SVM (LSSVM) training algorithm using a fully homomorphic encryption (FHE) to protect a partial sensitive attribute. Our framework posits that data owner has both non-sensitive attributes and a sensitive attribute while machine learning service provider (MLSP) can get non-sensitive attributes and an encrypted sensitive attribute. As a result, data owner can obtain the encrypted model parameters without exposing their sensitive information to MLSP. In the inference phase, both non-sensitive attributes and a sensitive attribute are encrypted, and all computations should be conducted on encrypted domain. Through the experiments on real data, we identify that our proposed method enables to implement privacy-preserving sensitive LSSVM with FHE that has comparable performance with the original LSSVM algorithm. In addition, we demonstrate that the efficient sensitive LSSVM with FHE significantly improves the computational cost with a small degradation of performance.

Source-Location Privacy in Wireless Sensor Networks (무선 센서 네트워크에서의 소스 위치 프라이버시)

  • Lee, Song-Woo;Park, Young-Hoon;Son, Ju-Hyung;Kang, Yu;Choe, Jin-Gi;Moon, Ho-Gun;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.125-137
    • /
    • 2007
  • This paper proposes a new scheme to provide the location privacy of sources in Wireless Sensor Networks (WSNs). Because the geographical location of a source sensor reveals contextual information on an 'event' in WSN, anonymizing the source location is an important issue. Despite abundant research efforts, however, about data confidentiality and authentication in WSN, privacy issues have not been researched well so far. Moreover, many schemes providing the anonymity of communication parties in Internet and Ad-hoc networks are not appropriate for WSN environments where sensors are very resource limited and messages are forwarded in a hop-by-hop manner through wireless channel. In this paper, we first categorize the type of eavesdroppers for WSN as Global Eavesdropper and Compromising Eavesdropper. Then we propose a novel scheme which provides the anonymity of a source according to the types of eavesdroppers. Furthermore, we analyze the degree of anonymity of WSN using the entropy-based modeling method. As a result, we show that the proposed scheme improves the degree of anonymity compared to a method without any provision of anonymity and also show that the transmission range plays a key role to hide the location of source sensors.

A Study of Key Pre-distribution Scheme in Hierarchical Sensor Networks (계층적 클러스터 센서 네트워크의 키 사전 분배 기법에 대한 연구)

  • Choi, Dong-Min;Shin, Jian;Chung, Il-Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.43-56
    • /
    • 2012
  • Wireless sensor networks consist of numerous small-sized nodes equipped with limited computing power and storage as well as energy-limited disposable batteries. In this networks, nodes are deployed in a large given area and communicate with each other in short distances via wireless links. For energy efficient networks, dynamic clustering protocol is an effective technique to achieve prolonged network lifetime, scalability, and load balancing which are known as important requirements. this technique has a characteristic that sensing data which gathered by many nodes are aggregated by cluster head node. In the case of cluster head node is exposed by attacker, there is no guarantee of safe and stable network. Therefore, for secure communications in such a sensor network, it is important to be able to encrypt the messages transmitted by sensor nodes. Especially, cluster based sensor networks that are designed for energy efficient, strongly recommended suitable key management and authentication methods to guarantee optimal stability. To achieve secured network, we propose a key management scheme which is appropriate for hierarchical sensor networks. Proposed scheme is based on polynomial key pool pre-distribution scheme, and sustain a stable network through key authentication process.

SPH-Based Wave Tank Simulations (SPH 기법 기반의 파동수조 시뮬레이션)

  • Lee, Sangmin;Kim, Mujong;Ko, Kwonhwan;Hong, Jung-Wuk
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.34 no.1
    • /
    • pp.59-69
    • /
    • 2021
  • Recently, large-scale offshore and coastal structures have been constructed owing to the increasing interest in eco-friendly energy development. To achieve this, precise simulations of waves are necessary to ensure the safe operations of marine structures. Several experiments are required in the field to understand the offshore wave; however, in terms of scale, it is difficult to control variables, and the cost is significant. In this study, numerical waves under various wave conditions are produced using a piston-type wavemaker, and the produced wave profiles are verified by comparing with the results from a numerical wave tank (NWT) modeled using the smoothed particle hydrodynamics (SPH) method and theoretical equations. To minimize the effect by the reflected wave, a mass-weighted damping zone is set at the right end of the NWT, and therefore, stable and uniform waves are simulated. The waves are generated using the linear and Stokes wave theories, and it is observed that the numerical wave profiles calculated by the Stokes wave theory yield high accuracy. When the relative depth is smaller than two, the results show good agreement irrespective of the wave steepness. However, when the relative depth and wave steepness are larger than 2 and 0.04, respectively, the errors are negligible if the measurement position is close to the excitation plate. However, the error is 10% or larger if the measurement position is away from the excitation location. Applicable target wave ranges are confirmed through various case studies.

Development trends of Solar cell technologies for Small satellite (소형위성용 태양전지 개발 동향 및 발전 방향)

  • Choi, Jun Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.310-316
    • /
    • 2021
  • Conventional satellites are generally large satellites that are multi-functional and have high performance. However, small satellites have been gradually drawing attention since the recent development of lightweight and integrated electric, electronic, and optical technologies. As the size and weight of a satellite decrease, the barrier to satellite development is becoming lower due to the cost of manufacture and cheaper launch. However, solar panels are essential for the power supply of satellites but have limitations in miniaturization and weight reduction because they require a large surface area to be efficiently exposed to sunlight. Space solar cells must be manufactured in consideration of various space environments such as spacecraft and environments with solar thermal temperatures. It is necessary to study structural materials for lightweight and high-efficiency solar cells by applying an unfolding mechanism that optimizes the surface-to-volume ratio. Currently, most products are developed and operated as solar cell panels for space applications with a triple-junction structure of InGaP/GaAs/Ge materials for high efficiency. Furthermore, multi-layered junctions have been studied for ultra-high-efficiency solar cells. Flexible thin-film solar cells and organic-inorganic hybrid solar cells are advantageous for material weight reduction and are attracting attention as next-generation solar cells for small satellites.

Investigation of Various Pesticide Residues in Commercial Bee Pollen Products Sold in South Korea (한국에서 유통되는 화분식품의 잔류농약 함량 분석)

  • Byeong-Tae Kim;Jae-Gwan Kim;Mi-Hui Son;Young-Sun Cho;Na-Eun Han;Jong-Cheol Choi;Seong-Nam Lee;Myoung-Ki Park;Yong-Bae Park
    • Journal of Food Hygiene and Safety
    • /
    • v.38 no.4
    • /
    • pp.202-210
    • /
    • 2023
  • To analyze the pesticide residues in commercial bee pollen products in South Korea, 61 samples were collected and screened for 339 pesticides. Results revealed that approximately 34% (>LOQ) of samples were contaminated with at least one pesticide. The pesticide residue detection rates of domestic and imported samples were 31% and 44%, respectively. Furthermore, the pesticide residue detection rate of online distribution (60%) was higher than that of offline distribution (27%). Fifteen pesticides were discovered in bee pollen, and pendimethalin, chlorfenvinphos, chlorpyrifos, and fluazinam were detected in 7, 6, 3, and 2 order of frequency, respectively. Even though its concentration was low, chlorfenvinphos which is banned in food crops in the United States, European Union, and Korea, was detected in bee pollen samples commonly. Therefore, continuous investigation of pesticide residues in bee pollen products and their acceptance criteria is required for safety.

Dynamic Threshold Determination Method for Energy Efficient SEF using Fuzzy Logic in Wireless Sensor Networks (무선 센서 네트워크에서 통계적 여과 기법의 에너지 효율 향상을 위한 퍼지논리를 적용한 동적 경계값 결정 기법)

  • Choi, Hyeon-Myeong;Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.53-61
    • /
    • 2010
  • In wireless sensor networks(WSNs) individual sensor nodes are subject to security compromises. An adversary can physically capture sensor nodes and obtain the security information. And the adversary injects false reports into the network using compromised nodes. If undetected, these false reports are forwarded to the base station. False reports injection attacks can not only result in false alarms but also depletion of the limited amount of energy in battery powered sensor nodes. To combat these false reports injection attacks, several filtering schemes have been proposed. The statistical en-routing filtering(SEF) scheme can detect and drop false reports during the forwarding process. In SEF, The number of the message authentication codes(threshold) is important for detecting false reports and saving energy. In this paper, we propose a dynamic threshold determination method for energy efficient SEF using fuzzy-logic in wireless sensor networks. The proposed method consider false reports rate and the number of compromised partitions. If low rate of false reports in the networks, the threshold should low. If high rate of false reports in networks, the threshold should high. We evaluated the proposed method’s performance via simulation.

Effects of Self-Administered Interview on Correct Recall and Memory Protection in the Situation of Delay and Misinformation (시간 지연과 오정보 제시 상황에서 초기 자기기입식 면담(SAI)이 정확 회상과 기억 보호에 미치는 영향)

  • Ham, Keunsoo;Kim, Yeaseul;Kim, Kipyung;Jeong, Hojin
    • Korean Journal of Forensic Psychology
    • /
    • v.11 no.1
    • /
    • pp.1-20
    • /
    • 2020
  • Witnesses will be exposed to a variety of misinformation after the witnessing of the event and state at the scene of the investigation after the delay period. This study was conducted to promote correct recall reporting without being affected by factors that against correct recall. Self-Administered Interview(SAI) is known to obtain eyewitness accounts quickly and accurately. Therefore, we performed a SAI to see if it reported more information than the control group that did not perform the SAI. Also, it also performed that correct information was maintained without being affected by misinformation and delay. Eighty-eight participants were asked to perform SAI or game after showing a video of mock crime. Misinformation was presented in the first or second session to see if it affected recall. An analysis of responses from the final test conducted in the second session by participants showed that groups that conducted SAI after a four-week delay reported more correct information than control groups, while there was no difference between incorrect- and confabulation information. In particular, the timing of presenting misinformation did not affect the amount of recall. This suggests that conducting the SAI immediately after witnessing the event protects correct information even after four weeks. Finally, the significance and limitations of this study, and subsequent studies were discussed.

  • PDF

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.