• Title/Summary/Keyword: 보안신뢰

Search Result 1,279, Processing Time 0.038 seconds

End to End Model and Delay Performance for V2X in 5G (5G에서 V2X를 위한 End to End 모델 및 지연 성능 평가)

  • Bae, Kyoung Yul;Lee, Hong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.107-118
    • /
    • 2016
  • The advent of 5G mobile communications, which is expected in 2020, will provide many services such as Internet of Things (IoT) and vehicle-to-infra/vehicle/nomadic (V2X) communication. There are many requirements to realizing these services: reduced latency, high data rate and reliability, and real-time service. In particular, a high level of reliability and delay sensitivity with an increased data rate are very important for M2M, IoT, and Factory 4.0. Around the world, 5G standardization organizations have considered these services and grouped them to finally derive the technical requirements and service scenarios. The first scenario is broadcast services that use a high data rate for multiple cases of sporting events or emergencies. The second scenario is as support for e-Health, car reliability, etc.; the third scenario is related to VR games with delay sensitivity and real-time techniques. Recently, these groups have been forming agreements on the requirements for such scenarios and the target level. Various techniques are being studied to satisfy such requirements and are being discussed in the context of software-defined networking (SDN) as the next-generation network architecture. SDN is being used to standardize ONF and basically refers to a structure that separates signals for the control plane from the packets for the data plane. One of the best examples for low latency and high reliability is an intelligent traffic system (ITS) using V2X. Because a car passes a small cell of the 5G network very rapidly, the messages to be delivered in the event of an emergency have to be transported in a very short time. This is a typical example requiring high delay sensitivity. 5G has to support a high reliability and delay sensitivity requirements for V2X in the field of traffic control. For these reasons, V2X is a major application of critical delay. V2X (vehicle-to-infra/vehicle/nomadic) represents all types of communication methods applicable to road and vehicles. It refers to a connected or networked vehicle. V2X can be divided into three kinds of communications. First is the communication between a vehicle and infrastructure (vehicle-to-infrastructure; V2I). Second is the communication between a vehicle and another vehicle (vehicle-to-vehicle; V2V). Third is the communication between a vehicle and mobile equipment (vehicle-to-nomadic devices; V2N). This will be added in the future in various fields. Because the SDN structure is under consideration as the next-generation network architecture, the SDN architecture is significant. However, the centralized architecture of SDN can be considered as an unfavorable structure for delay-sensitive services because a centralized architecture is needed to communicate with many nodes and provide processing power. Therefore, in the case of emergency V2X communications, delay-related control functions require a tree supporting structure. For such a scenario, the architecture of the network processing the vehicle information is a major variable affecting delay. Because it is difficult to meet the desired level of delay sensitivity with a typical fully centralized SDN structure, research on the optimal size of an SDN for processing information is needed. This study examined the SDN architecture considering the V2X emergency delay requirements of a 5G network in the worst-case scenario and performed a system-level simulation on the speed of the car, radius, and cell tier to derive a range of cells for information transfer in SDN network. In the simulation, because 5G provides a sufficiently high data rate, the information for neighboring vehicle support to the car was assumed to be without errors. Furthermore, the 5G small cell was assumed to have a cell radius of 50-100 m, and the maximum speed of the vehicle was considered to be 30-200 km/h in order to examine the network architecture to minimize the delay.

The Knowledge, Attitude, and Utilization Experience of Community Health Practitioners on Complementary Therapies (보완요법에 대한 보건진료원의 지식, 태도와 활용 경험)

  • Hwang, Sung-Ho;Park, Jae-Yong;Han, Chang-Hyun
    • Journal of agricultural medicine and community health
    • /
    • v.27 no.2
    • /
    • pp.87-105
    • /
    • 2002
  • In order to find out the knowledge, attitude, and experience of community health practitioners(CHP) on complementary therapy, 393 community health practitioners who provide primary health care service in Busan, Kyeongnam, and Daegu, Gyeongbuk regions were interviewed or surveyed by mail from February 1st to March 31st, 2002. In terms of interest of CHPs toward 11 different hinds of complementary therapy, the rate of interest for soojichim was the highest with 75.3%. Aroma therapy had the interest of 71.0% of the CHPs, oriental medicine had 67.4%, and massage had 67.4%. The interest for shiatsu was 64.6%, while homeopath had the lowest rate of interest of 18.1%. In terms of reliance on the treatment results, oriental medicine scored the highest with 92.6%, and soojichim, massage, and shiatsu followed with 85.5%, 83.7%, and 81.7% respectively. Homeopath had the lowest reliance of 18.1%. The 65.1% of the CHPs had the experience of recommending oriental medicine to patients. 50.4% indicated that they had recommended soojichim, and 44.8% had recommended massage before. Shiatsu and aromatherapy followed with 34.4% and Homeopath had the lowest rate of 2.80%. When CHPs were asked if they had received any training in complementary therapy, 33.1% indicated that they had studied soojichim and 13.2%stated that they had learned oriental medicine. Aromatherapy, massage, and shiatsu followed with 11.2%, 8.4%, and 5.6% respectively On the other hand, none of the CHPs had received training in homeopath. In terms of using complementary therapy during the past 5 years, 23.9% had been treated with oriental medicine, and 18.896 had received soojichim. 5.9% had received aromatherapy, 5.3% had used massage, and 5.1% had experience with shiatsu. None of the practitioners had used homeopath during the past 5 years. Significantly many number of practitioners indicated that they had excellent treatment results with all hinds of complementary therapy, and there were rare cares of side effects. When they were asked if they wanted complementary therapy to become part of the curriculum during re-training or training for public service personnels, 78100 wanted soojichim, 69.2% wanted oriental medicine, and 67.9% wanted aroma therapy. 63.9% wanted shiatsu to be included, and 63.1% wanted massage. When CHPs were asked if they wanted to use complementary therapy during primary health care, 63.6% wanted to use soojichim, 52.9% wanted massage, and 51.9% wanted to use aroma therapy. Oriental medicine also showed a high rate of 50.1%. On the other hand, only a small percentage wanted to use chiropractic or homeopath with 17.0% and 12,2% respectively. Among the CHPs, there were some who had administered complementary therapy during the past 5 years. 84% had administered soojichim, 4.6% had administered oriental medicine, and 2.5% had administered massage 2.5% of the CHPs answered that they had administered aromatherapy. However, none of them had administered apitherapy or homeopath. Most of patients showed positive responses, and the rate of side effect was very low. As shown in the above results, although CHPs have a high rate of interest, reliance, and experience in recommending complementary therapy, only a low percentage of them had received any training in complementary therapy. In addition, since there were little side effects when they received or administered complementary therapy, they hoped complementary therapy, which can be beneficial to health, to be introduced to the curriculum. Therefore, in order to provide community members with complementary therapy and the correct information regarding the selection of complementary therapy that could be beneficial to health, a policy of continuous interest and support is needed so that CHPs can he provided with a systemic and rational curriculum of complementary therapy.

  • PDF

A Comparative Study on the Effective Deep Learning for Fingerprint Recognition with Scar and Wrinkle (상처와 주름이 있는 지문 판별에 효율적인 심층 학습 비교연구)

  • Kim, JunSeob;Rim, BeanBonyka;Sung, Nak-Jun;Hong, Min
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.17-23
    • /
    • 2020
  • Biometric information indicating measurement items related to human characteristics has attracted great attention as security technology with high reliability since there is no fear of theft or loss. Among these biometric information, fingerprints are mainly used in fields such as identity verification and identification. If there is a problem such as a wound, wrinkle, or moisture that is difficult to authenticate to the fingerprint image when identifying the identity, the fingerprint expert can identify the problem with the fingerprint directly through the preprocessing step, and apply the image processing algorithm appropriate to the problem. Solve the problem. In this case, by implementing artificial intelligence software that distinguishes fingerprint images with cuts and wrinkles on the fingerprint, it is easy to check whether there are cuts or wrinkles, and by selecting an appropriate algorithm, the fingerprint image can be easily improved. In this study, we developed a total of 17,080 fingerprint databases by acquiring all finger prints of 1,010 students from the Royal University of Cambodia, 600 Sokoto open data sets, and 98 Korean students. In order to determine if there are any injuries or wrinkles in the built database, criteria were established, and the data were validated by experts. The training and test datasets consisted of Cambodian data and Sokoto data, and the ratio was set to 8: 2. The data of 98 Korean students were set up as a validation data set. Using the constructed data set, five CNN-based architectures such as Classic CNN, AlexNet, VGG-16, Resnet50, and Yolo v3 were implemented. A study was conducted to find the model that performed best on the readings. Among the five architectures, ResNet50 showed the best performance with 81.51%.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

A Study of Growth Plan and the existing designed Community Businesses in Gangwon-do - Social businesses and town businesses in Gangwon-do - (커뮤니티 비지니스 지정 현황과 발전방안 제언 - 강원도 사회적기업과 마을기업을 중심으로 -)

  • Bae, Jung Nam;Park, Roh Gook;Ji, Kyoung Bae
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.2
    • /
    • pp.75-82
    • /
    • 2013
  • This study was carried out to contribute to the self-help and sustainability of grassroots business in Gangwon-do. To achieve this, after setting up the concept of community business, understanding the current designating status of community business and analyzing the business content and the business promotion system, I tried to analyze the continuing factors of businesses and shops, which are more than hundred years old, in Japan and seek a solution to the sustainability of community business in the province. The community business in the province, which is designated and operated, is like this; 86 preliminary social businesses, 62 town businesses, 38 social businesses. The total comes to 186. The preliminary social businesses and the social businesses are assigned more in urban area and the manufacturing sector and educational field have a lot of business contents. When it comes to the business promotion system, there are many incorporated companies and limited companies. While the town businesses are assigned more in county area, the agricultural food field and cultural world have a lot of business contents. When it comes to the main participant of business, the agricultural corporations took the first place overwhelmingly. Especially, I found out that the main participants of community business consist of 38 voluntary associations, which is 20.4 %, and we need to make up for the specialty deficiency in business management. In order to keep the continuity of community business in the province, we could achieve the results of manpower development through the case analysis research, securing good materials which can give the consumers confidence, increasing the quality of the products, maintaining high technical skills, keeping up the tradition of business and demanding forecasting. I think a successive research efforts will be required for securing good materials and increasing the quality of the products in tandem with the local community. And also we need to establish a supporting & operating system through the liaison between the business & academic world, business & administration, and business & business for securing a management specialty as an industrialist.

  • PDF

A Research on the Regulations and Perception of Interactive Game in Data Broadcasting: Special Emphasis on the TV-Betting Game (데이터방송 인터랙티브 게임 규제 및 이용자 인식에 관한 연구: 승부게임을 중심으로)

  • Byun, Dong-Hyun;Jung, Moon-Ryul;Bae, Hong-Seob
    • Korean journal of communication and information
    • /
    • v.35
    • /
    • pp.250-291
    • /
    • 2006
  • This study examines the regulatory issues and introduction problems of TV-betting data broadcasts in Korea by in-depth interview with a panel group. TV-betting data broadcast services of card games and horse racing games are widely in use in Europe and other parts of the world. In order to carry out the study, a demo program of TV-betting data broadcast in the OCAP(OpenCableTM Application Platform Specification) system environment, which is the data broadcasting standard for digital cable broadcasts in Korea was exposed to the panel group and then they were interviewed after watching and using the program. The results could be summarized as below. First of all, while TV-betting data broadcasts have many elements of entertainment, the respondents thought that it would be difficult to introduce TV-betting in data broadcasts as in overseas countries largely due to social factors. In addition, in order to introduce TV-betting data broadcasts, they suggested that excessive speculativeness must be suppressed through a series of regulatory system devices, such as by guaranteeing credibility of the media based on safe security systems for transactions, scheduling programs with effective time constraints to prevent the games from running too frequently, limiting the betting values, and by prohibiting access to games through set-top boxes of other data broadcast subscribers. The general consensus was that TV-betting could be considered for gradual introduction within the governmental laws and regulations that would minimize its ill effects. Therefore, the government should formulate long-term regulations and policies for data broadcasts. Once the groundwork is laid for safe introduction of TV-betting on data broadcasts within the boundary of laws and regulations, interactive TV games are expected to be introduced in Korea not only for added functionality of entertainment but also for far-ranging development of data broadcast and new media industries.

  • PDF

An Evaluation of the Private Security Industry Regulations in Queensland : A Critique (호주 민간시큐리티 산업의 비판적 고찰 : 퀸즐랜드주를 중심으로)

  • Kim, Dae-Woon;Jung, Yook-Sang
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.7-35
    • /
    • 2015
  • The objective of this article is to inform and document the contemporary development of the private security industry in Queensland Australia, a premier holiday destination that provide entertainment for the larger region. The purpose of this review is to examine the comtemporary development of mandated licensing regimes regulating the industry, and the necessary reform agenda. The overall aim is threefold: first, to chart the main outcomes of the two-wave of reforms since the mid-'90s; second, to examine the effectiveness of changes in modes of regulation; and third, to identify the criteria that can be considered a best practice based on Button(2012) and Prenzler and Sarre's(2014) criteria. The survey of the Queensland regulatory regime has demonstrated that, despite the federal-guided reforms, there remain key areas where further initiatives remain pending, markedly case-by-case utilisation of more proactive strategies such as on-site alcohol/drug testing, psychological evaluations, and checks on close associates; lack of binding training arrangement for technical services providers; and targeted auditing of licensed premises and the vicinity of venues by the Office of Fair Trading, a licensing authority. The study has highlighted the need for more determined responses and active engagements in these priority areas. This study of the development of the licensing regimes in Queensland Australia provides useful insights for other jurisdictions including South Korea on how to better manage licensing system, including the measures required to assure an adequate level of professional competence in the industry. It should be noted that implementing a consistency in delivery mode and assessment in training was the strategic imperative for the Australian authority to intervene in the industry as part of stimulating police-private partnerships. Of particular note, competency elements have conventionally been given a low priority in South Korea, as exemplified through the lack of government-sponsored certificate; this is an area South Korean policymakers must assume an active role in implementing accredited scheme, via consulting transnational templates, including Australian qualifications framework.

  • PDF

A Study on the Improvement of User Value through the Analysis of the Status of Smart Home Service in Korea Based on the Internet of Things (사물인터넷 기반 국내 스마트 홈서비스 현황 및 사용 후기 분석을 통한 사용자 가치 제고방안에 관한 연구)

  • Yoon, Seong-Jeong;Kim, Min-Yong
    • Management & Information Systems Review
    • /
    • v.36 no.5
    • /
    • pp.45-60
    • /
    • 2017
  • This study aims to elucidate the key improvements through the current state of customer support for smart home services based on the Internet of things and the evaluation of user's usage. Smart home services typically provide a wide range of value in terms of security, safety, manageability (electricity and water use), convenience, and remote management accessibility. In this study, we analyzed the current state of smart home service based on Internet of Samsung, SKT and LG U + companies in Korea. However, since LG U+ is the only company providing user reviews, there is a limit to generalization, but we are trying to figure out whether the customer value is conveyed properly or not, and in which part the customer support is focused to support the service. As a result of analyzing the results of the study, we found that the smart home service is commercialized and marketed in various forms. However, it is questionable whether the technological level and user satisfaction level are sufficiently satisfied. The results of this study are as follows. First, although each company provides usage guidance, they still ask many questions about joining products and using products. Second, there are many defects in the product itself, and it is found that the companies are not satisfied with the overall response. Third, the three companies are focusing on switches, outlets, sensors, and lamps. This is an individual intelligent product rather than an interlocking or linking level, and it can be seen that there are many parts that are not compatible with the concept of the original Internet of things. In conclusion, this study shows that there are still many areas to improve on the level of customer service provision of smart home service, in particular, the ease of use is low and the quality of products is not reliable. We would like to present the improvement of this in detail through this study and reflect the companies that provide it and the service providers.

A qualitative Research on Establishment of Department of Private Investigation and Its Future Direction (민간조사학과 개설의 필요성과 성장방향에 대한 질적 연구)

  • Jo, Sung-Gu;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.28
    • /
    • pp.181-205
    • /
    • 2011
  • There are various discussions about introducing private investigation in South Korea these days, and training private investigators is one of the main topics. Training private investigators, unlike other training, is required to instill expertise and ethical quality into the trainees since the major task of the investigators includes protecting the lives of the citizens as well as their properties. Therefore, many agree to the idea that systematic educational programs need to be organized to produce private investigators with expertness and morality. In this study, we explored the opinions of those who are concerned with this issue of establishing private investigation in the university education and analyzed the data by using the NVivo 2 program. The result revealed that the reasons that people supported the idea of launching private investigator services were as follows. First, there is lack of manpower to maintain peace and public order in the country. Second, the police does not intervene actively and help harmed victims unless it is a consequential incident. Third, in position to wield public power, police officers cannot get involved in civil affairs. Also, absence of an academic institution to educate private investigators and lack of the police and clients' trust in private investigation were the two biggest reasons that people approved the proposal to introduce department of private investigation in universities. The interviewees of the study believed the outlook and future direction for private investigation would change depending on the status of the licensed private investigation business bill. Before the bill passes, they thought that the work of private investigators will be performed by insurance companies, foreign private investigation businesses, domestic consulting firms, and security providers which supply similar services. On the other hand, after the bill passes, they believed that numerous private investigator corporations resembling existing security corporations will be founded in addition to the current market, and that private investigation in the academic field will also be vitalized.

  • PDF