• Title/Summary/Keyword: Access Code

Search Result 1,014, Processing Time 0.034 seconds

Network separation construction method using network virtualization (네트워크 가상화를 이용한 망 분리 구축 방법)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1071-1076
    • /
    • 2020
  • The importance of network separation is due to the use of the Internet with existing business PCs, resulting in an internal information leakage event, and an environment configured to allow servers to access the Internet, which causes service failures with malicious code. In order to overcome this problem, it is necessary to use network virtualization to separate networks and network interconnection systems. Therefore, in this study, the construction area was constructed into the network area for the Internet and the server farm area for the virtualization system, and then classified and constructed into the security system area and the data link system area between networks. In order to prove the excellence of the proposed method, a network separation construction study using network virtualization was conducted based on the basis of VM Density's conservative estimates of program loads and LOBs.

Development of a Python-based Algorithm for Image Analysis of Outer-ring Galaxies (외부고리 은하 영상 분석을 위한 파이썬 기반 알고리즘 개발)

  • Jo, Hoon;Sohn, Jungjoo
    • Journal of the Korean earth science society
    • /
    • v.43 no.5
    • /
    • pp.579-590
    • /
    • 2022
  • In this study, we aimed to develop a Python-based outer-ring galaxy analysis algorithm according to the data science process. We assumed that the potential users are citizen scientists, including students and teachers. In the actual classification studies using real data of galaxies, a specialized software called IRAF is used, thereby limiting the general public's access to the software. Therefore, an image analysis algorithm was developed for the outer-ring galaxies as targets, which were compared with those of the previous research. The results of this study were compared with those of studies conducted using IRAF to verify the performance of the newly developed image analysis algorithm. Among the 69 outer-ring galaxies in the first test, 50 cases (72.5%) showed high agreement with the previous research. The remaining 19 cases (27.5%) showed differences that were caused by the presence of bright stars overlapped in the line of sight or weak brightness in the inner galaxy. To increase the usability of the finished product that has undergone a supplementary process, all used data, algorithms, Python code files, and user manuals were loaded in GitHub and made available as shared educational materials.

Unauthorized person tracking system in video using CNN-LSTM based location positioning

  • Park, Chan;Kim, Hyungju;Moon, Nammee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.77-84
    • /
    • 2021
  • In this paper, we propose a system that uses image data and beacon data to classify authorized and unauthorized perosn who are allowed to enter a group facility. The image data collected through the IP camera uses YOLOv4 to extract a person object, and collects beacon signal data (UUID, RSSI) through an application to compose a fingerprinting-based radio map. Beacon extracts user location data after CNN-LSTM-based learning in order to improve location accuracy by supplementing signal instability. As a result of this paper, it showed an accuracy of 93.47%. In the future, it can be expected to fusion with the access authentication process such as QR code that has been used due to the COVID-19, track people who haven't through the authentication process.

A Field Perception and Agenda of Intellectual Freedom and Censorship Issues in Library (지적자유와 도서관 장서검열 문제의 현장 인식과 과제)

  • Bae, Kyungjae
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.2
    • /
    • pp.277-294
    • /
    • 2022
  • This study was conducted to find a task to adjust the conflict situation by categorizing and analyzing the recent cases of library book censorship and analyzing the field perception on the subject of library book censorship. Therefore, recent cases of book censorship were categorized into four categories: political, legal, sexuality, and sex crime. As a result of the study, 44.5% of the respondents who answered that the restriction on access to books related to sex crimes was not a library censorship or that it was difficult to judge. It showed the perception that this issue is not an issue that can be easily decided by book censorship. Meanwhile, as a result of a survey of librarians, there was an opinion that there was a need for restrictions on collecting or reading at the library site for various reasons, and eventually showed a gap from the code of ethics for librarians against all censorship, showing the need to make efforts to reconcile such conflicts in the future.

Design and Development of Management System Standard Software for Aids to Navigation Based on S-201 (S-201 기반 항로표지 관리운영시스템 표준 SW 설계 및 개발)

  • Yeo, Ji-Min;Chae, Jeong-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1927-1934
    • /
    • 2021
  • The AtoN are installed and operated on the sea in order to help the safe navigation of ships. With the development of maritime ICT, to monitor and control the condition of AtoN from land using multiplex communication network such as AtoN AIS, CDMA, and LTE. Currently, The information of AtoN is difficult to integrated manage because AtoN management systems has been independently developed and operatie according to the operating conditions of the Regional Office of Oceans and Fisheries. In addition, in preparation for the introduction for e-navigation and MASS, systematic and unified information of AtoN is required. In this paper, we study to design and develop standard software for AtoN management system based on the international standard for navigation information(S-201). Through this study, it will be possible to provide continuous AtoN information and effective AtoN management.

Development of Creative Problem-Solving Activities for Integrating Mathematics and Information Science: Focusing on the Hat Game for Mathematically Gifted Students (수학 정보과학 융합을 위한 창의적 문제해결 활동 개발: 영재 학생을 대상으로 한 모자 게임을 중심으로)

  • Seo, Jiyoung;Youn, Sang-Gyun
    • Communications of Mathematical Education
    • /
    • v.36 no.3
    • /
    • pp.439-467
    • /
    • 2022
  • The future society requires not only knowledge but also various competencies, including creativity, cooperative spirit and integrated thinking. This research develops a program for integrating mathematics and information science to enhance important mathematical competencies such as problem-solving and communication. This program does not require much prior knowledge, can be motivated using everyday language and easy-to-access tools, and is based on creative problem-solving activities with multilateral cooperation. The usefulness and rigor of mathematics are emphasized as the number of participants increases in the activities, and theoretical principles stem from the matrix theory over finite fields. Moreover, the activity highlights a connection with error-correcting codes, an important topic in information science. We expect that the real-world contexts of this program contribute to enhancing mathematical communication competence and providing an opportunity to experience the values of mathematics and that this program to be accessible to teachers since coding is not included.

Intelligent Character Recognition System for Account Payable by using SVM and RBF Kernel

  • Farooq, Muhammad Umer;Kazi, Abdul Karim;Latif, Mustafa;Alauddin, Shoaib;Kisa-e-Zehra, Kisa-e-Zehra;Baig, Mirza Adnan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.213-221
    • /
    • 2022
  • Intelligent Character Recognition System for Account Payable (ICRS AP) Automation represents the process of capturing text from scanned invoices and extracting the key fields from invoices and storing the captured fields into properly structured document format. ICRS plays a very critical role in invoice data streamlining, we are interested in data like Vendor Name, Purchase Order Number, Due Date, Total Amount, Payee Name, etc. As companies attempt to cut costs and upgrade their processes, accounts payable (A/P) is an example of a paper-intensive procedure. Invoice processing is a possible candidate for digitization. Most of the companies dealing with an enormous number of invoices, these manual invoice matching procedures start to show their limitations. Receiving a paper invoice and matching it to a purchase order (PO) and general ledger (GL) code can be difficult for businesses. Lack of automation leads to more serious company issues such as accruals for financial close, excessive labor costs, and a lack of insight into corporate expenditures. The proposed system offers tighter control on their invoice processing to make a better and more appropriate decision. AP automation solutions provide tighter controls, quicker clearances, smart payments, and real-time access to transactional data, allowing financial managers to make better and wiser decisions for the bottom line of their organizations. An Intelligent Character Recognition System for AP Automation is a process of extricating fields like Vendor Name, Purchase Order Number, Due Date, Total Amount, Payee Name, etc. based on their x-axis and y-axis position coordinates.

Vulnerability analysis for AppLock Application (AppLock 정보 은닉 앱에 대한 취약점 분석)

  • Hong, Pyo-gil;Kim, Dohyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.845-853
    • /
    • 2022
  • As the memory capacity of smartphone increases, the type and amount of privacy stored in the smartphone is also increasing. but recently there is an increasing possibility that various personal information such as photos and videos of smartphones may be leaked due to malicious apps by malicious attackers or other people such as repair technicians. This paper analyzed and studied the security and vulnerability of these vault apps by analyzing the cryptography algorithm and data protection function. We analyzed 5.3.7(June 13, 2022) and 3.3.2(December 30, 2020) versions of AppLock, the most downloaded information-hidding apps registered with Google Play, and found various vulnerabilities. In the case of access control, there was a vulnerability in that values for encrypting patterns entered by users were hardcoded into plain text in the source code, and encrypted pattern values were stored in xml files. In addition, in the case of the vault function, there was a vulnerability in that the files and log files for storing in the vault were not encrypted.

Development of JPEG2000 Viewer for Mobile Image System (이동형 의료영상 장치를 위한 JPEG2000 영상 뷰어 개발)

  • 김새롬;정해조;강원석;이재훈;이상호;신성범;유선국;김희중
    • Progress in Medical Physics
    • /
    • v.14 no.2
    • /
    • pp.124-130
    • /
    • 2003
  • Currently, as a consequence of PACS (Picture Archiving Communication System) implementation many hospitals are replacing conventional film-type interpretations of diagnostic medical images with new digital-format interpretations that can also be saved, and retrieve However, the big limitation in PACS is considered to be the lack of mobility. The purpose of this study is to determine the optimal communication packet size. This was done by considering the terms occurred in the wireless communication. After encoding medical image using JPGE2000 image compression method, This method embodied auto-error correction technique preventing the loss of packets occurred during wireless communication. A PC class server, with capabilities to load, collect data, save images, and connect with other network, was installed. Image data were compressed using JPEG2000 algorithm which supports the capability of high energy density and compression ratio, to communicate through a wireless network. Image data were also transmitted in block units coeded by JPEG2000 to prevent the loss of the packets in a wireless network. When JPGE2000 image data were decoded in a PUA (Personal Digital Assistant), it was instantaneous for a MR (Magnetic Resonance) head image of 256${\times}$256 pixels, while it took approximately 5 seconds to decode a CR (Computed Radiography) chest image of 800${\times}$790 pixels. In the transmission of the image data using a CDMA 1X module (Code-Division Multiple Access 1st Generation), 256 byte/sec was considered a stable transmission rate, but packets were lost in the intervals at the transmission rate of 1Kbyte/sec. However, even with a transmission rate above 1 Kbyte/sec, packets were not lost in wireless LAN. Current PACS are not compatible with wireless networks. because it does not have an interface between wired and wireless. Thus, the mobile JPEG2000 image viewing system was developed in order to complement mobility-a limitation in PACS. Moreover, the weak-connections of the wireless network was enhanced by re-transmitting image data within a limitations The results of this study are expected to play an interface role between the current wired-networks PACS and the mobile devices.

  • PDF

Study on CGM-LMS Hybrid Based Adaptive Beam Forming Algorithm for CDMA Uplink Channel (CDMA 상향채널용 CGM-LMS 접목 적응빔형성 알고리듬에 관한 연구)

  • Hong, Young-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9C
    • /
    • pp.895-904
    • /
    • 2007
  • This paper proposes a robust sub-optimal smart antenna in Code Division Multiple Access (CDMA) basestation. It makes use of the property of the Least Mean Square (LMS) algorithm and the Conjugate Gradient Method (CGM) algorithm for beamforming processes. The weight update takes place at symbol level which follows the PN correlators of receiver module under the assumption that the post correlation desired signal power is far larger than the power of each of the interfering signals. The proposed algorithm is simple and has as low computational load as five times of the number of antenna elements(O(5N)) as a whole per each snapshot. The output Signal to Interference plus Noise Ratio (SINR) of the proposed smart antenna system when the weight vector reaches the steady state has been examined. It has been observed in computer simulations that proposed beamforming algorithm improves the SINR significantly compared to the single antenna case. The convergence property of the weight vector has also been investigated to show that the proposed hybrid algorithm performs better than CGM and LMS during the initial stage of the weight update iteration. The Bit Error Rate (BER) characteristics of the proposed array has also been shown as the processor input Signal to Noise Ratio (SNR) varies.