• Title/Summary/Keyword: CNS Design

Search Result 75, Processing Time 0.019 seconds

Design of Invisible Watermarking for Biometric Image of Electronic ID Card (전자신분증용 바이오 영상을 위한 비인지 워터마킹 설계)

  • Shin, Yong-Nyuo;Lee, Yong-Jun;Kim, Won-Gyum
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1555-1565
    • /
    • 2008
  • Biometric information such as face and fingerprint information is highlighted in many security areas, including authentication, due to its uniqueness and convenience factors. However, if exploited maliciously, it can cause more serious damage than traditional security measures, like passwords. This paper reviews the watermarking method that is able to verify the integrity of this biometric information. The watermark to be inserted is the date of the biometric information acquisition. It is combined with 16-bit Cyclic Redundancy Checks prior to insertion. In particular, face and fingerprint images are saved in a specific compressed format. The proposed watermarking algorithm will be designed in such a way as to remain resilient against compression. The watermark inserted at the acquisition stage will be extracted at each storage and deployment stage, so that the integrity of the biometric information can be verified.

  • PDF

Design and development of the clustering algorithm considering weight in spatial data mining (공간 데이터 마이닝에서 가중치를 고려한 클러스터링 알고리즘의 설계와 구현)

  • 김호숙;임현숙;용환승
    • Journal of Intelligence and Information Systems
    • /
    • v.8 no.2
    • /
    • pp.177-187
    • /
    • 2002
  • Spatial data mining is a process to discover interesting relationships and characteristics those exist implicitly in a spatial database. Many spatial clustering algorithms have been developed. But, there are few approaches that focus simultaneously on clustering spatial data and assigning weight to non-spatial attributes of objects. In this paper, we propose a new spatial clustering algorithm, called DBSCAN-W, which is an extension of the existing density-based clustering algorithm DBSCAN. DBSCAN algorithm considers only the location of objects for clustering objects, whereas DBSCAN-W considers not only the location of each object but also its non-spatial attributes relevant to a given application. In DBSCAN-W, each datum has a region represented as a circle of various radius, where the radius means the degree of the importance of the object in the application. We showed that DBSCAN-W is effective in generating clusters reflecting the users requirements through experiments.

  • PDF

Juvenile Cyber Deviance Factors and Predictive Model Development Using a Mixed Method Approach (사이버비행 요인 파악 및 예측모델 개발: 혼합방법론 접근)

  • Shon, Sae Ah;Shin, Woo Sik;Kim, Hee Woong
    • The Journal of Information Systems
    • /
    • v.30 no.2
    • /
    • pp.29-56
    • /
    • 2021
  • Purpose Cyber deviance of adolescents has become a serious social problem. With a widespread use of smartphones, incidents of cyber deviance have increased in Korea and both quantitative and qualitative damages such as suicide and depression are increasing. Research has been conducted to understand diverse factors that explain adolescents' delinquency in cyber space. However, most previous studies have focused on a single theory or perspective. Therefore, this study aims to comprehensively analyze motivations of juvenile cyber deviance and to develop a predictive model for delinquent adolescents by integrating four different theories on cyber deviance. Design/methodology/approach By using data from Korean Children & Youth Panel Survey 2010, this study extracts 27 potential factors for cyber deivance based on four background theories including general strain, social learning, social bonding, and routine activity theories. Then this study employs econometric analysis to empirically assess the impact of potential factors and utilizes a machine learning approach to predict the likelihood of cyber deviance by adolescents. Findings This study found that general strain factors as well as social learning factors have positive effects on cyber deviance. Routine activity-related factors such as real-life delinquent behaviors and online activities also positively influence the likelihood of cyber diviance. On the other hand, social bonding factors such as community commitment and attachment to community lessen the likelihood of cyber deviance while social factors related to school activities are found to have positive impacts on cyber deviance. This study also found a predictive model using a deep learning algorithm indicates the highest prediction performance. This study contributes to the prevention of cyber deviance of teenagers in practice by understanding motivations for adolescents' delinquency and predicting potential cyber deviants.

K Public Corporation's IT Organization Redesign Case (K공사의 IT 조직 재설계 사례)

  • Cho, Dong-Hwan;Cha, Kyoung-Hwan;Shim, Hyoung-Seop
    • Information Systems Review
    • /
    • v.13 no.3
    • /
    • pp.165-183
    • /
    • 2011
  • IT organizations have been consistently required to change in order to cope with business and technological changes. However, the practical methodologies or guidelines about IT organization redesign are deficient. This research investigates IT organization's redesign methods and procedures focused on K public corporation which fundamentally redesigned IT organization recently. In K public corporation, to-be model of IT organization was designed with job analysis for IT organization redesign, task redesign was performed, and IT organization and personnel was assessed. 1) In task analysis, core activities are identified and 96 standard tasks are drawn. 2) with to-be organization design, IT support, IT delivery, IT operation teams and BuKyoung and Jeju teams were divided. 3) Previous job organization was restructured, IT organization personnel were finally confirmed through FTE and internal review. K public corporation strengthened IT planning task instead of reducing operational IT task, improved IT management process which was lower than other companies, and improved IT outsourcing management system and IT users' satisfactions. This research has practical implications for many companies which struggle with IT organization redesign method and process.

Design and Implementation of Centralized TIS-B Server for Broadcasting Air Traffic Situation (항공 교통 상황 방송 서비스를 위한 중앙 집중형 TIS-B 서버 설계 및 구현)

  • Song, Inseong;Jang, Eunmee;Choi, Sangbang
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.2
    • /
    • pp.27-39
    • /
    • 2015
  • As a radar based air surveillance hits the limit along with the growing air traffic needs, a new air surveillance technology called ADS-B has emerged. ADS-B provides more accurate position information with a shorter interval, and aircraft equipped with ADS-B transponders can check each other's location. However not all aircraft are equipped with ADS-B transponders, and aircraft with different ADS-B data links cannot check each other's location. To address these problems a TIS-B service, which broadcasts information that a radar is tracking, and an ADS-R service, which cross-broadcasts information of different ADS-B data links, have been emerged. In this paper, we design and implement a centralized TIS-B server for broadcasting air traffic situation which is capable of providing a TIS-B service and an ADS-R service at the same time. The implemented TIS-B server has been verified with a configured ADS-B ground system, by receiving ADS-B surveillance data and radar surveillance data followed by generating surveillance data for providing a TIS-B service and an ADS-R service and simulating broadcast of those generated surveillance data.