• Title/Summary/Keyword: Establishment devices

Search Result 181, Processing Time 0.025 seconds

An Establishment of Super Wi-Fi Environment in Ships Based on UHF System of TMS

  • Kim, Jungwoo;Son, Jooyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2103-2123
    • /
    • 2018
  • Ships built today are larger in scale and feature more complex structures. The ever-evolving systems used on board a ship require vast amounts of data processing. In the future, with the advent of smart ships, unmanned ships and other next-generation ships, the volumes of data to be processed will continue to increase. Yet, to date, ship data has been processed using wired networks. Placed at fixed locations, the nodes on wired networks often fail to process data from mobile devices. Despite many attempts made to use Wi-Fi on ships just as on land to create wireless networks, Wi-Fi has hardly been available due to the complex metal structures of ships. Therefore, Wi-Fi on ships has been patchy as the ship-wide total Wi-Fi coverage has not properly implemented. A new ship-wide wireless network environment is part of the technology conducive to the shipbuilding industry. The wireless network environment should not only serve the purpose of communication but also be able to manage and control multiple features in real-time: fault diagnostics, tracking, accident prevention and safety management. To better understand the characteristics of wireless frequencies for ships, this paper tests the widely used TETRA, UHF and Wi-Fi and sheds light on the features, advantages and disadvantages of each technology in ship settings. The proposed deployment of a Super Wi-Fi network leveraging the legacy UHF system of TMS generates a ship-wide wireless network environment. The experimental findings corroborate the feasibility of the proposed ship-wide Super Wi-Fi network environment.

Integrated Data Structure for Quantum Key Management in Quantum Cryptographic Network (양자암호 통신망에서 양자키 관리를 위한 통합 데이터 구조)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.3-7
    • /
    • 2021
  • In quantum cryptographic communication based on quantum mechanics, each piece of information is loaded onto individual photons and transmitted. Therefore, it is impossible to eavesdrop on only a part, and even if an intruder illegally intercepts a photon and retransmits it to the recipient, it is impossible to send the same information to the photon by the principle of quantum duplication impossible. With the explosive increase of various network-based services, the security of the service is required to be guaranteed, and the establishment of a quantum cryptographic communication network and related services are being promoted in various forms. However, apart from the development of Quantum Key Distribution (QKD) technology, a lot of research is needed on how to provide network-level services using this. In this paper, based on the quantum encryption device, we propose an integrated data structure for transferring quantum keys between various quantum encryption communication network devices and realizing an encrypted transmission environment.

Establishment of a public safety network app security system (재난안전망 앱 보안 체계 구축)

  • Baik, Nam-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1375-1380
    • /
    • 2021
  • Korea's security response to application service app is still insufficient due to the initial opening of the public safety network. Therefore, preemptive security measures are essential. In this study, we proposed to establish a 'public safety network app security system' to prevent potential vulnerabilities to the app store that distributes app in public safety network and android operating system that operate app on dedicated terminal devices. In order for an application service app to be listed on the public safety network mobile app store, a dataset of malicious and normal app is first established to extract characteristics and select the most effective AI model to perform static and dynamic analysis. According to the analysis results, 'Safety App Certificate' is certified for non-malicious app to secure reliability for listed apps. Ultimately, it minimizes the security blind spots of public safety network app. In addition, the safety of the network can be secured by supporting public safety application service of certified apps.

A Study on the Status of e-Books Usage in Small University Library: Focusing on the D University Library (소규모 대학도서관의 전자책 이용실태에 관한 연구 - D대학교도서관을 중심으로 -)

  • Kim, Jin Young;Han, Sang Woo
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.2
    • /
    • pp.429-445
    • /
    • 2021
  • The purpose of this study is to analyze the status of e-books usage in small university library and to suggest implications for e-book management policies. To do that, a survey was conducted with students in a local small university, and the valid responses of 259 people were analyzed. As a result of the analysis, the preference of paper books (71%) was higher than that of e-books (12%). However, satisfaction with e-books (45.6%) was higher than that of paper books (27.9%) if they had experience using e-books. In addition, satisfaction was highest when using e-books for general reading, and it was found that the use device preferred to use a tablet. Based on the results of this study, we proposed some suggestions; 1) establishment of e-books service policy and promotion plan, 2) use of e-books dedicated devices and development of user-friendly e-books using environment, 3) providing various topics of e-books, 4) formation of an association for joint use of e-books between small library universities.

In the Digital Big Data Classroom Reality and Application of Smart Education : Learner-Centered Education using Edutech (디지털 빅데이터 교실에서 스마트교육의 실제와 활용 : 에듀테크를 활용한 학습자 중심 교육)

  • Kim, Seong-Hee
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.4
    • /
    • pp.279-286
    • /
    • 2021
  • In this study, we looked at the appearance of Edutech, which is being put into the educational field after Corona 19, with the advent of the 4th industrial revolution. In the era of the 4th industrial revolution, the infrastructure, data, and service of Smart Stick that actively utilized ICT became the main pillars of smart education. In particular, smart education is being implemented through e-learning, smart learning, and edutech, and on this basis, it has become possible through the expansion and use of the Internet and computers, the dissemination of smart devices, and a software foundation using big data. Based on this, it was confirmed that Edutech is being implemented through the establishment of a quarantine safety net, a learning safety net, and a care safety net for individual learners and safe life based on artificial intelligence. Lastly, in order for edutech education using big data to become a discourse for everyone, it is necessary to consider artificial intelligence and ethics in the use and application of edutech.

Experimental Study of Strength Degradation according to Fixed Knot Method and Outdoor Exposure Environment of Auxiliary Rope for High Altitude Work (추락 방지용 보조로프의 고정 매듭법과 옥외 노출 환경에 따른 강도저하 평가에 관한 연구)

  • Sang Min Song;Tae Sun Kim;Keon Yeob Kim;Song Mi Kim;Oh Heon Kwon;Woo Rim Park
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.3
    • /
    • pp.10-19
    • /
    • 2023
  • Fall accidents account for the highest accident fatality rate in the construction industry. In addition, wearing and using a safety belt is the most realistic and important preventive measure to reduce fall accidents. Safety belts are protective devices worn by individual workers; they prevent workers from falling and allow for time to rescue the workers. However, the legal standards for safety belts only stipulate the materials, specifications, and strength of parts; there is no provision for an auxiliary rope fixing method to fix the safety belts safely. Due to this reason, workers in industrial sites arbitrarily fix and use the auxiliary rope. Currently, the most used method to fix the auxiliary rope is to tie a knot, which significantly lowers the strength of the material compared to the standard strength. Moreover, many construction sites are located outdoors, so the strength of the materials used in the auxiliary rope is inevitably reduced due to various external environmental conditions. Therefore, to solve this problem, this study was conducted to evaluate the strength of the material of the auxiliary rope for fixing the safety belt and the knot-tying method for the auxiliary rope. In this study, the exposure conditions for the effects of temperature and moisture were set to reflect the characteristics of the construction industry. The results of this study are expected to be used for standards establishment and the safe use of the auxiliary rope for safety belts in actual field applications.

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

A Study on the Effectiveness of Investment Protection in North Korea (대북 투자보호의 실효성 제고 방안에 대한 고찰)

  • Hyun-suk Oh
    • Journal of Arbitration Studies
    • /
    • v.33 no.2
    • /
    • pp.53-83
    • /
    • 2023
  • The investment agreement prepared at the beginning of inter-Korean economic cooperation in 2000 can be evaluated as very ineffective as a product of mutual political and diplomatic compromise rather than an effective protection for our investment assets. South Korean companies suffered a lot of losses due to the freezing of assets in the Geumgang mountain district and the closure of the Kaeseung Industrial Complex, but they did not receive practical damage relief due to institutional vulnerabilities. Currently, North Korea is under international economic sanctions of the UN Security Council, so it is true that the resumption of inter-Korean economic cooperation is far away, but North Korea's human resources and geographical location are still attractive investment destinations for us. Therefore, if strained relations between the two Koreas recover in the future and international economic sanctions on North Korea are eased, Korean companies' investment in North Korea will resume. However, the previous inter-Korean investment agreement system was a fictional systemthat was ineffective. Therefore, if these safety devices are not reorganized when economic cooperation resumes, unfair damage to Korean companies will be repeated again. The core of the improved investment guarantee system is not a bilateral system between the two Koreas, but the establishment of a multilateral system through North Korea's inclusion in the international economy. Specifically, it includes encouraging North Korea to join international agreements for the execution of arbitration decisions, securing subrogation rights through membership of international insurance groups such as MIGA, creating matching funds by international financial organizations. Through this new approach, it will be possible to improve the safety of Korean companies' investment in North Korea, and ultimately, it will be necessary to lay the foundation for mutual development through economic cooperation between the two Koreas.

  • PDF

A Steganography-Based Covert Communication Method in Roblox Metaverse Environment (로블록스 메타버스 환경에서의스테가노그래피기반은닉통신기법)

  • Dokyung Yun;Youngho Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.45-50
    • /
    • 2023
  • Roblox, the world's No. 1 metaverse platform, has more than 3 billion subscription accounts and more than 150 millionmonthly active users (MAU). Despite such high interest in metaverse, existing studies on analyzing the risk of cyberattacks and security in the metaverse environment is insufficient. Therefore, in this paper, we propose a new steganography-basedcovert communication method in Roblox. In our proposed method, a secret message is hidden into an image by using a function provided in the Roblox Experience environment and then the image is automatically stored in the RobloxExperience participants' devices (PC or Smartphone) so that a malicious software can extract the hidden message fromthe image. By our experiments in the Roblox metaverse environment, we validated our proposed method works and thus want to inform our proposed method can be used in various cyberattacks and crimes such as the spread of secret commands, the establishment of a steganography botnet, and the mass distribution of malicious malware in metaverse platforms.

A Study on the Establishment of the IDS Using Machine Learning (머신 러닝을 활용한 IDS 구축 방안 연구)

  • Kang, Hyun-Sun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.121-128
    • /
    • 2019
  • Computing systems have various vulnerabilities to cyber attacks. In particular, various cyber attacks that are intelligent in the information society have caused serious social problems and economic losses. Traditional security systems are based on misuse-based technology, which requires the continuous updating of new attack patterns and the real-time analysis of vast amounts of data generated by numerous security devices in order to accurately detect. However, traditional security systems are unable to respond through detection and analysis in real time, which can delay the recognition of intrusions and cause a lot of damage. Therefore, there is a need for a new security system that can quickly detect, analyze, and predict the ever-increasing cyber security threats based on machine learning and big data analysis models. In this paper, we present a IDS model that combines machine learning and big data technology.