• Title/Summary/Keyword: Information Centric

Search Result 728, Processing Time 0.026 seconds

Morphological Evolution of World Smart City in View of Environment Technology and Information Technology (환경기술과 정보기술 관점에서 바라본 세계 스마트시티의 형태적 진화)

  • Han, Ju-Hyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.201-209
    • /
    • 2019
  • This study aimed to find out the morphological evolution process for future vision of world smart city. The contents and methods of study was divided and compared by 4 continents and Korea focused on the convergence numbers of ET and IT in smart city and did correlation analysis and analysis of convergence number in device/technology by periods. The analysis materials were 32 cases of smart city in whole world and times were 4 periods. The results of study were listed below. First, the smart city in period 1 was morphological evolutions preserved environment and kept natural form of existing city and filled up device/technology. Second, the smart city in period 2 was morphological evolutions through ET-centric development. Third, the smart city in period 3 was morphological evolutions through advancement of ET and device/technology related to production of energy. Forth, the smart city in period 4 was morphological evolutions fusing, dissipating and creating new ET and IT through the advancement process of all technologies. In conclusion, morphological evolution of smart city will change systematic city structure of convergence form, not each discriminating development between ET and IT, and the forming of smart city will be evolved by repetitive convergence process of technologies continually.

Construction of UOWHF based on Block Cipher (유니버설 일방향 해쉬 함수에 대한 블록 암호 기반 구성 방법)

  • 이원일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.101-111
    • /
    • 2004
  • Preneel, Govaerts, and Vandewalle considered the 64 basic ways to construct a collision resistant hash function from a block cipher. They regarded 12 of these 64 schemes as secure, though no proofs or formal claims were given. Black, Rogaway, and Shrimpton presented a more proof-centric look at the schemes from PGV. They proved that, in the black box model of block cipher, 12 of 64 compression functions are CRHFs and 20 of 64 extended hash functions are CRHFs. In this paper, we present 64 schemes of block-cipher-based universal one way hash functions using the main idea of PGV and analyze these schemes in the black box model. We will show that 30 of 64 compression function families UOWHF and 42 of 64 extended hash function families are UOWHF. One of the important results is that, in this black box model, we don't need the mask keys for the security of UOWHF in contrast with the results in general security model of UOWHF. Our results also support the assertion that building an efficient and secure UOWHF is easier than building an efficient and secure CRHF.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).

A Study on the Method of Constructive Simulation Operation Analysis for Warfighting Experiment Supplied with the Validation Evaluation (타당성 평가가 보완된 모델 운용상의 전투실험 모의분석 절차 연구)

  • Park, Jin-Woo;Kim, Nung-Jin;Kang, Sung-Jin;Soo, Hyuk
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.77-87
    • /
    • 2010
  • Currently, our society has been changed from the industrial society to the information society. As the war progresses to Information Warfare, Network-Centric Warfare, Long-Range Precision Engagement and Robot Warfare, the military should advance to High-tech Scientific force. For this creation of the war potential, it is regarded as the warfighting experiment is a critical method. Surely it is rational that LVC(Live Virtual Constructive simulation) is desirable to make the warfighting experiment. But because it is limited by the cost, the time, the place and the resource, the constructive simulation(M&S : Modeling&Simulation) is a good tool to solve those problems. There are some studies about the evaluation process for developing the model, but it is unsatisfying in the process of the constructive simulations' operation. This study focuses on the way of constructive simulation operation, which is supplied with the evaluation process(VV&A : Verification Validation & Accreditation). We introduce the example of the rear area operation simulation for "appropriateness evaluation to the organization of logistic corps" by the AWAM(Army Weapon Analysis Model). This study presents the effective methods of the constructive simulations, which is based on the reliable evaluation process, so it will contribute to the warfighting experiments.

Prediction of Customer Satisfaction Using RFE-SHAP Feature Selection Method (RFE-SHAP을 활용한 온라인 리뷰를 통한 고객 만족도 예측)

  • Olga Chernyaeva;Taeho Hong
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.4
    • /
    • pp.325-345
    • /
    • 2023
  • In the rapidly evolving domain of e-commerce, our study presents a cohesive approach to enhance customer satisfaction prediction from online reviews, aligning methodological innovation with practical insights. We integrate the RFE-SHAP feature selection with LDA topic modeling to streamline predictive analytics in e-commerce. This integration facilitates the identification of key features-specifically, narrowing down from an initial set of 28 to an optimal subset of 14 features for the Random Forest algorithm. Our approach strategically mitigates the common issue of overfitting in models with an excess of features, leading to an improved accuracy rate of 84% in our Random Forest model. Central to our analysis is the understanding that certain aspects in review content, such as quality, fit, and durability, play a pivotal role in influencing customer satisfaction, especially in the clothing sector. We delve into explaining how each of these selected features impacts customer satisfaction, providing a comprehensive view of the elements most appreciated by customers. Our research makes significant contributions in two key areas. First, it enhances predictive modeling within the realm of e-commerce analytics by introducing a streamlined, feature-centric approach. This refinement in methodology not only bolsters the accuracy of customer satisfaction predictions but also sets a new standard for handling feature selection in predictive models. Second, the study provides actionable insights for e-commerce platforms, especially those in the clothing sector. By highlighting which aspects of customer reviews-like quality, fit, and durability-most influence satisfaction, we offer a strategic direction for businesses to tailor their products and services.

A Service Reusability-Centric Process for Developing Software-as-a-Service (서비스 재사용성 중심의 Software-as-a-Service 개발 프로세스)

  • Lee, Jung-Woo;La, Hyun-Jung;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.7
    • /
    • pp.518-535
    • /
    • 2010
  • Cloud Computing is emerged as an effective reuse paradigm, where service providers operate hardware and software and as a service, and service consumers invoke the service through Internet. Software-as-a-Service (SaaS) is a type of cloud services, where the whole software is designed as a service so that several consumers can reuse the SaaS. While tradition software applications are developed for a specific organization, SaaS is developed for multiple users in the various organizations. Hence, reusability is very essential characteristic of SaaS. Reusability is defined as a metric of how effective and efficient software functionalities can be used by various users. Reusability in SaaS is evaluated by considering three sub-characteristics; applicability, adaptability, and scalability. Since such a SaaS has considerable differences and characteristics from traditional software applications, conventional methods including object-oriented modeling, component-based development method, and service-oriented architecture (SOA) service development method would be limited in developing services which can fulfill these three sub-characteristics related to reusability as well as SaaS-intrinsic characteristics. Hence, there is a great demand for effective processes for developing SaaS cloud services. In this paper, we present a practical process for developing SaaS, which focuses on ensuring reusability. And by performing a case study with our proposed SaaS development process, we evaluate applicability of our proposed process and explain how the process is used in a real domain. Then, we compare our proposed process with others for verifying our study. Through the proposed process, cloud services with high quality can be more effectively developed.

The Propose a Legislation Bill to Apply Autonomous Cars and the Study for Status of Legal and Political Issues (제4차 산업혁명 시대의 자율주행자동차 상용화를 위한 안정적 법적 기반을 위한 법정책적 연구 - 자율주행자동차 특별법 제정(안)을 중심으로 -)

  • Kang, Sun Joon;Won, Yoo Hyung;Kim, Min Ji
    • Journal of Korea Technology Innovation Society
    • /
    • v.21 no.1
    • /
    • pp.151-200
    • /
    • 2018
  • At the Davos Forum in 2016, the Fourth Industrial Revolution, a reference to cloud Schwab, is dramatically changing our lives, and at its height, self-driving cars are emerging as the talk of the day. But there are still many hurdles to overcome before the nation can successfully introduce and establish self-driving cars. In particular, it is necessary to change the paradigm of the legal system centered on human beings to one that includes artificial intelligence. The stable operation of the self-driving car era requires drastic changes to the people-centric legislation system. That is, it is necessary to collect information on the total number of drivers of self-driving cars (what is available), general vehicles on general roads, civil and criminal liability issues in the event of traffic accidents, and collection of insurance problems concerning autonomous driving vehicles. In this study, a separate bill was proposed to address the various legal issues arising from the operation of self-driving cars from a legislative perspective by considering the domestic laws related to road transport, the current state of legislation on foreign soil and legal issues related to self-driving cars.

Efficient and Privacy-Preserving Near-Duplicate Detection in Cloud Computing (클라우드 환경에서 검색 효율성 개선과 프라이버시를 보장하는 유사 중복 검출 기법)

  • Hahn, Changhee;Shin, Hyung June;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1112-1123
    • /
    • 2017
  • As content providers further offload content-centric services to the cloud, data retrieval over the cloud typically results in many redundant items because there is a prevalent near-duplication of content on the Internet. Simply fetching all data from the cloud severely degrades efficiency in terms of resource utilization and bandwidth, and data can be encrypted by multiple content providers under different keys to preserve privacy. Thus, locating near-duplicate data in a privacy-preserving way is highly dependent on the ability to deduplicate redundant search results and returns best matches without decrypting data. To this end, we propose an efficient near-duplicate detection scheme for encrypted data in the cloud. Our scheme has the following benefits. First, a single query is enough to locate near-duplicate data even if they are encrypted under different keys of multiple content providers. Second, storage, computation and communication costs are alleviated compared to existing schemes, while achieving the same level of search accuracy. Third, scalability is significantly improved as a result of a novel and efficient two-round detection to locate near-duplicate candidates over large quantities of data in the cloud. An experimental analysis with real-world data demonstrates the applicability of the proposed scheme to a practical cloud system. Last, the proposed scheme is an average of 70.6% faster than an existing scheme.

A Study on the Method of Security Industrial Classification through the Review of Industrial Special Classification (국내산업 특수분류방법을 고려한 보안산업 분류방향 연구)

  • Shin, Eunhee;Chang, Hangbae
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.175-191
    • /
    • 2017
  • The basis of economic statistics for evaluating the security industry's growth and inter-industry impacts is to create a standardized industry classification along with the scope of the security industry. The industrial classification should be written in such a way that it complies with and complies with the standards of the international and domestic standardized standard industrial classifications. Representative classifications of information security, physical security, and convergence security as well as classification of products and services related to security at present are not in line with the criteria of industrial classification based on the characteristics of production activities for products. The results of the convergence security industrial classification study are also consumer-oriented classification, which differs from the supplier-centric classification officially used in statistics, law, and policy enforcement in the present country. In this study, we first summarized the criteria of Korean and international industrial classification, and then examined whether the current classification of security meets these criteria. Next, to examine the classification directions of newly formed industries such as security industry, we reviewed some cases of domestic industrial special classification and types, and proposed the industrial classification criteria and direction of the security industry on the basis of them.

Experimental Study on the Characteristics of Local Scour Hole Downstream of V-shaped Drop Structure Model (V자형 낙차공 모형 직하류 국부세굴공 발생특성에 관한 실험적 연구)

  • Eom, Junghyun;Han, Hyeongjun;Park, Sung Won;Ahn, Jungkyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.8-14
    • /
    • 2019
  • A drop structure, one of the representative river-crossing structures, is constructed to stabilize a riverbed. On the other hand, the structure interrupts the continuity of the river and causes the destruction of the hydro-ecological environment. Therefore, laboratory experiments of a natural type of drop structure with low differences were performed, and the empirical formula of a local scour hole is proposed. Four experimental flow rates were tested for various types of the drop structure models with 28 test cases. Based on the scour test, it was confirmed that the maximum scour depth occurs rather than the result of applying the previously proposed scour depth formulae. Correlation analysis of the major factors of scour hole at the downstream of the drop structure revealed a strong correlation between the upstream flow characteristics, drop structure height, and total crossing length of the drop model. In addition, the depth and length estimation formula of the maximum scour hole were proposed using the dimensionless variables and validated. In the future, it is also expected that more accurate scour prediction and calculation can be derived by conducting experimental studies and numerical analysis considering the various bed materials and flow conditions.