• Title/Summary/Keyword: Information Security Measures

Search Result 663, Processing Time 0.023 seconds

Smart Radar System for Life Pattern Recognition (생활패턴 인지가 가능한 스마트 레이더 시스템)

  • Sang-Joong Jung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.2
    • /
    • pp.91-96
    • /
    • 2022
  • At the current camera-based technology level, sensor-based basic life pattern recognition technology has to suffer inconvenience to obtain accurate data, and commercial band products are difficult to collect accurate data, and cannot take into account the motive, cause, and psychological effect of behavior. the current situation. In this paper, radar technology for life pattern recognition is a technology that measures the distance, speed, and angle with an object by transmitting a waveform designed to detect nearby people or objects in daily life and processing the reflected received signal. It was designed to supplement issues such as privacy protection in the existing image-based service by applying it. For the implementation of the proposed system, based on TI IWR1642 chip, RF chipset control for 60GHz band millimeter wave FMCW transmission/reception, module development for distance/speed/angle detection, and technology including signal processing software were implemented. It is expected that analysis of individual life patterns will be possible by calculating self-management and behavior sequences by extracting personalized life patterns through quantitative analysis of life patterns as meta-analysis of living information in security and safe guards application.

Effect of Dietary Lifestyle of the Elderly on the Health-Related Quality of Life: Based on the 2011-2020 Korea national health and nutrition examination survey (노인의 식생활 형편이 건강관련 삶의 질에 미치는 영향: 2011-2020년 국민건강영양조사 자료를 이용하여)

  • Hyun-Jung Jung;Ji-Kyeong Park
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.11 no.4
    • /
    • pp.199-211
    • /
    • 2023
  • Purpose : Rapid population aging in South Korea is emerging as serious social problems, and interest in the health-related quality of life of the elderly is also increasing. Therefore, this study attempted to provide basic data to develop measures to improve the health-related quality of life of the elderly by identifying the impact of the elderly's dietary lifestyle on the health-related quality of life. Methods : Utilizing raw data from the Korea national health and nutrition examination survey spanning from 2011 to 2020, this study focused on individuals aged 65 and above. After excluding cases with missing data, 12,731 individuals were included in the final analysis. Various statistical methods including frequency analysis, t-tests, ANOVA, Scheffé test and hierarchical regression analysis were performed using SPSS 25.0 for windows. The statistical significance level (α) was set at .05. Results : The main results of this study were as follows. Firstly, dietary lifestyle exhibited variations depending on gender, age, education level, individual income, basic livelihood type, household type, self-rated health status, and chewing difficulty (p<.001). Secondly, there were disparities in health-related quality of life (as measured by the EQ-5D index) based on gender, age, education level, residence, individual income, basic livelihood security, self-rated health status, and chewing difficulty (p<.001). Thirdly, the EQ-5D index showed that elderly individuals' dietary lifestyle adversely impacted their health-related quality of life (F=353.74, p<.001). Conclusion : Therefore, it is necessary to prepare policies to improve the health-related quality of life by maintaining a proper diet for the elderly, and customized support and management is required taking into account the elderly's gender, age, education level, individual income, basic livelihood security, household type, self-rated health status, chewing difficulty etc.

Wine Quality Prediction by Using Backward Elimination Based on XGBoosting Algorithm

  • Umer Zukaib;Mir Hassan;Tariq Khan;Shoaib Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.31-42
    • /
    • 2024
  • Different industries mostly rely on quality certification for promoting their products or brands. Although getting quality certification, specifically by human experts is a tough job to do. But the field of machine learning play a vital role in every aspect of life, if we talk about quality certification, machine learning is having a lot of applications concerning, assigning and assessing quality certifications to different products on a macro level. Like other brands, wine is also having different brands. In order to ensure the quality of wine, machine learning plays an important role. In this research, we use two datasets that are publicly available on the "UC Irvine machine learning repository", for predicting the wine quality. Datasets that we have opted for our experimental research study were comprised of white wine and red wine datasets, there are 1599 records for red wine and 4898 records for white wine datasets. The research study was twofold. First, we have used a technique called backward elimination in order to find out the dependency of the dependent variable on the independent variable and predict the dependent variable, the technique is useful for predicting which independent variable has maximum probability for improving the wine quality. Second, we used a robust machine learning algorithm known as "XGBoost" for efficient prediction of wine quality. We evaluate our model on the basis of error measures, root mean square error, mean absolute error, R2 error and mean square error. We have compared the results generated by "XGBoost" with the other state-of-the-art machine learning techniques, experimental results have showed, "XGBoost" outperform as compared to other state of the art machine learning techniques.

A Study on Establishing EMP Protection Performance Standards and Improving Laws and Regulations for Military Facilities and Equipment (군사시설, 장비의 EMP 방호성능 기준 정립 및 법·제도 개선 방안연구)

  • Sangjun Park;Kukjoo Kim;Hoedong Kim
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.219-229
    • /
    • 2024
  • The application of 4th Industrial Revolution technologies in the defense sector is accelerating, leading to the rapid incorporation of information and communication technologies (ICT) into military systems. The biggest threat to these ICT-based military systems is an electromagnetic pulse (EMP) attack, which can result from nuclear explosions or EMP bombs. North Korea's ongoing nuclear advancements and EMP bomb capabilities pose a critical threat, necessitating South Korea's preparedness for such attacks to ensure the effective operation of its ICT-based military systems. Despite this urgency, the South Korean military currently lacks comprehensive standards for EMP protection, relying only on the design criteria for EMP protection facilities for buildings. This gap highlights the absence of sufficient legal and regulatory measures and the lack of focused research to develop EMP protection performance standards for safeguarding military systems. Therefore, this paper aims to analyze existing EMP protection performance standards and relevant laws and regulations. It proposes improvements and establishes necessary standards to enhance the EMP resilience of military facilities and equipment.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

Requisites for Adopting Electronic Payment Systems in International Trade Transactions (국제무역거래에서의 전자결제시스템 도입에 따른 과제)

  • Kyung, Yeun-Beom
    • The Journal of Information Technology
    • /
    • v.6 no.4
    • /
    • pp.147-162
    • /
    • 2003
  • The technique of information-communication rapidly developed has made it possible for us to do business through Internet. Electronic commerce was increased rapidly by the explosive development of the inter and communication revolution. E-Commerce has created a fundamentally new way of conduction and will change drastically accepted ways of doing business. Normally international trade has been formulated in a way that exporters and importers meet face-to-face and contract and pay by letter of credits. For the global electronic commerce to vitalized, the outstanding matters should encourage the creation of infrastructure of information security and new models in the field of electronic payment systems, electronic commerce agreement for remedy, adapting electronic date interchange in transport documents and negotiability of electronic bills of lading. The payment systems such as electronic fund transfers, tradecard system and electronic letters of credits issued by SWIFT system permit the parties concerned(sellers, buyers ad service providers) to settle payment electronically. Still they are many limitations for complete international electronic transactions. The following measures have to be taken to vitalize electronic trade transactions. It is needed to acquire information security such as authenticity, integrity, non-repudiation and confidentiality. All kinds of documents need to be replaced by electronic date exchange and the legal structure of international convention, national law for electronic payment systems have to be completed. Also a detailed guide of the banking operation and developing rules for electronic letters of credits need to be provided to adopt eUCP rules for the electronic presentation of documents.

  • PDF

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

Efficient Sharp Digital Image Detection Scheme

  • Kim, Hyoung-Joong;Tsomko, Elena;Kim, Dong-Hoi
    • Journal of Broadcast Engineering
    • /
    • v.12 no.4
    • /
    • pp.350-359
    • /
    • 2007
  • In this paper we present a simple, efficient method for detection of sharp digital images. Recently many digital cameras are equipped with various autofocusing functions to help users take well-focused pictures as easily as possible. However, acquired digital pictures can be further degraded by motion, limited contrast, and inappropriate amount of exposure, to name a few. In order to decide whether to process the image or not, or whether to delete it or not, reliable measure of image quality to detect sharp images from blurry ones is needed. This paper presents a blurriness/sharpness measure, and demonstrates its feasibility using extensive experiments. This method is fast and easy to implement, and accurate. Regardless of the detection accuracy, existing measures are computation-intensive. However, the proposed measure in this paper is not demanding in computation time. Needless to say, this measure can be used for various imaging applications including autofocusing and astigmatism correction.

A Study on the Imperfect Debugging of Logistic Testing Function (로지스틱 테스트함수의 불완전 디버깅에 관한 연구)

  • Che, Gyu-Shik;Moon, Myung-Ho;Yang, Kye-Tak
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.1
    • /
    • pp.119-126
    • /
    • 2010
  • The software reliability growth model(SRGM) has been developed in order to estimate such reliability measures as remaining fault number, failure rate and reliability for the developing stage software. Almost of them assumed that the faults detected during testing were eventually removed. Namely, they have studied SRGM based on the assumption that the faults detected during testing were perfectly removed. The fault removing efficiency, however, is imperfect and it is widely known as so in general. It is very difficult to remove detected fault perfectly because the fault detecting is not easy and new error may be introduced during debugging and correcting. Therefore, We want to study imperfect software testing effort for the logistic testing effort which is thought to be the most adequate in this paper.

Fuzzy Threshold Inference of a Nonlinear Filter for Color Sketch Feature Extraction (컬러 스케치특징 추출을 위한 비선형 필터의 퍼지임계치 추론)

  • Cho Sung-Mok;Cho Ok-Lae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.3
    • /
    • pp.398-403
    • /
    • 2006
  • In this paper, we describe a fuzzy threshold selection technique for feature extraction in digital color images. this is achieved by the formulation a fuzzy inference system that evaluates threshold for feature configurations. The system uses two fuzzy measures. They capture desirable characteristics of features such as dependency of local intensity and continuity in an image. We give a graphical description of a nonlinear sketch feature extraction filter and design the fuzzy inference system in terms of the characteristics of the feature. Through the design, we provide selection method on the choice of a threshold to achieve certain characteristics of the extracted features. Experimental results show the usefulness of our fuzzy threshold inference approach which is able to extract features without human intervention.

  • PDF