• Title/Summary/Keyword: Network DEA

Search Result 146, Processing Time 0.025 seconds

TriSec: A Secure Data Framework for Wireless Sensor Networks Using Authenticated Encryption

  • Kumar, Pardeep;Cho, Sang-Il;Lee, Dea-Seok;Lee, Young-Dong;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.2
    • /
    • pp.129-135
    • /
    • 2010
  • Wireless sensor networks (WSNs) are an emerging technology and offers economically viable monitoring solution to many challenging applications. However, deploying new technology in hostile environment, without considering security in mind has often proved to be unreasonably unsecured. Apparently, security techniques face many critical challenges in WSNs like data security and secrecy due to its hostile deployment nature. In order to resolve security in WSNs, we propose a novel and efficient secure framework called TriSec: a secure data framework for wireless sensor networks to attain high level of security. TriSec provides data confidentiality, authentication and data integrity to sensor networks. TriSec supports node-to-node encryption using PingPong-128 stream cipher based-privacy. A new PingPong-MAC (PP-MAC) is incorporated with PingPong stream cipher to make TriSec framework more secure. PingPong-128 is fast keystream generation and it is very suitable for sensor network environment. We have implemented the proposed scheme on wireless sensor platform and our result shows their feasibility.

Design and Implementation of Ship Application System for Maritime Service Utilizing onboard Ship Collected Data (선내 수집데이터를 활용하는 선박 및 육상 서비스를 위한 선박용 어플리케이션 시스템 설계 및 구현)

  • Kang, Nam-seon;Kim, Yong-dea;Kim, Sang-yong;Lee, Bum-seok
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.2
    • /
    • pp.116-126
    • /
    • 2016
  • In this study, has designed the ship application system for efficient data integration management of onboard ship and shore application/service utilizing data collected onboard ship, and has implemented the module. In order to supports onboard ship and shore service utilizing onboard ship collected data and provide a easy to access among individual devices, the ship application system applied the XML structure of ISO 16425 and the data sharing system model discussed in IALA, and the common module for system operation, a windows service for data collection/integral management, and web service module for management has been implemented.

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-An;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.225-234
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics. system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

A Study on Speaker Identification Using Hybrid Neural Network (하이브리드 신경회로망을 이용한 화자인식에 관한 연구)

  • Shin, Chung-Ho;Shin, Dea-Kyu;Lee, Jea-Hyuk;Park, Sang-Hee
    • Proceedings of the KIEE Conference
    • /
    • 1997.11a
    • /
    • pp.600-602
    • /
    • 1997
  • In this study, a hybrid neural net consisting of an Adaptive LVQ(ALVQ) algorithm and MLP is proposed to perform speaker identification task. ALVQ is a new learning procedure using adaptively feature vector sequence instead of only one feature vector in training codebooks initialized by LBG algorithm and the optimization criterion of this method is consistent with the speaker classification decision rule. ALVQ aims at providing a compressed, geometrically consistent data representation. It is fit to cover irregular data distributions and computes the distance of the input vector sequence from its nodes. On the other hand, MLP aim at a data representation to fit to discriminate patterns belonging to different classes. It has been shown that MLP nets can approximate Bayesian "optimal" classifiers with high precision, and their output values can be related a-posteriori class probabilities. The different characteristics of these neural models make it possible to devise hybrid neural net systems, consisting of classification modules based on these two different philosophies. The proposed method is compared with LBG algorithm, LVQ algorithm and MLP for performance.

  • PDF

Comparison of Restaurant Distribution Entrepreneurs' Pressure on Business Failure and Entrepreneurial Intention

  • AN, Soo-Jin;SHIN, Choung-Seob;PARK, Dea-Seob
    • Journal of Distribution Science
    • /
    • v.17 no.5
    • /
    • pp.5-17
    • /
    • 2019
  • Purpose - This study aims to exploratorily analyze relationship among pressure on business failure, social safety net perception, and entrepreneurial intention targeting potential business founders - pre-entrepreneurs and re-entrepreneurs. Research design, data, and methodology - Out of 450 collected surveys, 386 were used for analysis. Among these, 216 were from pre-entrepreneurs and 170 were from re-entrepreneurs. Frequency analysis, reliability and validity analysis, and regression analysis were performed. Results - In analysis of pre-entrepreneur and re-entrepreneur's pressure on business failure and social safety net perception, objective environment perception - a subfactor of social safety net perception - had statistically significant difference between the two potential entrepreneur groups. Conclusions - We categorized potential entrepreneurs into pre-entrepreneurs and re-entrepreneurs. Also, the current study suggests importance of social safety net to vitalize food service business startup by validifying its mediating effect between pressure on business failure and attitude towards restaurant business establishment. This research also established groundwork for future studies on ways to improve entrepreneurial intention or startup business sustainability by deducing social safety net perception difference between pre-entrepreneurs and re-entrepreneurs. This study was able to analyze relationship between those two groups in terms of entrepreneurial intention and startup business sustainability.

The Pattern Search and Complete Elimination Method of Important Private Data in PC (PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.213-216
    • /
    • 2013
  • Big data, the use of privacy has been increasing to the development of wireless network infrastructure or technology development and wired Internet. By the way, Enforcement of private data preservation law the infringement accident which is still caused by despite with private data outflow occurs. The private data outflow avoids finance and to become the fire tube. Analyzes the pattern of private data from search of private data and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private data which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private data protection and it did the pattern extraction and a complete elimination experiment of private data.

  • PDF

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

A Study of Dynamic Forecast on Port Container Handling Capacity (항만 컨테이너 처리능력의 통계적 예측에 관한 연구)

  • Feng, Zhan-Qing;Lee, Su-Ho
    • Journal of Navigation and Port Research
    • /
    • v.26 no.2
    • /
    • pp.161-166
    • /
    • 2002
  • In view of the great disparity between forecasts of Shanghai port container handling capacity and its real results, we choose a dynamic forecast method by the causality model dynamic compensation to predict Shanghai port container handling capacity. And we forecast Shanghai port container handling capacity by using this method. We have made a satisfactory achievement, which provides a more reliable and practical way to forecast container handling capacity.

A Study of Communications Security by Using Key Generation and File Encryption (파일 암호화와 키 생성을 이용한 통신보안 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.316-319
    • /
    • 2010
  • File security is typically protected by encryption methods. The development of a network environment, such as the Internet according to the sharing of information between systems become commonplace, while providing convenience to users, individuals or organizations that facilitate access to sensitive information caused by hacking the system to attack the rapidly growing is a trend. This paper is the latest generation file system caused by the hacking attacks on the Sniffing for users using file encryption and key generation, Packet Sniffing Tool IP and data through the analysis are discussed. Through this study, the importance of protecting personal information by imprinting Proactive in the hacking incident, and what users will contribute to increase the level of security awareness.

  • PDF

A Study of Broadband Internet using Web Service Blind People of Distance Education Support Services (초고속통신망에서 인터넷 웹서비스를 이용한 시각장애인 원격교육지원 서비스연구)

  • Jung, Hoe-Jun;Park, Dea-Woo;Han, Kyung-Don
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.385-388
    • /
    • 2010
  • A place for the blind people movement restrictions in place on a relatively equal opportunity of education can not be provided. In this paper, blind people, as well as web access to information on the catch of the blind people and their preference for acquiring information on how to analyze the survey and analyze national and international stories. targeting the blind people Internet using Web Services in a high-speed network system design, training and support services, analyze and exchange information in real-time training program to develop a community, remote from the home education support system to revitalize blind people and would like to contribute to the information service.

  • PDF