• Title/Summary/Keyword: Power network

Search Result 5,968, Processing Time 0.04 seconds

The Impact of CPO Characteristics on Organizational Privacy Performance (개인정보보호책임자의 특성이 개인정보보호 성과에 미치는 영향)

  • Wee, Jiyoung;Jang, Jaeyoung;Kim, Beomsoo
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.93-112
    • /
    • 2014
  • As personal data breach reared up as a problem domestically and globally, organizations appointing chief privacy officers (CPOs) are increasing. Related Korean laws, 'Personal Data Protection Act' and 'the Act on Promotion of Information and Communication Network Utilization and Information Protection, etc.' require personal data processing organizations to appoint CPOs. Research on the characteristics and role of CPO is called for because of the importance of CPO being emphasized. There are many researches on top management's role and their impact on organizational performance using the Upper Echelon theory. This study investigates what influence the characteristics of CPO gives on the organizational privacy performance. CPO's definition varies depending on industry, organization size, required responsibility and power. This study defines CPO as 'a person who takes responsibility for all the duties on handling the organization's privacy,' This research assumes that CPO characteristics such as role, personality and background knowledge have an influence on the organizational privacy performance. This study applies the part relevant to the upper echelon's characteristics and performance of the executives (CEOs, CIOs etc.) for CPO. First, following Mintzberg and other managerial role classification, information, strategic, and diplomacy roles are defined as the role of CPO. Second, the "Big Five" taxonomy on individual's personality was suggested in 1990. Among these five personalities, extraversion and conscientiousness are drawn as the personality characteristics of CPO. Third, advance study suggests complex knowledge of technology, law and business is necessary for CPO. Technical, legal, and business background knowledge are drawn as the background knowledge of CPO. To test this model empirically, 120 samples of data collected from CPOs of domestic organizations are used. Factor analysis is carried out and convergent validity and discriminant validity were verified using SPSS and Smart PLS, and the causal relationships between the CPO's role, personality, background knowledge and the organizational privacy performance are analyzed as well. The result of the analysis shows that CPO's diplomacy role and strategic role have significant impacts on organizational privacy performance. This reveals that CPO's active communication with other organizations is needed. Differentiated privacy policy or strategy of organizations is also important. Legal background knowledge and technical background knowledge were also found to be significant determinants to organizational privacy performance. In addition, CPOs conscientiousness has a positive impact on organizational privacy performance. The practical implication of this study is as follows: First, the research can be a yardstick for judgment when companies select CPOs and vest authority in them. Second, not only companies but also CPOs can judge what ability they should concentrate on for development of their career relevant to their job through results of this research. Cultural social value, citizen's consensus on the right to privacy, expected CPO's role will change in process of time. In future study, long-term time-series analysis based research can reveal these changes and can also offer practical implications for government and private organization's policy making on information privacy.

Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints (Endpoint에 적용 가능한 정적 feature 기반 고속의 사이버 침투공격 분석기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Su-jeong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.21-31
    • /
    • 2018
  • Cyber penetration attacks can not only damage cyber space but can attack entire infrastructure such as electricity, gas, water, and nuclear power, which can cause enormous damage to the lives of the people. Also, cyber space has already been defined as the fifth battlefield, and strategic responses are very important. Most of recent cyber attacks are caused by malicious code, and since the number is more than 1.6 million per day, automated analysis technology to cope with a large amount of malicious code is very important. However, it is difficult to deal with malicious code encryption, obfuscation and packing, and the dynamic analysis technique is not limited to the performance requirements of dynamic analysis but also to the virtual There is a limit in coping with environment avoiding technology. In this paper, we propose a machine learning based malicious code analysis technique which improve the weakness of the detection performance of existing analysis technology while maintaining the light and high-speed analysis performance applicable to commercial endpoints. The results of this study show that 99.13% accuracy, 99.26% precision and 99.09% recall analysis performance of 71,000 normal file and malicious code in commercial environment and analysis time in PC environment can be analyzed more than 5 per second, and it can be operated independently in the endpoint environment and it is considered that it works in complementary form in operation in conjunction with existing antivirus technology and static and dynamic analysis technology. It is also expected to be used as a core element of EDR technology and malware variant analysis.

Design and Implementation of ISO/IEEE 11073 DIM Transmission Structure Based on oneM2M for IoT Healthcare Service (사물인터넷 헬스케어 서비스를 위한 oneM2M기반 ISO/IEEE 11073 DIM 전송 구조 설계 및 구현)

  • Kim, Hyun Su;Chun, Seung Man;Chung, Yun Seok;Park, Jong Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.4
    • /
    • pp.3-11
    • /
    • 2016
  • In the environment of Internet of Things (IoT), IoT devices are limited by physical components such as power supply and memory, and also limited to their network performance in bandwidth, wireless channel, throughput, payload, etc. Despite these limitations, resources of IoT devices are shared with other IoT devices. Especially, remote management of the information of devices and patients are very important for the IoT healthcare service, moreover, providing the interoperability between the healthcare device and healthcare platform is essential. To meet these requirements, format of the message and the expressions for the data information and data transmission need to comply with suitable international standards for the IoT environment. However, the ISO/IEEE 11073 PHD (Personal Healthcare Device) standards, the existing international standards for the transmission of health informatics, does not consider the IoT environment, and therefore it is difficult to be applied for the IoT healthcare service. For this matter, we have designed and implemented the IoT healthcare system by applying the oneM2M, standards for the Internet of Things, and ISO/IEEE 11073 DIM (Domain Information Model), standards for the transmission of health informatics. For the implementation, the OM2M platform, which is based on the oneM2M standards, has been used. To evaluate the efficiency of transfer syntaxes between the healthcare device and OM2M platform, we have implemented comparative performance evaluation between HTTP and CoAP, and also between XML and JSON by comparing the packet size and number of packets in one transaction.

Impact of Macroeconomic Factors on Terminal Operators' Profit: Focusing on Global Terminal Operators (거시경제지표가 터미널운영사 재무성과에 미치는 영향 분석: 글로벌터미널운영사 중심으로)

  • Lee, Joo-Ho;Yun, Won Young;Park, Ju Dong
    • Journal of Korea Port Economic Association
    • /
    • v.36 no.1
    • /
    • pp.129-140
    • /
    • 2020
  • In the future, the global container handling market will be reorganized into larger ships and shipping alliances, and the bargaining power of shipping companies will be further strengthened. Therefore, the global terminal operator (GTO), which has a global network, vast experience, and operational know-how, is expected to strengthen its competitiveness. In Korea, the central government promoted the development of GTOs in the mid-2000s, but it failed, mainly due to disagreements between port stakeholders. In this study, the macroeconomic indicators that have the same effect in all regions were used to analyze GTO management performance. In the short term, it could be used to establish the business strategy of domestic terminal operators based on changes in macroeconomic indicators. In the long term, it would be used to establish a promotion strategy for GTOs in Korea. The results of analyzing the impact of macroeconomic indicators on the GTO's profit show that the GTO's profit is significantly affected by cargo handling capacity, the consumer price index of the United States, the Shanghai Composite Index, the Crude Oil Price, and the London Inter-bank Offered Rate (LIBOR). However, the scale of impact was not significantly different between public and private GTOs.

Calculation and measurement of optical coupling coefficient for bi-directional tancceiver module (양방향 송수신모듈 제작을 위한 광결합계수의 계산 및 측정)

  • Kim, J. D.;Choi, J. S.;Lee, S. H.;Cho, H. S.;Kim, J. S.;Kang, S. G.;Lee, H. T.;Hwang, N.;Joo, G. C.;Song, M. K.
    • Korean Journal of Optics and Photonics
    • /
    • v.10 no.6
    • /
    • pp.500-506
    • /
    • 1999
  • We designed and fabricated a bidirectional optical transceiver module for low cost access network. An integrated chip forming a pin-PD on an 1.3 urn FP-LD was assembled by flip-chip bonding on a Si optical bench, a single mode fiber with an angled end facet was aligned passively with the integrated chip on V-groove of Si-optical bench. Gaussian beam theory was applied to evaluate the coupling coefficients as a function of some parameters such as alignment distance, angle of fiber end facet, vertical alignment error. The theory is also used to search the bottle-neck between transmittance and receiving coupling efficiency in the bi-directional optical system. Tn this paper, we confirmed that reduction of coupling efficiency by the vertical alignment error between laser beam and fiber core axis can be compensated by controlling the fiber facet angle. In the fabrication of sub-module, a'||'&'||' we made such that the fiber facet have a corn shape with an angled facet only core part, the reflection of transmitted laser beam from the fiber facet could be minimized below -35 dE in alignment distance of 2: 30 /J.m. In the same condition, transmitted output power of -12.1 dEm and responsivity of 0.2. AIW were obtained.

  • PDF

Multi-User X-Channel Interference Alignment in 5 Generation MIMO Mobile Communications (5세대 MIMO 이동 통신의 다중 사용자 X 채널 간섭 정렬)

  • Kim, Jeong-Su;Lee, Moon Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.61-69
    • /
    • 2017
  • The study on interference channel is very important information theoretically and many studies have been done on it. However, even in the simplest case, even in the case of two user interfering channels, the channel capacity is not yet known except in special cases. Recently, research on the multiplexing gain that shows the tendency of the transmission rate in the high signal to noise ratio (SNR) band has been actively carried out, instead of accurately grasping the channel capacity. Obtaining optimal multiplexing gain can reveal trends in channel capacity at high signal-to-noise ratio bands. In an interfering channel with two users, the best multiplexing gain can be obtained by eliminating the interference. However, recent research shows that when the number of users is more than three, the optimal multiplexing gain can not be obtained only by zero forcing and a new technique called interference sorting is needed. There are two types of interference sorting techniques. Beamforming A method of effectively separating signals and interference by properly selecting matrices and constructing structured codes using rational numbers and irrational numbers. The interference alignment technique can achieve optimal multiplexing gain in various environments such as interference channel, X channel, compound broadcast channel, and multi hop network for multi source multi destination. In recent years, it has also been applied to distributed storage. Lee et al., "Lattice Code Interference Alignment in Cooperative Multipoint Transmission (COMP) for Interference Channels of Three Users", Journal of the Institute of Electronics Engineers, vol.49-TC,no.6,2012. In this paper, the DoF of delayed channel information is obtained.

A Design and Implementation of NFC Bridge Chip (NFC 브릿지 칩 설계 및 구현)

  • Lee, Pyeong-Han;Ryu, Chang-Ho;Chun, Sung-Hun;Kim, Sung-Wan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.96-101
    • /
    • 2015
  • This paper describes a design and implementation of the NFC bridge chip which performs interface between kinds of devices and mobile phones including NFC controller through NFC communication. The NFC bridge chip consists of the digital part and the analog part which are based on NFC Forum standard. Therefore the chip treats RF signals and then transforms the signal to digital data, so it can interface kinds of devices with the digital data. Especially the chip is able to detect RF signals and then wake up the host processor of a device. The wakeup function dramatically decreases the power consumption of the device. The carrier frequency is 13.56MHz, and the data rate is up to 424kbps. The chip has been fabricated with SMIC 180nm mixed-mode technology. Additionally an NFC bridge chip application to the blood glucose measurement system is described for an application example.

Design and Implementation of an Alternate System Interconnect based on PCI Express (PCI Express 기반 시스템 인터커넥트의 설계 및 구현)

  • Kim, Young Woo;Ren, Ye;Choi, WonHyuk
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.8
    • /
    • pp.74-85
    • /
    • 2015
  • PCI Express is a well-known and widely used de-facto system bus standard for connecting among a processor and IO devices. PCI Express is originated from old PCI standard, and its most of applications are limited to be used within a PC or server system. But, because of its fast speed, low power consumption, and good protocol efficiency, it is considered as one of a good candidate for an alternate system interconnect for many years. In this paper, we present design, implementation and early evaluation of an alternate system interconnect by utilizing PCI Express. The developed alternate system interconnect using PCI Express (named PCIeLINK) utilizes non-transparent bridging (NTB) technic which generally used in fail-over system in PCI and PCI Express. By using NTB technic, PCI Express device can be extended to outside of a system without electrical and logical problems arising during system boot and enumeration. To build up an alternate system interconnect, we designed and implemented a network interface card having multiple PCI Express ${\times}4$ connections (theoretically 20 Gbps) and tested, The early test results revealed that an ${\times}4$ port in the card showed 8.6 Gbps peak performance for bulk transmission and 5.1 Gbps peak for normal TCP/IP transfer.

Random Noise Addition for Detecting Adversarially Generated Image Dataset (임의의 잡음 신호 추가를 활용한 적대적으로 생성된 이미지 데이터셋 탐지 방안에 대한 연구)

  • Hwang, Jeonghwan;Yoon, Ji Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.629-635
    • /
    • 2019
  • In Deep Learning models derivative is implemented by error back-propagation which enables the model to learn the error and update parameters. It can find the global (or local) optimal points of parameters even in the complex models taking advantage of a huge improvement in computing power. However, deliberately generated data points can 'fool' models and degrade the performance such as prediction accuracy. Not only these adversarial examples reduce the performance but also these examples are not easily detectable with human's eyes. In this work, we propose the method to detect adversarial datasets with random noise addition. We exploit the fact that when random noise is added, prediction accuracy of non-adversarial dataset remains almost unchanged, but that of adversarial dataset changes. We set attack methods (FGSM, Saliency Map) and noise level (0-19 with max pixel value 255) as independent variables and difference of prediction accuracy when noise was added as dependent variable in a simulation experiment. We have succeeded in extracting the threshold that separates non-adversarial and adversarial dataset. We detected the adversarial dataset using this threshold.

A Study on Hybrid Expressed in Modern Fashion - Focusing on the End of 1990s - (현대패션에 표현된 하이브리드 경향 연구 - 1990년대 후반을 중심으로 -)

  • 임영자;한윤숙
    • Journal of the Korean Society of Costume
    • /
    • v.51 no.5
    • /
    • pp.113-134
    • /
    • 2001
  • This study was carried out with an objective to prepare the framework of conformity for the 21st century modern fashion, which is interactive with mankind, based on a position that the 21st century contemporary fashion with its amalgamating trend of diversified artistic forms may not be elucidated on a standpoint centering on one certain modality. The hybrid fashion trend of historical modality which provides freedom and satisfaction in creation of an individuals expressive power in expressing true desire of mans inside through man-centered thought of the times has made multifarious motives of the past and present fragmentary. It thus extracts inner divisions and the concept of consolidation through three-dimensional form. Modern fashion is newly interpreted by the material and details of high technologies. and is harmonized by mix and match with various expressions. By having it, it is being expressed together with many types of dresses and ornaments. Modern fashion is being expressed together with many types of dresses and ornaments by new interpretations with the material and details of high technologies and by being harmonized with mix and match with various expressions. The hybrid fashion design trend of regional elements formed by stimuli and contacts of diverse local culture by globalization of network that was achieved by scientific technologies of the contemporary information society has disintegrated varied boundaries in the conventional culture by the latest communication technology-new media on the basis of newly created culture. The fact that regional elements could be expressed as if they were interrelated without each being deprived of originality may be explained with an interpretation on pluralism. The hybrid fashion design trend of cultural aspect, which manifests in the background of scientific technological culture as it transcends the societal-cultural boundaries based on the de-centralization theory of Frederic Jameson, has supplemented the imperfect meanings through conversional correlation with other forms and internal program changes. The middle stratal and polyhedral characteristics are seen as each cultural element is dismantled and reassembled by application of 'multiple-time point expression'. Design forming method is not to bring destruction from outside, but to embrace instability and chaos through radical dismantling of the inside. and to pursue diversity and openness. Thus. it is implemented by an approach that takes the role of design process. In communication of discontinuity, continuity was dismantled through forms of mixing, overlap, perversion, insertion and coincidence.

  • PDF