• Title/Summary/Keyword: Research Information Systems

Search Result 12,228, Processing Time 0.05 seconds

Cognitive Radio Anti-Jamming Scheme for Security Provisioning IoT Communications

  • Kim, Sungwook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4177-4190
    • /
    • 2015
  • Current research on Internet of Things (IoT) has primarily addressed the means to enhancing smart resource allocation, automatic network operation, and secure service provisioning. In particular, providing satisfactory security service in IoT systems is indispensable to its mission critical applications. However, limited resources prevent full security coverage at all times. Therefore, these limited resources must be deployed intelligently by considering differences in priorities of targets that require security coverage. In this study, we have developed a new application of Cognitive Radio (CR) technology for IoT systems and provide an appropriate security solution that will enable IoT to be more affordable and applicable than it is currently. To resolve the security-related resource allocation problem, game theory is a suitable and effective tool. Based on the Blotto game model, we propose a new strategic power allocation scheme to ensure secure CR communications. A simulation shows that our proposed scheme can effectively respond to current system conditions and perform more effectively than other existing schemes in dynamically changeable IoT environments.

The Implementation of EDMS of “A“company

  • Kang, Woojun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.4 no.1
    • /
    • pp.77-86
    • /
    • 1999
  • This paper is to introduce the definition and background of EDMS and present real customer project in manufacturing industry as reference. EDMS has DM, Workflow, Imaging and COLD as key components and should be interconnected with many advanced technology, such as SAP, PDM and KMS. Managing and controlling documents is an important part of business success. The number of electronic documents in use in the workplace is escalating rapidly, making it difficult for conventional IT systems to take full advantage of the benefits of digital documentation "A"company implemented DM and Workflow based on groupware So, all of SPECs and drawings could be easily stored and accessed via LMS. Also, the cycletime of ECN/DCN process could be reduced to one or two days from one or two weeks more The overhead resources from the managing documents and involving with work process could be re-deployed to the more productive positions and the increasing of revenue is expected soon because of the competitiveness. "A"company is expected to have more benefits, that is, lots of tangible and intangible benefits from now on.

  • PDF

Security Method for Approval Process of Payment System (지불시스템의 승인단계에서 보안방안)

  • 임인채;위장현
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.4
    • /
    • pp.59-65
    • /
    • 2002
  • Payment systems in EC need confidentiality, integrity, non-repudiation. All transactions between cardholders and merchants must be authorized by a payment gateway in SET protocol. RSA secret key operation which requires heavy computation takes the most part of the time for payment authorization. For the reason, a heavy traffic of payment authorization requests from merchants causes the payment gateway to execute excessive RSA secret key operations, which may cause the bottleneck of the whole system. To resolve this problem, One-Time Password technique is applied to payment authorization step of the SET protocol.

  • PDF

Research on Finite-Time Consensus of Multi-Agent Systems

  • Chen, Lijun;Zhang, Yu;Li, Yuping;Xia, Linlin
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.251-260
    • /
    • 2019
  • In order to ensure second-order multi-agent systems (MAS) realizing consensus more quickly in a limited time, a new protocol is proposed. In this new protocol, the gradient algorithm of the overall cost function is introduced in the original protocol to enhance the connection between adjacent agents and improve the moving speed of each agent in the MAS. Utilizing Lyapunov stability theory, graph theory and homogeneity theory, sufficient conditions and detailed proof for achieving a finite-time consensus of the MAS are given. Finally, MAS with three following agents and one leading agent is simulated. Moreover, the simulation results indicated that this new protocol could make the system more stable, more robust and convergence faster when compared with other protocols.

Intrusion Detection System for Home Windows based Computers

  • Zuzcak, Matej;Sochor, Tomas;Zenka, Milan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4706-4726
    • /
    • 2019
  • The paper is devoted to the detailed description of the distributed system for gathering data from Windows-based workstations and servers. The research presented in the beginning demonstrates that neither a solution for gathering data on attacks against Windows based PCs is available at present nor other security tools and supplementary programs can be combined in order to achieve the required attack data gathering from Windows computers. The design of the newly proposed system named Colander is presented, too. It is based on a client-server architecture while taking much inspiration from previous attempts for designing systems with similar purpose, as well as from IDS systems like Snort. Colander emphasizes its ease of use and minimum demand for system resources. Although the resource usage is usually low, it still requires further optimization, as is noted in the performance testing. Colander's ability to detect threats has been tested by real malware, and it has undergone a pilot field application. Future prospects and development are also proposed.

Research on key management for supervisory control and data acquisition system (원격 감시 제어시스템에서 키 관리 방안 연구)

  • Lee, Keonjik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.4
    • /
    • pp.29-42
    • /
    • 2020
  • SCADA (Supervisory Control and Data Acquisition) systems for remote monitoring, data acquisition and control are applied to major industrial infrastructures including power, water and railroad. Recently, there are many researches on key management scheme for secure communication due to change to the open network environment. These systems are located at far distances and are connected to the main control center through various types of communication methods. Due to the nature of these systems, they are becoming the significant targets of cyber attack. We propose an efficient key management scheme which is established on ID-based cryptosystem without an expensive computation on MTU (Master Terminal Unit), Sub-MTU, and RTU (Remote Terminal Unit). The proposed method is secure and effective in key management among multiple legitimate devices.

A Systematic Literature Review on Security Challenges In Image Encryption Algorithms for Medical Images

  • Almalki, Nora;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.75-82
    • /
    • 2022
  • Medical data is one of the data that must be kept in safe containers, far from intrusion, viewing and modification. With the technological developments in hospital systems and the use of cloud computing, it has become necessary to save, encrypt and even hide data from the eyes of attackers. Medical data includes medical images, whether they are x-ray images of patients or others, or even documents that have been saved in the image format. In this review, we review the latest research and the latest tools and algorithms that are used to protect, encrypt and hide these images, and discuss the most important challenges facing these areas.

Status of Navigation Satellite System Services and Signals (위성항법시스템 서비스 및 신호 현황)

  • K. Han;E. Bang;H. Lim;S. Lee;S. Park
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.2
    • /
    • pp.12-25
    • /
    • 2023
  • Positioning, navigation, and timing information has become a key element in the national core infrastructure and for emerging technologies, such as autonomous driving, lunar exploration, financial systems, and drones. Therefore, the provision of that information by navigation satellite systems is becoming increasingly important. Existing systems such as GPS (Global Positioning System), GLONASS (GLObal NAvigation Satellite System), and BDS (BeiDou Navigation Satellite System) also provide augmentation, safety-of-life, search & rescue and short message communication and authentication services to increase their competitiveness. Those services and the signals generated for their provision have their own purpose and requirements. This article presents an overview of existing or planned satellite navigation satellite system services and signals, aiming to help understand their current status.

Detection of Anomaly Lung Sound using Deep Temporal Feature Extraction (깊은 시계열 특성 추출을 이용한 폐 음성 이상 탐지)

  • Kim-Ngoc T. Le;Gyurin Byun;Hyunseung Choo
    • Annual Conference of KIPS
    • /
    • 2023.11a
    • /
    • pp.605-607
    • /
    • 2023
  • Recent research has highlighted the effectiveness of Deep Learning (DL) techniques in automating the detection of lung sound anomalies. However, the available lung sound datasets often suffer from limitations in both size and balance, prompting DL methods to employ data preprocessing such as augmentation and transfer learning techniques. These strategies, while valuable, contribute to the increased complexity of DL models and necessitate substantial training memory. In this study, we proposed a streamlined and lightweight DL method but effectively detects lung sound anomalies from small and imbalanced dataset. The utilization of 1D dilated convolutional neural networks enhances sensitivity to lung sound anomalies by efficiently capturing deep temporal features and small variations. We conducted a comprehensive evaluation of the ICBHI dataset and achieved a notable improvement over state-of-the-art results, increasing the average score of sensitivity and specificity metrics by 2.7%.

Application of AI-based Customer Segmentation in the Insurance Industry

  • Kyeongmin Yum;Byungjoon Yoo;Jaehwan Lee
    • Asia pacific journal of information systems
    • /
    • v.32 no.3
    • /
    • pp.496-513
    • /
    • 2022
  • Artificial intelligence or big data technologies can benefit finance companies such as those in the insurance sector. With artificial intelligence, companies can develop better customer segmentation methods and eventually improve the quality of customer relationship management. However, the application of AI-based customer segmentation in the insurance industry seems to have been unsuccessful. Findings from our interviews with sales agents and customer service managers indicate that current customer segmentation in the Korean insurance company relies upon individual agents' heuristic decisions rather than a generalizable data-based method. We propose guidelines for AI-based customer segmentation for the insurance industry, based on the CRISP-DM standard data mining project framework. Our proposed guideline provides new insights for studies on AI-based technology implementation and has practical implications for companies that deploy algorithm-based customer relationship management systems.