• Title/Summary/Keyword: Research Security Information Requirements

Search Result 191, Processing Time 0.022 seconds

Design of Block Codes for Distributed Learning in VR/AR Transmission

  • Seo-Hee Hwang;Si-Yeon Pak;Jin-Ho Chung;Daehwan Kim;Yongwan Kim
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.4
    • /
    • pp.300-305
    • /
    • 2023
  • Audience reactions in response to remote virtual performances must be compressed before being transmitted to the server. The server, which aggregates these data for group insights, requires a distribution code for the transfer. Recently, distributed learning algorithms such as federated learning have gained attention as alternatives that satisfy both the information security and efficiency requirements. In distributed learning, no individual user has access to complete information, and the objective is to achieve a learning effect similar to that achieved with the entire information. It is therefore important to distribute interdependent information among users and subsequently aggregate this information following training. In this paper, we present a new extension technique for minimal code that allows a new minimal code with a different length and Hamming weight to be generated through the product of any vector and a given minimal code. Thus, the proposed technique can generate minimal codes with previously unknown parameters. We also present a scenario wherein these combined methods can be applied.

그룹의사결정지원을 위한 인터넷 기능개선 방향

  • Heo, Yeong-Jong
    • Asia pacific journal of information systems
    • /
    • v.6 no.2
    • /
    • pp.107-124
    • /
    • 1996
  • This research studied future directions of Internet technology toward supporting group decision making. From the previous research, this study classified requirements of group decision support systems into three categories which are information transfer, information provision, and communication control. For each of the category, this study analyzed the limits of current Internet functions. Next, this research discussed technological solutions, for each of the OSI 7 layers, toward supporting group decision making. Additional functions in Internet which are required for group supporting are tracing communications, application dependent coding, selection of communication modes, and security handling. For high speed data communication in Internet, this research discussed the potential of cell-switching technology for the lower level link in Internet. The conclusions of this research can be used for designing future group decision support systems and development of Internet.

  • PDF

A Secure Active Packet Transfer using Cryptographic Techniques (암호 기술을 이용한 안전한 능동 패킷 전송)

  • 김영수;나중찬;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.135-145
    • /
    • 2002
  • Active networks represent a new approach to network architecture. Nodes(routers, switches, etc.) can perform computations on user data, while packets can carry programs to be executed on nodes and potentially change the state of them. While active networks provide a flexible network iufrastructure, they are more complex than traditional networks and raise considerable security problems. Nodes are Public resources and are essential to the proper and contract running of many important systems. Therefore, security requirements placed upon the computational environment where the code of packets will be executed must be very strict. Trends of research for active network security are divided into two categories: securing active nodes and securing active packets. For example, packet authentication or monitoring/control methods are for securing active node, but some cryptographic techniques are for the latter. This paper is for transferring active packets securely between active nodes. We propose a new method that can transfer active packets to neighboring active nodes securely, and execute executable code included in those packets in each active node. We use both public key cryptosystem and symmetric key cryptosystem in our scheme

Study of Pedagogical Practice and Teaching Experience in European Countries

  • Poplavskyi, Mykhailo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.252-258
    • /
    • 2022
  • Globalization, development of the information society, intensification of migration processes, and internationalization of education in recent years have significantly affected the international labour market and increased competition between professionals in various fields. Academic, research and teaching staff are currently facing rapid changes and growing demand for quality educational services. Under such conditions, educational institutions around the world pay particular attention to improving the quality of the educational process in order for their graduates to be able to compete in the international labour market. The study of the experience of teachers' professional training in advanced countries opens new opportunities for improving the system of pedagogical training in Ukraine in order to adapt it to the requirements of the European educational space. The progressive achievements of countries demonstrating a high level of teachers' professional training in accordance with international standards, having rich historical educational traditions are of considerable scientific interest; consequently, this contributes to their leadership in science and education at the regional and global levels. The purpose of the present academic paper lies in analysing the latest trends in exploring teaching experience in the European countries and performance review of passing by students and teachers of the program on studying of pedagogical practice and experience of teaching in the countries of Europe. Methodology. Analytical and empirical (questionnaire) methods were used in the research process. Results. According to the obtained results of the research, the advantages, the most common areas of educational programs and the wishes of the participants regarding the practical implementation of the experience were identified.

Study of Disaster Safety Information Protection using Digital Signage (디지털 사이니지를 활용한 재난안전 정보 보호에 대한 연구)

  • Lee, Suyeon;Ahn, Hyobeom
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.97-102
    • /
    • 2015
  • Recently, each country should operates a integrated disaster safety management system in order to reduce the damage, such as the world-natural disasters. In particular, research on digital signage use has been mad e by a method for transmitting a disaster warning message. In this paper, we tried to examine the security requirements that are required by the disaster safety netwo rk by looking at the digital signage concept and disaster safety management system. Also, in order to be tra nsmitted to the safe digital signage terminal a common alarm message in the disaster safety services using d igital signage, we propose a protocol that uses a public key authentication mechanism. The proposed protocol is to be safely displayed a common alarm message to the appropriate area.

A Conceptual Architecture for Ethic-Friendly AI

  • Oktian, Yustus-Eko;Brian, Stanley;Lee, Sang-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.9-17
    • /
    • 2022
  • The state-of-the-art AI systems pose many ethical issues ranging from massive data collection to bias in algorithms. In response, this paper proposes a more ethic-friendly AI architecture by combining Federated Learning(FL) and Blockchain. We discuss the importance of each issues and provide requirements for an ethical AI system to show how our solutions can achieve more ethical paradigms. By committing to our design, adopters can perform AI services more ethically.

A Study on the New RFP for the PMO-based Development of Next-Generation MIS (PMO 기반의 차세대 MIS개발을 위한 신RFP 작성 연구)

  • Han, Moonhee;Kim, Yousin;Kim, Dae Ho
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.11
    • /
    • pp.585-594
    • /
    • 2016
  • Information system development projects are increasingly enlarging in size and are becoming more complex in the development environment. The traditional approaches for the development of information system, however, haven't shown the expected performances in the management for them and many researchers have been trying to find a new approach for overcoming this challenges. And one of the new approaches is the PMO and it is introduced to solve the problems of project management and the related organizational, technical, and administrative problems. This study attempted to find the efficient information system establishment plan. In particular, this study wants to research the practicality of PMO and the detailed utilization plans. As a result, this study proposes the structure of project implementation, the requirements, the direction of the basic system design, the scope of system development, and the budgeting for the systems. It is expected to contribute the successful implementation of the project.

A Study on Utilizing SNS to Vitalize Smart Learning (스마트러닝 활성화를 위한 SNS활용 방안 연구)

  • Kang, Jung-Hwa
    • Journal of Digital Convergence
    • /
    • v.9 no.5
    • /
    • pp.265-274
    • /
    • 2011
  • Smart-Learning has been increasing with the growth of smartphone usage. Looking at previous research, this study established the concept of smart learning, current understanding of smart learning and the requirements for smart learning. Subsequently, It was established a concept of SNS, reviewing future education, self-directed learning by using social network, and suggests policies of vitalizing smart-learning by using SNS. In order to use SNS in smart learning, first it is proposed the need for smart learning laws and institutions, particularly with young people considering their emotions in order to expand what is proposed. secondly, the need for SNS usage to be socially and culturally relevant. third and finally, the need for strengthening information security with co-operation from the government.

Implementation of Audit Trail Service System for EDI Security (EDI 보안 감사 추적 서비스 시스템 구현)

  • Jeong, Gyeong-Ja;Kim, Gi-Jung;Seo, Gyeong-Ran;Ryu, Geun-Ho;Gang, Chang-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.754-766
    • /
    • 1997
  • In this paper,we implement the Audit Trail Service Sydtem for the EDI Security.It has solved a law dispute between enterprises by informations that have generated by the EDI serice systrm.The audit trail service sys-tem implemented for EDI security satisfied the requirements of audit and the protocol of the security serive of X.435 and X.400.The EDI Security Audit System consists of the event discrimiator,the audit recirder,the audit archiver,and the provider of audit services .The event discriminator classified the reansmitted data from the EDI network ot audit sercices.The audit recorder constructs an index that has combined time information wiht audit unformations which are classified by the event discriminator.ZThe audit archiver performas the vacumming of added audit imformations by passing time by passing time.The audit provider is a module that carries out the audit trail servies by using stored audit informations. The audit provider suports audit servies,which are non-requdiation,proof and probe,controller of security,and accesing infrimation.The audit trail service system for EDI security constructs audit information by using index that is combining time imfromation,so it supports especially fast accesing audit information.

  • PDF

Anomaly Detection Using Visualization-based Network Forensics (비정상행위 탐지를 위한 시각화 기반 네트워크 포렌식)

  • Jo, Woo-yeon;Kim, Myung-jong;Park, Keun-ho;Hong, Man-pyo;Kwak, Jin;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.25-38
    • /
    • 2017
  • Many security threats are occurring around the world due to the characteristics of industrial control systems that can cause serious damage in the event of a security incident including major national infrastructure. Therefore, the industrial control system network traffic should be analyzed so that it can identify the attack in advance or perform incident response after the accident. In this paper, we research the visualization technique as network forensics to enable reasonable suspicion of all possible attacks on DNP3 control system protocol, and define normal action based rules and derive visualization requirements. As a result, we developed a visualization tool that can detect sudden network traffic changes such as DDoS and attacks that contain anormal behavior from captured packet files on industrial control system network. The suspicious behavior in the industrial control system network can be found using visualization tool with Digital Bond packet.