• Title/Summary/Keyword: Research Security Information Requirements

Search Result 190, Processing Time 0.022 seconds

Development of Career Management System with Rewarding Policy Considering the Ethereum Blockchain Performance (이더리움 블록체인의 성능을 고려한 보상정책을 갖는 이력관리 시스템 개발)

  • Jung-Min Hong;Ye-Jin Kim;Yu-Jeong Kim;Hye-Jeong Park;Eun-Seong Kang;Hyung-Jong Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.4
    • /
    • pp.59-67
    • /
    • 2023
  • Private blockchains can apply enhanced security policies that allow only authorized users to participate in the blockchain network. In addition, when used in a career management system where the validity of an individual's career is important, it has the suitable characteristics in terms of information integrity. However, due to the excessive performance requirements of blockchain technology, identifying performance characteristics through simulation can be helpful in stable operation of the system. This paper presents research results that utilized performance evaluation results while constructing a career management system based on the Ethereum blockchain. The service not only serves as a portfolio that records personal career development activities, certification acquisition, and award results, but also provides a community function for career planning to strengthen employment competitiveness. In addition, we present how a compensation policy can be executed to encourage users to participate in career development through community activities. In particular, an appropriate compensation policy was derived by reviewing changes in performance characteristics in accordance with the transaction volume on Geth nodes.

SDR Adaptation for Multimode Maritime Wireless Communications (다중모드 해상 무선통신 지원을 위한 SDR 적용 방안)

  • Kim, Jae-Myoung;Lee, Joa-Hyoung;Shim, Woo-Seong;Lee, Sang-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.173-176
    • /
    • 2011
  • New paradigm is based on the e-navigation policy which is the harmonised collection, integration, exchange, presentation and analysis of maritime information onboard and ashore by electronic means to enhance berth to berth navigation and related services, for safety and security at sea and protection of the marine environment. One of the requirements is seamless communications between various communication systems. So we need the maritime wireless communications based on the SDR technology. In this paper we analyse characteristics and issues of maritime wireless communication technology and service framework and propose a SDR based maritime system platform which can operate in multi-mode.

  • PDF

A Method of Comparing Risk Similarities Based on Multimodal Data (멀티모달 데이터 기반 위험 발생 유사성 비교 방법)

  • Kwon, Eun-Jung;Shin, WonJae;Lee, Yong-Tae;Lee, Kyu-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.510-512
    • /
    • 2019
  • Recently, there have been growing requirements in the public safety sector to ensure safety through detection of hazardous situations or preemptive predictions. It is noteworthy that various sensor data can be analyzed and utilized as a result of mobile device's dissemination, and many advantages can be used in terms of safety and security. An effective modeling technique is needed to combine sensor data generated by smart-phones and wearable devices to analyze users' moving patterns and behavioral patterns, and to ensure public safety by fusing location-based crime risk data provided.

  • PDF

An Exploratory Study for the Development Plan of the National Defense Experiment Project Conducted by the Navy (해군에서 수행하는 국방 실험사업 발전방안을 위한 탐색적 연구)

  • Woo, Dongsung;Lee, Boram;Ryu, Jaehak;Kim, Dongho
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.151-162
    • /
    • 2021
  • Since 2012, the Navy has been conducting a defense experiment project to evaluate the possibility of military application by introducing new technologies related to excellent private informatization in the defense field. There are many projects that have spread because they are suitable for military use, but some have ended as experimental projects themselves because they do not meet the military's required performance. Continuous development is required as increasing the spread rate by successfully carrying out defense experiment projects is the basis for defense reform. This study analyzed the performance of major projects carried out by the Navy and presented considerations for the development of defense experiment projects to be carried out by the Navy in the future. The main achievements were derived in various ways in terms of project performance and system operation, and the considerations can be summarized in the field of raising business requirements, securing resources for system operation, determining the size of companies for project execution, and security measures. The research results can be used as data to determine the required defense experiment project and efficiently carry out the project.

Virtual Go to School (VG2S): University Support Course System with Physical Time and Space Restrictions in a Distance Learning Environment

  • Fujita, Koji
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.137-142
    • /
    • 2021
  • Distance learning universities provide online course content. The main methods of providing class contents are on-demand and live-streaming. This means that students are not restricted by time or space. The advantage is that students can take the course anytime and anywhere. Therefore, unlike commuting students, there is no commuting time to the campus, and there is no natural process required to take classes. However, despite this convenient situation, the attendance rate and graduation rate of distance learning universities tend to be lower than that of commuting universities. Although the course environment is not the only factor, students cannot obtain a bachelor's degree unless they fulfill the graduation requirements. In both commuter and distance learning universities, taking classes is an important factor in earning credits. There are fewer time and space constraints for distance learning students than for commuting students. It is also easy for distance learning students to take classes at their own timing. There should be more ease of learning than for students who commute to school with restrictions. However, it is easier to take a course at a commuter university that conducts face-to-face classes. I thought that the reason for this was that commuting to school was a part of the process of taking classes for commuting students. Commuting to school was thought to increase the willingness and motivation to take classes. Therefore, I thought that the inconvenient constraints might encourage students to take the course. In this research, I focused on the act of commuting to school by students. These situations are also applied to the distance learning environment. The students have physical time constraints. To achieve this goal, I will implement a course restriction method that aims to promote the willingness and attitude of students. Therefore, in this paper, I have implemented a virtual school system called "virtual go to school (VG2S)" that reflects the actual route to school.

Transformation of Legal Personality in the Context of the Development of Modern Digital Technologies

  • Amelin, Roman;Channov, Sergey;Dobrobaba, Marina;Kalinina, Larisa;Kholodnaya, Elena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.294-302
    • /
    • 2022
  • The article explores the prospects and trends for the transformation of some basic concepts of law associated with the development of artificial intelligence systems and the problems of liability for harm caused by a robot. The prospects, conditions and consequences of vesting robots with partial (quasi) or full legal personality are explored. This process should lead to a revision of the concepts of will, subjective side and legal responsibility in the direction of their greater universalization. The legally significant signs of will, legal personality, legal liability in relation to robots, artificial intelligence systems and other complex automated information systems are clarified. The author identifies the following essential factors of legal qualification of an act committed by a robot: goals, reasons for setting goals, connections between the planned result and the action taken, the actual result, the reasons for the difference between the actual result and the planned one. The article pays special attention to the preventive function of legal liability, which, when applied to robot subjects, can be expressed in the following basic procedures. 1. Accounting for legal requirements in the behavior of the robot. 2. Timely adaptation of the robot to changes in legislation and other regulatory legal acts that affect its behavior. 3. Accounting for incidents. 4. Destruction of a series of robots whose actions lead to unacceptable consequences.

Business Strategies for Korean Private Security-Guard Companies Utilizing Resource-based Theory and AHP Method (자원기반 이론과 AHP 방법을 활용한 민간 경호경비 기업의 전략 연구)

  • Kim, Heung-Ki;Lee, Jong-Won
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.177-200
    • /
    • 2013
  • As we enter a high industrial society that widens the gap between the rich and poor, demand for the security services has grown explosively. With the growth in quantitative expansion of security services, people have also placed increased requirements on more sophisticated and diversified security services. Consequently, market outlook for private security services industry is positive. However, Korea's private security services companies are experiencing difficulties in finding a direction to capture this new market opportunity due to their small sizes and lack of management-strategic thinking skills. Therefore, we intend to offer a direction of development for our private security services industry using a management-strategy theory and the Analytic Hierarchy Process(AHP), a structured decision-making method. A resource-based theory is one of the important management strategy theories. It explains that a company's overall performance is primarily determined by its competitive resources. Using this theory, we could analyze a company's unique resources and core competencies and set a strategic direction for the company accordingly. The usefulness and validity of this theory has been demonstrated as it has often been subject to empirical verification since 1990s. Based on this theory, we outlined a set of basic procedures to establish a management strategy for the private security services companies. We also used the AHP method to identify competitive resources, core competencies, and strategies from private security services companies in contrast with public companies. The AHP method is a technique that can be used in the decision making process by quantifying experts' knowledge and unstructured problems. This is a verified method that has been used in the management decision making in the corporate environment as well as for the various academic studies. In order to perform this method, we gathered data from 11 experts from academic, industrial, and research sectors and drew distinctive resources, competencies, and strategic direction for private security services companies vis-a-vis public organizations. Through this process, we came to the conclusion that private security services companies generally have intangible resources as their distinctive resources compared with public organization. Among those intangible resources, relational resources, customer information, and technologies were analyzed as important. In contrast, tangible resources such as equipment, funds, distribution channels are found to be relatively scarce. We also found the competencies in sales and marketing and new product development as core competencies. We chose a concentration strategy focusing on a particular market segment as a strategic direction considering these resources and competencies of private security services companies. A concentration strategy is the right fit for smaller companies as a strategy to allow them to focus all of their efforts on target customers in a single segment. Thus, private security services companies would face the important tasks such as developing a new market and appropriate products for such market segment and continuing marketing activities to manage their customers. Additionally, continuous recruitment is required to facilitate the effective use of human resources in order to strengthen their marketing competency in a long term.

  • PDF

A Study on the Prediction Method of Information Exchange Requirement in the Tactical Network (전술네트워크의 정보교환요구량 예측 방법에 관한 연구)

  • Pokki Park;Sangjun Park;Sunghwan Cho;Junseob Kim;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.95-105
    • /
    • 2022
  • The Army, Navy, and Air Force are making various efforts to develop a weapon system that incorporates the 4th industrial revolution technology so that it can be used in multi-domain operations. In order to effectively demonstrate the integrated combat power through the weapon system to which the new technology is applied, it is necessary to establish a network environment in which each weapon system can transmit and receive information smoothly. For this, it is essential to analyze the Information Exchange Requirement(IER) of each weapon system, but many IER analysis studies did not sufficiently reflect the various considerations of the actual tactical network. Therefore, this study closely analyzes the research methods and results of the existing information exchange requirements analysis studies. In IER analysis, the size of the message itself, the size of the network protocol header, the transmission/reception structure of the tactical network, the information distribution process, and the message occurrence frequency. In order to be able to use it for future IER prediction, we present a technique for calculating the information exchange requirement as a probability distribution using the Poisson distribution and the probability generating function. In order to prove the validity of this technique, the results of the probability distribution calculation using the message list and network topology samples are compared with the simulation results using Network Simulator 2.

Research on unsupervised condition monitoring method of pump-type machinery in nuclear power plant

  • Jiyu Zhang;Hong Xia;Zhichao Wang;Yihu Zhu;Yin Fu
    • Nuclear Engineering and Technology
    • /
    • v.56 no.6
    • /
    • pp.2220-2238
    • /
    • 2024
  • As a typical active equipment, pump machinery is widely used in nuclear power plants. Although the mechanism of pump machinery in nuclear power plants is similar to that of conventional pumps, the safety and reliability requirements of nuclear pumps are higher in complex operating environments. Once there is significant performance degradation or failure, it may cause huge security risks and economic losses. There are many pumps mechanical parameters, and it is very important to explore the correlation between multi-dimensional variables and condition. Therefore, a condition monitoring model based on Deep Denoising Autoencoder (DDAE) is constructed in this paper. This model not only ensures low false positive rate, but also realizes early abnormal monitoring and location. In order to alleviate the influence of parameter time-varying effect on the model in long-term monitoring, this paper combined equidistant sampling strategy and DDAE model to enhance the monitoring efficiency. By using the simulation data of reactor coolant pump and the actual centrifugal pump data, the monitoring and positioning capabilities of the proposed scheme under normal and abnormal conditions were verified. This paper has important reference significance for improving the intelligent operation and maintenance efficiency of nuclear power plants.

The Design and Implementation of Access Control framework for Collaborative System (협력시스템에서의 접근제어 프레임워크 설계 및 구현)

  • 정연일;이승룡
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.10C
    • /
    • pp.1015-1026
    • /
    • 2002
  • As per increasing research interest in the field of collaborative computing in recent year, the importance of security issues on that area is also incrementally growing. Generally, the persistency of collaborative system is facilitated with conventional authentication and cryptography schemes. It is however, hard to meet the access control requirements of distributed collaborative computing environments by means of merely apply the existing access control mechanisms. The distributed collaborative system must consider the network openness, and various type of subjects and objects while, the existing access control schemes consider only some of the access control elements such as identity, rule, and role. However, this may cause the state of security level alteration phenomenon. In order to handle proper access control in collaborative system, various types of access control elements such as identity, role, group, degree of security, degree of integrity, and permission should be taken into account. Futhermore, if we simply define all the necessary access control elements to implement access control algorithm, then collaborative system consequently should consider too many available objects which in consequence, may lead drastic degradation of system performance. In order to improve the state problems, we propose a novel access control framework that is suitable for the distributed collaborative computing environments. The proposed scheme defines several different types of object elements for the accessed objects and subjects, and use them to implement access control which allows us to guarantee more solid access control. Futhermore, the objects are distinguished by three categories based on the characteristics of the object elements, and the proposed algorithm is implemented by the classified objects which lead to improve the systems' performance. Also, the proposed method can support scalability compared to the conventional one. Our simulation study shows that the performance results are almost similar to the two cases; one for the collaborative system has the proposed access control scheme, and the other for it has not.