• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.024 seconds

Modeling and Trends of Road Transport Development in Eastern European Countries

  • Viktoriia Harkava;Olena Pylypenko;Oleksandr Haisha;Armen Aramyan;Volodymyr Kairov
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.3
    • /
    • pp.189-195
    • /
    • 2024
  • Road transport occupies the largest share in domestic and international transport. It is of key importance for the development of the economy, forasmuch as it provides the livelihood of the population, the development of the national economy, the possibility of establishing foreign economic relations. The purpose of the research is as follows: analysis of the current state of functioning of the road transport sector in Eastern Europe and identification of key problems and trends in its development. Research methods: Methods of grouping, comparison and generalization, correlation analisys have been used to identify the dynamics of the main indicators of road transport in Eastern Europe. The method of correlation-regression analysis has been applied to determine the impact of increasing the length of roads on the turnover of the road freight transport and the number of employed population in this area. Results. It has been found that the increase in the employed population by 96% and increase in revenues from transportation and storage of goods, postal and courier services (turnover of the road freight transport - in the original language) in the field of road transport by 82% is explained by the change in transport infrastructure capacity by increasing length of highways. According to the correlation analysis, it has been revealed that there is a high direct dependence between the length of roads and increased revenues from transportation and storage of goods in the field of road transport, as well as between the length of roads and increasing employment in this area.

Status and Improvement Plans for Sidewalk Safety Facilities (Barrier) in Child Protection Area (어린이보호구역 내 보도안전시설(방호울타리) 설치 현황 및 개선 방안)

  • Bong-Chul Joo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.4
    • /
    • pp.137-145
    • /
    • 2023
  • Accidents involving deaths of children and pedestrians continue to occur in child protection zones, also known as school zones. Over the three years from 2019 to 2021, 11 child deaths occurred in school zones in Korea. In December 2022, a fatal accident occurred among an elementary school student in a school zone near an elementary school in Gangnam-gu, Seoul. In April 2023, an accident occurred in which an elementary school student died in a school zone near Seo-gu Middle School in Daejeon and an elementary school in Yeongdo-gu, Busan. Until recently, child deaths continued to occur on sidewalks in child protection zones. It is time to closely review the status of safety facilities installed in school zones and related regulations. We investigated and analyzed the current status of safety facilities and related regulations installed on sidewalks in child protection zones in Korea, and identified matters necessary for institutional improvement regarding safety facilities for sidewalks in child protection zones.

Segmentation of Mammography Breast Images using Automatic Segmen Adversarial Network with Unet Neural Networks

  • Suriya Priyadharsini.M;J.G.R Sathiaseelan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.151-160
    • /
    • 2023
  • Breast cancer is the most dangerous and deadly form of cancer. Initial detection of breast cancer can significantly improve treatment effectiveness. The second most common cancer among Indian women in rural areas. Early detection of symptoms and signs is the most important technique to effectively treat breast cancer, as it enhances the odds of receiving an earlier, more specialist care. As a result, it has the possible to significantly improve survival odds by delaying or entirely eliminating cancer. Mammography is a high-resolution radiography technique that is an important factor in avoiding and diagnosing cancer at an early stage. Automatic segmentation of the breast part using Mammography pictures can help reduce the area available for cancer search while also saving time and effort compared to manual segmentation. Autoencoder-like convolutional and deconvolutional neural networks (CN-DCNN) were utilised in previous studies to automatically segment the breast area in Mammography pictures. We present Automatic SegmenAN, a unique end-to-end adversarial neural network for the job of medical image segmentation, in this paper. Because image segmentation necessitates extensive, pixel-level labelling, a standard GAN's discriminator's single scalar real/fake output may be inefficient in providing steady and appropriate gradient feedback to the networks. Instead of utilising a fully convolutional neural network as the segmentor, we suggested a new adversarial critic network with a multi-scale L1 loss function to force the critic and segmentor to learn both global and local attributes that collect long- and short-range spatial relations among pixels. We demonstrate that an Automatic SegmenAN perspective is more up to date and reliable for segmentation tasks than the state-of-the-art U-net segmentation technique.

Research on Artificial Intelligence Based De-identification Technique of Personal Information Area at Video Data (영상데이터의 개인정보 영역에 대한 인공지능 기반 비식별화 기법 연구)

  • In-Jun Song;Cha-Jong Kim
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.19 no.1
    • /
    • pp.19-25
    • /
    • 2024
  • This paper proposes an artificial intelligence-based personal information area object detection optimization method in an embedded system to de-identify personal information in video data. As an object detection optimization method, first, in order to increase the detection rate for personal information areas when detecting objects, a gyro sensor is used to collect the shooting angle of the image data when acquiring the image, and the image data is converted into a horizontal image through the collected shooting angle. Based on this, each learning model was created according to changes in the size of the image resolution of the learning data and changes in the learning method of the learning engine, and the effectiveness of the optimal learning model was selected and evaluated through an experimental method. As a de-identification method, a shuffling-based masking method was used, and double-key-based encryption of the masking information was used to prevent restoration by others. In order to reuse the original image, the original image could be restored through a security key. Through this, we were able to secure security for high personal information areas and improve usability through original image restoration. The research results of this paper are expected to contribute to industrial use of data without personal information leakage and to reducing the cost of personal information protection in industrial fields using video through de-identification of personal information areas included in video data.

Trends in Cryptocurrency Custody Services and Evaluation Guidelines for DeFi Protocols' Custody Poten (가상자산 커스터디 서비스의 최신 동향 및 DeFi 프로토콜 커스터디 가능성 평가 가이드라인 제시)

  • Hyunggeun Lee;Moonho Joo;Jihun Lim;Beomjoong Kim;Kiseok Jeon;Junsik Sim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.811-831
    • /
    • 2024
  • This paper has two main objectives. The primary objective is to conduct a comprehensive review of existing survey papers on the advantages, disadvantages, taxonomy, and technical vulnerabilities of cryptocurrency custody services. Additionally, we examined recent regulatory developments, the application of existing frameworks, conditions for performing custody services, and service providers' obligations. The secondary objective is to identify DeFi protocols in the regulatory 'grey area' and analyze their technical aspects and governance mechanisms. By synthesizing these findings, we propose guidelines for assessing DeFi decentralization and their potential for integration within the regulatory framework, providing insights for industry experts, regulators, and policymakers to balance industry needs with societal benefits.

A Flexible Protection Technique of an Object Region Using Image Blurring (영상 블러링을 사용한 물체 영역의 유연한 보호 기법)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.6
    • /
    • pp.84-90
    • /
    • 2020
  • As the uploading and downloading of data through the Internet is becoming more common, data including personal information are easily exposed to unauthorized users. In this study, we detect a target area in images that contain personal information, except for the background, and we protect the detected target area by using a blocking method suitable for the surrounding situation. In this method, only the target area from color image input containing personal information is segmented based on skin color. Subsequently, blurring of the corresponding area is performed in multiple stages based on the surrounding situation to effectively block the detected area, thereby protecting the personal information from being exposed. Experimental results show that the proposed method blocks the object region containing personal information 2.3% more accurately than an existing method. The proposed method is expected to be utilized in fields related to image processing, such as video security, target surveillance, and object covering.

Interrelationship Between Regional Population Migration, Crop Area, and Foreign Workers (지역 간 인구이동, 경지면적, 외국인 근로자의 관계 분석)

  • Seojin Cho;Heeyeun Yoon
    • Journal of the Korean Regional Science Association
    • /
    • v.40 no.2
    • /
    • pp.21-38
    • /
    • 2024
  • Understanding the interrelationship between regional population dynamics and cultivated land is crucial for promoting regional economic vitality and enhancing food security. While prior research often addressed population migration and changes in crop area separately, this study employs a Panel Vector Auto Regression Model to examine the dynamic interaction between regional population shifts, changes in crop area, and the influx of foreign workers in agriculture. The results reveal a reciprocal relationship between population influx and crop area, indicating a negative impact on each other. Moreover, the analysis demonstrates that an expansion in crop area, particularly in field cultivation, significantly correlates with an increase in foreign workers. These findings underscore the mutual influence of labor shortages and diminished land availability in agriculture, with the influx of foreign workers potentially offering a positive impact on addressing structural challenges in rural areas.

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

Data Source Management using weight table in u-GIS DSMS

  • Kim, Sang-Ki;Baek, Sung-Ha;Lee, Dong-Wook;Chung, Warn-Il;Kim, Gyoung-Bae;Bae, Hae-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.27-33
    • /
    • 2009
  • The emergences of GeoSensor and researches about GIS have promoted many researches of u-GIS. The disaster application coupled in the u-GIS can apply to monitor accident area and to prevent spread of accident. The application needs the u-GIS DSMS technique to acquire, to process GeoSensor data and to integrate them with GIS data. The u-GIS DSMS must process big and large-volume data stream such as spatial data and multimedia data. Due to the feature of the data stream, in u-GIS DSMS, query processing can be delayed. Moreover, as increasing the input rate of data in the area generating events, the network traffic is increased. To solve this problem, in this paper we describe TRIGGER ACTION clause in CQ on the u-GIS DSMS environment and proposes data source management. Data source weight table controls GES information and incoming data rate. It controls incoming data rate as increasing weight at GES of disaster area. Consequently, it can contribute query processing rate and accuracy

  • PDF

Social Network Analysis of author's interest area in Journals about Computer (컴퓨터 분야 논문지에서 저자의 관심분야에 대한 소셜 네트워크 분석)

  • Lee, Ju-Yeon;Park, Yoo-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.193-199
    • /
    • 2016
  • Recently there are many researches about analyzing the interaction between entities by social network analysis in various fields. In this paper, we are going to analyze the author's interests area at the biography section in Journal of the Korea Institute of Information and Communication Engineering by social network analysis. The results show that many authors in that journal are mainly focusing on embedded, security, image processing, wireless network, big data, USN, network, RFID.