• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.023 seconds

Knowledge Representation Using Fuzzy Ontologies: A Survey

  • V.Manikandabalaji;R.Sivakumar
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.199-203
    • /
    • 2023
  • In recent decades, the growth of communication technology has resulted in an explosion of data-related information. Ontology perception is being used as a growing requirement to integrate data and unique functionalities. Ontologies are not only critical for transforming the traditional web into the semantic web but also for the development of intelligent applications that use semantic enrichment and machine learning to transform data into smart data. To address these unclear facts, several researchers have been focused on expanding ontologies and semantic web technologies. Due to the lack of clear-cut limitations, ontologies would not suffice to deliver uncertain information among domain ideas, conceptual formalism supplied by traditional. To deal with this ambiguity, it is suggested that fuzzy ontologies should be used. It employs Ontology to introduce fuzzy logical policies for ambiguous area concepts such as darkness, heat, thickness, creaminess, and so on in a device-readable and compatible format. This survey efforts to provide a brief and conveniently understandable study of the research directions taken in the domain of ontology to deal with fuzzy information; reconcile various definitions observed in scientific literature, and identify some of the domain's future research-challenging scenarios. This work is hoping that this evaluation can be treasured by fuzzy ontology scholars. This paper concludes by the way of reviewing present research and stating research gaps for buddy researchers.

Enhancement of Internet of Things (IOT) for Minimizing the Growth Rate of Disease and Cost Reduction

  • SYED ROMAT ALI SHAH;ALI ZAIB KHAN;SOHAIL ANWAR;MUNIB AHMAD
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.202-206
    • /
    • 2024
  • Health Related issues has become a savior diseases as growing rapidly they also causing savior issues if they not cure they lead to even death. Fatal Diseases needed to be controlled at early stages to save the patient lives. The Knowledge related to the disease is also important so that it may be cure as soon as possible and also medicine for the illness is also needed to be supplied immediately so that it can be controlled. Some patients also need a continuous monitoring like aged and someone suffering to some fatal disease .IOT based monitoring system with the application of the Raspberry pi and the usage of the Local Area Network to connect the Doctors, Hospital, and Ambulance service also the pharmacy help to start the treatment of the patient effectively. Also acknowledging the doctors and hospital staff will help to save the life of the patient due to knowledge of the disease. Usage such smart and reliable technology will help to monitor the health condition of the patient at home and also connecting with the doctors through the internet will also acknowledge the doctor about the present condition of the patient. This paper presents the effective use of the smart devices and technology to overcome the disease by using such cost effective technology.

A Study on Piracy Matters and Introduction of the Privately Contracted Armed Security Personnel on Board Ships (해적사건 대응을 위한 무장경비원제도 도입방안에 관한 연구)

  • Roh, Ho-Rae
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.293-326
    • /
    • 2014
  • Piracy is a worldwide issue, but the deteriorating security situation in the seas off Somalia, the Gulf of Aden and the wider Western Indian Ocean between 2005 and 2012 and in the increasing number of attacks in the Gulf of Guinea are a major problem. The depth of concern for the problem internationally is amply demonstrated by the levels of co-operation and coordination among naval and other forces from several countries that have assembled in the west Indian Ocean region and the Gulf of Aden to escort ships carrying humanitarian aid to Somalia and to protect vulnerable shipping. Notwithstanding this unprecedented effort, the vast sea area in which the pirates now operate makes it difficult to patrol and monitor effectively, particularly with the limited resources available. More resources, in the form of naval vessels and aircraft, are needed and at every opportunity the IMO encourages Member Governments to make greater efforts to provide the additional naval, aerial surveillance and other resources needed through every means possible. IMO provide interim guidance and recommendations to be taken into account when considering the use of PCASP(privately contracted armed security personnel) if and when a flag State determines that such a measure would be lawful and, following a full risk assessment, appropriate. The interim guidance and recommendations of IMO are not intended to endorse or institutionalize the use of armed guards. Therefore, they do not represent any fundamental change of policy by the Organization in this regard. It is for each flag State, individually, to decide whether or not PCASP should be authorized for use on board ships flying their flag. If a flag State decides to permit this practice, it is up to that State to determine the conditions under which authorization will be granted. Therefore, Korea should be introduced rationally PCASP for safe shipping. PCASP on board ships is much the same to special guard personnel of security services industry act. Act plan of Oceans and fisheries ministry on PCASP collides with special guard personnel system of National Police Agency. Rather than new law making, PCASP regukations have to be included in security services industry act. Management Agency of PCASP is to not Oceans and fisheries ministry, but Central Headquarters Korea Coast Guard of Public Safety and Security Ministry because of specialty and closely connection.

  • PDF

A Study on the Feasibility of 'Lone Wolf' Terrorists in Korea: Focusing on IS Defector Student Kim's On-Line Behavior (국내에서의 '외로운 늑대'(Lone Wolf) 테러리스트 발생 가능성에 관한 연구: IS 가담 '김 모'군의 사이버공간에서의 행적을 중심으로)

  • Youn, Bonghan;Lee, Sangjin;Lim, Jongin
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.127-150
    • /
    • 2015
  • Since 9/11 attack, internet has become a major space for terrorist activities and also emerged as the most important spot of lone wolf terrorists for acquiring tools and radicalization. The accident of student Kim's defection to IS (Islamic state) in January 2015 told us that Korea is not any more "terrorism clearance area" and leaded us to look closely into the possibility of lone wolf terrorist. In this paper, I developed a "lone wolf cyber evolution model" using various materials collected by preceding papers and interviewing investigators and terrorism experts in Korea. I analyze Kim's radicalization process using this model. And I picked and closely looked over some facilitating factors of lone wolf such as multi-cultural socialization, increase of international migrants, expansion alienation hierarchy and ideological conflicts deepening and predicted the possibility of lone wolf. Finally, this paper presents some effective policy measurements against lone wolf terrorism in Korea.

The One Time Biometric Key Generation and Authentication Model for Portection of Paid Video Contents (상용 비디오 콘텐츠 보호를 위한 일회용 바이오메트릭 키 생성 및 인증 모델)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • Most peoples are used to prefer to view the video contents rather than the other contents since the video contents are more easy to understand with both their eyes and ears. As the wide spread use of smartphones, the demands for the contents services are increasing rapidly. To promote the contents business, it's important to provide security of subscriber authentication and corresponding communication channels through which the contents are delivered. Generally, symmetric key encryption scheme is used to protect the contents in the channel, and the session key should be upadated periodically for the security reasons. In addition, to protect viewing paid contents by illegal users, the proxy authentication should not be allowed. In this paper, we propose biometric based user authentication and one time key generation models. The proposed model is consist of biometric template registration, session key generation and chanel encryption steps. We analyze the difference and benefits of our model with existing CAS models which are made for CATV contents protection, and also provides applications of our model in electronic commerce area.

Relationship between Molecular Structure Characteristics of Feed Proteins and Protein In vitro Digestibility and Solubility

  • Bai, Mingmei;Qin, Guixin;Sun, Zewei;Long, Guohui
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.29 no.8
    • /
    • pp.1159-1165
    • /
    • 2016
  • The nutritional value of feed proteins and their utilization by livestock are related not only to the chemical composition but also to the structure of feed proteins, but few studies thus far have investigated the relationship between the structure of feed proteins and their solubility as well as digestibility in monogastric animals. To address this question we analyzed soybean meal, fish meal, corn distiller's dried grains with solubles, corn gluten meal, and feather meal by Fourier transform infrared (FTIR) spectroscopy to determine the protein molecular spectral band characteristics for amides I and II as well as ${\alpha}$-helices and ${\beta}$-sheets and their ratios. Protein solubility and in vitro digestibility were measured with the Kjeldahl method using 0.2% KOH solution and the pepsin-pancreatin two-step enzymatic method, respectively. We found that all measured spectral band intensities (height and area) of feed proteins were correlated with their the in vitro digestibility and solubility ($p{\leq}0.003$); moreover, the relatively quantitative amounts of ${\alpha}$-helices, random coils, and ${\alpha}$-helix to ${\beta}$-sheet ratio in protein secondary structures were positively correlated with protein in vitro digestibility and solubility ($p{\leq}0.004$). On the other hand, the percentage of ${\beta}$-sheet structures was negatively correlated with protein in vitro digestibility (p<0.001) and solubility (p = 0.002). These results demonstrate that the molecular structure characteristics of feed proteins are closely related to their in vitro digestibility at 28 h and solubility. Furthermore, the ${\alpha}$-helix-to-${\beta}$-sheet ratio can be used to predict the nutritional value of feed proteins.

A Strong Anonymity Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 강한 익명성 지원 구조)

  • Lee, Jung-Hyun;Kim, Tae-Yeon;Cho, Gi-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.11 no.3
    • /
    • pp.139-148
    • /
    • 2010
  • In the sensor network security area, previous works were mainly concentrated on achieving authentication, confidentiality, integrity and availability. But the ID exposure issue is recently an increasing concern in research community. To protect the ID exposure from various attacks, the most common approach is to make use of a dynamic pseudonym rather than the real ID. However, if a node's secret key (or hash key) and the current pseudonym (such as a random number) are exposed, the attacker can easily generate the previous/next pseudonyms. In this paper, we propose a security infra-structure scheme for enabling strong anonymity of sensor nodes. Our scheme ensures that the probability being able to generate a pseudonym is very low even if a sensor node has been compromised with an attacker. Security analyses have proven that our scheme is suitable for sensor network environments in terms of preserving of forward anonymity as well as backward anonymity.

Real Time Object Tracking Method using Multiple Cameras (다중 카메라를 이용한 실시간 객체 추적 방법)

  • Jang, In-Tae;Kim, Dong-Woo;Song, Young-Jun;Kwon, Hyeok-Bong;Ahn, Jae-Hyeong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.4
    • /
    • pp.51-59
    • /
    • 2012
  • Recently, the study about object tracking using image processing has been active in the field of security and surveillance. Existing security and surveillance systems using multiple cameras have been operating independently. Thus, the chase was difficult when the tracking object move to other monitored areas. In this paper, we propose the way to change the control of camera automatically following the moving direction of objects in multiple cameras. The proposed method detects the object and tracks the object using color information and direction information of object. The color information obtains using the hue and the direction information obtains using the optical flow. At this time, the optical flow is detected for the entire image area of an object that is not applied only to reduce the computational complexity makes it possible to track in real time. In addition, it can be solved to inconvenience of security surveillance system to use existing camera by tracking an object automatically.

A Survey of Code Dissemination Mechanisms on Sensor Networks (센서 네트워크에서 코드분배 메커니즘에 대한 조사 연구)

  • Kim, Mi-Hui;Kim, Ji-Sun;Kim, Jee-Hyun;Lim, Ji-Young;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.4
    • /
    • pp.423-438
    • /
    • 2009
  • The sensor network is highlighted because it is one of the essentialbase networks in the ubiquitous computing realization. Researches for providing security and efficiency are being perfomed in the various isuues because of the characteristics of sensor nodes and sensor networks. Recently, code dissemination mechanism is recognized as an important research issue since sensor nodes are in the need of updating new software or the need of modifying bugs in dynamically. Generally lots of nodes are in the sensor networks and they are ramdomly deployed in hostile environments. Thus it is especially important that the code dissemination from the base station to nodes should be processed efficienctly and securely. In this paper, we check up the recent existing code dissemination mechanisms, and comparatively analyze the requirements of the code dissemination and the characteristicsof existing mechanisms. Through the analysis, we present future research issues for the code dissemination area. This research can expedite the research on the code dissemination and improve the usability of sensor networks with efficiency and security.

A Study on Secure Group Key Management Based on Agent for Multicast Data Transmission (멀티캐스트 전송을 위한 에이전트 기반의 안전한 그룹 키 관리방안 연구)

  • Kim, Bo-Seung;Kim, Jung-Jae;Zhang, Feng-De;Shin, Yong-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.436-444
    • /
    • 2011
  • As practical use degree of multicasting increase, security for multicast is recognized as an important issue. Previous research in the area of secure multicast has mainly focused on group key management. The most important thing about the security of multicast is that only authorized members of this group will be able to access the data. The member of access to multicast communication is to use cryptography with a common shared session encryption key. We propose decentralized group key management based on agent for dynamic multicast with large groups and frequent joins or leaves in this paper. Whole group divide to several subgroup using agent technology and each agent manage members of each subgroup. Also, when rekeying updates that using one-way hash function can prevent the key exposure, and reduce the key distribution delay.