• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.028 seconds

A Design of Blockchain-based LoRa Multi-hop Network for Smart Grid (스마트 그리드를 위한 블록체인 기반 LoRa 멀티홉 네트워크 설계)

  • Jeon, Seongho;Kim, Seungku
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.440-448
    • /
    • 2021
  • This paper presents problems of network technology in smart grid and implements a blockchain-based LoRa multi-hop network to solve them. Since some smart grid applications are operated in harsh environments, it is difficult to establish communication infrastructure. We propose a LoRa network with multi-hop using the Flooding routing protocol. Smart grid environment composes an independent network using various power grid protocols depending on the application. Since this has a problem that an independent infrastructure must be established for each network, a single gateway device supports multiple power grid protocols to implement a method for network integration. Lastly, the author applied Hyperledger-based blockchain to the LoRa network to ensure the integrity of data in a smart grid environment, and strengthened security by physically distributing it. After constructing the three suggestions on the actual test bed, we confirmed that the network operates normally through experiments.

A Study on Dispute Resolution Procedures under the German Consumer Alternative Dispute Resolution Act (독일의 대체적 소비자분쟁해결법상 분쟁해결 절차에 관한 연구 -분쟁조정인의 법적 지위와 역할을 중심으로-)

  • Sung, Joon-Ho
    • Journal of Arbitration Studies
    • /
    • v.32 no.1
    • /
    • pp.71-91
    • /
    • 2022
  • The legal integration in the European Union that seeks a unified system in consumer disputes and the German Consumer Dispute Mediation Act based on this pursues the procedural fairness of consumer disputes and the equality of results. The role and legal status of the dispute mediator, who plays a very important role in this process, and the stable operation of the dispute resolution system and the guarantee of reasonable results through the guarantee of fairness and independence are very important values. In particular, the dispute mediator under the Act is conceptually different from the existing mediator or mediator, and through this distinction, the duties and contents of the dispute mediator are also distinguished. For this reason, the qualifications of dispute mediators that affect the outcome of dispute mediation are strictly stipulated. There have been some criticisms of this strictness, and such strictness is also seen as an excessive limitation. However, these standards can be understood as one of the efforts to make the dispute mediation procedure more systematic and to operate objectively in accordance with laws and procedures. In addition, in relation to the issue of independence and impartiality of the dispute mediator, the status of the dispute mediator is guaranteed in various aspects. In economic terms, it is not influenced by external factors, and furthermore, in order to guarantee job stability, the results of job security and dispute resolution are not linked. By examining the appropriate level of discipline for these dispute mediators, we expect the developmental growth of the consumer dispute resolution system under our Act.

Implementation of a KPI Focused e-QMS: A Case Study in the Aerospace & Defense Industry (KPI 중심의 e-QMS 구현: 우주항공 및 방위 산업 사례 연구)

  • Jae Young Shin;Wan Seon Shin
    • Journal of Korean Society for Quality Management
    • /
    • v.51 no.1
    • /
    • pp.131-154
    • /
    • 2023
  • Purpose: The purpose of this paper is to design an integrated informatization system that can manage quality & KPI by integrating management systems in the aerospace and defense industry, and study the effect on KPI when applied to related companies. Methods: The 7 management systems required for integration in the AS&D industry were studied, and an empirical analysis was conducted for H company in South Korea for the application of e-QMS integrated informatization & KPI system based on security environment and open quality. Results: The results of this study were analyzed to have an effect on the improvement of customer satisfaction and the positive improvement of quality failure cost in the aerospace and defense industry. And it was analyzed that it works to continuously comply with ethical management and environmental laws and prevent safety accidents. Conclusion: The greatest significance of this study is that it attempted to build an e-QMS integrated system in the aerospace and defense industry. Considering that the case of integrated management system and integrated operation of KPI in related industries has not been introduced in the existing literature, the results of this study will be shared as a meaningful preceding study in the era of digital quality information. In addition, the fact that the open-quality quality innovation methodology emphasizing measurement(M), tracking(T), and connection(C) was actually applied in an AS&D company and its effectiveness was objectively proven. It is expected that it will be a good paper for follow-up research.

Discussion on East Asian Economic Community (동아시아 지역협력강화와 경제공동체 추진에 관한 고찰: 중-일 관계를 중심으로)

  • MIN, Kyoungsik
    • International Area Studies Review
    • /
    • v.15 no.1
    • /
    • pp.195-218
    • /
    • 2011
  • Discussion of Economic Community in East Asia are active. This trend began in the late 20th from the EU and North America's regional economic integration is in response to the movement. East Asia in the late 1990s to the actual for the FTA, it was not very active. As East Asian Economic Community became one of agendas for ASEAN+3 Leaders' meeting since 2004. Japan has been positioned itself as a leading country in East Asia. However, the emergence of China in the East Asian economic community have been changes. Moreover, East Asian countries began concerns over regional economic community with frequent conclusions of FTAs and China is leading the discussion on strengthening economic cooperation in the region. Some of it in terms of economic community in East Asia will not be smooth. First, East Asian countries do not have a common goal. Second, East Asian countries have a lot of diversity. Third, China and Japan are expected to compete in the championship. Therefore, East Asian economic community should be approached in the long-term perspective.

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

A Study on Preprocessing Method in Deep Learning for ICS Cyber Attack Detection (ICS 사이버 공격 탐지를 위한 딥러닝 전처리 방법 연구)

  • Seonghwan Park;Minseok Kim;Eunseo Baek;Junghoon Park
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.36-47
    • /
    • 2023
  • Industrial Control System(ICS), which controls facilities at major industrial sites, is increasingly connected to other systems through networks. With this integration and the development of intelligent attacks that can lead to a single external intrusion as a whole system paralysis, the risk and impact of security on industrial control systems are increasing. As a result, research on how to protect and detect cyber attacks is actively underway, and deep learning models in the form of unsupervised learning have achieved a lot, and many abnormal detection technologies based on deep learning are being introduced. In this study, we emphasize the application of preprocessing methodologies to enhance the anomaly detection performance of deep learning models on time series data. The results demonstrate the effectiveness of a Wavelet Transform (WT)-based noise reduction methodology as a preprocessing technique for deep learning-based anomaly detection. Particularly, by incorporating sensor characteristics through clustering, the differential application of the Dual-Tree Complex Wavelet Transform proves to be the most effective approach in improving the detection performance of cyber attacks.

Overcoming the Challenges in the Development and Implementation of Artificial Intelligence in Radiology: A Comprehensive Review of Solutions Beyond Supervised Learning

  • Gil-Sun Hong;Miso Jang;Sunggu Kyung;Kyungjin Cho;Jiheon Jeong;Grace Yoojin Lee;Keewon Shin;Ki Duk Kim;Seung Min Ryu;Joon Beom Seo;Sang Min Lee;Namkug Kim
    • Korean Journal of Radiology
    • /
    • v.24 no.11
    • /
    • pp.1061-1080
    • /
    • 2023
  • Artificial intelligence (AI) in radiology is a rapidly developing field with several prospective clinical studies demonstrating its benefits in clinical practice. In 2022, the Korean Society of Radiology held a forum to discuss the challenges and drawbacks in AI development and implementation. Various barriers hinder the successful application and widespread adoption of AI in radiology, such as limited annotated data, data privacy and security, data heterogeneity, imbalanced data, model interpretability, overfitting, and integration with clinical workflows. In this review, some of the various possible solutions to these challenges are presented and discussed; these include training with longitudinal and multimodal datasets, dense training with multitask learning and multimodal learning, self-supervised contrastive learning, various image modifications and syntheses using generative models, explainable AI, causal learning, federated learning with large data models, and digital twins.

Effects of Elderly Characteristics and Service Characteristics on the Use Intention of Government 24 (고령자 특성 및 서비스 특성이 정부24 이용 의도에 미치는 영향)

  • Lee, Jung-jae;Lee, Gi-dong
    • Journal of Venture Innovation
    • /
    • v.6 no.1
    • /
    • pp.75-93
    • /
    • 2023
  • As non-face-to-face contact was activated due to the progress of the 4th Industrial Revolution and COVID-19, the government's civil service was also rapidly reflecting this phenomenon. However, there were cases in which it was quite burdensome and rather uncomfortable for the elderly who were relatively alienated from the digital culture. Therefore, in this study, we tried to empirically analyze the factors that affect the use of government 24(a government civil integration service) by the elderly. For this purpose, the characteristics of the elderly and the characteristics of services were paid attention. As the characteristic factors of the elderly, cognitive characteristics, psychological characteristics, and physical characteristics were derived, and as service characteristics, usefulness, ease of use, security, and government support were derived when using government 24. The effect of these factors on the intention to use Government 24 was empirically analyzed. For empirical analysis, a survey was conducted targeting the elderly in their 60s and older, and 250 valid sample were used for analysis. The analysis results were as follows. Among the characteristics of the elderly, cognitive characteristics, psychological characteristics, and physical characteristics were all found to had a significant negative (-) effect on the intention to use Government 24. On the other hand, usefulness, ease of use, and government support were found to had a significant positive (+) effect on the intention to use government 24. On the other hand, security was not tested for a significant relationship with government 24 use intention. Among the variables that have a significant impact, the psychological characteristics of the elderly had the greatest impact on the intention to use Government 24. Usefulness, cognitive characteristics, physical characteristics, ease of use, and government support were in order. The fact that this study conducted an empirical analysis by combining the characteristics of the elderly and the characteristics of services was meaningful at the academic level. In addition, considering that psychological characteristics appeared to be the most important factor, it seemed necessary to consider these points to promote the use of Government 24 by the elderly.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

A Practical Approach to Implement QoS in Broadband Access Networks (광대역 접속망에서 QoS 구현을 위한 현실적 접근법)

  • Park Seung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.3
    • /
    • pp.277-287
    • /
    • 2006
  • Most of the existing broadband access networks based on DSL, cable modem, and Ethernet support the best-effort internet access service, and adopt the flat rate pricing mechanism. It is almost impossible to provide the differentiated communication services, in current broadband access networks, for the different users and/or the different application services. Currently, however, the advances in multimedia, communication, and security technologies push the interactive and/or streaming multimedia services and VPN services to be widely deployed over Internet, and they require more QoS-sensitive services than the best-effort service. Though various QoS technologies such as RSVP-based IntServ and DiffSern were already developed and under standardization in Internet world, it is impractical to replace the existing QoS-unaware access networks with the QoS-enabled ones at a time to deploy QoS-sensitive services. In this paper, after analyzing current broadband access network architectures and the status of QoS support, we propose a practical approach to support multimedia QoS in the broadband access networks. The approach will be based on the integration of the differentiated pricing and the DiffServ technology. And it will be a step-wise approach to support backward compatibility with the legacy broadband access networks as much as possible.