• Title/Summary/Keyword: Security Measure

Search Result 575, Processing Time 0.022 seconds

Development of a Gateway System for Social Network Services

  • Kwon, Dongwoo;Jung, Insik;Lee, Shinho;Kim, Hyeonwoo;Ju, Hongtaek
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.118-125
    • /
    • 2015
  • In this paper, we propose a method to reduce mobile social network services (SNSs) traffic using a mobile integrated SNS gateway (MISG) to improve network communication performance between the mobile client and SNS servers. The gateway connects the client and SNS servers using the contents adapter and the web service adapter and helps to improve communication performance using its cache engine. An integrated SNS application, the user's client, communicates with the gateway server using integrated SNS protocol. In addition, the gateway can alert the client to new SNS contents because of the broker server implemented by the message queuing telemetry transport protocol. We design and develop the modules of the gateway server and the integrated SNS application. We then measure the performance of MISG in terms of content response time and describe the result of the experiment.

Secure and Robust Metering in the Web Advertising

  • Kim, Soon-Seok
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.1
    • /
    • pp.68-72
    • /
    • 2007
  • In this paper, we present robust and secure metering scheme to measure the number of interactions between clients and servers in the web, especially the web advertising. In most cases the web advertising is consists of advertisers, clients, servers, and an audit agency. The metering scheme should always be secure against fraud attempts by servers which maliciously try to inate the number of their visits and against clients that attempt to disrupt the metering process. We propose robust and secure metering scheme based on cryptographic techniques. By analyzing the proposed scheme we show that our scheme is more robust and secure than the previous schemes [1,2,4,5].

Risk Analysis and Alternatives on DB Encryption of Social Welfare consolidation Service System ("사회복지통합서비스 시스템"의 DB암호화에 대한 리스크분석 및 대안연구)

  • Ham, Seung Mok;Park, Tae Hyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.81-94
    • /
    • 2013
  • Recently, the dramatical increasement of personal information infringement makes the government strongly enforce the laws. The Key-point of law enforcement is the DB encryption. Nevertheless, DB encryption is the one of the hardest thing in the organization's security measures. The purpose of this paper is suggesting alternative means of residence numbers and showing the possibility of indicator usage for safety measures. This research suggested the best ways to make a decision through a before and after comparison of the DB encryption cost of the inherent identification number elimination in "Social Welfare consolidation service system". When this research result was applied in "Happiness-e-Um system", we found that the alternative means are more efficient than the residence number for encryption cost, system revision time and so on.

A High Quality Steganographic Method Using Morphing

  • Bagade, Anant M.;Talbar, Sanjay N.
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.256-270
    • /
    • 2014
  • A new morphed steganographic algorithm is proposed in this paper. Image security is a challenging problem these days. Steganography is a method of hiding secret data in cover media. The Least Significant Bit is a standard Steganographic method that has some limitations. The limitations are less capacity to hide data, poor stego image quality, and imperceptibility. The proposed algorithm focuses on these limitations. The morphing concept is being used for image steganography to overcome these limitations. The PSNR and standard deviation are considered as a measure to improve stego image quality and morphed image selection, respectively. The stego keys are generated during the morphed steganographic embedding and extracting process. Stego keys are used to embed and extract the secret image. The experimental results, which are based on hiding capacity and PSNR, are presented in this paper. Our research contributes towards creating an improved steganographic method using image morphing. The experimental result indicates that the proposed algorithm achieves an increase in hiding capacity, stego image quality, and imperceptibility. The experimental results were compared with state of the art steganographic methods.

A Study on Noise in Waste Facilities (폐기물 소각시설 내부 소음에 관한 연구)

  • Seo, Byung-Suk;Park, Ro-Gook;Jeon, Yong-Han
    • Journal of the Korea Safety Management & Science
    • /
    • v.22 no.2
    • /
    • pp.15-21
    • /
    • 2020
  • Industrial facilities need design to predict and reduce noise from design to prevent and reduce noise. The purpose of this study is to predict worker's environment and evaluate safety by analyzing noise inside underground blower room and air compressor room with fluid machinery in waste facility. This waste incineration facility was analyzed based on the ground floor, ground floor blower chamber, and air compressor chamber. The results of SPL(Sound Pressure Level) analysis at 1.5m away, which are frequently used to measure the SPL as a noise source, are as follows. SPL of basement level: 46.80[dB], SPL of ground layer: 48.57[dB]. As a result, it was expected that the noise level would be considerably lower than the 8 hours 50[dB] noise exposure per day.

Improving the Workplace Experience of Caregiver-Employees: A Time-Series Analysis of a Workplace Intervention

  • Ding, Regina;Dardas, Anastassios;Wang, Li;Williams, Allison
    • Safety and Health at Work
    • /
    • v.12 no.3
    • /
    • pp.296-303
    • /
    • 2021
  • Background: Rapid population aging in developed countries has resulted in the working-age population increasingly being tasked with the provision of informal care. Methods: An educational intervention was delivered to 21 carer-employees employed at a Canadian University. Work role function, job security, schedule control, work-family conflict, familywork conflict, and supervisor and coworker support were measured as part of an aggregated workplace experience score. This score was used to measure changes pre/post intervention and at a follow-up period approximately 12 months post intervention. Three random intercept models were created via linear mixed modeling to illustrate changes in participants' workplace experience across time. Results: All three models reported statistically significant random and fixed effects intercepts, with a positive coefficient of change. Conclusion: This suggests that the intervention demonstrated an improvement of the workplace experience score for participants over time, with the association particularly strong immediately after intervention.

Study On Masked Face Detection And Recognition using transfer learning

  • Kwak, NaeJoung;Kim, DongJu
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.294-301
    • /
    • 2022
  • COVID-19 is a crisis with numerous casualties. The World Health Organization (WHO) has declared the use of masks as an essential safety measure during the COVID-19 pandemic. Therefore, whether or not to wear a mask is an important issue when entering and exiting public places and institutions. However, this makes face recognition a very difficult task because certain parts of the face are hidden. As a result, face identification and identity verification in the access system became difficult. In this paper, we propose a system that can detect masked face using transfer learning of Yolov5s and recognize the user using transfer learning of Facenet. Transfer learning preforms by changing the learning rate, epoch, and batch size, their results are evaluated, and the best model is selected as representative model. It has been confirmed that the proposed model is good at detecting masked face and masked face recognition.

A Study on Corporate Support for Employment of Retirees in Gyeongsangnam-do Employment Crisis

  • Jang, Yumi
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.33-38
    • /
    • 2022
  • Gyeongsangnam-do needed an employment stability response policy to induce re-employment of job seekers who retired due to large-scale unemployment and job instability following the employment crisis, and stable settlement and long-term employment after new employment.This study is to confirm the effective corporate support policy as an employment promotion strategy through new recruitment of the employment crisis in Gyeongsangnam-do. A total of 380 companies in Gyeongsangnam-do were targeted for the survey through online surveys and in-person surveys. As a result of the study, as a measure to improve working conditions through financial support for long-term employment stability, first, support for youth-middle-age asset formation of SME workers is required, and second, support for old-age income guarantee for SME workers was proposed. Third, direct corporate subsidies are continuously needed for job promotion and job stability of Gyeongsangnam-do companies.

Identifying the leaders and main conspirators of the attacks in terrorist networks

  • Abhay Kumar Rai;Sumit Kumar
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.977-990
    • /
    • 2022
  • This study proposes a novel method for identifying the primary conspirators involved in terrorist activities. To map the information related to terrorist activities, we gathered information from different sources of real cases involving terrorist attacks. We extracted useful information from available sources and then mapped them in the form of terrorist networks, and this mapping provided us with insights in these networks. Furthermore, we came up with a novel centrality measure for identifying the primary conspirators of a terrorist attack. Because the leaders of terrorist attacks usually direct conspirators to conduct terrorist activities, we designed a novel algorithm that can identify such leaders. This algorithm can identify terrorist attack leaders even if they have less connectivity in networks. We tested the effectiveness of the proposed algorithms on four real-world datasets and conducted an experimental evaluation, and the proposed algorithms could correctly identify the primary conspirators and leaders of the attacks in the four cases. To summarize, this work may provide information support for security agencies and can be helpful during the trials of the cases related to terrorist attacks.

The applicability of noncontact sensors in the field of rehabilitation medicine

  • Yoo Jin Choo;Jun Sung Moon;Gun Woo Lee;Wook-Tae Park;Min Cheol Chang
    • Journal of Yeungnam Medical Science
    • /
    • v.41 no.1
    • /
    • pp.53-55
    • /
    • 2024
  • A noncontact sensor field is an innovative device that can detect, measure, or monitor physical properties or conditions without direct physical contact with the subject or object under examination. These sensors use a variety of methods, including electromagnetic, optical, and acoustic technique, to collect information about the target without physical interaction. Noncontact sensors find wide-ranging applications in various fields such as manufacturing, robotics, automobiles, security, environmental monitoring, space industry, agriculture, and entertainment. In particular, they are used in the medical field, where they provide continuous monitoring of patient conditions and offer opportunities in rehabilitation medicine. This article introduces the potential of noncontact sensors in the field of rehabilitation medicine.