• Title/Summary/Keyword: Security technologies

Search Result 1,856, Processing Time 0.034 seconds

Performance Evaluation Plan of Maritime VHF Digital Communications System (해상용 VHF 디지털통신 시스템의 성능평가 방안)

  • Ju, Yang-Ro;Kim, Kab-Ki;Choi, Jo-Cheon;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.7
    • /
    • pp.582-588
    • /
    • 2014
  • IMO and IALA have undertaken projects that GMDSS Modernization and E-navigation, which refer to "Future digital communications systems" for a more efficient transmission of voice and data communications in the VHF maritime mobile service. ITU has also resolved in WRC-07 Resolution 357 to study the use of spectrum-efficient technologies in order to provide for the operation of ship and port security and maritime safety systems. IALA and ITU WP5B have coordinated for the technical developments and the spectrum issues. Recommendation ITU-R M.1842-1 has approved by WP5B meeting. This revision provides a wideband data service both 50kHz and 100kHz in the VHF maritime mobile service. This paper has studied E-navigation, its needs for data exchange that includes explanations of the current methods for transmitting data by VHF that based in land mobile radio service. A further technologies trend is estimated for Recommendation ITU-R M.1842-1, that is based on the land mobile radio standards with some tailored to fit the needs of the maritime mobile service.

A Study on the Introduction of Advanced Technology in the Realm of Defense (민간 신기술의 국방 분야 도입방안에 대한 연구)

  • Jeon, Suyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.249-256
    • /
    • 2020
  • It is expected that the technology of the fourth industrial revolution will increase the productivity and efficiency of the industrial world. Many countries are providing political and financial supports to make big advances in the technology. Especially, developed countries, such as USA, Germany and Japan, are trying to use the technology for manufacturing and finance industry, and to increase the opportunity of test-bed environment. However, many restrictions hinder adopting non-governmental technology in defense due to various limitations such as national security and protection of technology. In this study, we propose methods to adopt new and non-governmental technology in defense through by investigating internal and external policies related to technology and case studies. First, it is necessary to expand opportunities to let small and medium sized companies participate in defense R&D projects. Second, it is important to improve R&D systems for introducing new and non-governmental technology on the defense industry. Third, it is needed to increase test-bed environments for experimenting and evaluating new technologies in the defense industry. Thus, we expect that the proposed methods will help form strategies for small and medium sized companies, and analyze trends for introducing new technologies in the defense industry.

Cellulosic Ethanol as Renewable Alternative Fuel (신재생 대안 에너지로서의 셀룰로스 에탄올)

  • Cho, Woo-Suk;Chung, Yu-Hee;Kim, Bo-Kyung;Suh, Su-Jeoung;Koh, Wan-Soo;Choe, Sung-Hwa
    • Journal of Plant Biotechnology
    • /
    • v.34 no.2
    • /
    • pp.111-118
    • /
    • 2007
  • Global warming crisis due primarily to continued green house gas emission requires impending change to renewable alternative energy than continuously depending on exhausting fossil fuels. Bioenergy including biodiesel and bioethanol are considered good alternatives because of their renewable and sustainable nature. Bioethanol is currently being produced by using sucrose from sugar beet, grain starches or lignocellulosic biomass as sources of ethanol fermentation. However, grain production requires significant amount of fossil fuel inputs during agricultural practices, which means less competitive in reducing the level of green house gas emission. By contrast, cellulosic bioethanol can use naturally-growing, not-for-food biomass as a source of ethanol fermentation. In this respect, cellulosic ethanol than grain starch ethanol is considered a more appropriate as a alternative renewable energy. However, commercialization of cellulosic ethanol depends heavily on technology development. Processes such as securing enough biomass optimized for economic processing, pretreatment technology for better access of polymer-hydrolyzing enzymes, saccharification of recalcitrant lignocellulosic materials, and simultaneous fermentation of different sugars including 6-carbon glucose as well as 5-carbon xylose or arabinose waits for greater improvement in technologies. Although it seems to be a long way to go until commercialization, it should broadly benefit farmers with novel source of income, environment with greener and reduced level of global warming, and national economy with increased energy security. Mission-oriented strategies for cellulosic ethanol development participated by government funding agency and different disciplines of sciences and technologies should certainly open up a new era of renewable energy.

Fingerprint Recognition Algorithm using Clique (클릭 구조를 이용한 지문 인식 알고리즘)

  • Ahn, Do-Sung;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.2
    • /
    • pp.69-80
    • /
    • 1999
  • Recently, social requirements of personal identification techniques are rapidly expanding in a number of new application ares. Especially fingerprint recognition is the most important technology. Fingerprint recognition technologies are well established, proven, cost and legally accepted. Therefore, it has more spot lighted among the any other biometrics technologies. In this paper we propose a new on-line fingerprint recognition algorithm for non-inked type live scanner to fit their increasing of security level under the computing environment. Fingerprint recognition system consists of two distinct structural blocks: feature extraction and feature matching. The main topic in this paper focuses on the feature matching using the fingerprint minutiae (ridge ending and bifurcation). Minutiae matching is composed in the alignment stage and matching stage. Success of optimizing the alignment stage is the key of real-time (on-line) fingerprint recognition. Proposed alignment algorithm using clique shows the strength in the search space optimization and partially incomplete image. We make our own database to get the generality. Using the traditional statistical discriminant analysis, 0.05% false acceptance rate (FAR) at 8.83% false rejection rate (FRR) in 1.55 second average matching speed on a Pentium system have been achieved. This makes it possible to construct high performance fingerprint recognition system.

  • PDF

A Risk Factor Detour Multi-Path Routing Scheme in Wireless Multimedia Sensor Networks (무선 멀티미디어 센서 네트워크 환경에서 위험요소 우회 다중 경로 라우팅 기법)

  • Hwang, Donggyo;Son, In-Goog;Park, Junho;Seong, Dong-Ook;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.30-39
    • /
    • 2013
  • In recent years, with the development of devices to collect multimedia data such as small CMOS camera sensor and micro phone, studies on wireless multimedia sensor network technologies and their applications that extend the existing wireless sensor network technologies have been actively done. In such applications, various basic schemes such as the processing, storage, and transmission of multimedia data are required. Especially, a security for real world environments is essential. In this paper, in order to defend the sniffing attack in various hacking techniques, we propose a multipath routing scheme for physically avoiding the data transmission path from the risk factors. Our proposed scheme establishes the DEFCON of the sensor nodes that are geographically close to risk factors and the priorities according to the importance of the data. Our proposed scheme performs risk factor detour multipath routing through a safe path considering the DEFCON and data priority. Our experimental results show that although our proposed scheme takes the transmission delay time by about 5% over the existing scheme, it reduces the eavesdropping rate that can attack and intercept data by the risk factor by about 18%.

Medical Information Privacy Concerns in the Use of the EHR System: A Grounded Theory Approach (의료정보 프라이버시 염려에 대한 근거이론적 연구: 전자건강기록(EHR) 시스템을 중심으로)

  • Eom, Doyoung;Lee, Heejin;Zoo, Hanah
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.217-229
    • /
    • 2018
  • Electronic Health Record (EHR) systems are widely adopted worldwide in hospitals for generating and exchanging records of patient information. Recent developments are moving towards implementing interoperable EHR systems that enable information to be shared seamlessly across healthcare organizations. In this context, this paper explores the factors that cause medical information privacy concerns, identifies how people react to privacy invasion and what their perceptions are towards the acceptance of the EHR system. Interviews were conducted to draw a grounded theory on medical information privacy concerns in the use of EHRs. Medical information privacy concerns are caused by perceived sensitivity of medical information and the weaknesses in security technologies. Trust in medical professionals, medical institutions and technologies plays an important role in determining people's reaction to privacy invasion and their perceptions on the use of EHRs.

A Study on the Procedure for Establishing an Integrated Platform Plan for Safety Management of 5G Digital Twin-Based Facilities: Focusing on Facilities in Metropolitan Cities (5G 디지털 트윈 기반 시설물 안전관리 통합플랫폼 계획 수립 절차에 관한 연구 : 수도권 광역시 시설물을 중심으로)

  • Chang, Hye-Jung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.4
    • /
    • pp.257-268
    • /
    • 2021
  • As the variety and scale of facilities increase due to industrialization and urbanization, blind spots for facility safety management have occurred, resulting in numerous casualties.To meet safety and security needs of citizens living in smart cities, we present a procedure for establishing an integrated platform for facility safety management by combining 5G and digital twin technologies. It can be used to perform inspection according to risk factors and aging of facilities. In this paper, the current status of facility management and application directions of new 5G digital twin-based smart city technologies are reviewed and digital twin implementation procedures are presented. Five cities were selected as target areas: Osan, Gwangmyeong, Guri, Uijeongbu, and Anyang. Old and emergency facilities of each local government were selected. A total of 33 digital twin facilities reflecting policy directions of each city were selected. Focusing on facilities determined by each city, the purpose of this study was to define information technology infrastructure elements for the application of the 5G digital twin facility safety management integrated platform, define categories of implementation services, and suggest a concrete integrated platform configuration plan.

A Study on the Introductioin of Data Trusts System to Expand the Rights of Privacy Self-Determination (개인정보 자기결정권 확대를 위한 데이터 신탁제도 도입 방안 연구)

  • Jang, Keunjae;Lee, Seungyong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.29-43
    • /
    • 2022
  • With the advent of the Internet and the development of mobile digital devices such as smartphones and tablet PCs, the communication service paradigm began to shift from existing voice services to data services. Recently, as social network services (SNS) are activated and 4th industrial revolution technologies centered on ICT (Information and Communication Technologies) such as Big Data, Blockchain, Cloud, and 5G/6G are rapidly developed, the amount of shared data type and the amount of data are increasing rapidly. As the transition to a digital society begins actively, the importance of using data information, as well as the economic and social values of personal information are becoming increasingly important. As a result, they are actively discussing policies to revitalize the data information industry around the world and ways to efficiently obtain, analyze, and utilize increasingly diverse and vast data, as well as to protect/guarantee the rights of information subjects (providers) in various fields such as society, culture, economy, and politics.. In this paper, in order to improve the self-determination right of personal information on data produced by information subjects, and further expand the use of safe data and the data economy, a differentiated data trusts system was considered and suggested. In addition, the components and data trusts procedures necessary to efficiently operate the data trusts system in Korea were considered, and the non-profit data trusts system and the for-profit data trusts system were considered as a way to flexibly operate the data trusts system. Furthermore, the legal items necessary for the implementation of the data trusts system were investigated and considered. In this paper, in order to propose a domestic data trusts system, cases related to existing data trusts systems such as the United States, Japan, and Korea were reviewed and analyzed. In addition, in order to prepare legislation necessary for the data trusts system, data-related laws in major countries and domestic legal and policy trends were reviewed to study the rights that conflict or overlap with existing laws, and differences were investigated and considered. The Data trusts system proposed in this paper is a reasonable system that is expected to recognize the asset value of data in the capitalist market economy system, to provide legitimate compensation for data produced by data subjects, and further to contribute greatly to the use of safe data and creation of a new service market.

Design and implementation of smart card-based multi-authentication mechanism for digital contents delivery (디지털콘텐츠 유통을 위한 스마트카드기반의 다중인증처리방법설계 및 구현)

  • Kim, Yong;Lee, Tae-Young
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.23-46
    • /
    • 2002
  • With explosively increasing digital contents, library and Information center should have a new role between knowledge providers and knowledge users as information brokering organization. Electronic transaction system should be required for performing this brokering service since economic value is added to information and knowledge in information society. The developments and changes around library are keeping up with increasing building digital library and digitalizing printed sources. With the rapidly changing circumstances, the Internet is currently witnessing an explosive growth. By serving as a virtual information resource. the Internet can dramatically change the way business is conducted and Information is provided. However because of features o( the Internet like openness and information sharing, it has fundamental vulnerabilities in security issues. For Instance, disclosure of private information and line eavesdropping such as password, banking account, transaction data on network and so on are primary obstruction factors to activation of digital contents delivery on network. For high network security and authentication, this paper looks at smart card technologies and proposes multi-authentication protocol based on smart card on open network, implements and analyzes it.

A Study on Countermeasures between Central and Local Governments for Earthquake Disaster Management of Pohang, Korea (우리나라 포항지진 재난관리에 대한 중앙·지방정부 간 대책 방안 연구)

  • La, Hong Woo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.3
    • /
    • pp.25-34
    • /
    • 2019
  • Modern disasters prevent accidents in advance and recover after accidents are very important. Our government's current response to these accidents is not appropriate. As for disaster management so far, it has been the center of disaster response and recovery efforts, and has been led by the government against it. The reality is that most private organizations and agencies have only subsidized government disaster management agencies. Korea is no longer a safe zone for earthquakes. Now for the establishment of effective disaster management system for earthquakes in the diagnosis is very urgent and the problems of the operational disaster management, which the problems of the nation.Policies to improve academic efforts to seek alternative proposal is also at a time when volume can be said to be very big need to mine. This study from 2016 to 2019, about the earthquake that took place between National Statistical Office, based on analysis of data to. First of all, research 1: What was the government's plan on Pohang earthquake? The results showed that the residents' evacuation of Pohang was important in the Pohang earthquake, but for the sake of students' safety, they were directly assigned to the test site to cope with the emergency situation. Therefore, the research and analysis shows that the nation should continue to think about the causes and responses of the damage at the disaster site and strive to develop technologies and methods to minimize the damage.