• Title/Summary/Keyword: Security technologies

Search Result 1,846, Processing Time 0.024 seconds

Analysis of technical environment of domestic fintech companies (국내 핀테크 기업의 기술 환경 분석)

  • Choi, Yoo-jung;Choi, Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1384-1389
    • /
    • 2020
  • Although the fintech industry is developing rapidly around the world, the domestic development situation is rather slow compared to the speed. Therefore, the future development direction can be set by analyzing the current status of the fintech industry in order to suggest the direction of development in the domestic fintech industry. The main services provided by companies belonging to the domestic fintech industry are in the areas of remittance settlement, financial investment, asset management, crowdfunding, P2P finance, overseas remittance, fintech SI, insurtech, virtual currency, security, and authentication. It is divided into. This study identifies the main technologies used in the service and grasps the current domestic status. In addition, it analyzes the distribution of workers by each service. This study is expected to play an important role in the development of the financial industry through technical analysis of fintech companies.

Physicochemical and textural properties of emulsions prepared from the larvae of the edible insects Tenebrio molitor, Allomyrina dichotoma, and Protaetia brevitarsis seulensis

  • Kim, Tae-Kyung;Yong, Hae In;Jung, Samooel;Sung, Jung-Min;Jang, Hae Won;Choi, Yun-Sang
    • Journal of Animal Science and Technology
    • /
    • v.63 no.2
    • /
    • pp.417-425
    • /
    • 2021
  • The use of edible insects to replace meat protein is important to ensure future global food security. However, processed foods using edible insects require development to enhance consumer perception. Here, we examined the physicochemical characteristics and rheological properties of emulsions prepared from different edible insect larvae. Three edible insect species (Tenebrio molitor, Allomyrina dichotoma and Protaetia brevitarsis seulensis) were used to prepare larval emulsions that were formulated with 65% of insect larvae, 20% of pork back fat, and 15% ice. The A. dichotoma emulsion had the highest pH and lightness, redness, and yellowness values, while the T. molitor emulsion had the lowest pH and lightness, redness, and yellowness values. The T. molitor emulsion had the highest hardness, gumminess, chewiness, and apparent viscosity values but the lowest springiness and cohesiveness values. According to the sodium dodecyl sulfate-polyacrylamide gel electrophoresis (SDS-PAGE) analysis, T. molitor had the thickest bands, followed by P. brevitarsis seulensis. The differential scanning calorimetry distributions for the T. molitor and A. dichotoma emulsions showed one peak, while that of the P. brevitarsis seulensis emulsion had two peaks. The collective results suggest that T. molitor was the most suitable candidate (of the three tested species) for use as a meat replacement in terms of its physicochemical and rheological properties. It is important that such properties of insect-based emulsions are maintained using various technologies.

Blockchain Technology for Combating Deepfake and Protect Video/Image Integrity

  • Rashid, Md Mamunur;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1044-1058
    • /
    • 2021
  • Tempered electronic contents have multiplied in last few years, thanks to the emergence of sophisticated artificial intelligence(AI) algorithms. Deepfakes (fake footage, photos, speech, and videos) can be a frightening and destructive phenomenon that has the capacity to distort the facts and hamper reputation by presenting a fake reality. Evidence of ownership or authentication of digital material is crucial for combating the fabricated content influx we are facing today. Current solutions lack the capacity to track digital media's history and provenance. Due to the rise of misrepresentation created by technologies like deepfake, detection algorithms are required to verify the integrity of digital content. Many real-world scenarios have been claimed to benefit from blockchain's authentication capabilities. Despite the scattered efforts surrounding such remedies, relatively little research has been undertaken to discover where blockchain technology can be used to tackle the deepfake problem. Latest blockchain based innovations such as Smart Contract, Hyperledger fabric can play a vital role against the manipulation of digital content. The goal of this paper is to summarize and discuss the ongoing researches related to blockchain's capabilities to protect digital content authentication. We have also suggested a blockchain (smart contract) dependent framework that can keep the data integrity of original content and thus prevent deepfake. This study also aims at discussing how blockchain technology can be used more effectively in deepfake prevention as well as highlight the current state of deepfake video detection research, including the generating process, various detection algorithms, and existing benchmarks.

Development of Multi-person remote collaboration system using WebRTC for fields adaptation (WebRTC를 이용한 현장 적응형 다자간 원격협업 시스템 개발)

  • Lee, Kwanhee;Kim, Ji-In;Kwon, Goo-Rak
    • Smart Media Journal
    • /
    • v.10 no.4
    • /
    • pp.9-14
    • /
    • 2021
  • In the case of the existing remote collaboration, the remote support service-oriented system is not suitable for the use of the field-oriented multi-person remote collaboration system. This paper is a remote collaboration system development for various industrial sites. We develop remote support and work management that faces the various needs of industrial sites, real-time video remote support between workers, and real-time voice work sharing between workers. In addition, The goal of the development aims to increase the usability by strengthening the security function through encryption in the video and to develop a more efficient system. Finally, the development contents are the remote management and the support software development, Android app development for worker, WebRTC-based remote collaboration system construction and development, and prototype development. These products are expected to increase demand and increase sales by installing and operating at industrial sites, and can promote manpower training, understanding trending technologies, and improving capabilities.

Impact of Fourth Industrial Revolution on Airport Management System: Moderator Effect of Convergence and Leadership (4차 산업혁명이 공항경영시스템에 미치는 영향 : 융합 및 리더십의 조절효과)

  • Lee, Yung-Kil;Baek, Jeong-Sun;Park, Sung-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.289-303
    • /
    • 2022
  • The purpose of this study verify to influence the effect of the 4th industrial revolution recognized by airport operators on the airport management system and the moderator effects of convergence and leadership between these influence relationships. Data collected through a survey of airport operators using simple random sampling at six international airports in Korea. Data analysis performed using Structural Equation Modeling. The research results found that the 4th industrial revolution had a positive effect on the airport management system. Also, moderator effects of convergence and leadership found significant statistically. In this paper, we asserts that it should be reconstructed the airport management system as a system suitable for the era of the 4th industrial revolution. This paper provide theoretical data and directions for empirical research to airport researchers, and implications for airport enterprise managers and airport policy planners. The findings of this study are particularly helpful for international airports that have adopted the technologies of the Fourth Industrial Revolution.

A novel method for generation and prediction of crack propagation in gravity dams

  • Zhang, Kefan;Lu, Fangyun;Peng, Yong;Li, Xiangyu
    • Structural Engineering and Mechanics
    • /
    • v.81 no.6
    • /
    • pp.665-675
    • /
    • 2022
  • The safety problems of giant hydraulic structures such as dams caused by terrorist attacks, earthquakes, and wars often have an important impact on a country's economy and people's livelihood. For the national defense department, timely and effective assessment of damage to or impending damage to dams and other structures is an important issue related to the safety of people's lives and property. In the field of damage assessment and vulnerability analysis, it is usually necessary to give the damage assessment results within a few minutes to determine the physical damage (crack length, crater size, etc.) and functional damage (decreased power generation capacity, dam stability descent, etc.), so that other defense and security departments can take corresponding measures to control potential other hazards. Although traditional numerical calculation methods can accurately calculate the crack length and crater size under certain combat conditions, it usually takes a long time and is not suitable for rapid damage assessment. In order to solve similar problems, this article combines simulation calculation methods with machine learning technology interdisciplinary. First, the common concrete gravity dam shape was selected as the simulation calculation object, and XFEM (Extended Finite Element Method) was used to simulate and calculate 19 cracks with different initial positions. Then, an LSTM (Long-Short Term Memory) machine learning model was established. 15 crack paths were selected as the training set and others were set for test. At last, the LSTM model was trained by the training set, and the prediction results on the crack path were compared with the test set. The results show that this method can be used to predict the crack propagation path rapidly and accurately. In general, this article explores the application of machine learning related technologies in the field of mechanics. It has broad application prospects in the fields of damage assessment and vulnerability analysis.

Study on Development of Korean Unmanned Systems through Analysis of U.S. Unmanned Systems Policy (미국의 무인체계 정책 분석을 통한 한국의 무인체계 발전에 관한 연구)

  • Park, Dongseon;Oh, Kyungwon
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.3
    • /
    • pp.65-70
    • /
    • 2021
  • This study presents a method to efficiently advance the Republic of Korea's Unmanned Systems through the analysis of the development of the U.S. Unmanned System Policy. After the occurrence of the September 11 attacks, the U.S. developed Unmanned Systems as a part of RMA and became the leader in this area. The system went through numerous trials and errors during the development and acquisition. From these experiences, the U.S. had embodied Unmanned Systems acquisition methods by establishing Unmanned Systems Development Guidance and DoD Autonomy Community of Interest in 2012. In addition, as diverse unmanned programs started to proceed, it promoted Core Technology development sharing and simplification of functions of the Unmanned Systems to exclude budget-wasting elements such as duplication of programs. The Republic of Korea must politically build a collaborative system between industry/academia/research institute/military and apply evolutionary development strategies from the first step of the development of the Unmanned Systems the future Game Changer. In operations, concepts of the Manned/Unmanned Systems complex operation should be established and intelligent S/W, Open System, and Cyber Security technologies to materialize them developed.

Changes in a facial recognition algorithm following different types of orthognathic surgery: a comparative study

  • Kim, Won-Yong;Han, Se Jin
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.48 no.4
    • /
    • pp.201-206
    • /
    • 2022
  • Objectives: Contemporary biometric technologies have been gaining traction in both public and private security sectors. Facial recognition is the most commonly used biometric technology for this purpose. We aimed to evaluate the ability of a publicly available facial recognition application program interface to calculate similarity scores of presurgical and postsurgical photographs of patients who had orthognathic surgery. Materials and Methods: Presurgical and postsurgical photographs of 75 patients who had orthognathic surgery between January 2018 and November 2020 in our department were used. Frontal photographs of patients in relaxed and smiling states were taken. The patients were classified into three groups: Group 2 had one-jaw surgery, Group 3 had two-jaw surgery to correct mandibular prognathism, and Group 4 had two-jaw surgery to correct facial asymmetry. For comparison, photographs of 10 participants were used as controls (Group 1). Two facial recognition application programs (Face X and Azure) were used to assess similarity scores. Results: The similarity scores in the two programs showed significant results. The similarity score of the control group, which did not undergo orthognathic surgery, was the highest. The results for Group 2, Group 3, and Group 4 were higher in the order of Group 2, Group 3, and Group 4. Conclusion: In this study, all orthodontic patients were recognized as the same person using the face recognition program before and after surgery. A significant difference in similarity results was obtained between the groups with both Face X and Azure and in both relaxed and smiling states.

Analysis of Public Sector Sharing Rate based on the IoT Device Classification Methodology (사물인터넷(IoT) 기기 분류 체계 기반 공공분야 점유율 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.65-72
    • /
    • 2022
  • The Internet of Things (IoT) provides data convergence and sharing functions, and IoT technology is the most fundamental core technology in creating new services by convergence of various cutting-edge technologies. However, there are different classification systems for the Internet of Things, and when it is limited to the domestic public sector, it is difficult to properly grasp the current status of which devices are installed and operated with what share, and systematic data or research The results are very difficult to find. Therefore, in this study, the relevance of the classification system for IoT devices was analyzed according to reality based on sales, shipments, and growth rate, and based on this, the actual share of IoT devices among domestic public institutions was analyzed in detail. The derived detailed analysis results are expected to be efficiently utilized in the process of selecting IoT devices for research and analysis to advance information protection technology such as responding to malicious code attacks on IoT devices, analyzing incidents, and strengthening security vulnerabilities.

A Study on Injection Attacks and Defenses on Microsoft Windows (MS Windows에서 인젝션 공격 및 방어 기법 연구)

  • Seong, HoJun;Cho, ChangYeon;Lee, HoWoong;Cho, Seong-Je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.9-23
    • /
    • 2020
  • Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.