• Title/Summary/Keyword: Smart Defense

Search Result 166, Processing Time 0.023 seconds

Energy Efficient IDS Node Distribution Algorithm using Minimum Spanning Tree in MANETs

  • Ha, Sung Chul;Kim, Hyun Woo
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.41-48
    • /
    • 2016
  • In mobile ad hoc networks(MANETs), all the nodes in a network have limited resources. Therefore, communication topology which has long lifetime is suitable for nodes in MANETs. And MANETs are exposed to various threats because of a new node which can join the network at any time. There are various researches on security problems in MANETs and many researches have tried to make efficient schemes for reducing network power consumption. Power consumption is necessary to secure networks, however too much power consumption can be critical to network lifetime. This paper focuses on energy efficient monitoring node distribution for enhancing network lifetime in MANETs. Since MANETs cannot use centralized infrastructure such as security systems of wired networks, we propose an efficient IDS node distribution scheme using minimum spanning tree (MST) method to cover all the nodes in a network and enhance the network lifetime. Simulation results show that the proposed algorithm has better performance in comparison with the existing algorithms.

Yet to Adopt Intelligent Robots for Product Innovation? -A Survey of South Korean Manufacturers-

  • Choi, Moon Jong;Lim, Sang Hyun;Kim, Yang Sok;Lee, Choong Kwon
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.111-115
    • /
    • 2016
  • Intelligent robots are being introduced and utilized to create new values in diverse fields such as medical care, national defense, education, and manufacturing. However, while the technical aspects of intelligent robots are spreading, the business side is lacking in recognition. The purpose of this study is to identify the factors affecting product innovation through the introduction of intelligent robots in enterprises. Among the six variables secured from the technology, organization, and environment framework, only perceived direct usefulness and competitive pressure have significant effects on product innovation. The results imply that the effects of introducing robots are still in their early stage from a business perspective.

Automatic UML Design Extraction with Software Visualization based on Reverse Engineering

  • Jung, Se Jun;Kim, Janghwan;Lee, Won Young;Park, Bo Kyung;Son, Hyun Seung;Kim, R. Young Chul
    • International journal of advanced smart convergence
    • /
    • v.10 no.3
    • /
    • pp.89-96
    • /
    • 2021
  • In various areas of the 4th industry, a big issue is software quality enhancement for stability and reliability of the smart software systems. After revising software promotion law at 2020, we must clearly define requirements and separate design parts and implementation parts of an all public software development contracts. In this study, we need to validate whether the final implementation of software is followed by the original design or not. To do this, we consider the design restoration through software visualization based on reverse engineering. Therefore we propose an UML design extraction and visualization method based on reverse engineering. Based on this, we may validate whether it is implemented according to the original design, and how much visualizes and includes the code the internal complexity for improvement of software quality.

Locality Aware Multi-Sensor Data Fusion Model for Smart Environments (장소인식멀티센서스마트 환경을위한 데이터 퓨전 모델)

  • Nawaz, Waqas;Fahim, Muhammad;Lee, Sung-Young;Lee, Young-Koo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.78-80
    • /
    • 2011
  • In the area of data fusion, dealing with heterogeneous data sources, numerous models have been proposed in last three decades to facilitate different application domains i.e. Department of Defense (DoD), monitoring of complex machinery, medical diagnosis and smart buildings. All of these models shared the theme of multiple levels processing to get more reliable and accurate information. In this paper, we consider five most widely acceptable fusion models (Intelligence Cycle, Joint Directors of Laboratories, Boyd control, Waterfall, Omnibus) applied to different areas for data fusion. When they are exposed to a real scenario, where large dataset from heterogeneous sources is utilize for object monitoring, then it may leads us to non-efficient and unreliable information for decision making. The proposed variation works better in terms of time and accuracy due to prior data diminution.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

An Empirical Study on the Factors Influencing User Satisfaction of Military Smart-Education (국방 스마트 교육의 사용자 만족도에 미치는 영향에 관한 실증적 연구)

  • Pyo, Chang-Kyun;Han, Kyeong-Seok;Ryu, Gab-Sang
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.41-48
    • /
    • 2016
  • This paper identifies the factors affecting user satisfaction for the successful application of Smart-education in national defense recently at the national level and suggests the political implications through the empirical research to nurture creative talents globally. The study model was designed by setting the influencing factors on the user satisfaction of smart education. In order to verify the reliability of the measurement item, it was calculating the coefficient Cronbach's ${\alpha}$ and validity was verified by carrying out factor analysis. The empirical results of this doctoral dissertation as a Smart-education, factors affecting user satisfaction, content, management, internal organization, user characteristics, such as classified into five areas detailed factors as independent variables correlation analyzes were carried out factors influencing the most effective impact on training and user satisfactions were tested.

The Small GTPase CsRAC1 Is Important for Fungal Development and Pepper Anthracnose in Colletotrichum scovillei

  • Lee, Noh-Hyun;Fu, Teng;Shin, Jong-Hwan;Song, Yong-Won;Jang, Dong-Cheol;Kim, Kyoung Su
    • The Plant Pathology Journal
    • /
    • v.37 no.6
    • /
    • pp.607-618
    • /
    • 2021
  • The pepper anthracnose fungus, Colletotrichum scovillei, causes severe losses of pepper fruit production in the tropical and temperate zones. RAC1 is a highly conserved small GTP-binding protein in the Rho GT-Pase family. This protein has been demonstrated to play a role in fungal development, and pathogenicity in several plant pathogenic fungi. However, the functional roles of RAC1 are not characterized in C. scovillei causing anthracnose on pepper fruits. Here, we generated a deletion mutant (𝜟Csrac1) via homologous recombination to investigate the functional roles of CsRAC1. The 𝜟Csrac1 showed pleiotropic defects in fungal growth and developments, including vegetative growth, conidiogenesis, conidial germination and appressorium formation, compared to wild-type. Although 𝜟Csrac1 was able to develop appressoria, it failed to differentiate appressorium pegs. However, 𝜟Csrac1 still caused anthracnose disease with significantly reduced rate on wounded pepper fruits. Further analyses revealed that 𝜟Csrac1 was defective in tolerance to oxidative stress and suppression of host-defense genes. Taken together, our results suggest that CsRAC1 plays essential roles in fungal development and pathogenicity in C. scovilleipepper fruit pathosystem.

Study on Fun factor in Smartphone Convergence Game - Focusing on the Defense and Plunder (스마트폰 융복합 게임의 재미요인 분석 - 수성과 약탈을 중심으로)

  • Kim, In-Su;Jung, Hyung-Won;Kim, Tae-Gyu
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.367-372
    • /
    • 2015
  • Smartphone game market, smart phone appeared on the market and soon developed rapidly, generation change is happening. Generally, Smartphone games are only short-lived super cell's Clash of Clans is gaining popularity for over two years. So Clash of Clans this game with hold most characteristic elements of the defense and plunder on the subject analyzed the fun factor. In order to analyze the defense and plunder elements were prepared Clash of Clans and Kings of Thieves in cases. Two of the cases, depending on the fun theory Preparation, A sense of space, A solid core machanic, A range of challenge, A range of abilities required to solve the encounter and Skill required in using the abilities were evaluated in the fun factor analysis of defense and plunder elements.

A Model of Artificial Intelligence in Cyber Security of SCADA to Enhance Public Safety in UAE

  • Omar Abdulrahmanal Alattas Alhashmi;Mohd Faizal Abdullah;Raihana Syahirah Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.173-182
    • /
    • 2023
  • The UAE government has set its sights on creating a smart, electronic-based government system that utilizes AI. The country's collaboration with India aims to bring substantial returns through AI innovation, with a target of over $20 billion in the coming years. To achieve this goal, the UAE launched its AI strategy in 2017, focused on improving performance in key sectors and becoming a leader in AI investment. To ensure public safety as the role of AI in government grows, the country is working on developing integrated cyber security solutions for SCADA systems. A questionnaire-based study was conducted, using the AI IQ Threat Scale to measure the variables in the research model. The sample consisted of 200 individuals from the UAE government, private sector, and academia, and data was collected through online surveys and analyzed using descriptive statistics and structural equation modeling. The results indicate that the AI IQ Threat Scale was effective in measuring the four main attacks and defense applications of AI. Additionally, the study reveals that AI governance and cyber defense have a positive impact on the resilience of AI systems. This study makes a valuable contribution to the UAE government's efforts to remain at the forefront of AI and technology exploitation. The results emphasize the need for appropriate evaluation models to ensure a resilient economy and improved public safety in the face of automation. The findings can inform future AI governance and cyber defense strategies for the UAE and other countries.