• Title/Summary/Keyword: cyber electronic

Search Result 304, Processing Time 0.024 seconds

Healthcare IoT: DNA Watch (헬스케어 IoT: DNA 시계)

  • Kim, Jeong Su;Lee, Moon Ho;Park, Daechul
    • Journal of Engineering Education Research
    • /
    • v.21 no.3
    • /
    • pp.66-75
    • /
    • 2018
  • This paper is the second part of the January 2018 issue of the Korean Society for Engineering Education, The "Equilibrium and Unbalance Analysis of Taegeuk Pattern DNA Matrix Codes," and is an extension of the paper published in the IoT Section of the 2017 Summer Conference in Jeju. In this paper, we have reviewed the history of what is life, and 5G Mobile communication: with IoT followed by recent research on influenza RNA gene mutation and DNA mutation variants, and the insights of Watson and Crick. Inspired by a single Franklin DNA X-ray diffraction photograph, they received the Nobel Prize for the Nature publication of DNA that has three patterns and regular repeatability. Professor MoonHo Lee has solved the three patterns in Diagonal, Left to Right, and Vertical matrices in a 2x2 matrix[CU; AG] and A = T = U = 30% C = G = 20%. We also proposed DNA Watch. This is the Healthcare IoT, which is seen by the DNA Watch on the wrist, the type of Tai Chi pattern of the body, and is immediately connected to the smartphone and delivered to the doctor.

A study on Visual Expression to express Sound Characteristics of Public Places

  • Park, Dong-Cheol
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.11-21
    • /
    • 2021
  • The causes of noise generation according to the classification of indoor spaces are very diverse. Individual happiness is infringed by this noise. In this paper, We tried to visualize the spatial sound characteristics of public places using sound color to express them so that anyone can sympathize. The noise inside a conference room of a medical device company was measured for 100 minutes, and the frequency band was divided into three different types of existing sound pressure expression units. Because the size of the noise is expressed differently depending on the situation, There are cases where there is a difference of opinion between the measurer and the researcher. This noise measurement experiment was conducted, and the sound color was applied to classify it on a log scale considering auditory characteristics. As a result of comparing this with the result expression for different loudness expression units, A specific table in different units yielded almost similar results. In addition, the sound source section for 100 minutes was divided into three analysis sections, the analysis sections were different, and the size of the energy ratio for each analysis section was divided in the form of an envelope. The characteristics of the low-frequency region of the space have a high energy ratio, and the decrease in the energy ratio according to the increase in frequency is constant and regular. You can see that conversations are possible.

Efficient Proxy Re-encryption Scheme for E-Voting System

  • Li, Wenchao;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1847-1870
    • /
    • 2021
  • With the development of information and communication technologies, especially wireless networks and cell phones, the e-voting system becomes popular as its cost-effectiveness, swiftness, scalability, and ecological sustainability. However, the current e-voting schemes are faced with the problem of privacy leakage and further cause worse vote-buying and voter-coercion problems. Moreover, in large-scale voting, some previous e-voting system encryption scheme with pairing operation also brings huge overhead pressure to the voting system. Thus, it is a vital problem to design a protocol that can protect voter privacy and simultaneously has high efficiency to guarantee the effective implementation of e-voting. To address these problems, our paper proposes an efficient unidirectional proxy re-encryption scheme that provides the re-encryption of vote content and the verification of users' identity. This function can be exactly applied in the e-voting system to protect the content of vote and preserve the privacy of the voter. Our proposal is proven to be CCA secure and collusion resistant. The detailed analysis also shows that our scheme achieves higher efficiency in computation cost and ciphertext size than the schemes in related fields.

A Study on the Variable and Dynamic Salt According to Access Log and Password (접속로그와 패스워드에 따른 가변 및 동적솔트에 관한 연구)

  • Jeong, Jinho;Cha, Youngwook;Kim, Choonhee
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.58-66
    • /
    • 2021
  • The user's password must be encrypted one-way through the hash function and stored in the database. Widely used hash functions such as MD5 and SHA-1 have also been found to have vulnerabilities, and hash functions that are considered safe can also have vulnerabilities over time. Salt enhances password security by adding it before or after the password before putting it to the hash function. In the case of the existing Salt, even if it is randomly assigned to each user, once it is assigned, it is a fixed value in a specific column of the database. If the database is exposed to an attacker, it poses a great threat to password cracking. In this paper, we suggest variable-dynamic Salt that dynamically changes according to the user's password during the login process. The variable-dynamic Salt can further enhance password security during login process by making it difficult to know what the Salt is, even if the database or source code is exposed.

Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19

  • Choi, Manyong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4163-4183
    • /
    • 2021
  • As measures for protecting users and ensuring security of electronic financial transactions, such as online banking, financial institutions in South Korea have implemented network segregation policies. However, a revision of such domain-centered standardized network segregation policies has been increasingly requested because of: 1) increased demand for remote work due to changes resulting from COVID-19 pandemic; and 2) the difficulty of applying new technologies of fintech companies based on information and communications technologies (ICTs) such as cloud services. Therefore, in this study, problems of the remote work environment arising from the network segregation policy currently applied to the financial sector in South Korea and those from the application of new ICTs such as fintech technology have been investigated. In addition, internal network protection policies of foreign financial sectors, such as those of the United States, United Kingdom, European Union, and Russia, and internal network protection policies of non-financial sectors, such as control systems, have been analyzed. As measures for the effective improvement of the current network segregation policy, we propose a policy change from domain-based to data-centric network segregation. Furthermore, to resolve threats of hacking at remote work, recently emerging as a global problem due to COVID-19 pandemic, a standard model for remote work system development applicable to financial companies and a reinforced terminal security model are presented, and an alternative control method applicable when network segregation is not applied is proposed.

Modeling cryptographic algorithms validation and developing block ciphers with electronic code book for a control system at nuclear power plants

  • JunYoung Son;Taewoo Tak;Hahm Inhye
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.25-36
    • /
    • 2023
  • Nuclear power plants have recognized the importance of nuclear cybersecurity. Based on regulatory guidelines and security-related standards issued by regulatory agencies around the world including IAEA, NRC, and KINAC, nuclear operating organizations and related systems manufacturing organizations, design companies, and regulatory agencies are considering methods to prepare for nuclear cybersecurity. Cryptographic algorithms have to be developed and applied in order to meet nuclear cybersecurity requirements. This paper presents methodologies for validating cryptographic algorithms that should be continuously applied at the critical control system of I&C in NPPs. Through the proposed schemes, validation programs are developed in the PLC, which is a critical system of a NPP's I&C, and the validation program is verified through simulation results. Since the development of a cryptographic algorithm validation program for critical digital systems of NPPs has not been carried out, the methodologies proposed in this paper could provide guidelines for Cryptographic Module Validation Modeling for Control Systems in NPPs. In particular, among several CMVP, specific testing techniques for ECB mode-based block ciphers are introduced with program codes and validation models.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

A Study on Product Design Process in Digital Environment A Comparative Analysis of Image Evaluation and Design Factors in Internet Environment and Reality Environment (디지털 환경 하에 제품디자인 프로세스 연구 -인터넷 환경과 현실 환경에서의 제품디자인 이미지 평가 및 디자인 요소 비교분석-)

  • 윤형건
    • Archives of design research
    • /
    • v.13 no.3
    • /
    • pp.123-134
    • /
    • 2000
  • Electronic commerce in digital environment is greatly different from the commerce in physical environment in the past (reality environment) in terms of marketing, distribution structure and, above an, comsumers'purchase pattern. The Old purchase pattern is that a consumer buys a product after s/he touches, tests, and feels it physically, while the purchase pattern in electronic commerce enables the comsumer to make a decision about whether to buy it or not through the information gleaned from the computer monitor screen. A number of products which appears in the market now are designed to use the reality environment setup without consideration of the digital environment, of which the intention is to appeal to consumers with a series of design process. However, taking under consideration the present situation in which lots of electronic commerce are made in the cyber space or digital environment, we are required to forward the product design which can gains the positive attraction for consumers in this environment. Factor analysis is made in order to understand how the subjects perceive the image of the design of the product both in reality situation and in digital environment. The result shows the first factor has different images in those environments. In the background of this conclusion rests the fact that the difference of the transfer of formative factors to consumers is made in the images which show themselves in those different environments.

  • PDF

The Readiness of the University Hospital Employees for the Knowledge-based Management (대학병원 근로자의 지식경영 준비도에 관한 연구)

  • Seo, Young-Joon;Yang, Dong-Hyun;Shin, Kyong-Joo
    • Korea Journal of Hospital Management
    • /
    • v.6 no.1
    • /
    • pp.18-40
    • /
    • 2001
  • This study purports to investigate the readiness of the university hospital employees in the knowledge-based management. Data were collected from 550 employees including administrative, nursing, and technical staff of 9 university hospitals located in Seoul and Kyunggi Province through the self-administered questionnaires. The response rate was 79% and 425 questionnaires were used as final data and analyzed using 2 test, t-test, and ANOVA. The main findings of the study are as follows. 1) It seems that most employees of the study hospitals have basic knowledge on the concept of knowledge-based management. This finding implies that the implementation of the knowledge-based management in Korean university hospitals will not likely to face strong resistance from their employees. 2) The results show that Korean hospital employees are still not so accustomed to using e-mail as the main communication tool. This finding suggests that it is necessary to use various communication tools which include electronic data interchange, teleconference, and cyber chatting for facilitating the knowledge-based management in Korean university hospitals. 3) It is desirable to appoint a chief knowledge officer(CKO) for operating knowledge-based management system effectively. 4) A reward system for employees who show a distinguished performance in the creation and sharing of new knowledge should be established. Knowledge mileage system, selection of the best knowledge employee and team will be a good example of the effective reward system. 5) The participation and support from the chief executive officers (CEO) of the hospitals is an important factor for successful knowledge-based management. Furthermore, to make physicians actively participate in the knowledge-based management is another important factor for obtaining valuable outputs from the system. 6) It is found that the knowledge and skills of the hospitals employees on the information technology (IT) are not sufficient for making knowledge-based management more popular. This implies that it is very important to select IT-oriented employees and educate them continuously on the knowledge-based management.

  • PDF

Impact of Healthcare Accreditation Using a Systematic Review: Balanced Score Card Perspective (의료기관인증의 효과에 대한 체계적 문헌고찰: Balanced Score Card 관점으로)

  • Park, Il-Tae;Jung, Yoen-Yi;Park, Seong-Hi;Hwang, Jeong-Hae;Suk, Seung-Han
    • Quality Improvement in Health Care
    • /
    • v.23 no.1
    • /
    • pp.69-90
    • /
    • 2017
  • Purpose: The purpose of this study was to analyze the impact of healthcare accreditation and to provide empirical evidence to validate positive effectiveness. Methods:Six electronic databases (KERIS, KoreaMed, NDSL, Ovid-medline, Embase, Cochrane library) were accessed in May 2016. Keywords used were 'accreditation' and 'Joint Commission on Accreditation of Healthcare Organization (JCAHO)'. Of the initially identified 3,008 articles, 60 studies on healthcare accreditation were selected based on inclusion criteria that are hospital accreditation, accreditation by disease and clinical center accreditation. These were retrieved and analyzed. Result: The 60 study results were on the impact of healthcare accreditation. Results were classified into four perspectives of Balanced Score Card (Financial, Customer, Internal Process, Learning & Growth). In internal process perspective, results revealed that healthcare accreditation has made a positive impact on "care process and procedure". In learning & growth perspective, healthcare accreditation has made a positive influence on "leadership", "organizational cultures" and "change mechanisms". However, it revealed that healthcare accreditation does not directly affect financial performance. It is also difficult to reach a definitive conclusion that healthcare accreditation programs affect patient satisfaction of customer and clinical outcome of the internal process. Conclusion: Healthcare accreditation programs provide positive impact on change of care process and building communication-oriented hospital culture. However, more rigorous and diverse research is needed on financial effects and clinical outcomes of healthcare accreditation.