• Title/Summary/Keyword: industrial security

Search Result 1,748, Processing Time 0.031 seconds

A Study on The Network Design of Smart Village to Provide Wired and Wireless Convergence Services on IoT (IoT기반의 유무선 융복합 서비스 제공을 위한 스마트빌리지의 네트워크 구성방안에 관한 연구)

  • Kim, Yun-ha;Jeong, Jae-woong;Kim, Young-sung;Choi, Hyun-ju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.296-299
    • /
    • 2022
  • The rapid urban expansion and the increase in natural disasters due to the increase of population after industrialization and climate change are causing numerous urban management problems. The IP based hyper-connectivity caused by the initiation of the 4th industrial revolution enables a variety of technologies and services that produce vast amounts of data and solve urban management problems based on this. Especially, the quality of life is improved by providing the necessary information for life that are produced through a sensor network on wired and wireless communication. In this study, we intend to propose the method of optimal communcation network composition for innovative and futuristic city management technology through the case of K-water Smart Village Communication System

  • PDF

Impulse Noise Removal Filter using Nearest Effective Pixel Search (최근접 유효 화소의 탐색을 사용한 임펄스 잡음 제거 필터)

  • Chung, Young-Su;Jung, Hwae-Sung;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.139-141
    • /
    • 2022
  • As interest in digital video media and intelligent systems increases rapidly, technologies using video information are being combined and used in various fields such as security and artificial intelligence. Impulse noise generated during digital image processing degrades the image quality of the image and reduces the reliability of information, so it is necessary to remove it through a filter. There are SMF, AWMF, and MDBUTMF as well-known antecedent methods, but they all have limitations in achieving seamless filtering in environments with large loss of information on valid pixels due to problems with the algorithm itself. Therefore, this paper designs a median filter algorithm that applies weights reflecting the reliability of the information by searching for the nearest effective pixels present within the mask. For performance evaluation, this algorithm and the preceding algorithm were compared and analyzed using PSNR and enlarged images.

  • PDF

Performance Analysis of Korean Digital Key Practical Talent Training Program (한국형 디지털 핵심 실무인재양성훈련 프로그램의 성과 분석)

  • Young-bok Cho
    • Journal of Practical Engineering Education
    • /
    • v.14 no.3
    • /
    • pp.573-577
    • /
    • 2022
  • In this paper, the operation of the Korean digital key talent training project (K-Digital Training) supported by the Ministry of Labor in 2022 began in 2021, and through public offering in the second half of 2022, 403 training courses are held to secure 33,000 annual training personnel. Accordingly, because of performance analysis on learning satisfaction in each field of the state-led talent development program to respond quickly to future industrial changes by fostering digital talent, the overall satisfaction with the program was very high at 4.27 on average. However, the initial expectation for employment linkage is decreasing from 4.2 to 3.91 at the end of learning. Therefore, it is expected that the satisfaction level of the program can be continuously improved only when the organizations participating in the program are prepared in advance for employment linkage

Blockchain and AI-based big data processing techniques for sustainable agricultural environments (지속가능한 농업 환경을 위한 블록체인과 AI 기반 빅 데이터 처리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.3 no.2
    • /
    • pp.17-22
    • /
    • 2024
  • Recently, as the ICT field has been used in various environments, it has become possible to analyze pests by crops, use robots when harvesting crops, and predict by big data by utilizing ICT technologies in a sustainable agricultural environment. However, in a sustainable agricultural environment, efforts to solve resource depletion, agricultural population decline, poverty increase, and environmental destruction are constantly being demanded. This paper proposes an artificial intelligence-based big data processing analysis method to reduce the production cost and increase the efficiency of crops based on a sustainable agricultural environment. The proposed technique strengthens the security and reliability of data by processing big data of crops combined with AI, and enables better decision-making and business value extraction. It can lead to innovative changes in various industries and fields and promote the development of data-oriented business models. During the experiment, the proposed technique gave an accurate answer to only a small amount of data, and at a farm site where it is difficult to tag the correct answer one by one, the performance similar to that of learning with a large amount of correct answer data (with an error rate within 0.05) was found.

Economic analysis of irrigation facilities for securing water for field crops

  • Hyung Jin Shin;Jae Young Lee;Jae Nam Lee;Han Na Lee;Sang Hyeon Park;Bum Soo Shin;Sang Sun Cha;Se Myung Kwon;Jung Il Seo;Chan Gi Park
    • Korean Journal of Agricultural Science
    • /
    • v.50 no.4
    • /
    • pp.785-798
    • /
    • 2023
  • Considering irrigation facilities are currently insufficient and drought vulnerability due to climate change is high, efficient measures are required to secure water supply for field crops. This study, therefore, calculated the water shortage to secure water for representative field crops. An economic analysis was further conducted by comparing the production income to the input cost for each method. Here, five distinct regions were selected to represent each crop-Cheongyang-gun for chili peppers, Yesan-gun for apples, Dangjin-si for cabbages, Seosan-si for garlic, and Goesan for beans. The regions with insufficient water supply were estimated by calculating the water requirements and the supplied water from public groundwater wells for each area. A comprehensive set of four scenarios was presented as a strategy to ensure water security and manage irrigation facilities. These scenarios comprised the maintenance of existing groundwater wells, the construction of new water storage tanks, the installation of additional groundwater wells, and the utilization of surface water. B/C (benefit/cost) analysis was conducted for each scenario. As a result, the construction of water storage tanks was selected as a facility and water management plan in Cheongyang-gun, Dangjin-si, and Seosan-si. The analysis additionally indicated the economic viability of installing surface water utilization facilities in Yesan-gun and developing water storage tanks and groundwater (aquifer) wells in Goesan-gun. The results of this study are considered to serve as foundation data that may be utilized in the selection of water management plans for drought-prone areas in the future.

A Case Study on the Protection of Accounts and Assets on Cryptocurrency Exchanges: Focusing on the Processes of Related Institutions (가상통화거래소의 계정 및 자산 보호에 관한 사례연구: 유관기관의 프로세스를 중심으로)

  • Yoonjoo Lee;Dongwon Lee;Ingoo Han
    • Information Systems Review
    • /
    • v.22 no.4
    • /
    • pp.135-161
    • /
    • 2020
  • With the growth of blockchain and cryptocurrency-related markets, cryptocurrency exchanges are growing as a new industry. However, as the legal and regulatory definitions of cryptocurrencies are still in progress, unlike existing industrial groups, they are not under the supervision of regulatory agencies. As a result, users (i.e., cryptocurrency investors) have suffered two types of damage that could occur from hacking and other accidents on the exchanges. One type of the damage is the loss of assets caused by the extortion of personal information or account and the other is the damage from users who might be involved in external frauds. Both are analyzed in comparison with existing operators whose functions are like the exchanges. The results of this study show that membership (KYC: Know Your Client), log-in, and additional authentication in transactions are on the similar level to those of the operators while the fraud detection system (FDS) and anti-money laundering (AML) of fiat currencies and cryptocurrencies need rapid improvement.

Navigating Ethical AI: A Comprehensive Analysis of Literature and Future Directions in Information Systems (AI와 윤리: 문헌의 종합적 분석과 정보시스템 분야의 향후 연구 방향)

  • Jinyoung Min
    • Knowledge Management Research
    • /
    • v.25 no.3
    • /
    • pp.1-22
    • /
    • 2024
  • As the use of AI becomes a reality in many aspects of daily life, the opportunities and benefits it brings are being highlighted, while concerns about the ethical issues it may cause are also increasing. The field of information systems, which studies the impact of technology on business and society, must contribute to ensuring that AI has a positive influence on human society. To achieve this, it is necessary to explore the direction of research in the information systems field by examining various studies related to AI and ethics. For this purpose, this study collected literature from 2020 to the present and analyzed their research topics through researcher coding and topic modeling methods. The analysis results categorized research topics into AI ethics principles, ethical AI design and development, ethical AI deployment and application, and ethical AI use. After reviewing the literature in each category to grasp the current state of research, this study suggested future research directions for AI ethics in the field of information systems.

Problems and Improvement Directions of Fire Protection Designing and Supervising Jobs (소방 설계·감리업의 문제점 및 개선방향에 관한 연구)

  • Cha, Jong-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.12
    • /
    • pp.8745-8752
    • /
    • 2015
  • Since many accidents have occurred in Korea in these days, many people have lost their health and have been damaged. The damages caused by fires which occur to many buildings where many people always reside takes a substantial share of the total damages. And since the proportions of the domestic fire protection designing/supervising industries are relatively much disregarded compared to other kinds of work, it is in the situation that there are many cases of serious damages because the fire protection equipment didn't exert the proper functions on fire after a building is constructed since the supervision against the poor construction along with the inadequate design. In order to improve such situations, in case of the design industry, the criteria on registration and workforce placement, the scope of operation, the design documents required when requesting the agreement to the construction permits, the responsibilities and authorities about the jobs of the fire protection facility designers must be improved and, in case of supervising industry, the registration criteria, the operation scope and the kinds, methods, targets and criteria of supervision, the criteria on the additional placement of assistant supervisors, the contents and scope of work must be improved, the PQ system and Public Supervision System must be reviewed and the systems for preventing any poor supervision must be improved in order to pursue the security of the people and their properties at the same level as the other kinds of work by preparing for the firm position and foundation of the fire protection design and supervision.

Design of Secure Scheme based on Bio-information Optimized for Car-sharing Cloud (카 쉐어링 클라우드 환경에서 최적화된 바이오 정보 기반 보안 기법 설계)

  • Lee, Kwang-Hyoung;Park, Sang-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.469-478
    • /
    • 2019
  • Car-sharing services have been settled on as a new type of public transportation owing to their enhanced convenience, expanded awareness of practical consumption patterns, the inspiration for environmental conscientiousness, and the diffusion of smart phones following the economic crisis. With development of the market, many people have started using such services. However, security is still an issue. Damage is expected since IDs and passwords are required for log-in when renting and controlling the vehicles. The protocol suggested in this study uses bio-information, providing an optimized service, and convenient (but strong) authentication with various service-provider clouds registering car big data about users through brokers. If using the techniques suggested here, it is feasible to reduce the exposure of the bio-information, and to receive service from multiple service-provider clouds through one particular broker. In addition, the proposed protocol reduces public key operations and session key storage by 20% on mobile devices, compared to existing car-sharing platforms, and because it provides convenient, but strong, authentication (and therefore constitutes a secure channel), it is possible to proceed with secure communications. It is anticipated that the techniques suggested in this study will enhance secure communications and user convenience in the future car-sharing-service cloud environment.

A Study on Image Integrity Verification Based on RSA and Hash Function (RSA와 해시 함수 기반 이미지 무결성 검증에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.878-883
    • /
    • 2020
  • Cryptographic algorithms are used to prevent the illegal manipulation of data. They are divided into public-key cryptosystems and symmetric-key cryptosystems. Public-key cryptosystems require considerable time for encryption and decryption compared to symmetric-key cryptosystem. On the other hand, key management, and delivery are easier for public-key cryptosystems than symmetric-key cryptosystems because different keys are used for encryption and decryption. Furthermore, hash functions are being used very effectively to verify the integrity of the digital content, as they always generate output with a fixed size using the data of various sizes as input. This paper proposes a method using RSA public-key cryptography and a hash function to determine if a digital image is deformed or not and to detect the manipulated location. In the proposed method, the entire image is divided into several blocks, 64×64 in size. The watermark is then allocated to each block to verify the deformation of the data. When deformation occurs, the manipulated pixel will be divided into smaller 4×4 sub-blocks, and each block will have a watermark to detect the location. The safety of the proposed method depends on the security of the cryptographic algorithm and the hash function.