• Title/Summary/Keyword: information Protection

Search Result 4,519, Processing Time 0.031 seconds

Shared Protection of Lightpath with Guaranteed Switching Time over DWDM Networks

  • Chen Yen-Wen;Peng I-Hsuan
    • Journal of Communications and Networks
    • /
    • v.8 no.2
    • /
    • pp.228-233
    • /
    • 2006
  • Survivability is a very important requirement for the deployment of broadband networks because out of service links can affect volumes of traffic even if it is a very short time. And the data paths of broadband networks, which are critical for traffic engineering, are always necessary to be well protected. The procedure of protection or restoration for a path is initiated when failure is detected within the working path. In order to minimize the influence on transmission quality caused by the failure of links and to provide a definite time for the recovery from the failure, the protection switching time (PST) should be carefully considered in the path arrangement. Several researches have been devoted to construct the protection and restoration schemes of data paths over dense wavelength division multiplexing (DWDM) networks, however, there was rare research on the design of data paths with guaranteed protection switching time. In this paper, the PST-guaranteed scheme, which is based on the concept of short leap shared protection (SLSP), for the arrangement of data paths in DWDM networks is proposed. The proposed scheme provides an efficient procedure to determine a just-enough PST-guaranteed backup paths for a working path. In addition to selecting the PST-guaranteed path, the network cost is also considered in a heuristic manner. The experimental results demonstrate that the paths arranged by the proposed scheme can fully meet the desired PST and the required cost of the selected path is competitive with which of the shared path scheme.

JHPS-KARP-ARPS Joint Program for Commemoration of 2021 Bo Lindell Medal to Discuss the Future of Radiation Protection among Young Scientists and the Award Recipient, Dr. Ogino

  • Fujibuchi, Toshioh;Ogino, Haruyuki;Taek, Han Ki;Tani, Kotaro;Emes, Daniel
    • Journal of Radiation Protection and Research
    • /
    • v.46 no.2
    • /
    • pp.80-82
    • /
    • 2021
  • Dr. Haruyuki Ogino, a member of the Japan Health Physics Society (JHPS), was awarded the 2021 Bo Lindell Medal by the International Commission on Radiological Protection (ICRP). To commemorate this, the "Joint JHPS-KARP-ARPS program for young radiation protection (RP) scientists to discuss the future of RP" was organized via a web meeting system. First, Dr. Ogino gave a lecture, and then young researchers selected from each academic society made presentations on the future of RP. After the presentations by the three researchers, a free talk was held-young researcher groups of each country being active is a great opportunity to collaborate and exchange information. It was emphasized that the low awareness of knowledge related to radiation has been common to all of the participating countries. Thus, it is necessary to utilize communication via web technology, as done for this program, effectively. One of the biggest advantages for Asia and Oceania is that we do not have a significant time difference. The round-table discussion was concluded by expressing the hope of active exchange and development of young researchers in the future.

Evaluating the Efficiency of Personal Information Protection Activities in a Private Company: Using Stochastic Frontier Analysis (개인정보처리자의 개인정보보호 활동 효율성 분석: 확률변경분석을 활용하여)

  • Jang, Chul-Ho;Cha, Yun-Ho;Yang, Hyo-Jin
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.76-92
    • /
    • 2021
  • The value of personal information is increasing with the digital transformation of the 4th Industrial Revolution. The purpose of this study is to analyze the efficiency of personal information protection efforts of 2,000 private companies. It uses a stochastic frontier approach (SFA), a parametric estimation method that measures the absolute efficiency of protective activities. In particular, the personal information activity index is used as an output variable for efficiency analysis, with the personal information protection budget and number of personnel utilized as input variables. As a result of the analysis, efficiency is found to range from a minimum of 0.466 to a maximum of 0.949, and overall average efficiency is 0.818 (81.8%). The main causes of inefficiency include non-fulfillment of personal information management measures, lack of system for promoting personal information protection education, and non-fulfillment of obligations related to CCTV. Policy support is needed to implement safety measures and perform personal information encryption, especially customized support for small and medium-sized enterprises.

A Authentication technique of Internal Information Hacking Protection based on H/W Information (H/W 정보의 인증을 통한 내부정보유출 방지 기법)

  • Yang, Sun Ok;Choi, Nak Gui;Park, Jae Pyo;Choi, Hyung Il
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.71-81
    • /
    • 2009
  • To the cause of the development of IT technology and the Internet, information leakage of industry is also facing a serious situation. However, most of the existing techniques to prevent leakage of information disclosure after finding the cause of defense. Therefore, in this paper by adding information about the Hardware to offer a way to protect the information. User authentication information to access the data according to different security policies to reflect a little more to strengthen security. And the security agent for the data by using a log of all actions by the record was so easy to analyze. It also analyzes and apply the different scenarios possible. And the analysis of how to implement and how to block. The future without the use of security agents to be able to control access to data and H/W information will be updated for the study will be done.

A Study on the Information System Security Audit Method for Personal Information Protection (개인정보보호를 위한 정보시스템 보안감사 방법에 관한 연구)

  • Lee, Dong-Nyuk;Park, Jeong-Sun
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.4
    • /
    • pp.107-116
    • /
    • 2010
  • To give a solution to solve personal information problems issued in this study, the domestic and overseas cases about information security management system including an authentication technique are analyzed. To preserve the outflow of personal information, which is such a major issue all over the world, a new security audit check list is also proposed. We hope this study to help information system developers construct and operate confidential information systems through the three steps: Analysis of risk factors that expose personal information, Proposal to solve the problem, Verification of audit checking items.

A Study on the Prospective IT R&D Fields in the Smart Grid Area (스마트그리드산업에서의 유망 IT R&D 분야 도출)

  • Sim, Jin-Bo;Ha, Young-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1416-1427
    • /
    • 2010
  • Except for some fields, Smart Grid-related technology in Korea is considered to be below the level of developed countries. Under this situation, this study is conducted to look into IT technology related to Smart Grid and draw prospective IT R&D fields in the Smart Grid Industry. To seek out prospective IT R&D fields, the two-stage process evaluating economics, political property, and technical validity. According to the result, four fields of (1) sensor, (2) information protection, (3) AMI middleware, (4) electricity management are selected as prospective fields. The sensor and AMI middleware fields focus on development of key technology, so the strategy that launches leading products in global market faster than other countries(Focusing & First Mover Strategy). The information protection felid is divided into the safety technology for the felid electricity network and the personal & corporate information protection technology, and therefore the R&D Sharing strategy is efficient. For the electricity management filed, a strategic alliance for developing component technology of Grid is desirable.

Performance Optimization of Tandem Source-Channel Coding Systems Employing Unequal Error Protection Under Complexity Constraints (복잡도 제한 하에서 비균등 오류 보호 기법을 사용하는 탠덤 소스-채널 코딩 시스템의 성능 최적화)

  • Lim, Jongtae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2537-2543
    • /
    • 2014
  • Between tandem source-channel coding systems and joint source-channel coding systems, it has been known that there is a complexity threshold in complexity versus performance. In this paper, by expanding the previous analysis for equal error protection systems, we analyze and compare the performance under complexity constrains for tandem source-channel coding systems which employ unequal error protection. Under a given complexity constraint, the optimization is performed to minimize the end-to-end distortion of each representative tandem and joint source-channel coding system. The results show that the complexity threshold for unequal error protection systems becomes smaller and the performance enhancement of unequal error protection systems over equal error protection systems gets smaller as the system complexity gets larger.

A Study of Student Nurses' Knowledge, Awareness and Performance of Patients' Personal Information Protection (간호대학생의 환자 개인정보보호에 대한 지식, 인식 및 실천정도)

  • Ahn, Sung Mi
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.337-345
    • /
    • 2020
  • The Study was conducted to understand the degree of knowledge, awareness and performance of nursing students' patients' personal information protection and to grasp the relationship between them. A convenience sample 262 nursing students was selected from C do, between 1 November and 8 November 2019. Using SPSS Program t-test, one-way ANOVA, Pearson's correlation analysis were performed. Factors that influenced knowledge, awareness and performance included grade, education of information. It is necessary to develop and test programs to ensure an improvement in knowledge and awareness among nursing students to increase their performance.

Automatic Classification of Objectionable Videos Based on GoF Feature (GoF 특징을 이용한 유해 동영상 자동 분류)

  • Lee, Seung-Min;Lee, Ho-Gyun;Nam, Taek-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.197-200
    • /
    • 2005
  • 본 논문은 유해한 동영상을 실시간으로 분석하고 차단하기 위하여, 동영상의 비주얼 특징으로서 그룹 프레임(Group of Frame) 특징을 추출하여 SVM 학습모델을 활용하는 유해 동영상 분류에 관한 것이다. 지금까지 동영상 분류에 관한 연구는 주로 입력 동영상을 뉴스, 스포츠, 영화, 뮤직 비디오, 상업 비디오 등 사전에 정의한 몇 개의 장르에 자동으로 할당하는 기술이었다. 그러나 이러한 분류 기술은 미리 정의한 장르에 따른 일반적인 분류 모델을 사용하기 때문에 분류의 정확도가 높지 않다. 따라서, 유해 동영상을 실시간으로 자동 분류하기 위해서는, 신속하고 효과적인 동영상 내용분석에 적합한 유해 동영상 특화의 특징 추출과 분류 모델 연구가 필요하다. 본 논문에서는 유해 동영상에 대하여 신속하고, 정확한 분류를 위하여 유해 동영상의 대표 특징으로서 그룹프레임 특징을 정의하고, 이를 추출하여 SVM 학습 모델을 생성하고 분류에 활용하는 매우 높은 성능의 분석 방법을 제시하였다. 이는 최근 인터넷 뿐만 아니라 다양한 매체를 통하여 급속도로 번지고 있는 유해 동영상 차단 분야에 적극 활용될 수 있을 것으로 기대된다.

  • PDF

Interference Analysis Between Fixed Wireless System and Radar Operating in VHF/UHF Bands with Geographic Information (지리정보에 기반한 VHF/UHF 대역의 고정무선시스템과 레이더 간의 간섭분석)

  • Suh, Kyoung-Whoan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.1
    • /
    • pp.40-47
    • /
    • 2013
  • By virtue of Rec. ITU-R P.1546 and geography information system, interference analysis for the fixed wireless system and radar has been presented based upon the frequency-distance rules with minimum coupling loss, and a comprehensive methodology for assessing interoperability between systems was examined in terms of received signal, protection ratio, frequency dependent rejection. Also to find the antenna gain from a discrimination angle, a useful S-I plane was introduced based on signal and interference vectors derived from the real map with geographic information. To show some computational results, geography information on the map was taken for the given area, and field strength and path profile were illustrated for the radar and fixed wireless system operating at 2.7 GHz, for convenience. In addition the interference effect of receiver was also checked as a function of radar beam direction including protection ratio and frequency dependent rejection. The developed interference analysis can be actually applied to evaluate interoperability for wireless systems in the VHF and UHF bands.