• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.049 seconds

The Implementation of an Automated Stock Trading System based on A3C using Deep Reinforcement Learning (심층 강화학습을 이용한 A3C 기반의 자동 주식거래시스템 구현)

  • Sumin Ko;Sungjun Kim;EuiJu Yeo;Minkyung Choi;Kyuyoung Lee
    • Annual Conference of KIPS
    • /
    • 2024.10a
    • /
    • pp.950-951
    • /
    • 2024
  • 최근 금융업에서는 기계학습의 활용범위가 빠르게 확대되고 있다. 본 논문에서는 심층강화학습(DRL)을 활용한 A3C 알고리즘 기반 자동 주식거래시스템을 구현하고, 이를 적용한 결과 저점과 고점에서 우수한 의사결정 판단을 수행하여 높은 수익을 달성하는 것을 실험을 통해 입증하였다.

A Study on the Methods of Fault Analysis to Improve Safety in U-Healthcare System for Managing Emergency Rescue for Seniors (시니어들의 응급구난 관리를 위한 U-Healthcare시스템에서 안전성 개선을 위한 결함 분석 방법에 관한 연구)

  • Kim, Gyu-A;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.2
    • /
    • pp.170-179
    • /
    • 2014
  • Recently the U-Healthcare system has been rapidly advanced to manage emergence rescue for seniors. We can access emergency rescue systems with high quality services anytime, anywhere under ubiquitous healthcare systems. The more the various systems develop, the more software security systems become important. Therefore, the safety-critical system has been widely spread to the world by advancement of the information and communication technologies. There are a lot kind of fault analysis methods to evaluate software security systems. However due to characteristics of software that is not applied by human error, it can be prevented the enormous damages and losses from improving the safety of safety-critical system. So this paper proposes an integration method of FTA and Forward and Backward FMECA. This method has each strength of FTA and FMECA which is visual and numeric in normalization. First, by use of FTA, we can redraw FTA with Forward FMECA and Backward FMECA in consideration of occurrence, severity, detection, correctness, robustness, and security. Also according to value of NRVP at each event, we can modify FTA diagrams as shown critical paths given by severity and occurrence. Also, we propose the improved emergency rescue service platform of ubiquitous healthcare systems through identifying priorities of the criticality according to normalized risk priority values (NRPV).

A Study on Survivability of Node using Response Mechanism in Active Network Environment (액티브 네트워크 환경에서 대응 메커니즘을 이용한 노드 생존성에 관한 연구)

  • Yang, Jin-Seok;Lee, Ho-Jae;Chang, Beom-Hwan;Kim, Hyoun-Ku;Han, Young-Ju;Chung, Tai-Myoung
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.799-808
    • /
    • 2003
  • Existing security solutions such as Firewell and IDS (Intrusion Detection System) have a trouble in getting accurate detection rate about new attack and can not block interior attack. That is, existing securuty solutions have various shortcomings. Shortcomings of these security solutions can be supplemented with mechanism which guarantees an availability of systems. The mechanism which guarantees the survivability of node is various, we approachintrusion telerance using real time response mechanism. The monitoring code monitors related resources of system for survivability of vulnerable systm continuously. When realted resources exceed threshold, monitoring and response code is deployed to run. These mechanism guarantees the availability of system. We propose control mathod about resource monitoring. The monitoring code operates with this method. The response code may be resident in active node for availability or execute a job when a request is occurred. We suggest the node survivability mechanism that integrates the intrusion tolerance mechanism that complements the problems of existing security solutions. The mechanism takes asvantage of the automated service distribution supported by Active Network infrastructure instead of passive solutions. The mechanism takes advantage of the automated service distribution supported by Active Network infrastructure instead of passive system reconfiguration and patch.

Fingerprint Matching Algorithm using String-Based MHC Detector Set

  • Ko, Kwang-Eun;Cho, Young-Im;Sim, Kwee-Bo
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.2
    • /
    • pp.109-114
    • /
    • 2007
  • Fingerprints have been widely used in the biometric authentication because of its performance, uniqueness and universality. Lately, the speed of identification has become a very important aspect in the fingerprint-based security applications. Also, the reliability still remains the main issue in the fingerprint identification. A fast and reliable fingerprint matching algorithm based on the process of the 'self-nonself' discrimination in the biological immune system was proposed. The proposed algorithm is organized by two-matching stages. The 1st matching stage utilized the self-space and MHC detector string set that are generated from the information of the minutiae and the values of the directional field. The 2nd matching stage was made based on the local-structure of the minutiae. The proposed matching algorithm reduces matching time while maintaining the reliability of the matching algorithm.

Weather Radar Image Gener ation Method Using Inter polation based on CUDA

  • Yang, Liu;Jang, Bong-Joo;Lim, Sanghun;Kwon, Ki-Chang;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.4
    • /
    • pp.473-482
    • /
    • 2015
  • Doppler weather radar is an important tool for meteorological research. Through several decades of development, Doppler weather radar has enormous progress in understanding, detection and warning of meso and micro scale weather system. It makes a significant contribution to weather forecast and weather disaster warning. But the large amount of data process limits the application of Doppler weather radar. This paper proposed for fast weather radar data processing based on CUDA. CDUA is a powerful platform for highly parallel programming developed by NVIDIA. Through running plenty of threads, radar data can be calculated at same time. In experiment, CUDA parallel program can significantly improve weather data processing time.

UNIFORMLY LIPSCHITZ STABILITY OF PERTURBED NONLINEAR DIFFERENTIAL SYSTEMS

  • Choi, Sang Il;Lee, Ji Yeon;Goo, Yoon Hoe
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.30 no.2
    • /
    • pp.273-284
    • /
    • 2017
  • In this paper, we study that the solutions to perturbed differential system $$y^{\prime}=f(t,y)+{{\displaystyle\smashmargin{2}{\int\nolimits_{t_0}}^{t}}g(s,y(s),T_1y(s))ds+h(t,y(t),T_2y(t))$$ have uniformly Lipschitz stability by imposing conditions on the perturbed part ${\int_{t0}^{t}}g(s,y(s),T_1y(s))ds,h(t,y(t),T_2y(t))$, and on the fundamental matrix of the unperturbed system y' = f(t, y) using integral inequalities.

Motion Detection using Adaptive Background Image and Pixel Space (적응적 배경영상과 픽셀 간격을 이용한 움직임 검출)

  • 지정규;이창수;오해석
    • Journal of Information Technology Applications and Management
    • /
    • v.10 no.3
    • /
    • pp.45-54
    • /
    • 2003
  • Security system with web camera remarkably has been developed at an Internet era. Using transmitted images from remote camera, the system can recognize current situation and take a proper action through web. Existing motion detection methods use simply difference image, background image techniques or block matching algorithm which establish initial block by set search area and find similar block. But these methods are difficult to detect exact motion because of useless noise. In this paper, the proposed method is updating changed background image as much as $N{\times}M$pixel mask as time goes on after get a difference between imput image and first background image. And checking image pixel can efficiently detect motion by computing fixed distance pixel instead of operate all pixel.

  • PDF

A Study on the Design of Data Crypto-Block adapted Smart Card (스마트 카드에 적합한 데이터 암호블록 설계)

  • Lee, Woo-Choun;Song, Je-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2317-2321
    • /
    • 2011
  • This paper is proposed new data crytoblock algorithm based on the private key cryptoalgorithim with existed other cryptography algorithims. Therefore new crytoblock design and simulation using the common Synopsys and ALTERA Max+ PlusII Ver.10.1. As a simulation result, new data crytoblock have gate counting 640Mbps at the 40M hz. We thought that proposed new data crytoblock adapt real time information security.

Drowsiness Sensing System by Detecting Eye-blink on Android based Smartphones

  • Vununu, Caleb;Seung, Teak-Young;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.5
    • /
    • pp.797-807
    • /
    • 2016
  • The discussion in this paper aims to introduce an approach to detect drowsiness with Android based smartphones using the OpenCV platform tools. OpenCV for Android actually provides powerful tools for real-time body's parts tracking. We discuss here about the maximization of the accuracy in real-time eye tracking. Then we try to develop an approach for detecting eye blink by analyzing the structure and color variations of human eyes. Finally, we introduce a time variable to capture drowsiness.

FTTH FOR APARTMENT COMPLEXES USING CWDM-PON SYSTEM (공동주택에 대한 FTTH OSP 구축과 CWDM-PON 을 이용한 서비스 제공)

  • Kim, Bo-Gyum;Koh, Seok-Bong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.289-292
    • /
    • 2007
  • FTTH (Fiber to the Home) is constructed with optical devices and optical cables from central office (CO) to subscribers. With FTTH, it is possible to provide service platform in order to meet the customers' emerging demands for more bandwidth/security and diverse IP multimedia applications including high definition (HD) video streaming service. FTTH can provide enough bandwidth from 100Mbps to several Gbps per subscriber. It is also most appropriate network architecture for convergence of communication and broadcasting. So, FTTH is thought the final destination of telecom operators, since it is the fastest and most reliable solution so far and various IP multimedia services are possible through it. In this paper, newly attempted technologies of FTTH construction for apartment complexes using CWDM-PON system are discussed.

  • PDF