• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.038 seconds

Study IoT Asset Management System Based on Block-Chain Framework (블록체인 프레임워크 기반 IoT 자산관리시스템)

  • Kang, Sung Won;Kim, Young Chul
    • Smart Media Journal
    • /
    • v.8 no.2
    • /
    • pp.94-98
    • /
    • 2019
  • In this paper, we developed the tools enabling to manage the IoT systems owned by managers. Since equipment agents consists based on open-source block-chain framework, we can secure the invariance on data and furthermore can locate the resources by searching the AP connected to the equipments. Also the manager can trace the connecting details on equipments from their block-chain accounts. In addition, we work on the possibility of protecting ARP poisoning attacks by removing the credibility on additional ARP requests being generated during the process of network creation.

Anthropomorphic Animal Face Masking using Deep Convolutional Neural Network based Animal Face Classification

  • Khan, Rafiul Hasan;Lee, Youngsuk;Lee, Suk-Hwan;Kwon, Oh-Jun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.5
    • /
    • pp.558-572
    • /
    • 2019
  • Anthropomorphism is the attribution of human traits, emotions, or intentions to non-human entities. Anthropomorphic animal face masking is the process by which human characteristics are plotted on the animal kind. In this research, we are proposing a compact system which finds the resemblance between a human face and animal face using Deep Convolutional Neural Network (DCNN) and later applies morphism between them. The whole process is done by firstly finding which animal most resembles the particular human face through a DCNN based animal face classification. And secondly, doing triangulation based morphing between the particular human face and the most resembled animal face. Compared to the conventional manual Control Point Selection system using an animator, we are proposing a Viola-Jones algorithm based Control Point selection process which detects facial features for the human face and takes the Control Points automatically. To initiate our approach, we built our own dataset containing ten thousand animal faces and a fourteen layer DCNN. The simulation results firstly demonstrate that the accuracy of our proposed DCNN architecture outperforms the related methods for the animal face classification. Secondly, the proposed morphing method manages to complete the morphing process with less deformation and without any human assistance.

Shuffling of Elliptic Curve Cryptography Key on Device Payment

  • Kennedy, Chinyere Grace;Cho, Dongsub
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.4
    • /
    • pp.463-471
    • /
    • 2019
  • The growth of mobile technology particularly smartphone applications such as ticketing, access control, and making payments are on the increase. Elliptic Curve Cryptography (ECC)-based systems have also become widely available in the market offering various convenient services by bringing smartphones in proximity to ECC-enabled objects. When a system user attempts to establish a connection, the AIK sends hashes to a server that then verifies the values. ECC can be used with various operating systems in conjunction with other technologies such as biometric verification systems, smart cards, anti-virus programs, and firewalls. The use of Elliptic-curve cryptography ensures efficient verification and signing of security status verification reports which allows the system to take advantage of Trusted Computing Technologies. This paper proposes a device payment method based on ECC and Shuffling based on distributed key exchange. Our study focuses on the secure and efficient implementation of ECC in payment device. This novel approach is well secure against intruders and will prevent the unauthorized extraction of information from communication. It converts plaintext into ASCII value that leads to the point of curve, then after, it performs shuffling to encrypt and decrypt the data to generate secret shared key used by both sender and receiver.

An Exploratory Study for the Development Plan of the National Defense Experiment Project Conducted by the Navy (해군에서 수행하는 국방 실험사업 발전방안을 위한 탐색적 연구)

  • Woo, Dongsung;Lee, Boram;Ryu, Jaehak;Kim, Dongho
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.151-162
    • /
    • 2021
  • Since 2012, the Navy has been conducting a defense experiment project to evaluate the possibility of military application by introducing new technologies related to excellent private informatization in the defense field. There are many projects that have spread because they are suitable for military use, but some have ended as experimental projects themselves because they do not meet the military's required performance. Continuous development is required as increasing the spread rate by successfully carrying out defense experiment projects is the basis for defense reform. This study analyzed the performance of major projects carried out by the Navy and presented considerations for the development of defense experiment projects to be carried out by the Navy in the future. The main achievements were derived in various ways in terms of project performance and system operation, and the considerations can be summarized in the field of raising business requirements, securing resources for system operation, determining the size of companies for project execution, and security measures. The research results can be used as data to determine the required defense experiment project and efficiently carry out the project.

Development of a novel reconstruction method for two-phase flow CT with improved simulated annealing algorithm

  • Yan, Mingfei;Hu, Huasi;Hu, Guang;Liu, Bin;He, Chao;Yi, Qiang
    • Nuclear Engineering and Technology
    • /
    • v.53 no.4
    • /
    • pp.1304-1310
    • /
    • 2021
  • Two-phase flow, especially gas-liquid two-phase flow, has a wide application in industrial field. The diagnosis of two-phase flow parameters, which directly determine the flow and heat transfer characteristics, plays an important role in providing the design reference and ensuring the security of online operation of two-phase flow system. Computer tomography (CT) is a good way to diagnose such parameters with imaging method. This paper has proposed a novel image reconstruction method for thermal neutron CT of two-phase flow with improved simulated annealing (ISA) algorithm, which makes full use of the prior information of two-phase flow and the advantage of stochastic searching algorithm. The reconstruction results demonstrate that its reconstruction accuracy is much higher than that of the reconstruction algorithm based on weighted total difference minimization with soft-threshold filtering (WTDM-STF). The proposed method can also be applied to other types of two-phase flow CT modalities (such as X(𝛄)-ray, capacitance, resistance and ultrasound).

Analysis of Abnormal Event Detection Research using Intelligent IoT Devices for Human Health Cares

  • Lee, Do-hyeon;Kim, Da-hyeon;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.37-44
    • /
    • 2022
  • With the outbreak of COVID-19, non-face-to-face activities such as remote learning and telecommuting have increased rapidly. As a result, the number of people staying at home and the number of hours spent inside the house have also increased since the pandemic. Our team had previously worked on methods for detecting abnormal conditions in a person's health in various circumstances within the house by converging single sensor-based algorithms. In our previous research, we installed IoT sensors indoors to detect people emergency situations requiring aids, the scope of detection was limited to indoor space due to the limitation in sensors. In this study, we have come up with a system that integrates our previous study with a new method for detecting abnormal conditions in outdoor environments using outdoor security cameras and wearable devices. The proposed system enables users to be notified of emergency situations in both indoor and outdoor areas and respond to them as quickly as possible.

A Study on the Development of LDA Algorithm-Based Financial Technology Roadmap Using Patent Data

  • Koopo KWON;Kyounghak LEE
    • Korean Journal of Artificial Intelligence
    • /
    • v.12 no.3
    • /
    • pp.17-24
    • /
    • 2024
  • This study aims to derive a technology development roadmap in related fields by utilizing patent documents of financial technology. To this end, patent documents are extracted by dragging technical keywords from prior research and related reports on financial technology. By applying the TF-IDF (Term Frequency-Inverse Document Frequency) technique in the extracted patent document, which is a text mining technique, to the extracted patent documents, the Latent Dirichlet Allocation (LDA) algorithm was applied to identify the keywords and identify the topics of the core technologies of financial technology. Based on the proportion of topics by year, which is the result of LDA, promising technology fields and convergence fields were identified through trend analysis and similarity analysis between topics. A first-stage technology development roadmap for technology field development and a second-stage technology development roadmap for convergence were derived through network analysis about the technology data-based integrated management system of the high-dimensional payment system using RF and intelligent cards, as well as the security processing methodology for data information and network payment, which are identified financial technology fields. The proposed method can serve as a sufficient reason basis for developing financial technology R&D strategies and technology roadmaps.

Analysis of Priority of Technical Factors for Enabling Cloud Computing Services (클라우드 컴퓨팅 서비스 활성화를 위한 기술적 측면 특성요인의 중요도 우선순위 분석)

  • Kang, Da-Yeon;Hwang, Jong-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.123-130
    • /
    • 2019
  • The advent of the full-fledged Internet of Things era will bring together various types of information through Internet of Things devices, and the vast amount of information collected will be generated as new information by the analysis process. To effectively store this generated information, a flexible and scalable cloud computing system is advantageous. Therefore, the main determinants for effective client system acceptance are viewed as motivator factor (economics, efficiency, etc.) and hindrance factor (transitional costs, security issues, etc.) and the purpose of this study is to determine which detailed factors play a major role in making new system acceptance decisions around harm. The factors required to determine the major priorities are defined as the system acceptance determinants from the technical point of view obtained through the literature review, and the questionnaire is prepared based on the factors derived, and the survey is conducted on the experts concerned. In addition, the AHP analysis aims to achieve a final priority by performing a bifurcation between components for measuring a decision unit. Furthermore, the results of this study will serve as an important basis for making decisions based on acceptance (enabling) of technology.

Smart Ship Container With M2M Technology (M2M 기술을 이용한 스마트 선박 컨테이너)

  • Sharma, Ronesh;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.278-287
    • /
    • 2013
  • Modern information technologies continue to provide industries with new and improved methods. With the rapid development of Machine to Machine (M2M) communication, a smart container supply chain management is formed based on high performance sensors, computer vision, Global Positioning System (GPS) satellites, and Globle System for Mobile (GSM) communication. Existing supply chain management has limitation to real time container tracking. This paper focuses on the studies and implementation of real time container chain management with the development of the container identification system and automatic alert system for interrupts and for normal periodical alerts. The concept and methods of smart container modeling are introduced together with the structure explained prior to the implementation of smart container tracking alert system. Firstly, the paper introduces the container code identification and recognition algorithm implemented in visual studio 2010 with Opencv (computer vision library) and Tesseract (OCR engine) for real time operation. Secondly it discusses the current automatic alert system provided for real time container tracking and the limitations of those systems. Finally the paper summarizes the challenges and the possibilities for the future work for real time container tracking solutions with the ubiquitous mobile and satellite network together with the high performance sensors and computer vision. All of those components combine to provide an excellent delivery of supply chain management with outstanding operation and security.

A Study on the Open Platform Architecture for the Integrated Utilization of Spatial Information and Statistics (공간정보와 통계정보의 융합 활용을 위한 오픈플랫폼 아키텍처에 관한 연구)

  • Kim, Min-Soo;Yoo, Jeong-Ki
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.211-224
    • /
    • 2016
  • Based on the 'Government 3.0', the government opens the public data and encourages the active use in the private sector. Recently, the spatial and statistical information that is one of the public data is being widely used in the various web business as a high value-added information. In this study, we propose an architecture of high-availability, high-reliability and high-performance open platform which can provide a variety of services such as searching, analysis, data mining, and thematic mapping. In particular, we present two different system architectures for the government and the public services, by reflecting the importance of the information security and the respective utilization in the private and public sectors. We also compared a variety of server architecture configurations such as a clustered server configuration, a cloud-based virtual server configuration, and a CDN server configuration, in order to design a cost- and performance-effective spatial-statistical information open platform.