• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.038 seconds

Development of Automated Statistical Analysis Tool using Measurement Data in Cable-Supported Bridges (특수교 계측 데이터 자동 통계 분석 툴 개발)

  • Kim, Jaehwan;Park, Sangki;Jung, Kyu-San;Seo, Dong-Woo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.79-88
    • /
    • 2022
  • Cable-supported bridges, as important large infrastructures, require a long-term and systematic maintenance strategy. In particular, various methods have been proposed to secure safety for the bridges, such as installing various types of sensor on members in the bridges, and setting management thresholds. It is evidently necessary to propose a strategic plan to efficiently manage increasing number of cable-supported bridges and data collected from a number of sensors. This study aims to develop an analysis tool that can automatically remove abnormal signals and calculate statistical results for the purpose of efficiently analyzing a wide range of data collected from a long span bridge measurement system. To develop the tool, basic information such as the types and quantity of sensors installed in long span bridges and signal characteristics of the collected data were analyzed. Thereafter, the Humpel filtering method was used to determine the presence or absence of an abnormality in the signal and then filtered. The statistical results with filtered data were shown. Finally, one cable-stayed bridge and one suspension bridge currently in use were chosen as the target bridges to verify the performance of the developed tool. Signal processing and statistical analysis with the tool were performed. The results are similar to the results reported in the existing work.

Paradigm of the Transformation of Potential-Forming Space Under the Impact of Intellectual-Innovation Determinants

  • Khanin, Semen;Derhaliuk, Marta;Stavroyany, Serhii;Kudlasevych, Olga;Didkivska, Lesia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.340-346
    • /
    • 2022
  • The article examines the formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants. Based on the study of different scientific views on the nature and properties of potential-forming space through the study of approaches to understanding the concept of "space" clarified the complexity and multifaceted nature of the phenomenon and found that its characteristics are relevant to the industrial development model. It is revealed that the leading modern trends related to the spread of globalization and regionalization, rapid development of information and communication technologies, diffusion of innovations accompany the transition from industrial to post-industrial development and its development, which leads to new development: changes production, nature and relations between business entities, etc. It is proved that under such conditions, the region as a key element of the economic system, acquires a leading role in achieving sustainable and balanced development. These processes significantly affect the potential-forming space of the regional economy under the influence of intellectual and innovative determinants, leading to the need for its transformation and change in accordance with modern realities, which is reflected in thorough research on the formation of scientific paradigm based on the formation of its theoretical foundations and methodological basis. This study reveals the essence, role, functions, structure, process of formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants. It is proved that the formation of the modern scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants occurs in the context of building a post-industrial model of development, accompanied by consideration of the region as a spatial object territories from the physical plane to the spatial environment in which the development of human capital, innovation and self-development of the region. Taking into account the above, the article outlines the prerequisites and factors of formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants.

A 2×2 MIMO Spatial Multiplexing 5G Signal Reception in a 500 km/h High-Speed Vehicle using an Augmented Channel Matrix Generated by a Delay and Doppler Profiler

  • Suguru Kuniyoshi;Rie Saotome;Shiho Oshiro;Tomohisa Wada
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.1-10
    • /
    • 2023
  • This paper proposes a method to extend Inter-Carrier Interference (ICI) canceling Orthogonal Frequency Division Multiplexing (OFDM) receivers for 5G mobile systems to spatial multiplexing 2×2 MIMO (Multiple Input Multiple Output) systems to support high-speed ground transportation services by linear motor cars traveling at 500 km/h. In Japan, linear-motor high-speed ground transportation service is scheduled to begin in 2027. To expand the coverage area of base stations, 5G mobile systems in high-speed moving trains will have multiple base station antennas transmitting the same downlink (DL) signal, forming an expanded cell size along the train rails. 5G terminals in a fast-moving train can cause the forward and backward antenna signals to be Doppler-shifted in opposite directions, so the receiver in the train may have trouble estimating the exact channel transfer function (CTF) for demodulation. A receiver in such high-speed train sees the transmission channel which is composed of multiple Doppler-shifted propagation paths. Then, a loss of sub-carrier orthogonality due to Doppler-spread channels causes ICI. The ICI Canceller is realized by the following three steps. First, using the Demodulation Reference Symbol (DMRS) pilot signals, it analyzes three parameters such as attenuation, relative delay, and Doppler-shift of each multi-path component. Secondly, based on the sets of three parameters, Channel Transfer Function (CTF) of sender sub-carrier number n to receiver sub-carrier number l is generated. In case of n≠l, the CTF corresponds to ICI factor. Thirdly, since ICI factor is obtained, by applying ICI reverse operation by Multi-Tap Equalizer, ICI canceling can be realized. ICI canceling performance has been simulated assuming severe channel condition such as 500 km/h, 8 path reverse Doppler Shift for QPSK, 16QAM, 64QAM and 256QAM modulations. In particular, 2×2MIMO QPSK and 16QAM modulation schemes, BER (Bit Error Rate) improvement was observed when the number of taps in the multi-tap equalizer was set to 31 or more taps, at a moving speed of 500 km/h and in an 8-pass reverse doppler shift environment.

Design of Authentication Mechinism for Command Message based on Double Hash Chains (이중 해시체인 기반의 명령어 메시지 인증 메커니즘 설계)

  • Park Wang Seok;Park Chang Seop
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.51-57
    • /
    • 2024
  • Although industrial control systems (ICSs) recently keep evolving with the introduction of Industrial IoT converging information technology (IT) and operational technology (OT), it also leads to a variety of threats and vulnerabilities, which was not experienced in the past ICS with no connection to the external network. Since various control command messages are sent to field devices of the ICS for the purpose of monitoring and controlling the operational processes, it is required to guarantee the message integrity as well as control center authentication. In case of the conventional message integrity codes and signature schemes based on symmetric keys and public keys, respectively, they are not suitable considering the asymmetry between the control center and field devices. Especially, compromised node attacks can be mounted against the symmetric-key-based schemes. In this paper, we propose message authentication scheme based on double hash chains constructed from cryptographic hash function without introducing other primitives, and then propose extension scheme using Merkle tree for multiple uses of the double hash chains. It is shown that the proposed scheme is much more efficient in computational complexity than other conventional schemes.

Efficient Utilization of Private Resources for the National Defense - Focused on maintenance, supply, transportation, training & education - (국방분야 민간자원의 효율적 활용방안 - 정비, 보급, 수송, 교육훈련분야를 중심으로 -)

  • Park, Kyun-Yong
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.313-340
    • /
    • 2011
  • The National Defense Reformation bill of "National Defense Reformation 2020" which have been constantly disputed and reformed by the government went through various levels of complementary measures after the North Korean sinking on the Republic of Korea (ROK) Naval Vessel "Cheonan". The final outcome of this reform is also known as the 307 Plan and this was announced on the 8th March. The reformed National Defense Reformation is to reduce the number of units and military personnel under the military structure reformation. However, in order for us to undertake successful National Defense Reformation, the use of privatized civilian resources are essential. Therefore according to this theory, the ROK Ministry of National Defense (MND) have selected the usage of privatized resources as one of the main core agenda for the National Defense Reformation management procedures, and under this agenda the MND plans to further expand the usage of private Especially the MND plans to minimize the personnel resources applied in non-combat areas and in turn use these supplemented personnel with optimization. In order to do this, the MND have initiated necessary appropriate analysis over the whole national defense section by understanding various projects and acquisition requests required by each militaries and civilian research institutions. However for efficient management of privatized civilian resources, first of all, those possible efficient private resources which can achieve optimization will need to be identified, and secondly continuous systematic reinforcements will need to be made in private resource usage legislations. Furthermore, we would need to consider the possibility of labor disputes because of privatization expansion. Therefore, full legal and systematic complementary measures are required in all possible issue arising areas which can affect the combat readiness posture. There is another problem of huge increase in operational expenses as reduction of standby forces are only reducing the number of soldiers and filling these numbers with more cost expensive commissioned officers. However, to overcome this problem, we would need to reduce the number of positions available for active officers and fill these positions with military reserve personnel who previously had working experiences with the related positions (thereby guaranteeing active officers re-employment after completing active service). This would in tum maintain the standards of combat readiness posture and reduce necessary financial budgets which may newly arise. The area of maintenance, supply, transportation, training & education duties which are highly efficient when using privatized resources, will need to be transformed from military management based to civilian management based system. For maintenance, this can be processed by integrating National Maintenance Support System. In order for us to undertake this procedure, we would need to develop maintenance units which are possible to be privatized and this will in turn reduce the military personnel executing job duties, improve service quality and prevent duplicate investments etc. For supply area, we will need to establish Integrated Military Logistics Center in-connection with national and civilian logistics system. This will in turn reduce the logistics time frame as well as required personnel and equipments. In terms of transportation, we will need to further expand the renting and leasing system. This will need to be executed by integrating the National Defense Transportation Information System which will in turn reduce the required personnel and financial budgets. Finally for training and education, retired military personnel can be employed as training instructors and at the military academy, further expansion in the number of civilian professors can be employed in-connection with National Defense Reformation. In other words, more active privatized civilian resources will need to be managed and used for National Defense Reformation.

  • PDF

Comparative Analysis of Anti-Terrorism Act and its Enforcement Ordinance for Counter-Terrorism Activities (대테러 활동을 위한 테러 방지법과 시행령의 비교 분석)

  • Yoon, Hae-Sung
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.259-285
    • /
    • 2016
  • As the need for anti-terrorism legislation has been continuously argued, Anti-terrorism act has been enacted and enforced. On the other hand, there still remain a lot of points to be discussed regarding the definition of the concept of terrorism, matters of human rights violations, strengthening authority of the investigation and intelligence agencies, and mobilization military forces for the suppression of terrorism. Also, reviewing Anti-terrorism act and its enforcement ordinance draft, this legislation seems to regulate terrorist groups like IS. If so, in the case of terrorism of North Korea or domestic anti-government organizations, whether this law would be applied could become an issue. In the case of terrorism of North Korea, Ministry of National Defense has a right of commandership in the military operations, however, it is also possible to apply the article 4 of Natural Security Act a crime of performing objective-or a crime of foreign exchange on Criminal law as legal grounds for not military terrorisms but general investigations. Therefore, it is necessary to involve consideration about this matter. Furthermore, in the view of investigation, Anti-terrorism act and its enforcement ordinance draft do not mention Supreme Prosecutors Office and Ministry of Justice that conduct investigations. In the case of terrorism, the police and prosecution should conduct to arrest criminals and determine crimes at the investigation stage, however, any explicit article related to this content in Anti-terrorism act and its enforcement ordinance draft was unable to be found. Although Anti-terrorism act is certainly toward preventive aspects, considering some matters such as prevention, actions on the scene, maneuver after terrorism, arresting terrorists, investigation direction, cooperation, and mutual assistance, it is necessary to reflect these contents in Anti-terrorism act. In other words, immediately after terrorists attacks, it is possible to mobilize the military operations by Integrated Defense act in order to arrest them in the case of military terrorism. Nevertheless, because both military terrorism and general one are included in the investigation stage, it needs to begin an investigation under the direction of the prosecution. Therefore, above all, a device for finding out the truth behind the case at the investigation stage is not reflected in the current Anti-terrorism act and its enforcement ordinance draft. Accordingly, if National Intelligence Service approaches information at the prevention level in this situation, it may be necessary to come up with follow-up measures of the police, the prosecution, and military units.

  • PDF

Implementation of High-Throughput SHA-1 Hash Algorithm using Multiple Unfolding Technique (다중 언폴딩 기법을 이용한 SHA-1 해쉬 알고리즘 고속 구현)

  • Lee, Eun-Hee;Lee, Je-Hoon;Jang, Young-Jo;Cho, Kyoung-Rok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.4
    • /
    • pp.41-49
    • /
    • 2010
  • This paper proposes a new high speed SHA-1 architecture using multiple unfolding and pre-computation techniques. We unfolds iterative hash operations to 2 continuos hash stage and reschedules computation timing. Then, the part of critical path is computed at the previous hash operation round and the rest is performed in the present round. These techniques reduce 3 additions to 2 additions on the critical path. It makes the maximum clock frequency of 118 MHz which provides throughput rate of 5.9 Gbps. The proposed architecture shows 26% higher throughput with a 32% smaller hardware size compared to other counterparts. This paper also introduces a analytical model of multiple SHA-1 architecture at the system level that maps a large input data on SHA-1 block in parallel. The model gives us the required number of SHA-1 blocks for a large multimedia data processing that it helps to make decision hardware configuration. The hs fospeed SHA-1 is useful to generate a condensed message and may strengthen the security of mobile communication and internet service.

Market Efficiency in Real-time : Evidence from the Korea Stock Exchange (한국유가증권시장의 실시간 정보 효율성 검증)

  • Lee, Woo-Baik;Choi, Woo-Suk
    • The Korean Journal of Financial Management
    • /
    • v.26 no.3
    • /
    • pp.103-138
    • /
    • 2009
  • In this article we examine a unique data set of intraday fair disclosure(FD) releases to shed light on market efficiency within the trading day. Specifically, this paper analyze the response of stock prices on fair disclosure disseminated in real-time through KIND(Korea Investor's Network for Disclosure) on Korea stock exchange during the period from January 2003 to September 2004. We find that the prices of stock experiences a statistically and economically significant increase beginning seconds after the fair disclosure is initially announced and lasting approximately two minutes. The stock price responds more strongly to fair disclosure on smaller firm but the response to fair disclosure on the largest firm stock is more gradual, lasting five minutes. We also examine the profitability of a short-term trading strategy based on dissemination of fair disclosure. After controlling for trading costs we find that trader who execute a trade following initial disclosure generate negative profits, but trader buying stock before initial disclosure realize statistically significant positive profit after two minute of disclosure. Summarizing overall results, our evidence supports that security prices on Korea stock exchange reflects all available information within two minutes and the Korea stock market is semi-strongly efficient enough that a trader cannot generate profits based on widely disseminated news unless he acts almost immediately.

  • PDF

Practical approaches to becoming the logistics hub of Northeast Asia (동북아 물류중심국가 추진전략에 관한 연구)

  • Oh, Moon-Kap
    • Journal of Distribution Science
    • /
    • v.11 no.6
    • /
    • pp.31-40
    • /
    • 2013
  • Purpose - The Northeast Asian Logistic Hub strategy was established to create a national competitive advantage in northeast Asia. Countries in this region are competing fiercely to become the central base distribution port as the volume of container shipping continues to increase due to the northeast Asian (especially Chinese) economic growth. The primary method by which shippers are improving their customer service and distribution is enhancing profits by minimizing call ports on the key route through strategic affiliations and the use of large vessels. Each nation is planning large-scale investments in the construction of sea ports that can accommodate large vessels. This paper proposes ways by which the logistical strategies of domestic corporations can keep pace with changes in government policy concerning the Northeast Asian Business Hub policy. It examines the logistics system in the Northeast Asian region, analyzes the government's Northeast Asian Business Hub policy, and suggests logistical strategies for domestic corporations through an analysis based on a questionnaire designed to grasp domestic firms' needs and goals. Research design, data and methodology - The purpose of this study is to determine how shipping companies establish partnerships with third-party logistics providers and draws out the implications of the results. The survey methods used were personal interviews and questionnaires distributed to a sample population through e-mail, fax, mail, and telephone. A total of 600 questionnaires were distributed, of which 165 were returned. Among these, ten were excluded due to insufficient content; ultimately, 155 were used for the sample. The statistical data collection process was analyzed through data coating and a statistical package program. Results - This study argues that greater flexibility in policies, administration, and systems will be needed to significantly improve established business practices. In this dissertation, we primarily identify that in order to become a center of northeast Asian logistics, Korea must adopt a new paradigm and abandon the existing systems that are based on the economic and social systems that have stemmed from bureaucracy, inflexibility, chauvinism, and equalitarianism. Flexible policies, administration, and systems will be necessary to improve business practices. Domestic corporations must establish a strategic logistics hub and related network while simultaneously pursuing value-added logistics businesses by increasing their manpower and building a logistics information system. This will strengthen their competitive edge and lead to system improvements. Conclusions - Domestic corporations must adopt a new paradigm and use more reasonable business laws, systems, and policies that are based on market-driven flexibility and transparency. Moreover, social norms and regulations should be established to help ensure political and social security. Korea must also develop a culture of tolerance for foreign companies. Finally, the paradigm defining the policy governing the development of the capital city and its satellite cities in this context must be changed.

Development of an Imaging-DOAS System for 2-D Remote Sensing of Atmospheric Gases (대기가스오염물질의 이차원 원격 모니터링을 위한 Imaging-DOAS 개발)

  • Lee, Han-Lim;Lee, Chul-Kyu;Jung, Jin-Sang;Park, Jeong-Eun;Kim, Young-Joon
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.28 no.2
    • /
    • pp.150-157
    • /
    • 2006
  • Spatially resolved remote identification and quantification of trace gases in the atmosphere is desirable in various fields of scientific research as well as in public security and industrial contexts. Environmental observations investigating causes, extent md consequences of air pollution are of fundamental interest. We present an Imaging-DOAS system, a ground based remote sensing instrument that allows spatially resolved mapping of atmospheric trace gases by a differential optical absorption spectroscopy(DOAS) with sun scattered light as the light source. A passive DOAS technique permits the identification and quantification of various gases, e.g., $NO_2,\;SO_2,\;and\;CH_2O$, from their differential absorption structures with high sensitivity. The Imaging-DOAS system consists of a scanning mirror, a focusing lens, a spectrometer, a 2-D CCD, ad the integral control software. An imaging spectrometer simultaneously acquires spectral information on the incident light in one spatial dimension(column) and sequentially scans the next spatial dimension with a motorized scanning mirror. The structure of the signal acquisition system is described in detail and the evaluation method is also briefly discussed. Applications of imaging of the $NO_2$ contents in the exhaust plumes from a power plant are presented.