• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.035 seconds

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

Reducing of Authentication Signaling Traffic in LTE Networks (LTE 네트워크에서 인증 시그널링의 감소 기법)

  • Kim, Seonho;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.2
    • /
    • pp.109-118
    • /
    • 2012
  • As a result of the prevalence of smartphone, various mobile services became faster by LTE networks. Because many mobile devices are used more wireless services, heavy signaling traffic for authentication could be generated. Authentication is an important factor in wireless networks to identify devices; it is the start of wireless networks. This paper analyzes previous patterns for more effective authentication in accessing of another external networks. We propose a fast authentication scheme for minimizing of signaling cost between the authentication server and external networks. And we calculate the rate of authentication occurrence in LTE networks using mathematical modeling as well as the change of signaling cost for authentication in various network environments. Finally, we calculate the optimized number of authentication data and show the effectiveness for authentication signaling costs.

A Study on Encryption using Polynomial Hash Function for e-Seal (e-Seal을 위한 다항식 해시 함수를 이용한 암호화기법 연구)

  • Yon, Yong-Ho;Shin, Moon-Sun;Lee, Jong-Yon;Hwange, Ik-Soo;Seok, Changk-Boo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1977-1985
    • /
    • 2009
  • An e-Seal is an active RFID device that was set on the door of a container. e-Seal provides both the state of the seal and the remote control of the device automatically. But it has vulnerabilities like eavesdrop and impersonate because of using RFID system. A secure e-Seal authentication protocol must use PRF for encryption/decryption of reader and e-Seal. The existing PRF uses simple hash function such as MD5 or SHA which is not available for e-Seal. It is required to use strong hash functions. The hash function is a essential technique used for data integrity, message authentication and encryption in the mechanism of information security. Therefore, in this paper, we propose more secure and effective hash function based on polynomial for e-Seal authentication protocol.

A Database Forensics Model based on Classification by Analysis Purposes (분석 목적별 분류기반의 데이터베이스 포렌식 모델)

  • Kim, Sung-Hye;Kim, Jang-Won;Cho, Eun-Ae;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.2
    • /
    • pp.63-72
    • /
    • 2009
  • Digital forensics refers to finding electronic evidences related to crimes. As cyber crimes are increasing daily, digital forensics for finding electronic evidences is also becoming important. At present, various aspects of digital forensics have being researched including the overall process model and analysis techniques such as network forensics, system forensics and database forensics for digital forensics. Regarding database forensics, only analysis techniques dependent on specific vendors have been suggested. And general process models and analysis techniques which can be used in various databases have not been studied. This paper proposes an integrated process model and analysis technique for database forensics. The proposed database forensics model (DFM) allows us to solve problems and analyze databases according to the situation and purpose, and to use a standard model and techniques for various database analyses. In order to test our model(DFM), we applied it to various database analyses. And we confirmed the results of our experiment that it can be applicable to acquisition in the scene as well as analysis of data relationships.

Review of Qualitative Approaches for the Construction Industry: Designing a Risk Management Toolbox

  • Zalk, David M.;Spee, Ton;Gillen, Matt;Lentz, Thomas J.;Garrod, Andrew;Evans, Paul;Swuste, Paul
    • Safety and Health at Work
    • /
    • v.2 no.2
    • /
    • pp.105-121
    • /
    • 2011
  • Objectives: This paper presents the framework and protocol design for a construction industry risk management toolbox. The construction industry needs a comprehensive, systematic approach to assess and control occupational risks. These risks span several professional health and safety disciplines, emphasized by multiple international occupational research agenda projects including: falls, electrocution, noise, silica, welding fumes, and musculoskeletal disorders. Yet, the International Social Security Association says, "whereas progress has been made in safety and health, the construction industry is still a high risk sector." Methods: Small- and medium-sized enterprises (SMEs) employ about 80% of the world's construction workers. In recent years a strategy for qualitative occupational risk management, known as Control Banding (CB) has gained international attention as a simplified approach for reducing work-related risks. CB groups hazards into stratified risk 'bands', identifying commensurate controls to reduce the level of risk and promote worker health and safety. We review these qualitative solutions-based approaches and identify strengths and weaknesses toward designing a simplified CB 'toolbox' approach for use by SMEs in construction trades. Results: This toolbox design proposal includes international input on multidisciplinary approaches for performing a qualitative risk assessment determining a risk 'band' for a given project. Risk bands are used to identify the appropriate level of training to oversee construction work, leading to commensurate and appropriate control methods to perform the work safely. Conclusion: The Construction Toolbox presents a review-generated format to harness multiple solutions-based national programs and publications for controlling construction-related risks with simplified approaches across the occupational safety, health and hygiene professions.

Algorithm of Channel Selection for DMO Communication in TETRA System (TETRA 시스템에서 DMO 통신을 위한 채널 선택 알고리즘)

  • Lee, Soon-Hwa;Kim, Chang-Bock
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.5
    • /
    • pp.497-505
    • /
    • 2013
  • In TETRA(TErrestrial Trunked RAdio) standard, TMO(Trunked Mode Operation) communicates with the UE through the base station and it has a higher priority than DMO(Direct Mode Operation) which communicates with UE directly for channel allocation. As a result, the UE needs an algorithm which restricts the frequency allocation by TMO so that DMO can have a successful communication within the network. However, the TETRA DMO standard does not consider this issue. In this paper, we propose an active DMO channel selection algorithm which allocates a channel based on some additional information such as channel usage state of TMO and channel utilization of DMO. The experimental results show that the proposed algorithm outperforms existing DMO channel allocation scheme in terms of the transmission efficiency.

Future Directions and Perspectives on Soil Environmental Researches (토양환경분야 연구동향 및 전망)

  • Yang, Jae-E.;Ok, Yong-Sik;Chung, Doug-Young
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.44 no.6
    • /
    • pp.1286-1294
    • /
    • 2011
  • This paper reviews the future directions and perspectives on the soil environmental researches in the 21 century. Previously, the principal emphasis of soil environmental researches had put on the enhancement of food and fiber productions. Beside the basic function of soil, however, the societal needs on soil resources in the 21st century have demands for several environmental and social challenges, occurring regionally or globally. Typical global issues with which soil science should deal include food security with increasing agronomic production to meet the exploding world population growth, adaptation and mitigation of climate change, increase of the carbon sequestration, supply of the biomass and bioenergy, securing the water resource and quality, protection of environmental pollution, enhancing the biodiversity and ecosystem health, and developing the sustainable farming/cropping system that improve the use efficiency of water and agricultural resources. These challenges can be solved through the sustainable crop production intensification (SCPI) or plant welfare concept in which soil plays a key role in solving the abovementioned global issues. Through implementation of either concept, soil science can fulfill the goal of the modern agriculture which is the sustainable production of crops while maintaining or enhancing the ecosystem function, quality and health. Therefore, directions of the future soil environmental researches should lie on valuing soil as an ecosystem services, translating research across both temporal and spatial scales, sharing and using data already available for other purposes, incorporating existing and new technologies from other disciplines, collaborating across discipline, and translating soil research into information for stakeholders and end users. Through the outcomes of these approaches, soil can enhance the productivity from the same confined land, increase profitability, conserve natural resource, reduce the negative impact on environment, enhance human nutrition and health, and enhance natural capital and the flow of ecosystem services. Soil is the central dogma, final frontier and new engine for the era of sustainability development in the $21^{st}$ century and thus soil environmental researches should be carried according to this main theme.

A Study on the Support Policy for the Realization of Right to Learn of Youth Migrants in Korea: Focusing on Parents, Teachers and Experts (중도입국 청소년의 학습권 실현을 위한 지원방안 연구: 학부모, 교사 등 관계자를 중심으로)

  • Kim, HyunJin;Noh, Giseop
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.533-538
    • /
    • 2021
  • The purpose of this study is to consider the perception, which education-related workers and parents have, associated with guaranteeing the right to learn for youth migrants in Korea. The study was especially intended to analyze the opportunities and adaptions of youth migrants and make policy suggestions accordingly. To this purpose, this study implemented one-on-one in-depth interviews with research participants to collect and analyze data. This research yielded four categories: initial settlement, social security support as a fundamental right, learning rights guarantees, and psychological support. Also, seven subcategories were elicited. The suggestions based on results are followings: first, the legal basis for learning support for middle-aged adolescents; second, curriculum composition for school maladjusted middle-aged adolescents; third, individualized support system; fourth, the active promotion of support systems such as information provision; fifth, the diversification of policy for psychological stability.

Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis (이상 탐지 분석에서 알려지지 않는 공격을 식별하기 위한 이산 웨이블릿 변환 적용 연구)

  • Kim, Dong-Wook;Shin, Gun-Yoon;Yun, Ji-Young;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.45-52
    • /
    • 2021
  • Although many studies have been conducted to identify unknown attacks in cyber security intrusion detection systems, studies based on outliers are attracting attention. Accordingly, we identify outliers by defining categories for unknown attacks. The unknown attacks were investigated in two categories: first, there are factors that generate variant attacks, and second, studies that classify them into new types. We have conducted outlier studies that can identify similar data, such as variants, in the category of studies that generate variant attacks. The big problem of identifying anomalies in the intrusion detection system is that normal and aggressive behavior share the same space. For this, we applied a technique that can be divided into clear types for normal and attack by discrete wavelet transformation and detected anomalies. As a result, we confirmed that the outliers can be identified through One-Class SVM in the data reconstructed by discrete wavelet transform.

A study on the analysis of heat flow in X-ray tube (X-ray tube 내 열유동 해석에 관한 연구)

  • Yun, Dong-Min;Seo, Byung-Suk;Jeon, Yong-Han
    • Design & Manufacturing
    • /
    • v.15 no.1
    • /
    • pp.26-31
    • /
    • 2021
  • As the aging ages, the disease also increases, and the development of AI technology and X-ray equipment used to treat patients' diseases is also progressing a lot. X-ray tube converts only 1% of electron energy into X-ray and 99% into thermal energy. Therefore, when the cooling time of the anode and the X-ray tube are frequently used in large hospitals, the amount of X-ray emission increases due to temperature rise, the image quality deteriorates due to the difference in X-ray dose, and the lifespan of the overheated X-ray tube may be shortened. Therefore, in this study, temperature rise and cooling time of 60kW, 75kW, and 90kW of X-ray tube anode input power were studied. In the X-ray Tube One shot 0.1s, the section where the temperature rises fastest is 0.03s from 0s, and it is judged that the temperature has risen by more than 50%. The section in which the temperature drop changes most rapidly at 20 seconds of cooling time for the X-ray tube is 0.1 seconds to 0.2 seconds, and it is judged that a high temperature drop of about 65% or more has occurred. After 20 seconds of cooling time from 0 seconds to 0.1 seconds of the X-ray tube, the temperature is expected to rise by more than 3.7% from the beginning. In particular, since 90kW can be damaged by thermal shock at high temperatures, it is necessary to increase the surface area of the anode or to require an efficient cooling system.