• Title/Summary/Keyword: network security

Search Result 6,011, Processing Time 0.045 seconds

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Role of Police for Enhancement of Elderly Safety (노인안전 강화를 위한 경찰의 역할)

  • Cha, Min-Kyu;Kwack, Dae-Gyung
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.387-408
    • /
    • 2014
  • South Korea already became an aging society, and is now in the process of becoming an aged society. With increasing elderly population, elderly safety issues such as traffic accidents and elderly suicides are becoming important problems. Elderly victimization are increasing, and elderly safety accident is also becoming an imporotant social problem. The police is doing various activities for elderly safety. The police is conducting programs for the elderly, such as a prevention program for fraud against elderly, and safety checks and traffic safety education for preventing elderly traffic accidents. Also, there's a program of providing regular visits for a lone elderly, expansion of CCTV network and fingerprint registration to prevent elderlies with Alzheimer's disease going missing. However, these programs are not done on a national scale, but rather limited to local police stations. The purpose of this study is to seek police roles for enhancing elderly safety, due to lack of police activity in this area. Recommendation for police roles in enhancing elderly safety is to first conduct routine crackdowns on fraud against elderly and also conduct education programs for preventing fraud. Also, crimes such as elderly abuse is lead by elderly protection agencies, but considering elderly abuse is a crime, the police should take a leading role. Also, to prevent elderly suicide, meticulous management of elderlies with high suicide risk is necessary, and elderly protection areas should be designated to prevent traffic accidents. Also, elderlies should be induced to turn in their driver's license. To conduct these matters of elderly safety, an organization exclusively charged with elderly safety is necessary. Elderly safety is a broad concept, and since police alone cannot handle the task of ensuring elderly safety, the police should take on a leading role in cooperative efforts with various institutions of the government, non-profit organizations and the community to establish a social saftey net for elderly safety.

  • PDF

A Hardware Implementation of the Underlying Field Arithmetic Processor based on Optimized Unit Operation Components for Elliptic Curve Cryptosystems (타원곡선을 암호시스템에 사용되는 최적단위 연산항을 기반으로 한 기저체 연산기의 하드웨어 구현)

  • Jo, Seong-Je;Kwon, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.88-95
    • /
    • 2002
  • In recent years, the security of hardware and software systems is one of the most essential factor of our safe network community. As elliptic Curve Cryptosystems proposed by N. Koblitz and V. Miller independently in 1985, require fewer bits for the same security as the existing cryptosystems, for example RSA, there is a net reduction in cost size, and time. In this thesis, we propose an efficient hardware architecture of underlying field arithmetic processor for Elliptic Curve Cryptosystems, and a very useful method for implementing the architecture, especially multiplicative inverse operator over GF$GF (2^m)$ onto FPGA and futhermore VLSI, where the method is based on optimized unit operation components. We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed and inversion speed has been improved 150 times, 480 times respectively compared with the thesis presented by Sarwono Sutikno et al. [7]. The designed underlying arithmetic processor can be also applied for implementing other crypto-processor and various finite field applications.

Smart Ship Container With M2M Technology (M2M 기술을 이용한 스마트 선박 컨테이너)

  • Sharma, Ronesh;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.278-287
    • /
    • 2013
  • Modern information technologies continue to provide industries with new and improved methods. With the rapid development of Machine to Machine (M2M) communication, a smart container supply chain management is formed based on high performance sensors, computer vision, Global Positioning System (GPS) satellites, and Globle System for Mobile (GSM) communication. Existing supply chain management has limitation to real time container tracking. This paper focuses on the studies and implementation of real time container chain management with the development of the container identification system and automatic alert system for interrupts and for normal periodical alerts. The concept and methods of smart container modeling are introduced together with the structure explained prior to the implementation of smart container tracking alert system. Firstly, the paper introduces the container code identification and recognition algorithm implemented in visual studio 2010 with Opencv (computer vision library) and Tesseract (OCR engine) for real time operation. Secondly it discusses the current automatic alert system provided for real time container tracking and the limitations of those systems. Finally the paper summarizes the challenges and the possibilities for the future work for real time container tracking solutions with the ubiquitous mobile and satellite network together with the high performance sensors and computer vision. All of those components combine to provide an excellent delivery of supply chain management with outstanding operation and security.

Redesign and Performance Analysis of RTP(Real-time Transport Protocol) for Encryption of VoIP Media Information between Different Communication Networks (이종의 통신망 간에 VoIP 미디어 암호화를 위한 RTP(Real-time Transport Protocol)의 재설계 및 성능 분석)

  • Oh, Hyung-Jun;Park, Jae-Kyoung;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.4
    • /
    • pp.87-96
    • /
    • 2013
  • In this paper, we suggest redesigned RTP protocol that is able to perform encryption of VoIP media information for single private network and between the different private networks. And we conduct a test for performance analysis. Such as SRTP or ZRTP methods have been used for VoIP media encryption. But, the existing encryption techniques have problem that can not perform end-to-end encryption between different private networks. In order to solve this problem, in this paper, we redesign RTP protocol. Redesigned RTP includes all information for encryption of VoIP media. Therefore the encryption is not affected by modification of SIP and SDP information that occurred in gateway. Also, redesigned RTP includes code for whether or not to apply encryption. By using the code, modification of RTP header from gateway prevents. As a result, redesigned RTP maintain the integrity and the RTP is able to perform encryption between the different private networks. Also, we conduct a test for performance analysis of SRTP, ZRTP and redesigned RTP.

Monitoring Method Using Moving CCTV in Common Duct (이동형 CCTV 장치를 이용한 공동구 모니터링 방법)

  • Kang, Jin-A;Kim, Tae-Hoon;Oh, Yoon-Seuk;Choi, Hyun-Sang
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.4
    • /
    • pp.1-12
    • /
    • 2011
  • There has been the increasing concern with the safety of seven major urban infrastructure such as road, electricity, water supply, sewerage and so on due to urban expansion and new town development. However, high technology development for the common duct which can be an alternative for the safety issue has not been completed due to the law of the national security area. Existing management method of the common duct by people could not respond to the urgent accidents adequately and immediately since it is impossible for us to get access to that in case of fire or gas leak. This study suggests to the method of installing monitoring devices and processing CCTV images with a water supply in a TestLab(a variety of the USN(Ubiquitous Sensor Network) equipment was tested in the TestLab in KICT). The suggested management method of common duct facilities make it possible to do real-time monitoring and prompt access and response to an accident inside the common duct.

Log Management System of Web Server Based on Blockchain in Cloud Environment (클라우드 환경에서 블록체인 기반의 웹서버 로그 관리 시스템)

  • Son, Yong-Bum;Kim, Young-Hak
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.143-148
    • /
    • 2020
  • Recently, web services have been expanded to various areas with the evolution of cloud environment. Whenever a user accesses a web service, the user's log information is stored in the web server. This log information is used as data to analyze the user's web service tendencies and is also used as important data to track the user's system access when a security problem in the system occurs. Currently, most web servers manage user log information in a centralized manner. When user log information is managed in a centralized manner, it is simple in the side of operation, but has a disadvantage of being very vulnerable to external malicious attacks. In the case of centralized management, user log information stored in the web server can be arbitrarily manipulated by external attacks, and in severe cases, the manipulated information can be leaked. In this case, it not only decreases the trust of the web service, but also makes it difficult to trace the source and cause of the attack on the web server. In order to solve these problems, this paper proposes a new method of managing user log information in a cloud environment by applying blockchain technology as an alternative to the existing centralized log management method. The proposed method can manage log information safely from external attacks because user log information is distributed and stored in blockchain on a private network with cloud environment.

Determinants of Click-Through Intention as Affiliate Marketing and the Moderating Effect of Tie Strength in SNS (SNS에서 제휴마케팅 관점의 클릭의도에 영향을 주는 요인과 연대강도의 조절효과)

  • Mu, Huimin;Joo, Jaehun
    • Information Systems Review
    • /
    • v.15 no.3
    • /
    • pp.89-110
    • /
    • 2013
  • Affiliate marketing is classified as a type of online advertising, where merchants share a percentage of sales revenue generated by each customer, who visited the company's website via a content provider. Content provider, referred to as an affiliate, usually places an online advertisement at its website. For the past few years, there have been a lot of companies or individuals who participate in affiliate marketing. Generally speaking, most of them have websites and post the merchant's ads on their own websites. However, building and maintaining websites have some technology requirements. The widespread use of Social Network Service (SNS), especially microblog-based SNS such as Twitter and Sina Weibo, provides opportunities for individuals who want to be content providers of affiliate marketing. Since information spreads quickly on microblog-based SNS and the easy in targeting customers, it is both an effective and an efficient tool to do affiliate marketing. The relationship between a content provider and the potential customer, which is referred as "tie strength", is quite an important issue in such situation. This paper proved that service characteristics of the microblog-based SNS (security, community drivenness and navigability) and content quality all had positive influence on click-through intention, while tie strength played a moderating role. For the group with strong tie, tie strength is crucial in influencing click-through intention. While for the weak tie group, content quality was very important. Finally, we proposed some implications for both academics and practitioners.

  • PDF

Comparison Analysis on the Informatization Level between Construction CALS and Other Sectors (건설CALS의 정보화수준과 타 부문의 비교분석)

  • Jung, In-Su;Kim, Nam-Gon;Kim, Jin-Uk;Lee, Chan-Sik
    • Korean Journal of Construction Engineering and Management
    • /
    • v.10 no.4
    • /
    • pp.26-37
    • /
    • 2009
  • Ministry of Land, Transportation and Marine Affairs(MLTM) has implemented Construction CALS project for improving productivity of construction industry and for making construction project management efficient by responding to informatization and knowledge base society in 21st century. CALS has beeb applied successfully to projects form MLTM, however, the outcomes of Construction CALS hasn't been recognized. In addition, there is no way to find how high the level of Construction CALS is when it is compared with other SOC informatization projects. This study found out the informatiziation level of Construction CALS by using the evaluation index proposed in the former study, and by comparing with other sectors. The evaluation on the level was implemented in the three parts such as informatization infrastructure(network, hardware, standardization, data, informatization, informatization security), informatization utilization(information usage, IT performance), and informatization support(informatization goal, organization of informatization, informatization investment, informatization education), and then, this evaluation was compared with "Assessment for level of industry information system", "Assessment for level of small and midium sized industry information system", and "IICI(Informatizaion Index for the Construction Industry)". With the result from the comparison, this study produced superior factors and inferior factors for each sector. These results are expected to be useful for prioritizing budget allocation by finding out the informatization level of Construction CALS.

Wearable Technology with Future Fabrics (웨어러블 테크놀로지와 미래 소재)

  • Park, Hye-Sook;Lee, Jae-Jung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.12 s.159
    • /
    • pp.1800-1809
    • /
    • 2006
  • The wearable technology takes the concept of clothing over its limits -integrating software, communication devices, and sensors into the garments to enable them to 'think' for the wearer. A dress is no longer just a dress, but a dress as well as a wearable computer interface. This wearable computer network transports the data power and control signals within the wearer's personal space. The purpose of this thesis is to explore the wearable technology from a commercial perspective. On this theme I made a survey and interviewed 20 men and 20 women in London to find out if many people are familiar with the concept of the wearable technology. The main results of this study include: Firstly, according to the survey, people are not familiar with the concept of the wearable technology, and further people thought negatively about the wearable computer rather than positively they worried about hish prices, inappropriate technology and side effects. Secondly, people are especially interested in items related to health and security, so in this area there are huge potential opportunities for the wearable technology, Finally, wearable technology needs to be a simplified set of interactive devices, which are in a user friendly format for marketability because convenience was one of the biggest concern for consumers. Therefore, development of the wearable computer should be promoted not only through computer engineering but also through the connection with human lift.