• Title/Summary/Keyword: security demands

Search Result 252, Processing Time 0.038 seconds

A Study on the Development of National Defense Leadership through the Change of Civil-Military Relationships (민군관계의 변화와 국방리더십의 발전방안에 관한 연구)

  • Lee, Chang-Gi
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.83-118
    • /
    • 2006
  • This study is to develop digital leadership in a field of national defense. Today, korean society is facing the crisis of national security. But national defense leadership is not show in the circumstance of national security crisis. As you know, national defense leadership is a process that make use of influence. Which means it converges people's interest and demands well and also show people the right vision of national defense and make them to comply the policy about national security. Because of the environmental change, our national defense leadership is having a new turning point. First, international order, which is under post-cold war, raises possibility of guarantee of peace and security in international society but also, cause the increase of multiple uncertainty and small size troubles in security circumstance. In addition, Korean society is rushing into democratization and localization period by success in peaceful change of political power went through about three times. The issue of political neutralization of military is stepping into settlement but still, negative inheritance of old military regime is worrying about it. In this situation, we can't expect rise in estimation about the importance of security and military's reason for being. So, military have to give their concern to not only internal maintenance of order and control and growth of soldiers but also developing external leadership to strength influence to society and military's the reason for being. So for these alternative I'm suggesting a digital leadership of national defense which fits digital era. This digital leadership is the leadership which can accept and understand digital technology and lead the digital organization. To construct digital national defense we need a practical leadership. The leadership has to be digital leadership with digital competence that can direct vision of digital national defense and carry out the policy. A leader who ha s digital leadership can lead the digital society. The ultimate key to construct digital government, digital corporate and digital citizen depends on digital leader with digital mind. To be more specific, digital leadership has network leadership, next generation leadership, knowledge driven management leadership, innovation oriented leadership. A leader with this kind of leadership is the real person with digital leadership. From now on, to rise this, we have to build up human resource development strategy and develop educational training program.

  • PDF

A Study on MD5 Security Routing based on MANET (MANET 기반 MD5 보안 라우팅에 관한 연구)

  • Lee, Cheol-Seung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.797-803
    • /
    • 2012
  • Recently demands in construction of the stand-alone networks and interconnection between convergence devices have led an increase in research on and much attention has been paid to the application of MANET as a Ubiquitous network which is growing fast. With performance both as hosts and routers, easy network configuration, and fast response, mobile nodes participating in MANET are suitable for Embedded computing, but have vulnerable points, such as lack of network scalability and dynamic network topology due to mobility, passive attacks, active attacks, which make continuous security service impossible. In this study, hashed AODV routing is used to protect from counterfeiting messages by malicious nodes in the course of path finding and setting, and disguising misrouted messages as different mobile nodes and inputting them into the network.

A Study on the Divisible Electronic Cash System Functioning Electronic License (전자면허의 기능을 갖는 분할 가능한 전자화폐시스템에 관한 연구)

  • 이애리;이지영
    • The Journal of Information Technology
    • /
    • v.3 no.1
    • /
    • pp.89-97
    • /
    • 2000
  • Electronic commerce on the network requires a new payment system, electronic cash that carries digitalized information of cash. The new system, however, demands the security and privacy because electronic cash is different from real cash in that it can be easily duplicated, forged, or traced. Therefore, electronic cash system should be guaranteed security and privacy to be used as a new payment mechanism with assurance. First, this paper analyzes the existing electronic cash system involving electronic coins, divisible electronic bills, and electronic license. Then the paper proposes a new electronic cash system which claims to be more efficient in the amount of communication and computation. Finally, this study attempts to solve the problem of electronic license.

  • PDF

A GQM Approach to Evaluation of the Quality of SmartThings Applications Using Static Analysis

  • Chang, Byeong-Mo;Son, Janine Cassandra;Choi, Kwanghoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2354-2376
    • /
    • 2020
  • SmartThings is one of the most popular open platforms for home automation IoT solutions that allows users to create their own applications called SmartApps for personal use or for public distribution. The nature of openness demands high standards on the quality of SmartApps, but there have been few studies that have evaluated this thoroughly yet. As part of software quality practice, code reviews are responsible for detecting violations of coding standards and ensuring that best practices are followed. The purpose of this research is to propose systematically designed quality metrics under the well-known Goal/Question/Metric methodology and to evaluate the quality of SmartApps through automatic code reviews using a static analysis. We first organize our static analysis rules by following the GQM methodology, and then we apply the rules to real-world SmartApps to analyze and evaluate them. A study of 105 officially published and 74 community-created real-world SmartApps found a high ratio of violations in both types of SmartApps, and of all violations, security violations were most common. Our static analysis tool can effectively inspect reliability, maintainability, and security violations. The results of the automatic code review indicate the common violations among SmartApps.

Secrecy Spectrum and Secrecy Energy Efficiency in Massive MIMO Enabled HetNets

  • Zhong, Zhihao;Peng, Jianhua;Huang, Kaizhi;Xia, Lu;Qi, Xiaohui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.628-649
    • /
    • 2017
  • Security and resource-saving are both demands of the fifth generation (5G) wireless networks. In this paper, we study the secrecy spectrum efficiency (SSE) and secrecy energy efficiency (SEE) of a K-tier massive multiple-input multiple-output (MIMO) enabled heterogeneous cellular network (HetNet), in which artificial noise (AN) are employed for secrecy enhancement. Assuming (i) independent Poisson point process model for the locations of base stations (BSs) of each tier as well as that of eavesdroppers, (ii) zero-forcing precoding at the macrocell BSs (MBSs), and (iii) maximum average received power-based cell selection, the tractable lower bound expressions for SSE and SEE of massive MIMO enabled HetNets are derived. Then, the influences on secrecy oriented spectrum and energy efficiency performance caused by the power allocation for AN, transmit antenna number, number of users served by each MBS, and eavesdropper density are analyzed respectively. Moreover, the analysis accuracy is verified by Monte Carlo simulations.

Development of Integrated Monitoring Middleware System for 400km/h High Speed Railway Measurement Data (400km/h급 고속철도 계측데이터 통합 모니터링 미들웨어 시스템 개발)

  • Hwang, KyungHun;Na, JunSu;Song, ByungKeun;Yang, OKYul
    • Convergence Security Journal
    • /
    • v.13 no.6
    • /
    • pp.61-68
    • /
    • 2013
  • Needs for a new technologies of infrastructure systems arose, following the development of next generation EMU(Electric Multiple Unit) train with maximum speed over 400km/h. For high-speed operation tests of the new EMU, a high-speed railway infrastructure test-bed was constructed in a 28km long section of the Honam High-speed Railway. Diverse sensors and monitoring system was installed for continuous monitoring of the railway. Due to such effort, further demands and needs of the integrated monitoring system was derived in a more comprehensive and long-term perspective.

Performance Enhancement of ECC Algorithm-based Mobile Web Service System (ECC 알고리즘 기반 모바일 웹 서비스 시스템의 성능 향상)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.699-704
    • /
    • 2008
  • By the dependence on Web from popularization of internet and increasing number of users, web services capability and security problem of communication is becoming a great issue. Existing web services technology decrease the capability of web application server by limiting the number of synchronous client, decreasing the processing load and increasing average response time. The encryption process to secure communication and the early expense of handshake decrease transmission speed and server capability by increasing the calculation time for connecting. Accordingly, this paper executes an encryption procedure by elliptical encryption algorithm to satisfy secure demands, improve the overload of server for web services and get reliability and security of web server architecture and proposes an improved mobile web sever which provides better ability and the techniques for deferred processing.

Multicore Processor based Parallel SVM for Video Surveillance System (비디오 감시 시스템을 위한 멀티코어 프로세서 기반의 병렬 SVM)

  • Kim, Hee-Gon;Lee, Sung-Ju;Chung, Yong-Wha;Park, Dai-Hee;Lee, Han-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.161-169
    • /
    • 2011
  • Recent intelligent video surveillance system asks for development of more advanced technology for analysis and recognition of video data. Especially, machine learning algorithm such as Support Vector Machine (SVM) is used in order to recognize objects in video. Because SVM training demands massive amount of computation, parallel processing technique is necessary to reduce the execution time effectively. In this paper, we propose a parallel processing method of SVM training with a multi-core processor. The results of parallel SVM on a 4-core processor show that our proposed method can reduce the execution time of the sequential training by a factor of 2.5.

Back to Nature-Based Agriculture: Green Livelihoods Are Taking Root in the Mekong River Delta

  • Lan, Ngo Thi Phuong;Kien, Nguyen Van
    • Journal of People, Plants, and Environment
    • /
    • v.24 no.6
    • /
    • pp.551-561
    • /
    • 2021
  • Background and objective: Vietnam is prioritizing agricultural production for food export capacity in all national policies. As a result, for three decades, its agriculture has been making quite many remarkable achievements. Methods: The most successful one is that the nation has become one of the world's leading rice exporters and ensures its national food security. Through these endeavors, the Mekong River Delta (MRD), in particular, has emerged as a key region in ensuring national food security and rice export. Results: The new era can now see Vietnamese agriculture turning to place special emphasis on commodity quality and the improvement of the living environment. This is evidenced, for example, by the phenomenon that the MRD, as a rice basket of the whole country, is making moves back to nature-based agriculture with attempts to restore the natural ecology, including preserving and restoring local traditional rice seeds, adopting natural farming practices and minimizing the use of chemical fertilizers and pesticides. Conclusion: The case studies of nature-based farming practices in the MRD indicate that, while the national agriculture is generally developing large-scale production, the small-scale farming in the region, integrated with tourist and educational activities on-site, is meeting the demands of a highly potential domestic niche market. Moreover, this model appears to be a sustainable farming approach that defines itself as a working green livelihood for the region.

Virtual Machine Placement Methods using Metaheuristic Algorithms in a Cloud Environment - A Comprehensive Review

  • Alsadie, Deafallah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.147-158
    • /
    • 2022
  • Cloud Computing offers flexible, on demand, ubiquitous resources for cloud users. Cloud users are provided computing resources in a virtualized environment. In order to meet the growing demands for computing resources, data centres contain a large number of physical machines accommodating multiple virtual machines. However, cloud data centres cannot utilize their computing resources to their total capacity. Several policies have been proposed for improving energy proficiency and computing resource utilization in cloud data centres. Virtual machine placement is an effective method involving efficient mapping of virtual machines to physical machines. However, the availability of many physical machines accommodating multiple virtual machines in a data centre has made the virtual machine placement problem a non deterministic polynomial time hard (NP hard) problem. Metaheuristic algorithms have been widely used to solve the NP hard problems of multiple and conflicting objectives, such as the virtual machine placement problem. In this context, we presented essential concepts regarding virtual machine placement and objective functions for optimizing different parameters. This paper provides a taxonomy of metaheuristic algorithms for the virtual machine placement method. It is followed by a review of prominent research of virtual machine placement methods using meta heuristic algorithms and comparing them. Finally, this paper provides a conclusion and future research directions in virtual machine placement of cloud computing.