• Title/Summary/Keyword: security technology

Search Result 6,551, Processing Time 0.04 seconds

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

Study on stability test of in process sample of recombinant Protein A (재조합 단백질 A 제조공정시료의 안정성실험에 관한 연구)

  • Kim, Yoo Gon;Lee, Woo Jong;Won, Chan Hee;Shin, Chul Soo
    • Analytical Science and Technology
    • /
    • v.25 no.6
    • /
    • pp.483-491
    • /
    • 2012
  • This study is to investigate the issues on how to secure stability during the purification process for the production of recombinant protein A. The final recombinant protein A is produced by passing through the cation exchange column (SP) and the anion-exchange column (Q) during the production process, for which the samples produced by the step-by-step processes can be exposed to trouble in securing stable storage in case the next process cannot be taken within the proper time period. Accordingly, this study aims to evaluate the proper storage conditions and length of time when storing samples produced in the production process. That is, in this study, how to store fair samples, how long the storage period should be set up, and how to evaluate the security of its quality depending on time are dealt with. The items to be experimented with were enodotoxin, SDS-PAGE, HPLC purity and concentration. Experimental results showed that after passing the cation exchange column, when stored at $4^{\circ}C$ or room temperature, SDS-PAGE showed a major band, endotoxin is 5.0 Eu/mg or less, and concentration is on average of 8.21 to 8.24 mg/mL and RSD% 0.10~0.62%. In addition, HLPC purity showed somewhat stable results; at the HPLC purity 214 nm, the average is 99.24% to 99.37% and RSD% is 0.22~0.29%, while the average is 89.72% to 89.80% and RSD% 0.62~1.26% at 280 nm. On the contrary, after passing the anion exchange column, when stored at $4^{\circ}C$ or room temperature, SDS-PAGE revealed the major band, endotoxin is 0.5 Eu/mg or less, and concentration is on average of 5.59 mg/mL and RSD% 0.03~0.10%. when it comes to HLPC purity, the result showed that at the HPLC purity 214 nm, the average is 99.74% and RSD% is 0.10~0.11%, while the average is 96.16% to 96.85% and RSD% 0.72~1.13%. In conclusion, the stability of fair samples of recombinant protein A during the manufacturing process could be obtained without substance decomposition for 7~8 days at $4^{\circ}C$ or 20~21 days at room temperature.

A Research in Applying Big Data and Artificial Intelligence on Defense Metadata using Multi Repository Meta-Data Management (MRMM) (국방 빅데이터/인공지능 활성화를 위한 다중메타데이터 저장소 관리시스템(MRMM) 기술 연구)

  • Shin, Philip Wootaek;Lee, Jinhee;Kim, Jeongwoo;Shin, Dongsun;Lee, Youngsang;Hwang, Seung Ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.169-178
    • /
    • 2020
  • The reductions of troops/human resources, and improvement in combat power have made Korean Department of Defense actively adapt 4th Industrial Revolution technology (Artificial Intelligence, Big Data). The defense information system has been developed in various ways according to the task and the uniqueness of each military. In order to take full advantage of the 4th Industrial Revolution technology, it is necessary to improve the closed defense datamanagement system.However, the establishment and usage of data standards in all information systems for the utilization of defense big data and artificial intelligence has limitations due to security issues, business characteristics of each military, anddifficulty in standardizing large-scale systems. Based on the interworking requirements of each system, data sharing is limited through direct linkage through interoperability agreement between systems. In order to implement smart defense using the 4th Industrial Revolution technology, it is urgent to prepare a system that can share defense data and make good use of it. To technically support the defense, it is critical to develop Multi Repository Meta-Data Management (MRMM) that supports systematic standard management of defense data that manages enterprise standard and standard mapping for each system and promotes data interoperability through linkage between standards which obeys the Defense Interoperability Management Development Guidelines. We introduced MRMM, and implemented by using vocabulary similarity using machine learning and statistical approach. Based on MRMM, We expect to simplify the standardization integration of all military databases using artificial intelligence and bigdata. This will lead to huge reduction of defense budget while increasing combat power for implementing smart defense.

Preliminary Post-closure Safety Assessment of Disposal Options for Disused Sealed Radioactive Source (폐밀봉선원 처분방식별 폐쇄후 예비안전성평가)

  • Lee, Seunghee;Kim, Juyoul;Kim, Sukhoon
    • Economic and Environmental Geology
    • /
    • v.49 no.4
    • /
    • pp.301-314
    • /
    • 2016
  • Disused Sealed Radioactive Sources (DSRSs) are stored temporally in the centralized storage facility of Korea Radioactive Waste Agency (KORAD) and planned to be disposed in the low- and intermediate-level radioactive waste (LILW) disposal facility in Gyeongju city. In this study, preliminary post-closure safety assessment was performed for DSRSs in order to draw up an optimum disposal plan. Two types of disposal options were considered, i.e. engineered vault type disposal and rock cavern type disposal which were planned to be constructed and operated respectively in LILW disposal facility in Gyeongju city. Assessment end-point was individual effective dose of critical group and calculated by using GoldSim code. In normal scenario, the maximum dose was estimated to be approximately $1{\times}10^{-7}mSv/yr$ for both disposal options. It meant that both options had sufficient safety margin when compared with regulatory limit (0.1 mSv/yr). Otherwise, in well scenario, the maximum dose exceeded regulatory limit of 1 mSv/yr in engineered vault type disposal and the exposure dose was mainly contributed by $^{226}Ra$, $^{210}Pb$ (daughter nuclide of $^{226}Ra$) and $^{237}Np$ (daughter nuclide of $^{241}Am$). For rock cavern type disposal, even though the peak dose satisfied regulatory limit, the exposure doses by $^{14}C$ and $^{237}Np$ were relatively high above 10% of regulatory limit. Therefore, it is necessary to exclude $^{14}C$, $^{226}Ra$ and $^{241}Am$ for two type of disposal options and additional management such as long-term storage and development of disposal container for those radionuclides should be performed before permanent disposal for conservative safety and security.

Current Statues of Phenomics and its Application for Crop Improvement: Imaging Systems for High-throughput Screening (작물육종 효율 극대화를 위한 피노믹스(phenomics) 연구동향: 화상기술을 이용한 식물 표현형 분석을 중심으로)

  • Lee, Seong-Kon;Kwon, Tack-Ryoun;Suh, Eun-Jung;Bae, Shin-Chul
    • Korean Journal of Breeding Science
    • /
    • v.43 no.4
    • /
    • pp.233-240
    • /
    • 2011
  • Food security has been a main global issue due to climate changes and growing world population expected to 9 billion by 2050. While biodiversity is becoming more highlight, breeders are confronting shortage of various genetic materials needed for new variety to tackle food shortage challenge. Though biotechnology is still under debate on potential risk to human and environment, it is considered as one of alternative tools to address food supply issue for its potential to create a number of variations in genetic resource. The new technology, phenomics, is developing to improve efficiency of crop improvement. Phenomics is concerned with the measurement of phenomes which are the physical, morphological, physiological and/or biochemical traits of organisms as they change in response to genetic mutation and environmental influences. It can be served to provide better understanding of phenotypes at whole plant. For last decades, high-throughput screening (HTS) systems have been developed to measure phenomes, rapidly and quantitatively. Imaging technology such as thermal and chlorophyll fluorescence imaging systems is an area of HTS which has been used in agriculture. In this article, we review the current statues of high-throughput screening system in phenomics and its application for crop improvement.

A Study on the Influence of IT Education Service Quality on Educational Satisfaction, Work Application Intention, and Recommendation Intention: Focusing on the Moderating Effects of Learner Position and Participation Motivation (IT교육 서비스품질이 교육만족도, 현업적용의도 및 추천의도에 미치는 영향에 관한 연구: 학습자 직위 및 참여동기의 조절효과를 중심으로)

  • Kang, Ryeo-Eun;Yang, Sung-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.169-196
    • /
    • 2017
  • The fourth industrial revolution represents a revolutionary change in the business environment and its ecosystem, which is a fusion of Information Technology (IT) and other industries. In line with these recent changes, the Ministry of Employment and Labor of South Korea announced 'the Fourth Industrial Revolution Leader Training Program,' which includes five key support areas such as (1) smart manufacturing, (2) Internet of Things (IoT), (3) big data including Artificial Intelligence (AI), (4) information security, and (5) bio innovation. Based on this program, we can get a glimpse of the South Korean government's efforts and willingness to emit leading human resource with advanced IT knowledge in various fusion technology-related and newly emerging industries. On the other hand, in order to nurture excellent IT manpower in preparation for the fourth industrial revolution, the role of educational institutions capable of providing high quality IT education services is most of importance. However, these days, most IT educational institutions have had difficulties in providing customized IT education services that meet the needs of consumers (i.e., learners), without breaking away from the traditional framework of providing supplier-oriented education services. From previous studies, it has been found that the provision of customized education services centered on learners leads to high satisfaction of learners, and that higher satisfaction increases not only task performance and the possibility of business application but also learners' recommendation intention. However, since research has not yet been conducted in a comprehensive way that consider both antecedent and consequent factors of the learner's satisfaction, more empirical research on this is highly desirable. With the advent of the fourth industrial revolution, a rising interest in various convergence technologies utilizing information technology (IT) has brought with the growing realization of the important role played by IT-related education services. However, research on the role of IT education service quality in the context of IT education is relatively scarce in spite of the fact that research on general education service quality and satisfaction has been actively conducted in various contexts. In this study, therefore, the five dimensions of IT education service quality (i.e., tangibles, reliability, responsiveness, assurance, and empathy) are derived from the context of IT education, based on the SERVPERF model and related previous studies. In addition, the effects of these detailed IT education service quality factors on learners' educational satisfaction and their work application/recommendation intentions are examined. Furthermore, the moderating roles of learner position (i.e., practitioner group vs. manager group) and participation motivation (i.e., voluntary participation vs. involuntary participation) in relationships between IT education service quality factors and learners' educational satisfaction, work application intention, and recommendation intention are also investigated. In an analysis using the structural equation model (SEM) technique based on a questionnaire given to 203 participants of IT education programs in an 'M' IT educational institution in Seoul, South Korea, tangibles, reliability, and assurance were found to have a significant effect on educational satisfaction. This educational satisfaction was found to have a significant effect on both work application intention and recommendation intention. Moreover, it was discovered that learner position and participation motivation have a partial moderating impact on the relationship between IT education service quality factors and educational satisfaction. This study holds academic implications in that it is one of the first studies to apply the SERVPERF model (rather than the SERVQUAL model, which has been widely adopted by prior studies) is to demonstrate the influence of IT education service quality on learners' educational satisfaction, work application intention, and recommendation intention in an IT education environment. The results of this study are expected to provide practical guidance for IT education service providers who wish to enhance learners' educational satisfaction and service management efficiency.

Empirical Analysis on Bitcoin Price Change by Consumer, Industry and Macro-Economy Variables (비트코인 가격 변화에 관한 실증분석: 소비자, 산업, 그리고 거시변수를 중심으로)

  • Lee, Junsik;Kim, Keon-Woo;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.195-220
    • /
    • 2018
  • In this study, we conducted an empirical analysis of the factors that affect the change of Bitcoin Closing Price. Previous studies have focused on the security of the block chain system, the economic ripple effects caused by the cryptocurrency, legal implications and the acceptance to consumer about cryptocurrency. In various area, cryptocurrency was studied and many researcher and people including government, regardless of country, try to utilize cryptocurrency and applicate to its technology. Despite of rapid and dramatic change of cryptocurrencies' price and growth of its effects, empirical study of the factors affecting the price change of cryptocurrency was lack. There were only a few limited studies, business reports and short working paper. Therefore, it is necessary to determine what factors effect on the change of closing Bitcoin price. For analysis, hypotheses were constructed from three dimensions of consumer, industry, and macroeconomics for analysis, and time series data were collected for variables of each dimension. Consumer variables consist of search traffic of Bitcoin, search traffic of bitcoin ban, search traffic of ransomware and search traffic of war. Industry variables were composed GPU vendors' stock price and memory vendors' stock price. Macro-economy variables were contemplated such as U.S. dollar index futures, FOMC policy interest rates, WTI crude oil price. Using above variables, we did times series regression analysis to find relationship between those variables and change of Bitcoin Closing Price. Before the regression analysis to confirm the relationship between change of Bitcoin Closing Price and the other variables, we performed the Unit-root test to verifying the stationary of time series data to avoid spurious regression. Then, using a stationary data, we did the regression analysis. As a result of the analysis, we found that the change of Bitcoin Closing Price has negative effects with search traffic of 'Bitcoin Ban' and US dollar index futures, while change of GPU vendors' stock price and change of WTI crude oil price showed positive effects. In case of 'Bitcoin Ban', it is directly determining the maintenance or abolition of Bitcoin trade, that's why consumer reacted sensitively and effected on change of Bitcoin Closing Price. GPU is raw material of Bitcoin mining. Generally, increasing of companies' stock price means the growth of the sales of those companies' products and services. GPU's demands increases are indirectly reflected to the GPU vendors' stock price. Making an interpretation, a rise in prices of GPU has put a crimp on the mining of Bitcoin. Consequently, GPU vendors' stock price effects on change of Bitcoin Closing Price. And we confirmed U.S. dollar index futures moved in the opposite direction with change of Bitcoin Closing Price. It moved like Gold. Gold was considered as a safe asset to consumers and it means consumer think that Bitcoin is a safe asset. On the other hand, WTI oil price went Bitcoin Closing Price's way. It implies that Bitcoin are regarded to investment asset like raw materials market's product. The variables that were not significant in the analysis were search traffic of bitcoin, search traffic of ransomware, search traffic of war, memory vendor's stock price, FOMC policy interest rates. In search traffic of bitcoin, we judged that interest in Bitcoin did not lead to purchase of Bitcoin. It means search traffic of Bitcoin didn't reflect all of Bitcoin's demand. So, it implies there are some factors that regulate and mediate the Bitcoin purchase. In search traffic of ransomware, it is hard to say concern of ransomware determined the whole Bitcoin demand. Because only a few people damaged by ransomware and the percentage of hackers requiring Bitcoins was low. Also, its information security problem is events not continuous issues. Search traffic of war was not significant. Like stock market, generally it has negative in relation to war, but exceptional case like Gulf war, it moves stakeholders' profits and environment. We think that this is the same case. In memory vendor stock price, this is because memory vendors' flagship products were not VRAM which is essential for Bitcoin supply. In FOMC policy interest rates, when the interest rate is low, the surplus capital is invested in securities such as stocks. But Bitcoin' price fluctuation was large so it is not recognized as an attractive commodity to the consumers. In addition, unlike the stock market, Bitcoin doesn't have any safety policy such as Circuit breakers and Sidecar. Through this study, we verified what factors effect on change of Bitcoin Closing Price, and interpreted why such change happened. In addition, establishing the characteristics of Bitcoin as a safe asset and investment asset, we provide a guide how consumer, financial institution and government organization approach to the cryptocurrency. Moreover, corroborating the factors affecting change of Bitcoin Closing Price, researcher will get some clue and qualification which factors have to be considered in hereafter cryptocurrency study.

Outer Space Activities and an Observation of Related Laws of Korea (국내 우주활동과 관련법 소고)

  • Park, Won-Hwa
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.2
    • /
    • pp.163-186
    • /
    • 2009
  • The missile technology and its development in south Korea have been restrained to the limit of 180 km by America which instead provided to Korea with security protection. In the same vein, America pressured South Korea to abort its nuclear weapons program so as to prevent another possible military encounter that can easily develop into a war between South and North Korea. This restraint was a bit relaxed when South Korea joined the Missile Technology Control Regime (MTCR) in 2001 whereby the limit was 300 km. The situation of South Korea is in much contrast with its neighbor, North Korea, which has fired Taepo Dong 1 and Taepo Dong 2 to put its alleged satellite respectively into the Earth orbit. The range of this rocket believed to be reaching more than 5,500 km, a range of the intercontinental ballistic missile, without any rein. South Korea that has just geared its full powers for its outer space industry, with the current space projects of putting its satellites into the low Earth orbit, will in future put its satellite into the geostationary orbit, 36,000 km above the Earth. To do so, such restraint had better be resolved. Korean space industry, as it is alike in other countries, started with putting and manufacturing sounding rockets, producing satellites but relying on foreign launching facilities, and learning launching capacities. Experiencing three time launchings of KITSAT, the current satellite projects of Korea are undertaken as follows: - Koreasat - STSAT - Komsat - MBSAT - COMS (Communication, Ocean, and Meteorological Satellite) Koreans waked up to the things of outer space in 2008 with the first Korean astronaut Li So-yeon, a lady bio systems engineer. Although the first Korean made rocket in cooperation with a Russian company to fire last August 2009 was a failure, it should be considered as an inevitable process for future endeavors. There are currently three outer space related laws of Korea: Aerospace Industry Development Promotion Act 1987, Outer Space Development Promotions Act 2005, and Space Damage Compensation Act 2008. The first two stemming from the two different ministries are, however, overlapping in many aspects and have some shortcomings to be improved.

  • PDF

A Study on Fast Iris Detection for Iris Recognition in Mobile Phone (휴대폰에서의 홍채인식을 위한 고속 홍채검출에 관한 연구)

  • Park Hyun-Ae;Park Kang-Ryoung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.2 s.308
    • /
    • pp.19-29
    • /
    • 2006
  • As the security of personal information is becoming more important in mobile phones, we are starting to apply iris recognition technology to these devices. In conventional iris recognition, magnified iris images are required. For that, it has been necessary to use large magnified zoom & focus lens camera to capture images, but due to the requirement about low size and cost of mobile phones, the zoom & focus lens are difficult to be used. However, with rapid developments and multimedia convergence trends in mobile phones, more and more companies have built mega-pixel cameras into their mobile phones. These devices make it possible to capture a magnified iris image without zoom & focus lens. Although facial images are captured far away from the user using a mega-pixel camera, the captured iris region possesses sufficient pixel information for iris recognition. However, in this case, the eye region should be detected for accurate iris recognition in facial images. So, we propose a new fast iris detection method, which is appropriate for mobile phones based on corneal specular reflection. To detect specular reflection robustly, we propose the theoretical background of estimating the size and brightness of specular reflection based on eye, camera and illuminator models. In addition, we use the successive On/Off scheme of the illuminator to detect the optical/motion blurring and sunlight effect on input image. Experimental results show that total processing time(detecting iris region) is on average 65ms on a Samsung SCH-S2300 (with 150MHz ARM 9 CPU) mobile phone. The rate of correct iris detection is 99% (about indoor images) and 98.5% (about outdoor images).

Perceptions of Information Technology Competencies among Gifted and Non-gifted High School Students (영재와 평재 고등학생의 IT 역량에 대한 인식)

  • Shin, Min;Ahn, Doehee
    • Journal of Gifted/Talented Education
    • /
    • v.25 no.2
    • /
    • pp.339-358
    • /
    • 2015
  • This study was to examine perceptions of information technology(IT) competencies among gifted and non-gifted students(i.e., information science high school students and technical high school students). Of the 370 high school students surveyed from 3 high schools(i.e., gifted academy, information science high school, and technical high school) in three metropolitan cities, Korea, 351 students completed and returned the questionnaires yielding a total response rate of 94.86%. High school students recognized the IT professional competence as being most important when recruiting IT employees. And they considered that practice-oriented education was the most importantly needed to improve their IT skills. In addition, the most important sub-factors of IT core competencies among gifted academy students and information science high school students were basic software skills. Also Technical high school students responded that the main network and security capabilities were the most importantly needed to do so. Finally, the most appropriate training courses for enhancing IT competencies were recognized differently among gifted and non-gifted students. Gifted academy students responded that the 'algorithm' was the mostly needed for enhancing IT competencies, whereas information science high school students responded that 'data structures' and 'computer architecture' were mostly needed to do. For technical high school students, they responded that a 'programming language' course was the most needed to do so. Results are discussed in relations to IT corporate and school settings.