• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.031 seconds

Trends in the use of big data and artificial intelligence in the sports field (스포츠 현장에서의 빅데이터와 인공지능 활용 동향)

  • Seungae Kang
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.115-120
    • /
    • 2022
  • This study analyzed the recent trends in the sports environment to which big data and AI technologies, which are representative technologies of the 4th Industrial Revolution, and approached them from the perspective of convergence of big data and AI technologies in the sports field. And the results are as follows. First, it is being used for player and game data analysis and team strategy establishment and operation. Second, by combining big data collected using GPS, wearable equipment, and IoT with artificial intelligence technology, scientific physical training for each player is possible through user individual motion analysis, which helps to improve performance and efficiently manage injuries. Third, with the introduction of an AI-based judgment system, it is being used for judge judgment. Fourth, it is leading the change in marketing and game broadcasting services. The technology of the 4th Industrial Revolution is bringing innovative changes to all industries, and the sports field is also in the process. The combination of big data and AI is expected to play an important role as a key technology in the rapidly changing future in a sports environment where scientific analysis and training determine victory or defeat.

A Study on Acceptance of Blockchain-Based Genetic Information Platform (블록체인 기반 유전자분석 정보플랫폼의 수용에 대한 연구)

  • In Seon Choi;Dong Chan Park;Doo Hee Chung
    • Information Systems Review
    • /
    • v.23 no.3
    • /
    • pp.97-125
    • /
    • 2021
  • Blockchain is a core technology to solve personal information leakage and data management issues, which are limitations of existing Genomic Sequencing services. Due to continuous cost reduction and deregulation, the market size of Genomic Sequencing has been increasing, also the potential of services is expected to increase when Blockchain's security and connectivity are combined. We created our research model by combining the Technology Acceptance Model (TAM) and the Innovation Resistance Theory also analyzed the factors affecting the acceptance intention and innovation resistance of the Blockchain Based Genomic Sequencing Information Platform. A survey was conducted on 150 potential users of Blockchain and Genomic Sequencing services. The analysis was conducted by setting the four Blockchain variables: Security, transparency, availability, and diversity). Also, we set the Perceived Usefulness, Perceived risk, and Perceived Complexity for Technology Acceptance and Innovation Resistance variables and analyzed the effect of the characteristics of the Blockchain on acceptance intention and innovation resistance through these variables. Through this analysis, key variables that need to be considered important to reduce resistance and increase acceptance intention could be identified. This study presents innovation factors that should be considered in companies preparing a new Blockchain Based Genomic Sequencing Information Platform.

Investigation of Verification and Evaluation Methods for Tampering Response Techniques Using HW Security Modules (HW 보안 모듈을 활용한 탬퍼링 대응 기술의 검증 및 평가 방안 조사)

  • Dongho Lee;Younghoon Ban;Jae-Deok Lim;Haehyun Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.335-345
    • /
    • 2024
  • In the digital era, data security has become an increasingly critical issue, drawing significant attention. Particularly, anti-tampering technology has emerged as a key defense mechanism against indiscriminate hacking and unauthorized access. This paper explores case studies that exemplify the trends in the development and application of TPM (Trusted Platform Module) and software anti-tampering technology in today's digital ecosystem. By analyzing various existing security guides and guidelines, this paper identifies ambiguous areas within them and investigates recent trends in domestic and international research on software anti-tampering. Consequently, while guidelines exist for applying anti-tampering techniques, it was found that there is a lack of methods for evaluating them. Therefore, this paper aims to propose a comprehensive and systematic evaluation framework for assessing both existing and future software anti-tampering techniques. To achieve this, it using various verification methods employed in recent research. The proposed evaluation framework synthesizes these methods, categorizing them into three aspects (functionality, implementation, performance), thereby providing a comprehensive and systematic evaluation approach for assessing software anti-tampering technology in detail.

A study on the transfer of discharged female soldiers to the reserve force: Focusing on the need for transfer and impact on reserve female soldiers (전역 여군의 예비역 편입에 관한 연구)

  • Jeon, Kiseok;Choi, Soonwon
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.167-174
    • /
    • 2024
  • While reserve forces play a critical role in modern warfare, the primary focus on reserve forces has been on men. Women's reserve forces have received little attention. The purpose of this study is to examine the need to increase the number of women in the reserve and the impact of increasing the number of women on active duty. The reasons for the need for women in the military are the decrease in the resources of the reserve force as well as the regular force due to the decrease in population, the development of fields where women can perform missions with advantages due to the changing patterns of warfare, and the changing situation of gender equality and the increasing role of women in society. However, it is currently optional, not mandatory, for female veterans to join the Reserve. The number of cadres entering the reserve may decrease as the number of active-duty women increases. Using a 2018 estimate of 13.9 percent of women transitioning to the Reserve, 194 of the 1,402 projected transitioning women in '27 will transition to the Reserve. This leaves an estimated shortfall of 1,208 reserve officers and NCO. This suggests that the policy of increasing the number of women on active duty could have a significant impact on the reserve force in the future, and further policy research is needed.

Research on the Direction of Building an Integrated Smart Platform at Construction Sites (건설현장 통합 스마트플랫폼 구축방향에 대한 연구)

  • Yeon Cheol Shin;Yu Mi Moon
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.3
    • /
    • pp.620-634
    • /
    • 2024
  • Purpose: This study aims to strengthen the linkage between the construction site and the headquarters, suggest the direction of building an integrated smart platform that can actually be operated and utilized in the field, and effectively implement safety management. Method: Agile methodologies were applied to build a flexible and scalable system through cloud-based and three-tier architectures. Functional requirements were set through an on-site survey, and design and construction were carried out by reflecting personal information protection and legal requirements. Result: The integrated smart platform proposed in this study strengthens the connection between the site and the headquarters to maximize the effect of safety accident prevention and safety management. This system has improved the safety awareness of workers and managers, and has realized more efficient safety management through a unified communication system. Conclusion: In the establishment of an integrated smart platform, it is essential to reflect the characteristics of the site when selecting the development method and establishing the function plan. In the basic design and detailed design stages, it is necessary to establish security measures, design mobile functions, and review device expansion, and consider enterprise-wide safety management, user convenience, and scalability. It is also important to maintain and improve the system, reflect legal requirements, and support the elderly and foreign workers. By strengthening personal information and CCTV security and continuously improving it by reflecting user opinions, it can be expected to activate an integrated smart platform.

A Design of Communication Network Architecture for E-Navigation Services (E-Navigation 서비스 제공을 위한 통신망 아키텍처의 설계)

  • Jeong, Jung-Sik;Kim, Sun-Young
    • Journal of Navigation and Port Research
    • /
    • v.32 no.1
    • /
    • pp.37-45
    • /
    • 2008
  • The research on an E-Navigation(E-Nav) strategy development has recently carried out by the IMO sub-committee on safety of navigation(NAV). The design of communication system architecture is a key factor in the E-Nav strategy development and it may drive the direction of a national R&D project on future navigational and marine communication systems. This study aims at designing a standard model of E-Nav communication network architecture, which enhances navigational safety and provides additional benefits in marine transportation. To achieve this purpose, authors have suggested E-Nav services, which are divided into five categories, i.e., safety and security, maritime meteorology, distress, business, and infotainment, by analyzing the related user requirements. As results, this paper proposes the E-Nav communication network architecture that consists of the navigation and communication equipments.

Numerical Analysis of Authentication Algorithm using Randomized CA Groups in Mobile Ad Hoc Networks (모바일 애드혹 네트워크에서 랜덤 CA 그룹을 이용한 인증 알고리즘에 대한 성능 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.8
    • /
    • pp.22-33
    • /
    • 2009
  • Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In [1], we addressed the problem of efficient authentication of distributed mobile users in geographically large networks and proposed a new authentication scheme for this case of MANETs. The proposed scheme exploits randomized groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority(CA). In this paper, we analyze numerically the performance of authentication method using randomized groups and compare with the simulation result.

A Study on the Fast Enrollment of Text-Independent Speaker Verification for Vehicle Security (차량 보안을 위한 어구독립 화자증명의 등록시간 단축에 관한 연구)

  • Lee, Tae-Seung;Choi, Ho-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.5 no.1
    • /
    • pp.1-10
    • /
    • 2001
  • Speech has a good characteristics of which car drivers busy to concern with miscellaneous operation can make use in convenient handling and manipulating of devices. By utilizing this, this works proposes a speaker verification method for protecting cars from being stolen and identifying a person trying to access critical on-line services. In this, continuant phonemes recognition which uses language information of speech and MLP(mult-layer perceptron) which has some advantages against previous stochastic methods are adopted. The recognition method, though, involves huge computation amount for learning, so it is somewhat difficult to adopt this in speaker verification application in which speakers should enroll themselves at real time. To relieve this problem, this works presents a solution that introduces speaker cohort models from speaker verification score normalization technique established before, dividing background speakers into small cohorts in advance. As a result, this enables computation burden to be reduced through classifying the enrolling speaker into one of those cohorts and going through enrollment for only that cohort.

  • PDF

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

Improve the Performance of People Detection using Fisher Linear Discriminant Analysis in Surveillance (서베일런스에서 피셔의 선형 판별 분석을 이용한 사람 검출의 성능 향상)

  • Kang, Sung-Kwan;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.295-302
    • /
    • 2013
  • Many reported methods assume that the people in an image or an image sequence have been identified and localization. People detection is one of very important variable to affect for the system's performance as the basis technology about the detection of other objects and interacting with people and computers, motion recognition. In this paper, we present an efficient linear discriminant for multi-view people detection. Our approaches are based on linear discriminant. We define training data with fisher Linear discriminant to efficient learning method. People detection is considerably difficult because it will be influenced by poses of people and changes in illumination. This idea can solve the multi-view scale and people detection problem quickly and efficiently, which fits for detecting people automatically. In this paper, we extract people using fisher linear discriminant that is hierarchical models invariant pose and background. We estimation the pose in detected people. The purpose of this paper is to classify people and non-people using fisher linear discriminant.