• Title/Summary/Keyword: 보안 중요도

Search Result 2,285, Processing Time 0.037 seconds

Development of EDI Model in the Port and Logistics Industries (항만물류산업에서 업체별 EDI 활성화 모형개발)

  • Shin, Chang-Hoon;Kim, Yul-Sung;Song, Jae-Young
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.29 no.1
    • /
    • pp.369-375
    • /
    • 2005
  • The rapid growth of economy in china leads to concentrate throughput volume of World to North East Asia. Ports in North East Asia have to cope with rapid changes in environments. In order for a port to compete in the global market, it must provide proper productivity and promptly services of port. The system of information hold a key in port-logistic industries. Most ports make every effort to set up and operate the system of Information. Busan port already set up the system of port-logistic information such as Port-Mis, KROIS. But it is not activate yet because of problems of security and certification and so on. The purpose of this paper is to make Model which can activate the system of port-logistic information. In addition to, We suggest definite and feasible model by group and types of port-logistic industry.

  • PDF

A Design of a Personnel Control System Using RF Tag in Port Facilities (RF 태그를 활용한 항만 내 인원관리 시스템)

  • Cha, Jin-Man;Park, Yeoun-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.520-523
    • /
    • 2010
  • In the field of network sense for the Ubiquitous environment, the technology of RFID is a significant part. Due to the real time processing of information and the property of network, RFID has been used in service field such as distribution, administrative control of physical distribution, remote measuring device, and security, instead of currently used bar-code. The management system of port facilities using the current RFID technology has the effects of reducing working hours and improvement in data processing, but it is not proper for human resource allocation since it is dominantly worked for physical resources. In this paper, we designed and implemented personnel control system using RFID of 2.4GHz in port facilities which presents a monitoring system for safety operation and increase of efficiency using RFID in order to overcome the limitations and problems of current port operation management techniques.

  • PDF

Anomaly Intrusion Detection using Fuzzy Membership Function and Neural Networks (퍼지 멤버쉽 함수와 신경망을 이용한 이상 침입 탐지)

  • Cha, Byung-Rae
    • The KIPS Transactions:PartC
    • /
    • v.11C no.5
    • /
    • pp.595-604
    • /
    • 2004
  • By the help of expansion of computer network and rapid growth of Internet, the information infrastructure is now able to provide a wide range of services. Especially open architecture - the inherent nature of Internet - has not only got in the way of offering QoS service, managing networks, but also made the users vulnerable to both the threat of backing and the issue of information leak. Thus, people recognized the importance of both taking active, prompt and real-time action against intrusion threat, and at the same time, analyzing the similar patterns of in-trusion already known. There are now many researches underway on Intrusion Detection System(IDS). The paper carries research on the in-trusion detection system which hired supervised learning algorithm and Fuzzy membership function especially with Neuro-Fuzzy model in order to improve its performance. It modifies tansigmoid transfer function of Neural Networks into fuzzy membership function, so that it can reduce the uncertainty of anomaly intrusion detection. Finally, the fuzzy logic suggested here has been applied to a network-based anomaly intrusion detection system, tested against intrusion data offered by DARPA 2000 Intrusion Data Sets, and proven that it overcomes the shortcomings that Anomaly Intrusion Detection usually has.

A case study on the reduction of Blasting vibration using EDD in tunnel (터널에서 전자뇌관을 이용한 발파진동 저감 기술 사례)

  • Yoon, Ji-Sun;Lee, Jin-Moo;Cho, Young-Gon
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2004.03b
    • /
    • pp.433-441
    • /
    • 2004
  • 국내 발파 현장에서 사용되고 있는 폭약류에 강력한 폭굉력을 충분하게 발휘하기 위해서는 뇌관(Blasting cap, Detonator)의 역할이 중요하다. 그리고 이 뇌관의 정밀성에 따라 발파 효율의 차이가 있게된다. 초기의 도화선 및 공업뇌관에서 시작하여 현재 정밀성 면에서는 MS(Milli Second)뇌관의 경우 20ms또는 25ms의 정밀한 시차로 순차적으로 기폭함으로써 발파효과의 극대화와 소음 및 진동제어에 큰 효과를 이루었으나, 최근 개발된 진자뇌관의 경우 자체 IC회로를 내징하여 $1{\sim}2ms$의 초정밀시차(오차범위 $0.1{\sim}0.2ms$이내)의 구현이 가능해짐에 따라 이를 적절히 조합하여 설계함으로써 각종 제어발파, 파쇄도 향상, 암손상영역 저감 등의 효과에 대해 국외에서 연구가 진행되고 있는 것으로 알려지고 있다. 그러나 우리나라와 같이 도심지 발파 및 터널이나 노천 현장 근거리에 보안물건이 위치해 있어 진동제어가 절실히 필요한 상황에서 진동제어에 효과가 있는 것으로 알려진 전자뇌관에 대한 연구가 이루어지고 있지 않은 상황에서 본 연구는 앞으로 이루어질 전사뇌관에 대한 수많은 연구에 기초자료를 제공하고자 실시하였다. 본 연구에서는 이를 위해 국내에서 최초로 2003년 9월 23일 강원도 양구 지역읜 00터널에 전자뇌관을 이용한 시험발파를 실시하였고, 발파에 의한 진동 등을 조사하여 그 효율성을 검토하였다. 이를 위해 전자뇌관의 특성과 장점을 최대한 살리기 위하여 각공을 발파하는 방식, 즉 1지발에 1공을 발파하는 방식을 채택하고 비전기 뇌관과 전자뇌관으로 설계를 하여 각각의 발파효율을 비교하여 보았다. 그 결과 발파신동의 경우 비전기뇌관을 이용하여 1공씩을 1지발로 발파를 한 경우에는 18${\sim}$56%의 진동저감 효과가 있었고, 번 설계에 의해 진해오딘 발파에 비하여는 최대 70% 이상의 진동저감 효과가 있는 것으로 나타났다.

  • PDF

Chaos QPSK Modulated Beamspace MIMO System Using ESPAR Antenna (ESPAR 안테나를 사용하는 카오스 QPSK 변조 빔 공간 MIMO 시스템)

  • Lee, Jun-Hyun;Bok, Jun-Yeong;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.2
    • /
    • pp.77-85
    • /
    • 2014
  • Recently, utilization of MIMO(Multi-Input Multi-Output) system using array antennas is evaluated significantly according to the extension of high-capacity and high-speed communication services. However, MIMO system has disadvantages such as high-complexity and high-power-consumption, because RF(Radio Frequency) chain is required as antenna number, and several array antenna is used in conventional MIMO system. In order to solve these problems, research about beamspace MIMO system using ESPAR(Electronically Steerable Parasitic Array Radiator) antenna that has single RF chain by using one active antenna and several parasitic elements has been studied actively. Beamspace MIMO system using ESPAR antenna is possible to solve the problems of conventional MIMO system, because this system is composed by single RF chain. In this paper, in order to improve the system security, chaos communication algorithm that has characteristics such as non-periodic, non-predictability, easy implementation and initial condition is applied to QPSK (Quadrature Phase Shift Keying) modulated beamspace MIMO system. We design the chaos QPSK modulated beamspace MIMO system, and evaluate SER performance of this system.

A Study on the Factors Affecting the reliability of User 's Confidence in Korean Internet professional Bank -Focused on Kakao Bank and K Bank- (국내 인터넷 전문 은행이 사용자의 신뢰감 형성에 끼치는 요인에 관한 연구 -카카오뱅크와 케이뱅크를 중심으로-)

  • Lee, Kaha;Kim, Seung-In
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.1
    • /
    • pp.277-282
    • /
    • 2018
  • This study aims to present a direction for securing continuous growth and confidence, centering on two Internet banking companies that started recently. The banking market has been rewriting the history since the emergence of Internet professional banks. In order to improve the credibility and promote the development of the Internet professional banks, I conducted a questionnaire survey and In Depth Interview. As a result of this survey, the overall reliability is still low, and the factors affecting reliability are: 1.Security problem 2.Discomfort of customer service 3.Errors and unnecessary services. This is a start-up business, so the awareness and reliability can be changed soon. Therefore, it is necessary to continue research on this according to the changing user's perception.

A Secure Cluster Formation Scheme in Wireless Sensor Networks (무선 센서 네트워크에서 안전한 클러스터 구성 방안)

  • Wang, Gi-Cheol;Cho, Gi-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.8
    • /
    • pp.84-97
    • /
    • 2012
  • In wireless sensor networks, cluster structure brings on many advantages such as load balancing, energy saving, and distributed key management, and so on. To transform a physical network into the cluster structure, sensor nodes should invoke a cluster formation protocol. During the protocol operation, if some nodes are compromised and they do not conform to the protocol, an inconsistency of membership in a cluster happen. This splits the cluster and consequently increases the number of clusters and decreases the number of members in the cluster. In this paper, we propose a scheme which well copes with such a problem. First, our scheme generates two hop clusters where hop distance between any two nodes is at most two. Besides, our scheme employs verification of two hop distant nodes to prevent the cluster split induced by compromised nodes. Last, our scheme mainly employs broadcast transmissions to reduce energy consumption of nodes. Simulation results have proven that our scheme reduces the number of clusters and more secure and energy-efficient than other scheme.

Low-Cost AES Implementation for Wireless Embedded Systems (무선 내장형 시스템을 위한 제비용 AES의 구현)

  • LEE Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.12
    • /
    • pp.67-74
    • /
    • 2004
  • AES is frequently used as a symmetric cryptography algorithm for the Internet. Wireless embedded systems increasingly use more conventional wired network protocols. Hence, it is important to have low-cost implementations of AES for thor The basic architecture of AES unrolls oかy one full cipher round which uses 20 S-boxes together with the key scheduler and the algorithm repeatedly executes it. To reduce the implementation cost further, the folded architecture which uses only eight S-box units was studied in the recent years. In this paper, we will study a low-cost AES implementation for wireless communication technology based on the folded architecture. We first improve the folded architecture to avoid the sixteen bytes of additional state memory. Then, we implemented a single byte architecture where only one S-box unit is used for data encryption and key scheduling. It takes 352 clocks to finish a complete encryption. We found that the maximum clock frequency of its FPGA implementation reaches about 40 MHz. It can achieve about 13 Mbps which is enough for 3G wireless communication technology.

Object Tracking in HEVC Bitstreams (HEVC 스트림 상에서의 객체 추적 방법)

  • Park, Dongmin;Lee, Dongkyu;Oh, Seoung-Jun
    • Journal of Broadcast Engineering
    • /
    • v.20 no.3
    • /
    • pp.449-463
    • /
    • 2015
  • Video object tracking is important for variety of applications, such as security, video indexing and retrieval, video surveillance, communication, and compression. This paper proposes an object tracking method in HEVC bitstreams. Without pixel reconstruction, motion vector (MV) and size of prediction unit in the bitstream are employed in an Spatio-Temporal Markov Random Fields (ST-MRF) model which represents the spatial and temporal aspects of the object's motion. Coefficient-based object shape adjustment is proposed to solve the over-segmentation and the error propagation problems caused in other methods. In the experimental results, the proposed method provides on average precision of 86.4%, recall of 79.8% and F-measure of 81.1%. The proposed method achieves an F-measure improvement of up to 9% for over-segmented results in the other method even though it provides only average F-measure improvement of 0.2% with respect to the other method. The total processing time is 5.4ms per frame, allowing the algorithm to be applied in real-time applications.

Economic Analysis of The Operational Policy for Data Backup with Information Security Threats (정보보호위협하에서 경제적인 데이터백업 운영 정책 분석)

  • Yang, Won Seok;Kim, Tae-Sung;Lee, Doo Ho
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.10
    • /
    • pp.270-278
    • /
    • 2014
  • The stability and security management of IT data becomes more important because information security threats increases rapidly in Big Data era. The operational policy of the data backup considering information security threats is required because the backup policy is the fundamental method that prevents the damage of security threats. We present an economic approach for a data backup system with information security threats which damage the system. The backup operation consists of the differential backup and the batch backup. We present a stochastic model considering the occurrence of information security threats and their damage. We analyze the stochastic model to derive the performance measures for the cost analysis. Finally we analyze the average cost of the system and give numerical examples.