• 제목/요약/키워드: 인터넷 대중화

Search Result 323, Processing Time 0.025 seconds

A Study on Food Truck business model utilizing NFC (NFC를 활용한 Food Truck 비즈니스 모델에 관한 연구)

  • Yoon, Youngdoo;Choi, Eunyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.135-137
    • /
    • 2014
  • The expansion of the transportation card, and the popularity of smart phones has been increasing social concern about the NFC technology. Has been focused on the use of e-commerce, most of the NFC, fulfilling the security problems or technical topic for this, but the reality is that the current debate on the new value added contents industry and a nonexistent connection. Leverage NFC for efficient order management system in order to build lunch or dinner by being pushed to ease restrictions on remodeling and renovation projects Food Truck vehicle through a small business support programs in the current government, but increasing interest in the Food Truck I study a model of ordering system for food truch 재소 s-guide system. A lot of the effectiveness of management as appropriate to the use of NFC for small business that operates as a server system is highly Food Truck tendencies tied to one router and server on the intranet without the need of internet connection system. I believe in this study S-Guide system contributes for business success for food truck of small business.

  • PDF

The technical elements of the wearable device (웨어러블 디바이스의 기술 요소)

  • Shim, Hyun-bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.259-263
    • /
    • 2014
  • In the ICT field, one among the remarkable issue of in 2014 is the "Wear computer", that is, the opening of "Wearable Device" age. The Samsung galaxy gear and products like Google glass and Apple watch are done as the wearable device. According to the definition of MIT Media Lab, the wearable device adheres to the body and is included till the application which names all things doing the computing action and can perform the partial computing function. And the wearable device is one brain. If the wearable device is popularized, it will be changed many things. First of all, 2 hands become free. My body is due to be connected to 24 hours Internet. It is not level that it adheres the Smart phone or device to the body and the brain role in which the device is connected outside directly, the human body is done. In this paper, the related companies analyze the technical elements of this wearable device especially.

  • PDF

Prototype Design and Security Association Mechanism for Policy-based on Security Management Model (정책기반 보안관리 모델을 위한 프로토타입과 정책 협상 메커니즘)

  • 황윤철;현정식;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.131-138
    • /
    • 2003
  • With the Internet winning a huge popularity, there rise urgent problems which are related to Network Security Managements such as Protecting Network and Communication from un-authorized user. Accordingly, Using Security equipments have been common lately such as Intrusion Detection Systems, Firewalls and VPNs. Those systems. however, operate in individual system which are independent to me another. Their usage are so limited according to their vendors that they can not provide a corporate Security Solution. In this paper, we present a Hierarchical Security Management Model which can be applicable to a Network Security Policies consistently. We also propose a Policy Negotiation Mechanism and a Prototype which help us to manage Security Policies and Negotiations easier. The results of this research also can be one of the useful guides to developing a Security Policy Server or Security Techniques which can be useful in different environments. This study also shows that it is also possible to improve a Security Characteristics as a whole network and also to support Policy Associations among hosts using our mechanisms.

A Method for SQL Injection Attack Detection using the Removal of SQL Query Attribute Values (SQL 질의 애트리뷰트 값 제거 방법을 이용한 효과적인 SQL Injection 공격 탐지 방법 연구)

  • Lee, In-Yong;Cho, Jae-Ik;Cho, Kyu-Hyung;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.135-148
    • /
    • 2008
  • The expansion of the internet has made web applications become a part of everyday lift. As a result the number of incidents which exploit web application vulnerabilities are increasing. A large percentage of these incidents are SQL Injection attacks which are a serious security threat to databases with potentially sensitive information. Therefore, much research has been done to detect and prevent these attacks and it resulted in a decline of SQL Injection attacks. However, there are still methods to bypass them and these methods are too complex to implement in real web applications. This paper proposes a simple and effective SQL Query attribute value removal method which uses Static and Dynamic Analysis and evaluates the efficiency through various experiments.

Approach to Improving the Performance of Network Intrusion Detection by Initializing and Updating the Weights of Deep Learning (딥러닝의 가중치 초기화와 갱신에 의한 네트워크 침입탐지의 성능 개선에 대한 접근)

  • Park, Seongchul;Kim, Juntae
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.4
    • /
    • pp.73-84
    • /
    • 2020
  • As the Internet began to become popular, there have been hacking and attacks on networks including systems, and as the techniques evolved day by day, it put risks and burdens on companies and society. In order to alleviate that risk and burden, it is necessary to detect hacking and attacks early and respond appropriately. Prior to that, it is necessary to increase the reliability in detecting network intrusion. This study was conducted on applying weight initialization and weight optimization to the KDD'99 dataset to improve the accuracy of detecting network intrusion. As for the weight initialization, it was found through experiments that the initialization method related to the weight learning structure, like Xavier and He method, affects the accuracy. In addition, the weight optimization was confirmed through the experiment of the network intrusion detection dataset that the Adam algorithm, which combines the advantages of the Momentum reflecting the previous change and RMSProp, which allows the current weight to be reflected in the learning rate, stands out in terms of accuracy.

Performance Analysis for Privacy-preserving Data Collection Protocols (개인정보보호를 위한 데이터 수집 프로토콜의 성능 분석)

  • Lee, Jongdeog;Jeong, Myoungin;Yoo, Jincheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1904-1913
    • /
    • 2021
  • With the proliferation of smart phones and the development of IoT technology, it has become possible to collect personal data for public purposes. However, users are afraid of voluntarily providing their private data due to privacy issues. To remedy this problem, mainly three techniques have been studied: data disturbance, traditional encryption, and homomorphic encryption. In this work, we perform simulations to compare them in terms of accuracy, message length, and computation delay. Experiment results show that the data disturbance method is fast and inaccurate while the traditional encryption method is accurate and slow. Similar to traditional encryption algorithms, the homomorphic encryption algorithm is relatively effective in privacy preserving because it allows computing encrypted data without decryption, but it requires high computation costs as well. However, its main cost, arithmetic operations, can be processed in parallel. Also, data analysis using the homomorphic encryption needs to do decryption only once at any number of data.

A Study on the Impact of Smart Tourism Application Service and Design Concept on the Intention to Continue Using (스마트 관광 애플리케이션 서비스의 효과와 지속 사용 의도를 위한 디자인 컨셉에 대한 연구)

  • Wang, Tuo;Dong, Hao;Zhang, Xindan;Bae, Ki-Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.279-290
    • /
    • 2022
  • The popularization of mobile Internet applications has accelerated the development of smart tourism industry. Based on TAM and VAM theories, this paper studies the influencing factors of tourism App users' willingness to continue using through complex network and data analysis methods. Through the research, it is found that the improvement of service level and design concept of smart tourism application can accelerate the aggregation of complex networks and improve user engagement. At the same time, reasonable price service experience value, convenience service experience value, interactive service experience value, emotional design perception, ease of use design perception, entertainment design perception and other factors can have a direct impact on users' intention to continue to use, and there is a significant correlation. The smart tourism App's convenience and price advantage are the root of its competitiveness. The design concept can affect users' emotional experience and perceptual experience, and help smart tourism App improve users' satisfaction.

Fake SNS Account Identification Technique Using Statistical and Image Data (통계 및 이미지 데이터를 활용한 가짜 SNS 계정 식별 기술)

  • Yoo, Seungyeon;Shin, Yeongseo;Bang, Chaewoon;Chun, Chanjun
    • Smart Media Journal
    • /
    • v.11 no.1
    • /
    • pp.58-66
    • /
    • 2022
  • As Internet technology develops, SNS users are increasing. As SNS becomes popular, SNS-type crimes using the influence and anonymity of social networks are increasing day by day. In this paper, we propose a fake account classification method that applies machine learning and deep learning to statistical and image data for fake accounts classification. SNS account data used for training was collected by itself, and the collected data is based on statistical data and image data. In the case of statistical data, machine learning and multi-layer perceptron were employed to train. Furthermore in the case of image data, a convolutional neural network (CNN) was utilized. Accordingly, it was confirmed that the overall performance of account classification was significantly meaningful.

Effective Speaker Recognition Technology Using Noise (잡음을 활용한 효과적인 화자 인식 기술)

  • Ko, Suwan;Kang, Minji;Bang, Sehee;Jung, Wontae;Lee, Kyungroul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.259-262
    • /
    • 2022
  • 정보화 시대 스마트폰이 대중화되고 실시간 인터넷 사용이 가능해짐에 따라, 본인을 식별하기 위한 사용자 인증이 필수적으로 요구된다. 대표적인 사용자 인증 기술로는 아이디와 비밀번호를 이용한 비밀번호 인증이 있지만, 키보드로부터 입력받는 이러한 인증 정보는 시각 장애인이나 손 사용이 불편한 사람, 고령층과 같은 사람들이 많은 서비스로부터 요구되는 아이디와 비밀번호를 기억하고 입력하기에는 불편함이 따를 뿐만 아니라, 키로거와 같은 공격에 노출되는 문제점이 존재한다. 이러한 문제점을 해결하기 위하여, 자신의 신체의 특징을 활용하는 생체 인증이 대두되고 있으며, 그중 목소리로 사용자를 인증한다면, 효과적으로 비밀번호 인증의 한계점을 극복할 수 있다. 이러한 화자 인식 기술은 KT의 기가 지니와 같은 음성 인식 기술에서 활용되고 있지만, 목소리는 위조 및 변조가 비교적 쉽기에 지문이나 홍채 등을 활용하는 인증 방식보다 정확도가 낮고 음성 인식 오류 또한 높다는 한계점이 존재한다. 상기 목소리를 활용한 사용자 인증 기술인 화자 인식 기술을 활용하기 위하여, 사용자 목소리를 학습시켰으며, 목소리의 주파수를 추출하는 MFCC 알고리즘을 이용해 테스트 목소리와 정확도를 측정하였다. 그리고 악의적인 공격자가 사용자 목소리를 흉내 내는 경우나 사용자 목소리를 마이크로 녹음하는 등의 방법으로 획득하였을 경우에는 높은 확률로 인증의 우회가 가능한 것을 검증하였다. 이에 따라, 더욱 효과적으로 화자 인식의 정확도를 향상시키기 위하여, 본 논문에서는 목소리에 잡음을 섞는 방법으로 화자를 인식하는 방안을 제안한다. 제안하는 방안은 잡음이 정확도에 매우 민감하게 반영되기 때문에, 기존의 인증 우회 방법을 무력화하고, 더욱 효과적으로 목소리를 활용한 화자 인식 기술을 제공할 것으로 사료된다.

  • PDF

Study of the user-oriented GUI design to build the database of Korean traditional materials on internet (인터넷에서의 한국 전통 소재 데이터베이스 구축을 위한 사용자 중심의 그래픽 유저 인터페이스 디자인 연구)

  • 이현주;박영순;김영인;김서경;방경란;이정현
    • Archives of design research
    • /
    • v.13 no.4
    • /
    • pp.125-135
    • /
    • 2000
  • As computers have became popular and multimedia and internet are frequently used, the volume and exchange of information have explosively increased. Therefore, more organized information system is needed for a more efficient use of information. For this reason, the importance of information design and interface design is highly recognized. This thesis is to present the user-oriented interface design prototype based on the environmental analysis of the user and information design. For this purpose, the theoretical study of information design and the principle and elements of GUI (Graphic User Interface) design is preceded. Information design is to subdivide and organize information according to its characteristic, and to systemize information structure considering the interrelationship of information. GUI design, that is interface design based on graphics, should be made in consideration of GUI elements and principle for the user's easy access of information. As it is said, much information needs to be structurized systematically and also visualized as the interface design esthetically as well as functionally. In conclusion, this study presents the effectual user-oriented interface design prototype by researching many theories of information design and GUI design and applying such theories to GUI design.

  • PDF