• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.027 seconds

IoT data trust techniques based on auto-encoder through IoT-linked processing (오토인코더 기반의 IoT 연계 처리를 통한 IoT 데이터 신뢰 기법)

  • Yon, Yong-Ho;Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.351-357
    • /
    • 2021
  • IoT devices, which are used in various ways in distributed environments, are becoming more important in data transmitted and received from IoT devices as fields of use such as medical, environment, transportation, bio, and public places are diversified. In this paper, as a method to ensure the reliability of IoT data, an autoencoder-based IoT-linked processing technique is proposed to classify and process numerous data by various important attributes. The proposed technique uses correlation indices for each IoT data so that IoT data is grouped and processed by blockchain by characteristics for IoT linkage processing based on autoencoder. The proposed technique expands and operates into a blockchain-based n-layer structure applied to the correlation index to ensure the reliability of IoT data. In addition, the proposed technique can not only select IoT data by applying weights to IoT collection data according to the correlation index of IoT data, but also reduce the cost of verifying the integrity of IoT data in real time. The proposed technique maintains the processing cost of IoT data so that IoT data can be expanded to an n-layer structure.

Development of Cyber R&D Platform on Total System Performance Assessment for a Potential HLW Repository ; Application for Development of Scenario through QA Procedures (고준위 방사성폐기물 처분 종합 성능 평가 (TSPA)를 위한 Cyber R&D Platform 개발 ; 시나리오 도출 과정에서의 품질보증 적용 사례)

  • Seo Eun-Jin;Hwang Yong-soo;Kang Chul-Hyung
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2005.06a
    • /
    • pp.311-318
    • /
    • 2005
  • Transparency on the Total System Performance Assessment (TSPA) is the key issue to enhance the public acceptance for a permanent high level radioactive repository. To approve it, all performances on TSPA through Quality Assurance is necessary. The integrated Cyber R&D Platform is developed by KAERI using the T2R3 principles applicable for five major steps in R&D's. The proposed system is implemented in the web-based system so that all participants in TSPA are able to access the system. It is composed of FEAS (FEp to Assessment through Scenario development) showing systematic approach from the FEPs to Assessment methods flow chart, PAID (Performance Assessment Input Databases) showing PA(Performance Assessment) input data set in web based system and QA system receding those data. All information is integrated into Cyber R&D Platform so that every data in the system can be checked whenever necessary. For more user-friendly system, system upgrade included input data & documentation package is under development. Throughout the next phase R&D, Cyber R&D Platform will be connected with the assessment tool for TSPA so that it will be expected to search the whole information in one unified system.

  • PDF

Channel Innovation through Online Transaction processing System in Floral Wholesale Distribution: FLOMARKET Case (화훼도매 온라인 거래처리 시스템을 통한 유통경로 개선방안 연구: (주)플로마켓 사례)

  • Lee, Seungchang;Ahn, Sunghyuck
    • Journal of Distribution Science
    • /
    • v.8 no.1
    • /
    • pp.21-33
    • /
    • 2010
  • The ICT(information & communication technology) led to a dramatic change of floral distribution service, a phase of competition between wholesales and retail stores, and distribution channels in floral industry. It was expected that a role of the intermediaries in this industry would have reduced due to the improvement of transaction process by ICT. However, the ICT made to overcome a regional limit of the floral retail distribution service leading to an increase in sales and enlargement of the stores. And even it made possible to bring out another type of intermediaries such as private associations. This case study focuses on what kinds of efforts the floral wholesale distributors have made to enable a distribution process more smoothly between the wholesale distributors and retail stores through the information system, and what the failure factors in adopting the information system have been. This paper is also to examine how the wholesale distributors have changed themselves to gain dominant positions in distribution channels. As a result of the study, it was found that the intermediaries mostly failed in successfully achieving the distribution channel innovation through the information system because of several main reasons. FLOMARKET Inc. tried to innovate a distribution channel to obtain high quality goods through consolidating a wholesale distribution market in that segregated both floral joint market from free markets. after implementing the information system with consideration of the failure factors, FLOMARKET Inc. was able to minimize goods in stock and make a major purchase of various goods. In addition, it made a possible pre-ordering process and an exact calculation of purchasing goods so they could provide their products with market price in real time, which helped for the company to gain credits from their customers. Also, FLOMARKET Inc. established the information system which well suited to its business stage in order to deal with a rapidly changing distribution environment. It's so obvious that the transaction processing system of FLOMARKET Inc. definitely helped to share information among traders more seamlessly and smoothly in realtime, standardize goods, and make a transaction process clearer. Besides, the transaction information helped the wholesale distributors and retail stores to make more strategic decisions in their business because through the system they enabled to gather the marketing intelligence information more easily and convenient. If we understand that the floral distribution market is characterized by the low IT- based industry, it's worth to examine a case study proving that the information system actually increases the productivity of the transaction process in the floral industry.

  • PDF

Effects of Information Retrieval and Coffee Shop's Attributes on the Means of Repositioning (정보검색과 커피전문점 선택속성이 재방문 의도에 미치는 영향)

  • Baek, Young Ju;Lee, Min Jung
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.9
    • /
    • pp.549-557
    • /
    • 2020
  • Recently, the number of coffee shops has continued to increase, and information searches have been increasing for consumers who want to visit coffee shops. We wanted to find out the impact on the intention of revisiting a coffee shop by adding information search factors to the existing coffee shop's selection properties and search for the actual selection properties, and summarize the results as follows. The analysis of this study was conducted in two ways, before and after visiting a coffee shop through information search. First, the four factors and optional attributes that are important in information retrieval were the reliability of information (the number of reviews and views by coffee shops, recent postings), physical environment (the proximity of stores, the atmosphere, size, presence of side menus), visuality of information (physical environment, background, design, easy composition), merchantability (the taste of coffee, convenience of parking). In addition, the selection properties for satisfaction after visiting coffee shops through information search were derived from five general characteristics of coffee shops, menu, information consistency, taste of coffee, and convenience of parking, and among them, the consistency of information, taste of coffee, and general characteristics of coffee were found to affect the intention of revisiting again.

Information Hiding Technique in Smart Phone for the Implementation of GIS Web-Map Service (GIS 웹 맵 서비스 구현을 위한 스마트 폰에서의 정보은닉 기법)

  • Kim, Jin-Ho;Seo, Yong-Su;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.710-721
    • /
    • 2010
  • Recently, for the advancement of embedded technology about mobile device, a new kind of service, mash-up is appeared. It is service or application combining multimedia content making tool or device and web-GIS(geographic information system) service in the mobile environment. This service can be ease to use for casual user and can apply in various ways. So, It is served in web 2.0 environment actively. But, in the mashup service, because generated multimedia contents linked with web map are new type of multimedia contents which include user's migration routes in the space such as GPS coordinates. Thus, there are no protection ways for intellectual property created by GIS web-map service users and user's privacy. In this paper, we proposed a location and user information hiding scheme for GIS web-map service. This scheme embeds location and user information into a picture that is taken by camera module on the mobile phone. It is not only protecting way for user's privacy but is also tracing way against illegal photographer who is peeping person through hidden camera. And than, we also realized proposed scheme on the mobile smart phone. For minimizing margin of error about location coordinate value against contents manipulating attacks, GPS information is embedded into chrominance signal of contents considering weight of each digit about binary type of GPS coordinate value. And for tracing illegal photographer, user information such as serial number of mobile phone, phone number and photographing date is embedded into frequency spectrum of contents luminance signal. In the experimental results, we confirmed that the error of extracted information against various image processing attacks is within reliable tolerance. And after file format translation attack, we extracted embedded information from the attacked contents without no damage. Using similarity between extracted one and original templete, we also extracted whole information from damaged chrominance signal of contents by various image processing attacks.

A Study on the Features of the Classified Customers through Pre-evaluation on the Recommender System (추천시스템에서 사전평가에 의해 선별된 고객의 특성에 관한 연구)

  • Lim, Jae-Hwa;Lee, Seok-Jun
    • Korean Business Review
    • /
    • v.20 no.2
    • /
    • pp.105-118
    • /
    • 2007
  • Recommender system is the tool for E-commerce company based on the internet for increasing their sales ratio in the market. Recommender system suggests the list of items which night be wanted by customers. This list generated by the result of customers' preference prediction through the prediction algorithm automatically. Recommender system will be able to offer not only the important information for marketing strategy but also reduce the cost of customers' information retrieval trough the analysis of customers' purchase patterns and features. But there are several problems like as the extension of the users and items scales and if the recommendation to customers generated by unreliable recommender system makes the customer royalty to the system to weaken. In this study, we propose the criterion for pre-evaluation on the prediction performance only using the preference ratings on the items which are rated by customers before prediction process and we study the features of customers who are classified through this classification criterion.

  • PDF

The Design of IAPP Server for Secure Handoff of wireless LAN Terminal (무선랜 단말의 안전한 핸드오프를 위한 Diameter IAPP서버의 설계)

  • 함영환;정병호;정교일;서창호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.12C
    • /
    • pp.1258-1267
    • /
    • 2003
  • As the need for stable and high speed wireless Internet service Brows, the wireless LAN service provider hurries to preempt wireless LAN service market. IAPP(InterAccess Point protocol) is defined to be able to provide a secure handoff mechanism of wireless LAN terminal information between AP(Access Point)s, and the related IEEE standard is IEEE 802.11f. For the secure handoff of wireless LAN terminal, it is necessary to transfer terminal's authentication & accounting information securely from old AP to new AP IEEE 802.11f recommends RADIUS server as IAPP server which authenticates AP and provides information for secure channel between APs. This paper proposes IAPP server using Diameter protocol to overcome the limit of RADIUS sewer, and describes about the interaction between server components and integration method with the current IAPP client system.

Detection of Forged Regions and Filtering Regions of Digital Images Using the Characteristics of Re-interpolation (재보간의 특성을 이용한 디지털 이미지의 합성 영역 및 필터링 영역 검출)

  • Hwang, Min-Gu;Har, Dong-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.179-194
    • /
    • 2012
  • Digital image forgery is becoming a topic of great interest with regard to honesty in imaging. We can often see forged digital images in a variety of places, such as the internet, and magazines, and in images used in political ads, etc. These can reduce the reliability and factual basis of the information contained in image. Therefore, objectivity is needed to determine if the image is forged so as to prevent confusion in the viewing public. Most digital forgeries consist of image resizing, rotating including the following interpolations. To find evidence of interpolation in forged images, this paper proposes a new method for detecting digital image forgery using general interpolation factors analyzed through re-interpolation algorithm of the forged images in order to determine the differences in the patterns. Through the re-interpolation algorithm we could detect the forged region and filtering region used image retouching included to interpolation.

A Study on the Development of One-way Bypass TAP Device for Strengthening the Security of Flood and Environment Surveillance Network (홍수 및 환경 감시망의 보안성 강화를 위한 단방향 Bypass TAP 장치 개발에 관한 연구)

  • Lee, Jin-Young;Kong, Heon-Tag
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.473-481
    • /
    • 2015
  • The flood and environment surveillance network on riverside is a network requiring a way to efficiently manage the information from all kinds of sensors, along with an optical communication device that can deliver high-quality video information at high speed. Since on-site prompt recovery is very important especially for communication problems that occurred due to cut-off or aged network, various researches have been carried out on this. However, because the security against outside hacking or outside intrusion with illegal purposes is very important for environment surveillance network, such as the national backbone network, an efficient network maintenance and repair should be enabled while satisfying security and reliability at the same time. A characteristic of requirement is that when security is improved, the efficiency of maintenance and repair drops as they are conflicting to each other. Therefore, this research proposed a system in order to satisfy the conflicting requirement and improve security, by developing a one-way Bypass TAP and an android-based smartphone app that can enable efficient network maintenance and repair.

P2P DRM Algorithm for the protection of contents copyright (콘텐츠 저작권 보호를 위한 P2P DRM 알고리즘)

  • Ha Tae-Jin;Kim Jong-Woo;Han Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1783-1789
    • /
    • 2004
  • It is evaluated that there is infinit capability of creating new e business using P2P program. but the research for the method to protect the copyright of digital contents is urgent even for development of the p2p service because the problem of copyright protection for digital contents is not solved. Though this article, it can be induced that reliable contents sharing use to a flow fund by secure settlement architecture, user authentication and contents encryption and then it as the problem of copyright fee is solved, it is able to discontinue which trouble with a creation work for copyright fee and protection it's once again as growth of p2p market, p2p protocal is will be grow into a important protocal of advanced network. In this article, When users send digital contants to each other in internet, we proposed the P2P DRM algorism to offer a security function which using the technology of copyright management to use a AES Algorithm based on PKI.