• Title/Summary/Keyword: 정보취약계층서비스

Search Result 133, Processing Time 0.034 seconds

Design and Implementation of Bus notification using IoT and location information (IoT 및 위치 정보를 활용한 버스 알리미 설계 및 구현)

  • Lee, Yeeun;Kim, Eunyoung;Yun, Hyejin;Kim, Jiyoun;Kwon, Koojoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.292-295
    • /
    • 2020
  • In the modern society, people can easily reach destination by using the rapidly developed public transportation services. Recently, location information is provided through the network, but this is useless to the weak people on transportation like the handicapped. This paper proposes a bus alert terminal system equipped with the arrival information of public buses based on location information and distance measurement sensor. By using this system, we look forward to providing more convenient and accessible services for the weak people on transportation.

A Study on the Analysis and Expansion Plan of Public Library Services in the COVID-19 Pandemic (코로나19에 대응하는 공공도서관 서비스 분석 및 확대방안 연구)

  • Seon-Kyung Oh
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.3
    • /
    • pp.119-141
    • /
    • 2023
  • The COVID-19 pandemic has significantly changed the landscape of knowledge and information services that public libraries around the world have been providing since modern times. In particular, as social distancing has become routine, the contraction of cultural activities and the shift to online platforms have negatively impacted library visitation and use services, greatly reducing borrowing and reading, use of spaces and facilities, interlibrary loan services, program operations, and outreach services. Therefore, this study investigated and analyzed the current status of services provided by public libraries in Korea and abroad in response to COVID-19, and proposed practical ways to improve and expand services in response to COVID-19 based on the results of a survey of librarians' perceptions. Specifically, these include improving the online reservation system for reading and borrowing services and developing and providing various outreach services, acquiring and expanding electronic resources, expanding online program services (reading, culture, lifelong learning, etc.), strengthening library services for vulnerable populations, providing information portal services related to new infectious diseases, strengthening facilities and space provision services, preparing infectious disease response guidelines, and providing education and training to strengthen librarians' capabilities.

A Study on Various Services for Elderly Welfare (노인 복지를 위한 다양한 서비스에 관한 연구)

  • Ko, Jae-Ik;Kim, Youn-Sang;Kim, Cheong-Hwa;Seo, Seong-Hoon;Choi, Hye-Ji
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.542-545
    • /
    • 2017
  • 사회는 갈수록 첨단기기로 집약되는데 비해 노인계층의 첨단기기 접근성은 그의 복잡성으로 인해 매우 취약하다. 고령인구의 사회적 활동에 기본이 되는 이동 편의성에서 이러한 복잡성을 해소하고 안전을 제공하기위한 서비스를 고려한다.

A Proposal Object Security Method and Management System by Policy Based for Interconnect Security (워게임 연동보안(連動保安)을 위한 정책기반(政策基盤)의 객체 보안(保安)화 방법과 관리(管理)시스템 제안)

  • Yu, Chang-Won;Lee, Hee-Jo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.739-742
    • /
    • 2010
  • 본 논문은 국방 네트워크 환경측면에서 실 전략정보에 대한 접근/활용 범위가 확대되고, 정보의 신뢰성/가용성에 대한 중요도가 강조되고 있는 워게임 연동객체의 보안화 방안에 대해 기술한다. 연동객체는 HLA/RTI에서 시뮬레이션을 위한 페더레이터로 정의된다. RTI는 페더레이터간 정보교환, 접속 사양에 정의된 다양한 서비스를 제공하는 미들웨어이다. 정책을 기반으로 네트워크상에서 자원들에 대한 관리와 접근, 사용을 위한 다양한 기능과 안전하고 편리한 보안기능들이 널리 활용되고 있다. 본 논문에서는 RTI Security 인터페이스와 정책을 기반으로 한 자원접근 방법을 사용해서 페더레이터의 취약한 정보보호 기능을 강화하였다. RTI의 페더레이트 실 정보에 다계층 보안 수준을 적용하고 보안등급별로 필터링하여 연동객체 스스로가 정보를 보호(Self-protection)할 수 있도록 하는 환경을 구성하고 관리할 수 있는 시스템을 제안한다.

FPGA-based Hardware Implementation of Cryptography Algorithm ARIA (암호화 알고리즘 ARIA의 FPGA기반 하드웨어 구현)

  • Kim Young-Soo;Cho Sun-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1229-1236
    • /
    • 2006
  • Group oriented multicast service is a prerequisite for the current application system for remote lecture and customer service. IP multicast is used to be generally accepted as an internet standard. IP multicast which is designed to support network based replication model can efficiently use host and network resource, however it has some weak points that it has to support IP multicast in the internet by adding multicast-capable internet infrastructure such as router and is vulnerable to security by using public IP address for group identifier. Therefore we propose the trigger based application level multicast model that can enhance both scalability and security by separating the functions, which send and receive message to solve these problems. Our suggested model is expected to ensure the promotion of quality of service and reliability.

A Study on the Localized Key Management Using AAA in Mobile IPv6 (Mobile IPv6 상에서 AAA 기반의 지역화된 키 관리 기법에 관한 연구)

  • Kim Mi-Young;Mun Young-Song
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.19-25
    • /
    • 2003
  • Mobile IPv6 services exposes its vulnerability when a mobile node is roaming across the subnets which belongs to the different domains. The AAA Infrastructure Is strongly recommended when the ISPs need to authenticate the mobile user come from the different domains. In addition to the basic requirements for AAA service, the authentication latency and AAA message overhead should be minimized for contiguity of the service. This paper considers the roaming service with AAA infra structure in Mobile IPv6 and proposes the key distribution method to authenticate the mobile node with secure manner by reducing and optimizing the exchanged messages for AAA entities.

  • PDF

Simulation Analysis of Network Load of Application Level Security Protocol for Smart grid (시뮬레이션을 이용한 스마트 그리드 통신망 상의 응용 계층 보안 프로토콜의 부하 분석)

  • Lee, Kwang-Sik;Han, Seung-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.1
    • /
    • pp.17-24
    • /
    • 2015
  • Smart grid is a modernized electrical grid that uses information and communication technologies to gather and act on information, such as information about the behaviors of suppliers and consumers, in an automated fashion to improve the efficiency, reliability, economics, and sustainability of the production and distribution of electricity. However, with the advent of cyber crime, there are also concerns on the security of the infrastructure, primarily that involving communications technologies. In this work, we make an in-depth investigation on the issue of security services and network loads on Smart grid. Through simulation, we analyze the relations between security services and network loads. The experimental results of this study will contribute toward designing an advanced Smart grid system that offers better quality of services. Also, the approach proposed in this study can be utilized to derive new and valuable insights in security aspects.

Design of the Security Evaluation System for Internet Secure Connectivity Assurance Platform (인터넷 패킷 보호 보증 플랫폼에서의 보안성 평가 시스템 설계)

  • 김상춘;한근희
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.2
    • /
    • pp.207-216
    • /
    • 2004
  • IPsec protocol has been developed to provide security services to Internet. Recently IPsec is implemented on the various operating systems Hence, it is very important to evaluate the stability of the Ipsec protocol as well as other protocols that provide security services. However, there has been little effort to develop the tools that require to evaluate the stability of IPsec protocols. Therefore, in this paper, we develope the security requirements and suggest a security evaluation system for the Internet packet protection protocols that provide security services at the If level that can be used to check if the security protocols Provide the claimed services correctly This system can be used as debugging tool for developing IPsec based security system.

Interactive Voice Recognition Kiosk Using AI (AI 를 활용한 대화형 음성인식 키오스크)

  • Ji-Hye Han;Sang-Hyun Kim;Su-Min Kim;Hye-Won Lee;Gil-Hwan Lim;Gyeong-Yong Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.953-954
    • /
    • 2023
  • 고령 사회로 접어들고 디지털 문맹이 대두되면서 기계 조작에 미숙한 정보취약계층이나 고령층들이 느끼는 불편함을 개선하고자 본 연구는 기존의 터치형 키오스크와는 차별된 음성/얼굴인식 기술을 활용한 키오스크 개발을 제안하며, 모든 연령층을 고려한 AI 기술의 활용으로 맞춤형 주문 서비스를 제공하여 고객 만족도를 높이고, 보다 쉽고 빠르게 주문할 수 있도록 한다.

Optimal thresholds of algorithm and expansion of Application-layer attack detection block ALAB in ALADDIN (ALADDIN의 어플리케이션 계층 공격 탐지 블록 ALAB 알고리즘의 최적 임계값 도출 및 알고리즘 확장)

  • Yoo, Seung-Yeop;Park, Dong-Gue;Oh, Jin-Tae;Jeon, In-Ho
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.127-134
    • /
    • 2011
  • Malicious botnet has been used for more malicious activities, such as DDoS attacks, sending spam messages, steal personal information, etc. To prevent this, many studies have been preceded. But malicious botnets have evolved and evaded detection systems. In particular, HTTP GET Request attack that exploits the vulnerability of the application layer is used. ALAB of ALADDIN proposed by ETRI is DDoS attack detection system that HTTP GET, Incomplete GET request flooding attack detection algorithm is applied. In this paper, we extend Incomplete GET detection algorithm of ALAB and derive the optimal configuration parameters to verify the validity of the algorithm ALAB by the study of the normal and attack packets.