• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.022 seconds

Development of Convergence Smart Home Platform based on Image Processing and Sensor Network in IoT Environment (IoT환경에서의 센서 네트워크와 영상처리 기반의 융합 스마트 홈 플랫폼 개발)

  • Ahn, Ye-Chan;Lee, Jeong-Pil;Lee, Jae-Wook;Song, Jun-Kwun;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.3
    • /
    • pp.37-41
    • /
    • 2016
  • In this thesis, we sought to build a home and business environment based on the rapid prototyping technology and network technologies that enabled rapid access to high-speed technologies and technologies. Using the analytic algorithm for image processing techniques, using the analytic algorithm for analyzing and tracking objects in the OpenCV library, trace objects and track objects and control various sensors. It also wants to implement a platform enabling various sensors to collect and record various services by controlling and connecting various sensors through the master Single board and the slave single.

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

A Study of the Effect of Leisure Time Activities on Depression among Elderly (여가활동이 노인의 우울경험에 미치는 영향에 대한 연구)

  • Cho, Insook
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.269-282
    • /
    • 2020
  • Using the Korean longitudinal study of ageing(KLoSA), this study examines the effect of the participation in physical exercises and in social networking on the experience of depressive symptoms among elderly. This study differs from previous studies in two ways. First, this study avoids omitted variable bias by using an extensive set of control variables that are associated with the experience of depressive symptoms. Second, this study explores the composite effect of two different leisure time activities. This study provides empirical evidence that the participation in physical activities and in social networking reduces the probability of experiencing depressive symptoms. This study provides important insights on the future research on the mechanism how leisure time activities influence physical and mental health of elderly.

Study on the Physical vulnerability factors of network and the Countermeasure technology (네트워크의 물리적 취약요인과 대응기술에 관한 연구)

  • Jeon, Jeong Hoon;Ahn, Chang Hoon;Kim, Sang Choon
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.139-145
    • /
    • 2016
  • Recently, The attack on the USB and network are increasing in many domestic infrastructure. These attacks are the most independent of insider intention, caused by the Anthropogenic Manipulation. These attacks are Anthropogenic Response Measures for Physical Security. and Representative Technology has CCTV, Access Control System, Sensor Technology. However, Physical Security, it is represented by several Product family according to the Market, has become an obstacle but rather a variety of Physical Security Technology Development and Application. As the Anthropogenic Attacks have occur continually in the network, it need to the proper Physical Response Techniques in this situation. Therefore, In this paper, we will find out about the awareness and demand trends of Physical Security. And The Physical Vulnerable Factors of Network. Thereby this is expected to be utilized as a basis for the domestic Physical Security Technology development and deployment Road-map in a future.

The Analysis of Crypto Communication Relay Effect in the Security Framework Technique of Network Centric Warfare Environment (NCW환경의 보안 프레임워크 기술에서 암호통신 중계영향 분석)

  • Hong, Jin-Keun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.788-794
    • /
    • 2007
  • The policy of US DoD is moving towards implementation of Network Centric Warfare(NCW) concepts. NCW is commonly described as the integration and synchronization of four key interdependent elements such as command and control, sensor system, engagement systems and the network. Therefore the military policy of Korea military is needed to access and examine the policy of NCW communication environment and crypto communication, which is able to apply it. In this case study, We are reviewed the security framework of the concept of network centric warfare in the centering around the US. It is introduced the core technology in the network centric warfare, and it is reviewed the security framework such as, the requirements of security, the characteristics security of global information grid, joint tactical radion system, net centric enterprise services, transformational communication satellite, in the basis of core technology, and analysis the effect of crypto communication relay between command node and surbornate node in NCW environment. This report support the assistance, which is considered the elements of surrounding effects in the varied crypto communication research area of NCW.

  • PDF

The Impact of Entrepreneurs' Cognitive Biases on Business Opportunity Evaluation Depending on Social Networks (기업가의 인지편향이 사회적 네트워크에 따라 사업 기회 평가에 미치는 영향)

  • Jang, Hyo Shik;Yang, Dong Woo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.5
    • /
    • pp.185-196
    • /
    • 2023
  • This paper investigates the effects of entrepreneurs' cognitive biases on business opportunity evaluation, given their strong entrepreneurial spirit, which is characterized by innovation, proactivity, and risk-taking. When making decisions related to business activities, entrepreneurs typically make rational judgments based on their knowledge, experience, and the advice of external experts. However, in situations of extreme stress or when quick decisions are required, they often rely on heuristics based on their cognitive biases. In particular, we often see cases where entrepreneurs fail because they make decisions based on heuristics in the process of evaluating and selecting new business opportunities that are planned to guarantee the growth and sustainability of their companies. This study was conducted in response to the need for research to clarify the effects of entrepreneurs' cognitive biases on new business opportunity evaluation, given that the cognitive biases of entrepreneurs, which are formed by repeated successful experiences, can sometimes lead to business failure. Although there have been many studies on the effects of cognitive biases on entrepreneurship and opportunity evaluation among university students and general people who aspire to start a business, there have been few studies that have clarified the relationship between cognitive biases and social networks among entrepreneurs. In contrast to previous studies, this study conducted empirical surveys of entrepreneurs only, and also conducted research on the relationship with social networks. For the study, a survey was conducted using a parallel survey method using online mobile surveys and self-report questionnaires from 150 entrepreneurs of small and medium-sized enterprises. The results of the study showed that 'overconfidence' and 'illusion of control', among the independent variables of entrepreneurs' cognitive biases, had a statistically significant positive(+) effect on business opportunity evaluation. In addition, it was confirmed that the moderating variable, social network, moderates the effect of overconfidence on business opportunity evaluation. This study showed that entrepreneurs' cognitive biases play a role in the process of evaluating and selecting new business opportunities, and that social networks play a role in moderating the structural relationship between entrepreneurs' cognitive biases and business opportunity evaluation. This study is expected to be of great help not only to entrepreneurs, but also to entrepreneur education and policy making, by showing how entrepreneurs can use cognitive biases in a positive way and the influence of social networks.

  • PDF

A Study on the SCM Capability Modeling and Process Improvement in Small Venture Firms (중소·벤처기업의 SCM역량 모델링과 프로세스 개선 방안에 관한 연구)

  • Lee, Seolbin;Park, Jugyeong
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.2
    • /
    • pp.115-123
    • /
    • 2018
  • This study is empirically intended to put forward the modeling and process improvement measures for the SCM capability in small venture firms. The findings are summarized as follows. There were strategic alliance, technological development and centralization in the modeling of strategic planning for supply chain, not the least of which is strategic alliance, followed by centralization and technological development. There were routing scheduling, network integration and third party logistics outsourcing in decision making, not the least of which was network integration. There were customer service management, productivity management and quality management in management control, not the least of which was quality management. And there were order management choice, pricing demand, shipment delivery and customer management in transaction support system, not the least of which was order management choice. As for the above-mentioned findings, to maximize the SCM capability and operate the optimized process in small venture firms, the existing strategic alliances can optimize the quality management and stabilize the transaction support system through the network sharing and integration from the perspective of relevant organizational members' capability and process improvement. And the strategic linkage between firms can maximize the integrated capability of information system beyond the simple exchange relation between electronic data, achieving a differentiated competitive advantage. Consequently, the systematization and centralization for the maximization of SCM capability, including the infrastructure construction based on the system compatibility and reliability for information integration, should be preceded before the modeling of the integrated capability for optimum supply chain and the best process management in the smart era.

A Study on Time Synchronization Method for Analyzing the Network Performance of Remote Control System (원격운용 시스템의 네트워크 성능분석을 위한 시간동기화 방안에 관한 연구)

  • Yang, DongWon;Kim, Namgon;Kim, Dojong
    • Journal of IKEEE
    • /
    • v.26 no.2
    • /
    • pp.141-149
    • /
    • 2022
  • With the development of artificial intelligence and unmanned technologies, the remote surveillance/autonomous driving systems have been actively researched. For an effective performance analysis of the developed remote control system, it is important to record the data of it in real time. In addition, in order to analyze the performance between the control system and the remote system, the recorded data from them should be synchronized with time. In this paper we proposed a novel time synchronization method for the remote control system. The proposed remote control system satisfies the time difference of the recorded data within 1 ms, and we can reduce the time difference by using a CPU shielding and affinity setting. The performance of the proposed method was proved through various network data storage experiments. And the experiments confirmed that the proposed method can be applied to recording devices of unmanned ground vehicles and control vehicles. The proposed method will be used as a method for analyzing network data of UGV-R (Unmanned Ground Vehicle - Reconnaissance).

A Study on the Modulus Multiplier Speed-up Throughput in the RSA Cryptosystem (RSA 암호시스템의 모듈러 승산기 처리속도 향상을 위한 연구)

  • Lee, Seon-Keun;Jeung, Woo-Yeol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.3
    • /
    • pp.217-223
    • /
    • 2009
  • Recently, the development of the various network method can generate serious social problems. So, it is highly required to control security of network. These problems related security will be developed and keep up to confront with anti-security field such as hacking, cracking. The way to preserve security from hacker or cracker without developing new cryptographic algorithm is keeping the state of anti-cryptanalysis in a prescribed time by means of extending key-length. In this paper, the proposed montgomery multiplication structured unit array method in carry generated part and variable length multiplication for eliminating bottle neck effect with the RSA cryptosystem. Therefore, this proposed montgomery multiplier enforce the real time processing and prevent outer cracking.

  • PDF

Scalable P2P Botnet Detection with Threshold Setting in Hadoop Framework (하둡 프레임워크에서 한계점 가변으로 확장성이 가능한 P2P 봇넷 탐지 기법)

  • Huseynov, Khalid;Yoo, Paul D.;Kim, Kwangjo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.807-816
    • /
    • 2015
  • During the last decade most of coordinated security breaches are performed by the means of botnets, which is a large overlay network of compromised computers being controlled by remote botmaster. Due to high volumes of traffic to be analyzed, the challenge is posed by managing tradeoff between system scalability and accuracy. We propose a novel Hadoop-based P2P botnet detection method solving the problem of scalability and having high accuracy. Moreover, our approach is characterized not to require labeled data and applicable to encrypted traffic as well.