• Title/Summary/Keyword: Automation, Security

Search Result 231, Processing Time 0.025 seconds

Systematic Literature Review of Smart Trade Contract Research (스마트 무역계약 연구의 체계적 문헌고찰)

  • Ho-Hyung Lee
    • Korea Trade Review
    • /
    • v.48 no.3
    • /
    • pp.243-262
    • /
    • 2023
  • This study provides a systematic review of smart trade contracts, examining the research trends and theoretical background of utilizing smart contracts and blockchain technology for the digitalization and automation of trade contracts. Smart trade contracts are a concept that applies the automated contract system based on blockchain to trade-related transactions. The study analyzes the technical and legal challenges and proposes solutions. The technical aspect covers the development of smart contract platforms, scalability and performance improvements of blockchain networks, and security and privacy concerns. The legal aspect addresses the legal enforceability of smart contracts, automatic execution of contract conditions, and the responsibilities and obligations of contract parties. Smart trade contracts have been found to have applications in various industries such as international trade, supply chain management, finance, insurance, and energy, contributing to the ease of trade finance, efficiency of supply chains, and business model innovation. However, challenges remain in terms of legal regulations, interaction with existing legal frameworks, and technological aspects. Further research is needed, including empirical studies, business model innovation, resolution of legal issues, security and privacy considerations, standardization and collaboration, and user experience studies to address these challenges and explore additional aspects of smart trade contracts.

Resume Classification System using Natural Language Processing & Machine Learning Techniques

  • Irfan Ali;Nimra;Ghulam Mujtaba;Zahid Hussain Khand;Zafar Ali;Sajid Khan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.7
    • /
    • pp.108-117
    • /
    • 2024
  • The selection and recommendation of a suitable job applicant from the pool of thousands of applications are often daunting jobs for an employer. The recommendation and selection process significantly increases the workload of the concerned department of an employer. Thus, Resume Classification System using the Natural Language Processing (NLP) and Machine Learning (ML) techniques could automate this tedious process and ease the job of an employer. Moreover, the automation of this process can significantly expedite and transparent the applicants' selection process with mere human involvement. Nevertheless, various Machine Learning approaches have been proposed to develop Resume Classification Systems. However, this study presents an automated NLP and ML-based system that classifies the Resumes according to job categories with performance guarantees. This study employs various ML algorithms and NLP techniques to measure the accuracy of Resume Classification Systems and proposes a solution with better accuracy and reliability in different settings. To demonstrate the significance of NLP & ML techniques for processing & classification of Resumes, the extracted features were tested on nine machine learning models Support Vector Machine - SVM (Linear, SGD, SVC & NuSVC), Naïve Bayes (Bernoulli, Multinomial & Gaussian), K-Nearest Neighbor (KNN) and Logistic Regression (LR). The Term-Frequency Inverse Document (TF-IDF) feature representation scheme proven suitable for Resume Classification Task. The developed models were evaluated using F-ScoreM, RecallM, PrecissionM, and overall Accuracy. The experimental results indicate that using the One-Vs-Rest-Classification strategy for this multi-class Resume Classification task, the SVM class of Machine Learning algorithms performed better on the study dataset with over 96% overall accuracy. The promising results suggest that NLP & ML techniques employed in this study could be used for the Resume Classification task.

A Study en the Change of the Office Interior Environment According to the Social Change (사회적 변화에 따른 사무실 실내 환경의 변화에 관한 연구)

  • 이종란
    • Korean Institute of Interior Design Journal
    • /
    • no.28
    • /
    • pp.77-83
    • /
    • 2001
  • This study is to suggest the desirable office environment In the Information society, after taking a look at how social changes have affected our office environments. the industrial society was to produce or to process natural resources. It was vertically organized and the hierarchy among its members was very much emphasized. However, in the information society, information itself became a very important resource as well as a product. The information society is like a horizontally organized network, where the individual capacity and the efficiency of teamwork are more emphasized than the hierarchy among its members. The office environment in the industrial society was for the massive processing of documents related to business under the guidance and vigil of a supervisor. however, accuracy and swiftness in processing documents were also emphasized when the concept of office landscaping and office automation were introduced in the middle of the 20th Century. The information society, that started in the late 20th Century, will be continuously developed in the 21st Century. In order to improve work efficiency in the information society, the office environment should be able to effectively use information and communication technologies and to efficiently manage networked organizations. This study suggests that the office environment in the information society should have connectivity, security, flexibility, mobility, and adaptability as its essential characteristics.

  • PDF

Investigation on the Scrum-based Standard Management for Efficient Data Quality Control of Small-sized Companies : A Case Study on Distribution Service of Company 'I' (중소기업의 효율적 데이터 품질관리를 위한 스크럼 기반 표준관리 방안 : 'I'사 물류서비스 적용 사례)

  • Kim, Tai-Yun;Kim, Nam-Gyu;Sohn, Yong-Lak
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.1
    • /
    • pp.83-105
    • /
    • 2010
  • The competence of enterprise for managing information is evaluated not by the amount of information but by the quality of information such as response time, data consistency, and data correctness. The degradation of data quality is usually caused by the inappropriate process of managing the structure and value of stored data. According to the recent survey on the actual condition of data quality management, the correctness and consistency of data appeared to be the most problematic area among the six criteria of data quality management such as correctness, consistency, availability, timeliness, accessibility, and security. Moreover, the problem was more serious in case of small and medium-sized companies than large enterprises. In this paper, therefore, we attempt to propose a new data quality control methodology for small and medium-sized companies that can improve the correctness and consistency of data without consuming too much time and cost. To adopt the proposed methodology to real application immediately, we provided some scripts for as-is analysis and devised automation tools for managing naming rules of vocabulary, terminology, and data code. Additionally, we performed case study on the distribution service of a small-sized company to estimate the applicability of our tool and methodology.

  • PDF

A Study on the Korean CALS Conception and Introduction Policy Trend (한국적CALS의 개념 정립과 도입정책방향에 대한 연구)

  • 김철환;김부국;임영석
    • The Journal of Society for e-Business Studies
    • /
    • v.1 no.1
    • /
    • pp.5-26
    • /
    • 1996
  • This paper aims to present a prospective trend to establish a proper CALS conception and an efficient CALS environment in Korea.. It is crucial at this point for Korea to develop a comprehensive CALS conception which considers our present economic and social situation, national security, and our national emotion. Korean CALS has been developed and led mainly by the government and private industry. It is now necessary to improve CALS conception in Korea by making CALS standard more interchangeable among international as well as domestic business fields through EDI and the automation of the industries along with the government. In this regard, this paper proposes three potential methods to accomplish this goal and discuss each of them in detail. First, we suggest to establish a proper CALS introduction policy on the government level. We propose an introduction policy with three phases such as introduction, spreading and target which will cover through the year 1996 to 2007. Second. we suggest to establish a proper CALS standardization policy by improving the acquisition of digital data and process, and modernizing infrastructure. Third, we suggest that the government should amend and enforce the necessary laws and acts for more efficient CALS implementation in Korea. Government should arrange for these acts to be applied not optionally but obligatorily to Korean enterprises so that they survive the harsh and competitive world market in the upcoming 21th century.

  • PDF

Design and Implementation of Office Security and Automation System Using RFID (RFID를 이용한 오피스 보안 및 자동화 시스템의 설계 및 구현)

  • Lee, Seung-Cheol;Ko, Myeong-Cheol;Kim, Jung-Hwan;Han, Deok-Soo;Yang, Kwon-Woo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.560-565
    • /
    • 2006
  • 최근 보안에 대한 사회적인 관심이 높아지면서 RFID는 기존의 스마트카드와 바코드 시스템이 갖는 여러 기능적인 한계점들을 극복함으로써 향 후 이를 대체할 보안 신기술로서 인식되고 있다. 현재 사무실 출입의 보안을 위해 대표적으로 사용되고 있는 출입문 인증시스템은 일단 출입문을 통과한 사용자들에 대해서는 사무실 내부의 모든 요소들이 무방비 상태로 노출되어 보안상의 허점이 발생한다. 또한 사무실 내 개개의 PC에 단말기를 설치하여 사용하는 스마트카드 인증시스템 역시도 빈번한 자리 이동에 따른 카드 인증 절차의 번거로움으로 인해 근거리 이동시 PC를 잠그지 않는 경우가 빈번하게 발생함으로써 사용자 PC에 저장된 보안이 필요한 데이터들에 대한 침해 우려가 발생한다. 본 논문에서는 다중사용자 환경에서 각각의 사용자가 소지한 RFID 태그를 이용하여 기존 카드시스템과 같이 복잡한 인증절차가 필요 없고 빈번한 자리 이동이 발생하더라도 추가적인 인증작업이 없이 매번 자동으로 컴퓨터 시스템을 잠금 및 해제시킴으로써 인증과정에 따른 사용자의 부담을 줄일 수 있는 보안시스템을 제시한다. 또한 사용자가 출근과 동시에 매일 일상적으로 반복되는 사무실에서의 컴퓨터 작업에 대한 효율을 높이기 위한 사무 자동화 시스템을 구현한다.

  • PDF

Accuracy Evaluation and Terrain Model Automation of Reservoir Using Unmanned Aerial Vehicle System (무인항공시스템을 활용한 저수지 지형모델 생성 및 정확도 평가)

  • Kim, Jungmeyon;Park, Sungsik;Kim, Jaehwi;Ahn, Seungwoo;Park, Sungyong;Kim, Yongseong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.2
    • /
    • pp.57-67
    • /
    • 2017
  • This study examines methods for creating terrain models of reservoirs and techniques for verifying the accuracy. Such methods and techniques use unmanned aerial vehicles which are capable of capturing high-resolution images repetitively, are highly economic, and capable of surveying wide areas. In addition, this study suggests methods of acquiring data for reservoir safety management, the methods which also employ the unmanned aerial vehicles. Therefore, this study helps solving problems that can arise when National Disaster Management System rebuilds a reservoir management database, such as a shortage of local government manpower. This study also contributes to providing element technology necessary for advancing the database.

Feasibility Study of IEEE 802.15.4 LR-WPAN to the Real-time Voice Application (IEEE 802.15.4 LR-WPAN의 실시간 음성 데이터 응용에 대한 적용 가능성 연구)

  • Hur, Yun-Kang;Kim, You-Jin;Huh, Jae-Doo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.2 no.2
    • /
    • pp.82-94
    • /
    • 2007
  • Wireless sensor networking technology is one of the basic infrastructures for ubiquitous environment. It enables us to gather various sensory data such as temperature, humidity, gas leakage, and speed from the remote sensor devices. To support these networking functions, IEEE WPAN working group makes standards for PHY and MAC, while ZigBee Alliance defines the standards for the network, security, and applications. The low-rate WPAN was emerged to have the characteristics of network resilience, low cost, and low power consumption. It has a broad range of applications including, but not limit to industrial control and monitoring, home automation, disaster forecast and monitoring, health care. In order to provide more intelligent and robust services, users want voice-based solutions to accommodate to low-rate WPAN. In this paper, we have evaluated voice quality of an IEEE 802.15.4 standard compliant voice node. Specifically, it includes the design of a voice node and experiments based on the prediction of voice quality using the E-model suggested by ITU-T G.107, and the network communication mechanisms considering beacon-enabled and nonbeacon-enabled networks for real-time voice communications.

  • PDF

Enforcement of opacity security properties for ship information system

  • Xing, Bowen;Dai, Jin;Liu, Sheng
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.8 no.5
    • /
    • pp.423-433
    • /
    • 2016
  • In this paper, we consider the cybersecurity issue of ship information system (SIS) from a new perspective which is called opacity. For a SIS, its confidential information (named as "secret") may be leaked through the working behaviors of each Distributed Control Unit (DCU) from an outside observer called an "intruder" which is able to determine ship's mission state by detecting the source of each data flow from the corresponding DCUs in SIS. Therefore we proposed a dual layer mechanism to enforce opacity by activating non-essential DCU during secret mission. This mechanism is calculated by two types of insertion functions: Safety-assured insertion function ($f_{IS}$) and Admissibility-assured insertion function ($f_{IA}$). Due to different objectives, $f_{IS}$ is designed to confuse intruder by constructing a non-secret behaviors from a unsafe one, and the division of $f_{IA}$ is to polish the modified output behaviors back to normal. We define the property of "$I_2$-Enforceability" that dual layer insertion functions has the ability to enforce opacity. By a given mission map of SIS and the marked secret missions, we propose an algorithm to select $f_{IS}$ and compute its matchable $f_{IA}$ and then the DCUs which should be activated to release non-essential data flow in each step is calculable.

The Development of Exhibition Grounds Management System Using the Ubiquitous Computing (Ubiquitous Computing을 이용한 전시회장 관리 시스템 개발)

  • Sim, Gab-Sig;Jang, Jae-Hyuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.149-156
    • /
    • 2008
  • In this paper, we develope the Exhibition Grounds Management System utilizing the ubiquitous computing which integrates the RFID ubiquitous main technology, existing use technology Bar-code, the Mobile communication technology for IT main technology field. The developed system consists of the program for exhibition information. the visitor registration program, manager program and mobile program for the visitor's current location inquiry and the exhibition management. This system is realized and designed based on database, web program, mobile program, wireless telecommunication technology. The automation technology utilizing the developed RFID system and the Exhibition Grounds Management System integrated with the wireless packet telecommunication using the mobile telecommunication technology could have a ripple effect on whole information industrial application fields.

  • PDF