• Title/Summary/Keyword: Data de-identification

Search Result 116, Processing Time 0.027 seconds

Implementation of RFID Reader System using the Data Encryption Standard Algorithm (표준 암호화 알고리즘을 이용한 RFID 판독 시스템의 구현)

  • 박성욱
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.55-61
    • /
    • 2003
  • The Data Encryption Standard(DES) has been a worldwide standard for over 20 years. DES is one of the block encryption techniques which ciphers 64-bit input data blocks using a 56-bit private key. The DES algorithm transforms 64-bit input in a series of steps into a 64-bit output. Thus, it is impossible to deduce the plaintext from the ciphertext which encrypted by this algorithm without the key. This paper presents an implementation of RFID roader system using the DES algorithm. An implemented system enhances the credibility of the encryption algorithm by using the Cipher Block Chining(CBC). Experimental results also show that the implemented system has better performance over the conventional commercial product.

  • PDF

Damage assessment of beams from changes in natural frequencies using ant colony optimization

  • Majumdar, Aditi;De, Ambar;Maity, Damodar;Maiti, Dipak Kumar
    • Structural Engineering and Mechanics
    • /
    • v.45 no.3
    • /
    • pp.391-410
    • /
    • 2013
  • A numerical method is presented here to detect and assess structural damages from changes in natural frequencies using Ant Colony Optimization (ACO) algorithm. It is possible to formulate the inverse problem in terms of optimization and then to utilize a solution technique employing ACO to assess the damage/damages of structures using natural frequencies. The laboratory tested data has been used to verify the proposed algorithm. The study indicates the potentiality of the developed code to solve a wide range of inverse identification problems in a systematic manner. The developed code is used to assess damages of beam like structures using a first few natural frequencies. The outcomes of the simulated results show that the developed method can detect and estimate the amount of damages with satisfactory precision.

Strategic Analysis Evolution: Scenario Planning and Simulation Based on The Methodology of System Dynamics

  • Bassi, Andrea M
    • Korean System Dynamics Review
    • /
    • v.5 no.2
    • /
    • pp.199-216
    • /
    • 2004
  • The present study is aimed at developing the optimal instruments for dispelling the uncertainty factors during the formulation of strategies for corporate development. The objective is the creation of a complete model of strategic analysis, which encompasses both the environment (internal and external) and the management rational component. This model -built on the analysis of three corporate cases - is concretized by a simulation for testing the strategy by the means of software which enables the users to cope with a dynamic and complex corporate environment. The research questions regard the development of a complete strategic analysis, which covers the entire decision-making process; the concrete assessment of the business strategy on the basis of quantitative data: the identification and enhancement of the critical variables of business administration, in such a complex and dynamic reality as the corporate environment.

  • PDF

High-level Expression, Polyclonal Antibody Preparation and Bioinformatics Analysis of Bombyx mori Nucleopolyhedrovirus orf47 Encodes Protein

  • Wu, Chao;Guo, Zhongjian;Chen, Keping;Shen, Hongxing
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.16 no.2
    • /
    • pp.87-92
    • /
    • 2008
  • Bombyx mori nucleopolyhedrovirus (BmNPV) orf47 gene was characterized for the first time. The coding sequence of Bm47 was amplified and subcloned into the prokaryotic expression vector pET-30a(+) in order to produce His-tagged fusion protein in the BL21 (DE3) cells. The His-Bm47 fusion protein was expressed efficiently after induction with IPTG. The purified fusion protein was used to immunize New Zealand white rabbits to prepare polyclonal antibody. As the genome of BmNPV is available in GenBank and the EST database of BmNPV is expanding, identification of novel genes of BmNPV was conceivable by data-mining techniques and bioinformatics tools. Structural bioinformatics approach to analyze the properties of Bm47 encodes protein.

Raising Risk and Suggesting Solution about Personal Information De-identification in Big-Data Environment (빅데이터 환경에서 개인정보 비식별화에 대한 위험성 제기 및 대응 방안 제시)

  • Lee, Su-Rim;Jang, Woong-Tae;Bae, Jae-Young;Lee, Chan-Ho;Hyun, Beom-Su
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.10a
    • /
    • pp.297-300
    • /
    • 2016
  • 최근 빅데이터 산업이 발전하고 있는 상황에서 빅데이터 산업에 활용되는 개인정보의 보호에 관한 문제가 대두하고 있다. 빅데이터 산업에서 개인정보를 활용하기 위해서는 비식별화 조치를 해야 한다. 하지만 비식별화는 비식별화 평가 모델 자체의 취약성과 더불어 비식별화된 개인정보를 재식별화 하는 위험성도 존재한다. 본 논문은 적정성 평가 모델, 비식별화 조치 기술, 재식별에 관한 위험성을 연구하고 각 위험성에 대한 대응 방안을 통해 재식별화의 문제를 해결하여 빅데이터 산업에서 비식별화된 개인정보가 안전히 쓰일 수 있도록 해야 한다.

Elucidating H/D-Exchange Mechanism of Active Hydrogen in Aniline and Benzene-1,2-dithiol

  • Ahmed, Arif;Islam, Syful;Kim, Sunghwan
    • Mass Spectrometry Letters
    • /
    • v.12 no.4
    • /
    • pp.146-151
    • /
    • 2021
  • In this study, the hydrogen/deuterium (HDX) exchange mechanism of active hydrogen, nitrogen, and sulfur-containing polycyclic aromatic hydrocarbon (PAH) dissolved in toluene and deuterated methanol by atmospheric pressure photoionization (APPI) is investigated. The comparison of the data obtained using APPI suggests that aniline and benzene-1,2-dithiol contain two exchanging hydrogens. The APPI HDX that best explains the experimental findings was investigated with the use of quantum mechanical calculations. The HDX mechanism is composed of a two-step reaction: in the first step, analyte radical ion gets deuterated, and in the second step, the hydrogen transfer occurs from deuterated analyte to de-deuterated methanol to complete the exchange reaction. The suggested mechanism provides fundamentals for the HDX technique that is important for structural identification with mass spectrometry. This paper is dedicated to Professor Seung Koo Shin for his outstanding contributions in chemistry and mass spectrometry.

The Smart Port Management System Based on Big-data (빅데이터 기반 스마트 항만 운용시스템)

  • Lee, Woo;Kim, Sang-Hyun;Oh, Seung-Hong;Kim, Won-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.1
    • /
    • pp.167-172
    • /
    • 2022
  • Currently, ship control, tug, and pilot work in import/export ports including Gwangyang Port are operated according to factors such as the order of arrival and departure regardless of the shipping company. Also, even this is done very inefficiently by hand. Therefore, there is an urgent need to develop a system to increase the efficiency of port and ship operation through standardization and digitalization of tasks related to Berthing and unberthing of ships. In this study, we propose a method to increase the efficiency of port and vessel operation by designing a smart port operation system based on big data such as vessel location information, pilotage and tug schedule, arrival/departure operation information, and weather information.

Research on technical protection measures through risk analysis of pseudonym information for life-cycle (가명정보 Life-Cycle에 대한 위험 분석을 통한 관리적/기술적 보호조치 방안에 대한 연구)

  • Cha, Gun-Sang
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.53-63
    • /
    • 2020
  • In accordance with the revision of the Data 3 Act, such as the Personal Information Protection Act, it is possible to process pseudonym information without the consent of the information subject for statistical creation, scientific research, and preservation of public records, and unlike personal information, it is legal for personal information leakage notification and personal information destruction There are exceptions. It is necessary to revise the pseudonym information in that the standard for the pseudonym processing differs by country and the identification guidelines and anonymization are identified in the guidelines for non-identification of personal information in Korea. In this paper, we focus on the use of personal information in accordance with the 4th Industrial Revolution, examine the concept of pseudonym information for safe use of newly introduced pseudonym information, and generate / use / provide / destroy domestic and foreign non-identification measures standards and pseudonym information. At this stage, through the review of the main contents of the law or the enforcement ordinance (draft), I would like to make suggestions on future management / technical protection measures.

Strategy for Establishing a Rights Processing Platform to Enhance the Utilization of Open Data (공공데이터 활용성 제고를 위한 권리처리 플랫폼 구축 전략)

  • Sim, Junbo;Kwon, Hun-yeong
    • Journal of Information Technology Services
    • /
    • v.21 no.3
    • /
    • pp.27-42
    • /
    • 2022
  • Open Data is an essential resource for the data industry. 'Act On Promotion Of The Provision And Use Of Public Data', enacted on July 30, 2013, mandates public institutions to manage the quality of Open Data and provide it to the public. Via such a legislation, the legal basis for the public to Open Data is prepared. Furthermore, public institutions are prohibited from developing and providing open data services that are duplicated or similar to those of the private sector, and private start-ups using open data are supported. However, as the demand for Open Data gradually increases, the cases of refusal to provide or interruption of Open Data held by public institutions are also increasing. Accordingly, the 'Open Data Mediation Committee' is established and operated so that the right to use data can be rescued through a simple dispute mediation procedure rather than complicated administrative litigation. The main issues dealt with in dispute settlement so far are usually the rights of third parties, such as open data including personal information, private information such as trade secrets, and copyrights. Plus, non-open data cannot be provided without the consent of the information subject. Rather than processing non-open data into open data through de-identification processing, positive results can be expected if consent is provided through active rights processing of the personal information subject. Not only can the Public Mydata Service be used by the information subject, but Open Data applicants will also be able to secure higher quality Open Data, which will have a positive impact on fostering the private data industry. This study derives a plan to establish a rights processing platform to enhance the usability of Open Data, including private information such as personal information, trade secrets, and copyright, which have become an issue when providing Open Data since 2014. With that, the proposals in this study are expected to serve as a stepping stone to revitalize private start-ups through the use of wide Open Data and improve public convenience through Public MyData services of information subjects.

Identification Algorithm for Up/Down Sliding PRIs of Unidentified RADAR Pulses With Enhanced Electronic Protection (우수한 전자 보호 기능을 가진 미상 레이더 펄스의 상/하 슬라이딩 PRI 식별 알고리즘)

  • Lee, Yongsik;Kim, Jinsoo;Kim, Euigyoo;Lim, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.6
    • /
    • pp.611-619
    • /
    • 2016
  • Success in modern war depends on electronic warfare. Therefore, It is very important to identify the kind of Radar PRI modulations in a lot of Radar electromagnetic waves. In this paper, I propose an algorithm to identify Linear up Sliding PRI, Non-Linear up Sliding PRI and Linear Down Sliding PRI, Non-Linear Down Sliding PRI among many Radar pulses. We applied not only the TDOA(Time Difference Of Arrival) concept of Radar pulse signals incoming to antennas but also a rising and falling curve characteristics of those PRI's. After making a program by such algorithm, we input each 40 data to those PRI's identification programs and as a result, those programs fully processed the data in according to expectations. In the future, those programs can be applied to the ESM, ELINT system.