• Title/Summary/Keyword: Electronic security system

Search Result 845, Processing Time 0.031 seconds

Port Security Management System using IoT (IoT를 활용한 항만보안 시스템)

  • Jeong, Hong-Ju;Kim, Chae-Un;Lee, Dong-Min;Yun, Dong-Uk;Yoo, Sang-Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.1068-1070
    • /
    • 2022
  • 우리나라의 무역 활동을 처리하는 항만은 국가 주요시설로 보안에 만전을 기하고 있다. 그러나 항만의 면적이 넓고 복잡하기 때문에 사각지대가 존재하고 사각지대에서의 불법행위 단속 건수는 매년 증가하고 있다. 이에 항만의 보안 강화를 위한 대책이 필요하다. 본 논문은 항만의 상황을 이동형 CCTV에 부착된 IoT 센서들로 인식하여 YOLOv5 딥러닝 모델로 분석한 후 웹 대시보드에 시각화하는 항만 보안 시스템을 제안한다. 이동형 CCTV는 특정 위치로 직접 이동할 수 있어 거리에 따라 해상도가 낮아지는 기존 CCTV의 단점을 보완할 수 있다. 또한 해당 시스템은 주변에서 쉽게 구할 수 있는 장비들과 오픈소스 라이브러리를 활용하기 때문에 다른 보안장비들에 비해 효율적인 비용으로 높은 보안 효과를 얻을 수 있다는 강점을 지닌다. 본 시스템은 항만시설뿐 아니라 군사시설, 물류시설 등 보안을 중요시하는 다른 분야에 확대 적용될 수 있다는 점에서 의의가 있다.

Underwater Optical Image Data Transmission in the Presence of Turbulence and Attenuation

  • Ramavath Prasad Naik;Maaz Salman;Wan-Young Chung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.1
    • /
    • pp.1-14
    • /
    • 2023
  • Underwater images carry information that is useful in the fields of aquaculture, underwater military security, navigation, transportation, and so on. In this research, we transmitted an underwater image through various underwater mediums in the presence of underwater turbulence and beam attenuation effects using a high-speed visible optical carrier signal. The optical beam undergoes scintillation because of the turbulence and attenuation effects; therefore, distorted images were observed at the receiver end. To understand the behavior of the communication media, we obtained the bit error rate (BER) performance of the system with respect to the average signal-to-noise ratio (SNR). Also, the structural similarity index (SSI) and peak SNR (PSNR) metrics of the received image were evaluated. Based on the received images, we employed suitable nonlinear filters to recover the distorted images and enhance them further. The BER, SSI, and PSNR metrics of the specific nonlinear filters were also evaluated and compared with the unfiltered metrics. These metrics were evaluated using the on-off keying and binary phase-shift keying modulation techniques for the 50-m and 100-m links for beam attenuation resulting from pure seawater, clear ocean water, and coastal ocean water mediums.

A Network Intrusion Security Detection Method Using BiLSTM-CNN in Big Data Environment

  • Hong Wang
    • Journal of Information Processing Systems
    • /
    • v.19 no.5
    • /
    • pp.688-701
    • /
    • 2023
  • The conventional methods of network intrusion detection system (NIDS) cannot measure the trend of intrusiondetection targets effectively, which lead to low detection accuracy. In this study, a NIDS method which based on a deep neural network in a big-data environment is proposed. Firstly, the entire framework of the NIDS model is constructed in two stages. Feature reduction and anomaly probability output are used at the core of the two stages. Subsequently, a convolutional neural network, which encompasses a down sampling layer and a characteristic extractor consist of a convolution layer, the correlation of inputs is realized by introducing bidirectional long short-term memory. Finally, after the convolution layer, a pooling layer is added to sample the required features according to different sampling rules, which promotes the overall performance of the NIDS model. The proposed NIDS method and three other methods are compared, and it is broken down under the conditions of the two databases through simulation experiments. The results demonstrate that the proposed model is superior to the other three methods of NIDS in two databases, in terms of precision, accuracy, F1- score, and recall, which are 91.64%, 93.35%, 92.25%, and 91.87%, respectively. The proposed algorithm is significant for improving the accuracy of NIDS.

The Determinants of Customer Satisfaction In Electronic Commerce. (전자상거래시 고객만족 결정요인에 관한 연구)

  • Cho, Hyun-Chul;Shim, Gyu-Yul
    • Journal of Global Scholars of Marketing Science
    • /
    • v.7
    • /
    • pp.261-281
    • /
    • 2001
  • As a new environment, the Internet proposes to us the innovative change of our life. With difficulty, we can go after the Internet's potentiality and the growth speed of technology. In the new stream of innovation technology, we can probably feel the fear of tremendous changes, the reverse, also hope to get the opportunity that come out of Internet world. EC(Electronic Commerce) that out of the evolution of Internet technology gets a coporation changes to survive in 21st century. So the corporation must set the strategy to fit a Internet focused society. As one of them, a virtual store is opened on the Internet. Recently, there has been much attention to the Internet shopping mall as a new distribution channel and marketing tool. This study analyzed that the system environment, perceived product risk, easy of order, perceived security risk would have impact on the customer satisfaction in Electronic Commerce. The Purpose of this study is to develope the concept of the determinants of customer satisfaction and to test a theoretical framework that attempts to explain how the perception of satisfaction in Electronic Commerce. The proposed hypotheses were tested internet shopping mall users and the study results show all hypotheses are supported.

  • PDF

A Secure AIS Protocol Suggestion with Analyses of the Standard AIS Protocol (표준 AIS 프로토콜 분석을 통한 보안 AIS 프로토콜 제안)

  • Lee, Jung-Su;Heo, Ouk;Kim, Jae-Hwan;Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.49-57
    • /
    • 2016
  • Recently, marine accidents such as the sinking accident Mongol freighter ship and the sinking accident of Sewol ferry in Jindo continuously happen. In order to decrease the number of these marine accidents, Korean ships are obliged to follow the AIS(Automatic Identification System) system. The AIS protocol includes all information for sailing ships. However, the standard AIS protocol does not provide any security function, In addition, it is possible to hijack the standard AIS protocol in case of using a satellite communication device called FUNcuve Dongle Pro+. Therefore, this paper analyzes weak points of the security in the standard AIS protocol. Furthermore, this paper ensures reliability by marking the MAC Address of sender and receiver for secure communication and suggests the protocol that can securely send data, using the VPN Tunnelling method. Therefore, the suggested AIS protocol provides the secure communication to the AIS protocol and protect the messages in the AIS protocol, which can serve safe voyages by decreasing the marine accidents.

A Design of Maritime Information Network System Based on Mesh Network (Mesh Network 기반의 해상 정보 네트워크 시스템 설계)

  • Seo, Ki-Yeol;Oh, Se-Woong;Choi, Deuk-Jae;Park, Sang-Hyun;Suh, Sang-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.31 no.6
    • /
    • pp.497-502
    • /
    • 2007
  • The important purposes of research in ship operation are to ensure safe navigation, high efficiency of transportation, high accuracy, and security. IMO, develops a broad strategy for incorporating the use of new technologies in a structured way to ensure that their use is compliant with the various electronic navigational and communication technologies and services that are already available. As a base research for E-Navigation, therefore, this paper proposes a maritime information network based on Mesh Network that is one of the maritime broadband solutions. Firstly, this paper analyzes an international port network system and the requirements of port network for E-Navigation. Finally, it designs the maritime information network system based on Mesh Network and shows its validity for E-Navigation.

A Design of Smart Banking System using Digital Signature based on Biometric Authentication (바이오인증 기반의 전자서명을 이용한 스마트 뱅킹 시스템 설계)

  • Kim, Jae-Woo;Park, Jeong-Hyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.9
    • /
    • pp.6282-6289
    • /
    • 2015
  • Today, there is an increasing number of cases in which certificate information is leak, and accordingly, electronic finance frauds are prevailing. As certificate and private key a file-based medium, are easily accessible and duplicated, they are vulnerable to information leaking crimes by cyber-attack using malignant codes such as pharming, phishing and smishing. Therefore, the use of security token and storage toke' has been encouraged as they are much safer medium, but the actual users are only minimal due to the reasons such as the risk of loss, high costs and so on. This thesis, in an effort to solve above-mentioned problems and to complement the shortcomings, proposes a system in which digital signature for Internet banking can be made with a simply bio-authentication process. In conclusion, it was found that the newly proposed system showed a better capability in handling financial transitions in terms of safety and convenience.

A Study on the Implementation of Management System Based on UHD Transmission Contents (UHD 송출 콘텐츠 기반 관리시스템 구현)

  • Kim, Moo Yeon;Jang, Byung Min;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.813-826
    • /
    • 2019
  • This paper is a study on the implementation of MAM(Media Asset Management) to utilize UHD contents as high quality broadcast material. The implementation method of this paper is to separate MAM roles with content management functions and transmission workflow functions from workflow, metadata and system interface related work, which are divided into core MAM and MAM-Ex structure. Through the method proposed in this paper, we improved the content management method by applying the page menu method to the material metadata modification and applying the template method to the material structure API. In addition, the storage of UHD material and the configuration of the component server are pooled without any distinction of channels, thereby enhancing the security of UHD transmission assets by minimizing the movement of contents together with broadcasting material protection.

Current Status and Tasks of Using the School Affairs System in Elementary Schools (초등학교에서의 교무업무시스템 운영 현황과 과제 - 서울과 경기 지역을 중심으로 -)

  • Shin, Ji-Yean;Jo, Mi-Heon
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.1
    • /
    • pp.21-28
    • /
    • 2007
  • Along with the development of telecommunication technology, educational role has been considerably changed and NEIS is introduced and operated for the digital educational administration. However, the function of NEIS is so limited when operated in each school. As a result, Korean government prepares the plan to install and operate a new School Affairs System by separating 3 areas from 27 areas of NEIS. School Affairs System has been used in schools since March, 2006. In this regard, this study attempts to analyze the current status and tasks of using the system in elementary schools. The result of the study shows that about 67% teachers use the system once or twice a day. Most of teachers answer that they get help from other teachers if they have any problem in operating the system. Many teachers affirmatively answer to the design and function of the system, and they are satisfied with the convenience and efficiency of the system. However, they feel difficulty to be familiar with the system sue to the frequent change. The importance of electronic certificate and personal information is well recognized and managed in terms of the security of the system. Facilities need to be well equipped, and information exchange system need to be developed to accept each school's request to improve the function of the system. In addition, applicable laws need to be arranged, clear guideline of educational administration agency and principal's strong intention are required to relieve teachers' work load.

  • PDF

The Role of Bank Payment Obligation under SWIFTNet's Trade Service Utility (SWIFTNet TSU BPO의 역할)

  • Lee, Bong-Soo
    • International Commerce and Information Review
    • /
    • v.17 no.2
    • /
    • pp.3-18
    • /
    • 2015
  • This thesis examines the performance and improvement strategy of SWIFTNet TSU's BPO for computerization and suggests the following results: First, the URBPO should be legally complemented, and the SWIFT and banks need to keep improving the systems to meet trade parties' diverse needs. Second, the SWIFTNet TSU's BPO should have an institutionally unified sharing platform with security, stability and convenience. In other words, it is needed to develop services which meet e-payment paradigm and international and regional environments through continued analysis on market changes and flow. Third, in order for the SWIFTNet TSU BPO to evolve into a perfect global system, there should be an innovative payment solution which can meet all trade parties all over the world. For this, technology standardization for a worldwide e-trade payment system is essential. Lastly, based on the results derived from this study, an analysis framework with which more diverse and practical environmental variables can be analyzed should be developed.

  • PDF