• Title/Summary/Keyword: Information Security Strategy

Search Result 474, Processing Time 0.024 seconds

Reclamation of Desert with Regular Application of Waste Water

  • Rajan Raj Pandey
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.4
    • /
    • pp.15-31
    • /
    • 2024
  • Deserts around the world mostly do not have plants and are ever- expanding their area each year. There is shortage of food and prevalent hunger around the world mostly in the African countries that have desert. The waste water is not properly managed in those places and it causes disease outbreaks. So, the problems of desertification, waste water management and hunger have to be addressed by the world community. This thesis work tries to explore a possibility of reclamation of deserts with regular application of waste water. The results obtained from a four months long test are very encouraging and it can be easily concluded that the deserts can be reclaimed by application of waste water and it will relieve the desert community from the burden of costly treatment of waste water as well. In turn, they will, to some extent, get rid of water borne diseases and the reclaimed land could be used in future to produce more food to feed the hungry community- positively impacting directly to food security of the focused community.

Study of Information System Model in University (대학 정보시스템 모델연구)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.3
    • /
    • pp.27-35
    • /
    • 2002
  • This paper is presented a model of management and application of PC, one of the most important computer resources and software and a model for optimal speed of network to organize information budget of University. I propose strategies to promote utilization degree of existing PCs, problems and strategies to maintain PC, effective strategies to expand PC and change into new models, and strategies to utilize effectively and purchase softwares. Also, I propose an optimal model for network environment and management, which is core to establish master plan of information system. Network is divided into internal and external network and formula model is proposed to calculate optimal speed of these. And strategy is proposed to maintain security of University preserving its characteristics.

  • PDF

Intrusion Detection for Black Hole and Gray Hole in MANETs

  • She, Chundong;Yi, Ping;Wang, Junfeng;Yang, Hongshen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.7
    • /
    • pp.1721-1736
    • /
    • 2013
  • Black and gray hole attack is one kind of routing disturbing attacks and can bring great damage to the network. As a result, an efficient algorithm to detect black and gray attack is important. This paper demonstrate an adaptive approach to detecting black and gray hole attacks in ad hoc network based on a cross layer design. In network layer, we proposed a path-based method to overhear the next hop's action. This scheme does not send out extra control packets and saves the system resources of the detecting node. In MAC layer, a collision rate reporting system is established to estimate dynamic detecting threshold so as to lower the false positive rate under high network overload. We choose DSR protocol to test our algorithm and ns-2 as our simulation tool. Our experiment result verifies our theory: the average detection rate is above 90% and the false positive rate is below 10%. Moreover, the adaptive threshold strategy contributes to decrease the false positive rate.

A study on the exportation of the e-clearance system of Korea Customs Service to overseas aiming to lead the global trend of Customs informatization (정보화시대 글로벌 리더로의 도약을 위한 관세청 전자통관시스템 해외수출 전략에 대한 연구)

  • Seo, Jae-Yong;Jo, Jeong-Hun
    • 한국디지털정책학회:학술대회논문집
    • /
    • 2006.06a
    • /
    • pp.45-53
    • /
    • 2006
  • Ever since the computer came into being in early 20th century, rapid development of the information technology has led to the opening of the ubiquitous age where daily works can be done anywhere, anytime, and with any devices. The information technology has drawn attention from Customs around the world as a key means to fulfill multi-faced responsibilities of strengthening regional cooperation in the international trade, simplifying clearance procedures, expediting logistics flow, and ensuring security in the global supply chain. Korea Customs Service, which began the informatization effort by establishing the electronic export declaration system in 1992, completed the 100% electronic clearance system in 2000, with a number of countries now conducting benchmarking studies on the successful use of IT by KCS. This paper is to address the changes brought to the Customs administration in the information age, the progress and achievement of the Customs informatization as a proactive strategy to deal with the changing environment, and the exportation to overseas administration of the e-clearance system of KCS which strives to become the global leader of Customs informatization. The exportation. in particular, will not only lead to increased foreign currency earnings and shared know how, but also create an opportunity to reflect Korea's system in the standardization of Customs procedures around the world.

  • PDF

A review of big data analytics and healthcare (빅데이터 분석과 헬스케어에 대한 동향)

  • Moon, Seok-Jae;Lee, Namju
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.1
    • /
    • pp.76-82
    • /
    • 2020
  • Big data analysis in healthcare research seems to be a necessary strategy for the convergence of sports science and technology in the era of the Fourth Industrial Revolution. The purpose of this study is to provide the basic review to secure the diversity of big data and healthcare convergence by discussing the concept, analysis method, and application examples of big data and by exploring the application. Text mining, data mining, opinion mining, process mining, cluster analysis, and social network analysis is currently used. Identifying high-risk factor for a certain condition, determining specific health determinants for diseases, monitoring bio signals, predicting diseases, providing training and treatments, and analyzing healthcare measurements would be possible via big data analysis. As a further work, the big data characteristics provide very appropriate basis to use promising software platforms for development of applications that can handle big data in healthcare and even more in sports science.

Energy Efficiency Enhancement of TICK -based Fuzzy Logic for Selecting Forwarding Nodes in WSNs

  • Ashraf, Muhammad;Cho, Tae Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4271-4294
    • /
    • 2018
  • Communication cost is the most important factor in Wireless Sensor Networks (WSNs), as exchanging control keying messages consumes a large amount of energy from the constituent sensor nodes. Time-based Dynamic Keying and En-Route Filtering (TICK) can reduce the communication costs by utilizing local time values of the en-route nodes to generate one-time dynamic keys that are used to encrypt reports in a manner that further avoids the regular keying or re-keying of messages. Although TICK is more energy efficient, it employs no re-encryption operation strategy that cannot determine whether a healthy report might be considered as malicious if the clock drift between the source node and the forwarding node is too large. Secure SOurce-BAsed Loose Synchronization (SOBAS) employs a selective encryption en-route in which fixed nodes are selected to re-encrypt the data. Therefore, the selection of encryption nodes is non-adaptive, and the dynamic network conditions (i.e., The residual energy of en-route nodes, hop count, and false positive rate) are also not focused in SOBAS. We propose an energy efficient selection of re-encryption nodes based on fuzzy logic. Simulation results indicate that the proposed method achieves better energy conservation at the en-route nodes along the path when compared to TICK and SOBAS.

CoMP Transmission for Safeguarding Dense Heterogeneous Networks with Imperfect CSI

  • XU, Yunjia;HUANG, Kaizhi;HU, Xin;ZOU, Yi;CHEN, Yajun;JIANG, Wenyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.110-132
    • /
    • 2019
  • To ensure reliable and secure communication in heterogeneous cellular network (HCN) with imperfect channel state information (CSI), we proposed a coordinated multipoint (CoMP) transmission scheme based on dual-threshold optimization, in which only base stations (BSs) with good channel conditions are selected for transmission. First, we present a candidate BSs formation policy to increase access efficiency, which provides a candidate region of serving BSs. Then, we design a CoMP networking strategy to select serving BSs from the set of candidate BSs, which degrades the influence of channel estimation errors and guarantees qualities of communication links. Finally, we analyze the performance of the proposed scheme, and present a dual-threshold optimization model to further support the performance. Numerical results are presented to verify our theoretical analysis, which draw a conclusion that the CoMP transmission scheme can ensure reliable and secure communication in dense HCNs with imperfect CSI.

Global Market Entry Strategy for Smart Personal Recognition-based Non-contact Thermometer Convergence access Control System (스마트 개인 인식기반 비접촉 체열측정기 융합 출입통제시스템의 글로벌 시장 진출전략)

  • Chung, Jason;Kim, hyung-o
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.673-675
    • /
    • 2021
  • Biometric technology is a next-generation information security technology that provides reliability and convenience. As a core technology in the post-corona era, then on-contact biometric access control system is capable of non-face-to-face and automated technology, and is active not only in Korea but also in overseas markets such as the United States, Europe, and the Middle East. There are precautions that must be taken to reflect requirements such as cooperation between companies and approval of the US Food and Drug Admin is tration in developing IoT-based smart device customized sensors and securing H/W systems.

  • PDF

Cloud Computing Strategy Recommendations for Korean Public Organizations: Based on U.S. Federal Institutions' Cloud Computing Adoption Status and SDLC Initiative (한국의 공공기관 클라우드 컴퓨팅 도입 활성화 전략: 미국 연방 공공기관 클라우드 컴퓨팅 도입현황 시사점 및 시스템 개발 수명주기(SDLC) 프로세스 전략을 중심으로)

  • Kang, Sang-Baek Chris
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.103-126
    • /
    • 2015
  • Compared to other countries, cloud computing in Korea is not popular especially in the government sector. One of the reasons for the current not-fully-blossomed situation is partly by early investment in huge government datacenters under Korea's e-government initiative; let alone, there was no strong control tower as well as no enforcing law and ordinances for driving such cloud computing initiative. However, in 2015 March 'Cloud Computing and Privacy Security Act' (hereinafter, Cloud Act) had been passed in the Parliament and from September 2015 Cloud Act was deployed in Korea. In U.S., FedRAMP (Federal Risk Assessment and Management Program) along with Obama Adminstration's 'Cloud First' strategy for U.S. federal institutions is the key momentum for federal cloud computing adoption. In 2015 January, U.S. Congressional Research Service (CRS) has published an extensive monitoring report for cloud computing in U.S. federal institutions. The CRS report which monitored U.S. government cloud computing implementation is indeed a good guideline for Korean government cloud computing services. For this reason, the purpose of the study is to (1) identify important aspects of the enacted Korean Cloud Act, (2) describe recent U.S. federal government cloud computing status, (3) suggest strategy and key strategy factors for facilitating cloud adoption in public organizations reflecting SDLC strategy, wherein.

Distributed Matching Algorithms for Spectrum Access: A Comparative Study and Further Enhancements

  • Ali, Bakhtiar;Zamir, Nida;Ng, Soon Xin;Butt, Muhammad Fasih Uddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1594-1617
    • /
    • 2018
  • In this paper, we consider a spectrum access scenario which consists of two groups of users, namely Primary Users (PUs) and Secondary Users (SUs) in Cooperative Cognitive Radio Networks (CCRNs). SUs cooperatively relay PUs messages based on Amplify-and-Forward (AF) and Decode-and-Forward (DF) cooperative techniques, in exchange for accessing some of the spectrum for their secondary communications. From the literatures, we found that the Conventional Distributed Algorithm (CDA) and Pragmatic Distributed Algorithm (PDA) aim to maximize the PU sum-rate resulting in a lower sum-rate for the SU. In this contribution, we have investigated a suit of distributed matching algorithms. More specifically, we investigated SU-based CDA (CDA-SU) and SU-based PDA (PDA-SU) that maximize the SU sum-rate. We have also proposed the All User-based PDA (PDA-ALL), for maximizing the sum-rates of both PU and SU groups. A comparative study of CDA, PDA, CDA-SU, PDA-SU and PDA-ALL is conducted, and the strength of each scheme is highlighted. Different schemes may be suitable for different applications. All schemes are investigated under the idealistic scenario involving perfect coding and perfect modulation, as well as under practical scenario involving actual coding and actual modulation. Explicitly, our practical scenario considers the adaptive coded modulation based DF schemes for transmission flexibility and efficiency. More specifically, we have considered the Self-Concatenated Convolutional Code (SECCC), which exhibits low complexity, since it invokes only a single encoder and a single decoder. Furthermore, puncturing has been employed for enhancing the bandwidth efficiency of SECCC. As another enhancement, physical layer security has been applied to our system by introducing a unique Advanced Encryption Standard (AES) based puncturing to our SECCC scheme.