• Title/Summary/Keyword: Information security industry

Search Result 963, Processing Time 0.022 seconds

A Study on Development of EEG-Based Password System Fit for Lifecaretainment (라이프케어테인먼트에 적합한 뇌파 기반 패스워드 시스템 개발에 관한 연구)

  • Yang, Gi-Chul
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.8
    • /
    • pp.525-530
    • /
    • 2019
  • Electroencephalography(EEG) studies that have been in clinical research since the discovery of brainwave have recently been developed into brain-computer interface studies. Currently, research is underway to manipulate robot arms and drones by analyzing brainwave. However, resolution and reliability of EEG information is still limited. Therefore, it is required to develop various technologies necessary for measuring and interpreting brainwave more accurately. Pioneering new applications with these technologies is also important. In this paper, we propose development of a personal authentication system fit for lifecaretainment based on EEG. The proposed system guarantees the resolution and reliability of EEG information by using the Electrooculogram and Electromyogram(EMG) together with EEG.

Design of Smart City Considering Carbon Emissions under The Background of Industry 5.0

  • Fengjiao Zhou;Rui Ma;Mohamad Shaharudin bin Samsurijan;Xiaoqin Xie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.4
    • /
    • pp.903-921
    • /
    • 2024
  • Industry 5.0 puts forward higher requirements for smart cities, including low-carbon, sustainable, and people-oriented, which pose challenges to the design of smart cities. In response to the above challenges, this study introduces the cyber-physical-social system (CPSS) and parallel system theory into the design of smart cities, and constructs a smart city framework based on parallel system theory. On this basis, in order to enhance the security of smart cities, a sustainable patrol subsystem for smart cities has been established. The intelligent patrol system uses a drone platform, and the trajectory planning of the drone is a key problem that needs to be solved. Therefore, a mathematical model was established that considers various objectives, including minimizing carbon emissions, minimizing noise impact, and maximizing coverage area, while also taking into account the flight performance constraints of drones. In addition, an improved metaheuristic algorithm based on ant colony optimization (ACO) algorithm was designed for trajectory planning of patrol drones. Finally, a digital environmental map was established based on real urban scenes and simulation experiments were conducted. The results show that compared with the other three metaheuristic algorithms, the algorithm designed in this study has the best performance.

Board Game Design for Disaster Safety Education for Elementary School Students Based on Learning Motivation Theory (학습동기이론 기반의 초등학생 재난안전 교육을 위한 보드게임 설계)

  • Kim Mira;Jung Hyungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.20 no.1
    • /
    • pp.59-74
    • /
    • 2024
  • In order to improve safety consciousness due to the increase in disasters and safety accidents, safety education is necessary to prepare for disasters with interest in safety. This study is a board game design for disaster safety education for elementary school students based on Keller's learning motivation theory. By considering the school safety curriculum and the safety education contents of the School Safety Mutual Aid Association and the Ministry of Public Administration and Security, the content and goals of learning were derived and the order of learning was determined. When designing game content, the fun elements of the game were applied to Keller's learning motivation inducing factors such as attention concentration (A), relevance (R), confidence (C), satisfaction (S), and educational game design elements to induce the achievement of learning goals at the game planning stage. It is expected that the existing safety education focusing on lecture-style and audiovisual will be supplemented and used in the educational field.

Control Policy for the Land Remote Sensing Industry (미국(美國)의 지상원격탐사(地上遠隔探査) 통제제탁(統制制度))

  • Suh, Young-Duk
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.20 no.1
    • /
    • pp.87-107
    • /
    • 2005
  • Land Remote Sensing' is defined as the science (and to some extent, art) of acquiring information about the Earth's surface without actually being in contact with it. Narrowly speaking, this is done by sensing and recording reflected or emitted energy and processing, analyzing, and applying that information. Remote sensing technology was initially developed with certain purposes in mind ie. military and environmental observation. However, after 1970s, as these high-technologies were taught to private industries, remote sensing began to be more commercialized. Recently, we are witnessing a 0.61-meter high-resolution satellite image on a free market. While privatization of land remote sensing has enabled one to use this information for disaster prevention, map creation, resource exploration and more, it can also create serious threat to a sensed nation's national security, if such high resolution images fall into a hostile group ie. terrorists. The United States, a leading nation for land remote sensing technology, has been preparing and developing legislative control measures against the remote sensing industry, and has successfully created various policies to do so. Through the National Oceanic and Atmospheric Administration's authority under the Land Remote Sensing Policy Act, the US can restrict sensing and recording of resolution of 0.5 meter or better, and prohibit distributing/circulating any images for the first 24 hours. In 1994, Presidential Decision Directive 23 ordered a 'Shutter Control' policy that details heightened level of restriction from sensing to commercializing such sensitive data. The Directive 23 was even more strengthened in 2003 when the Congress passed US Commercial Remote Sensing Policy. These policies allow Secretary of Defense and Secretary of State to set up guidelines in authorizing land remote sensing, and to limit sensing and distributing satellite images in the name of the national security - US government can use the civilian remote sensing systems when needed for the national security purpose. The fact that the world's leading aerospace technology country acknowledged the magnitude of land remote sensing in the context of national security, and it has made and is making much effort to create necessary legislative measures to control the powerful technology gives much suggestions to our divided Korean peninsula. We, too, must continue working on the Korea National Space Development Act and laws to develop the necessary policies to ensure not only the development of space industry, but also to ensure the national security.

  • PDF

Goodness-of-Fit of Job Burnout Scale in Private Security Guards (민간경비원을 위한 직무소진 척도 문항의 적합도)

  • Lee, Jun-Woo;Lee, Jong-Hwan;Kim, Eui-Young
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.161-183
    • /
    • 2014
  • The job burnout of the private security guards who provide services through contact with customers can affect the overall the private security industry. So the managers need to make efforts to diagnose and evaluate the job burnout and provide continuous provision for the repatriation effect. However, up to the present, the job burnout measure for the private security guards has not been provided, so the objectivity of the information is questionable. For this reason, in order to establish the goodness of fit of the job burnout scale for private security guards based on the contents of the job burnout scale that was being provided to other service employees, this research aims to provide the scale to provide objective information compared with that of the past by applying the Rasch model of the item response theory. To achieve this purpose, the data on 379 private security guards working for the private security guard companies in the Gyeonggi region were collected, and the data were processed to suit the research purpose using SPSS 18.0 and AMOS 18.0, Winsteps programs. Through these research procedures, the following conclusion was obtained. With regard to the private security guards' measure of job burnout, as a result of factor analysis through the collected data, 4 questions were deleted, and as a result of the analysis of the goodness of the fit based on 18 questions, 4 questions were found to be inappropriate questions that did not satisfy the standard value, and the scope of the difficulty level of the questions from - 98 to 1.30 and the response reaction of a 5-point scale were found to suit the final private security guards' job burnout scale. In other words, the conclusion that it is appropriate to measure the private security guards job burnout scale with 3 factors and 13 questions was obtained. So if private security guards companies collect systematic data using the scale established in this research, and practice refresher training accordingly, they can reduce the private security guards' job burnout.

  • PDF

A Security Architecture for ID-Based Cryptographic Schemes in Ad Hoc Networks (Ad Hoc 네트워크에서 신원기반 암호기법을 위한 보안구조 설계)

  • Park Young-Ho;Rhee Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.974-987
    • /
    • 2005
  • As the ad hoc networks have been received a great deal of attention to not only the military but also the industry applications, some security mechanisms are required for implementing a practical ad hoc application. In this paper, we propose a security architecture in ad hoc networks for the purpose of supporting ID-based public key cryptosystems because of the advantage that ID-based schemes require less complex infrastructure compared with the traditional public key cryptosystems. We assume a trusted key generation center which only issues a private key derived from IDs of every nodes in the system setup phase, and use NIL(Node ID List) and NRL(Node Revocation List) in order to distribute the information about IDs used as public keys in our system. Furthermore, we propose a collaborative status checking mechanism that is performed by nodes themselves not by a central server in ad-hoc network to check the validity of the IDs.

  • PDF

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

Analysis on the Perception of the Cyber Dysfunction in the Intelligent Information Society According to the Introduction of the Bright Internet Trust Network (Bright Internet 신뢰네트워크 도입에 따른 지능정보사회의 사이버 역기능 해소에 대한 인식 분석)

  • Gyoo Gun Lim;Jae Ik Ahn
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.99-118
    • /
    • 2020
  • At present, our society is developing into the intelligent information society in the wave of the 4th industrial revolution, and this change will have the positive effect of innovating all industry fields. However, due to the duality of technology, there will be positive and negative effects. With intelligence, threats to cyber dysfunction such as hacking, terrorism, privacy infringement, and illegal content distribution will become more serious. Until now, the security system of the Internet has been a proactive security system, but in recent years, a proposal for a trust network, a preventive security system, has been introduced. Therefore, this study aims to analyze the possibility of resolving cyber dysfunction of intelligent information society about Bright Internet, one of trust network technologies. This study defines the cyber dysfunction of the intelligent information society and analyzes the perceptions of changes in the cyber dysfunction of the intelligent information society on the introduction of the five principles of the Bright Internet. The change of cyber dysfunction severity of the intelligent information society due to the introduction of the trust network is analyzed to reflect the technical and social demands. This work will guide the structure of the trust network and the direction of practical technological introduction and its influence.

Unit Process Scheduling System Development and Calculation and Control Method of Planned Leadtime Using Multiple Linear Regression under Make to Order Manufacturing System in Transformer Winding Process (변압기 권선공정에서의 수주 제작품의 단위공정 일정관리 시스템 개발과 다중회귀분석을 이용한 계획 리드타임 산출 및 관리 방안)

  • Kang, Dae-Wan;Kang, Chang-Wook;Kang, Hae-Woon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.3
    • /
    • pp.117-124
    • /
    • 2008
  • Ultra-high voltage transformer industry has characteristic of small quantity batch production system by other order processing unlike general mass production systems. In this industry, observance of time deadline is very important in market competitive power security and company continued existence. The transformer winding is a process that rolls a coil is coated with an electric insulation material in order to generate the required voltage using the voltage fluctuation. The winding process is very important production process in the extra-high voltage transformer manufacturing industry because winding process is core process that occupy weight about half of whole process and is process that decide current ratio of transformer. This paper proposes a statistical calculation and control method of planned leadtime on the basis of real data and informations for the A company in transformer winding process. Moreover, we develop unit process scheduling system.

On Study for the CIM By DAS(DATA Acquisition System) (CIM구축을 위한 생산현장의 정보화 사례연구)

  • Lee, Jong-Hyung;Lee, Youn-Heui
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.8 no.2
    • /
    • pp.69-76
    • /
    • 2005
  • This study for Customer Satisfaction(Customer Focus) by Profit security' in the field Process improvement activity and man-power upgrade by DAS(DATA Acquisition System) in the Plant that is fusion Off Line and On Line(IT), Especially the basic of the most foundation in the beginning Step of Toyota system is 3-jeong(a standard instrument; right volume, right box, right position), 5S(Seiri, Seiton, Seisoh, Seiketsu, Sitsuke ; KAISEN, KANBNA System(for Logistic), Further more KPC has established the digital environment such as CIM ; Computer Integrated Manufacturing), IMS ; Intelligent Manufacturing System ERP ; Enterprise Resource Planning, DAS; Data Acquisition System, Autonomous QC & SPC etc,.) in order to realize the intelligent informatization, which is core base for obtaining the competitive power and for responding to the various 21C management environment in flexibility. In this digital management environment, continuously and powerfully they would advance for becoming the best of the world. For strategic changes to take place in industry 3 key important factors need to be included ; Integration of tasks function and process, Decentralization of information, Responsibility, Finally simplification of products and product structures.

  • PDF