• Title/Summary/Keyword: Information security industry

Search Result 963, Processing Time 0.324 seconds

A Basic Study of iBUM Development based on BIM/GIS Standard Information for Construction of Spatial Database (공간자료 구축을 위한 BIM/GIS 표준정보 기반 건축도시통합모델(iBUM)의 개발에 관한 기초연구)

  • Ryu, Jung Rim;Choo, Seung Yeon
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.27-41
    • /
    • 2014
  • Recently, BIM(Building Information Modeling) has been applied to the infrastructure such as road and bridge, and information about the outside environment of buildings is needed for maintaining and managing the large urban facilities. In addition, the convergence between spatial information and Big-data has a large potentiality, in respect that considerable profits and developments in other application problems such as various simulations and urban plans, national land security, may be brought about on the basis of the interoperability of information between BIM and GIS. Therefore, this study attempted to suggest the development direction of a model integrating building for spatial information analysis and city on the subject by comparing and analyzing difference between information system and shape expression of IFC, CityGML and LandXML to efficiently link information between IFC as a standard model of BIM and CityGML as a standard model in the GIS sector and to prepare a basic fusion strategy and a method of utilization between BIM and GIS. The result of the study are as follow. Firstly, contents and structure of IFC, CityGML and LandXML are compared and analyzed. Secondly, the development direction of iBUM(Integrated Building and Urban Model) suggested, which is based on convergence technology for analysis of space information. Finally, a strategy and method of the BIM and GIS are proposed in the iBUM environment.

A Secure Mobile Message Authentication Over VANET (VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1087-1096
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) using wireless network is offering the communications between vehicle and vehicle(V2V) or vehicle and infrastructure(V2I). VANET is being actively researched from industry field and university because of the rapid developments of the industry and vehicular automation. Information, collected from VANET, of velocity, acceleration, condition of road and environments provides various services related with safe drive to the drivers, so security over network is the inevitable factor. For the secure message authentication, a number of authentication proposals have been proposed. Among of them, a scheme, proposed by Jung, applying database search algorithm, Bloom filter, to RAISE scheme, is efficient authentication algorithm in a dense space. However, k-anonymity used for obtaining the accurate vehicular identification in the paper has a weak point. Whenever requesting the righteous identification, all hash value of messages are calculated. For this reason, as the number of car increases, a amount of hash operation increases exponentially. Moreover the paper does not provide a complete key exchange algorithm while the hand-over operation. In this paper, we use a Received Signal Strength Indicator(RSSI) based velocity and distance estimation algorithm to localize the identification and provide the secure and efficient algorithm in which the problem of hand-over algorithm is corrected.

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

Participation Types of Private Security Guards in Leisure Activities and the Effect of Leisure Constraint on Life Quality (민간경호원의 여가활동 참여유형 및 여가제약이 삶의 질에 미치는 영향)

  • Park, Joon-Ho;Choi, Pan-Am;Jo, Sung-Gu
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.2
    • /
    • pp.161-171
    • /
    • 2011
  • This research puts the purpose in elucidating the effect of participation types of leisure activity and leisure restraints on life quality. To achieve research purpose, questionnaire survey was conducted on 200 subjects who are engaged in private guard companies with ages over 20. Using the collected data, frequency analysis was conducted in order to identify demographic characteristics with SPSS/WIN 17.0V program. In addition, multiple regression analysis was conducted for solving research questions. As a result, sports related participation type had a positive effect on time constraint factor. Meanwhile, hobby related participation type had a positive effect on time and cost constraint, participation type of watching has a positive effect on individual and social constraint. Tour and play related participation type had a positive effect on individual constraint factor. Meanwhile participation type of sociality had a positive effect on individual constraint and hobby factor, but had a negative effect on familial and social constraint. Sports related participation type had a positive effect on social relationship factor. Participation type of watching and play related participation type had a negative effect on family relationship. Finally, time constraint factor had a positive effect on family relationship, and cost constraint factor had a positive effect on entire quality of life. Individual and family constraint factors had a negative effect on leisure relationship factor. Also, social constraint factor had a positive effect on family relationship, but had a negative effect on leisure relationship.

A Comparative Analysis of Ensemble Learning-Based Classification Models for Explainable Term Deposit Subscription Forecasting (설명 가능한 정기예금 가입 여부 예측을 위한 앙상블 학습 기반 분류 모델들의 비교 분석)

  • Shin, Zian;Moon, Jihoon;Rho, Seungmin
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.97-117
    • /
    • 2021
  • Predicting term deposit subscriptions is one of representative financial marketing in banks, and banks can build a prediction model using various customer information. In order to improve the classification accuracy for term deposit subscriptions, many studies have been conducted based on machine learning techniques. However, even if these models can achieve satisfactory performance, utilizing them is not an easy task in the industry when their decision-making process is not adequately explained. To address this issue, this paper proposes an explainable scheme for term deposit subscription forecasting. For this, we first construct several classification models using decision tree-based ensemble learning methods, which yield excellent performance in tabular data, such as random forest, gradient boosting machine (GBM), extreme gradient boosting (XGB), and light gradient boosting machine (LightGBM). We then analyze their classification performance in depth through 10-fold cross-validation. After that, we provide the rationale for interpreting the influence of customer information and the decision-making process by applying Shapley additive explanation (SHAP), an explainable artificial intelligence technique, to the best classification model. To verify the practicality and validity of our scheme, experiments were conducted with the bank marketing dataset provided by Kaggle; we applied the SHAP to the GBM and LightGBM models, respectively, according to different dataset configurations and then performed their analysis and visualization for explainable term deposit subscriptions.

Analysis of Municipal Ordinances for Smart Cities of Municipal Governments: Using Topic Modeling (지방자치단체의 스마트시티 조례 분석: 토픽모델링을 활용하여)

  • Hyungjun Seo
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.41-66
    • /
    • 2023
  • This study aims to reveal the direction of municipal ordinances for smart cities, while focusing on 74 municipal ordinances from 72 municipal governments through topic modeling. As a result, the main keywords that show a high frequency belong to establishment and operations of the Smart City Committee. From the result of topic modeling Latent Dirichlet Allocation(LDA), it classifies municipal ordinances for smart cities into eight topics as follows: Topic 1(security for process of smart cities), Topic 2(promotion of smart city industry), Topic 3(composition of a smart city consultative body for local residents), Topic 4(support system for smart cities), Topic 5(management for personal information), Topic 6(use of smart city data), Topic 7(implementation for intelligent public administration), and Topic 8(smart city promotion). As for topic categorization by region, Topics 5, 6, and 8 which are mostly related to the practical operation of smart cities have a significant portion of municipal ordinances for smart cities in the Seoul metropolitan area. Then, Topics 2, 3, and 4 which are mostly related to the initial implementation of smart cities have a significant portion of municipal ordinances for smart cities in provincial areas.

Cortex M3 Based Lightweight Security Protocol for Authentication and Encrypt Communication between Smart Meters and Data Concentrate Unit (스마트미터와 데이터 집중 장치간 인증 및 암호화 통신을 위한 Cortex M3 기반 경량 보안 프로토콜)

  • Shin, Dong-Myung;Ko, Sang-Jun
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.111-119
    • /
    • 2019
  • The existing smart grid device authentication system is concentrated on DCU, meter reading FEP and MDMS, and the authentication system for smart meters is not established. Although some cryptographic chips have been developed at present, it is difficult to complete the PKI authentication scheme because it is at the low level of simple encryption. Unlike existing power grids, smart grids are based on open two-way communication, increasing the risk of accidents as information security vulnerabilities increase. However, PKI is difficult to apply to smart meters, and there is a possibility of accidents such as system shutdown by sending manipulated packets and sending false information to the operating system. Issuing an existing PKI certificate to smart meters with high hardware constraints makes authentication and certificate renewal difficult, so an ultra-lightweight password authentication protocol that can operate even on the poor performance of smart meters (such as non-IP networks, processors, memory, and storage space) was designed and implemented. As a result of the experiment, lightweight cryptographic authentication protocol was able to be executed quickly in the Cortex-M3 environment, and it is expected that it will help to prepare a more secure authentication system in the smart grid industry.

Design and Implementation Testbed of Home Network based PLC (PLC 기반의 홈 네트워크 테스트베드 설졔 및 구현)

  • Kim, Hyeock-Jin;Han, Kuy-Ban;Jean, Byoung-Chan
    • Journal of the Korea Computer Industry Society
    • /
    • v.10 no.4
    • /
    • pp.143-150
    • /
    • 2009
  • Remote control service, monitoring, gear service of information electronic appliance, various services of security service and so on of Home network that is by link of Ubiquitous environment are offered. These services need verification process through priority test to use and are changed. If test using actuality information electronic device for test, much expenses and time may be invested. Home network test bed offers softness of research using control model and simulator, in this paper, Wish to design and embody home network test bed to do environment construction of home network and test of application service. Because use istent power line just as it is without necessity to establish circuit in addition by solution of home network testbed, expense costs to be less and establishment used easy PLC. Also, propriated Wireless sensor network that use Zigbee by solution of home network testbed. Appliance check and monitor square do by Home Auto that know embodied, and embodied by Home Gateway that interlink terminals of Home Auto and out of.

  • PDF

A study for Internal Accounting Control Based on Computerized Accounting Information System (전산화된 회계정보시스템의 내부회계통제의 운영방안에 관한 연구)

  • 손명철
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1355-1364
    • /
    • 2001
  • Internal control comprises the plan of Organization and all of the coordinate methods and measure adopted within a business to safeguard its assets. check the accuracy and reliability of its accounting data, promote operation efficiency, and encourage adherence to prescribed managerial policies. Internal accounting control is classified into General Control and Application Control. Essential elements of internal accounting control as follows : 1. General Control $\circled1$ Organization and operation controls. $\circled2$ System development and Documentation controls. $\circled3$ Hardware controls. $\circled4$ Software and hardware Accessibility controls. $\circled5$ General systems security and protection 2. Application control $\circled1$Input control. $\circled2$ Processing control. $\circled3$ Output control. Internal accounting control can establish a total management information system by connecting with mana-gement control of a company, and enable decision makers to establish decision support system(DSS), is so vital today.

  • PDF

Utilization Outlook of Medical Big Data in the Cloud Environment (클라우드 환경에서 의료 빅데이터 활용 및 전망)

  • Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.341-347
    • /
    • 2014
  • Among methods of the big data process, big data process under the cloud environment is becoming a main topic. As part of solving faced problem and strengthening industrial competitiveness in the medical and health industry, discussion on ways to activate big data is actively being conducted. Because the reason is a paradigm shift, saving pressure for increasing health care costs, and increased consumer interest for the level of service. In this paper, we find out the relationship between the cloud and big data. And we are to research and analysis a cloud-based big data case in the medical field. Finally we propose the efficient utilization and future outlook. For the smooth functioning of cloud-based medical big data, we have to solve the problems like infrastructure extension, analysis/application software development, and professional manpower training. In addition, we have to correct insufficient laws maintenance to the Cloud utilization, and improve the security and the recognition to personal information, and solve authority for data centralization.