• Title/Summary/Keyword: Interface Security

Search Result 374, Processing Time 0.023 seconds

A Study on the Implementation of Management System Based on UHD Transmission Contents (UHD 송출 콘텐츠 기반 관리시스템 구현)

  • Kim, Moo Yeon;Jang, Byung Min;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.813-826
    • /
    • 2019
  • This paper is a study on the implementation of MAM(Media Asset Management) to utilize UHD contents as high quality broadcast material. The implementation method of this paper is to separate MAM roles with content management functions and transmission workflow functions from workflow, metadata and system interface related work, which are divided into core MAM and MAM-Ex structure. Through the method proposed in this paper, we improved the content management method by applying the page menu method to the material metadata modification and applying the template method to the material structure API. In addition, the storage of UHD material and the configuration of the component server are pooled without any distinction of channels, thereby enhancing the security of UHD transmission assets by minimizing the movement of contents together with broadcasting material protection.

UX Evaluation of Financial Service Chatbot Interactions (금융 서비스 챗봇의 인터렉션 유형별 UX 평가)

  • Cho, Gukae;Yun, Jae Young
    • Journal of the HCI Society of Korea
    • /
    • v.14 no.2
    • /
    • pp.61-69
    • /
    • 2019
  • Recently, as a new ICT trend, emerging chatbots are actively introduced in the field of finance. Chatbot conducts services through the interaction of communication with users. The purpose of this study is to investigate the effect of interaction dialogue type on the efficiency, usability, sensibility and perceived security of financial service chatbot. Based on theoretical considerations, I have divided into closed conversation, open conversation, and mixed conversation type based on the conversation style based on the implementation method of chatbot. Three types of Financial Chatbot prototypes were made and the experiments were conducted after account inquiry, account transfer, Q & A financial task execution. As a result of experimental research analysis, chatbot's interaction dialogue type was found to affect efficiency and usability. Users have shown that the interaction of closed conversations and mixed conversations is an intuitive interface that allows financial services to be easily manipulated without error. This study will be used as a resource to improve the user experience that requires deep understanding of financial chatbot users who should consider both the emotional element of artificial intelligence that provides services through natural conversation and the functional elements that perform financial business can be.

Network Configuration Study for Multi-Satellite Operations (다중위성운영을 위한 네트워크 구성 방안 연구)

  • Baek, Hyun Chul;Jang, In Sik;Lee, Sang Jeong;Kim, Byung Chul;Lee, Jae Yong
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.4
    • /
    • pp.1-9
    • /
    • 2019
  • Integration of satellites with diverse missions, such as broadcast-communication, earth, meteorologicaland marine observations, and navigation, is vulnerable. The problems of the currently constructed ground station network were analyzed by constructing the test environment. Based on this, we designed a network that was capable of operating multiple satellites by one ground station. In addition, we proposed an interface and network configuration method with domestic and foreign ground stations. The network linking the domestic and foreign ground stations was composed of KREONET (Korea Research Environment Open Network) and GLORIAD (Global Ring Network for Advanced Application Development) of the KISTI(Korea Institute of Science and Technology Information). The internal network consists of VPN (Virtual Private Network), DMZ(De-Militarized Zone), and 1-way USB and so forth. By constructing the network by using the proposed method, harmful data, such as virus inflow and infection, can be blocked.

Proposal of the development plan for the ROK military data strategy and shared data model through the US military case study (미군 사례 고찰을 통한 한국군 데이터 전략 및 공유 데이터 모델 개발방안 제안)

  • Lee, Hak-rae;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.6
    • /
    • pp.757-765
    • /
    • 2021
  • To carry out multi-domain operations included in the U.S. Department of Defense's national security strategy in 2018, timely data sharing between C4I systems is critical. Several studies of the Korean military have also raised the problems of interface and standardization between C4I systems, and it is necessary to establish a new plan to solve this problem. In this study, a solution to the problem was derived through case analysis that the U.S. Department of Defense has been pursuing for about 20 years to implement the data strategy after establishing the data strategy in 2003. and by establishing a data strategy suitable for the ROK military C4I system operating environment, developing a data model, selecting a standard for data sharing, and proposing a shared data development procedure, we intend to improve the data sharing capability between ROK military C4I systems.

A Study on the Importance of Measures for Improving PLM System Usage (PLM 시스템 활용도 향상 방안의 중요도에 관한 연구)

  • Yoo, Jong Kwang;Rim, Seong Taek;Min, Dai Hwan
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.239-269
    • /
    • 2022
  • Purpose This paper attempts to identify items for improving the usage of PLM(Product Lifecycle Management) systems and suggests ways to prioritize improvement items on the basis of importance. It also tries to find out differences in the importance of improvement items due to the company size, the industry, the job, or the PLM solution. Design/methodology/approach Through a survey from participants to a PLM System Conference, data were collected from a sample of 181 users who had the previous experience in using a PLM system. In order to figure out the differences in the importance among user groups, the F-test with the Scheffe test as a post-hoc analysis was used in case of equal variances and the Welch test with the Dunnett T3 test was used in case of unequal variances. Findings This study sorted out 25 improvement ideas according to their importance assessed by the PLM system users. The top five ideas are improving data consistency, error minimization, fast system response time, enhancing user recognition, and business process improvement. The support group puts higher importance than the general user group in data consistency, fast system response time, enhancing user recognition, business process improvement, dedicated team for data consistency, continuous support from management, hardware performance upgrade, output linkage to other systems, and shortening problem solving duration. The largest company group attaches significantly higher weights than the smallest company group to data consistency, error minimization, fast system response time, business process improvement, dedicated team for data consistency, security with proper access management, output linkage to other systems, and better user interface.

Changes in a facial recognition algorithm following different types of orthognathic surgery: a comparative study

  • Kim, Won-Yong;Han, Se Jin
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.48 no.4
    • /
    • pp.201-206
    • /
    • 2022
  • Objectives: Contemporary biometric technologies have been gaining traction in both public and private security sectors. Facial recognition is the most commonly used biometric technology for this purpose. We aimed to evaluate the ability of a publicly available facial recognition application program interface to calculate similarity scores of presurgical and postsurgical photographs of patients who had orthognathic surgery. Materials and Methods: Presurgical and postsurgical photographs of 75 patients who had orthognathic surgery between January 2018 and November 2020 in our department were used. Frontal photographs of patients in relaxed and smiling states were taken. The patients were classified into three groups: Group 2 had one-jaw surgery, Group 3 had two-jaw surgery to correct mandibular prognathism, and Group 4 had two-jaw surgery to correct facial asymmetry. For comparison, photographs of 10 participants were used as controls (Group 1). Two facial recognition application programs (Face X and Azure) were used to assess similarity scores. Results: The similarity scores in the two programs showed significant results. The similarity score of the control group, which did not undergo orthognathic surgery, was the highest. The results for Group 2, Group 3, and Group 4 were higher in the order of Group 2, Group 3, and Group 4. Conclusion: In this study, all orthodontic patients were recognized as the same person using the face recognition program before and after surgery. A significant difference in similarity results was obtained between the groups with both Face X and Azure and in both relaxed and smiling states.

Key Technology for Food-Safety Traceability Based on a Combined Two-Dimensional Code

  • Zhonghua Li;Xinghua Sun;Ting Yan;Dong Yang;Guiliang Feng
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.139-148
    • /
    • 2023
  • Current food-traceability platforms suffer from problems such as inconsistent traceability standards, a lack of public credibility, and slow access to data. In this work, a combined code and identification method was designed that can achieve more secure product traceability using the dual anti-counterfeiting technology of a QR code and a hidden code. When the QR code is blurry, the hidden code can still be used to effectively identify food information. Based on this combined code, a food-safety traceability platform was developed. The platform follows unified encoding standards and provides standardized interfaces. Based on this innovation, the platform not only can serve individual food-traceability systems development, but also connect existing traceability systems. These will help to solve the problems such as non-standard traceability content, inconsistent processes, and incompatible system software. The experimental results show that the combined code has higher accuracy. The food-safety traceability platform based on the combined code improves the safety of the traceability process and the integrity of the traceability information. The innovation of this paper is invoking the combined code united the QR code's rapidity and the hidden code's reliability, developing a platform that uses a unified coding standard and provides a standardized interface to resolve the differences between multi-food-traceability systems. Among similar systems, it is the only one that has been connected to the national QR code identification platform. The project has made profits and has significant economic and social benefits.

Strengthening security structure of open Blockchain platform to enhance privacy protection of DApp users (DApp 사용자의 프라이버시 보호 강화를 위한 공개형 블록체인 플랫폼 보안구조 강화방안)

  • Hwang, Seonjin;Ko, DongHyun;Bahk, Taeu;Choi, Yoon-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2020
  • Along with the growth of Blockchain, DApp (Distributed Application) is getting attention. As interest in DApp grows, market size continues to grow and many developers participate in development. Many developers are using API(Application Programming Interface) services to mediate Blockchain nodes, such as Infura, for DApp development. However, when using such a service, there is a serious risk that the API service operator can violate the user's privacy by 1 to 1 matching the account address of the Transaction executed by the DApp user with the IP address of the DApp user. It can have an adverse effect on the reliability of public Blockchains that need to provide users with a secure DApp service environment. The proposed Blockchain platform is expected to provide user privacy protection from API services and provide a reliable DApp use environment that existing Blockchain platforms did not provide. It is also expected to help to activate DApp and increase the number of DApp users, which has not been activated due to the risk of an existing privacy breach.

Performance Enhancement Method Through Science DMZ Data Transfer Node Tuning Parameters (Science DMZ 데이터 전송 노드 튜닝 요소를 통한 성능 향상 방안)

  • Park, Jong Seon;Park, Jin Hyung;Kim, Seung Hae;Noh, Min Ki
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.33-40
    • /
    • 2018
  • In an environment with a large network bandwidth, maximizing bandwidth utilization is an important issue to increase transmission efficiency. End-to-end transfer efficiency is significantly influenced by factors such as network, data transfer nodes, and intranet network security policies. Science DMZ is an innovative network architecture that maximizes transfer performance through optimal solution of these complex components. Among these, the data transfer node is a key factor that greatly affects the transfer performance depending on storage, network interface, operating system, and transfer application tool. However, tuning parameters constituting a data transfer node must be performed to provide high transfer efficiency. In this paper, we propose a method to enhance performance through tuning parameters of 100Gbps data transfer node. With experiment result, we confirmed that the transmission efficiency can be improved greatly in 100Gbps network environment through the tuning of Jumbo frame and CPU governor. The network performance test through Iperf showed improvement of 300% compared to the default state and NVMe SSD showed 140% performance improvement compared to hard disk.

Wearable Technology with Future Fabrics (웨어러블 테크놀로지와 미래 소재)

  • Park, Hye-Sook;Lee, Jae-Jung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.12 s.159
    • /
    • pp.1800-1809
    • /
    • 2006
  • The wearable technology takes the concept of clothing over its limits -integrating software, communication devices, and sensors into the garments to enable them to 'think' for the wearer. A dress is no longer just a dress, but a dress as well as a wearable computer interface. This wearable computer network transports the data power and control signals within the wearer's personal space. The purpose of this thesis is to explore the wearable technology from a commercial perspective. On this theme I made a survey and interviewed 20 men and 20 women in London to find out if many people are familiar with the concept of the wearable technology. The main results of this study include: Firstly, according to the survey, people are not familiar with the concept of the wearable technology, and further people thought negatively about the wearable computer rather than positively they worried about hish prices, inappropriate technology and side effects. Secondly, people are especially interested in items related to health and security, so in this area there are huge potential opportunities for the wearable technology, Finally, wearable technology needs to be a simplified set of interactive devices, which are in a user friendly format for marketability because convenience was one of the biggest concern for consumers. Therefore, development of the wearable computer should be promoted not only through computer engineering but also through the connection with human lift.