• Title/Summary/Keyword: Network Separation System

Search Result 122, Processing Time 0.022 seconds

Profane or Not: Improving Korean Profane Detection using Deep Learning

  • Woo, Jiyoung;Park, Sung Hee;Kim, Huy Kang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.305-318
    • /
    • 2022
  • Abusive behaviors have become a common issue in many online social media platforms. Profanity is common form of abusive behavior in online. Social media platforms operate the filtering system using popular profanity words lists, but this method has drawbacks that it can be bypassed using an altered form and it can detect normal sentences as profanity. Especially in Korean language, the syllable is composed of graphemes and words are composed of multiple syllables, it can be decomposed into graphemes without impairing the transmission of meaning, and the form of a profane word can be seen as a different meaning in a sentence. This work focuses on the problem of filtering system mis-detecting normal phrases with profane phrases. For that, we proposed the deep learning-based framework including grapheme and syllable separation-based word embedding and appropriate CNN structure. The proposed model was evaluated on the chatting contents from the one of the famous online games in South Korea and generated 90.4% accuracy.

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

Image Analysis Fuzzy System

  • Abdelwahed Motwakel;Adnan Shaout;Anwer Mustafa Hilal;Manar Ahmed Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.163-177
    • /
    • 2024
  • The fingerprint image quality relies on the clearness of separated ridges by valleys and the uniformity of the separation. The condition of skin still dominate the overall quality of the fingerprint. However, the identification performance of such system is very sensitive to the quality of the captured fingerprint image. Fingerprint image quality analysis and enhancement are useful in improving the performance of fingerprint identification systems. A fuzzy technique is introduced in this paper for both fingerprint image quality analysis and enhancement. First, the quality analysis is performed by extracting four features from a fingerprint image which are the local clarity score (LCS), global clarity score (GCS), ridge_valley thickness ratio (RVTR), and the Global Contrast Factor (GCF). A fuzzy logic technique that uses Mamdani fuzzy rule model is designed. The fuzzy inference system is able to analyse and determinate the fingerprint image type (oily, dry or neutral) based on the extracted feature values and the fuzzy inference rules. The percentages of the test fuzzy inference system for each type is as follow: For dry fingerprint the percentage is 81.33, for oily the percentage is 54.75, and for neutral the percentage is 68.48. Secondly, a fuzzy morphology is applied to enhance the dry and oily fingerprint images. The fuzzy morphology method improves the quality of a fingerprint image, thus improving the performance of the fingerprint identification system significantly. All experimental work which was done for both quality analysis and image enhancement was done using the DB_ITS_2009 database which is a private database collected by the department of electrical engineering, institute of technology Sepuluh Nopember Surabaya, Indonesia. The performance evaluation was done using the Feature Similarity index (FSIM). Where the FSIM is an image quality assessment (IQA) metric, which uses computational models to measure the image quality consistently with subjective evaluations. The new proposed system outperformed the classical system by 900% for the dry fingerprint images and 14% for the oily fingerprint images.

Web-based Information System Construction of Animal Manure Matching Service for Recycling Agriculture (경축순환농업을 위한 가축분뇨 자원화 웹기반 정보은행 구축)

  • Ryoo, Jong-Won;Choi, Deog-Cheon
    • Korean Journal of Organic Agriculture
    • /
    • v.21 no.1
    • /
    • pp.1-18
    • /
    • 2013
  • Animal and crop production systems were integrated on a single farm. This integrated farming system recycled nutrients on the farm. The separation of animal and crop production with the introduction of cheap commercial fertilizers, farms were not used land-applied manure. The on-line manure matching is one of the emerging business in the achievement of recycling and resource recovery. The manure matching actively promotes the reuse and recycling of by-products and manure. This study constructs to manure matching information system to solve the exchange problems between herders and croppers. Manure matching web sites designed. This paper introduces a web-based animal manure matching system. A manure matching service, part of the manure transport, links farmers who produce excess manure with farmers who can use the manure. Farmers registered with the service have requested manure. The manure matching service supports the transport project by linking farmers with excess manure with those farmers who can utilize the manure safely as a nutrient source. The goal of the service is to protect water quality by fostering efficient land application. Benefits to those who use the manure network include reduced disposal costs, lower purchase costs and recycling of manure. The manure matching is based on the principle that 'one persons waste is another person's fertilizer.' It provides a free online matchmaking service for environmentally safe manure recycling management system.

Efficient Load Balancing Technique through Server Load Threshold Alert in SDN (SDN 환경에서의 서버 부하 임계치 경고를 통한 효율적인 부하분산 기법)

  • Lee, Jun-Young;Kwon, Tea-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.5
    • /
    • pp.817-824
    • /
    • 2021
  • The SDN(Software Defined Networking) technology, which appeared to overcome the limitations of the existing network system, resolves the rigidity of the existing system through the separation of HW and SW in network equipment. These characteristics of SDN provide wide scalability beyond hardware-oriented network equipment, and provide flexible load balancing policies in data centers of various sizes. In the meantime, many studies have been conducted to apply the advantages of SDN to data centers and have shown their effectiveness. The method mainly used in previous studies was to periodically check the server load and perform load balancing based on this. In this method, the more the number of servers and the shorter the server load check cycle, the more traffic increases. In this paper, we propose a new load balancing technique that can eliminate unnecessary traffic and manage server resources more efficiently by reporting to the controller when a specific level of load occurs in the server to solve this limitation.

A Study on Cooperative-Intelligent Transport System Attack Scenarios and their Prevention and Response Mechanisms (C-ITS 공격 시나리오와 예방 및 대응 방안 연구)

  • Jang, Yoonsuh;Lee, Dong-Seob;Lim, Dong-Ho;Ahn, So-Hee;Shin, Jeonghoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.6
    • /
    • pp.133-140
    • /
    • 2015
  • C-ITS is a system that uses bidirectional communication between two vehicles or infrastructures to control traffic more conveniently, and safely. If C-ITS security is not properly prepared, it can cause traffic congestions and fatal traffic accidents, and therefore can affect greatly on the driver's life. This paper proposes the prevention and response mechanisms based on the cyber attack scenarios that can be used to attack C-ITS.

Design and Implementation of Arduino-based Lightweight Vibration Monitoring System (아두이노 기반의 경량 진동 모니터링 시스템 설계 및 구현)

  • Kwon, Dong-hyun;Lim, Ji-yong;Heo, Sung-uk;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.586-589
    • /
    • 2017
  • The vibration monitoring system using the sensor network is used in various fields. However, in case of the vibration of the existing products, the size of the monitoring system is increased due to the separation of the sensor data collection function and the communication function. In this paper, we design and implement a lightweight vibration monitoring system using the MQTT protocol, which is oneM2M device standard protocol for the Arduino and Ethernet modules, to monitor frequent earthquakes and vibrations in narrow places.

  • PDF

A Study on Setting the Grade of Vertical Evacuation Rank to Introduce an USN-based Evacuation System into Super High-rise Apartment Housing's (초고층 공동주택의 USN기반 피난시스템 도입을 위한 수직적 피난위계 설정에 관한 연구)

  • Hong, Won-Hwa;Jeon, Gyu-Yeob;Choi, Jun-Ho
    • Journal of the Korean housing association
    • /
    • v.18 no.5
    • /
    • pp.133-141
    • /
    • 2007
  • The purpose of this study is to secure an evacuation time and to ensure safety by using an Ubiquitous Sensor Network computing when a fire breaks out at a super high-rise apartment housing. A super high-rise apartment housing that is a type of building to solve the problem of separation of the urban function and the phenomenon of hollowing out downtown has been on the increase, high-rise apartment housings occupying 52.7% of whole housings in 2005. However, if a fire breaks out, there would be serious damage since it accommodates many people and facilities as existence of vertical gigantism in the city. The architectural law in force has no clause on it which is universally applicable to general building, it is difficult to be applicable to a densely super high-rise apartment housing and there would be in danger of a resident's evacuation in the fire. Therefore, as a previous study to introduce an USN-based fire-warning facility and evacuation equipment, this study shows the improvement way after analyzing factors that are barriers to evacuaee's behavior of a super high-rise apartment housing and also shows establishment of the grade of vertical evacuation rank by SimuleX, one of the best computer simulation program.

Delimitation of Jurisdiction of Commercial, Civil and Administrative Courts: IT Challenges

  • Baranenko, Dmytro;Stepanova, Tetiana;Pillai, Aneesh V.;Kostruba, Anatolii;Akimenko, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.85-90
    • /
    • 2022
  • In modern conditions of the development of public relations, there is a continuous development of technologies. This not only reflects the convenience of service users, and new technology but also contributes to the emergence of new disputes to protect the rights of stakeholders. Therefore, it is urgent to study the distinctions between the jurisdiction of commercial, civil and administrative courts in resolving IT disputes. The work aims to study the peculiarities of delimitation of the jurisdiction of commercial, civil, and administrative courts through the prism of IT measurement. The research methodology consists of such methods as a historical, comparative-legal, formal-logical, empirical, method of analogy, method of synthesis, method of analysis, and systematic method. Examining the specifics of delimiting the jurisdiction of commercial, civil, and administrative courts through the IT dimension, it was concluded that there is a problem in determining the jurisdiction of the court. In addition, the judicial practice on this issue is quite variable, which negatively affects the predictability of technology in resolving potential disputes. In this regard, the criterion models for distinguishing between commercial, administrative, and civil proceedings according to the legal classification of the parties, as well as the nature of the claim are identified. This separation will contribute to a more accurate application of legal norms and methods of application of administrative norms and reduce the number of cases of improper proceedings.

A Spectrum Sharing Model for Compatibility between IMT-Advanced and Digital Broadcasting

  • Hassan, Walid A.;Rahman, Tharek Abd
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2073-2085
    • /
    • 2012
  • Recently, the International Telecommunication Union allocated the 470-862 MHz band to the digital broadcasting (DB) service. Moreover, the 790-862 MHz sub-band will be allocated to the next-generation mobile system, known as the International Mobile Telecommunication - Advanced (IMT-A), and to the DB on a co-primary basis in the year 2015. Currently, two candidate technologies are available to represent the IMT-A system; the Mobile WiMAX and Long Term Evolution - Advanced (LTE-A). One of the main criteria of the IMT-A candidate is to not cause additional interference to the primary service (i.e., DB). In this paper, we address the spectrum sharing issue between the IMT-A candidates and the DB service. More precisely, we investigate the interference effect between the DB service and the mobile network, which could be either LTE-A or WiMAX. Our study proposes a spectrum sharing model to take into account the impact of interference and evaluates the spectrum sharing requirements such as frequency separation and separation distance. This model considers three spectrum sharing scenarios: co-channel, zero guard band, and adjacent channel. A statistical analysis is performed, by considering the interferer spectrum emission mask and victim receiver blocking techniques. The interference-to-noise ratio is used as an essential spectrum sharing criterion between the systems. The model considers the random distribution of the users, antenna heights, and the bandwidth effect as well as the deployment environment in order to achieve spectrum sharing. The results show that LTE-A is preferable to WiMAX in terms of having less interference impact on DB; this can eventually allow the operation of both services without performance degradation and thus will lead to efficient utilization of the radio spectrum.