• Title/Summary/Keyword: SMB Information Systems

Search Result 99, Processing Time 0.028 seconds

A Study on Countermeasures using Moire Recognition and Vulnerability of Cryptographic Transaction Protocol (암호화폐 거래 프로토콜의 취약점과 무아레 인식을 이용한 대응방안에 관한 연구)

  • Kim, Jin-Woo;Lee, Keun-Ho;Yun, Sunghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.86-91
    • /
    • 2019
  • Block chains began by recognizing the danger of centralized control of financial systems after the 2008 financial crisis. From the beginning of 2008, blockchain has been developing a lot of attention and technology, starting with a tremendous innovation called cryptographic destruction based on technology, a block chain called Bitcoin. However, the vulnerability has also been discovered over time and the damage has been repeated. But in the fourth industry of the 21st century, many advances and technologies based on them are expected to emerge. Therefore, this paper proposes new analytical transaction protocols for vulnerabilities in cryptographic currency transactions. The proposed transaction protocol is a way to authenticate once again at the end of the transaction and the transaction is concluded with this authentication. It presents countermeasures by adding security elements between users to the transaction process rather than internal security to transaction vulnerabilities.

A Study on gateway authentication protocol in IoT (IoT에서 게이트웨이에 대한 인증 프로토콜에 관한 연구)

  • Lee, Jae-Young
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.91-96
    • /
    • 2017
  • IoT which is an abbreviation of Internet of Things refers to the communication network service among various objects such as people-people, objects-objects interconnection. The characteristic of IoT that enables direct connection among each device makes security to be considered as more emphasized factor. Though a security module such as an authentication protocol for resolving various security problems that may occur in the IoT environment has been developed, some weak points in security are still being revealed. Therefore, this paper proposes a method for including a protocol including gateway authentication procedure and mutual authentication between the devices and gateways. Protocols with additional authentication procedures can appropriately respond to attackers' spoofing attacks. In addition, important information in the message used for authentication process is protected by encryption or hash function so that it can respond to wiretapping attacks.

Identification of unfavorable clause and directionality through the analysis of legal system of autonomous driving vehiecle in Korea (국내 자율주행자동차 관련 법률 및 제도 분석과 한계점 도출 및 방향성 제안)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.38-44
    • /
    • 2019
  • As 4th industrial revolution era has come, autonomous driving vehiecle gets its attention for commercialization and development and thus its impact on society. To this end, several countries such as US, England and Germany are preparing their own legal systems to come up with commercialization of autonomous driving vehiecle. In this country, Korea is also developing autonomous driving vehiecle and looking forward its commercialization yet the legal system of Korea lacks of laws, regulations, rules, guidelines and so on. Hence, it is our intention to look into Korean legal system providing the analysis of current Korean legal system in detail. This paper also provides further directions to have balance between commercialization success and risk management in this country and, as a result creates a small step toward 4th industrial revolution society.

Development of Product Recommender System using Collaborative Filtering and Stacking Model (협업필터링과 스태킹 모형을 이용한 상품추천시스템 개발)

  • Park, Sung-Jong;Kim, Young-Min;Ahn, Jae-Joon
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.83-90
    • /
    • 2019
  • People constantly strive for better choices. For this reason, recommender system has been developed since the early 1990s. In particular, collaborative filtering technique has shown excellent performance in the field of recommender systems, and research of recommender system using machine learning has been actively conducted. This study constructs recommender system using collaborative filtering and machine learning based on stacking model which is one of ensemble methods. The results of this study confirm that the recommender system with the stacking model is useful in aspects of recommender performance. In the future, the model proposed in this study is expected to help individuals or firms to make better choices.

Development of Ground Control Software Platform for Industrial Application with Multiple small UAVs (복수 소형무인비행체 산업 응용을 위한 지상관제소프트웨어 플랫폼 개발)

  • Lim, Bae-Hyeon;Ha, Seok-Wun;Moon, Yong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.75-82
    • /
    • 2017
  • Recently, as the roles and utilization fields of UAV become more diverse, demand for high - level mission has been increasing. To solve this issue, researches on the operation of multiple small UAVs and related systems have been actively carried out. The multiple small UAVs based application system has a problem that the task complexity of control personnel increases because the control personnel must continuously control and manage several small UAVs. Hence, it is necessary to develop a software platform that can perform efficient control in order to employ a multiple small UAVs based application system successfully. In this paper, we propose an effective ground control software platform for application systems using multiple small UAVs. We first analyze the requirements for the software platform, and design and implement software based on the analysis. Simulation using the X-plane flight simulator shows that multiple flight data are effectively displayed and that the image data transmitted from many small UAVs are simultaneously displayed in real time.

A Study on the Influence of Automatic Control System on the Production of Chemical Propylene (자동제어 시스템이 케미칼 프로플린 생산에 미치는 영향 연구)

  • Lee, Oh Sick;Leem, Choon Seong
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.2
    • /
    • pp.34-42
    • /
    • 2019
  • In this study, we analyzed the effects of the automatic control system on the reactor operation. The Propyrene Reactor process is complex and typically is inefficient and costly due to the lack of productivity. In this study, a research model was presented with the aim of supplementing obstacles to enhance operational efficiency and increase productivity. The configuration of the existing processes was analyzed to complement the hardware and software systems with original models. The composition of the facility is applied to eight reactor units producing 600,000 ton/year propylene per year. As a result of applying the research model, efficiency of operation was increased, and production volume increased from 90 to 95%, along with 91% Reliability. Future studies will present a research model to improve productivity by 100 percent. In addition, we will study the stability and productivity improvement of PSA (Pressure Swing Adsorption) systems, which are the hydrogen production process of propylene by-products.

Development of Checking System for Emergency using Behavior-based Object Detection (행동기반 사물 감지를 통한 위급상황 확인 시스템 개발)

  • Kim, MinJe;Koh, KyuHan;Jo, JaeChoon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.6
    • /
    • pp.140-146
    • /
    • 2020
  • Since the current crime prevention systems have a standard mechanism that victims request for help by themselves or ask for help from a third party nearby, it is difficult to obtain appropriate help in situations where a prompt response is not possible. In this study, we proposed and developed an automatic rescue request model and system using Deep Learning and OpenCV. This study is based on the prerequisite that immediate and precise threat detection is essential to ensure the user's safety. We validated and verified that the system identified by more than 99% of the object's accuracy to ensure the user's safety, and it took only three seconds to complete all necessary algorithms. We plan to collect various types of threats and a large amount of data to reinforce the system's capabilities so that the system can recognize and deal with all dangerous situations, including various threats and unpredictable cases.

A Study of Response and Plan to Decrease Damage of ISP Secure Payment (ISP 안전결제 서비스 피해를 최소화하기 ISP 대응방안 연구)

  • Kim, Byung-Man;Ma, Sangjun
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.33-38
    • /
    • 2015
  • The damage to the security is increasing as public key-based ISP secure payment service is used in online banking payment system. Security technology aspect to ISP secure payment security has no special problems. But, security damage that occurs due to the simplicity of the payment system is a problem. In this paper, we propose response and plan for ISP secure payment service to minimize the damage that occurs due to the simplicity of a security settlement system. Proposed scheme is applicable to various billing systems such as secure payments, online payment, mobile payment, credit card. Proposed scheme is characterized in that can stably support the capabilities of the new billing system. Also, proposed scheme is to analyze the various security threats arising from the payment of the financial services and to describe response and plan technology.

  • PDF

A Study on Radio Interference Analysis for Wireless LAN (무선랜을 위한 전파 간섭 분석 연구)

  • Kim, Ji-Hee;Cho, Jung Hyun;Cho, Dae-Jea;Son, Dong-Cheul
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.5
    • /
    • pp.117-122
    • /
    • 2017
  • In a wireless communication system, increasing the channel capacity with a limited frequency is a problem in all frequency bands. Increasing the frequency bandwidth and increasing the output can increase the channel capacity, but sometimes the communication is not possible due to interference noise. If the radio frequency allocation is set to world standardization such as WRC or ITU-R, each country has strict control over regulations. This is because one wireless communication system should not affect other systems. We present the results of a study on scenarios and analysis of radio waves to be installed inside and outside the aircraft without interfering with the wireless LAN.

The effect of prioritizing big data in managerial accounting decision making (관리회계 의사결정에 있어 빅 데이터 우선순위 설정의 효과)

  • Kim, Kyung-Ihl
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.10-16
    • /
    • 2021
  • As the implementation of smart factories spreads widely, the need for research to improve data efficiency is raised by prioritizing massive amounts of big data using IoT devices in terms of relevance and quality. The purpose of this study is to investigate whether prioritizing big data in management accounting decisions such as cost volatility estimation and recipe optimization can improve smart solution performance and decision-making effectiveness. Based on the survey answers of 84 decision makers at domestic small and medium-sized manufacturers who operate smart solutions such as ERP and MES that link manufacturing data in real time, empirical research was conducted. As a result, it was analyzed that setting prioritization of big data has a positive effect on decision-making in management accounting. became In addition, it was found that big data prioritization has a mediating effect that indirectly affects smart solution performance by using big data in management accounting decision making. Through the research results, it will be possible to contribute as a prior research to develop a scale to evaluate the correlation between big data in the process of business decision making.