• Title/Summary/Keyword: Security Design

Search Result 3,382, Processing Time 0.032 seconds

A Study on Research Trends in the Smart Farm Field using Topic Modeling and Semantic Network Analysis (토픽모델링과 언어네트워크분석을 활용한 스마트팜 연구 동향 분석)

  • Oh, Juyeon;Lee, Joonmyeong;Hong, Euiki
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.203-215
    • /
    • 2022
  • The study is to investigate research trends and knowledge structures in the Smart Farm field. To achieve the research purpose, keywords and the relationship among keywords were analyzed targeting 104 Korean academic journals related to the Smart Farm in KCI(Korea Citation Index), and topics were analyzed using the LDA Topic Modeling technique. As a result of the analysis, the main keywords in the Korean Smart Farm-related research field were 'environment', 'system', 'use', 'technology', 'cultivation', etc. The results of Degree, Betweenness, and Eigenvector Centrality were presented. There were 7 topics, such as 'Introduction analysis of Smart Farm', 'Eco-friendly Smart Farm and economic efficiency of Smart Farm', 'Smart Farm platform design', 'Smart Farm production optimization', 'Smart Farm ecosystem', 'Smart Farm system implementation', and 'Government policy for Smart Farm' in the results of Topic Modeling. This study will be expected to serve as basic data for policy development necessary to advance Korean Smart Farm research in the future by examining research trends related to Korean Smart Farm.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.

A Study on Developing the Compliance for Infringement Response and Risk Management of Personal Information to Realize the Safe Artificial Intelligence Services in Artificial Intelligence Society (지능정보사회의 안전한 인공지능 서비스 구현을 위한 개인정보 침해대응 및 위기관리 컴플라이언스 개발에 관한 연구)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.1-14
    • /
    • 2022
  • This study tried to suggest crisis management compliance to prevent personal information infringement accidents that may occur in the process because the data including personal information is being processed in the artificial intelligence (AI) service process. To this end, first, the AI service provision process is divided into 3 processes such as service planning/data design and collection process, data pre-processing and purification process, and algorithm development and utilization process. And 3 processes are subdivided into 9 stages following to personal information processing stages to infringe personal information. All processes were investigated with literature and experts' Delphi. Second, the investigated personal information infringement factors were selected through FGI, Delphi, etc. for experts. Third, a survey was conducted with experts on the severity and possibility of each personal information infringement factor, and the validity and adequacy of the 94 responses were verified. Fourth, to present appropriate risk management compliance for personal information infringement factors in AI services, a method for calculating the risk level of personal information infringement is prepared by utilizing the asset value of personal information, personal information infringement factors, and the possibility of infringement accidents. Through this, the countermeasures for personal information infringement incidents were suggested according to the scored risk level.

A research on cyber target importance ranking using PageRank algorithm (PageRank 알고리즘을 활용한 사이버표적 중요성 순위 선정 방안 연구)

  • Kim, Kook-jin;Oh, Seung-hwan;Lee, Dong-hwan;Oh, Haeng-rok;Lee, Jung-sik;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.115-127
    • /
    • 2021
  • With the development of science and technology around the world, the realm of cyberspace, following land, sea, air, and space, is also recognized as a battlefield area. Accordingly, it is necessary to design and establish various elements such as definitions, systems, procedures, and plans for not only physical operations in land, sea, air, and space but also cyber operations in cyberspace. In this research, the importance of cyber targets that can be considered when prioritizing the list of cyber targets selected through intermediate target development in the target development and prioritization stage of targeting processing of cyber operations was selected as a factor to be considered. We propose a method to calculate the score for the cyber target and use it as a part of the cyber target prioritization score. Accordingly, in the cyber target prioritization process, the cyber target importance category is set, and the cyber target importance concept and reference item are derived. We propose a TIR (Target Importance Rank) algorithm that synthesizes parameters such as Event Prioritization Framework based on PageRank algorithm for score calculation and synthesis for each derived standard item. And, by constructing the Stuxnet case-based network topology and scenario data, a cyber target importance score is derived with the proposed algorithm, and the cyber target is prioritized to verify the proposed algorithm.

Convergence Plan of IT Social Safety and SIB by Expanding Sharing Information Data (공유정보 데이터 확대로 인한 IT와 SIB의 사회인식)

  • Seo, DaeSung;Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.97-105
    • /
    • 2022
  • This study deals with the credibility of citizens when investing in uncertain project companies, as well as the Social Performance Compensation Project (SIB) and the IT sharing economy. This allows the convergence of the three sectors to address investment inequalities in economic effectiveness and social security. Activates the model of the overall Social Impact Bond (SIB) process that successfully activates the exchange of information. The empirical presentation of the operations and techniques for social IT service finance examines how the innovation ecosystem can be created with social performance and reward projects. The analysis shows that small sharing institutions or citizens can participate directly to create the ability to connect with private investors, identify the possibility of recognizing non-shared barriers to participation, and show the great impact of citizen trust in IT sharing projects in uncertain areas. As a result, for the sake of social sharing and IT cooperation promoted by the City of Seoul, before the project has the ability to design directly, it will be responsible for reliability and safety in the planning of the project. Therefore, non-shared citizens can also participate in the platform that has been effectively constructed and created.

Effect of supplementation and withdrawal of selenium-enriched kale sprouts on productivity and egg selenium concentration of laying hens

  • Anut Chantiratikul;Pinyada Thongpitak;Orawan Arunsangseesod;Eakapol Wangkahart;Kwanyuen Leamsamrong;Worapol Aengwanich;Juan Boo Liang;Wu Xin;Piyanete Chantiratikul
    • Animal Bioscience
    • /
    • v.36 no.3
    • /
    • pp.484-491
    • /
    • 2023
  • Objective: The aim of this trial was to investigate the effect of supplementation and withdrawal of selenium-enriched kale sprouts (SeKS) on productivity and egg Se concentration of laying hens. Selenium from commercial Se-enriched yeast (SeY) was used as a comparative Se source. Methods: One-hundred and eighty 61-week-old laying hens were randomly divided into 5 treatment groups with 4 replicates (9 hens each) in a 2×2+1 Augmented Factorial Experiment in a completely randomized design. The experimental diets were basal diet, basal diet supplemented with 0.2 and 0.4 mg Se/kg from SeKS and SeY, respectively. The 8-week feeding trial was divided into 2 periods, namely the Se supplemental period (week 1 to 4) and the Se withdrawal period (week 5 to 8). Results: Productive performance, egg quality and egg Se concentration of laying hens were not affected by sources of Se (SeKS and SeY) during both, the Se supplemental and withdrawal periods. Egg production and egg Se concentration increased (p<0.05) with increasing levels of Se supplementation. The egg Se concentration increased and reached a peak 1 week after Se supplementation. However, concentration of Se in eggs of hens fed Se from both sources decreased rapidly from the second week of the Se withdrawal period to reach the same egg Se concentration of hens fed the basal diet by the fourth week of the Se withdrawal period. Conclusion: The efficacy of Se from SeKS on productivity and egg Se concentration in laying hens was comparable to commercial SeY. Thus, SeKS can provide an alternate organic Se source for production of Se-enriched eggs.

Design and Implementation of Economical Smart Wall Switch with IEEE 802.11b/g/n

  • Myeong-Chul Park;Hyoun-Chul Choi;Cha-Hun Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.103-109
    • /
    • 2023
  • In this paper, we propose a smart wall switch based on IEEE 802.11b/g/n standard 2.4GHz band communication. As the 4th industrial era evolves, smart home solution development is actively underway, and application cases for smart wall switches are increasing. Most of the Chinese products that preoccupy the market through price competitiveness use Bluetooth and Zigbee communication switches. However, while ZigBee communication is low power, communication speed is slower than Bluetooth and network configuration through a separate hub is additionally required. The Bluetooth method has problems in that the communication range and speed are lower than Wi-Fi communication, the communication standby time is relatively long, and security is weak. In this study, an IEEE 802.11b/g/n smart wall switch applied with Wi-Fi communication technology was developed. In addition, through the two-wire structure, it is designed so that no additional cost is incurred through the construction of a separate neutral line in the building. The result of the study is more than 30% cheaper than the existing wall switch, so it is judged that it will be able to preoccupy the market not only in terms of technological competitiveness but also price competitiveness.

Study on the Aging Transformation Scheme of Baima Tibetan Community Environment Based on ERG theory (ERG 이론을 바탕으로 한 바이마장족(白馬藏族)지역사회 환경의 고령친화적 개선 방안 연구)

  • Liu Jing Yun;Wang Lu Ming
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.175-184
    • /
    • 2023
  • The elderly in rural areas are faced with the dilemma of poor community environment, weak social communication ability and insufficient pension knowledge reserve. In addition, due to the serious shortage of social security facilities in rural areas and medical resources, the elderly are struggling, and the suicide rate is far higher than that in urban areas. In order to make the elderly have a comfortable pension environment and face the increasingly serious aging problem with a positive attitude, this paper takes the community environment of the Baima Tibetan elderly in Tielou Township, Gansu Province as the research object of aging transformation. First of all, literature data were used to carry out research on the aging transformation in rural areas. On the basis of sorting out previous research topics, ERG theory was determined as the guide. Secondly, the research methods of on-site investigation, interview and other research methods are adopted to investigate the number of left-behind elderly people in this area, and classify them according to the national standards. At the same time, the image of the current situation of the community environment of the elderly. Finally, combined with the ERG theory, the transformation design of the elderly living environment is implemented, mainly from the three aspects of survival, mutual relationship and growth.

Determination of Types and Element on Parking Ramp (주차장 램프 형식 결정 및 제원 산정에 관한 연구)

  • Kwon, Sung-Dae;Kim, Yoon-Mi;Nam, Chang-Kyu;Ha, Tae-Jun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.5
    • /
    • pp.2021-2031
    • /
    • 2013
  • Due to the rapid economic growth within the nation, the quality of life of individuals have improved dramatically. The scope of living activities of individuals have also extended, resulting in a rapidly increasing demand for automobiles. The number of vehicles registered in Korea is rapidly increasing and will reach 188.71 million as of December 2012. Compared to the registered residents of 50.94 million provided by the Ministry of Public Administration and Security, the registered population reflects about 4 people per every automobile. Due to the high demands for vehicles, the demands for parking lots in collective housing and businesses are also increasing. In reality, the current state of expansion of parking lots are underground, due to the limited available space on ground level. Specifically, the slope of a parking lot cannot exceed 17% linear slope and 14% curved slope according to the 'parking lot laws', however studies show that the driver feels at risk for safety when stopped on the parking ramp while driving in the parking lot. This study seeks to examine the suitability of parking lot ramps, concerning the safety aspects of the driver. First, the ramp type was categorized as linear or curved, then test drives were performed based on variations of slopes, slant distances, directions and points. A survey was administered to the driver after the completion of the test drive, in order to element design for an ideal ramp. In the case of curved ramp, the results of the estimate suggests a counterclockwise, slope at a maximum of 12% incline. The maximum slope for a linear ramp was analyzed to be between 13~14%, suggesting that slope greater than 15% need to be eliminated. In conclusion, it is anticipated that the element design parking ramp reported in this study will help to serve as a reference for future parking lot related guidelines, and provide cost effective traffic safety mechanisms in future parking lot businesses to follow.

Design of a Bit-Serial Divider in GF(2$^{m}$ ) for Elliptic Curve Cryptosystem (타원곡선 암호시스템을 위한 GF(2$^{m}$ )상의 비트-시리얼 나눗셈기 설계)

  • 김창훈;홍춘표;김남식;권순학
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1288-1298
    • /
    • 2002
  • To implement elliptic curve cryptosystem in GF(2$\^$m/) at high speed, a fast divider is required. Although bit-parallel architecture is well suited for high speed division operations, elliptic curve cryptosystem requires large m(at least 163) to support a sufficient security. In other words, since the bit-parallel architecture has an area complexity of 0(m$\^$m/), it is not suited for this application. In this paper, we propose a new serial-in serial-out systolic array for computing division operations in GF(2$\^$m/) using the standard basis representation. Based on a modified version of tile binary extended greatest common divisor algorithm, we obtain a new data dependence graph and design an efficient bit-serial systolic divider. The proposed divider has 0(m) time complexity and 0(m) area complexity. If input data come in continuously, the proposed divider can produce division results at a rate of one per m clock cycles, after an initial delay of 5m-2 cycles. Analysis shows that the proposed divider provides a significant reduction in both chip area and computational delay time compared to previously proposed systolic dividers with the same I/O format. Since the proposed divider can perform division operations at high speed with the reduced chip area, it is well suited for division circuit of elliptic curve cryptosystem. Furthermore, since the proposed architecture does not restrict the choice of irreducible polynomial, and has a unidirectional data flow and regularity, it provides a high flexibility and scalability with respect to the field size m.