• Title/Summary/Keyword: Security Enhancement

Search Result 356, Processing Time 0.031 seconds

A Study on the Enhancement of Fire Resistance Function in Primary Structure Department of Building Type Traditional Market (건물형 전통시장 화재발생시 피난안전성 확보를 위한 규모별 주요구조부 내화보강 연구)

  • Jang, Hye-Min;Hwang, Jung-Ha
    • Fire Science and Engineering
    • /
    • v.34 no.4
    • /
    • pp.87-95
    • /
    • 2020
  • This study evaluates the safety of an asylum through a fire simulation of building Type traditional markets. We derive the building's indoor temperature, use the observed variation in temperature gradient to calculate the temperature of the main structure, and finally compares the time required to attain the limit temperature of the structure its time of escape. To ensure improved security of the asylum, the government has proposed a fire-resistance improvement plan for the major structural parts of buildings are not safe with thickness of 0.01 m and 0.035 m. F.ire-resistance reinforcement for small - and medium-sized vehicles is more than 0.025 m, in thickness; moreover safety can be ensured for medium and large-sized vehicles fire using fire resistant reinforcement of over 0.035 m. Accordingly, in order to ensure the safety of an asylum, fire-resistant reinforcement measures may be considered.

Investigating the Effect of Value Characteristics of SNS Users on SNS Usage Motivation, Social Capital, and Usage Behavior (SNS 이용자의 가치체계의 특징이 SNS 이용동기, 사회적 자본, 이용행위 등에 미치는 영향 분석)

  • Cho, Hyong-Oh
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.351-362
    • /
    • 2018
  • This study investigated how Schwartz' value system(1992) would interfere with SNS users' motivations and behavioral responses. The study result shows that values are characterized in terms of openness, mutual reciprocity, self enhancement, normative compliance, and security. Each of them exerted differential impact on SNS usage motives, social capital, ad response, and word-of-mouth, among others. The five values were used as an input for segmenting SNS users and clustering method produced four value segments; experience seeker, interdependent sympathizer, self enhancer, and norm-bound. Each value group not only influenced SNS perceptions and behavioral responses differently, but also showed a systematic relationship with SNS service types. The study findings demonstrate that Schwartz's value system provides a very useful theoretical basis for understanding the psychological mechanism underlying SNS usage.

A Design of Web Server Architecture Environment for Reliability Enhancement and Secure Web Services (신뢰성 향상과 안전한 웹 서비스를 위한 웹 서버 아키텍처 환경의 설계)

  • Kim, Yong-Tae;Jeong, Yoon-Su;Park, Gil-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.343-350
    • /
    • 2010
  • In the existing design of web server architecture, data encryption technique is used to keep the reliability, stability, and safety of web service. But the use of data encryption technique wastes the work of cpu while decreasing throughput of web server and increasing average response time so that it shows negative effect on the capacity of web application server. Also, the latest web applications require security and safety for the safe internet communication. Therefore, this paper suggests the improved web server which uses thread pool and Non-blocking I/O adding new web service modules to the existing web server for the safe web service, provides reliability and safety to show the safe web service capacity. And we compare and evaluate the safety and capacity through experiment on the existing traditional Tomcat based web server and the proposed system to evaluate the safety and capacity of the proposed web server system.

The Flipped Classroom Design for Capability Enhancement of Big-Data Analysis (빅데이터 분석의 역량 강화를 위한 거꾸로 교실 설계 연구)

  • Jung, Byoungho;Kim, Byungcho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.127-145
    • /
    • 2017
  • The purpose of this study is to empirical case study for the instructional design of flipped classroom by job-capability advancement of IT business majors. A student of IT business school has learned a lot of management educations for four years. But, they don't recognize a connection between school education and business practice. A subject based on the humanities, and social sciences consisted of mostly the memorization. The undergraduate class lack a practice's curriculum by a creative-oriented lesson rather than memorization-oriented. In particular, An IT business is now recognized as a significance emerging IT investment, the Internet of Things, information security, big data and strategy's ERP. For these reasons, it is important for an instructional design for understanding business practices of the students. Accordingly, Flipped classroom with participatory class be needed increasingly for students' practical sense. We will propose a design method of flipped classroom for inspiring business education. In this, new instructional design overturned traditional teaching method. After the student conducts a prior learn at home, school will accomplish a problem solving through question and answer. This design effected a boredom suppress and creative enforcement of student and an intimacy increase of instructor. In addition, A participatory class and reciprocal peer tutoring will be possible by a spontaneous self-directed learning of student. We were designed course of project type based on big data theory and application to target the fourth-year course. In conclusion, the new instruction provided a help to learning synergy between student and lecturer. During the lessons, the student showed improvement of business sense and enhanced problem solving capability. The lecturer has the intimacy through communication interaction with students.

One time password key exchange Authentication technique based on MANET (MANET 기반 원타임 패스워드 키교환 인증기법)

  • Lee, Cheol-Seung;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1367-1372
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on MANET and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier. The suggested authentication technique requires exponentiation and is applicable in the wireless network environment because it transmits data at a time for key sharing, which proves it is a strong and reliable authentication technique based on the complete MANET.

Future Directions and Perspectives on Soil Environmental Researches (토양환경분야 연구동향 및 전망)

  • Yang, Jae-E.;Ok, Yong-Sik;Chung, Doug-Young
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.44 no.6
    • /
    • pp.1286-1294
    • /
    • 2011
  • This paper reviews the future directions and perspectives on the soil environmental researches in the 21 century. Previously, the principal emphasis of soil environmental researches had put on the enhancement of food and fiber productions. Beside the basic function of soil, however, the societal needs on soil resources in the 21st century have demands for several environmental and social challenges, occurring regionally or globally. Typical global issues with which soil science should deal include food security with increasing agronomic production to meet the exploding world population growth, adaptation and mitigation of climate change, increase of the carbon sequestration, supply of the biomass and bioenergy, securing the water resource and quality, protection of environmental pollution, enhancing the biodiversity and ecosystem health, and developing the sustainable farming/cropping system that improve the use efficiency of water and agricultural resources. These challenges can be solved through the sustainable crop production intensification (SCPI) or plant welfare concept in which soil plays a key role in solving the abovementioned global issues. Through implementation of either concept, soil science can fulfill the goal of the modern agriculture which is the sustainable production of crops while maintaining or enhancing the ecosystem function, quality and health. Therefore, directions of the future soil environmental researches should lie on valuing soil as an ecosystem services, translating research across both temporal and spatial scales, sharing and using data already available for other purposes, incorporating existing and new technologies from other disciplines, collaborating across discipline, and translating soil research into information for stakeholders and end users. Through the outcomes of these approaches, soil can enhance the productivity from the same confined land, increase profitability, conserve natural resource, reduce the negative impact on environment, enhance human nutrition and health, and enhance natural capital and the flow of ecosystem services. Soil is the central dogma, final frontier and new engine for the era of sustainability development in the $21^{st}$ century and thus soil environmental researches should be carried according to this main theme.

Analysis of Distributed Cryptocurrency Exchange Model and Issues (분산 암호화폐 거래소 모델 및 이슈 분석)

  • Lee, Tae-Gyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.583-590
    • /
    • 2022
  • With the release of the Bitcoin source in 2009, cryptocurrencies are continuously developing and expanding the market. Recently, new applicability is expanding centered on NFT coin and metaverse payment service. In particular, the Central Cryptocurrency Exchange actively supports relay transactions between cryptocurrencies or between traditional fiat currencies and cryptocurrencies. The cryptocurrency trading market based on such a central exchange encouraged speculative factors of cryptocurrencies, strongly arousing speculation and futility of cryptocurrencies. In addition, the central cryptocurrency exchange induces the centralization of users and virtual assets, thereby hindering the decentralization and security enhancement strategies of the block chain. Therefore, this study describes the current status and problems of centrally controlled centralized cryptocurrency exchanges in service, and presents a distributed cryptocurrency exchange modeling strategy and major issues as a decentralization model of the exchange. This research can strengthen the anonymity, decentralization, and autonomy of cryptocurrency based on blockchain.

Performance Evaluation of Efficient Vision Transformers on Embedded Edge Platforms (임베디드 엣지 플랫폼에서의 경량 비전 트랜스포머 성능 평가)

  • Minha Lee;Seongjae Lee;Taehyoun Kim
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.3
    • /
    • pp.89-100
    • /
    • 2023
  • Recently, on-device artificial intelligence (AI) solutions using mobile devices and embedded edge devices have emerged in various fields, such as computer vision, to address network traffic burdens, low-energy operations, and security problems. Although vision transformer deep learning models have outperformed conventional convolutional neural network (CNN) models in computer vision, they require more computations and parameters than CNN models. Thus, they are not directly applicable to embedded edge devices with limited hardware resources. Many researchers have proposed various model compression methods or lightweight architectures for vision transformers; however, there are only a few studies evaluating the effects of model compression techniques of vision transformers on performance. Regarding this problem, this paper presents a performance evaluation of vision transformers on embedded platforms. We investigated the behaviors of three vision transformers: DeiT, LeViT, and MobileViT. Each model performance was evaluated by accuracy and inference time on edge devices using the ImageNet dataset. We assessed the effects of the quantization method applied to the models on latency enhancement and accuracy degradation by profiling the proportion of response time occupied by major operations. In addition, we evaluated the performance of each model on GPU and EdgeTPU-based edge devices. In our experimental results, LeViT showed the best performance in CPU-based edge devices, and DeiT-small showed the highest performance improvement in GPU-based edge devices. In addition, only MobileViT models showed performance improvement on EdgeTPU. Summarizing the analysis results through profiling, the degree of performance improvement of each vision transformer model was highly dependent on the proportion of parts that could be optimized in the target edge device. In summary, to apply vision transformers to on-device AI solutions, either proper operation composition and optimizations specific to target edge devices must be considered.

Task offloading scheme based on the DRL of Connected Home using MEC (MEC를 활용한 커넥티드 홈의 DRL 기반 태스크 오프로딩 기법)

  • Ducsun Lim;Kyu-Seek Sohn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.61-67
    • /
    • 2023
  • The rise of 5G and the proliferation of smart devices have underscored the significance of multi-access edge computing (MEC). Amidst this trend, interest in effectively processing computation-intensive and latency-sensitive applications has increased. This study investigated a novel task offloading strategy considering the probabilistic MEC environment to address these challenges. Initially, we considered the frequency of dynamic task requests and the unstable conditions of wireless channels to propose a method for minimizing vehicle power consumption and latency. Subsequently, our research delved into a deep reinforcement learning (DRL) based offloading technique, offering a way to achieve equilibrium between local computation and offloading transmission power. We analyzed the power consumption and queuing latency of vehicles using the deep deterministic policy gradient (DDPG) and deep Q-network (DQN) techniques. Finally, we derived and validated the optimal performance enhancement strategy in a vehicle based MEC environment.

A Study on the Digital Customer Experience of Youths (청소년의 디지털 고객 경험에 관한 연구)

  • Jin Hee Son;Jung Jae Lee
    • Journal of Information Technology Services
    • /
    • v.22 no.5
    • /
    • pp.1-16
    • /
    • 2023
  • This study aimed to provide fundamental insights into the digital customer experience by identifying its components and analyzing their importance and satisfaction levels among youths. To achieve this objective, the components of digital customer experience were identified through a review of prior research and consultation with experts. Subsequently, a survey was conducted with 200 youths in Seoul and Gyeonggi-do. The main findings of the study are as follows: First, The components of the digital customer experience consisted of 12 items grouped into three categories. Second, an analysis of the disparity between the importance and satisfaction levels of digital customer experience revealed statistically significant differences across all items. Third, By utilizing IPA (Importance-Performance Analysis), the digital customer experience was categorized into four quadrant, each with its own characteristics and recommendations for management: The first quadrant, the "current level maintenance area," encompassed items related to "entertainment" and "recommended service." This area is currently functioning well but necessitates continuous attention and management. The second quadrant, the "area to be supported first," included items such as "personalization," "security," "inducing participation," "privacy," and "individuality expression." Intensive management and improvements are imperative in this quadrant. The third quadrant, the "long-term improvement area," consisted of items like 'consistency,' 'information quality,' and 'convenience.' These items require focus on long-term enhancement efforts. The fourth quadrant, the "areas where efforts have already been invested," encompassed items like 'accessibility' and 'deliberation.' It appears that excessive investment has been made in these areas relative to their importance, calling for selective investments while considering the specific issues associated with each factor. These research findings serve as essential data for managing the digital customer experiences of youths.