• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.041 seconds

A Detection Method of Fake Fingerprint in Optical Fingerprint Sensor (광학식 지문센서에서의 위조 지문 검출 방법)

  • Lee, Ji-Sun;Kim, Jae-Hwan;Chae, Jin-Seok;Lee, Byoung-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.492-503
    • /
    • 2008
  • With the recent development and increasing importance of personal identification systems, biometric technologies with less risk of loss or unauthorized use are being popularized rapidly. In particular, because of their high identification rate and convenience, fingerprint identification systems are being used much more commonly than other biometric systems such as iris recognition, face recognition and vein pattern recognition. However, a fingerprint identification system has the problem that artificially forged finger-prints can be used as input data. Thus, in order to solve this problem, the present study proposed a method for detecting forged fingerprints by measuring the degree of attenuation when the light from an optical fingerprint sensor passes through the finger and analyzing changes in the transmission of light over stages at fixed intervals. In order to prove improvement in the performance of the proposed system, we conducted an experiment that compared the system with an existing multi-sensor recognition system that measures also the temperature of fingerprint. According to the results of the experiment, the proposed system improved the forged fingerprint detection rate by around 32.6% and this suggests the possibility of solving the security problem in fingerprint identification systems.

  • PDF

Simulation of Evacuation Route Scenarios Through Multicriteria Analysis for Rescue Activities

  • Castillo Osorio, Ever Enrique;Yoo, Hwan Hee
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.37 no.5
    • /
    • pp.303-313
    • /
    • 2019
  • After a disaster happens in urban areas, many people need support for a quick evacuation. This work aims to develop a method for the calculation of the most feasible evacuation route inside buildings. In the methodology we simplify the geometry of the structural and non structural elements from the BIM (Building Information Modeling) to store them in a spatial database which follows standards to support vector data. Then, we apply the multicriteria analysis with the allocation of prioritization values and weight factors validated through the AHP (Analytic Hierarchy Process), in order to obtain the Importance Index S(n) of the elements. The criteria consider security conditions and distribution of the building's facilities. The S(n) is included as additional heuristic data for the calculation of the evacuation route through an algorithm developed as a variant of the $A^*$ pathfinding, The experimental results in the simulation of evacuation scenarios for vulnerable people in healthy physical conditions and for the elderly group, shown that the conditions about the wide of routes, restricted areas, vulnerable elements, floor roughness and location of facilities in the building applied in the multicriteria analysis has a high influence on the processing of the developed variant of $A^*$ algorithm. The criteria modify the evacuation route, because they considers as the most feasible route, the safest instead of the shortest, for the simulation of evacuation scenarios for people in healthy physical conditions. Likewise, they consider the route with the location of facilities for the movement of the elderly like the most feasible in the simulation of evacuation route for the transit of the elderly group. These results are important for the assessment of the decision makers to select between the shortest or safest route like the feasible for search and rescue activities.

Modeling and Selecting Optimal Features for Machine Learning Based Detections of Android Malwares (머신러닝 기반 안드로이드 모바일 악성 앱의 최적 특징점 선정 및 모델링 방안 제안)

  • Lee, Kye Woong;Oh, Seung Taek;Yoon, Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.11
    • /
    • pp.427-432
    • /
    • 2019
  • In this paper, we propose three approaches to modeling Android malware. The first method involves human security experts for meticulously selecting feature sets. With the second approach, we choose 300 features with the highest importance among the top 99% features in terms of occurrence rate. The third approach is to combine multiple models and identify malware through weighted voting. In addition, we applied a novel method of eliminating permission information which used to be regarded as a critical factor for distinguishing malware. With our carefully generated feature sets and the weighted voting by the ensemble algorithm, we were able to reach the highest malware detection accuracy of 97.8%. We also verified that discarding the permission information lead to the improvement in terms of false positive and false negative rates.

The Effects of Authentic Leadership on Employee's In-role Performance in Ppuri Company : Analysis of Moderating Effects between Foreigner and Native (뿌리기업 진정성리더십이 조직원 역할 내 성과에 미치는 영향 : 외국인과 내국인의 조절효과 분석)

  • Shin, Seung-Han;Park, Young-Ju
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.93-104
    • /
    • 2019
  • The ppuri industry is growing in technical importance due to the 4th industrial revolution and is growing steadily. However, securing skilled workers is hardly realistic, and foreign workers are increasing. The purpose of this study is to find organizational commitment on for improvement of in-role performance of foreigners and Koreans working in ppuri companies and to find ways to support differentiation through comparison between groups. The subjects of this study were foreigners and Koreans in the ppuri company. Through the survey, 393 valid samples were collected. We use structural equation modeling to verify the research hypotheses, and conducted a survey on the employees of organization with information security policy. The results showed that in the case of foreigners, balanced processing affects in-role performance through organizational commitment. In the case of Koreans, relational transparency, balanced processing, and internalized moral perspectives affect in-role performance through organizational commitment. The results of the analysis suggest a strategic approach to improve the in-role performance of each group.

The Effect of Income and Expenditure of Households on Disabled Households' Life Satisfaction - Focus on Mediating effect of socio-economic status - (장애인 가구의 소득과 소비지출이 생활만족도에 미치는 영향 - 사회·경제적 지위의 매개효과를 중심으로 -)

  • Lee, Soo-Yong;Song, Chang-Keun
    • 재활복지
    • /
    • v.21 no.2
    • /
    • pp.139-167
    • /
    • 2017
  • The purpose of this study is to investigate the relationship between living satisfaction and income level and expenditure of the Disabled Households' and the mediation role of socioeconomic status in their relationship also the effect of the according to whether they receive basic living or not. The data and sample of total 2,906 households were extracted from the Panel Survey of Employment for the Disabled (PSED) 8th data, and it was analyzed by the SEM(Structural equation model). The study results are as follows. First, Household income is negative effect on Engel and Schwabe Index, Socioeconomic status is positive effect on life satisfaction. and Socioeconomic status is partially mediated in the path between household income and life satisfaction and socioeconomic status full mediates the schwabe index and life satisfaction. Overall, the study results emphasizes the importance of the economic activity for security income of the disabled households, and it discusses about policy directions.

Design of Crypto-processor for Internet-of-Things Applications (사물인터넷 응용을 위한 암호화 프로세서의 설계)

  • Ahn, Jae-uk;Choi, Jae-Hyuk;Ha, Ji-Ung;Jung, Yongchul;Jung, Yunho
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.2
    • /
    • pp.207-213
    • /
    • 2019
  • Recently, the importance for internet of things (IoT) security has increased enormously and hardware-based compact chips are needed in IoT communication industries. In this paper, we propose low-complexity crypto-processor that unifies advanced encryption standard (AES), academy, research, institute, agency (ARIA), and CLEFIA protocols into one combined design. In the proposed crypto-processor, encryption and decryption processes are shared, and 128-bit round key generation process is combined. Moreover, the shared design has been minimized to be adapted in generic IoT devices and systems including lightweight IoT devices. The proposed crypto-processor was implemented in Verilog hardware description language (HDL) and synthesized to gate level circuit in 65nm CMOS process, which results in 11,080 gate counts. This demonstrates roughly 42% better than the aggregates of three algorithm implementations in the aspect of gate counts.

Blockchain-based new identification system (블록체인 기반 새로운 신원확인 체계)

  • Jung, Yong-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.452-458
    • /
    • 2021
  • The value and importance of personal information are increasing due to the increasing number of fields where the Internet environment and computing environment are used, and user authentication technology is also changing. Until now, accredited certificates, which are mainly used in the financial sector, are being replaced with biometric authentication technology due to the problem of revocation. However, another problem is that biometric information cannot be modified once it is leaked. Recently, with the advent of blockchain technology, research on user authentication methods has actively progressed. In this paper, both public certificate and blockchain-based user authentication can be used without system change, and a new DID issuance and reissuance method that can replace the resident registration number is presented. The proposed system can be used without restrictions in a blockchain. However, the currently used DID requires installation of an application at the Interworking Support Center for verification. Since a DID can be authenticated without registering as a member, indiscriminate information collection can be prevented. Security, convenience, and determinism are compared with the existing system, and excellence is proven based on various attack methods, its portability, and proxy use.

Investment policy and trends of agri-food R&D in major overseas countries (해외 주요국가의 농·식품 R&D 투자 정책 및 동향)

  • Hong, Seok-In
    • Food Science and Industry
    • /
    • v.53 no.4
    • /
    • pp.410-421
    • /
    • 2020
  • Regarding a long-term strategic plan in the food and agriculture sector, R&D policies and investment trends in major overseas countries are reviewel. The importance of efficient resource management is emphasized along with continuous government support for R&D in the agri-food industry. In response to facing social issues such as climate change, food security, food safety, health, and environment, research and innovation agenda is mainly focused on harmony between economy and environment, human nutrition and health as well as animal and plant health, and an integrated ecosystem approach. Particularly in the food sector, public investment is generally made in food safety, nutrition and health, and private investment for food processing and manufacturing. Public-private collaboration is carried out in order to enhance the efficiency of R&D innovation and development strategies in the agri-food industry.

Network separation construction method using network virtualization (네트워크 가상화를 이용한 망 분리 구축 방법)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1071-1076
    • /
    • 2020
  • The importance of network separation is due to the use of the Internet with existing business PCs, resulting in an internal information leakage event, and an environment configured to allow servers to access the Internet, which causes service failures with malicious code. In order to overcome this problem, it is necessary to use network virtualization to separate networks and network interconnection systems. Therefore, in this study, the construction area was constructed into the network area for the Internet and the server farm area for the virtualization system, and then classified and constructed into the security system area and the data link system area between networks. In order to prove the excellence of the proposed method, a network separation construction study using network virtualization was conducted based on the basis of VM Density's conservative estimates of program loads and LOBs.

Development of AI-based Cognitive Production Technology for Digital Datadriven Agriculture, Livestock Farming, and Fisheries (디지털 데이터 중심의 AI기반 환경인지 생산기술 개발 방향)

  • Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.1
    • /
    • pp.54-63
    • /
    • 2021
  • Since the recent COVID-19 pandemic, countries have been strengthening trade protection for their security, and the importance of securing strategic materials, such as food, is drawing attention. In addition to the cultural aspects, the global preference for food produced in Korea is increasing because of the Korean Wave. Thus, the Korean food industry can be developed into a high-value-added export food industry. Currently, Korea has a low self-sufficiency rate for foodstuffs apart from rice. Korea also suffers from problems arising from population decline, aging, rapid climate change, and various animal and plant diseases. It is necessary to develop technologies that can overcome the production structures highly dependent on the outside world of food and foster them into export-type system industries. The global agricultural industry-related technologies are actively being modified via data accumulation, e.g., environmental data, production information, and distribution and consumption information in climate and production facilities, and by actively expanding the introduction of the latest information and communication technologies such as big data and artificial intelligence. However, long-term research and investment should precede the field of living organisms. Compared to other industries, it is necessary to overcome poor production and labor environment investment efficiency in the food industry with respect to the production cost, equipment postmanagement, development tailored to the eye level of field workers, and service models suitable for production facilities of various sizes. This paper discusses the flow of domestic and international technologies that form the core issues of the site centered on the 4th Industrial Revolution in the field of agriculture, livestock, and fisheries. It also explains the environmental awareness production technologies centered on sustainable intelligence platforms that link climate change responses, optimization of energy costs, and mass production for unmanned production, distribution, and consumption using the unstructured data obtained based on detection and growth measurement data.