• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.028 seconds

An Adaptive Scalable Encryption Scheme for the Layered Architecture of SVC Video (SVC 비디오의 계층적 구조에 적응적인 스케일러블 암호화 기법)

  • Seo, Kwang-Deok;Kim, Jae-Gon;Kim, Jin-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4B
    • /
    • pp.695-703
    • /
    • 2010
  • In this paper, we propose an adaptive scalable encryption scheme for the layered architecture of SVC video. The proposed method determines an appropriate set of encryption algorithms to be applied for the layers of SVC by considering the importance and priority relationship among the SVC video layers. Unlike the conventional encryption method based on a fixed encryption algorithm for the whole video layers, the proposed method applies differentiated encryption algorithms with different encryption strength the importance of the video layers. Thereupon, higher security could be maintained for the lower video layer including more important data, while lower encryption strength could be applied for the higher video layer with relatively less important data. The effectiveness of the proposed adaptive scalable encryption method is proved by extensive simulations.

Multiple-Background Model-Based Object Detection for Fixed-Embedded Surveillance System (고정형 임베디드 감시 카메라 시스템을 위한 다중 배경모델기반 객체검출)

  • Park, Su-In;Kim, Min Young
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.11
    • /
    • pp.989-995
    • /
    • 2015
  • Due to the recent increase of the importance and demand of security services, the importance of a surveillance monitor system that makes an automatic security system possible is increasing. As the market for surveillance monitor systems is growing, price competitiveness is becoming important. As a result of this trend, surveillance monitor systems based on an embedded system are widely used. In this paper, an object detection algorithm based on an embedded system for a surveillance monitor system is introduced. To apply the object detection algorithm to the embedded system, the most important issue is the efficient use of resources, such as memory and processors. Therefore, designing an appropriate algorithm considering the limit of resources is required. The proposed algorithm uses two background models; therefore, the embedded system is designed to have two independent processors. One processor checks the sub-background models for if there are any changes with high update frequency, and another processor makes the main background model, which is used for object detection. In this way, a background model will be made with images that have no objects to detect and improve the object detection performance. The object detection algorithm utilizes one-dimensional histogram distribution, which makes the detection faster. The proposed object detection algorithm works fast and accurately even in a low-priced embedded system.

DLDW: Deep Learning and Dynamic Weighing-based Method for Predicting COVID-19 Cases in Saudi Arabia

  • Albeshri, Aiiad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.212-222
    • /
    • 2021
  • Multiple waves of COVID-19 highlighted one crucial aspect of this pandemic worldwide that factors affecting the spread of COVID-19 infection are evolving based on various regional and local practices and events. The introduction of vaccines since early 2021 is expected to significantly control and reduce the cases. However, virus mutations and its new variant has challenged these expectations. Several countries, which contained the COVID-19 pandemic successfully in the first wave, failed to repeat the same in the second and third waves. This work focuses on COVID-19 pandemic control and management in Saudi Arabia. This work aims to predict new cases using deep learning using various important factors. The proposed method is called Deep Learning and Dynamic Weighing-based (DLDW) COVID-19 cases prediction method. Special consideration has been given to the evolving factors that are responsible for recent surges in the pandemic. For this purpose, two weights are assigned to data instance which are based on feature importance and dynamic weight-based time. Older data is given fewer weights and vice-versa. Feature selection identifies the factors affecting the rate of new cases evolved over the period. The DLDW method produced 80.39% prediction accuracy, 6.54%, 9.15%, and 7.19% higher than the three other classifiers, Deep learning (DL), Random Forest (RF), and Gradient Boosting Machine (GBM). Further in Saudi Arabia, our study implicitly concluded that lockdowns, vaccination, and self-aware restricted mobility of residents are effective tools in controlling and managing the COVID-19 pandemic.

Critical Appraisal Study of Knowledge Management and its Importance Among Public Sector

  • Gharieb, Magdah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.273-283
    • /
    • 2021
  • The aim of this paper is to review the current knowledge management (KM) practices and their importance in the public sector of Saudi Arabia. Using the term "knowledge management in public sector", a search for available works was done in Google Scholar. In the first stage, the search for literature published under anytime choice was done in the first 10 pages of the search engine. Then another nine pages of Goggle Scholar were searched for more recent works published setting the time as 2014 to 2018. The search yielded 37 usable works for this review. The results of this literature search and review indicated that out of the 37 works reviewed, only three works were related to Saudi Arabia. Number of papers on factors of KM were maximum, many of them giving diagrammatic presentation of their results. KM modelling itself is not easy as only very few papers on KM modelling were available. Problems of too much reliance on qualitative data and hypotheses not matching with the literature backgrounds for them were also found. Considering the works related to KM, the number of papers in various categories may indicate the dimensions of KM to be considered when KM is implemented or evaluated in any public sector of any country. This applies to Saudi Arabian public sector organizations also. There is a fertile ground of research waiting to be investigated by researchers in Saudi Arabia.

Service Quality and Client's Satisfaction of Security-Guard Company (경호${\cdot}$경비업체의 서비스 품질과 고객만족)

  • Kang, Min-Wan;Chang, Ye-Jin;Lee, Young-Sun
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.1-14
    • /
    • 2005
  • The concern of personal and social security has been increased all over the world with each passing day by the international terrorism and the domestic crime of violence grew gradually in the late of 70's and the early of 80's. The Security-Guard Industry, especially, has been growing rapidly by the starting from the 911 terror in 2001, therefore there has been increasing the supply and demand of Security Service in Korea explosively by the reasons, Actually, the Facilities Security Service is increased actively more than the VIP security Service among them. So, most of the Security-Guard Companies in Korea also have treated the Facilities Security Service at present. Although the importance of quality at the Facilities Security Service, especially mechanical equipments and systems, is on the rise, actually the studies about relations with the Service Quality and the Client's Satisfaction are quite insufficient at the field of Security-Guard Science study in the actual situation. As a result, the purposes of this study are to contribute for composing the knowledge of Security-Guard Science and to offer the basic data for elevating the Service Quality and Client's Satisfaction by consulting other studies. In order to achieve the purposes of this study, we compare and analyze how the Service Quality have affect on the difference of Client's Satisfaction by the client's characteristic of sociology and demography, then we find out the effect to the Service Quality for Client's Satisfaction, finally we try to show the vision of the Security-Guard Company's future in Korea. 1. How does the Service Quality of Security-Guard Company has affect on the characteristic of sociology and demography 2. How does the characteristic of sociology and demography in Security-Guard Company has affect on the Client's Satisfaction 3. How does the Service Quality of Security-Guard Company has affect on the Client's Satisfaction.

  • PDF

The Study about Role and Importance of Site Activity Stage in Safety Activity for the International Conference among Several Countries (다자간 국제회의 안전활동에 있어서 현장활동단계의 역할 및 중요성에 관한 연구 : 부산 APEC 행사를 중심으로)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.105-138
    • /
    • 2009
  • This study's purpose is to present the improvement of effectiveness of security activity for international conference among Several Countries which can be held hereafter. On the basis of security activity problems originating in APEC that had been held in Busan in 2005. I made up questions three times to on the members of the police, military, fire figher and national intelligence service who had experienced in Busan APEC and recognition of possible problem and possibility of improvement on each item of questions was analyzed by Delphi Method. Also interviews with 4 security experts selected from each security agency were conducted to present improvement in each part of problem. The results obtained from the face to face interview with four experts of security-enforcement agency about the role and importance of site activity stage for international conference among several countries are as followings ; First, the system that experienced security-enforcement agents can be selected for the next national security event is needed, by data-basing the security-enforcement agents who were experienced in security event as man power management. Second, the middle-term plan for the introduction of high-tech equipment and joint inspection with relevant security agents are needed for the efficient explosive technical detection. Third, high-tech security equipment could be introduced through the international high-tech security equipment exhibition. Fourth, an anti-terrorism plan should be measured by sharing information through the cooperation with domestic and international intelligence agency. Fifth, public relations should be measured systematically by organization rather than agents' individual public relations. Sixth, political consideration to secure integrative coordination with other agency is needed for security activity, through normal cooperation with fire fighting related agency such as an electric, gas, elevator company. Seventh, a definite press guideline is needed for a convenient news coverage and safety during security event.

  • PDF

A Method on the Implementation of Intelligent Security Service Application based on Spatial Information (공간정보기반 지능형 방범서비스 어플리케이션 개발)

  • Choi, Woo Chul;Na, Joon Yeop
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.89-98
    • /
    • 2015
  • In this study, The criteria for assessing the security-related functions and services using spatial information is deduced, and orders of priority a priority for the applicable alternatives of functions/services of intelligent security service application based on spatial information are suggested by calculating relative importance. Also this study suggested connection plan about service implementation of national security services by government ministry & local government. And, the intelligent security app service model which has possible substantiation and commercialization is proposed. This study performed the AHP as the final assessment criterions by 3 item in 1st class and 12 item in 2nd class. And, tried to implementation methods of the intelligent security service application(ex. control of emergency and the crime opportunity, real-time location tracking of protector, the device for missing child & dementia patient, user participation & provision of information).

A Measures to Converge Manage an Efficient Information Security Management System for Information Security Experts Manpower (정보보호 인력양성을 위한 효율적인 정보보호관리체계의 융합 관리 방안)

  • Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.4
    • /
    • pp.81-86
    • /
    • 2014
  • The development in IT technology has brought about various services that are on offer based on a new service model. But such new services have increased security risks. The government is operating a program to foster experts in information security to protect assets from the threat of such risks, too. Society's awareness on the importance of information security has also grown, leading to various courses to train such personnel, including membership clubs for the fostering of such specialists. This study seeks to suggest a method that efficiently manages the convergence of running a curriculum on ISMS(information security management systems) and a club that focuses on information protection. Such converged information security courses are expected to contribute to a safer IT-based society.

Correlation Analysis in Information Security Checklist Based on Knowledge Network (지식 네트워크에 근거한 정보보호 점검기준 관계분석)

  • Jin, Chang Young;Kim, Ae Chan;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.2
    • /
    • pp.109-124
    • /
    • 2014
  • As the emerged importance and awareness for information security, It is being implemented by each industrial sector to protect information assets. In this paper, we analyze the information security checklists or security ratings criteria to derive similarity and difference in context which used to knowledge network analysis method. The analyzed results of all checklists (ISMS, PIMS, 'FSS', 'FISS', 'G') are as follows : First, It is common factors that the protection of information systems and information assets, incident response, operations management. Second, It deals with relatively important factors that IT management, the adequacy of audit activities in the financial IT sector including common factors. Third, the criteria of ISMS contains the majority of the contents among PIMS, 'FSS', 'FISS'and 'G'.

Meta-analysis of Information Security Policy Compliance Based on Theory of Planned Behavior (정보보안 정책준수에 대한 메타분석: 계획된 행동이론을 중심으로)

  • Kim, Jongki;Mou, Jian
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.169-176
    • /
    • 2020
  • With widespread use of information technologies the importance of information security has been heightened. Security policies which deal with fundamental direction of information security are critical elements of information security management. Numerous studies have been conducted on users' intention to comply security policies. They were based on various theoretical foundations and the theory of planned behavior(TPB) was the most frequently used. This research employed one of the quantitatively synthesizing meta-analytic techniques called Two-Stage Structural Equation Modeling to investigate factors influencing information security policy compliance behavior based on TPB. Analysis results indicated that all three factors of TPB were significantly influencing the behavioral intention. Moreover, the overall fit indices of structural model exhibited satisfactory level.