• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.034 seconds

A Conceptual Architecture for Ethic-Friendly AI

  • Oktian, Yustus-Eko;Brian, Stanley;Lee, Sang-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.9-17
    • /
    • 2022
  • The state-of-the-art AI systems pose many ethical issues ranging from massive data collection to bias in algorithms. In response, this paper proposes a more ethic-friendly AI architecture by combining Federated Learning(FL) and Blockchain. We discuss the importance of each issues and provide requirements for an ethical AI system to show how our solutions can achieve more ethical paradigms. By committing to our design, adopters can perform AI services more ethically.

A Study on Corporate Support for Employment of Retirees in Gyeongsangnam-do Employment Crisis

  • Jang, Yumi
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.33-38
    • /
    • 2022
  • Gyeongsangnam-do needed an employment stability response policy to induce re-employment of job seekers who retired due to large-scale unemployment and job instability following the employment crisis, and stable settlement and long-term employment after new employment.This study is to confirm the effective corporate support policy as an employment promotion strategy through new recruitment of the employment crisis in Gyeongsangnam-do. A total of 380 companies in Gyeongsangnam-do were targeted for the survey through online surveys and in-person surveys. As a result of the study, as a measure to improve working conditions through financial support for long-term employment stability, first, support for youth-middle-age asset formation of SME workers is required, and second, support for old-age income guarantee for SME workers was proposed. Third, direct corporate subsidies are continuously needed for job promotion and job stability of Gyeongsangnam-do companies.

Effect of thickness and reinforcement on concrete plates under high speed projectiles

  • Tais, Abdalla S.;Ibraheem, Omer F.;Raoof, Saad M.
    • Structural Engineering and Mechanics
    • /
    • v.82 no.5
    • /
    • pp.587-594
    • /
    • 2022
  • Behavior of concrete elements under the effect of high-speed projectiles has gain increasing interest recently. It's necessary to understand how far the concrete can absorb the effect of bullets in order to save the occupants when design security and military infrastructures. This study presents a total of 18 concrete slabs casted and tested under reinforcement ratios, 0%, 0.35% and 0.7%. Parameters interested were slab thickness, (50 mm, 100 mm, and 150 mm) and type of weapon. All specimens tested to investigate their response under the effect of attacking by two common types of weapon. In general, it was found that projectile penetration was controlled by their thickness regardless the steel reinforcement ratio. However, the steel reinforcement controls the damage.

A study on the efficient method of constrained iterative regular expression pattern matching (제약 반복적인 정규표현식 패턴 매칭의 효율적인 방법에 관한 연구)

  • Seo, Byung-Suk
    • Design & Manufacturing
    • /
    • v.16 no.3
    • /
    • pp.34-38
    • /
    • 2022
  • Regular expression pattern matching is widely used in applications such as computer virus vaccine, NIDS and DNA sequencing analysis. Hardware-based pattern matching is used when high-performance processing is required due to time constraints. ReCPU, SMPU, and REMP, which are processor-based regular expression matching processors, have been proposed to solve the problem of the hardware-based method that requires resynthesis whenever a pattern is updated. However, these processor-based regular expression matching processors inefficiently handle repetitive operations of regular expressions. In this paper, we propose a new instruction set to improve the inefficient repetitive operations of ReCPU and SMPU. We propose REMPi, a regular expression matching processor that enables efficient iterative operations based on the REMP instruction set. REMPi improves the inefficient method of processing a particularly short sub-pattern as a repeat operation OR, and enables processing with a single instruction. In addition, by using a down counter and a counter stack, nested iterative operations are also efficiently processed. REMPi was described with Verilog and synthesized on Intel Stratix IV FPGA.

Comparison of the Difference in Response Time According to the Server Configuration Type of the Indoor Air Quality Improvement System (실내공기질 개선 시스템의 서버 구성 방식에 따른 응답 시간의 차이 비교)

  • Joongjin Kook
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.1
    • /
    • pp.59-63
    • /
    • 2023
  • Various devices have been emerging as a means of measuring indoor air quality, and among them, there are devices that support real-time remote monitoring through IoT technology and a cloud environment. To improve indoor air quality, based on the results determined by measuring devices, air purifiers or ventilation systems may need to be operated, and temperature and humidity control may be required. In this paper, we propose a design of indoor air quality measuring devices required for indoor air quality evaluation, and of the system needed to control relevant devices to improve indoor air quality through the interaction with the measuring devices. Currently, the servers for the interaction of indoor air quality devices and IoT devices are divided into conventional server type and serverless type, comparing the differences in response time of IoT devices to changes of indoor air quality.

  • PDF

Computational continuum modelling to analysis the dynamic and static stability of a cantilever nano-scale system

  • Jiangjiang Li
    • Advances in Computational Design
    • /
    • v.8 no.1
    • /
    • pp.77-96
    • /
    • 2023
  • Calculating size-dependent mechanical properties of the nano-scale materials usually involves cumbersome numerical and theoretical works. In this paper, we aim to present a closed-form relation to calculate the length-dependent Young's modulus of carbon nanotubes (CNTs) based on nonlocal elasticity theory. In this regard, a single wall carbon nanotube (SWCNT) is considered as a rod structure and the governing nonlocal equations are developed under uniaxial tensile load. The equations are solved using analytical methods and strain distribution, total displacement and the size-dependent equivalent Young's modulus are obtained. Further, the results are compared with the molecular dynamics results from the literature. The outcome indicates that the calculated relations are coincident with the molecular dynamics results.

Secured Network Design for Hyper Market by applying MACsec(802.1AE) Protocol (MACsec(802.1AE) 프로토콜 기반 대형마켓 보안 네트워크 설계)

  • Lee, Jun-Won;Park, Seon-Ho;Gum, Ki-Ho;Chung, Tai-Myoung
    • Annual Conference of KIPS
    • /
    • 2010.04a
    • /
    • pp.804-807
    • /
    • 2010
  • 네트워크를 통해 고객의 신용카드 및 매출정보를 전송하는 대형마켓의 경우, 데이터링크 레이어 보안은 매우 중요하다. 본 논문은 현재 WPA/WPA2 형태로 무선 네트워크에 국한되어 있는 데이터링크 레이어 보안수준을 MACsec(IEEE 802.11AE)를 이용하여 전체 데이터링크 레이어 구간으로 확대하고, 나아가 SecY(MAC Security Entity)의 Secure Frame의 처리 방식을 응용한 무선랜 인증방안을 제시하고자 한다.

Design and Implementation of SOiVA Metadata Security System (SOiVA 메타데이터 보안 시스템 설계 및 구현)

  • Kim, Youngman;Kim, Hyung Hwan;Jung, Kiyong;Jung, Taesung
    • Annual Conference of KIPS
    • /
    • 2010.11a
    • /
    • pp.1190-1193
    • /
    • 2010
  • SOiVA는 양방향 동영상 서비스를 위한 TTA 정보통신 표준이다. SOiVA 서비스는 다양한 정보를 표현하기 위해 메타데이터를 이용하는데, 이 메타데이터에는 그 중요성 때문에 반드시 제 3자로부터 보호되어야 하는 내용이 포함되어 있다. 이 중 일부가 외부에 노출되거나 유실 조작될 경우 큰 문제를 야기할 수 있으므로 반드시 적합한 보안 시스템이 필요하다. 본 논문에서는 전자서명과 암호화 등의 기술을 이용해 SOiVA 메타데이터 보안 시스템을 설계하고, 타당성을 검증하기 위해 시스템을 구현하고 예제메타데이터에 대하여 시험하였다.

Design and Implementation of Face Recognition Security System for ATM based on extracting skin color using Java (Java로 구현한 피부색 추출 기반 ATM 안면 인식 보안 시스템의 설계 및 구현)

  • Kang, Bo-Gyung;Bae, Seok Chan
    • Annual Conference of KIPS
    • /
    • 2010.04a
    • /
    • pp.373-376
    • /
    • 2010
  • 요즘 현금카드나 신용카드를 훔치고 비밀번호를 알아내 ATM(현금자동지급기)에서 현금을 인출하는 범죄가 늘고 있는데 범인들은 대부분 선글라스, 안경, 마스크, 모자 등으로 얼굴을 가리고 인출을 함으로 은행의 CCTV는 범인색출에 거의 도움이 되지 않는다. 본 논문에서의 영상처리는 모두 Java언어를 사용하였으며 피부색을 사전 추출하는 과정을 거쳐 구현된 분류기능을 이용해 얼굴의 이목구비들의 위치를 인식하도록 한다. 이는 ATM이용자가 선글라스, 안경, 마스크 등으로 얼굴을 가리면 기기에서 애초에 서비스 받는 것을 불가능 하게 하여, 범죄를 예방할 수 있게 한다. 또한 카드의 사용자 정보와 서비스를 시도했던 시간과 캡쳐 이미지를 저장해 놓음으로써 범인의 인상착의, 알리바이 등을 확인하는데 크게 도움을 주는 ATM 안면 인식 보안 시스템의 가능성을 제안하고자 한다.

Design of Object-based Video CODEC Using Hybrid Transform for the Mobile Video Telephony Environment (모바일 영상통화 환경에 적합한 하이브리드 변환을 이용한 객체기반 비디오 CODEC 설계)

  • Jeon, Sung-Hye;Jang, Bong-Joo;Seo, Yong-Su;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Annual Conference of KIPS
    • /
    • 2009.11a
    • /
    • pp.375-376
    • /
    • 2009
  • 모바일 환경 상에서 영상통화는 제한된 대역폭 및 손떨림 현상 등의 문제로 인하여 저품질의 서비스가 제공되고 있다. 기존의 영상통화 환경에서 향상된 품질의 영상통화 서비스를 제공하기 위하여 중요 객체와 비중요 객체를 구분하여 분리하며, 중요 객체에 대해서는 고화질을 갖도록 하는 비디오 압축 방법을 제안한다. 매 프레임 마다 중요 객체와 비중요 객체를 분리하며, 분리된 객체는 다른 비트율과 화질을 갖도록 각 객체에 적합한 변환 커널을 적용하여 부호화 절차를 달리한다. 중요 객체는 저압축, 고화질을 가지도록 부호화하며, 비중요 객체에 대해서는 고압축, 저화질을 가지도록 부호화함으로써 제한된 대역폭 내에서 비트율을 유지하도록 한다.