• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.031 seconds

A Study on the Development of Public Digital Signage Services (공공 디지털 사이니지 서비스 개발 연구)

  • Ahn, SungHee
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.185-196
    • /
    • 2021
  • This study is based on the 'National Pilot Project on Digital Signage in Sejong Special City', one of the pilot projects initiated by the Ministry of Public Administration and Security. This project was an attempt to present the digital signage as a 'public service content platform' integrated with smart technologies. This study suggests that the planning strategy for placing public service contents on digital signage platform should focus on interests of local communities or users rather than high-tech suppliers of digital signage. In consideration of growing needs for smart technology-based public service, this study concentrates on the strategy for developing 'public digital signage services'. In addition, 'digital signage service tools' were designed to easily establish or execute the strategy. The aim of this study is developing the strategy to make digital signage a public cultural service platform as well as a digital advertisement tool. The final goal of this study is to demonstrate public value creation performance of the 'Revitalisation Project of Sejong City's Commercial Districts', which was possible thanks to the proactive involvement of citizens coupled with progressive utilization of interactive media.

An Optimized Hardware Implementation of SHA-3 Hash Functions (SHA-3 해시 함수의 최적화된 하드웨어 구현)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.886-895
    • /
    • 2018
  • This paper describes a hardware design of the Secure Hash Algorithm-3 (SHA-3) hash functions that are the latest version of the SHA family of standards released by NIST, and an implementation of ARM Cortex-M0 interface for security SoC applications. To achieve an optimized design, the tradeoff between hardware complexity and performance was analyzed for five hardware architectures, and the datapath of round block was determined to be 1600-bit on the basis of the analysis results. In addition, the padder with a 64-bit interface to round block was implemented in hardware. A SoC prototype that integrates the SHA-3 hash processor, Cortex-M0 and AHB interface was implemented in Cyclone-V FPGA device, and the hardware/software co-verification was carried out. The SHA-3 hash processor uses 1,672 slices of Virtex-5 FPGA and has an estimated maximum clock frequency of 289 Mhz, achieving a throughput of 5.04 Gbps.

Design of Remote Broadcasting System Using LTE Moudule (LTE 모듈을 활용한 원격방송 시스템 설계)

  • Chae, Min-uk;Lee, Choong Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.389-391
    • /
    • 2019
  • In this study, we design a remote broadcasting system that can output announcement to a remote place using wired/wireless telephone. The designed remote broadcasting system uses the LTE module to amplify the telephone voice received wirelessly through the amplifier and output it. Also, a text message for broadcasting can be sent to a remote broadcasting system through a wired/wireless telephone capable of transmitting a text message, and the remote broadcasting system that receives the broadcasting text message can automatically output the corresponding announcement stored in the voice device. For security reasons, the telephone number of the receiver is analyzed by a comparison algorithm so that only the administrator and registered users can use the system. At this time, the recorded announcement broadcast is outputted through the speaker only when it is confirmed as the registered user. The system designed in this study allows the user to output announcements quickly without being limited by time and place.

  • PDF

Case Study on the Building Organization of Medibio Research Laboratory Facilities in Research-driven Hospital (연구중심병원 의생명연구원의 실험실 구성 사례 조사)

  • Kim, Young-Aee
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.11
    • /
    • pp.95-104
    • /
    • 2018
  • Healthcare technology has been growing and fostering cooperation between industry, university and hospitals as growth engines in korea. So, the medibio research institutes in hospital have been constructed to promote research and industrialization centering on healthcare technology. The purpose of this study is to investigate the cases of research institutes in hospitals, and search the characteristics of building organization of medibio research laboratory facilities. Case study is investigated by floor plan, homepage and site visits about five research institutes selected in research-driven hospitals. The facility title and size of research laboratory is originated from site area and research building location. The building function include not only the research lab and business office reflecting on the development platform, and but assembly and meeting room in the ground level. Laboratory floor plans have three types, rectangular, rectangular+linear and linear type, one is traditional and efficient, the others are people and friendly. And building core types are correlated with lab space unit modules, single and double side core are shown in rectangular type. All the laboratories are open lab, composed with laboratory bench and research note writing desk facing the lab service and enclosed lab-support area. And they have communication space looking as warm and cozy common area for the innovation, convergence and collaboration. As the high risk of contamination and high standard for safety and security, equipment and facilities are well managed with biological environment including BSC, fume hood, PCR classification, eye washing and emergency shower.

Effects of Wanghong marketing in live commerce on chinese consumers' purchase intention toward fashion products - Focusing on the mediating effect of Wanghong's characteristics and consumers' co-experience - (라이브 커머스의 왕홍 마케팅이 중국 소비자의 패션상품 구매의도에 미치는 영향 - 왕홍의 특성과 소비자 공동경험의 매개효과를 중심으로 -)

  • La, Kyung Won;Oh, Kyung Wha
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.23 no.1
    • /
    • pp.19-36
    • /
    • 2021
  • Real-time two-way communication has become an important factor in the relationship between consumers and broadcasters in the Live Commerce environment. To clarify, the relationship of the factors, and the effect of Live Commerce's on consumer purchase intention were examined. In addition, the role of Wanghong, who broadcasts Live Commerce and Co-experience that occurs between consumer and broadcasters influences consumer purchase intention. An online survey method was conducted for 403 subjects in their 20s that were Live Commerce users in Shanghai, Beijing, and Guangzhou, China. The number of final the data used for the analysis was 274 and anlaysis was conducted using SPSS 26.0 program and a Sobel test was employed. Based on the analysis of the data, it was found that Live Commerce's characteristics consisted of interactivity, security, and Wanghong's characteristics consisted of honesty, originality, and expertise. Also, it revealed that Co-experience was consisted of responsiveness and vividness. Second, for Live Commerce's characteristics, the Wanghong's characteristics, and Co-experience had a positive effect on the consumers' purchase intention. Third, the Wanghong's characteristics and vividness, a factor of Co-experience, had significant mediating effects on the relationship between Live Commerce's characteristics and the consumers' purchase intention. Finally, responsiveness of Co-experience had a noteworthy mediating effect on the relationship between the interactivity of Live Commerce's characteristics and the consumers' purchase intention. This study confirmed the important role of Live Commerce's characteristics, the Wanghong's characteristics and Co-experience in relation to the consumers' purchase intention. In addition, the Wanghong's characteristics and Co-experience were proposed as a significant mediating factors.

A Design and Implementation of Product Information Guide System Based on Beacon

  • Lee, Won Joo;Yoo, Jung Hyun;Lee, Kang-Ho;Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.119-126
    • /
    • 2020
  • In this paper, we design and implement a product information guidance system Based on BLE beacons. This system is designed to provide various functions such as contactless entrance service through mobile ticket, seat guidance service, event push service, content push service, and public service. This system consists of three modules: a beacon recognition module, a server linkage module, and a content transmission module. The beacon recognition module implements a function of transmitting a specific ID of a nearby beacon when a customer with a smartphone approaches the available service area. The server linkage module recognizes the beacon ID value, transfers it to the server, and implements the function to check the location of the server having the ID. The content transmission module implements a function of transmitting event or service information set at a corresponding location to a smartphone. The beacon-based product information guidance system implemented in this paper has the advantage of being able to quickly and easily implement various product information guidance systems.

IoT Malware Detection and Family Classification Using Entropy Time Series Data Extraction and Recurrent Neural Networks (엔트로피 시계열 데이터 추출과 순환 신경망을 이용한 IoT 악성코드 탐지와 패밀리 분류)

  • Kim, Youngho;Lee, Hyunjong;Hwang, Doosung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.5
    • /
    • pp.197-202
    • /
    • 2022
  • IoT (Internet of Things) devices are being attacked by malware due to many security vulnerabilities, such as the use of weak IDs/passwords and unauthenticated firmware updates. However, due to the diversity of CPU architectures, it is difficult to set up a malware analysis environment and design features. In this paper, we design time series features using the byte sequence of executable files to represent independent features of CPU architectures, and analyze them using recurrent neural networks. The proposed feature is a fixed-length time series pattern extracted from the byte sequence by calculating partial entropy and applying linear interpolation. Temporary changes in the extracted feature are analyzed by RNN and LSTM. In the experiment, the IoT malware detection showed high performance, while low performance was analyzed in the malware family classification. When the entropy patterns for each malware family were compared visually, the Tsunami and Gafgyt families showed similar patterns, resulting in low performance. LSTM is more suitable than RNN for learning temporal changes in the proposed malware features.

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.

Design and Implementation of a Smart Attendance Integrated Management System (스마트 출결 통합 관리 시스템 설계 및 구현)

  • Kang, Se-Hyeon;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.136-144
    • /
    • 2022
  • Due to the lack of attendance management system, the training conducted by each existing institution was handwritten at the site and managed in writing about the attendance of participants. It not only takes a lot of manpower and time to store and search, but also has a lot of difficulty in storing. In this paper, we design and implement an integrated smart attendance management system using barcodes. Through this, the attendance system of training applicants is developed, security related to attendance is strengthened, and training attendance data is computerized and collected. In addition, standards for necessary data are selected so that each institution can efficiently manage and utilize training information data. The proposed system can add various institutions in a single construction, making it easy to expand institutional management and can expect additional cost reduction effects. In addition, it is expected that the quality of education will be improved by increasing the convenience of training managers who use the management system provided and controlling/managing attendance data of users.

Analysis of Success Factors for Technology Commercialization of Venture Companies in the 4th Industry : Focusing on smart farm companies (4차 산업 벤처기업의 기술사업화 성공 요인 분석 : 스마트팜 기업 중심으로)

  • Kim, Dae Yu;Bae, Jang Won
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.317-323
    • /
    • 2022
  • The purpose of this study was to analyze how innovative facility investment and innovative research manpower capabilities of venture companies related to the 4th industrial smart farm affect the technological performance of patents and design registrations, and the financial performance of sales and operating profit. As a research method, a total of 47 venture companies were selected as a sample and regression analysis was performed. Research Results This study analyzes the technological commercialization factors of venture companies related to the 4th industrial smart farm and proposes to expand the budget for R&D government tasks for financial and technological success. In the future research direction, I believe that more discussion is needed on the contribution of companies to quantitative and qualitative growth.