• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.032 seconds

A Study on the Trends of Korean Juvenile Gambling (청소년 도박의 국내 연구동향 분석)

  • Ko, Do-Hyun;Kim, Sang-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.660-671
    • /
    • 2021
  • This paper analyzed the research trends of juvenile gambling, which is increasing due to recent changes in the internet environment. The number of domestic studies on juvenile gambling has increased, but there are few studies that analyzed both degrees and academic papers in a more comprehensive manner than addiction to the Internet, games, and drugs related to youth. The current state of juvenile gambling can lead to secondary crimes, such as illegal loans and thefts for gambling funds beyond the level of addiction, school violence and money extortion, which have been a major shock to Korean society. Therefore, it is urgent to prepare social measures because the age of adolescents who are exposed to gambling is becoming lower. Accordingly, this study analyzed 52 dissertations, 86 academic papers, and three other research reports published in Korea from 2003 to March 2020. As a result, quantitative research, research subjects, and research topics were concentrated, and there was a limit to generalization. In addition, these results will provide rich information to future studies by confirming the academic characteristics according to the times and interdisciplinary research trends that transcend individual science areas.

Study on security requirements for the web based operation system of a shipping company (웹 기반 해운 선사 운영시스템 보안 요구사항 연구)

  • Chung, Up;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.49-68
    • /
    • 2022
  • The operation system of a shipping company is still maintaining the mainframe based terminal access environment or the client/server based environment. Nowadays shipping companies that try to migrate it into a web-based environment are increasing. However, in the transition, if the design is processed by the old configuration and knowledge without considering the characteristics of the web-based environment and shipping business, various security vulnerabilities will be revealed at the actual system operation stage, and system maintenance costs to fix them will increase significantly. Therefore, in the transition to a web-based environment, a security design must be carried out from the design stage to ensure system safety and to reduce security-related maintenance costs in the future. This paper examines the characteristics of various threat modeling techniques, selects suitable modeling technique for the operation system of a shipping company, applies data flow diagram and STRIDE threat modeling technique to shipping business, derives possible security threats from each component of the data flow diagram in the attacker's point of view, validates the derived threats by mapping them with attack library items, represents the attack tree having various attack scenarios that attackers can attempt to achieve their final goals, organizes into the checklist that has security check items, associated threats and security requirements, and finally presents 23 security requirements that can respond to threats. Unlike the existing general security requirements, the security requirements presented in this paper reflect the characteristics of shipping business because they are derived by analyzing the actual business of a shipping company and applying threat modeling technique. Therefore, I think that the presented security requirements will be of great help in the security design of shipping companies that are trying to proceed with the transition to a web-based environment in the future.

A Study on Effective Adversarial Attack Creation for Robustness Improvement of AI Models (AI 모델의 Robustness 향상을 위한 효율적인 Adversarial Attack 생성 방안 연구)

  • Si-on Jeong;Tae-hyun Han;Seung-bum Lim;Tae-jin Lee
    • Journal of Internet Computing and Services
    • /
    • v.24 no.4
    • /
    • pp.25-36
    • /
    • 2023
  • Today, as AI (Artificial Intelligence) technology is introduced in various fields, including security, the development of technology is accelerating. However, with the development of AI technology, attack techniques that cleverly bypass malicious behavior detection are also developing. In the classification process of AI models, an Adversarial attack has emerged that induces misclassification and a decrease in reliability through fine adjustment of input values. The attacks that will appear in the future are not new attacks created by an attacker but rather a method of avoiding the detection system by slightly modifying existing attacks, such as Adversarial attacks. Developing a robust model that can respond to these malware variants is necessary. In this paper, we propose two methods of generating Adversarial attacks as efficient Adversarial attack generation techniques for improving Robustness in AI models. The proposed technique is the XAI-based attack technique using the XAI technique and the Reference based attack through the model's decision boundary search. After that, a classification model was constructed through a malicious code dataset to compare performance with the PGD attack, one of the existing Adversarial attacks. In terms of generation speed, XAI-based attack, and reference-based attack take 0.35 seconds and 0.47 seconds, respectively, compared to the existing PGD attack, which takes 20 minutes, showing a very high speed, especially in the case of reference-based attack, 97.7%, which is higher than the existing PGD attack's generation rate of 75.5%. Therefore, the proposed technique enables more efficient Adversarial attacks and is expected to contribute to research to build a robust AI model in the future.

Analysis Modeling of Variable Goods Value to extract Key Influencers based on Time series Big Data (시계열 Big Data에 기반한 핵심영향인자 추출을 위한 변동재화 가치 분석 Modeling)

  • Kwon-Woong Kim;Young-Gon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.185-191
    • /
    • 2023
  • Research to analyze the future prediction of value is being conducted in various. However, it was found through the research results of each field that such future value analysis has too many variables according to each field, so the accuracy of the prediction result is low, and it is difficult to find objective key influencing factors that affect the result. In particular, since objective standards for the importance of various influencing factors have not been established, the key influencing factors have been judged and applied based on the researcher's subjectivity. Accordingly, there is a need for a reasonable process model for extracting key influencing factors that affect the prediction of volatility goods value that can be objectively applied in various fields. In this study, process modeling for extracting key influencing factors was conducted in seven steps, and the method for extracting key influencing factors was explained in detail in each step. In addition, as a result of simulation by applying Ni metal among the major variable goods in the field of raw materials using the proposed modeling, the predicted value by the existing method was 0.872% and the predicted value by applying the modeling of this study was 0.864%. conformance was confirmed.

Real-Time Tracking of Human Location and Motion using Cameras in a Ubiquitous Smart Home

  • Shin, Dong-Kyoo;Shin, Dong-Il;Nguyen, Quoc Cuong;Park, Se-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.84-95
    • /
    • 2009
  • The ubiquitous smart home is the home of the future, which exploits context information from both the human and the home environment, providing an automatic home service for the human. Human location and motion are the most important contexts in the ubiquitous smart home. In this paper, we present a real-time human tracker that predicts human location and motion for the ubiquitous smart home. The system uses four network cameras for real-time human tracking. This paper explains the architecture of the real-time human tracker, and proposes an algorithm for predicting human location and motion. To detect human location, three kinds of images are used: $IMAGE_1$ - empty room image, $IMAGE_2$ - image of furniture and home appliances, $IMAGE_3$ - image of $IMAGE_2$ and the human. The real-time human tracker decides which specific furniture or home appliance the human is associated with, via analysis of three images, and predicts human motion using a support vector machine (SVM). The performance experiment of the human's location, which uses three images, lasted an average of 0.037 seconds. The SVM feature of human motion recognition is decided from the pixel number by the array line of the moving object. We evaluated each motion 1,000 times. The average accuracy of all types of motion was 86.5%.

The Revitalization Schemes for Virtual Communities in Apartment Complex II - Residents' Needs of the Virtual Community Contents in Apartment Complex - (아파트 단지 내 사이버 공동체 활성화 방안 연구 II - 사이버 공동체 콘텐츠에 대한 거주자 요구도 -)

  • Lee, Young-Ae;Kang, Soon-Joo
    • Journal of the Korean housing association
    • /
    • v.20 no.1
    • /
    • pp.91-99
    • /
    • 2009
  • With the development of the internet and the spread of 'digital home', apartment houses equipped with the homepages connecting apartment houses as one cyberspace unit have increased. The virtual community with a homepage in apartment complex have improved the effect on management businesses in the side of a apartment manager and increased the importance of the space with a strong tie between residents in the side of residents. But the apartment residents didn't make full use of the virtual community because they have the low level of recognition of it. Therefore, this study attempted to present basic materials for the scheme to revitalize the virtual community. For this purpose, it attempted to find residents' recognition of and participation in the virtual community and demand for the classified contents conducted before this study. In the research method, it conducted the questionnaire research. The results are as follows. 1) First of all, It was found that the apartment residents had the low level of recognition of the virtual community. There was a significant difference according to the degree and the level of using the internet. Some easy-access programs are necessary. 2) The apartment residents took part in the virtual community about 67 percents because there was a lack of the public relation of the virtual community. 3) It was found that there was a significant positive correlation between the level of recognition and participation. 4) An attempt was made to identify the apartment residents' demand for the type of virtual community contents. It was found that most of contents were needed. 'apartment complex introduction and management information' showed the highest score among them. 5) Most respondents are affirmative to the virtual community. Therefore the residential community could be reinforced if the contents of virtual community is developed and well operated in the future.

Technique Criteria Calculation for Next Generation Mobile Communication (차세대 이동통신을 위한 기술기준 산정)

  • Kim, Kyung-Seok;Hyeon, Yeong-Ju
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.101-113
    • /
    • 2008
  • The new wireless multimedia environment is coming because of the variety of an user requirement and a traffic increase which we can not accept in the IMT-2000 present systems. To offer the wireless multimedia service the world wireless communication company which included the ITU-R is developing the standard and technique of 4G systems. We analyzed the technique criteria of the 4G wireless communication system in this paper which is based on that of WiBro System. The mobile communication traffic is predicted Up/Down-link of non-symmetric in the future. And we proposed the PHY layer parameters of occupied frequency bandwidth of Up/Down-link with both 1:3 and 1:6. And we verified this through the simulation. So we proposed the technique criteria for 4G wireless communication in this paper.

  • PDF

SLNR-based User Scheduling in Multi-cell networks: from Multi-antenna to Large-Scale Antenna System

  • Li, Yanchun;Zhu, Guangxi;Chen, Hua;Jo, Minho;Liu, Yingzhuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.945-964
    • /
    • 2014
  • In this paper, we investigate the performance of Signal to Leakage and Noise Radio (SLNR) based user scheduling in uplink of multi-cell with large-scale antenna system. Large antenna array is desired to improve the performance in future system by providing better beamforming capability. However, some studies have found that the signal channel is 'hardened' (becomes invariant) when the antenna number goes extremely large, which implies that the signal channel aware user scheduling may have no gain at all. With the mathematic tool of order statistics, we analyzed the signal and interference terms of SLNR in a homogeneous multicell network. The derived distribution function of signal and interference shows that the leakage channel's variance is much more influential than the signal channel's variance in large-scale antenna regime. So even though the signal channel is hardened, the SLNR-based scheduling can achieve remarkable multiuser diversity (MUD) gain due to the fluctuation of the uplink leakage channel. By providing the final SINR distribution, we verify that the SLNR-based scheduling can leverage MUD in a better way than the signal channel based scheduling. The Monte Carlo simulations show that the throughput gain of SLNR-based scheduling over signal channel based scheduling is significant.

A Study on Web-based operating system (웹 기반 운영체제에 관한 연구)

  • Bae, Yu-Mi;Jung, Sung-Jae;Jang, Rae-Young;Park, Jeong-Su;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.674-677
    • /
    • 2012
  • An operating system acts as an intermediary between your computer hardware and computer users to perform, that the user can run the program provides an environment in which. Therefore, the main purpose of the operating system having a computer available for your convenience and to effectively manage computer hardware. The popularization of the people who use computers, improve hardware performance, advent of the internet, popularity of wireless networks, Smartphone and Tablet PC appearance, advent of virtualization technologies and cloud computing, etc. began making changes to the operating system. In particular, cloud computing environments based on server virtualization and using a variety of wired and wireless devices with internet connection, a Web-based operating system was born. In this paper, the definition of a Web-based operating system, types and characteristics, an analysis of the pros and cons, and find out about the future prospects.

  • PDF

Analysis and Study for the Technical Direction of Internet of Things (IoT) in the Perspective of the Vehicle with Vehicle-Home IoT Service Cases (차량과 홈 IoT 기기 연동 서비스 사례를 통한 차량 측면에서의 IoT 기술 방향성 분석 및 고찰)

  • Kim, Joon-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.53-60
    • /
    • 2020
  • With the major advancement of vehicle-related technologies and services, the demands for the in/out-vehicle service expansion increase significantly. The key importance of the service expansion is to provide various vehicle-centric services in addition to improve the convenience and usability of users with connectivity. Recently, Internet of Things (IoT) gains major attention for small device connectivity and service, and it widens its area to other industries including automotive to advance and diversify its services. In this paper, we investigated the technical direction of the IoT service with the analysis of IoT technologies in the perspective of the vehicle. At first, we analyzed the vehicle and IoT services in each so that we are able to suggest the service design guideline and consideration to release integrated services between vehicle and IoT. Also, we reviewed the cases of few vehicle and home IoT integration services for the major insights and future direction of the integration services.