• Title/Summary/Keyword: growing features

Search Result 500, Processing Time 0.025 seconds

A Study On Performance Evaluation of Cryptographic Module and Security Functional Requirements of Secure UAV (보안 UAV를 위한 암호모듈의 성능평가와 보안성 평가 방법에 대한 연구)

  • Kim, Yongdae;Kim, Deokjin;Yi, Eunkyoung;Lee, Sangwook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.737-750
    • /
    • 2022
  • The demands of Unmanned Aerial Vehicles (UAVs) are growing very rapidly with the era of the 4th industrial revolution. As the technology of the UAV improved with the development of artificial intelligence and semiconductor technology, it began to be used in various civilian fields such as hobbies, bridge inspections, etc from being used for special purposes such as military use. MAVLink (Macro Air Vehicle Link), which started as an open source project, is the most widely used communication protocol between UAV and ground control station. However, MAVLink does not include any security features such as encryption/decryption mechanism, so it is vulnerable to various security threats. Therefore, in this study, the block cipher is implemented in UAV to ensure confidentiality, and the results of the encryption and decryption performance evaluation in the UAV according to various implementation methods are analyzed. In addition, we proposed the security requirements in accordance with Common Criteria, which is an international recognized ISO standard.

Transmission of Chinese Monetary Policy Shocks: Evidence from Korea (중국 통화정책 변화가 한국에 미치는 영향)

  • Cho, Yujeong
    • Economic Analysis
    • /
    • v.27 no.4
    • /
    • pp.43-69
    • /
    • 2021
  • As the trade linkages and the financial relationship between China and Korea grow stronger, China's influence on Korea is also growing larger. Therefore, it is meaningful to examine key features of Chinese monetary policy operations and the current situation, and to analyze the transmission mechanism of China's monetary policy shocks onto the Korea economy. China's monetary policy shocks can have an impact on the Korea economy through the trade, financial and oil-price channels. In the trade channel, an expansionary Chinese monetary policy can increase Korea's exports of intermediate goods to China under the vertical trade structure, via the vertical trade integration effect. Meanwhile, the expenditure switching effect and the income demand effect show no statistical significance. In the financial and oil-price channels, expansionary Chinese monetary policy shocks can decrease the interest rate and increase both stock prices and the consumer price index in Korea through changes in global portfolio capital flows, interest rates, and raw material prices.

Securitization and the Merger of Great Power Management and Global Governance: The Ebola Crisis

  • Cui, Shunji;Buzan, Barry
    • Analyses & Alternatives
    • /
    • v.3 no.1
    • /
    • pp.29-61
    • /
    • 2019
  • Within the discipline of International Relations (IR), the literatures on global governance (GG) and great power management (GPM) at best ignore each other, and at worst treat the other as a rival or enemy. On the one hand, the GPM literature, like both realism in all its forms, and neoliberalism, takes for granted the ongoing, disproportionate influence of the great powers in the management of the international system/society, and does not look much beyond that. On the other hand, the GG literature emphasizes the roles of smaller states, non-state actors and intergovernmental organizations (IGOs), and tends to see great powers more as part of the problem than as part of the solution. This paper argues that the rise to prominence of a non-traditional security agenda, and particularly of human security, has triggered a de facto merger of GPM and GG that the IR literature usually treated as separate and often opposed theories. We use the Ebola crisis of 2014-15 to show how an issue framed as human security brought about a multi-actor response that combined the key elements of GPM and GG. The security framing overrode many of the usual inhibitions between great powers and non-state actors in humanitarian crises, including even the involvement of great power military forces. Through examining broadly the way in which the Ebola crisis is tackled, we argue that in an age of growing human security challenges, GPM and GG are necessarily and fruitfully merging. The role of great powers in this new human security environment is moving away from the simple means and ends of traditional GPM. Now, great powers require the ability to cooperate and coordinate with multiple-level actors to make the GG/GPM nexus more effective and sustainable. In doing so they can both provide crucial resources quickly, and earn respect and status as responsible great powers. IGOs provide legitimation and coordination to the GPM/GG package, and non-state actors (NSAs) provide information, specialist knowledge and personnel, and links into public engagement. In this way, the unique features of the Ebola crisis provide a model for how the merger of GPM and GG might be taken forward on other shared-fate threats facing global international society.

  • PDF

Ten years of minimally invasive access cavities in Endodontics: a bibliometric analysis of the 25 most-cited studies

  • Emmanuel Joao Nogueira Leal Silva ;Karem Paula Pinto ;Natasha C. Ajuz ;Luciana Moura Sassone
    • Restorative Dentistry and Endodontics
    • /
    • v.46 no.3
    • /
    • pp.42.1-42.15
    • /
    • 2021
  • Objectives: This study aimed to analyze the main features of the 25 most-cited articles in minimally invasive access cavities. Materials and Methods: An electronic search was conducted on the Clarivate Analytics' Web of Science 'All Databases' to identify the most-cited articles related to this topic. Citation counts were cross-matched with data from Elsevier's Scopus and Google Scholar. Information about authors, contributing institutions and countries, year and journal of publication, study design and topic, access cavity, and keywords were analyzed. Results: The top 25 most-cited articles received a total of 572 (Web of Science), 1,160 (Google Scholar) and 631 (Scopus) citations. It was observed a positive significant association between the number of citations and age of publication (r = 0.6907, p < 0.0001); however, there was no significant association regarding citation density and age of publication (r = -0.2631, p = 0.2038). The Journal of Endodontics made the highest contribution (n = 15, 60%). The United States had the largest number of publications (n = 7) followed by Brazil (n = 4), with the most contributions from the University of Tennessee and Grande Rio University (n = 3), respectively. The highest number of most-cited articles were ex vivo studies (n = 16), and 'fracture resistance' was the major topic studied (n = 10). Conclusions: This study revealed a growing interest for researchers in the field of minimally invasive access cavities. Future trends are focused on the expansion of collaborative networks and the conduction of laboratory studies on under-investigated parameters.

Cloud security authentication platform design to prevent user authority theft and abnormal operation during remote control of smart home Internet of Things (IoT) devices (스마트 홈 사물인터넷 기기(IoT)의 원격제어 시 사용자 권한 탈취 및 이상조작 방지를 위한 클라우드 보안인증 플랫폼 설계)

  • Yoo Young Hwan
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.99-107
    • /
    • 2022
  • The use of smart home appliances and Internet of Things (IoT) devices is growing, enabling new interactions and automation in the home. This technology relies heavily on mobile services which leaves it vulnerable to the increasing threat of hacking, identity theft, information leakage, serious infringement of personal privacy, abnormal access, and erroneous operation. Confirming or proving such security breaches have occurred is also currently insufficient. Furthermore, due to the restricted nature of IoT devices, such as their specifications and operating environments, it is difficult to provide the same level of internet security as personal computers. Therefore, to increase the security on smart home IoT devices, attention is needed on (1) preventing hacking and user authority theft; (2) disabling abnormal manipulation; and (3) strengthening audit records for device operation. In response to this, we present a plan to build a cloud security authentication platform which features security authentication management functionality between mobile terminals and IoT devices.

Online Submission and Review System for Open Science: A Case of AccessON Peer Review Management System Plus (ACOMS+)

  • Jaemin Chung;Eunkyung Nam;Sung-Nam Cho;Jeong-Mee Lee;Hyunjung Kim;Hye-Sun Kim;Wan Jong Kim
    • Journal of Information Science Theory and Practice
    • /
    • v.12 no.1
    • /
    • pp.87-101
    • /
    • 2024
  • As the academic publishing environment evolves rapidly and the open science paradigm emerges, the demand for efficient and transparent peer review is growing. This study outlines efforts to actively introduce advanced concepts in scholarly communication into the submission and review system. AccessON Peer Review Management System Plus (ACOMS+), developed and operated by the Korea Institute of Science and Technology Information, is an online submission and peer review system that aims for open science. This study provides an overview of ACOMS+ and presents its four main features: open peer review, open access publishing and self-archiving, online quantitative/qualitative evaluation, and peer reviewer invitation. The directions for further developing ACOMS+ to fully support open science are also discussed. ACOMS+ is the first system in Korea to introduce the open peer review process and is distinguished as a system that supports open access publishing and digital transformation of academic journals. Furthermore, ACOMS+ is expected to contribute to the advancement of the academic publishing environment through the increasing shift toward open access publishing, transparent peer review, and open science.

A Unicode based Deep Handwritten Character Recognition model for Telugu to English Language Translation

  • BV Subba Rao;J. Nageswara Rao;Bandi Vamsi;Venkata Nagaraju Thatha;Katta Subba Rao
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.101-112
    • /
    • 2024
  • Telugu language is considered as fourth most used language in India especially in the regions of Andhra Pradesh, Telangana, Karnataka etc. In international recognized countries also, Telugu is widely growing spoken language. This language comprises of different dependent and independent vowels, consonants and digits. In this aspect, the enhancement of Telugu Handwritten Character Recognition (HCR) has not been propagated. HCR is a neural network technique of converting a documented image to edited text one which can be used for many other applications. This reduces time and effort without starting over from the beginning every time. In this work, a Unicode based Handwritten Character Recognition(U-HCR) is developed for translating the handwritten Telugu characters into English language. With the use of Centre of Gravity (CG) in our model we can easily divide a compound character into individual character with the help of Unicode values. For training this model, we have used both online and offline Telugu character datasets. To extract the features in the scanned image we used convolutional neural network along with Machine Learning classifiers like Random Forest and Support Vector Machine. Stochastic Gradient Descent (SGD), Root Mean Square Propagation (RMS-P) and Adaptative Moment Estimation (ADAM)optimizers are used in this work to enhance the performance of U-HCR and to reduce the loss function value. This loss value reduction can be possible with optimizers by using CNN. In both online and offline datasets, proposed model showed promising results by maintaining the accuracies with 90.28% for SGD, 96.97% for RMS-P and 93.57% for ADAM respectively.

Age-induced Changes in Ginsenoside Accumulation and Primary Metabolic Characteristics of Panax Ginseng in Transplantation Mode

  • Wei Yuan;Qing-feng Wang;Wen-han Pei;Si-yu Li;Tian-min Wang;Hui-peng Song;Dan Teng;Ting-guo Kang;Hui Zhang
    • Journal of Ginseng Research
    • /
    • v.48 no.1
    • /
    • pp.103-111
    • /
    • 2024
  • Background: Ginseng (Panax ginseng Mayer) is an important natural medicine. However, a long culture period and challenging quality control requirements limit its further use. Although artificial cultivation can yield a sustainable medicinal supply, research on the association between the transplantation and chaining of metabolic networks, especially the regulation of ginsenoside biosynthetic pathways, is limited. Methods: Herein, we performed Liquid chromatography tandem mass spectrometry based metabolomic measurements to evaluate ginsenoside accumulation and categorise differentially abundant metabolites (DAMs). Transcriptome measurements using an Illumina Platform were then conducted to probe the landscape of genetic alterations in ginseng at various ages in transplantation mode. Using pathway data and crosstalk DAMs obtained by MapMan, we constructed a metabolic profile of transplantation Ginseng. Results: Accumulation of active ingredients was not obvious during the first 4 years (in the field), but following transplantation, the ginsenoside content increased significantly from 6-8 years (in the wild). Glycerolipid metabolism and Glycerophospholipid metabolism were the most significant metabolic pathways, as Lipids and lipid-like molecule affected the yield of ginsenosides. Starch and sucrose were the most active metabolic pathways during transplantation Ginseng growth. Conclusion: This study expands our understanding of metabolic network features and the accumulation of specific compounds during different growth stages of this perennial herbaceous plant when growing in transplantation mode. The findings provide a basis for selecting the optimal transplanting time.

Development of Character Goods Content Utilizing Marker-based Augmented Reality (마커기반 증강현실을 활용한 캐릭터 굿즈 콘텐츠 개발)

  • AHN CHAN JE
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.953-958
    • /
    • 2024
  • Recently, there has been growing interest in the Fourth Industrial Revolution, with a particular focus on the advancement of augmented reality (AR) devices. However, there is a shortage of AR content. Augmented reality operates through marker-based and markerless methods. The marker-based approach involves using a camera to capture images that serve as markers, enhancing them through AR principles. To address the scarcity of AR content and improve the quality of character goods, this study proposes integrating AR technology into character goods. The character industry is expanding each year, leading to a diverse range of character goods. Character acrylic stands, among these goods, leverage game, webtoon, and animation character IPs for sales. To enhance the design process, we utilized the character image as a marker, allowing for the creation of content that aligns with the characteristics of the character IP. We selected a webtoon character and developed AR content, incorporating features such as voice, speech bubbles, and an introduction to the webtoon, tailored to the webtoon's characteristics. This study demonstrates the potential of AR to present visual and auditory information, paving the way for a variety of products, including diverse content. We anticipate that utilizing this research will lead to the emergence of products encompassing various contents.

Secondary Breast Burkitt Lymphoma Involving the Stomach, Ovary, Pancreas, and Bones: A Case Report (전신의 다발성 침범을 동반한 이차성 유방 버킷 림프종: 증례 보고)

  • Hyun Ji Lee;Gi Won Shin;Young Mi Park;Minji Shin;Jin Hee Park;Ha Young Park
    • Journal of the Korean Society of Radiology
    • /
    • v.85 no.4
    • /
    • pp.807-812
    • /
    • 2024
  • Breast lymphomas are rare, malignant breast neoplasms with a heterogeneous pattern of clinical symptoms. Burkitt's lymphoma is a rare, highly aggressive, and rapidly growing B-cell non-Hodgkin lymphoma. We report about a 27-year-old woman diagnosed as having secondary breast Burkitt's lymphoma, probably originating from the stomach, with multiple distant metastases. Breast ultrasonography revealed multiple, variable sized, heterogeneous masses with posterior acoustic enhancement and echogenic rims. These imaging findings may sometimes overlap with those of other breast malignancies. However, unlike other breast malignancies, lymphoma can be diagnosed by biopsy and does not require surgical excision. To avoid unnecessary treatment, radiologists and clinicians should be aware of the characteristic imaging features of breast lymphomas.