• Title/Summary/Keyword: information Security

Search Result 17,856, Processing Time 0.049 seconds

Comparative Analysis on Cloud and On-Premises Environments for High-Resolution Agricultural Climate Data Processing (고해상도 농업 기후 자료 처리를 위한 클라우드와 온프레미스 비교 분석)

  • Park, Joo Hyeon;Ahn, Mun Il;Kang, Wee Soo;Shim, Kyo-Moon;Park, Eun Woo
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.4
    • /
    • pp.347-357
    • /
    • 2019
  • The usefulness of processing and analysis systems of GIS-based agricultural climate data is affected by the reliability and availability of computing infrastructures such as cloud, on-premises, and hybrid. Cloud technology has grown in popularity. However, various reference cases accumulated over the years of operational experiences point out important features that make on-premises technology compatible with cloud technology. Both cloud and on-premises technologies have their advantages and disadvantages in terms of operational time and cost, reliability, and security depending on cases of applications. In this study, we have described characteristics of four general computing platforms including cloud, on-premises with hardware-level virtualization, on-premises with operating system-level virtualization and hybrid environments, and compared them in terms of advantages and disadvantages when a huge amount of GIS-based agricultural climate data were stored and processed to provide public services of agro-meteorological and climate information at high spatial and temporal resolutions. It was found that migrating high-resolution agricultural climate data to public cloud would not be reasonable due to high cost for storing a large amount data that may be of no use in the future. Therefore, we recommended hybrid systems that the on-premises and the cloud environments are combined for data storage and backup systems that incur a major cost, and data analysis, processing and presentation that need operational flexibility, respectively.

Automatic Detection Approach of Ship using RADARSAT-1 Synthetic Aperture Radar

  • Yang, Chan-Su
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.14 no.2
    • /
    • pp.163-168
    • /
    • 2008
  • Ship detection from satellite remote sensing is a crucial application for global monitoring for the purpose of protecting the marine environment and ensuring marine security. It permits to monitor sea traffic including fisheries, and to associate ships with oil discharge. An automatic ship detection approach for RADARSAT Fine Synthetic Aperture Radar (SAR) image is described and assessed using in situ ship validation information collected during field experiments conducted on August 6, 2004. Ship detection algorithms developed here consist of five stages: calibration, land masking, prescreening, point positioning, and discrimination. The fine image was acquired of Ulsan Port, located in southeast Korea, and during the acquisition, wind speeds between 0 m/s and 0.4 m/s were reported. The detection approach is applied to anchoring ships in the anchorage area of the port and its results are compared with validation data based on Vessel Traffic Service (VTS) radar. Our analysis for anchoring ships, above 68 m in length (LOA), indicates a 100% ship detection rate for the RADARSAT single beam mode. It is shown that the ship detection performance of SAR for smaller ships like barge could be higher than the land-based radar. The proposed method is also applied to estimate the ship's dimensions of length and breadth from SAR radar cross section(RCS), but those values were comparatively higher than the actual sizes because of layover and shadow effects of SAR.

  • PDF

Changes of Contrast Sensitivity with Decreasing Luminance in Photopic Conditions (명소시 상태에서 휘도 감소에 따른 대비감도 변화)

  • Lee, Eun Jin;Yoon, Moon Joo;Kim, Soo-Hyun;Yang, Gye Tak;Jeong, Ju-Hyun;Kim, Hyun Jung;Kim, Hyun Il;Choi, Eun Jung
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.17 no.4
    • /
    • pp.411-417
    • /
    • 2012
  • Purpose: To investigate changes of contrast sensitivity with decreasing luminance in photopic conditions. Methods: Contrast sensitivities for 63 university students were investigated at 5 different luminance levels using FACT chart. Results: All contrast sensitivities measured were in the normal range. The peak of contrast sensitivity function was observed to move from 6 to 3 cpd between 40 and $10cd/m^2$. From an intersection point of two hypothetical lines related with contrast sensitivity for 6 and 3 cpd, we could evaluated that the peak moved from 6 to 3 cpd at about $25cd/m^2$. When luminance decreases from 120 to $10cd/m^2$, contrast sensitivity loss at 6 cpd was most, while contrast sensitivity at 1.5 cpd changed little. We could evaluate that at luminance of more than $25cd/m^2$ evaluated approximately, contrast sensitivity was high in the following order of spatial frequency: 18< 12<1.5<3<6 cpd, while at luminance of less than about $25cd/m^2$ as follows: 18<12<1.5<6<3 cpd. Contrast sensitivity losses with decreasing luminance were also evaluated using the decrements and decrement rates of contrast sensitivity. The decrement of contrast sensitivity was the greatest at 6 cpd, while the decrement rate was the greatest at 8 cpd. Conclusions: We propose that evaluation methods used in this research may be available as another methods to evaluate the changes of contrast sensitivity.

A Method for Scalar Multiplication on Elliptic Curves against Differential Power Analysis using Efficient Key-Randomization (효율적인 키-난수화를 사용한 차분 전력 분석 공격에 대응하는 타원곡선 위의 스칼라 곱셈 방법)

  • Jung, Seok Won
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.356-363
    • /
    • 2020
  • As a becoming era of Internet-of-Things, various devices are connected via wire or wirless networks. Although every day life is more convenient, security problems are also increasing such as privacy, information leak, denial of services. Since ECC, a kind of public key cryptosystem, has a smaller key size compared to RSA, it is widely used for environmentally constrained devices. The key of ECC in constrained devices can be exposed to power analysis attacks during scalar multiplication operation. In this paper, a key-randomization method is suggested for scalar multiplication on SECG parameters. It is against differential power analysis and has operational efficiency. In order to increase of operational efficiency, the proposed method uses the property 2lP=∓cP where the constant c is small compared to the order n of SECG parameters and n=2l±c. The number of operation for the Coron's key-randomization scalar multiplication algorithm is 21, but the number of operation for the proposed method in this paper is (3/2)l. It has efficiency about 25% compared to the Coron's method using full random numbers.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

국내 인터넷전문은행 설립시 예상되는 전자금융리스크에 대한 대응방안 연구

  • Kim, Tae-Ho;Park, Tae-Hyoung;Lim, Jong-In
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.33-48
    • /
    • 2008
  • 최근 은행의 소유지분한도와 설립자본금 등에 대한 정부의 금융규제 완화로 인터넷전문은행의 설립 가능성이 높아지고 있다. 그러나 우리나라의 전자금융환경은 전자금융거래법 제정에 따라 금융기관의 입증책임을 강화함으로써 금융기관의 전자금융리스크가 상대적으로 크게 증가하였다. 또한, 정보 공격기술 및 수법의 발달로 전자금융보안에 대한 위협이 지속적으로 증가하고 있다. 이외 에도 신BIS 리스크 평가에 IT운영리스크가 포함되는 등 금융환경 변화 및 정보통신 기술의 발전으로 인한 전자금융리스크가 계속 확대되고 있는 추세에 있다. 이러한 금융환경 변화와 함께 서비스채널이 인터넷에 집중되는 인터넷전문은행은 기존의 전통적인 은행과 차별되는 리스크에 추가적으로 노출될 위험성이 높다. 이러한 리스크에 대한 인식 및 대비 부재는 금융소비자가 금융권 전자금융거래에 대한 불신으로 확산되거나, 금융시장의 불안정성을 야기하는 금융사고로 이어져 자칫 국내 전자금융의 발전을 저해하는 심각한 요소가 될 수 있다. 본 논문에서는 국내 금융환경과는 차이가 있지만, 인터넷전문은행이 가져올 전자금융의 기술적 변화는 유사하다는 점에서 해외 주요국가의 인터넷전문은행 현황과 전자금융부문을 중심으로 인터넷전문은행 설립인가 사례를 살펴보고, 국내에서 인터넷전문은행 설립시 우리가 취해야 할 입장에 대해 시사점을 얻고자 하였다. 그리고 국내 전자금융 환경에서 전통적인 일반은행과 차별되거나 인터넷전문은행 고유의 특성으로 발생되는 주요 전자금융리스크를 다섯 가지로 분석하였고, 이러한 전자금융리스크를 줄이기 위한 대응방안을 모색해 보았다. 정부의 금융규제 완화는 금융자유화를 진전시켜 금융거래가 자유경쟁원리에 입각해 이루어짐에 따라 국민경제의 발전에 있어서 바람직한 결과를 얻고자 하는 것이다. 그러나 다른 한편으로 과도한 리스크에 노출 될 경우에는 금융시장의 불안정성을 야기하고 이로 인해 역 선택과 도덕적 해이를 야기 시키는 등 여러 가지의 폐해를 줄 수도 있다 이러한 폐해를 줄이기 위해서는 인터넷전문은행의 고유한 특성으로 수반되는 리스크와 상대적으로 그 중요성이 부각되는 전자금융리스크에 대한 관리 감독을 강화해야 한다. 또한 이러한 리스크 관리강화를 위한 제도적 장치는 인터넷전문은행의 자율성과 책임성을 부여하는 방향으로 이루어지는 것이 바람직하다. 인터넷전문은행이 실질적으로 다수의 금융이용자에게 다양한 혜택과 효율적인 금융서비스를 제공하기 위해서는 초기 사업계획 심사 단계에서부터 위험성이 크게 증가하는 전자금융리스크에 대해서, 적절한 관리방안 수립을 통해 예상되는 리스크를 줄이기 위한 노력이 필요하다고 생각한다. 그리고 인터넷전문은행에 대한 구체적인 인가요건이 마련되지 못한 현 상황에서, 국내 인터넷전문은행 설립이 우리나라 전자금융거래에 발전적 역할을 할 수 있도록 앞으로 더 많은 논의와 연구가 진행될 필요가 있다.

A Study of the Establishment of Small and Medium Sized Architectural Design Firm BIM Environment based on Virtual Desktop Infrastructure (가상 데스크톱 인프라(VDI) 기술을 활용한 중소규모 설계사의 BIM 사용자 별 데스크탑 자원 할당 전략에 관한 연구)

  • Lee, Kyuhyup;Shin, Joonghwan;Kwon, Soonwook;Park, Jaewoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.5
    • /
    • pp.78-88
    • /
    • 2016
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In design phase, especially, collaboration based on BIM system has being a key factor for successful next generation building project. Through the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. In various industrial fields, cloud computing technology is utilized as a promising solution which can reduce time and cost of hardware infrastructure. Among the cloud computing technology, VDI is receiving a great deal of attention from it market as an essential part cloud computing. VDI enables to host multiple individual virtual machines by using hypervisor. It has an advantage to easy main device management. Therefore, this study implements a step-by-step user's DaaS by analyzing the desktop resource data of the workers from Pre-design phase to Schematic design, Design develop and Construction design phase. It also develops BIM environment based on test of BIM modeler and designers in architectural design firm. The goal of the study is to enable the cloud computing BIM server. It provides cost saving, high-performance quality of working environment and cooperation's convenience and high security when doing BIM work in small and medium sized architectural design firm.

Implementation of Smartphone Adaptor for Real-Time Live Simulations (실시간 Live 시뮬레이션을 위한 스마트폰 연동기 구현)

  • Kim, Hyun-Hwi;Lee, Kang-Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.1
    • /
    • pp.9-20
    • /
    • 2013
  • Defense M&S for weapons effectiveness is a realistic way to support virtual warfare similar to real warfare. As the war paradigm becomes platform-centric to network-centric, people try to utilize smartphones as the source of sensor, and command/control data in the simulation-based weapons effectiveness analysis. However, there have been limited researches on integrating smartphones into the weapon simulators, partly due to high modeling cost - modeling cost to accomodate client-server architecture, and re-engineering cost to adapt the simulator on various devices and platforms -, lack of efficient mechanisms to exchange large amount of simulation data, and low-level of security. In this paper, we design and implement Smartphone Adaptor to utilize smartphones for the simulationbased weapons effectiveness analysis. Smartphone Adaptor automatically sends sensor information, GPS and motion data of a client's smartphone to a simulator and receives simulation results from the simulator on the server. Also, we make it possible for data to be transferred safely and quickly through JSON and SEED. Smartphone Adaptor is applied to OpenSIM (Open simulation engine for Interoperable Models) which is an integrated simulation environment for weapons effectiveness analysis, under development of our research team. In this paper, we will show Smartphone Adaptor can be used effectively in constructing a Live simulation, with an example of a chemical simulator.

Cloud Messaging Service for Preventing Smishing Attack (스미싱 공격 방지를 위한 클라우드 메시징 서비스)

  • Park, Hyo-Min;Kim, Wan-Seok;Kang, So-Jeong;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.285-293
    • /
    • 2017
  • They are rapidly evolving malicious attacks on smart devices, and to timely protect the smart devices from these attacks has become a very important issue. In particular, smishing attack has emerged as one of the most important threats on the smartphone. In this paper, we propose the cloud service that can fundamentally protect the user from the risk of smishing attack. The proposed scheme provides cloud messaging service that can filter text messages including URLs in the user's smart device, view and manage them through a virtual machine provided by a cloud server. The existing techniques for preventing smshing attacks protect only malicious code of a known pattern and there is the possibility of error such as FP(False Positive) or FN(False Negative). However, since the proposed method automatically filters all text messages including URLs, storing, viewing, and managing them in their own storage space on the cloud server, it can completely block the installation of malwares(malicious codes) on the user's smart device through smishing attacks.

A Study on the Career Decision-Making Patterns of Fisheries High School Students (수산고등학교(水産高等學校) 학생(學生)들의 직업결정형태(職業決定形態)에 관한 연구(硏究))

  • Park, Kwang-Chun
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.4 no.1
    • /
    • pp.16-29
    • /
    • 1992
  • 1. Purpose of the study: This study was to investigate and analyse the career decision making patterns of students, which would enhance vocational guidance activities for the students. The specific purposes of the study are as follows. 1) To find how much the fisheries high school students are satisfied with the school. 2) To find out the factors which would influence the fisheries high school students in their career decision making. 3) To find out the person who plays the most important role in the career decision making of the students 4) To find out the patterns of behavior taken by the fisheries high school students in their career decision making. 2. Hypotheses: The following hypotheses were tested for this study. 1) There would be significant differences in the extent of school-satisfaction, depending on the class level and major. 2) There would be significant differences in the value criterion with which the fisheries high school students make decisions on their careers, depending on the grades, majors, and the levels of school-satisfaction. 3) There would be significant differences in the human factors which affect their decision-making on their career, depending on the class levels, majors, and the levels of school satisfaction. 4) There would be significant differences in the patterns of behavior they take when they make decisions on their careers depending on the grades, majors and the levels of school satisfaction. 3. Methods of the study: For the verification of the above hypotheses, a questionaire was developed by the researcher, and the questionaire was answered by the total 440 students from three fisheries high schools, located in the rural and urban areas, out of 8 fisheries high schools in Korea. The questionaire was composed of two major parts: school-satisfaction (10 items) and career decision making patterns (39 items). The career decision-making patterns include 16 value criterion items, 10 human category items, and 13 behavior category items. 4. Results of the study: 1) School satisfaction; There was no significant difference in school satisfaction depending on the class level and major. 2) Value criteria; a) Almost of the fisheries high school students think that the potential for advancement, job security, and salary are important factors for their job. b) The seafarer-students rated the salary, prestige of the occupation and leadership to be important than the nonseafarer-students. The nonseafarer-students rated the stabilization of their livelihood and opportunity to use their creative ideas than the seafarer-students. c) The students unsatisfied with their school emphasize the working environment, variety of work duties and leisure more than the satisfied ones. 3) Human factors: a) The fisheries high school students are affected most by their homeroom teachers, major teachers and their parents, but they are less influenced by their counselor. b) The seniors are more affected by their friends or classmates than the freshmen, and especially seafarer-students are more affected by major teachers. c) The persons, who are working in the occupation they are interested in, exert more influence on unsatisfied students than class-teachers do. 4) Behavior patterns; a) Most of them want test their abilities. b) The nonseafarer-students and seniors tend to depend on their own intuitions. c) The seafarer-students, the freshmen, and the satisfied with their school tend to discuss with other persons, and the unsatisfied tend to be influenced by the information that they collect for themselves.

  • PDF