• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.036 seconds

Efficient Scheduling of Sensor-based Elevator Systems in Smart Buildings (스마트 빌딩을 위한 센서 기반의 효율적인 엘리베이터 스케줄링)

  • Bahn, Hyokyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.367-372
    • /
    • 2016
  • In a modern smart building, sensors can detect various physical conditions, such as temperature, humidity, sound, motion, and light, which can be used in medical services and security, and for energy savings. This paper presents an efficient elevator scheduling system that utilizes smart sensor technologies with radio-frequency identification, video, and floor sensors to detect the arrival of elevator users in advance. The detected information is then delivered to the elevator scheduling system via building networks. By using this information, the proposed system makes a reservation call for efficient control of the elevator's direction and time. Experiments under a spectrum of traffic conditions show that the proposed system performs better than a legacy system with respect to average wait time, maximum wait time, and energy consumption.

A Study on the Evaluation Method of Defense Technology Valuation Using the Readability Level Assessment of Core National Defense Technology (국방 핵심기술의 성숙도(Readiness Level)평가를 활용한 국방기술가치평가 방안 연구)

  • Lee, Hyung-Seog;Shin, Chung-Jin;Kang, Seok-Joong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1710-1719
    • /
    • 2019
  • This study is intended to understand defense technologies that require the convergence of various technologies and the integration of systems, and to propose valuation methods that reflect the characteristics of each field. The measure of technology level, integration (system integration technology) between technologies, preparation of manufacturing, and maturity scale of the weapons system to be valued are measured according to the items of measurement factors to verify system performance, and to present a framework for estimating the quantitative values of core technologies using system maturity. Considering the characteristics of each technology field, the research suggests a proper valuation method. In evaluating the value of defense technologies, A proposal is made to evaluate the value of defense technology by competent technical experts in each field, using SRL, which can be evaluated according to the evaluation criteria reflecting the technical characteristics of each field, and to evaluate the completion of the entire system in quantitative terms.

A Study on the Improvement of Police Committee System in Korea - Focus on the National Police Committee -

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.143-146
    • /
    • 2021
  • Korean police have been established as a national police system since the liberation of Korea and have been operated as a centralized police system for a long time, and a police committee was established under the enactment of the Police Act in 1991. However, the National Police Commission has a problem that it cannot perform the functions of the original National Police Commission because it is only a simple advisory body, not an institution that reviews and decides major policies related to police administration. As a result, despite the passage of a full amendment to the Police Act in 2020 and the revision of the Act to the Organization and Operation of the National Police and Local Police, operational and compositional problems still exist. Therefore, this study intends to propose the current state of operation and problems of the police committee system and measures for improvement.

A Technique for Accurate Detection of Container Attacks with eBPF and AdaBoost

  • Hyeonseok Shin;Minjung Jo;Hosang Yoo;Yongwon Lee;Byungchul Tak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.39-51
    • /
    • 2024
  • This paper proposes a novel approach to enhance the security of container-based systems by analyzing system calls to dynamically detect race conditions without modifying the kernel. Container escape attacks allow attackers to break out of a container's isolation and access other systems, utilizing vulnerabilities such as race conditions that can occur in parallel computing environments. To effectively detect and defend against such attacks, this study utilizes eBPF to observe system call patterns during attack attempts and employs a AdaBoost model to detect them. For this purpose, system calls invoked during the attacks such as Dirty COW and Dirty Cred from popular applications such as MongoDB, PostgreSQL, and Redis, were used as training data. The experimental results show that this method achieved a precision of 99.55%, a recall of 99.68%, and an F1-score of 99.62%, with the system overhead of 8%.

A Study on the Practice Model for Practical Education for Health and Medical Information Management (보건의료정보관리 실습교육을 위한 실습모델 연구)

  • Choi, Joon-Young
    • Journal of the Health Care and Life Science
    • /
    • v.8 no.2
    • /
    • pp.83-93
    • /
    • 2020
  • In this study, a practical model for health information management education using the EMR education system at universities for nurturing health care information managers was studied. Currently, there is no practical training course for health care information management in the standards for evaluation and certification of health care information management education introduced to strengthen the job competency of health care information managers. Accordingly, the program was constructed so that the practice program suggested as an educational environment in the Health and Medical Information Management Education Evaluation and Certification Manual can be practiced in the EMR education system. In addition, a practical model that can be performed according to the on-site practice guidelines for health and medical information management for each program was studied. Using the health care information management education EMR system, master data management, patient registration, doctor prescription, medical cost calculation, health insurance claim management, form management, discharge registration, cancer registration, unrecorded management, health care data management, health care statistics, A practice model was studied so that practice on information protection/security management can be performed. It will be possible to play a role as a health care information management expert by raising the quality level of health care information management education through systematic and standardized health care information management practice courses at universities. Accordingly, it is necessary to cultivate health care information management experts who develop and manage medical services based on medical data analysis through practical training of health care information managers.

Performance Evaluation of a Novel Chaos Transceiver for the High Level Modulation (고레벨 변조를 위한 새로운 카오스 송수신기의 성능 평가)

  • Lee, Jun-Hyun;Ryu, Heung-Gyoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.1
    • /
    • pp.31-36
    • /
    • 2014
  • Security of chaos communication system that has characteristic of sensitive initial conditions is superior to digital communication systems, but BER(Bit Error Rate) performance is evaluatied badly. So, studies in order to improve the BER performance is important. existing studies, BER performance of proposed chaos transceiver is possible to improve than the CDSK(Correlation Delay Shift Keying) system because it has characteristic that has very few addition elements like noise signal except for the desired signal. Chaos communication system has many symbols because it spreads according to characteristic of chaos map. Therefore, study that can have the good data rate in chaos communication system is required. Information bits of existing chaos modulation system are modulated as -1 and 1 on the basis of BPSK system. However, instead of BPSK system, if chaos communication system is applied high level modulation systems such as QPSK system and 16QAM system, it is possible to have good data rate because more data are transmitted at a time. In the paper, when QPSK system and 16QAM system are applied to proposed chaos transceiver in existing study, we evaluate the SER(Symbol Error Rate) performance and compare the each performance. Also, when QPSK system and 16QAM system are applied to proposed chaos transceiver, we evaluate the anti-jamming performance of proposed system.

Designing and Implementing IOT-based Casino Information System (Windows OS, Windows Server) (IOT 기반의 카지노정보시스템 설계 및 구현(Windows OS, Windows Server))

  • LEE, Dae Kun;NA, Seung You
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.151-160
    • /
    • 2015
  • As a lexical meaning, casino is defined as "a certified gambling house, equipped with recreational facilities such as dance and music, etc., where people play roulette or cards." Casinos started from 17th to 18th century for European nobility and their social meetings and established a casino industry framework in the United States in the 1930s. The success of the casino business leads to the increase of sales; it became very helpful for the local and national government revenues and also for the related incidental tasks. Casino operations include a variety of fields, such as general customer management, dealer game management, security, account management, currency exchange, re-exchange management, marketing management, comp management and placement management, etc. These operations should be organically connected to each other by information systems such as a groupware, ERP and Customer Relationship Management (CRM), etc. In addition, in order to effectively manage comprehensive entertainment service, including accommodation and tourism, it is necessary to develop an information system which supports casino business and collateral entertainment service, collects the data generated throughout the business and provides information about the situations of management. Thus, this study will propose a casino information system designed and implemented, considering these details.

A Study on the Suitability of Unified Project Management Framework Applying for IT Services in Public Organizations (공공기관 IT 서비스 종합관리 프레임워크 도입의 적정성 연구)

  • Park, Min-Kuk;Park, Dae-Ha
    • Journal of Service Research and Studies
    • /
    • v.7 no.3
    • /
    • pp.21-36
    • /
    • 2017
  • Recently in information business, managing and auditing are getting more difficult because of enlargement, intellectualization and convergence. In addition, ordering organizations have been having a difficult time choosing a service because not only there is a huge overlap between information audit system and PMO but also the work boundaries of those two are not clear enough. As the demand that a business managing and auditing frame work need to be more developed in terms of independence, quality, economic feasibility and responsibility has been increased, the Korea Association Of Information Systems Audit has been attempting to improve business management and audit system by proposing Unified Project Management Framework whose process is approximately constructed. This study introduces Unified Project Management Framework which is all-encompassing from the ordering at the very beginning of business to the operating in the post-processing step and then verifies its work scope through a comparative analysis with existing management systems. Also, this thesis examines the necessity of unification of audit system and PMO by analysing existing similar systems. At the end, this study, analyses the suitability of Unified Project Management Framework by evaluating it with IT goal frame of COBIT5 which is constructed based on BSC performance management index. The result of the analysis is expected to help people in charge understanding the features of Unified Project Management Framework before they apply it to practical business.

Protective Way Improvement of a Crime Victim's Rights of Portrait (범죄 피해자의 초상권보호 개선방안)

  • Joen, Chan-Hui
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.286-298
    • /
    • 2009
  • Became large a problem we were productive movement of information became large and occurring to diffusions of development of public media and Internet use. While the Internet became a generalization, public media had more influences and risks, and a crime to abuse anonymity became large in cyber space. In addition, damage is becoming expanded reproduction that infringe of ' crime victim's rights of portrait'. The point that is most important in order to improve these points is recognition regarding the special situation of crime victim, and the ethic consciousness and independent operation regulation and regulation system that these point was taken into consideration in the public media and Internet operation that are an information producer is necessary, and Internet portal shall be included like Internet newspapers to the arbitration object of the Press Arbitration Commission. Also, a legal system regarding personal responsibility shall have for protection of a crime victim's rights of portrait by personal information activity for protection in cyber space. Suggest to a portrait of a crime victim, and an individual and social rights security effort are required for activation regarding an infringement relief system.

Narrow-Band Jamming Signal Cancellation Algorithm for GPS Receivers (GPS 수신기에서 적용 가능한 효과적인 협대역 전파방해 신호 제거 알고리즘)

  • Lee, In-seok;Oh, Seong-jun;Han, Jin-hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.8
    • /
    • pp.859-867
    • /
    • 2016
  • The Global Positioning System is a navigation system that has been developed by the United States for military use. Currently, many countries, including the Republic of Korea, use GPS for civilian and military uses. However, as useful as it is, GPS is vulnerable to its Jamming signal, as the strength of the signal from satellites is very weak. In this paper, a novel jamming signal detection and cancellation method is proposed when a narrow-band jamming signal is included in the GPS received signal. At the GPS receiver, the received signal is transformed to a frequency domain sample by Fast Fourier Transform. In order to suppress the Spectral Leakage, the Blackman-Harris window is used. The proposed jamming signal cancellation algorithm will find the frequency sample with maximum power and null the maximum sample in addition to some lateral samples. If the GPS receiver is designed with FFT of size 128 to 512, it is shown that 42 samples are optimal to cancel the narrow-band jamming signal.