• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.032 seconds

A study of hybrid neural network to improve performance of face recognition (얼굴 인식의 성능 향상을 위한 혼합형 신경회로망 연구)

  • Chung, Sung-Boo;Kim, Joo-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2622-2627
    • /
    • 2010
  • The accuracy of face recognition used unmanned security system is very important and necessary. However, face recognition is a lot of restriction due to the change of distortion of face image, illumination, face size, face expression, round image. We propose a hybrid neural network for improve the performance of the face recognition. The proposed method is consisted of SOM and LVQ. In order to verify usefulness of the proposed method, we make a comparison between eigenface method, hidden Markov model method, multi-layer neural network.

A Hardware Implementation of Ultra-Lightweight Block Cipher PRESENT-80/128 (초경량 블록암호 PRESENT-80/128의 하드웨어 구현)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.430-432
    • /
    • 2015
  • This paper describes a hardware implementation of ultra-lightweight block cipher algorithm PRESENT-80/128 that supports for two master key lengths of 80-bit and 128-bit. The PRESENT algorithm that is based on SPN (substitution and permutation network) consists of 31 round transformations. A round processing block of 64-bit data-path is used to process 31 rounds iteratively, and circuits for encryption and decryption are designed to share hardware resources. The PRESENT-80/128 crypto-processor designed in Verilog-HDL was verified using Virtex5 XC5VSX-95T FPGA and test system. The estimated throughput is about 550 Mbps with 275 MHz clock frequency.

  • PDF

Efficient and Secure Routing Protocol forWireless Sensor Networks through SNR Based Dynamic Clustering Mechanisms

  • Ganesh, Subramanian;Amutha, Ramachandran
    • Journal of Communications and Networks
    • /
    • v.15 no.4
    • /
    • pp.422-429
    • /
    • 2013
  • Advances in wireless sensor network (WSN) technology have enabled small and low-cost sensors with the capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. In the WSN, the sensor nodes have a limited transmission range and their processing and storage capabilities as well as their energy resources are limited. A triple umpiring system has already been proved for its better performance in WSNs. The clustering technique is effective in prolonging the lifetime of the WSN. In this study, we have modified the ad-hoc on demand distance vector routing by incorporating signal-to-noise ratio (SNR) based dynamic clustering. The proposed scheme, which is an efficient and secure routing protocol for wireless sensor networks through SNR-based dynamic clustering (ESRPSDC) mechanisms, can partition the nodes into clusters and select the cluster head (CH) among the nodes based on the energy, and non CH nodes join with a specific CH based on the SNR values. Error recovery has been implemented during the inter-cluster routing in order to avoid end-to-end error recovery. Security has been achieved by isolating the malicious nodes using sink-based routing pattern analysis. Extensive investigation studies using a global mobile simulator have shown that this hybrid ESRP significantly improves the energy efficiency and packet reception rate as compared with the SNR unaware routing algorithms such as the low energy aware adaptive clustering hierarchy and power efficient gathering in sensor information systems.

The Study on the China Advance Plan of Senior Products Industrial (고령친화산업 대중국진출방안 연구)

  • Park, Keun-Soo;Kim, So-Jin
    • International Commerce and Information Review
    • /
    • v.14 no.4
    • /
    • pp.5-25
    • /
    • 2012
  • This study is to explore the advance plan of senior products industrial into China. For this purpose, we examine the current status of the senior products industrial in Korea and investigate the demand of senior products industrial in China. Based on the results of these analyses, we discussed the concrete plans to advance into China. At result, the senior products industrial markets needed to develop in China are the elderly tourism industry, the elderly medical equipment and pension. And Korean companies intending to advance into China market might should capture the change of social security system, the trait of senior products industrial, and the regional characteristics in China.

  • PDF

A Study on the ASK Communication Modem over Electrical Power Lines (전력선을 이용한 ASK통신 모뎀에 관한 연구)

  • 사공석진;송문규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.9
    • /
    • pp.951-962
    • /
    • 1992
  • The layout of electrical power distribution networks never involved communications aspects. As a result their transmission properties severly complicate the use as data links. Futhermore bandwidth as well as transmission power is restricted. Nevertheless, power distribution net works represent a most attractive medium for digital communication purposes due to an ever increasing demand, e.g., for environment management of buildings, office automation, and remote meter reading or security monitoring. In this paper, a power line modem which is capable of transmitting and receiving data at 1200 bps using OOK-BASK through 220V AC power lines is implemented. The receiver includes noncoherent detector and performs soft decision. The OLM circuits can be simplified by use of microprocessor. The PLM also satisfies CENELEC, European standards, and can be applied to home automation system.

  • PDF

A Brokered Authentication Scheme Based on Smart-Card for Multi-Server Authentication (다중서버 인증을 위한 스마트카드 기반 중재 인증 기법 연구)

  • Kim, Myungsun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.3
    • /
    • pp.190-198
    • /
    • 2013
  • Since the facilities for the remote users tend to be deployed in distributed manner, authentication schemes for multi-server communication settings, which provide various web services, are required for real-world applications. A typical way to authenticate a remote user relies on password authentication mostly. However, this method is vulnerable to attacks and inconvenient as the system requires users to maintain different identities and corresponding passwords. On the other hand, the user can make use of a single password for all servers, but she may be exposed to variants of malicious attacks. In this paper, we propose an efficient and secure authentication scheme based on a brokered authentication along with smart-cards in multi-server environment. Further we show that our scheme is secure against possible attacks and analyze its performance with respect to communication and computational cost.

Analysis of Improved Convergence and Energy Efficiency on Detecting Node Selection Problem by Using Parallel Genetic Algorithm (병렬유전자알고리즘을 이용한 탐지노드 선정문제의 에너지 효율성과 수렴성 향상에 관한 해석)

  • Seong, Ki-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.953-959
    • /
    • 2012
  • There are a number of idle nodes in sensor networks, these can act as detector nodes for anomaly detection in the network. For detecting node selection problem modeled as optimization equation, the conventional method using centralized genetic algorithm was evaluated. In this paper, a method to improve the convergence of the optimal value, while improving energy efficiency as a method of considering the characteristics of the network topology using parallel genetic algorithm is proposed. Through simulation, the proposed method compared with the conventional approaches to the convergence of the optimal value was improved and was found to be energy efficient.

Network Defense Mechanism Based on Isolated Networks (격리 네트워크를 활용한 네트워크 방어 기법)

  • Jung, Yongbum;Park, Minho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1103-1107
    • /
    • 2016
  • Network assets have been protected from malware infection by checking the integrity of mobile devices through network access control systems, vaccines, or mobile device management. However, most of existing systems apply a uniform security policy to all users, and allow even infected mobile devices to log into the network inside for completion of the integrity checking, which makes it possible that the infected devices behave maliciously inside the network. Therefore, this paper proposes a network defense mechanism based on isolated networks. In the proposed mechanism, every mobile device go through the integrity check system implemented in an isolated network, and can get the network access only if it has been validated successfully.

A Study of the stockpile and mobilization framework for the disaster management resources (재난관리자원 비축 및 동원 체계 연구)

  • Lee, Changyeol;Kim, Taehwan;Park, Giljoo
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.3
    • /
    • pp.376-384
    • /
    • 2015
  • It needs a framework to minimizing the damage using the just-time just-resources strategy. But it is not easy to put 'what kinds of resources', 'how many resources', 'from where institutions', and 'how much money for the reimbursement'. So most of the local government depends on the field manager. In this study, we analysed the conventional system and provides the efficient methodology to the stockpiling and mobilizing against to the disaster. The study does not provide the stockpile amount for the local governments, because the stockpile amounts must consider the local diverse situations.

A study on Professionalization of Student Protecting Manpower for the Prevention of School Violence (학교폭력예방을 위한 학생보호인력의 전문화방안에 관한 연구)

  • Kim, Sun-Ah
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.1
    • /
    • pp.87-96
    • /
    • 2013
  • The purpose of this research is to suggest specialization measures of student protecting manpower for the prevention of school violence in Korea. Therefore, student protecting manpower's legal limitation, insufficiency of professionalism, insufficiency of recruitment standard's suitability, insufficiency of educational training, cooperative problem with related institutions and ethical problems were drawn as the problems of student protecting manpower. The measures for improving those problems are as follows. The first is to revise laws related to school protecting manpower and strengthen systems. The second is to prepare proper standard to recruit student protecting manpower. The third is to establish professional training institution of student protecting manpower. The fourth is to establish close cooperation system with institutions related to student protection. The fifth is to legislate ethics codes of student protecting manpower.