• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.032 seconds

A Study of the Sustainable Operation Technologies in the Power Plant Facilities (발전 설비 지속 가능 운영 기술 연구)

  • Lee, Chang Yeol;Park, Gil Joo;Kim, Twehwan;Gu, Yeong Hyeon;Lee, Sung-iI
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.4
    • /
    • pp.842-848
    • /
    • 2020
  • Purpose: It is important to operate safely and economically in obsolescent power plant facilities. Economical operation is related in the balance of the supply and demand. Safety operation predicts the possible risks in the facilities and then, takes measures to the facilities. For the monitoring of the power plant facilities, we needs several kinds of the sensing system. From the sensors data, we can predict the possible risk. Method: We installed the acoustic, vibration, electric and smoke sensors in the power plant facilities. Using the data, we developed 3 kinds of prediction models, such as, demand prediction, plant engine abnormal prediction model, and risk prediction model. Results: Accuracy of the demand prediction model is over 90%. The other models make a stable operation of the system. Conclusion: For the sustainable operation of the obsolescent power plant, we developed 3 kinds of AI prediction models. The model apply to JB company's power plant facilities.

Security Model Tracing User Activities using Private BlockChain in Cloud Environment (클라우드 환경에서 프라이빗 블록체인을 이용한 이상 행위 추적 보안 모델)

  • Kim, Young Soo;Kim, Young Chan;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.11
    • /
    • pp.475-483
    • /
    • 2018
  • Most of logistics system has difficulties in transportation logistics tracking due to problems in real world such as discordance between logistics information and logistics flow. For the solution to these problems, through case study about corporation, suppliers that transport order items in shopping mall, we retain traceability of order items through accordance between logistics and information flow and derive transportation logistics tracking model. Through literature review, we selected permissioned public block chain model as reference model which is suitable for transportation logistics tracking model. We compared, analyzed and evaluated using centralized model and block chain as application model for transportation logistics tracking model. In this paper we proposed transportation logistics tracking model which integrated with logistics system in real world. It can be utilized for tracking and detection model and also as a tool for marketing.

Heuristics evaluation and development of the Caries Management by Risk Assessment (CAMBRA)-kids application for caries management of preschoolers (소아 우식관리를 위한 CAMBRA-kids 애플리케이션 개발 및 휴리스틱 평가)

  • Kang, Yu-Min;Lee, Su-Young
    • Journal of Korean society of Dental Hygiene
    • /
    • v.19 no.4
    • /
    • pp.479-492
    • /
    • 2019
  • Objectives: This study aimed to develop the CAMBRA-kids application for the systematic management of dental caries among preschoolers, activate the dental caries management system, and contribute to the dental caries management of preschoolers. Methods: The collected data were analyzed using R studio 1.2.1335 for Windows (RStudio Inc., Boston, MA, USA, 2018). Algorithm evaluation, heuristic evaluation and usability evaluation were analyzed using descriptive statistics. Results: Both expert evaluations of the application's algorithms were calculated as 100%, for proficiency and efficiency. The application worked well with the designed algorithms, the risk group level of participants was categorized appropriately, and the risk management method was guided properly according to the risk group level. Of the five problems presented in the heuristic evaluation, 'the lack of security' and 'the lack of information on oral health care' received 'high severity' scores. The usability evaluation of the application produces an overall score of 3.27. In the subscales (participation, functionality, aesthetics, and information) of the Mobile App Rating Scale (MARS), the 'participation' domain received the lowest score of 2.56 and the 'functional' domain received the highest score of 3.70. Conclusions: The CAMBRA-kids application is expected to be applied and used in the field of preschoolers' oral health care management, and to contribute to the prevention of dental caries of preschoolers by activating the dental caries management system using the application.

Higher-Order Masking Scheme against DPA Attack in Practice: McEliece Cryptosystem Based on QD-MDPC Code

  • Han, Mu;Wang, Yunwen;Ma, Shidian;Wan, Ailan;Liu, Shuai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1100-1123
    • /
    • 2019
  • A code-based cryptosystem can resist quantum-computing attacks. However, an original system based on the Goppa code has a large key size, which makes it unpractical in embedded devices with limited sources. Many special error-correcting codes have recently been developed to reduce the key size, and yet these systems are easily broken through side channel attacks, particularly differential power analysis (DPA) attacks, when they are applied to hardware devices. To address this problem, a higher-order masking scheme for a McEliece cryptosystem based on the quasi-dyadic moderate density parity check (QD-MDPC) code has been proposed. The proposed scheme has a small key size and is able to resist DPA attacks. In this paper, a novel McEliece cryptosystem based on the QD-MDPC code is demonstrated. The key size of this novel cryptosystem is reduced by 78 times, which meets the requirements of embedded devices. Further, based on the novel cryptosystem, a higher-order masking scheme was developed by constructing an extension Ishai-Sahai-Wagne (ISW) masking scheme. The authenticity and integrity analysis verify that the proposed scheme has higher security than conventional approaches. Finally, a side channel attack experiment was also conducted to verify that the novel masking system is able to defend against high-order DPA attacks on hardware devices. Based on the experimental validation, it can be concluded that the proposed higher-order masking scheme can be applied as an advanced protection solution for devices with limited resources.

Edge-Centric Metamorphic IoT Device Platform for Efficient On-Demand Hardware Replacement in Large-Scale IoT Applications (대규모 IoT 응용에 효과적인 주문형 하드웨어의 재구성을 위한 엣지 기반 변성적 IoT 디바이스 플랫폼)

  • Moon, Hyeongyun;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1688-1696
    • /
    • 2020
  • The paradigm of Internet-of-things(IoT) systems is changing from a cloud-based system to an edge-based system to solve delays caused by network congestion, server overload and security issues due to data transmission. However, edge-based IoT systems have fatal weaknesses such as lack of performance and flexibility due to various limitations. To improve performance, application-specific hardware can be implemented in the edge device, but performance cannot be improved except for specific applications due to a fixed function. This paper introduces a edge-centric metamorphic IoT(mIoT) platform that can use a variety of hardware through on-demand partial reconfiguration despite the limited hardware resources of the edge device, so we can increase the performance and flexibility of the edge device. According to the experimental results, the edge-centric mIoT platform that executes the reconfiguration algorithm at the edge was able to reduce the number of server accesses by up to 82.2% compared to previous studies in which the reconfiguration algorithm was executed on the server.

Real-Time Change Detection Architecture Based on SOM for Video Surveillance Systems (영상 감시시스템을 위한 SOM 기반 실시간 변화 감지 기법)

  • Kim, Jongwon;Cho, Jeongho
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.4
    • /
    • pp.109-117
    • /
    • 2019
  • In modern society, due to various accidents and crime threats committed to an unspecified number of people, individual security awareness is increasing throughout society and various surveillance techniques are being actively studied. Still, there is a decline in robustness due to many problems, requiring higher reliability monitoring techniques. Thus, this paper suggests a real-time change detection technique to complement the low robustness problem in various environments and dynamic/static change detection and to solve the cost efficiency problem. We used the Self-Organizing Map (SOM) applied as a data clustering technique to implement change detection, and we were able to confirm the superiority of noise robustness and abnormal detection judgment compared to the detection technique applied to the existing image surveillance system through simulation in the indoor office environment.

A Study on the Blockchain-Based Bill of Lading System to Improve Usability (사용성 개선을 위한 블록체인 기반 선하증권 거래 시스템 연구)

  • Lee, Ju-young;Kim, Hyun-a;Sung, Chae-min;Kim, Joung-min;Kim, Sungwook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.7
    • /
    • pp.283-290
    • /
    • 2022
  • Blockchain is a technology that secures integrity and transparency by distributing and storing transaction details within multiple node networks. Recently, research is being conducted to secure integrity by applying blockchain to Bill of Lading (B/L documents) of monetary value. In this paper, we study a blockchain-based bill of lading system to improve usability. The shippers register the issued bill of lading on the blockchain, and banks in each country read it to conduct L/C transactions. The consignees receive the goods after completing certification with a quick response code (QR) containing the bill of lading information. Through this, shippers enjoy merits in that they can shorten the time and cost of sending shipping documents by mail and prove the integrity of the documents. The consignees have the advantage of being able to check the documents at the same time as they are registered and trust the transaction. Finally, on the bank side, the security of shipping documents is ensured and verification can be done quickly.

Modeling of Collection Process for Real-time Forensic Data (포렌식 데이터의 실시간 수집 절차 모델링)

  • Kim, Tae-Hoon;Park, Nam-Kyu;Choi, Han-Na;Lee, Dae-Yoon;Ahn, Jong-Deuk;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.139-145
    • /
    • 2009
  • This study proposes a model of collection process for real-time forensic data, in which the manager was to respond to infringement incidents in terms of system operation and inspection and to collect, analyze and restore forensic data immediately after an incident took place. The suggested model was modeled in seven processes according to functional elements. Unlike the old and managerial forensic processes, the model allowed the manager to react to infringement incidents in the aspects of system operation and inspection and to follow the processes of collecting, analyzing, and restoring forensic data in case of an incident. There also was a feedback process designed towards the step of gathering forensic data through the stages of systematizing reaction strategies in order that he or she be able to bring about comprehensive and structural responses to an incident like the former processes in which it is difficult to bring about instant responses.

A Study on the Priorities of Enabling Digital Healthcare Platform for Small and Medium Enterprises : A Comparative Analysis of Consumers and Suppliers

  • Yeon-Kyeong Lee;Min-Jung Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.131-141
    • /
    • 2024
  • The aging population and worsening lifestyle habits have increased the risk of chronic diseases. This has heightened the importance of preventive healthcare, particularly through personalized health management services based on individual health data. Despite this, the domestic digital healthcare industry remains underdeveloped. Given the need for acceptance from both consumers and providers, this study uses the Analytic Hierarchy Process (AHP) to identify success factors for health management service platforms. AHP evaluates the relative importance of various factors to aid decision-making. Results show that providers prioritize data analysis and platform design, laws and regulations, and data standardization, while consumers prioritize system stability, laws and regulations, and system security. These findings highlight the need for strategies to bridge the expectation gap to effectively promote health management service platforms.

A Study on the Energy Platform to Reduce Carbon Emissions (탄소배출 저감을 위한 에너지 플랫폼 연구)

  • Beom-seok Cha;Hyung-Jin Moon;Woojin Wi;Gab-Sang Ryu
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.43-50
    • /
    • 2024
  • This manuscript proposes an artificial intelligence-based(AI) energy platform system that efficiently use existing energy than creating new energy than creating new energy sources. To this end, it collects public information data portal and statistics data portal and data emissions, including energy usage and greenhouse gas emissions, including energy consumption and greenhouse gas emissions.In addition, it provides strong security and personal information protection functions to overcome the limit of existing energy platform. Through the built energy platform, improving power supply and user convenience of users and users to contribute to global warming issues.In this paper, the contents to implement the contents of the system, and improvement direction from the future completion and improvement direction.