• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.039 seconds

The development model of PT Visionet Internasional (OVO) in Indonesia

  • Yuhang Xia;Yuming Liu;Myeongcheol Choi;Chuijie Meng;Haanearl Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.2
    • /
    • pp.125-131
    • /
    • 2023
  • OVO is a digital platform that provides simple payments and smart financial services, as well as one of the largest digital payment platforms in Indonesia. It has wide coverage and security when making payments, and supports multiple settlement currencies. The purpose of this study is to explore the history, business model, and future strategic direction of OVO, an Indonesian e-wallet. To date, OVO has built its own mobile payment ecosystem covering a wide range of consumer scenarios including e-commerce, travel, offline shopping and finance. And it supports mobile banking, online banking, debit cards or selected partner merchants. Its three largest transaction categories are in the transportation, retail and e-commerce sectors. With over 110 million consumers and 1.3 million merchant users, it is one of the dominant e-wallets in Indonesian market and has become the country's e-payment market leader. OVO eWallet's 'One Card' model offers convenience and choice for users, thus contributing to the rapid growth of OVO eWallet. And OVO eWallet competes fiercely with other competitors, but OVO eWallet continues to grow in terms of the number of users and market share. Finally, this study analyzes the strategic goals and plans of OVO eWallet, predicts its future direction. OVO eWallet has a huge success, but there are still competition and challenges to face.

Underwater Optical Image Data Transmission in the Presence of Turbulence and Attenuation

  • Ramavath Prasad Naik;Maaz Salman;Wan-Young Chung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.1
    • /
    • pp.1-14
    • /
    • 2023
  • Underwater images carry information that is useful in the fields of aquaculture, underwater military security, navigation, transportation, and so on. In this research, we transmitted an underwater image through various underwater mediums in the presence of underwater turbulence and beam attenuation effects using a high-speed visible optical carrier signal. The optical beam undergoes scintillation because of the turbulence and attenuation effects; therefore, distorted images were observed at the receiver end. To understand the behavior of the communication media, we obtained the bit error rate (BER) performance of the system with respect to the average signal-to-noise ratio (SNR). Also, the structural similarity index (SSI) and peak SNR (PSNR) metrics of the received image were evaluated. Based on the received images, we employed suitable nonlinear filters to recover the distorted images and enhance them further. The BER, SSI, and PSNR metrics of the specific nonlinear filters were also evaluated and compared with the unfiltered metrics. These metrics were evaluated using the on-off keying and binary phase-shift keying modulation techniques for the 50-m and 100-m links for beam attenuation resulting from pure seawater, clear ocean water, and coastal ocean water mediums.

Water/nutrient use efficiency and effect of fertigation: a review

  • Woojin Kim;Yejin Lee;Taek-Keun Oh;Jwakyung Sung
    • Korean Journal of Agricultural Science
    • /
    • v.49 no.4
    • /
    • pp.971-978
    • /
    • 2022
  • Fertigation, which has been introduced in agricultural fields since 1990, has been widely practiced in upland fields as well as in plastic film houses as part of the crop production system. In accordance with demands in the agricultural sector, a huge number of scientific studies on fertigation have been conducted worldwide. Moreover, with a combination of advanced technologies such as big-data, machine learning, etc., fertigation is positioned as an indispensable tool to achieve sustainable crop production and to enhance nutrient and water use efficiency. In this review, we focused on providing valuable information in terms of crop production and nutrient/water use efficiency. A variety of fertigation studies have described that enhancement of crop production did not differ relative to conventional method or slightly increased. In contrast, fertigation significantly improved nutrient/water use efficiency, with a reduction in use ranging from 20 to 50%. Water-soluble organic resources such as livestock manure and agricultural byproducts also have been identified as useful resources like chemical fertilizers. Furthermore, the initial irrigation point was generally recommended in a range of -10 - -40 kPa, although the point differed according to the crop and crop growth stage. From this review, we suggest that fertigation, which is closely integrated with advanced technology, could be a leading technology to attain not only food security but also carbon neutrality via improvement of nutrient/water use efficiency.

A Study on improvement of traffic accident safety index for Uljugun, Ulsan (교통사고 안전지수 등급 향상방안 연구_울산광역시 울주군 중심으로)

  • Kim, Yong Moon;Kang, Seong Kyung;Lee, Young Jai
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.2
    • /
    • pp.7-19
    • /
    • 2017
  • Recently, the incidence of disasters and safety incidents is increasing rapidly, and the interest and demands of the people are increasing. In particular, traffic accidents in Korea are decreasing due to the continuous efforts of the government and the local governments, but still higher than the OECD average. In response to such demands of the times, the 'Regional Safety Index', a numerical value that quantifies the level of safety of each local government, is being publicized every year to awaken public awareness. The Regional Safety Index covers seven categories of accidents (traffic accidents, crimes, suicide, infectious diseases, fire, safety accidents, and natural disasters) in local governments. But, this study focuses on the traffic accident area and analyzed. The target local government is Ulju county of Ulsan Metropolitan City. Based on the traffic accident statistical data of Ulju county, the analysis of the traffic accidents and vulnerable points were analyzed. Among them, 3 key improvement districts were selected and 15 vulnerable branches were selected for each key improvement district. Next, we prepared measures for improvement of each accident vulnerable site through analysis of geographic information through traffic data related to traffic accidents and interview with related organizations. In addition, the improvement measures are divided into the structural infrastructure improvement, the institutional improvement, and the traffic safety culture movement from the viewpoint of traffic accident prevention. Finally, the implications of this study are to clarify the duties and roles of the relevant departments in the municipality, based on the implementation schedule of the improvement projects for the prevention of traffic accidents and the budget plan. In addition, it is very important that the participating agencies involved in traffic accidents and the private sector participate in the project.

A Study on the Orbits and the Ground-based Optical Tracking of a Future Korean Navigation Satellite System (미래 한국형 위성항법시스템의 궤도와 지상기반 광학추적에 대한 연구)

  • Jo, Jung Hyun;Yim, Hong-Suh;Choi, Young-Jun;Choi, Jin
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.121-129
    • /
    • 2012
  • Any development plan of a Korean space-based navigational system has been neither designed nor introduced yet. However, the demand for the development of a domestic regional satellite navigation system can be originated from the outside of market. The growing dependency on satellite navigational systems in Korea eventually requires the retainment and the operation of a domestic navigational satellite system. There is not many choices on the orbit designs and the system design concepts of a regional augmented navigation satellite system or a regional navigation satellite system for the service on the vicinity of the Korean peninsular. Space situational awareness (SSA) has been a rising issue for both national security and more realistic space business in Korea. Also SSA related technologies in Korea is a newly inaugurated area and is necessary to generate a navigation messages and maintain a future Korean navigation satellite system. In this study, the availability of Japanese Quasi Zenith Satellite System (QZSS) expected to be deployed definitely sooner than Korean counter-part is analyzed. The availability of the similar configured system over Korea is investigated with assumed QZSS type orbit. Also, feasible configuration of orbits for domestic navigation satellite system is suggested. And the observability of a ground-based optical tracking system as a secondary tracking capability is analyzed.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

Hierarchical Image Encryption System Using Orthogonal Method (직교성을 이용한 계층적 영상 암호화)

  • Kim, Nam-Jin;Seo, Dong-Hoan;Lee, Sung-Geun;Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.3
    • /
    • pp.231-239
    • /
    • 2006
  • In recent years, a hierarchical security architecture has been widely studied because it can efficiently protect information by allowing an authorized user access to the level of information. However, the conventional hierarchical decryption methods require several decryption keys for the high level information. In this paper, we propose a hierarchical image encryption using random phase masks and Walsh code having orthogonal characteristics. To decrypt the hierarchical level images by only one decryption key, we combine Walsh code into the hierarchical level system. For encryption process, we first perform a Fourier transform for the multiplication results of the original image and the random phase mask, and then expand the transformed pattern to be the same size and shape of Walsh code. The expanded pattern is finally encrypted by multiplying with the Walsh code image and the binary phase mask. We generate several encryption images as the same encryption process. The reconstruction image is detected on a CCD plane by a despread process and Fourier transform for the multiplication result of encryption image and hierarchical decryption keys which are generated by Walsh code and binary random phase image. Computer simulations demonstrate that the proposed technique can decrypt hierarchical information by using only one level decryption key image and it has a good robustness to the data loss such as random cropping.

Design and Implementation of Factory Equipment Monitoring System using Grid-based Key Pre-Distribution (그리드 기반 키 선분배 방식을 사용하는 공장 설비 모니터링 시스템 설계 및 구현)

  • CHO, YANGHUI;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.51-56
    • /
    • 2016
  • In this paper, we propose an Arduino-based plant monitoring system. The proposed system is based on the Arduino platform, using an environmental sensor and a pressure sensor for measuring temperature, humidity and illuminance in order to monitor the state of the environment and the facilities of the plant. Monitoring data are transmitted to a ZigBee coordinator connected to a server through a radio frequency transceiver. When using a pressure sensor and the environment sensor data stored on the host server, checking the pressure in the environment of the plant and equipment is intended to report any alarm status to the administrator. Using a grid line-based key distribution scheme, the authentication node dynamically generates a data key to protect the monitoring information. Applying a ZigBee wireless sensor network does not require additional wiring for the actual implementation of a plant monitoring system. Possible working-environment monitoring of an efficient plant can help analyze the cause of any failure by backtracking the working environment when a failure occurs. In addition, it is easy to expand or add a sensor function using the Arduino platform and an expansion board.

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.

DSRC Strategy and Future ITS (DSRC 전략과 향후의 ITS)

  • Park In-Gyu
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.105-119
    • /
    • 2006
  • The car navigation system to be accompanied to the car on-board equipment system or the development of mobile communication technique, the demand in information communication which connects an interior and the car outside is coming to be high, As applications, ETC/VISC/AHS classes get deceived supply are advanced. The research of DSRC radio systems actively, with medium of communication between the automobile and road, is advanced. DSRC radio systems are appropriate in massive data transfer, in the case which the traffic accident evasion is urgent, the notarization of the preferential control function which is necessary to a medium of communication, guarantee and security are suitable in the high-speed network. Accompanied to the cellular phone which is to be supplied recently suddenly, By complementing and coexisting each other, and it will be developed simultaneously. However, in a connection of this kind of communication system and high-speed DSRC radio system, Hand-over technique (network, radio transmission hand-over), there is a technical subject of the high-speed transmission techniques against the mobile devices and the realization is expected to be difficult in near, until 2010 year is becoming the plan of putting to practical use. Also as the next generation DSRC with 5.8GHz built-on board equipment and the road-side equipment are expected in near. In this paper DSRC systems which will be developed are discussed.