• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.049 seconds

Detection of Abnormal Vessel Trajectories with Convolutional Autoencoder (합성곱 오토인코더를 이용한 이상거동 선박 식별)

  • Son, June-Hyoung;Jang, Jun-Gun;Choi, Bongwan;Kim, Kyeongtaek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.190-197
    • /
    • 2020
  • Recently there was an incident that military radars, coastal CCTVs and other surveillance equipment captured a small rubber boat smuggling a group of illegal immigrants into South Korea, but guards on duty failed to notice it until after they reached the shore and fled. After that, the detection of such vessels before it reach to the Korean shore has emerged as an important issue to be solved. In the fields of marine navigation, Automatic Identification System (AIS) is widely equipped in vessels, and the vessels incessantly transmits its position information. In this paper, we propose a method of automatically identifying abnormally behaving vessels with AIS using convolutional autoencoder (CAE). Vessel anomaly detection can be referred to as the process of detecting its trajectory that significantly deviated from the majority of the trajectories. In this method, the normal vessel trajectory is gridded as an image, and CAE are trained with images from historical normal vessel trajectories to reconstruct the input image. Features of normal trajectories are captured into weights in CAE. As a result, images of the trajectories of abnormal behaving vessels are poorly reconstructed and end up with large reconstruction errors. We show how correctly the model detects simulated abnormal trajectories shifted a few pixel from normal trajectories. Since the proposed model identifies abnormally behaving ships using actual AIS data, it is expected to contribute to the strengthening of security level when it is applied to various maritime surveillance systems.

Analysis of Public Sector Sharing Rate based on the IoT Device Classification Methodology (사물인터넷(IoT) 기기 분류 체계 기반 공공분야 점유율 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.65-72
    • /
    • 2022
  • The Internet of Things (IoT) provides data convergence and sharing functions, and IoT technology is the most fundamental core technology in creating new services by convergence of various cutting-edge technologies. However, there are different classification systems for the Internet of Things, and when it is limited to the domestic public sector, it is difficult to properly grasp the current status of which devices are installed and operated with what share, and systematic data or research The results are very difficult to find. Therefore, in this study, the relevance of the classification system for IoT devices was analyzed according to reality based on sales, shipments, and growth rate, and based on this, the actual share of IoT devices among domestic public institutions was analyzed in detail. The derived detailed analysis results are expected to be efficiently utilized in the process of selecting IoT devices for research and analysis to advance information protection technology such as responding to malicious code attacks on IoT devices, analyzing incidents, and strengthening security vulnerabilities.

Design and Implementation of Convenience System Based on IoT (IoT를 기반한 편의 시스템 설계 및 구현)

  • Ui-Do Kim;Seung-Jin Yu;Jae-Won Lee;Seok-Tae Cho;Jae-Wook Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.165-172
    • /
    • 2024
  • In this paper, we designed a smart home system that can be used intuitively and easily in everyday life, such as sending text messages to users, providing various information and scheduling using smart AI, and providing lighting and atmosphere suitable for the atmosphere in situations such as listening to music using neopixels, as well as using ESP32, RFID, and Google Cloude Console using raspberry pie. As a result of the experiment, it was confirmed that security characters were normally sent to users when RFID was recognized on ESP32 connected to Wi-Fi even if the power was reconnected, and smart AI using Neopixel lighting, Raspberry Pie, and voice recognition, which calculated frequency, also changed the recognition rate over distance, but it worked.

The Classification System and Information Service for Establishing a National Collaborative R&D Strategy in Infectious Diseases: Focusing on the Classification Model for Overseas Coronavirus R&D Projects (국가 감염병 공동R&D전략 수립을 위한 분류체계 및 정보서비스에 대한 연구: 해외 코로나바이러스 R&D과제의 분류모델을 중심으로)

  • Lee, Doyeon;Lee, Jae-Seong;Jun, Seung-pyo;Kim, Keun-Hwan
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.127-147
    • /
    • 2020
  • The world is suffering from numerous human and economic losses due to the novel coronavirus infection (COVID-19). The Korean government established a strategy to overcome the national infectious disease crisis through research and development. It is difficult to find distinctive features and changes in a specific R&D field when using the existing technical classification or science and technology standard classification. Recently, a few studies have been conducted to establish a classification system to provide information about the investment research areas of infectious diseases in Korea through a comparative analysis of Korea government-funded research projects. However, these studies did not provide the necessary information for establishing cooperative research strategies among countries in the infectious diseases, which is required as an execution plan to achieve the goals of national health security and fostering new growth industries. Therefore, it is inevitable to study information services based on the classification system and classification model for establishing a national collaborative R&D strategy. Seven classification - Diagnosis_biomarker, Drug_discovery, Epidemiology, Evaluation_validation, Mechanism_signaling pathway, Prediction, and Vaccine_therapeutic antibody - systems were derived through reviewing infectious diseases-related national-funded research projects of South Korea. A classification system model was trained by combining Scopus data with a bidirectional RNN model. The classification performance of the final model secured robustness with an accuracy of over 90%. In order to conduct the empirical study, an infectious disease classification system was applied to the coronavirus-related research and development projects of major countries such as the STAR Metrics (National Institutes of Health) and NSF (National Science Foundation) of the United States(US), the CORDIS (Community Research & Development Information Service)of the European Union(EU), and the KAKEN (Database of Grants-in-Aid for Scientific Research) of Japan. It can be seen that the research and development trends of infectious diseases (coronavirus) in major countries are mostly concentrated in the prediction that deals with predicting success for clinical trials at the new drug development stage or predicting toxicity that causes side effects. The intriguing result is that for all of these nations, the portion of national investment in the vaccine_therapeutic antibody, which is recognized as an area of research and development aimed at the development of vaccines and treatments, was also very small (5.1%). It indirectly explained the reason of the poor development of vaccines and treatments. Based on the result of examining the investment status of coronavirus-related research projects through comparative analysis by country, it was found that the US and Japan are relatively evenly investing in all infectious diseases-related research areas, while Europe has relatively large investments in specific research areas such as diagnosis_biomarker. Moreover, the information on major coronavirus-related research organizations in major countries was provided by the classification system, thereby allowing establishing an international collaborative R&D projects.

RBAC-based health care service platform for individual recommended health information service (RBAC에 기반한 개인 맞춤형 건강 정보 제공 헬스케어 서비스 플랫폼)

  • Song, Je-Min;Kim, Myung-Sic;Jeong, Kyeong-Ja;Shin, Moon-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1740-1748
    • /
    • 2014
  • In this paper, we propose an RBAC based personalized health care service platform in order to provide smart management of personal health record using smart devices. It helps to guide healthful service and provide useful information according to one's individual health record. Personalized health care services platform supports a healthy lifestyle by measuring personal health information in a hospital clinical, imaging, and drug data, as well as that can be obtained from smart devices. Everyone can enter his health related data in everyday life such as food, sleeping time, mood, movement and exercise so that one can manage his personal health information of modern smart features. In addition, if necessary, personal health information can be provided to the hospital information system and staff with the consent of the individual. It can be contributed to simplify the complex process for remote medical. The proposed platform, which applies role based access control model to protect security and privacy, supports a smart health care services for users by providing personalized health care services through the smart applications.

Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks (무선 단말기의 계산 효율성을 고려한 유.무선 통합 네트워크 환경에서의 안전한 그룹 통신)

  • Chang Woo-Suk;Kim Hyun-Jue;Nam Jung-Hyun;Cho Seok-Hyang;Won Dong-Ho;Kim Seung-Joo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.60-71
    • /
    • 2006
  • Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely and efficiently establish a common secret key, Over the years, a number of solutions to the group key agreement protocol have been proposed with varying degrees of complexity, and the research relating to group key agreement to securely communicate among a group of members in integrated wired and wireless networks has been recently proceeded. Both features of wired computing machines with the high-performance and those of wireless devices with the low-power are considered to design a group key agreement protocol suited for integrated wired and wireless networks. Especially, it is important to reduce computational costs of mobile devices which have the limited system resources. In this paper, we present an efficient group key agreement scheme which minimizes the computational costs of mobile devices and is well suited for this network environment and prove its security.

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare (기업의 온라인 고객 서비스가 기업의 수익 및 고객의 후생에 미치는 영향에 관한 연구)

  • Kim, Eun-Jin;Lee, Byung-Tae
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.123-137
    • /
    • 2007
  • The advent of the Internet and related Web technologies has created an easily accessible link between a firm and its customers, and has provided opportunities to a firm to use information technology to support supplementary after-sale services associated with a product or service. It has been widely recognized that supplementary services are an important source of customer value and of competitive advantage as the characteristics of the product itself. Many of these supplementary services are information-based and need not be co-located with the product, so more and more companies are delivering these services electronically. Net-based customer service, which is defined as an Internet-based computerized information system that delivers services to a customer, therefore, is the core infrastructure for supplementary service provision. The importance of net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of well-implemented net-based customer service are enhanced customer loyalty and higher lock-in of customers, and a resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such net-based customer service. The digital divide is the phenomenon in our society that captures the observation that not all customers have equal access to computers. Socioeconomic factors such as race, gender, and education level are strongly related to Internet accessibility and ability to use. This is due to the differences in the ability to bear the cost of a computer, and the differences in self-efficacy in the use of a technology, among other reasons. This concept, applied to e-commerce, has been called the "e-commerce divide." High Internet penetration is not eradicating the digital divide and e-commerce divide as one would hope. Besides, to accommodate personalized support, a customer must often provide personal information to the firm. This personal information includes not only name and address, but also preferences information and perhaps valuation information. However, many recent studies show that consumers may not be willing to share information about themselves due to concerns about privacy online. Due to the e-commerce divide, and due to privacy and security concerns of the customer for sharing personal information with firms, limited numbers of customers adopt net-based customer service. The limited level of customer adoption of net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We model a market entry scenario where a firm (the incumbent) uses the net-based customer service system in inducing loyalty in its customer base. The firm sells one product through the traditional retailing channels and at a price set for these channels. Another firm (the entrant) enters the market, and having observed the price of the incumbent firm (and after deducing the loyalty levels in the customer base), chooses its price. The profits of the firms and the surplus of the two customers segments (the segment that utilizes net-based customer service and the segment that does not) are analyzed in the Stackelberg leader-follower model of competition between the firms. We find that an increase in adoption of net-based customer service by the customer base is not always desirable for firms. With low effectiveness in enhancing customer loyalty, firms prefer a high level of customer adoption of net-based customer service, because an increase in adoption rate decreases competition and increases profits. A firm in an industry where net-based customer service is highly effective loyalty mechanism, on the other hand, prefers a low level of adoption by customers.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

Evaluating of the Effectiveness of RTK Surveying Performance Based on Low-cost Multi-Channel GNSS Positioning Modules (다채널 저가 GNSS 측위 모듈기반 RTK 측량의 효용성 평가)

  • Kim, Chi-Hun;Oh, Seong-Jong;Lee, Yong-Chang
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.2
    • /
    • pp.53-65
    • /
    • 2022
  • According to the advancement of the GNSS satellite positioning system, the module of hardware and operation software reflecting accuracy and economical efficiency is implemented in the user sector including the multi-channel GNSS receiver, the multi-frequency external antenna and the mobile app (App) base public positioning analysis software etc., and the multichannel GNSS RTK positioning of the active configuration method (DIY, Do it yourself) is possible according to the purpose of user. Especially, as the infrastructure of multi-GNSS satellite is expanded and the potential of expansion of utilization according to various modules is highlighted, interest in the utilization of multi-channel low-cost GNSS receiver module is gradually increasing. The purpose of this study is to review the multi-channel low-cost GNSS receivers that are appearing in the mass market in various forms and to analyze the utilization plan of the "address information facility investigation project" of the Ministry of Public Administration and Security by constructing the multi-channel low-cost GNSS positioning module based RTK survey system (hereinafter referred to as "multi-channel GNSS RTK module positioning system"). For this purpose, we constructed a low-cost "multi-channel GNSS RTK module positioning system" by combining related modules such as U-blox's F9P chipset, antenna, Ntrip transmission of GNSS observation data and RTK positioning analysis app through smartphone. Kinematic positioning was performed for circular trajectories, and static positioning was performed for address information facilities. The results of comparative analysis with the Static positioning performance of the geodetic receivers were obtained with 5 fixed points in the experimental site, and the good static surveying performance was obtained with the standard deviation of average ±1.2cm. In addition, the results of the test point for the outline of the circular structure in the orthogonal image composed of the drone image analysis and the Kinematic positioning trajectory of the low cost RTK GNSS receiver showed that the trajectory was very close to the standard deviation of average ±2.5cm. Especially, as a result of applying it to address information facilities, it was possible to verify the utility of spatial information construction at low cost compared to expensive commercial geodetic receivers, so it is expected that various utilization of "multi-channel GNSS RTK module positioning system"

The Characteristics and Medical Utilization of Migrant Workers (외국인 노동자의 특성과 의료이용 실태)

  • Ju, Sun Me
    • Korean Journal of Occupational Health Nursing
    • /
    • v.7 no.2
    • /
    • pp.164-176
    • /
    • 1998
  • This study deals with the current medical utilization for migrant workers and the characteristics of them. The purpose of this study is to provide the basic information to establish proper medical policy. For the study self-made questionnaire was used, which was answered by 453 migrant workers working in the area of manufacturing and non-technical work in 10 cities like Seoul, Inchon, Namyangju, Sungnam, Kwangju, Pyungchon, Kunpo, Kimpo, Masuk in Kyungki-do and Chunan in Chungchungnam-do. Besides, 303 medical records of those who had visited free medical check-up center were analyzed. The period of accumulating data is 6 months, from November 1st, 1996 to April 30th, 1997. The characteristics of migrant workers and current medical utilization are analyzed by percentage and the relation between characteristics and current medical utilization were analyzed using ${\chi}^2$-test, t-test, ANOVA. The finding of this study was as follows : 1) The number of nationality was 16. The first majority was Philippians as 32.0%. Among 16 nationalities Southeastern and Northern Asians were 48.9%, Southwestern Asian was 46.5%, the rest was 7.3%. Men were 81.0%, those who are aged from 26 to 30 were 39.0%, Graduatee from high school 92.7%, Christians 56.3%, unmarried 55.4% and salary from 600,000 Won to 800,000 Won 53.8% averaging monthly payment 669,810 Won. As for their residence, those who resided over 3 years were 31.9% and the illegal residence reached 77.4%. As for Korean language, those who speak in middle level were 5.6%. 2) As for kind of work and circumstances, manufacturing was 81.1%, 4 off-days per month 72.2% and 9-10 working hours per day 42.1%. As for accommodation, residence in fabric was 62.6% and one or two members as roommate 40.2%. 3) The characteristics of health behavior showed that 89.4% of migrant workers had 3 meals, 70.9% of them did not drink alcohol, 73.5% of them did not smoke. 4) As a characteristic of health status, 71.8% of them perceived of their health. 76.1% thought that they had no illness before coming Korea. Among them who recognized their illness, those who had problem in circulatory system was 35.3%, respiratory system ENT 19.1% and nervous system 19.1%.66.2% of those having illness had already had sickness when coming to Korea. 5) During last one month, 79.2% of them were known as ones having no illness. Among the sick, those who had problem in circulatory system was 31.6%, nervous system 23.7% and respiratory system 21.1%. 60.3% of the sick were not cured at that time. 6) Sorting the symptom of those who visited free medical check up, dental care was 24.2%, orthopedic 14.0% and digestive system 13.8%. Teethache was 34.4%, stomach problem 11.6%, upper respiratory inflammation 10.2% and back pain 5.9%. Averagely they visited free medical check up 1-2 times. According to symptom, epilepsy 25.5 times, heart and vascular disease 9 times, constipation 2.8%, neurosis 2.38 times and stomach problem 2.34 times. 7) The most frequently visited medical service by migrant workers was hospital. The most mentioned reason was good healing as 36.3%. The medical service satisfied migrant workers mostly was hospital as 64.3%. The reason of satisfaction was also good healing as 45.9%. 8) 77.2% of respondents did not spend money for medical check. Average monthly medical cost was 25,100 Won, 3.7% of income. Those who had no medical security was 73.4%. In their case, 67.7% got discount from hospital or support from working place and religious organization. 9) As for the difference of medical utilization according for the characteristics of migrant workers, legal workers and no-Korean speaker used hospital more frequently. 10) Those who were satisfied most of all with the service of hospital were female workers, hinduists and buddhists, legal workers or manufacture workers. 11) Christians, those who have 3 meals or recognize themselves as healthy ones mostly had no illness. As a result, the most of migrant workers in Korea are from Asia. They are good educated but are working in manufacturing and illegal. Their average income is under 700,000 Won which in not enough for medical cost. They have no medical security and medical fee is supported by religious organization or discounted. Considering these facts the medical policy by government is to be established.

  • PDF