• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.039 seconds

Study on DNN Based Android Malware Detection Method for Mobile Environmentt (모바일 환경에 적합한 DNN 기반의 악성 앱 탐지 방법에 관한 연구)

  • Yu, Jinhyun;Seo, In Hyuk;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.159-168
    • /
    • 2017
  • Smartphone malware has increased because Smartphone users has increased and smartphones are widely used in everyday life. Since 2012, Android has been the most mobile operating system. Owing to the open nature of Android, countless malware are in Android markets that seriously threaten Android security. Most of Android malware detection program does not detect malware to which bypass techniques apply and also does not detect unknown malware. In this paper, we propose lightweight method for detection of Android malware using static analysis and deep learning techniques. For experiments we crawl 7,000 apps from the Google Play Store and collect 6,120 malwares. The result show that proposed method can achieve 98.05% detection accuracy. Also, proposed method can detect about unknown malware families with good performance. On smartphones, the method requires 10 seconds for an analysis on average.

Face Feature Selection and Face Recognition using GroupMutual-Boost (GroupMutual-Boost를 이용한 얼굴특징 선택 및 얼굴 인식)

  • Choi, Hak-Jin;Lee, Jong-Sik
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.13-20
    • /
    • 2011
  • The face recognition has been used in a variety fields, such as identification and security. The procedure of the face recognition is as follows; extracting face features of face images, learning the extracted face features, and selecting some features among all extracted face features. The selected features have discrimination and are used for face recognition. However, there are numerous face features extracted from face images. If a face recognition system uses all extracted features, a high computing time is required for learning face features and the efficiency of computing resources decreases. To solve this problem, many researchers have proposed various Boosting methods, which improve the performance of learning algorithms. Mutual-Boost is the typical Boosting method and efficiently selects face features by using mutual information between two features. In this paper, we propose a GroupMutual-Boost method for improving Mutual-Boost. Our proposed method can shorten the time required for learning and recognizing face features and use computing resources more effectively since the method does not learn individual features but a feature group.

Life of the Institutionalized Elderly (시설노인의 삶)

  • Lee, Ga-Eon
    • Research in Community and Public Health Nursing
    • /
    • v.12 no.1
    • /
    • pp.32-38
    • /
    • 2001
  • This study focused on the understanding the life of the elderly in the institution by phenomenological method. The participants were seven. who were 4 men and 3 women living in the elderly institution in Taegu. The data were collected through the indepth interviews and participant observation from June 20. 1999 to January 10. 2000 and analyzed by phenomenological analytic method by Giorgi. The structure of the meaning were as follows: Unhappy life: irresponsibility. self-centered thought. hardness. Irresistible life: misfortune. unhealthiness. Reading their son's intention. Bitter life: unfair treatment from their sons and daughters, betrayed feeling for their being thrown away. Outside oriented life: a fear of others' attention, wrong information about institutionalized life, maladjustment. Self-consolation life: comfortableness, convenience, economic merit of low cost. Dissatisfied life: discomfort from communal living. unkindness of the institution staffs, depreciated tendency to the elder people, irrational social security system. economic distress, physical pain, restrained feeling. Tenacity to their sons and daughters longingness for their sons and daughters, regretableness, waiting, Regretable life: remorse for their past life. agony, guilty, loneliness, grief, self-abandonment, self-depreciation, other residents' death in common. Inharmonious life with other residents complaint, conflict, ignorance, selfishness. Yearning life for opposite sex: sexual interest. Preparing for their life: control over their body and mind, consideration for others. A life with hope: blessing death, forever healthfulness, affiliation to their family. From the results of this study an education and consultation should be done as soon as possible to remove the negative recognition of the institutional life to the facility residents. the family and the future consumers of elderly institution. To minimize the maladjustment to facility life of residents, a new program and interventions for the new comer's are needed. The thesis with above results will widen the understandings of institutional residents and an important guidance for a better nursing care in elderly institutions of korea.

  • PDF

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

Reducing of Authentication Signaling Traffic in LTE Networks (LTE 네트워크에서 인증 시그널링의 감소 기법)

  • Kim, Seonho;Jeong, Jongpil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.1 no.2
    • /
    • pp.109-118
    • /
    • 2012
  • As a result of the prevalence of smartphone, various mobile services became faster by LTE networks. Because many mobile devices are used more wireless services, heavy signaling traffic for authentication could be generated. Authentication is an important factor in wireless networks to identify devices; it is the start of wireless networks. This paper analyzes previous patterns for more effective authentication in accessing of another external networks. We propose a fast authentication scheme for minimizing of signaling cost between the authentication server and external networks. And we calculate the rate of authentication occurrence in LTE networks using mathematical modeling as well as the change of signaling cost for authentication in various network environments. Finally, we calculate the optimized number of authentication data and show the effectiveness for authentication signaling costs.

A Study on Encryption using Polynomial Hash Function for e-Seal (e-Seal을 위한 다항식 해시 함수를 이용한 암호화기법 연구)

  • Yon, Yong-Ho;Shin, Moon-Sun;Lee, Jong-Yon;Hwange, Ik-Soo;Seok, Changk-Boo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1977-1985
    • /
    • 2009
  • An e-Seal is an active RFID device that was set on the door of a container. e-Seal provides both the state of the seal and the remote control of the device automatically. But it has vulnerabilities like eavesdrop and impersonate because of using RFID system. A secure e-Seal authentication protocol must use PRF for encryption/decryption of reader and e-Seal. The existing PRF uses simple hash function such as MD5 or SHA which is not available for e-Seal. It is required to use strong hash functions. The hash function is a essential technique used for data integrity, message authentication and encryption in the mechanism of information security. Therefore, in this paper, we propose more secure and effective hash function based on polynomial for e-Seal authentication protocol.

A Database Forensics Model based on Classification by Analysis Purposes (분석 목적별 분류기반의 데이터베이스 포렌식 모델)

  • Kim, Sung-Hye;Kim, Jang-Won;Cho, Eun-Ae;Baik, Doo-Kwon
    • Journal of KIISE:Databases
    • /
    • v.36 no.2
    • /
    • pp.63-72
    • /
    • 2009
  • Digital forensics refers to finding electronic evidences related to crimes. As cyber crimes are increasing daily, digital forensics for finding electronic evidences is also becoming important. At present, various aspects of digital forensics have being researched including the overall process model and analysis techniques such as network forensics, system forensics and database forensics for digital forensics. Regarding database forensics, only analysis techniques dependent on specific vendors have been suggested. And general process models and analysis techniques which can be used in various databases have not been studied. This paper proposes an integrated process model and analysis technique for database forensics. The proposed database forensics model (DFM) allows us to solve problems and analyze databases according to the situation and purpose, and to use a standard model and techniques for various database analyses. In order to test our model(DFM), we applied it to various database analyses. And we confirmed the results of our experiment that it can be applicable to acquisition in the scene as well as analysis of data relationships.

Review of Qualitative Approaches for the Construction Industry: Designing a Risk Management Toolbox

  • Zalk, David M.;Spee, Ton;Gillen, Matt;Lentz, Thomas J.;Garrod, Andrew;Evans, Paul;Swuste, Paul
    • Safety and Health at Work
    • /
    • v.2 no.2
    • /
    • pp.105-121
    • /
    • 2011
  • Objectives: This paper presents the framework and protocol design for a construction industry risk management toolbox. The construction industry needs a comprehensive, systematic approach to assess and control occupational risks. These risks span several professional health and safety disciplines, emphasized by multiple international occupational research agenda projects including: falls, electrocution, noise, silica, welding fumes, and musculoskeletal disorders. Yet, the International Social Security Association says, "whereas progress has been made in safety and health, the construction industry is still a high risk sector." Methods: Small- and medium-sized enterprises (SMEs) employ about 80% of the world's construction workers. In recent years a strategy for qualitative occupational risk management, known as Control Banding (CB) has gained international attention as a simplified approach for reducing work-related risks. CB groups hazards into stratified risk 'bands', identifying commensurate controls to reduce the level of risk and promote worker health and safety. We review these qualitative solutions-based approaches and identify strengths and weaknesses toward designing a simplified CB 'toolbox' approach for use by SMEs in construction trades. Results: This toolbox design proposal includes international input on multidisciplinary approaches for performing a qualitative risk assessment determining a risk 'band' for a given project. Risk bands are used to identify the appropriate level of training to oversee construction work, leading to commensurate and appropriate control methods to perform the work safely. Conclusion: The Construction Toolbox presents a review-generated format to harness multiple solutions-based national programs and publications for controlling construction-related risks with simplified approaches across the occupational safety, health and hygiene professions.

Algorithm of Channel Selection for DMO Communication in TETRA System (TETRA 시스템에서 DMO 통신을 위한 채널 선택 알고리즘)

  • Lee, Soon-Hwa;Kim, Chang-Bock
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.5
    • /
    • pp.497-505
    • /
    • 2013
  • In TETRA(TErrestrial Trunked RAdio) standard, TMO(Trunked Mode Operation) communicates with the UE through the base station and it has a higher priority than DMO(Direct Mode Operation) which communicates with UE directly for channel allocation. As a result, the UE needs an algorithm which restricts the frequency allocation by TMO so that DMO can have a successful communication within the network. However, the TETRA DMO standard does not consider this issue. In this paper, we propose an active DMO channel selection algorithm which allocates a channel based on some additional information such as channel usage state of TMO and channel utilization of DMO. The experimental results show that the proposed algorithm outperforms existing DMO channel allocation scheme in terms of the transmission efficiency.

Future Directions and Perspectives on Soil Environmental Researches (토양환경분야 연구동향 및 전망)

  • Yang, Jae-E.;Ok, Yong-Sik;Chung, Doug-Young
    • Korean Journal of Soil Science and Fertilizer
    • /
    • v.44 no.6
    • /
    • pp.1286-1294
    • /
    • 2011
  • This paper reviews the future directions and perspectives on the soil environmental researches in the 21 century. Previously, the principal emphasis of soil environmental researches had put on the enhancement of food and fiber productions. Beside the basic function of soil, however, the societal needs on soil resources in the 21st century have demands for several environmental and social challenges, occurring regionally or globally. Typical global issues with which soil science should deal include food security with increasing agronomic production to meet the exploding world population growth, adaptation and mitigation of climate change, increase of the carbon sequestration, supply of the biomass and bioenergy, securing the water resource and quality, protection of environmental pollution, enhancing the biodiversity and ecosystem health, and developing the sustainable farming/cropping system that improve the use efficiency of water and agricultural resources. These challenges can be solved through the sustainable crop production intensification (SCPI) or plant welfare concept in which soil plays a key role in solving the abovementioned global issues. Through implementation of either concept, soil science can fulfill the goal of the modern agriculture which is the sustainable production of crops while maintaining or enhancing the ecosystem function, quality and health. Therefore, directions of the future soil environmental researches should lie on valuing soil as an ecosystem services, translating research across both temporal and spatial scales, sharing and using data already available for other purposes, incorporating existing and new technologies from other disciplines, collaborating across discipline, and translating soil research into information for stakeholders and end users. Through the outcomes of these approaches, soil can enhance the productivity from the same confined land, increase profitability, conserve natural resource, reduce the negative impact on environment, enhance human nutrition and health, and enhance natural capital and the flow of ecosystem services. Soil is the central dogma, final frontier and new engine for the era of sustainability development in the $21^{st}$ century and thus soil environmental researches should be carried according to this main theme.