• Title/Summary/Keyword: security enhance

Search Result 820, Processing Time 0.023 seconds

An Improved RF Detection Algorithm Using EMD-based WT

  • Lv, Xue;Wang, Zekun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.3862-3879
    • /
    • 2019
  • More and more problems for public security have occurred due to the limited solutions for drone detection especially for micro-drone in long range conditions. This paper aims at dealing with drones detection using a radar system. The radio frequency (RF) signals emitted by a controller can be acquired using the radar, which are usually too weak to extract. To detect the drone successfully, the static clutters and linear trend terms are suppressed based on the background estimation algorithm and linear trend suppression. The principal component analysis technique is used to classify the noises and effective RF signals. The automatic gain control technique is used to enhance the signal to noise ratios (SNR) of RF signals. Meanwhile, the empirical mode decomposition (EMD) based wavelet transform (WT) is developed to decrease the influences of the Gaussian white noises. Then, both the azimuth information between the drone and radar and the bandwidth of the RF signals are acquired based on the statistical analysis algorithm developed in this paper. Meanwhile, the proposed accumulation algorithm can also provide the bandwidth estimation, which can be used to make a decision accurately whether there are drones or not in the detection environments based on the probability theory. The detection performance is validated with several experiments conducted outdoors with strong interferences.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

Application of Human Machine Interface and Augmented Reality Technology to Flight Operation (인간-기계 인터페이스 및 증강현실 기술의 항공운항 분야 적용)

  • Park, Hyeong Uk;Chung, Joon;Chang, Jo Won;Joo, Seonghyeon;Hwang, Young Ha
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.27 no.2
    • /
    • pp.54-69
    • /
    • 2019
  • The primary objective of this paper is to introduce the application of Human-Machine Interface (HMI) and Augmented Reality (AR) technologies in flight operations. These include: self-check-in, baggage handling, airport security and surveillance, airport operations monitoring, In-Flight Entertainment and Connectivity (IFEC), cockpit design, and cabin crew support. This paper investigates the application status and development trends of HMI and AR technologies for airports and aircraft. These technologies can provide more efficient in-flight passenger service and experience by using AR devices. This paper also discusses the developments such as; the Integrated Control Application (ICA) for the IFEC interface, AR flight simulation training program using the fixed-based simulator, and the AR aircraft cabin interior concept test program. These applications present how HMI and AR techniques can be utilized in actual flight operations. The developed programs in this paper can be applied to their purpose within aircraft interiors and services to enhance efficiency, comfort, and experience.

A Memory Configuration Method for Virtual Machine Based on User Preference in Distributed Cloud

  • Liu, Shukun;Jia, Weijia;Pan, Xianmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5234-5251
    • /
    • 2018
  • It is well-known that virtualization technology can bring many benefits not only to users but also to service providers. From the view of system security and resource utility, higher resource sharing degree and higher system reliability can be obtained by the introduction of virtualization technology in distributed cloud. The small size time-sharing multiplexing technology which is based on virtual machine in distributed cloud platform can enhance the resource utilization effectively by server consolidation. In this paper, the concept of memory block and user satisfaction is redefined combined with user requirements. According to the unbalanced memory resource states and user preference requirements in multi-virtual machine environments, a model of proper memory resource allocation is proposed combined with memory block and user satisfaction, and at the same time a memory optimization allocation algorithm is proposed which is based on virtual memory block, makespan and user satisfaction under the premise of an orderly physical nodes states also. In the algorithm, a memory optimal problem can be transformed into a resource workload balance problem. All the virtual machine tasks are simulated in Cloudsim platform. And the experimental results show that the problem of virtual machine memory resource allocation can be solved flexibly and efficiently.

A Study on the Use of Results and Measurement Case of Productivity of the Public Organization (공공조직 생산성 측정사례 및 결과 활용에 관한 연구 : 지방자치단체 생산성지수 중심)

  • Kim, Wan Pyong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.225-236
    • /
    • 2014
  • Productivity of public organizations was far older due to issue more difficult to measure than private organizations. Unlike the private sector, the public sector is a diverse and sometimes conflicting objectives (efficiency, effectiveness, equity, democracy, etc.) exist, it is difficult to measure productivity in a single index. Many departments of government is intricately interrelated and sometimes produced by the joint efforts, it is difficult to allocate performance, incentives and accountability to among departments. And there is the difficulty of collecting data on the productivity indicators of public organizations. Despite these difficulties, we developed a productivity index system and measuring method to systematically introduce the concept of productivity in the local administration. In this paper, the productivity and the productivity index measurement practices of local governments conducted annually from 2011 on was deep into research. First, the report found examples of the governments of the developed countries, productivity measurement, then the way MOPAS(Ministry of Public Administration and Security) measure productivity index of local governments, success factors, the implications were in-depth analysis. Finally, in order to enhance productivity and competitiveness municipalities studied ways to take advantage of the productivity index.

Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles

  • Amir, Nur Afiqah Suzelan;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4573-4594
    • /
    • 2020
  • Announcement protocol in Internet of Vehicles (IoV) is an intelligent application to enhance public safety, alleviate traffic jams and improve transportation quality. It requires communication between vehicles, roadside units and pedestrian to disseminate safety-related messages. However, as vehicles connected to internet, it makes them accessible globally to a potential adversary. Safety-related application requires a message to be reliable, however it may intrude the privacy of a vehicle. Contrarily, if some misbehaviour emerges, the malicious vehicles must be able to traceable and revoke from the network. This is a contradiction between privacy and accountability since the privacy of a user should be preserved. For a secure communication among intelligent entities, we propose a novel announcement protocol in IoV using group signature. To the best of our knowledge, our work is the first comprehensive construction of an announcement protocol in IoV that deploys group signature. We show that our protocol efficiently solves these conflicting security requirements of message reliability, privacy and accountability using 5G communication channel. The performance analysis and simulation results signify our work achieves performance efficiency in IoV communication.

AI Smart Factory Model for Integrated Management of Packaging Container Production Process

  • Kim, Chigon;Park, Deawoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.148-154
    • /
    • 2021
  • We propose the AI Smart Factory Model for integrated management of production processes in this paper .It is an integrated platform system for the production of food packaging containers, consisting of a platform system for the main producer, one or more production partner platform systems, and one or more raw material partner platform systems while each subsystem of the three systems consists of an integrated storage server platform that can be expanded infinitely with flexible systems that can extend client PCs and main servers according to size and integrated management of overall raw materials and production-related information. The hardware collects production site information in real time by using various equipment such as PLCs, on-site PCs, barcode printers, and wireless APs at the production site. MES and e-SCM data are stored in the cloud database server to ensure security and high availability of data, and accumulated as big data. It was built based on the project focused on dissemination and diffusion of the smart factory construction, advancement, and easy maintenance system promoted by the Ministry of SMEs and Startups to enhance the competitiveness of small and medium-sized enterprises (SMEs) manufacturing sites while we plan to propose this model in the paper to state funding projects for SMEs.

A Blocking Distribution Channels to Prevent Illegal Leakage in Supply Chain using Digital Forensic

  • HWANG, Jin-Hee
    • Journal of Distribution Science
    • /
    • v.20 no.7
    • /
    • pp.107-117
    • /
    • 2022
  • Purpose: The scope of forensic investigations serves to identify malicious activities, including leakage of crucial corporate information. The investigations also identify security lapses in available networks. The purpose of the present study is to explore how to block distribution channels to protect illegal leakage in supply chain through digital forensic method. Research design, data and methodology: The present study conducted the qualitative textual analysis and its data collection process entails five steps: identifying and collecting data, determining coding categories, coding the content, checking validity and reliability, and analyzing and presenting the results. This methodology is a significant research method due to its high quality of previous resources. Results: Applying previous literature analysis to the results of this study, the author figured out that there are four solutions as an evidences to block distribution channels, preventing illegal leakage regarding company information. The following subtitles show clear solutions: (1) Communicate with Stakeholders, (2) Preventing and addressing illegal leakage, (3) Victims of Data Breach, (4) Focusing Solely on Technical Teams. Conclusion: There are difficult scenarios that continue to introduce difficult questions surrounding engagement with digital evidence. Consequently, it is important to enhance data handling to provide answers for organizations that suffer due to illegal leakages of sensitive information.

Variational Auto Encoder Distributed Restrictions for Image Generation (이미지 생성을 위한 변동 자동 인코더 분산 제약)

  • Yong-Gil Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.91-97
    • /
    • 2023
  • Recent research shows that latent directions can be used to image process towards certain attributes. However, controlling the generation process of generative model is very difficult. Though the latent directions are used to image process for certain attributes, many restrictions are required to enhance the attributes received the latent vectors according to certain text and prompts and other attributes largely unaffected. This study presents a generative model having certain restriction to the latent vectors for image generation and manipulation. The suggested method requires only few minutes per manipulation, and the simulation results through Tensorflow Variational Auto-encoder show the effectiveness of the suggested approach with extensive results.

Integrated Flood Risk Management through Modelling of Nature Based Solutions

  • Bastola, Shiksha;Kareem, Kola Yusuff;Park, Kiddo;Jung, Younghun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.160-160
    • /
    • 2022
  • Floods are the most common natural disasters and are annually causing severe destructions worldwide. Human activities, along with expected increased extreme precipitation patterns as a result of climate change enhance the future potential of floods. There are proven evidence that infrastructure based responses to flood disaster is no longer achieving optimum mitigation and have created a false sense of security. Nature-based solutions(NBS) is a widely accepted sustainable and efficient approach for disaster risk reduction and involves the protection, restoration, or management of natural and semi-natural ecosystems to tackle the climate and natural crisis. Adoption of NBS in decision-making, especially in developing nations is limited due to a lack of sufficient scenario-based studies, research, and technical knowledge. This study explores the knowledge gap and challenges on NBS adoption with case study of developing nation, specially for flood management, by the study of multiple scenario analysis in the context of climate, land-use change, and policies. Identification and quantification of the strength of natural ecosystems for flood resilience and water management can help to prioritize NBS in policymaking leading to sustainable measures for integrated flood management.

  • PDF