• Title/Summary/Keyword: security requirement

Search Result 393, Processing Time 0.033 seconds

Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks

  • Chen, Yajun;Yi, Ming;Zhong, Zhou;Ma, Keming;Huang, Kaizhi;Ji, Xinsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4923-4939
    • /
    • 2019
  • In this paper, a secure transmission scheme based on the artificial noise is proposed for D2D communications underlaying the full-duplex cellular network, and a secure power allocation scheme to maximize the overall secrecy rate of both the cellular user and D2D transmitter node is presented. Firstly, the full-duplex base station transmits the artificial noise to guarantee the secure communications when it receives signals of cellular uplinks. Under this secure framework, it is found that improving the transmission power of the cellular user or the D2D transmitter node will degrade the secrecy rate of the other, although will improve itself secrecy rate obviously. Hence, a secure power allocation scheme to maximize the overall secrecy rate is presented subject to the security requirement of the cellular user. However, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program problem by utilizing the proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme.

Development of an Assistant Model for Child Care Accreditation (보육시설 평가인증 조력 현황분석 및 조력체계 개발)

  • Hwang, Ock Kyeung
    • Korean Journal of Childcare and Education
    • /
    • v.3 no.2
    • /
    • pp.123-146
    • /
    • 2007
  • This study has attempted to suggest an assistant model for systematic child care accreditation. This has been carried out from the current consciousness of such needs for child care accreditation as large regional disparity in assistant level, no indication to definite contents and method of assistance, demand for assistant professionals with intensified capacity and requirement for the support of financial and human resources. Six stages of assistant process: the stage of establishment and management of preparation class, the stage of application for assistance and consultation, the stage of assistant meeting, the stage of workshop and observation to exemplary institutions, and the stage of practical application and evaluation of visiting assistance have been suggested. Particularly in order to improve the efficiency of assistance, organization of a committee of expert advisors in each area has been indicated. For the guideline of assistant management, operation of preparation class for accreditation, security of assistant committee members, provision of systematic training and assistant manual, development of supervision program and financial support have been suggested. This assistant manual will contribute to systematic and efficient conduct of assistance program of child care accreditation.

  • PDF

Korea Water Resources Policy - from the viewpoint of Korean NGO's (NGO가 바라본 수자원 정책)

  • 김제남
    • Proceedings of the Korean Society of Environment and Ecology Conference
    • /
    • 2003.10a
    • /
    • pp.23-29
    • /
    • 2003
  • It has been declared in 1992 at Rio about the management of united water control and method of the management of the water resources at the water basin. And it was also mentioned about the protection of fresh water's quality and it's supply under chapter the 18th of the agenda 21. It has been 10years passed after Rio declaration, and water crisis Is getting more serious than before. Fairly, right for using water resources was given to every life as the public resources. But at the last world water forum, water was commercialized, and regulated as the basic requirement not basic right. Therefore, we could use the water according to the logic of supply and demand at the market, and with money. Furthermore, construction of the big dam which was build to solve the problem of the lack of water became one of problems for water control. Korea is keeping consistent policy such as providing water by the building of dam. Control of the water demand is the most basic and effective policy for the preservation of water resources. If we change the policy such as the construction of the dam, we should put the management of the water demand in the center with the reliable philosophy. United management of the river basin has to be made with the security of water, improvement of water quality, and protection of the ecological side each other. Management of water basin also has to be completed to solve the trouble caused by using water conflict people who live up and down stream. To maintain the good quality of water, management of water basin is necessary. Also, bottom line of the united management of water basin is voluntary involvement of every citizens and local community. We suggest to preserve the origin of river and the upper at the ecological side. It is worth it to preserve.

  • PDF

A Study on the Basic Requirements and Operation Plan of E-trade Platform (전자무역 플랫폼의 기본요건과 운영방안에 관한 연구)

  • Lee, Sang-Jin
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.107-127
    • /
    • 2004
  • The rapid development of internet information technology has increased interest in e-Trade these days, but it is not activated greatly up to now. In order to promote e-Trade, it is essential to construct cooperative process such as connecting systems among trade related parties. Building e-Trade platform which is based on the infrastructure of the past trade automatic system is key point of promoting e-Trade. To do this, a study on the basic concept and specific components of e-Trade platform is needed absolutely. At this point of view, after this paper has examined domestic and foreign studies on the fundamental technologies about electronic commerce, it drew several key technologies that could be applied to e-Trade considering the current IT trend. Then it evaluates these technologies according to Technology Reference Model(TRM) of the National Computerization Agency. This will help us to show the operation strategy as well as the concept of future e-Trade platform and its composition. On the basis of the theoretical background, this paper classified NCA's technology model into 6 fields, which are application. data, platform, communication, security and management. Considering the key technologies, e-Trade platform has to be mutually connected and accept international standards such as XML. In the aspect of business side, trade relative agencies' business process as well as trading company's process has to be considered. Therefore, e-Trade platform can be classified into 3 parts which are service, infrastructure and connection. Infrastructure part is compared of circulating and managing system of electronic document, interface and service framework. Connecting service (application service) and additional service (application service) consist of service part. Connecting part is a linking mutual parts and can be divided into B2B service and B20 service. The organization operating this e-trade platform must have few responsibilities and requirements. It needs to positively accept existing infrastructure of trade automatic system and improving the system to complete e-trade platform. It also have to continuously develop new services and possess ability to operate the system for providing proper services to demanders. As a result, private sector that can play a role as TTP(Third Trust Party) is adequate for operating the system. In this case, revising law is necessary to support the responsibility and requirement of private sector.

  • PDF

The Comparative Study of Software Optimal Release Time of Finite NHPP Model Considering Property of Nonlinear Intensity Function (비선형 강도함수 특성을 이용한 유한고장 NHPP모형에 근거한 소프트웨어 최적방출시기 비교 연구)

  • Kim, Kyung-Soo;Kim, Hee-Cheul
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.159-166
    • /
    • 2013
  • In this paper, make a study decision problem called an optimal release policies after testing a software system in development phase and transfer it to the user. When correcting or modifying the software, finite failure non-homogeneous Poisson process model, presented and propose release policies of the life distribution, half-logistic property model which used to an area of reliability because of various shape and scale parameter. In this paper, discuss optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement. In a numerical example, the parameters estimation using maximum likelihood estimation of failure time data, make out estimating software optimal release time. Software release time is used as prior information, potential security damages should be reduced.

Implementation of Image-based Virtual Fence for Surveillance Area Setup (감시영역 설정을 위한 영상 기반 가상펜스 구현)

  • Kim, Jae-jun;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2145-2152
    • /
    • 2015
  • The existing CCTV has limitation such as problem on usage of the off-line type of recorded image for specific investigation, and requirement on interactive operator intervention for real-time surveillance. Therefore, it is required to develop the intelligent CCTV equipped with various functionalities in order to overcome drawbacks mentioned above. In this paper, implementation methods of image-based virtual fence were proposed by using the spline curves with supplied control for setup of surveillance area. In addition, pre-alarm region within the predefined distance was established with tangent and normal lines extracted from control points. The image-based virtual fence can be used for remote detection of intrusion and provision of real-time intrusion alarm, and can be expected to use in safety-related application areas including security and crime prevention.

Architecture Evaluation Utilizing CBAM and AHP (생체인식 소프트웨어의 품질 평가모듈에 관한 연구)

  • Yang, Hae-Sool;Lee, Man-Ho;Yoon, Young-Mi
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.699-708
    • /
    • 2006
  • The latest biometric field have marched fast with security technology of IT. As importance of present biometrics is realized, internal and external biometrics software market is trend that is soaring. Accordingly, high reliability of biometric software and request of high quality software are enlarged. Evaluation items and criteria must be established for biometric software quality assurance. In this paper, we development the evaluation module for biometric software test based on ISO/IEC 12119 that is the standard about software quality requirement and test, and ISO/IEC 9126 that is standard about evaluation of software product, and ISO/IEC 14598-6 that is the standard about construction of the evaluation module. Constituents of biometric software products(product descriptor, user document program and data) is subject to the quality evaluation module that we developed in this paper, we can expect improvement in the quality of software by using with a standard such as ISO/IEC 9126-3 that can be used in software development process.

Architecture of Policy-Based Network Management for Providing Internet Differentiated Service on Mobile IP Environment (이동 IP 환경에서 인터넷 차별화 서비스 제공을 위한 정책기반 네트워크 관리 구조)

  • 강승완;김태경;유상조
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.721-736
    • /
    • 2004
  • Because of increasing the notebook computer and PDA, users' requirement with respect to mobility is growing more and more. However, current IP protocol is not changed IP address and can not deliver IP packets on new location of host in case moving another network. To solve this problem, the IETF has proposed mobile IP. Today users want to be provided suitable QoS in the internet since demand of services is variety. The policy-based network management is method which can solve various problems of QoS, security, and complication of management in IP networks. This paper presents the network topology constitution, operation procedure and architecture of policy-based network management for providing internet DiffServ on mobile IP environment. In this paper we propose policy classes of policy-based DiffServ network management on mobile environment and create policy scenarios using the proposed policy description language to represent the policy classes. Finally, we implemented a policy-based DiffServ network management system on mobile IP environment.

  • PDF

Research on the type of technology convergence in the medical device industry based on topic modeling and citation analysis (토픽모델링과 인용 분석에 기반한 의료기기 산업의 기술융합 유형 연구)

  • Lee, Seonjae;Lee, Sungjoo;Seol, Hyeonju
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.7
    • /
    • pp.207-220
    • /
    • 2021
  • Industrial convergence is manifested in various forms by various drivers, and understanding and categorizing the direction of convergence according to the factors in which the convergence occurs is an essential requirement for the establishment of a company's customized convergence strategy and the government's corporate support policy. In this study, the type of convergence is analyzed from the perspective of knowledge flow between heterogeneous technologies, and for this purpose, the result of topic modeling of the text information of the patent and the citation information of the corresponding patent allocated for each topic are used. The methodology presented through case studies in the medical device field is verified. Through the proposed methodology, companies can predict the flow of convergence and use it as decision-making data to create new business opportunities. It is expected that the government and research institutions will be usefully used as basic data for policy preparation.

A Multi-Stage Encryption Technique to Enhance the Secrecy of Image

  • Mondal, Arindom;Alam, Kazi Md. Rokibul;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2698-2717
    • /
    • 2019
  • This paper proposes a multi-stage encryption technique to enhance the level of secrecy of image to facilitate its secured transmission through the public network. A great number of researches have been done on image secrecy. The existing image encryption techniques like visual cryptography (VC), steganography, watermarking etc. while are applied individually, usually they cannot provide unbreakable secrecy. In this paper, through combining several separate techniques, a hybrid multi-stage encryption technique is proposed which provides nearly unbreakable image secrecy, while the encryption/decryption time remains almost the same of the exiting techniques. The technique consecutively exploits VC, steganography and one time pad (OTP). At first it encrypts the input image using VC, i.e., splits the pixels of the input image into multiple shares to make it unpredictable. Then after the pixel to binary conversion within each share, the exploitation of steganography detects the least significant bits (LSBs) from each chunk within each share. At last, OTP encryption technique is applied on LSBs along with randomly generated OTP secret key to generate the ultimate cipher image. Besides, prior to sending the OTP key to the receiver, first it is converted from binary to integer and then an asymmetric cryptosystem is applied to encrypt it and thereby the key is delivered securely. Finally, the outcome, the time requirement of encryption and decryption, the security and statistical analyses of the proposed technique are evaluated and compared with existing techniques.