Korean Institute of Smart Media最新文献

筛选
英文 中文
Comparative analysis of quantum circuit implementation for domestic and international hash functions 量子电路实现国内外哈希函数的比较分析
Korean Institute of Smart Media Pub Date : 2023-03-30 DOI: 10.30693/smj.2023.12.2.83
Gyeongju Song, Min Song, Hwajung Seo
{"title":"Comparative analysis of quantum circuit implementation for domestic and international hash functions","authors":"Gyeongju Song, Min Song, Hwajung Seo","doi":"10.30693/smj.2023.12.2.83","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.83","url":null,"abstract":"The advent of quantum computers threatens the security of existing hash functions. In this paper, we confirmed the implementation results of quantum circuits for domestic/international hash functions, LSH, SHA2, SHA3 and SM3, and conducted a comparative analysis. To operate the existing hash function in a quantum computer, it must be implemented as a quantum circuit, and the quantum security strength can be confirmed by estimating the necessary quantum resources. We compared methods of quantum circuit implementation and results of quantum resource estimation in various aspects and discussed ways to meet quantum computer security in the future.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127780714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trend of Paradigm for integrating Blockchain, Artificial Intelligence, Quantum Computing, and Internet of Things 区块链、人工智能、量子计算、物联网融合的范式趋势
Korean Institute of Smart Media Pub Date : 2023-03-30 DOI: 10.30693/smj.2023.12.2.42
Rini Wisnu Wardhani, D. Putranto, Thi-Thu-Huong Le, Y. Oktian, Uk Jo, Aji Teguh Prihatno, Naufal Suryanto, Howon Kim
{"title":"Trend of Paradigm for integrating Blockchain, Artificial Intelligence, Quantum Computing, and Internet of Things","authors":"Rini Wisnu Wardhani, D. Putranto, Thi-Thu-Huong Le, Y. Oktian, Uk Jo, Aji Teguh Prihatno, Naufal Suryanto, Howon Kim","doi":"10.30693/smj.2023.12.2.42","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.42","url":null,"abstract":"The combination of blockchain (BC), artificial Intelligence (AI), quantum computing (QC), and the Internet of Things (IoT) can potentially transform various industries and domains, including healthcare, logistics, and finance. In this paper, we look at the trends and developments in integrating these emerging technologies and the potential benefits and challenges that come with them. We present a conceptual framework for integrating BC, AI, QC, and IoT and discuss the framework's key characteristics and challenges. We also look at the most recent cutting-edge research and developments in integrating these technologies, as well as the key challenges and opportunities that come with them. Our analysis highlights the potential benefits of integrating the technologies and looks to increased security, privacy, and efficiency to provide insights into the future of these technologies.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130917939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Fake Job Recruitment with a Machine Learning Approach 用机器学习方法检测虚假招聘
Korean Institute of Smart Media Pub Date : 2023-03-30 DOI: 10.30693/smj.2023.12.2.36
Taghiyev Ilkin, Jae Heung Lee
{"title":"Detecting Fake Job Recruitment with a Machine Learning Approach","authors":"Taghiyev Ilkin, Jae Heung Lee","doi":"10.30693/smj.2023.12.2.36","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.36","url":null,"abstract":"With the advent of applicant tracking systems, online recruitment has become more popular, and recruitment fraud has become a serious problem. This research aims to develop a reliable model to detect recruitment fraud in online recruitment environments to reduce cost losses and enhance privacy. The main contribution of this paper is to provide an automated methodology that leverages insights gained from exploratory analysis of data to distinguish which job postings are fraudulent and which are legitimate. Using EMSCAD, a recruitment fraud dataset provided by Kaggle, we trained and evaluated various single-classifier and ensemble-classifier-based machine learning models, and found that the ensemble classifier, the random forest classifier, performed best with an accuracy of 98.67% and an F1 score of 0.81.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134339482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse 元空间中高效用户认证的多重签名方案研究
Korean Institute of Smart Media Pub Date : 2023-03-30 DOI: 10.30693/smj.2023.12.2.27
Jae Young Jang, Sooyong Jeong, Hyun Il Kim, Chang Ho Seo
{"title":"A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse","authors":"Jae Young Jang, Sooyong Jeong, Hyun Il Kim, Chang Ho Seo","doi":"10.30693/smj.2023.12.2.27","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.27","url":null,"abstract":"Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the metaverse, which is attracting attention as the next-generation online world. Metaverse, a compound word of “meta,” which means virtual and transcendent, and “universe,” means a virtual world that includes the existing online world. Due to various developments of the metaverse, it is expted that new authentication technologies including biometric authentication will be used, but existing authentication technologies are still being used. Therefore, in this study, we study digital signature scheme that can be efficiently used for user authentication in the developing metaverse. In particular, we experimentally analyze the effectiveness of ECDSA, which is currently used as a standard for digital signatures, and Schnorr signatures, which can quickly verify a large amount of signatures.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133800956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain 区块链量子抗格盲签名方案
Korean Institute of Smart Media Pub Date : 2023-03-30 DOI: 10.30693/smj.2023.12.2.76
Hakjun Lee
{"title":"A Quantum Resistant Lattice-based Blind Signature Scheme for Blockchain","authors":"Hakjun Lee","doi":"10.30693/smj.2023.12.2.76","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.76","url":null,"abstract":"In the 4th industrial revolution, the blockchain that distributes and manages data through a P2P network is used as a new decentralized networking paradigm in various fields such as manufacturing, culture, and public service. However, with the advent of quantum computers, quantum algorithms that are able to break existing cryptosystems such as hash function, symmetric key, and public key cryptography have been introduced. Currently, because most major blockchain systems use an elliptic curve cryptography to generate signatures for transactions, they are insecure against the quantum adversary. For this reason, the research on the quantum-resistant blockchain that utilizes lattice-based cryptography for transaction signatures is needed. Therefore, in this paper, we propose a blind signature scheme for the blockchain in which the contents of the signature can be verified later, as well as signing by hiding the contents to be signed using lattice-based cryptography with the property of quantum resistance. In addition, we prove the security of the proposed scheme using a random oracle model.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130999416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Threat Analysis on Network Communication in Power System and Countermeasures Suggestions 电力系统网络通信的网络威胁分析及对策建议
Korean Institute of Smart Media Pub Date : 2023-03-30 DOI: 10.30693/smj.2023.12.2.91
Il Hwan Ji, Seungho Jeon, Jung-Taek Seo
{"title":"Cyber Threat Analysis on Network Communication in Power System and Countermeasures Suggestions","authors":"Il Hwan Ji, Seungho Jeon, Jung-Taek Seo","doi":"10.30693/smj.2023.12.2.91","DOIUrl":"https://doi.org/10.30693/smj.2023.12.2.91","url":null,"abstract":"The Energy Management System (EMS) communicates with power plants and substations, monitors the substations and plant operational status of the transmission and substation system for stability, continuity, real-time, and economy of power supply, and controls power plants and substations. Currently, the power exchange EMS communicates with power plants and substations based on the serial communication-based Distributed Network Protocol (DNP) 3.0 protocol. However, problems such as the difficulty of supply and demand of serial communication equipment and the lack of installation space for serial ports and modems are raised due to the continuous increase in new facilities to perform communication, including renewable power generation facilities. Therefore, this paper presents a TCP/IP-based communication method instead of the existing serial communication method of the power exchange EMS, and presents a security risk analysis that may occur due to changes in the communication method and a countermeasure to the security risk.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"147 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127262056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Price estimation based on business model pricing strategy and fuzzy logic 基于商业模型定价策略和模糊逻辑的价格估计
Korean Institute of Smart Media Pub Date : 2023-02-28 DOI: 10.30693/smj.2023.12.1.54
Callistus Chisom Obijiaku, K. Kim
{"title":"Price estimation based on business model pricing strategy and fuzzy logic","authors":"Callistus Chisom Obijiaku, K. Kim","doi":"10.30693/smj.2023.12.1.54","DOIUrl":"https://doi.org/10.30693/smj.2023.12.1.54","url":null,"abstract":"Pricing, as one of the most important aspects of a business, should be taken seriously. Whatever affects a company's pricing system tends to affect its profits and losses as wall. Currently, many manufacturing companies fix product prices manually by member of an organization's management team. However, due to the imperfect nature of humans, an extremely low or high price may be fixed, which is detrimental to the company in either case. This paper proposes the developement of a fuzzy-based price expert system (Expert Fuzzy Price (EFP)) for manufacturing companies. This system will be able to recommend appropriate prices for products in manufacturing companies based on four major pricing strategic goals, namely : Product Demand, Price Skimming, Competition Price, and Target population.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131411110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Second Frame in Film -Focusing on Iconology by Panofsky 论电影中的第二帧——以帕诺夫斯基的图像学为中心
Korean Institute of Smart Media Pub Date : 2023-02-28 DOI: 10.30693/smj.2023.12.1.102
Xunyue Jia
{"title":"A Study on the Second Frame in Film -Focusing on Iconology by Panofsky","authors":"Xunyue Jia","doi":"10.30693/smj.2023.12.1.102","DOIUrl":"https://doi.org/10.30693/smj.2023.12.1.102","url":null,"abstract":"As one of the image symbols, the second frame has rich symbolic metaphor. In previous studies, second frames are mostly presented in physical forms such as doors, windows, but in , there are various forms of second frames, providing more types for the study of second frames. Panofsky's Iconology has put forward a rigorous research method on how to interpret the meaning of image symbols in the picture. This study aims to use Panofsky's Iconology to analyze the second frame in . The purpose is to expand the methodology of film image research and break through the problem that the Iconology analysis of film image stays in narrative analysis (iconographical analysis). It can be seen from the results of this study that the second frame has different visual presentation according to the requirements of narrative. In the narrative of the film, it symbolizes the depressed tone of the film and the stressful relationship between different characters. What director Campion wants to show through the second frame is that in the film industry where the problem of women is getting better, the motif of feminist film creation has changed from the expression of female appeals in binary opposition to the expression of the appeals of diverse groups in “decentralization.”","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123200673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A proposal of a Non-contact Interaction Behavior Design Model for the Immersion of Culture Contents based on Non-linear Storytelling 基于非线性叙事的文化内容沉浸式非接触交互行为设计模型
Korean Institute of Smart Media Pub Date : 2023-02-28 DOI: 10.30693/smj.2023.12.1.77
So Jin Kim, Yeonsu Seol
{"title":"A proposal of a Non-contact Interaction Behavior Design Model for the Immersion of Culture Contents based on Non-linear Storytelling","authors":"So Jin Kim, Yeonsu Seol","doi":"10.30693/smj.2023.12.1.77","DOIUrl":"https://doi.org/10.30693/smj.2023.12.1.77","url":null,"abstract":"Interaction methods and technologies for mutual exploration based on user behavior are evolving variously. Especially, in recent years, with the development of a wide range of sensors, they have developed from contact to non-contact methods. However, developers’ senseless definitions of the interaction methods have made the exploration process quite complicated, which rather creates the hassle of users needing to learn the interaction guide defined by the developers before experiencing the exhibition contents. In this context, in order to make visitors smoothly communicate with exhibition contents, a preliminary study on easy interaction for users of various ages is needed, and in particular, research on improving the usability of user interaction is also essential when developing non-contact exhibition contents. So, in this study, a method to reduce the confusion between developers and users was sought by researching non-contact interaction that could be universally interacted with in the field of exhibition contents and proposing behavior designs. First, based on the narrative structure of cultural resources, existing studies were reviewed and the points of interactions as cultural contents were derived. Then the most efficient search process was selected among non-contact behaviors based on hand gestures that allow users to naturally guess and learn interaction methods. Furthermore, on the basis of the meaning of non-linear narrative-based interaction and the analysis results of spatial behavior elements, affordance behavior with high learning effect and efficiency was derived. Through this research process, an action that helps users to understand non-contact interaction naturally in the process of exploring exhibition-type cultural contents and to utilize non-contact interaction in the process of immersion in exhibition contents is proposed as a final model.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127067547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asymmetric Signal Scanning Scheme to Detect Invasive Attacks 检测入侵攻击的非对称信号扫描方案
Korean Institute of Smart Media Pub Date : 2023-02-28 DOI: 10.30693/smj.2023.12.1.17
Da Bin Yang, Young Woo Lee, Young-woo Lee
{"title":"Asymmetric Signal Scanning Scheme to Detect Invasive Attacks","authors":"Da Bin Yang, Young Woo Lee, Young-woo Lee","doi":"10.30693/smj.2023.12.1.17","DOIUrl":"https://doi.org/10.30693/smj.2023.12.1.17","url":null,"abstract":"Design-For-Security (DFS) methodology is to protect integrated circuits from physical attacks, and that can be implemented by adding a security circuit to detect abnormal external access. Among the abnormal accesses called invasive attack, microprobing and FIB circuit editing are classified as the most powerful methods because they have direct access. Microprobing deliberately inject defects into the wire of circuit through probes, or reads and changes data. FIB circuit editing is methods of reconnecting or destroying circuits to neutralize security circuits or to access data. Previous DFS methodology have responded to the attacks by detecting arrival time asymmetry between the two signals or by comparing input/output data based on encrypted communication. This study conducted to reduce hardware overhead, and the proposed circuit detects the reflected signal asymmetry generated through probe or FIB circuit editing and detects the attacks through comparison. Since the proposed security circuit reduces the size and test cycle of the circuit compared to previous studies, the cost used for security can be reduced.","PeriodicalId":249252,"journal":{"name":"Korean Institute of Smart Media","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129156457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信