• Title/Summary/Keyword: 강인시스템

Search Result 1,896, Processing Time 0.028 seconds

Design and implementation of improved authentication mechanism base on mobile DRM using blockchain (블록체인을 이용한 모바일 DRM 기반 개선된 인증 메커니즘 설계 및 구현)

  • Jeon, Jinl-Oh;Seo, Byeong-Min
    • Journal of Digital Convergence
    • /
    • v.19 no.4
    • /
    • pp.133-139
    • /
    • 2021
  • Due to the rapid progress in network technology, many research on content security technologies is also being conducted in the mobile digital content sector. In the meantime, content protection has been immersed in preventing illegal copying, certifying, and issuance/management certificates, but still have many vulnerabilities in managing or authenticating confidential information. This study aims to strengthen confidential information about content based on dual management of content download rights through mobile phone numbers or device numbers. It also protect replay-attack by building a secure mobile DRM system where digital content is safely distributed based on a three-stage user authentication process. In addition, blockchain-based content security enhancements were studied during the primary/secondary process for user authentication for the prevention of piracy and copyright protection. In addition, the client authentication process was further improved through three final stages of authorization in the use of illegal content, considering that legitimate users redistributed their content to third-party.

A Study on the Utilization of BIM Model using Vertex Data-based Division Method (정점데이터기반 분할기법을 활용한 BIM모델의 활용 방안 연구)

  • Jae-Yeong, Hwang;Jae-Hee, Lee;Leen-Seok, Kang
    • Land and Housing Review
    • /
    • v.14 no.1
    • /
    • pp.123-134
    • /
    • 2023
  • The BIM (Building Information Modeling) model created in the design stage can be used for prior review and schedule management for the construction stage. However, in the case of actual BIM application cases, additional work is required, such as creating a new model suitable for the construction stage, rather than using the 3D model in the design stage, due to the difference in the purpose of use between the design stage and the construction stage. Therefore, in this study, a division function of BIM model is proposed as a method of recycling it in the construction stage without a remodeling process. In addition, the application to the actual BIM model and the 4D CAD system linkage of the divided object and the comparison with the existing division method are used to verify the usability.

Visual Tracking Technique Based on Projective Modular Active Shape Model (투영적 모듈화 능동 형태 모델에 기반한 영상 추적 기법)

  • Kim, Won
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.2
    • /
    • pp.77-89
    • /
    • 2009
  • Visual tracking technique is one of the essential things which are very important in the major fields of modern society. While contour tracking is especially necessary technique in the aspect of its fast performance with target's external contour information, it sometimes fails to track target motion because it is affected by the surrounding edges around target and weak egdes on the target boundary. To overcome these weak points, in this research it is suggested that PDMs can be obtained by generating the virtual 6-DOF motions of the mobile robot with a CCD camera and the image tracking system which is robust to the local minima around the target can be configured by constructing Active Shape Model in modular base. To show the effectiveness of the proposed method, the experiment is performed on the image stream obtained by a real mobile robot and the better performance is confirmed by comparing the experimental results with the ones of other major tracking techniques.

Design and Implementation of Birthmark Technique for Unity Application

  • Heewan Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.85-93
    • /
    • 2023
  • Software birthmark refers to a unique feature inherent in software that can be extracted from program binaries even in the absence of the original source code of the program. Like human genetic information, the similarity between programs can be calculated numerically, so it can be used to determine whether software is stolen or copied. In this paper, we propose a new birthmark technique for Android applications developed using Unity. The source codes of Unity-based Android applications use C# language, and since the core logic of the program is included in the DLL module, it must be approached in a different way from normal Android applications. In this paper, a Unity birthmark extraction and comparison system was implemented, and reliability and resilience were evaluated. The use of the Unity birthmark technique proposed in this paper is expected to be effective in preventing illegal copy or code theft of the Unity-based Android applications.

Improvement Strategy for Demolition Industry through a Analysis of Domestic Demolition Technique and Situation (국내해체기술 및 현황분석을 통한 해체산업의 발전방향)

  • Kim, Chang-Hak;Kim, Hyo-Jin;Kang, Leen Seok
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.2D
    • /
    • pp.143-151
    • /
    • 2010
  • Currently, one of the most interested things at home and abroad country will be an eco-friendly construction. Among these, one of the most important elements will be the recycle and reuse of construction and demolition waste. Because construction waste is generated the most at the demolition phase, it is important to minimize the quantity of the demolition waste at the phase. And it is also important to develop a system to manage rightly the generated demolition waste. But in the domestic country, a research for this has hardly been carried out. In recent, the government has realized its importance and is making a research to improve demolition technique and is preparing a research to make a raw for deconstruction. Therefore, this study examined its application situation and importance by analyzing the trend of demolition technique used in the domestic industry. Also this study carried out a survey for situation analysis of the demolition industry. This study suggested items needed for the development of demolition technique, demolition design and reduction of C&D waste through a survey results and a situation analysis.

Development of a Risk Management Procedure Model for the Construction Project Using Construction Risk Management System (CRMS를 활용한 건설공사의 리스크관리 절차모형 개발)

  • Kim, Chang Hak;Kang, Leen Seok;Park, Hong Tae
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.4D
    • /
    • pp.423-432
    • /
    • 2010
  • This study suggested CRMS (construction risk management system) which is a new risk analysis model after analyzing existing risk management process for to guarantee a successful performance at the construction planning and work phase. CRMS is risk management procedures in order that the contractor identify, analyze and administrate the risk during performing construction project. This model may give much help to quantify and be ready the right managing methods about identified risk by the contractor. Especially, the most important and difficult things of all risk management may be to identify risk in the project. This study make more focusing on the developing a procedure that can identify risk more easily in the construction project. The risk is divided into global risk and local risk of a project. Also, this study suggests methods which are using the RBS (risk breakdown structure) related with WBS. This result will be useful as basic materials for developing computerizing system for risk management.

Design of EPG Information Player System using DCT based Blind Watermark (DCT기반의 블라인드 워터마크를 이용한 EPG 정보 재생기 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.1-10
    • /
    • 2011
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents has also been widely spreading with recently starting IPTV. Generally, PC player can display digital contents obtained through middleware like a settop box and can only bring the informations about contents like CODEC, bitrate etc. useful for only experts. But general users want to know more optional informations like content's subject, description etc. So unlike previous PC player, we proposed a player system that can get inserted informations, namely EPG(Electronic Program Guide), without database after bringing contents to PC through settop box. In addition, we also proposed DCT(Discrete Cosine Transform) based blind watermark generating method to insert EPG informations. We can extract watermark without original image and insert robust watermark in proportion to coefficients in frequency domain. And we analyzed and parsed PSI data from MPEG-TS. So we could insert wanted information using watermark from EPG. And we composed UI by extracting EPG information from watermark interted contents. Finally we modularized whole system into the watermark insert/extract application and directshow filter based player. So we tried to design this system so that the general developer can do in a way that is easier and faster.

Design of a Neural Network PI Controller for F/M of Heavy Water Reactor Actuator Pressure (신경회로망과 PI제어기를 이용한 중수로 핵연료 교체 로봇의 구동압력 제어)

  • Lim, Dae-Yeong;Lee, Chang-Goo;Kim, Young-Baik;Kim, Young-Chul;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.3
    • /
    • pp.1255-1262
    • /
    • 2012
  • Look into the nuclear power plant of Wolsong currently, it is controlled in order to required operating pressure with PI controller. PI controller has a simple structure and satisfy design requirements to gain setting. However, It is difficult to control without changing the gain from produce changes in parameters such as loss of the valves and the pipes. To solve these problems, the dynamic change of the PI controller gain, or to compensate for the PI controller output is desirable to configure the controller. The aim of this research and development in the parameter variations can be controlled to a stable controller design which is reduced an error and a vibration. Proposed PI/NN control techniques is the PI controller and the neural network controller that combines a parallel and the neural network controller part is compensated output of the controller for changes in the parameters were designed to be robust. To directly evaluate the controller performance can be difficult to test in real processes to reflect the characteristics of the process. Therefore, we develope the simulator model using the real process data and simulation results when compared with the simulated process characteristics that showed changes in the parameters. As a result the PI/NN controller error and was confirmed to reduce vibrations.

The Effect of the Telephone Channel to the Performance of the Speaker Verification System (전화선 채널이 화자확인 시스템의 성능에 미치는 영향)

  • 조태현;김유진;이재영;정재호
    • The Journal of the Acoustical Society of Korea
    • /
    • v.18 no.5
    • /
    • pp.12-20
    • /
    • 1999
  • In this paper, we compared speaker verification performance of the speech data collected in clean environment and in channel environment. For the improvement of the performance of speaker verification gathered in channel, we have studied on the efficient feature parameters in channel environment and on the preprocessing. Speech DB for experiment is consisted of Korean doublet of numbers, considering the text-prompted system. Speech features including LPCC(Linear Predictive Cepstral Coefficient), MFCC(Mel Frequency Cepstral Coefficient), PLP(Perceptually Linear Prediction), LSP(Line Spectrum Pair) are analyzed. Also, the preprocessing of filtering to remove channel noise is studied. To remove or compensate for the channel effect from the extracted features, cepstral weighting, CMS(Cepstral Mean Subtraction), RASTA(RelAtive SpecTrAl) are applied. Also by presenting the speech recognition performance on each features and the processing, we compared speech recognition performance and speaker verification performance. For the evaluation of the applied speech features and processing methods, HTK(HMM Tool Kit) 2.0 is used. Giving different threshold according to male or female speaker, we compare EER(Equal Error Rate) on the clean speech data and channel data. Our simulation results show that, removing low band and high band channel noise by applying band pass filter(150~3800Hz) in preprocessing procedure, and extracting MFCC from the filtered speech, the best speaker verification performance was achieved from the view point of EER measurement.

  • PDF

Research for robot kidnap problem in the indoor of utilizing external image information and the absolute spatial coordinates (실내 공간에서 이동 로봇의 납치 문제 해결을 위한 외부 영상 정보 및 절대 공간 좌표 활용 연구)

  • Jeon, Young-Pil;Park, Jong-Ho;Lim, Shin-Teak;Chong, Kil-To
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.3
    • /
    • pp.2123-2130
    • /
    • 2015
  • For such automatic monitoring robot or a robot cleaner that is utilized indoors, if it deviates from someone by replacement or, or of a mobile robot such as collisions with unexpected object direction or planned path, based on the planned path There is a need to come back to, it is necessary to tough self-position estimation ability of mobile robot in this, which is also associated with resolution of the kidnap problem of conventional mobile robot. In this study, the case of a mobile robot, operates indoors, you want to take advantage of the low cost of the robot. Therefore, in this paper, by using the acquisition device to an external image information such as the CCTV which is installed in a room, it acquires the environment image and take advantage of marker recognition of the mobile robot at the same time and converted it absolutely spatial coordinates it is, we are trying to solve the self-position estimation of the mobile robot in the room and kidnap problem and actual implementation methods potential field to try utilizing robotic systems. Thus, by implementing the method proposed in this study to the actual robot system, and is promoting the relevant experiment was to verify the results.