• Title/Summary/Keyword: 공학 인증

Search Result 1,059, Processing Time 0.024 seconds

A Blind Watermarking Algorithm of 3D Mesh Model for Rapid Prototyping System Application (RP 시스템 적용을 위한 3차원 메쉬 모델의 블라인드 워터마킹)

  • Ji-Zhe, Cui
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12C
    • /
    • pp.1194-1202
    • /
    • 2007
  • In this paper, we proposed a blind watermarking algorithm to apply to the rapid prototyping system. The 3D mesh model is used in the step of the CAD modeling before the making of the prototype system of the rapid prototyping system. STL type mesh modeling which is used in this system reduces the error of the system and improves the accuracy of the system. In the step of the CAD modeling, some transformations which do not change the model accuracy are used, but some transformations which change the model accuracy are not used because the mesh model error is related to the accuracy of the prototype system. Most watermarking algorithms embedded a specific random noise as the watermark information into the model. These kinds of the algorithms are not proper to the 3D model watermarking. The proposed algorithm can be used for the accurate prototyping system because it does not change the model after the watermark embedding This means it can be used for the copyright marking and the data integrity.

A Study on the Issues and Trends of Zero Energy Policy (제로에너지 정책·제도 변화에 따른 이슈 및 트랜드 분석 연구)

  • Lee, Hangju;Kim, Insoo
    • Journal of Energy Engineering
    • /
    • v.29 no.2
    • /
    • pp.79-84
    • /
    • 2020
  • In order to reduce greenhouse gas by 30% compared to BAU in 2020, research and development of zero-energy building construction technology for reducing greenhouse gas emissions in the construction industry is being conducted. With the recent implementation of the policy as mandatory through the establishment and commercialization of the zero energy building base, the government should devise measures to support and expand technology through the identification of the current status of the zero-energy building incentive system and the erasure of the erasure. In order to implement zero-energy buildings, excessive construction costs are presented as a major issue in revitalizing the supply of new and renewable energy to enhance Passive (energy efficiency grade of 1++) and achieve self sufficiency of energy (20% or higher). In this paper, the major problems and solutions for zero-energy building identification were presented in order to activate the dissemination of zero-energy buildings, and the recent policy changes resulting from the mandatory use of zero-energy buildings were analyzed.

Study on Risk-based Satellite Product Assurance and Tailoring (리스크 기반의 위성 제품보증 및 테일러링 분석)

  • Song, Sua;Chang, Young-Keun
    • Journal of Aerospace System Engineering
    • /
    • v.12 no.5
    • /
    • pp.76-88
    • /
    • 2018
  • Space agencies such as NASA, ESA, and the US military provide guidelines and standards for PA(product assurance) requirements and plans. In recent years, major satellite manufacturers around the world have been mitigating PA requirements and processes by tailoring. PA tailoring has been implemented to improve the cost and schedule efficiency. PA tailoring can be accomplished based on various factors such as mission, classification of mission risk, complexity, development cost, life cycle, etc. In this study, PA tasks according to the mission risk classification proposed by NASA are investigated, and the tailoring method is suggested for the optimization of the development cost and schedule. In particular, the classification of mission risk for the satellites under development or operation in Korea is performed, and PA characteristics in accordance with mission risk are analyzed.

A Study on Means of Compliance for Lightning Protection in the System and Structure of Air Vehicles (비행체 시스템과 구조물의 낙뢰 보호 적합성 입증방법에 관한 고찰)

  • Jeong, Duckyoung
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.spc
    • /
    • pp.49-55
    • /
    • 2020
  • The average probability of a lightning strike to transport aircraft operating in airline service has been estimated to be approximately one strike in every year (or one strike per 1,000 through 20,000 flight hours). The important thing is not the probability of a lightning strike to aircraft, but the fact that aircraft is struck by lightning. Therefore, lightning protection design for aircraft should be qualified and compliance with airworthiness standards related to lightning protection must be substantiated in the process of certification. In this paper, I studied means of compliance for lightning protection through analysis of some test cases, including the KC-100 airplane that firstly obtained civil type certificate in Korea. Based on this paper, it will be also necessary to study on the effect of lightning for space launch vehicles.

Template Fusion for Fingerprint Recognition (지문 등록을 위한 템플릿 융합 알고리즘)

  • 류춘우;문지현;김학일
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.51-64
    • /
    • 2004
  • This paper proposes an algerian of generating a tuner-template from multiple fingerprint impressions using a data fusion technique for fingerprint enrollment. The super-template is considered as a single fingerprint template which contains most likely true minutiae based on multiple fingerprint images. The proposed algorithm creates the super template by utilizing a recursive Bayesian estimation method (RBEM), which assumes a sequential fingerprint input model and estimates the credibility of the minutiae in previous input templates froma current input template. Consequently. the RBEM assigns a higher credibility to commonly detectable minutiae from several input templates and a lower credibility to rarely found minutiae from other input templates. Likewise, the RBEM is able to estimate a credibility of the minutia type (ridge ending or bifurcation). Preliminary experiments demonstrate that, as the number of fingerfrint images increases, the performance of recognition can be improved while maintaining the processing time and the size of memory storage for tile super-template almost constant.

Digital Holographic Security Identification System (디지털 홀로그래픽 보안 인증 시스템)

  • Kim, Jung-Hoi;Kim, Nam;Jeon, Seok-Hee
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.89-98
    • /
    • 2004
  • In this paper, we implement a digital holographic security card system that combines digital holographic memory using random phase encoded reference beams with electrical biometrics. Digitally encoded data including a document, a picture of face, and a fingerprint are recorded by multiplexing of holographic memory. A random phase mask encoding reference beams are used as a decoded key to protect illegal counterfeit. As a result, we can achieve a raw BER of 3.6${\times}$10-4 and shift selectivity of 4${\mu}{\textrm}{m}$ using the 2D random phase mask. Also, we develop a recording pattern and image processing which are suitable for a low cost reader without a position sensing photo-detector for real time data extraction and remove danger of fraud from unauthorized person by comparing the reconstructed holographic data with the live fingerprint data.

A Multimedia Data Security System Based on MPEG Using The Specific of Wireless Device (무선 이동 단말기의 특성을 이용한 MPEG 기반의 멀티미디어 데이터 보안 시스템)

  • Lee, Jong-Kap;Seong, Hong-Seok;Won, Young-Jin;Lee, Jong-Sung;Lim, Seung-Ha;Lim, Young-Hwan
    • 전자공학회논문지 IE
    • /
    • v.46 no.2
    • /
    • pp.22-32
    • /
    • 2009
  • In this article, the protection system on wireless mobile communication circumstance for the information providers and the users is recommended. Because of its usefulness and convenience, the users of the wireless mobile communication are growing explosively. However, the function of protecting data systems is not secured enough so, personal information may disclose to the outside, regardless of one's intention. Therefore, the contents protection system, which can provide information to the user or hide it depending on user's identity, is suggested. If so, the providers and the users can trust each other for interchanging information, also the users may safely use contents menu whatever they want by doing simple certification process.

Implementation of Physical Unclonable Function(PUF) using Transmission Line Crosstalks (전송선의 크로스토크를 이용한 물리적복제방지기능(PUF) 구현)

  • Lee, Kwan-Hee;Kim, Seung-Youl;Cho, Kyoungrok;You, Younggap
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.75-82
    • /
    • 2013
  • This paper presents a PUF circuit based on the randomness of crosstalk magnitudes in adjacent transmission lines. Conventional PUF circuitry suffers the reliability problem where a consistent output value is not guaranteed due to environmental changes, such as power supply voltage and operating temperature. The proposed circuit consists of three transmission lines. The crosstalk difference between two transmission line pairs can be arbitrary. The proposed circuit compares the crosstalk differences between two transmission line pairs, and yields consistent responses. The crosstalk differences are immune to operating environment changes. The proposed PUF circuit provides with reliable responses for given challenges. It can be utilized by security systems such as authentication and encryption.

Development of the Accreditation Criteria for Engineering Technology Education Programs in Junior Colleges (전문대학 공학기술교육 프로그램 인증 준거 개발)

  • Hahm, Seung-Yeon;Rho, Tae-Cheon
    • 대한공업교육학회지
    • /
    • v.30 no.2
    • /
    • pp.82-103
    • /
    • 2005
  • The purpose of this study was to develop and present the accreditation criteria for engineering technology education programs in junior colleges. Research methods used in this study were review of related literature, experts discussion, and Delphi technique. Especially, Delphi technique was the major research method of this study. The Delphi surveys were taken for about seven weeks and three rounds at a higher level of expert participation. Major results of the study were as follows: 1. It proved that thirty six of total forty items had the content validity as the accreditation criteria of engineering technology education programs for junior colleges. CVR(Content Validity Ratio) of four items were below .33 and eliminated four items from the final accreditation criteria. 2. It proved that total Cronbach ${\alpha}$ was very high .9142 and reliability was very high all over items. It proved that six items made worse reliability, therefore it was desirable to exclude six items for increase of reliability. But the final accreditation criteria included six items, because they had a high validity as well as increasing rate of Cronbach ${\alpha}$ was very low with the exception of them. 3. Items of high importance were drawn out through analysis of importance. It proved that thirty of total forty items were more than 4.00 average in importance and ten items were less than average. 4. In conclusion, the final accreditation criteria were developed and presented through such analysis of validity, reliability and importance. The final accreditation criteria for engineering technology education programs in junior colleges were composed of seven domains of educational objectives, learning outcomes, curriculum, staff, facilities, institutional support, and student assessment.

Watermarking of Gray Logo & Color Image based on Human Visual System (인간시각 시스템 기반의 그레이로고 & 컬러 이미지의 워터마킹)

  • NOH Jin Soo;SHIN Kwang Gyu;RHEE Kang Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.3 s.303
    • /
    • pp.73-82
    • /
    • 2005
  • Recently, The wide range of the Internet applications and the related technology developments enabled the ease use of the digital multimedia contents (fixed images, movies, digital audios). However, due to the replay ability which the contents may be easily duplicated and not only the duplicates are capable of providing the same original quality. There are mainly the encipher techniques and the watermarking techniques which are studied and used as solutions for the above problem in order to protect the license holders' rights. To the protection of the IP(Intellectual Property) rights of the owner, digital watermarking is the technique that authenticates the legal copyrighter. This paper proposed the watermarking algorithms to watermark the 256 gray logo image and the color image by applying the wavelet transformation to the color stand-still images. The proposed algorithms conducted the watermark insertion at the LH frequency region among the wavelet transformation regions (LL, LH, HL, HH). The interleaving algorithms which applied in data communication was applied to the watermark. the amount of watermark increased which consequently caused the PSNR to decrease but this might provide the perseverance against the external attacks such as extraction, filtering, and crop.