• Title/Summary/Keyword: 복합제어기법

Search Result 151, Processing Time 0.024 seconds

A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment (IoT 환경에서 속성기반 암호화 기술을 활용한 메시지 통신 기법에 관한 연구)

  • Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.295-302
    • /
    • 2016
  • Many countries, especially ICT powers, are supporting IoT-based technology at a national level and this technology is actively being researched in the businesses and research institutes in an aim to develop technology and create an ecosystem. Roads in the Seoul city are building public facilities based on IoT to provide various services and conveniences for the users. However, for the full-fledged introduction and development of IoT, there are many cases where infringement on security and privacy and threat for life and safety happen. Also, as the IoT environment includes various environment technologies such as the existing sensor network, heterogeneous communication network, and devices optimized for the IoT environment, it inherits the existing security threat and various attack techniques. This paper researches the attribute based encryption technology for safe communication in the IoT environment. The data collected from the device is transmitted utilizing the attribute based encryption and by designing the key generation protocol, grades and authorities for the device and users are identified to transmit safe messages.

Big Data Processing Scheme of Distribution Environment (분산환경에서 빅 데이터 처리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.311-316
    • /
    • 2014
  • Social network server due to the popularity of smart phones, and data stored in a big usable access data services are increasing. Big Data Big Data processing technology is one of the most important technologies in the service, but a solution to this minor security state. In this paper, the data services provided by the big -sized data is distributed using a double hash user to easily access to data of multiple distributed hash chain based data processing technique is proposed. The proposed method is a kind of big data data, a function, characteristics of the hash chain tied to a high-throughput data are supported. Further, the token and the data node to an eavesdropper that occurs when the security vulnerability to the data attribute information to the connection information by utilizing hash chain of big data access control in a distributed processing.

Prospect and Roles of Molecular Ecogenetic Techniques in the Ecophysiological Study of Cyanobacteria (남조류의 생리·생태 연구에서 분자생태유전학적 기법의 역할 및 전망)

  • Ahn, Chi-Yong
    • Korean Journal of Ecology and Environment
    • /
    • v.51 no.1
    • /
    • pp.16-28
    • /
    • 2018
  • Although physiological and ecological characteristics of cyanobacteria have been studied extensively for decades, unknown areas still remain greater than the already known. Recently, the development of omics techniques based on molecular biology has made it possible to view the ecosystem from a new and holistic perspective. The molecular mechanism of toxin production is being widely investigated, by comparative genomics and the transcriptomic studies. Biological interaction between bacteria and cyanobacteria is also explored: how their interactions and genetic biodiversity change depending on seasons and environmental factors, and how these interactions finally affect each component of ecosystem. Bioinformatics techniques have combined with ecoinformatics and omics data, enabling us to understand the underlying complex mechanisms of ecosystems. Particularly omics started to provide a whole picture of biological responses, occurring from all layers of hierarchical processes from DNA to metabolites. The expectation is growing further that algal blooms could be controlled more effectively in the near future. And an important insight for the successful bloom control would come from a novel blueprint drawn by omics studies.

Privacy Protection Scheme of Healthcare Patients using Hierarchical Multiple Property (계층적 다중 속성을 이용한 헬스케어 환자의 프라이버시 보호 기법)

  • Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.275-281
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

The Smart Contract based Conference Key Distribution Scheme (스마트계약 기반 회의용 키 분배 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.1-6
    • /
    • 2020
  • Recently, epidemic of covid-19 causes rapid increase in demand for untact video conferences. In existing server-client based video conference systems such as Zoom, Google Meet, etc., the server generates the conference key and controls the access rights of meeting members and their contents with it. In this case, the server can fabricate or repudiate the meeting. So, the privacy of the meeting members is not guaranteed. It's necessary to make the conference key distribution scheme where all participants can verify the trustfulness without help of the server. The smart contract is the program stored to the blockchain. Its contents cannot be altered due to the property of the blockchain, and everybody can verify the execution results of it. In this study, we propose the smart contract based conference key distribution scheme. The proposed scheme is consisted of smart contract deployment, conference key generation and verification stages. The smart contract replaces the role of existing trustful server and the meeting members can generate the conference key according to the protocols implemented on it. The proposed scheme can be applied to the video conference systems and only the meeting members can access the conference key.

Application of Linear Tracking to the Multi-reservours System Operation in Han River for Hydro-power Maximization (한강수계 복합 저수지 시스템의 최적 수력발전 운영을 위한 LINEAR TRACKING의 적용)

  • Yu, Ju-Hwan;Kim, Jae-Han;Jeong, Gwan-Su
    • Journal of Korea Water Resources Association
    • /
    • v.32 no.5
    • /
    • pp.579-591
    • /
    • 1999
  • The operation of a reservoir system is necessary for establishing the operation rule as well as designing the reservoirs for water resources planning or management. Increasingly complex water resource systems require more advanced operation techniques. As a result, various techniques have been introduced and applied until now. In this study Linear Tracking model based on optimal control theory is applied to the operation of the largest scale multi-reservoir system in the Han river and its applicability proved. This system normally supplies the water resources required downstream for hydro-power and plays a role in satisfying the water demand of the Capital region. For the optimal use of the water resources the Linear Tracking model is designed with the objective to maximize the hydro-power energy subject to the water supply demand. The multi-reservoir system includes the seven main reservoirs in IIan river such as Hwachon, Soyanggang, Chunchon, Uiam, Cheongpyong, Chungju and Paldang. These reservoirs have been monthly operated for the past 21 years. Operation results are analyzed with respect to both hydro"power energy and water supply. Additionally the efficiency of the technique is assessed.sessed.

  • PDF

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.

A Study on Variable Speed Limit Strategies in Freeway Work Zone Using Multi-Criteria Decision Making Process (다기준 의사결정기반 고속도로 공사구간 VSL전략에 관한 연구)

  • Park, Juneyoung;Oh, Cheol;Chang, Myungsoon
    • Journal of Korean Society of Transportation
    • /
    • v.31 no.5
    • /
    • pp.3-15
    • /
    • 2013
  • The purpose of this study is to propose a methodology for operating variable speed limit (VSL) strategies in freeway work zones. A notable feature in this study is to incorporate a multi-criteria decision making process into deriving better VSL strategies. Decision criteria in this study include operational efficiency, safety, and environmental impacts. Travel speed, acceleration noise, and CO2 were used as performance measures for evaluating VSL strategies. A multi-criteria value function was developed through an analytical hierarchical process (AHP) for representing expert's knowledge. Then, a variety of VSL operations scenarios were investigated utilizing a microscopic traffic simulation suite, VISSIM. The proposed methodology would be useful in supporting more efficient, safer, and more environment-friendly traffic operations and control in freeway work zones.

Test Case Generation of GSMP Protocol for Open Multiservice Switching System (개방형 멀티서비스 교환 시스템에서 GSMP의 시험열 생성 기법)

  • Lee, Hyun-Jeong;Choi, Young-Il;Lee, Byung-Sun;Jun, Kyung-Pyo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10b
    • /
    • pp.1129-1132
    • /
    • 2000
  • 최근 인터넷 수요의 증가로 통신망에서 음성, 영상 및 데이터(data)를 복합적으로 지원할 수 있는 멀티서비스(multiservice)의 교환 기술이 필수적이다. 또한 망 사업자들이 여러 벤더(vendor)들로부터 최적의 장비를 선택하여 망을 구축할 수 있도록 통신 장비들의 상호 운용성을 지원하는 개방형 구조의 망 및 스위치 시스템(switch system)을 정의하는 작업이 필요하다. 페트리 넷(Petri Nets)은 시스템(system)을 분석하기 위한 도구로서, 시스템은 페트리 넷 이론에 의해 시스템의 수학적 표현인 페트리 넷으로 설계될 수 있다. CPN(Colored Petri Nets)은 페트리넷의 확장형으로서, 토근(token)에 칼라를 부여하여 다양한 특성을 지닌 시스템을 표현하기에 적합하다. Design/CPN은 CPN의 사용을 지원하는 소프트웨어 패키지(software package)이다. 본 논문에서는 개방형 멀티서비스 교환 시스템의 핵심으로 스위치와 제어기(Controller) 사이의 표준 프로토콜인 GSMP(General Switch Management Protocol) 프로토콜을 Design/CPN 으로 변환하고, 이로부터 시험열을 생성한다.

  • PDF

A Study on Performance Analysis of Image Interpolation Filters for Field-based Warping and Morphing (필드 기반 워핑과 모핑을 위한 영상 보간 필터의 성능 분석에 관한 연구)

  • Lee Hyoung-Jin;Kwak No-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.6
    • /
    • pp.504-510
    • /
    • 2004
  • The objective of this paper is to propose the image interpolation method with pseudomedian filter for Field warping and morphing, and to evaluate and analyze its subjective image quality. The Field warping relatively gives rise to more computing overhead, but it can use the control line to control the warping result with more elaboration. Due to the working characteristics of the image warping and morphing process, various complex geometrical transformations occur and a image interpolation technique is needed to effectively process them. Of the various interpolation techniques, bilinear interpolation which shows above average performance is the most widely used. However, this technology has its limits in the reconstructivity of diagonal edges. The proposed interpolation method is to efficiently combine the bilinear interpolation and the pseudomedian filter-based interpolation which shows good performance in the reconstructivity of diagonal edges. According to the proposed interpolation method, we could get more natural warping and morphing results than other interpolation methods.

  • PDF