• Title/Summary/Keyword: 서명 검증

Search Result 317, Processing Time 0.022 seconds

A Technique for Water Surface Level Detection by Analyzing Motion in Water Area (수역의 요동을 고려한 수면 위치 탐색 기법)

  • Kwon, Sung-Ill;Lee, Chan-Joo;Kim, Dong-Gu;Seo, Myoung-Bae
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.683-683
    • /
    • 2012
  • 영상 수위 계측 방법은 카메라와 목자판만으로 이루어진 비교적 간단한 시스템과 육안으로 수위를 직접 확인할 수 있다는 장점을 가지고 있으나 실제 하천에서 장기간 운영시 목자판이 하천수와 직접 접촉하면서 필연적으로 발생하는 오염, 훼손, 부유물 부착 및 걸림 등의 이유로 목자판의 시인성이 떨어지면서 수면을 정확히 인식하지 못하여 오측이 증가하는 문제점이 발생하였다. 본 연구는 이와 같은 기존 수면인식방법의 문제점을 해결하기 위하여 새로운 수면인식방법을 제안한다. 새로운 수면인식방법은 목자판 영역과 수역이 포함된 시차가 있는 두 장 이상의 연속적인 영상에서 유수의 이동, 바람에 의한 물결 등으로 인해 초래된 수역의 요동을 판단하여 수면을 인식하고 수위를 계측하는 방법이다. 이 방법의 성능을 검증하기 위하여 목자판이 오염된 경우에 대하여 실내 및 현장 실험을 실시하였다. 두 경우의 실험결과에서 모두 기존 수면인식방법에서는 오염된 부분을 수면으로 잘못 인식하였으나, 새로운 방법에서는 수면을 정확하게 인식하여 올바른 수위를 측정할 수 있었다. 따라서 새로운 수면인식방법을 이용하면 기존 수면인식방법보다 정확도를 향상시킬 수 있을 것이며, 홍수시 목자판에 부유물이 걸리거나 목자판이 일부 파손된 경우, 목자판이 다단으로 설치된 경우 등에서도 수면을 정확하게 인식할 수 있을 것으로 기대된다.

  • PDF

Rope Modeling and Verification for the Robotic Platform of the Wall Cleaning Robot (ROPE RIDE) (외벽청소로봇(ROPE RIDE)의 등강 로봇 플랫폼을 위한 로프 모델링 및 검증)

  • Yoo, Sungkeun;Kim, Taegyun;Seo, Myoungjae;Kim, Hwa Soo;Seo, TaeWon
    • The Journal of Korea Robotics Society
    • /
    • v.14 no.3
    • /
    • pp.191-195
    • /
    • 2019
  • This paper presents a rope modeling and verification for the robotic platform of the wall cleaning robot (ROPE RIDE). ROPE RIDE has the characteristics of climbing up and down using a rope fixed on the roof like traditional workers. In order to perform a stable operation with a wall cleaning robot, it is necessary to estimate the position of the robot in a vertical direction. However, due to the high coefficient of extension and nonlinearity of the climbing rope, it is difficult to predict the behavior of the rope. Thus, in this paper, the mathematical modeling of the rope was carried out through the preliminary experiment. Extensive experiments using different types of rope were used to determine the parameters of the constitutive equation of climbing ropes. The validity of the determined parameters of various ropes was verified through the experiment results.

Rice yield prediction in South Korea by using random forest (Random Forest를 이용한 남한지역 쌀 수량 예측 연구)

  • Kim, Junhwan;Lee, Juseok;Sang, Wangyu;Shin, Pyeong;Cho, Hyeounsuk;Seo, Myungchul
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.2
    • /
    • pp.75-84
    • /
    • 2019
  • In this study, the random forest approach was used to predict the national mean rice yield of South Korea by using mean climatic factors at a national scale. A random forest model that used monthly climate variable and year as an important predictor in predicting crop yield. Annual yield change would be affected by technical improvement for crop management as well as climate. Year as prediction factor represent technical improvement. Thus, it is likely that the variables of importance identified for the random forest model could result in a large error in prediction of rice yield in practice. It was also found that elimination of the trend of yield data resulted in reasonable accuracy in prediction of yield using the random forest model. For example, yield prediction using the training set (data obtained from 1991 to 2005) had a relatively high degree of agreement statistics. Although the degree of agreement statistics for yield prediction for the test set (2006-2015) was not as good as those for the training set, the value of relative root mean square error (RRMSE) was less than 5%. In the variable importance plot, significant difference was noted in the importance of climate factors between the training and test sets. This difference could be attributed to the shifting of the transplanting date, which might have affected the growing season. This suggested that acceptable yield prediction could be achieved using random forest, when the data set included consistent planting or transplanting dates in the predicted area.

The Dynamic Group Authentication for P2P based Mobile Commerce (P2P 기반의 모바일 상거래를 위한 동적 그룹 인증)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.335-341
    • /
    • 2014
  • To play the networked video contents in a client's mobile device in real time, the contents should be delivered to it by the contents server with streaming technology. Generally, in a server-client based commerce model, the server is in charge of both the authentication of the paid customer and distribution of the contents. The drawback of it is that if the customers' requests go on growing rapidly, the service quality would be degraded results from the problems of overloaded server or restricted network bandwidth. On the contrary, in P2P based networks, more and more the demand for service increasing, the service quality is upgraded since a customer can act as a server. But, in the P2P based network, there are too many servers to manage, it's possible to distribute illegal contents because the P2P protocol cannot control distributed servers. Thus, it's not suitable for commercial purposes. In this paper, the dymanic group authentication scheme is proposed which is suited to P2P based applications. The proposed scheme consists of group based key generation, key update, signature generation and verification protocols. It can control the seeder's state whether the seeder is joining or leaving the network, and it can be applied to hybrid P2P based commerce model where sales transactions are covered by the index server and the contents are distributed by the P2P protocol.

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

Development of Quality Control Method for Visibility Data Based on the Characteristics of Visibility Data (시정계 자료 특성을 고려한 시정계 자료 품질검사 기법 개발)

  • Oh, Yu-Joo;Suh, Myoung-Seok
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_1
    • /
    • pp.707-723
    • /
    • 2020
  • In this study, a decision tree type of quality control (QC) method was developed to improve the temporal-spatial representation and accuracy of the visibility data being operated by the Korea Meteorological Administration (KMA). The quality of the developed QC method was evaluated through the application to the 3 years (2016.03-2019.02) of 290 stations visibility data. For qualitative and quantitative verification of the developed QC method, visibility and naked-eye data provided by the KMA and QC method of the Norwegian Meteorological Institute (NMI) were used. Firstly, if the sum of missing and abnormal data exceeds 10% of the total data, the corresponding point was removed. In the 2nd step, a temporal continuity test was performed under the assumption that the visibility changes continuously in time. In this process, the threshold was dynamically set considering the different temporal variability depending on the visibility. In the 3rd step, the spatial continuity test was performed under the assumption of spatial continuity for visibility. Finally, the 10-minute visibility data was calculated using weighted average method, considering that the accuracy of the visibility meter was inversely proportional to the visibility. As results, about 10% of the data were removed in the first step due to the large temporal-spatial variability of visibility. In addition, because the spatial variability was significant, especially around the fog area, the 3rd step was not applied. Through the quantitative verification results, it suggested that the QC method developed in this study can be used as a QC tool for visibility data.

Analysis on the Determinants of Land Compensation Cost: The Use of the Construction CALS Data (토지 보상비 결정 요인 분석 - 건설CALS 데이터 중심으로)

  • Lee, Sang-Gyu;Seo, Myoung-Bae;Kim, Jin-Uk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.461-470
    • /
    • 2020
  • This study analyzed the determinants of land compensation costs using the CALS (Continuous Acquisition & Life-Cycle Support) system to generate data for the construction (planning, design, building, management) process. For analysis, variables used in the related research on land costs were used, which included eight variables (Land Area, Individual Public Land Price, Appraisal & Assessment, Land Category, Use District 1, Terrain Elevation, Terrain Shape, and Road). Also, the variables were analyzed using the machine learning-based Xgboost algorithm. Individual Public Land Price was identified as the most important variable in determining land cost. We used a linear multiple regression analysis to verify the determinants of land compensation. For this verification, the dependent variable included was the Individual Public Land Price, and the independent variables were the numeric variable (Land Area) and factor variables (Land Category, Use District 1, Terrain Elevation, Terrain Shape, Road). This study found that the significant variables were Land Category, Use District 1, and Road.

A Study on the Authenticity Verification of UxNB Assisting Terrestrial Base Stations

  • Kim, Keewon;Park, Kyungmin;Kim, Jonghyun;Park, Tae-Keun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.131-139
    • /
    • 2022
  • In this paper, to verify the authenticity of UxNB that assists terrestrial base stations, the solutions for SI (System Information) security presented in 3GPP TR 33.809 are analyzed from the perspective of UxNB. According to the definition of 3GPP (Third Generation Partnership Project), UxNB is a base station mounted on a UAV (Unmanned Aerial Vehicle), is carried in the air by the UAV, and is a radio access node that provides a connection to the UE (User Equipment). Such solutions for SI security can be classified into hash based, MAC (Message Authentication Codes) based, and digital signature based, and a representative solution for each category is introduced one by one. From the perspective of verifying the authenticity of UxNB for each solution, we compare and analyze the solutions in terms of provisioning information and update, security information leakage of UxNB, and additionally required amount of computation and transmission. As a result of the analysis, the solution for verifying the authenticity of the UxNB should minimize the secret information to be stored in the UxNB, be stored in a secure place, and apply encryption when it is updated over the air. In addition, due to the properties of the low computing power of UxNB and the lack of power, it is necessary to minimize the amount of computation and transmission.

A Study on the Trust Mechanism of Online Voting: Based on the Security Technologies and Current Status of Online Voting Systems (온라인투표의 신뢰 메커니즘에 대한 고찰: 온라인투표 보안기술 및 현황 분석을 중심으로)

  • Seonyoung Shim;Sangho Dong
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.47-65
    • /
    • 2023
  • In this paper, we investigate how the online voting system can be a trust-based system from a technical perspective. Under four principles of voting, we finely evaluate the existing belief that offline voting is safer and more reliable than online voting based on procedural processes, technical principles. Many studies have suggested the ideas for implementing online voting system, but they have not attempted to strictly examine the technologies of online voting system from the perspective of voting requirements, and usually verification has been insufficient in terms of practical acceptance. Therefore, this study aims to analyze how the technologies are utilized to meet the demanding requirements of voting based on the technologies proven in the field. In addition to general data encryption, online voting requires more technologies for preventing data manipulation and verifying voting results. Moreover, high degree of confidentiality is required because voting data should not be exposed not only to outsiders but also to managers or the system itself. To this end, the security techniques such as Blind Signature, Bit Delegation and Key Division are used. In the case of blockchain-based voting, Mixnet and Zero-Knowledge Proof are required to ensure anonymity. In this study, the current status of the online voting system is analyzed based on the field system that actually serves. This study will enhance our understanding on online voting security technologies and contribute to build a more trust-based voting mechanism.

Low Density Parity Check (LDPC) Coded OFDM System Using Unitary Matrix Modulation (UMM) (UMM(Unitary Matrix Modulation)을 이용한 LDPC(Low Density Parity Check) 코디드 OFDM 시스템)

  • Kim Nam Soo;Kang Hwan Min;Cho Sung Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.5A
    • /
    • pp.436-444
    • /
    • 2005
  • Unitary matrix modulation (UMM) is investigated in multiple antennas system that is called unitary space-time modulation (USTM). In an OFDM, the diagonal components of UMM with splitting over the coherence bandwidth (UMM-S/OFDM) have been proposed. Recently LDPC code is strongly attended and studied due to simple decoding property with good error correction property. In this paper, we propose LDPC coded UMM-S/OFDM for increasing the system performance. Our proposed system can obtain frequency diversity using UMM-S/OFDM like USTM/OFDM, and large coding gain using LDPC code. The superior characteristics of the proposed UMM-S/OFDM are demonstrated by extensive computer simulations in multi-path Rayleigh fading channel.