• Title/Summary/Keyword: 식별기술

Search Result 2,107, Processing Time 0.023 seconds

Concept and Structure of Parametric Object Breakdown Structure (OBS) for Practical BIM (BIM 객체분류체계 (OBS) 개념 및 구조)

  • Jung, Youngsoo;Kim, Yesol;Kim, Min;Ju, Taehwan
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.3
    • /
    • pp.88-96
    • /
    • 2013
  • Recent proliferation of building information modeling (BIM) has actively stimulated integrated utilization of geometric (graphic) and non-geometric (non-graphic) data. Nevertheless, physically and logically, linking and maintaining these two different types of data in an integrated manner requires enormous overhead efforts for practical implementation. In order to address this problem, this paper proposes a concept and structure of the object breakdown structure (OBS) that facilitates advanced BIM implementations in an automated and effective manner. Proposed OBS numbering system has secure rules for organizing graphic objects in full considerations of effectively integrating with non-geometric data (e.g. cost and schedule). It also removes repetitive linking process caused by design changes or modifications. The result of applying this concept to a housing project revealed that only 120 definitions controled over 6,000 graphic objects for full integration with cost and schedule functions.

A Study on Improving the Electronic Financial Fraud Prevention Service: Focusing on an Analysis of Electronic Financial Fraud Cases in 2013 (전자금융사기 예방서비스의 개선방안에 관한 연구: 2013년 전자금융사기 피해사례분석을 중심으로)

  • Jeong, Dae Yong;Lee, Kyung-Bok;Park, Tae Hyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1243-1261
    • /
    • 2014
  • With the methods of electronic financial frauds becoming advanced, economic losses have greatly increased. The Electronic Financial Fraud Prevention Service(hereafter EFFPS) has taken effect to prevent electronic financial frauds, but economic losses still occurring. This paper aimed to suggest a direction for improvement of the EFFPS, through the analysis of electronic financial fraud cases. As a result of analysis on the fraud cases before and after implementation of the EFFPS, 'Fraud using Smartphone App' and 'Fraud using Calls and SMS' were increased after implementation of the EFFPS, and also the damage cost of 'Fraud using Smartphone App' had increased. Also we revealed some limitations of the EFFPS. For complementing this limitations, authors considered direction for improvement of the EFFPS focus on application of current services/systems related prevention of electronic financial fraud and considered the ways that are make connection with several measurements related prevention currently being discussed and implemented in perspective of defense in depth.

Pitch Period Detection Algorithm Using Rotation Transform of AMDF (AMDF의 회전변환을 이용한 피치 주기 검출 알고리즘)

  • Seo, Hyun-Soo;Bae, Sang-Bum;Kim, Nam-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1019-1022
    • /
    • 2005
  • As recent information communication technology is rapidly developed, a lot of researches related to speech signal processing have been processed. So pitch period is applied as important factor to many application fields such as speech recognition, speaker identification, speech analysis and synthesis. Therefore, many algorithms related to pitch detection have been proposed in time domain and frequency domain and AMDF(average magnitude difference function) which is one of pitch detection algorithms in time domain chooses time interval from valley to valley as pitch period. But, in selection of valley point to detect pitch period, complexity of the algorithm is increased. So in this paper we proposed pitch detection algorithm using rotation transform of AMDF, that taking the global minimum valley point as pitch period and established a threshold about the phoneme in beginning portion, to exclude pitch period selection. and compared existing methods with proposed method through simulation.

  • PDF

Pattern of partial discharge for stator windings fault of high voltage motor (고압전동기 고정자권선 결함 부분방전패턴)

  • Park, Jae-Jun;Kim Hee-Dong
    • The Journal of Information Technology
    • /
    • v.7 no.1
    • /
    • pp.155-161
    • /
    • 2004
  • During normal machine operation, partial discharge(PD) measurements were performed with turbine generator analyzer(TGA) in imitation stator winding of high voltage motors. The motor was energized to 4.47kV, 6.67, respectively. Applied voltage to Imitation winding was used two voltage level, 4.47[kV] and 6.67[kV]. Motors having imitation stator winding were installed with 80pF capacitive couplers at the terminal box. Case of PD Pattern regarding applied voltage phase angel, the PD patterns were displayed two dimensional and three dimensional. TGA summarizes each plot with two quantities such as the normalized quantity number(NQN) and the peak PD magnitude(Qm). As the result, we could discrimidate using TGA the difference of internal and surface discharge for imitation stator winding. We have used the other technique, in order to feature extraction of faulty signals on stator winding, Daubechies Discrete wavelet transform and Harmonics analysis(FFT) about faulty signals.

  • PDF

A study on ACF Comparsion to Various Spreading Sequence for T-DMB Emergency Broadcasting (T-DMB 재난방송을 위한 다양한 확산 수열 자기상관특성 비교 연구)

  • Lee, Seung-Ho;Lee, Yong-Tae;Kim, Geon;Yang, Chung-Mo;Kim, Wan-Sik;Cho, Ju-Phil;Park, Yong-Woon;Cha, Jae-Sang
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.125-130
    • /
    • 2011
  • In this paper, there was compared to the performance of the Auto Correlation Feature of each code using Spreading code for improving the data transmission technology in T-DMB disaster broadcasting. Generally, wireless mobile communication environment such as DMB occur the Inter Code Interference and the Multi-Path Interference in the process of the identification of the transmitter from the receiver. To solve this problem, spreading code technology was able to improve the security property. Also, it will be able to use in many fields of signal processing, because to control a period of the code can be variable. Therefore, in this paper, we studied to compare the performance of excellent orthogonal Golay code, Kasami code and ZCD(Zero Correlation Duration) code.

Derivation of Security Requirements of Smart Factory Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트팩토리 보안 요구사항 도출)

  • Park, Eun-ju;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1467-1482
    • /
    • 2017
  • Recently, Interests on The Fourth Industrial Revolution has been increased. In the manufacturing sector, the introduction of Smart Factory, which automates and intelligent all stages of manufacturing based on Cyber Physical System (CPS) technology, is spreading. The complexity and uncertainty of smart factories are likely to cause unexpected problems, which can lead to manufacturing process interruptions, malfunctions, and leakage of important information to the enterprise. It is emphasized that there is a need to perform systematic management by analyzing the threats to the Smart Factory. Therefore, this paper systematically identifies the threats using the STRIDE threat modeling technique using the data flow diagram of the overall production process procedure of Smart Factory. Then, using the Attack Tree, we analyze the risks and ultimately derive a checklist. The checklist provides quantitative data that can be used for future safety verification and security guideline production of Smart Factory.

A Development of AIS Vessel Monitoring System on online map using HTML5 (HTML5를 활용한 온라인 지도 기반 AIS선박 모니터링 시스템 구현)

  • Lee, Seo-Jeong;Lee, Jae-Wook
    • Journal of Navigation and Port Research
    • /
    • v.35 no.6
    • /
    • pp.463-467
    • /
    • 2011
  • As the increasing of requirement for safety navigation, IMO has enforced the mandatory installation of vessel AIS equipment by SOLAS regulation. The AIS transceiver broadcasts various vessel information which can be gathered by the receivers on-board or on-shore. And, recently, as web-based application developments on various devices have been increased, there are more and more requirements of AIS information presentation on internet. To meet these web-based application requirements, this paper shows the practical implementation of the AIS display system, which is on the Google maps as online commercial map and adopts the HTML5 as a web standard.

Mutual Attestation Protocol using Software-based Attestation Scheme in Sensor Network Environments (SWATT 기법을 이용한 센서 노드 간 상호 검증 프로토콜)

  • Heo, Kyung-Soo;Choi, Hyun-Woo;Jang, Hyun-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.9-18
    • /
    • 2008
  • Prevention of attacks being made through program modification in sensor nodes is one of the important security issues. The software-based attestation technology that verifies the running code by checking whether it is modified or not in sensor nodes is being used to solve the attack problem. However, the current software-based attestation techniques are not appropriate in sensor networks because not only they are targeting static networks that member nodes does not move, but also they lacks consideration on the environment that the trusted verifier may not exist. This paper proposes a mutual attestation protocol that is suitable for sensor networks by using SWATT(Software-based ATTestation) technique. In the proposed protocol, sensor nodes periodically notify its membership to neighbor nodes and carry out mutual attestation procedure with neighbor nodes by using SWATT technique. With the proposed protocol, verification device detects the sensor nodes compromised by malicious attacks in the sensor network environments without trusted verifier and the sensor networks can be composed of only the verified nodes.

Log Analysis Method of Separate Security Solution using Single Data Leakage Scenario (단일 정보유출 시나리오를 이용한 개별 보안솔루션 로그 분석 방법)

  • Park, Jang-Su;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.2
    • /
    • pp.65-72
    • /
    • 2015
  • According to recent statistics published by the National Industrial Security Center, former and current employees are responsible for 80.4% of companies' technology leakages, and employees of cooperative firms are responsible for another 9.6%. This means that 90% of technology leakages are intentionally or mistakenly caused by insiders. In a recent incident, a credit card company leaked private information, and the person responsible was an employee of a cooperative firm. These types of incidents have an adverse effect not only on a company's assets but also on its reputation. Therefore, most institutions implement various security solutions to prevent information from being leaked. However, security solutions are difficult to analyze and distinguish from one another because their logs are independently operated and managed. A large number of logs are created from various security solutions. This thesis investigates how to prevent internal data leakage by setting up individual scenarios for each security solution, analyzing each scenario's logs, and applying a monitoring system to each scenario.

Zigbee Adaptor for Two-way Data/Event/Service Interoperation in Internet of Things (사물인터넷의 양방향 데이터/이벤트/서비스 연동을 위한 지그비 어댑터)

  • Back, Moon-Ki;Yim, Hyung-Jun;Lee, Kyu-Chul
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.4
    • /
    • pp.107-114
    • /
    • 2014
  • Things in the IoT(Internet of Things) make various services by exchanging information over networks. The IoT includes many types of WSNs(Wireless Sensor Networks) that consists of spatially distributed wireless sensor nodes and operates with the various purposes with useful technologies such as identification, sensing and communication. Typically, Zigbee network composed of low-cost and lowpower devices is mainly used for wide-area monitoring and remote device control systems. The IoT composed of various WSNs cannot interoperate among networks because of heterogeneous communication protocol and different data representation of each network, but can facilitate interconnection and information exchange among networks via the DDS, which is communication middleware standard that aims to enable real-time, high performance and interoperable data exchanges. In this paper, we proposed design of Zigbee Adaptor for two-way interoperation and data exchange between Zigbee network and other networks in the IoT. Zigbee Adaptor communicates with Zigbee network according to the Zigbee protocol and communicates with external networks via DDS. DDS-based Zigbee Adaptor can facilitate interoperation between a Zigbee network and external networks by systematic cooperation among its components.