• Title/Summary/Keyword: 식별기술

Search Result 2,087, Processing Time 0.024 seconds

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Scientific Analysis and Conservation Treatment of the Wooden Gamsil with Inscription of "Botajeon" in the Collection of the Dongguk University Museum (동국대박물관 소장 보타전명 목조감실 과학적 분석 및 보존처리)

  • Lee, Uicheon;Kang, Minji;Park, Junghye;Kim, Soochul
    • Conservation Science in Museum
    • /
    • v.27
    • /
    • pp.125-146
    • /
    • 2022
  • The Wooden Gamsil with Inscription of "Botajeon" in the collection of the Dongguk University Museum was made in imitation of the wooden architecture style of the late Joseon period. The Gamsil had suffered exfoliation in the pigment and loss of components and thus underwent conservation treatment. Prior to the conservation treatment, the damage was classified by type and form, scientific analysis was carried out on the fiber and the species of wood, and portable X-ray fluorescence (P-XRF) analysis was conducted for the pigment component analysis. According to the analyses, Korea Pine(Soft pine) was used for most parts of the Gamsil, Manchurian walnut (Jugalns spp.) was used for the signboard, and the fiber used was identified as rice straw (Oryza sativa). The P-XRF identified white lead and zinc oxide in the white pigment, red lead in the red pigment, ultramarine blue in the blue pigment, and emerald green in the green pigment. For the conservation treatment, contaminants attached to the gamsil were removed by both dry and wet cleaning, detached parts were reattached in their original places, and lost parts were restored.

Analysis of Safety Considerations for Application of Artificial Intelligence in Marine Software Systems (해양 소프트웨어 시스템의 인공지능 적용을 위한 안전 고려사항에 관한 분석)

  • Lee, Changui;Kim, Hyoseung;Lee, Seojeong
    • Journal of Navigation and Port Research
    • /
    • v.46 no.3
    • /
    • pp.269-279
    • /
    • 2022
  • With the development of artificial intelligence, artificial intelligence is being introduced to automate systems throughout the industry. In the maritime industry, artificial intelligence is being applied step by step, through the paradigm of autonomous ships. In line with this trend, ABS and DNV have published guidelines for autonomous vessels. However, there is a possibility that the risk of artificial intelligence has not been sufficiently considered, as the classification guidelines describe the requirements from the perspective of ship operation and marine service. Thus in this study, using the standards established by the ISO/ IEC JTC1/SC42 artificial intelligence division, classification requirements are classified as the causes of risk, and a measure that can evaluate risks through the combination of risk causes and artificial intelligence metrics want to use. Through the combination of the risk causes of artificial intelligence proposed in this study and the characteristics to evaluate them, it is thought that it will be beneficial in defining and identifying the risks arising from the introduction of artificial intelligence into the marine system. It is expected that it will enable the creation of more detailed and specific safety requirements for autonomous ships.

Chromosomal Assembly of Tegillarca granosa Genome using Third-generation DNA Sequencing and Hi-C Technology (3세대 DNA 염기서열 분석과 Hi-C기술을 이용한 꼬막 게놈의 유전체 연구)

  • Kim, Jinmu;Lee, Seung Jae;Jo, Euna;Choi, Eunkyung;Cho, Minjoo;Shin, So Ryung;Lee, Jung Sick;Park, Hyun
    • Journal of Marine Life Science
    • /
    • v.6 no.2
    • /
    • pp.97-105
    • /
    • 2021
  • Tegillarca granosa, is one of the most important fishery resources throughout Asia. However, due to industrialization factories, marine environmental pollution, and global warming, the marine fishery production has drop sharply. In order to understand the genetic factors of the blood clam, which is a major fishery resource on the southern coast of Korea, the whole genome of blood clam was studied. The assembled genome of T. granosa was 915.4 Mb, and 19 chromosomes were identified. 25,134 genes were identified, and 22,745 genes were functionally annotated. As a result of performing gene gain and loss analysis between the blood clam genome and eight other types of shellfish, it was confirmed that 725 gene groups were expanded, and 479 gene groups were contracted. The homeobox gene cluster of blood clam showed a well-preserved genetic structure within lophotrochozoan ancestor. T. granosa genome showed high similarity between three hemoglobin genes with Scarpharca broughtonii. The blood clam genome will provide information for the genetic and physiological characteristics of blood clam adaptation, evolution, and the development of aquaculture industry.

Research on the Necessity of Building the Second Space Rocket Launching Sites for Breakthrough Development of R.O.K National Space Power (도약적 국가 우주력 발전을 선도할 제2 우주센터 구축 필요성 연구)

  • Park, Ki-tae
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.146-168
    • /
    • 2022
  • Witnessing current military conflicts in South China Sea and Eastern Europe, most defense analysts evaluate one of the most serious security threat toward the US is coming from the superpower competitions with Russia and China. The main means for such super power hegemonic competitions is military power and space power is a key enabler to maximize the efficiency and effectiveness of military employment. Reflecting above circumstances, the space hegemonic competition between the Unites States and China is spreading into all aspects of national powers. Under such an environment, R.O.K needs to significantly develop national space power to preserve life and assets of people in space. On the other hand, the R.O.K has a lot of limitations in launching space assets into orbits by land-based space rockets due to its geographic locations. The limitation of rocket launching direction, the failure to secure a significant area enough to secure safety and the limitation to secure open area enough to build associated facilities are among them. On this paper, I will suggest the need to build the 2nd space rocket launching site after analyzing a lot of short-falls the current 'Naro' space center face, compared to those of advanced space powers around the world.

A Study on the Safety Measures for Typhoon Shelter in Jinhae Bay Based on AHP Assessment (AHP 기법 기반 진해만 태풍 피항지 내 안전대책에 관한 연구)

  • Kim, Ni-Eun;Lee, Myoung-Ki;Camliyurt, Gokhan;Park, Do-Hyeong;Kim, Dae-Won;Park, Young-Soo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.4
    • /
    • pp.507-514
    • /
    • 2022
  • Jinhae Bay is used as a major typhoon shelter in the southeastern region of Korea. However, when a typhoon strikes, the Jinhae Bay is facing the possibility of marine accidents caused by dragging anchors and the increased number of ships. This paper suggested ways to safely and efficiently manage the port of Jinhae Bay when a typhoon strikes from Vessel traffic service operators in the sea, derived relative importance by conducting an Analytic Hierarchy Process assessment to ship operators, and suggested safety measures reflecting manager and user opinions. In order to select safety measures factors for the AHP survey, VTS operators analyzed the evaluation of measures when a typhoon strikes in Jinhae Bay. As a result of conducting a survey based on the selected safety measure factors, it was found that ship operators consider the safety of ships more than twice as important as efficient management, and comprehensively consider them in the order of management of evacuated ships, management of anchorage area, management of evacuation information, preparation regulations and guidelines, improvement of system equipment, education, publicity, and notification activities. Through the measures and relative importance identified in this paper, it is believed that Jinhae Bay can serve as the basis for safely and efficiently managing typhoon shelters.

Development of A Quantitative Risk Assessment Model by BIM-based Risk Factor Extraction - Focusing on Falling Accidents - (BIM 기반 위험요소 도출을 통한 정량적 위험성 평가 모델 개발 - 떨어짐 사고를 중심으로 -)

  • Go, Huijea;Hyun, Jihun;Lee, Juhee;Ahn, Joseph
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.4
    • /
    • pp.15-25
    • /
    • 2022
  • As the incidence and mortality of serious disasters in the construction industry are the highest, various efforts are being made in Korea to reduce them. Among them, risk assessment is used as data for disaster reduction measures and evaluation of risk factors at the construction stage. However, the existing risk assessment involves the subjectivity of the performer and is vulnerable to the domestic construction site. This study established a DB classification system for risk assessment with the aim of early identification and pre-removal of risks by quantitatively deriving risk factors using BIM in the risk assessment field and presents a methodology for risk assessment using BIM. Through this, prior removal of risks increases the safety of construction workers and reduces additional costs in the field of safety management. In addition, since it can be applied to new construction methods, it improves the understanding of project participants and becomes a tool for communication. This study proposes a framework for deriving quantitative risks based on BIM, and will be used as a base technology in the field of risk assessment using BIM in the future.

Development of the Protocol of the High-Visibility Smart Safety Vest Applying Optical Fiber and Energy Harvesting (광섬유와 압전 에너지 하베스팅을 적용한 고시인성 스마트 안전조끼의 개발)

  • Park, Soon-Ja;Jung, Jun-Young;Moon, Min-Jung
    • Science of Emotion and Sensibility
    • /
    • v.24 no.2
    • /
    • pp.25-38
    • /
    • 2021
  • The aim of this study is to protect workers and pedestrians from accidents at night or bad weather by attaching optical fiber to existing safety clothing that is made only with fluorescent fabrics and retroreflective materials. A safety vest was designed and manufactured by applying optical fiber, and energy-harvesting technology was developed. The safety vest was designed to emit light using the automatic flashing of optical fibers attached to the film, and an energy harvester was manufactured and attached to drive the light emission of the optical fiber more continuously. As a result, first, the vest wearer' body was recognized from a distance through the optical fiber and retroreflection, which helped prevent accidents. Thus, this concept helps in saving lives by preventing accidents during night-time work on the roadside or activities of rescue crew and sports activities, or by quickly finding the point of an accident with a signal that changes the optical fiber light emission. Second, to use the wasted energy, a piezoelectric-element power generation system was developed and the piezoelectric-harvesting device was mounted. Potentially, energy was efficiently produced by activating the effective charging amount of the battery part and charging it auxiliary. In the existing safety vest, detecting the person wearing the vest is almost impossible in the absence of ambient light. However, in this study, the wearer could be found within 100 m by the light emission from the safety vest even with no ambient light. Therefore, in this study, we will help in preventing and reducing accidents by developing smart safety clothing using optical fiber and energy harvester attached to save lives.

Comparison of Laboratory Tests Applied for Diagnosing the SARS-CoV-2 Infection (SARS-CoV-2 감염의 진단에 이용되는 검사실 테스트의 비교)

  • Lee, Chang-Gun;Lee, Dongsup
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.54 no.2
    • /
    • pp.79-94
    • /
    • 2022
  • Due to the highly contagious nature and severity of the respiratory diseases caused by COVID-19, economical and accurate tests are required to better monitor and prevent the spread of this contagion. As the structural and molecular properties of SARS-CoV-2 were being revealed during the early stage of the COVID-19 pandemic, many manufacturers of COVID-19 diagnostic kits actively invested in the design, development, validation, verification, and implementation of diagnostic tests. Currently, diagnostic tests for SARS-CoV-2 are the most widely used and validated techniques for rapid antigen, and immuno-serological assays for specific IgG and IgM antibody tests and molecular diagnostic tests. Molecular diagnostic assays are the gold standard for direct detection of viral RNA in individuals suspected to be infected with SARS-CoV-2. Antibody-based serological tests are indirect tests applied to determine COVID-19 prevalence in the community and identify individuals who have obtained immunity. In the future, it is necessary to explore technical problems encountered in the early stages of global or regional outbreaks of pandemics and provide future directions for better diagnostic tests. This article evaluates the commercially available and FDA-approved molecular and immunological diagnostic assays and analyzes their performance characteristics.

Cyber attack group classification based on MITRE ATT&CK model (MITRE ATT&CK 모델을 이용한 사이버 공격 그룹 분류)

  • Choi, Chang-hee;Shin, Chan-ho;Shin, Sung-uk
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.1-13
    • /
    • 2022
  • As the information and communication environment develops, the environment of military facilities is also development remarkably. In proportion to this, cyber threats are also increasing, and in particular, APT attacks, which are difficult to prevent with existing signature-based cyber defense systems, are frequently targeting military and national infrastructure. It is important to identify attack groups for appropriate response, but it is very difficult to identify them due to the nature of cyber attacks conducted in secret using methods such as anti-forensics. In the past, after an attack was detected, a security expert had to perform high-level analysis for a long time based on the large amount of evidence collected to get a clue about the attack group. To solve this problem, in this paper, we proposed an automation technique that can classify an attack group within a short time after detection. In case of APT attacks, compared to general cyber attacks, the number of attacks is small, there is not much known data, and it is designed to bypass signature-based cyber defense techniques. As an attack model, we used MITRE ATT&CK® which modeled many parts of cyber attacks. We design an impact score considering the versatility of the attack techniques and proposed a group similarity score based on this. Experimental results show that the proposed method classified the attack group with a 72.62% probability based on Top-5 accuracy.