• Title/Summary/Keyword: 신분

Search Result 548, Processing Time 0.022 seconds

Isolation of Novel Taxa Using Complex Media with Influent Sewage Water (유입하수 첨가 배지를 이용한 세균 신분류군의 분리)

  • Lee, Siwon;Park, Su Jeong;Kim, Changsoo;Cho, Yangsoek;Chung, Hyen-Mi;Park, Sangjung
    • Microbiology and Biotechnology Letters
    • /
    • v.44 no.2
    • /
    • pp.180-184
    • /
    • 2016
  • In this study, we evaluated complex media with influent sewage water (ISW) to isolate novel taxa of bacteria. It was possible to cultivate 13 genera using the complex media with ISW. Additionally, more diverse genera were identified at 37℃ than at 25℃, using the complex media with ISW. Total 12 strains of 179 bacterial isolates were shared less than 97% 16S rRNA gene sequence similarities with any known species. These isolates could be assigned to genera Tessaracoccus, Paracoccus, or Candidimonas (or Paralcaligenes).

Electronic Settlement System Model Using an Indirect Authentication Method by Interrelationship (상호 관계성을 가진 간접 인증 방법을 이용한 전자 결제 시스템)

  • Park, Young-Ho;Lee, Keum-Suk
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.2
    • /
    • pp.93-99
    • /
    • 1998
  • There is only authentication of end-to-end in electronic commerce technique. But in a distributed system, an authentication that is ensured users and computers has a big threats which an identify of those is unbelievable because it can be occurred an fabrication or a false personation. Authentication for other elements included customers and vendors is required in the case that there is many a broker connecting customers with vendors as well. In authentication like above, many elements playing different role participated, were performed by the known techniques, processing was more complicated. In this paper, the Mutual Indirect Authentication technique is used to solve and avoid that condition and the generalized electronic commerce using a mobile agent is accomplished with this technique.

  • PDF

Color Rank System of the Court Wonsam of Joseon Dynasty (조선시대 궁중 원삼의 신분별 색상 연구)

  • Park, Hyun-Jung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.10
    • /
    • pp.1552-1563
    • /
    • 2009
  • This paper investigates the color rank system of the Wonsam, ceremonial topcoat, worn as a court formal costume of the Joseon dynasty by analyzing the court costume system and the actual examples of wearing. The research shows that there were some discrepancies of the color rank of the Wonsam between the court costume system and the actual wearing examples. There were red, purple, blue, green, and black Wonsam in the Joseon dynasty. The color rank of the Wonsam is as follows: the Queen's color was red, the Crown Princess's was green and purple, the royal concubine's was usually green and blue, but they could wear purple when they won the King's favor. A prince's wife's was usually green, but she wore blue and purple if she became the mother of the King. The princess's was green, and the court lady's was green, blue, and black. In most cases, the textiles of Wonsam were made by silk with patterns, even though Joseon dynasty was ordered to use silks without patterns in court weddings and funeral ceremonies to avoid extravagance.

Study on the stabilisateur of information transmission in RF-CBTC train control system using the FHSS system (FHSS방식을 채용한 RF-CBTC 열차제어시스템 정보 전송의 안정화에 관한 연구)

  • Oh, Sea-Hwa;Jin, Zhe-Huan;Lee, Key-Seo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.4
    • /
    • pp.455-468
    • /
    • 2014
  • This paper presents seamless hand off implementation suggesting algorithm and Measuring /testing at the tunnel environment in order to derive the ideal value of wireless data transmission in RF-CBTC train control system modeled by Shinbundang Operation System. In addition, it proposes the ideal value(-57dB) for reducing the re-transmission or frequency interference rate and demonstrates frequency optimization which enables highly reliable data communication in Train control system using wireless communications. Based on these result, Shinbundang phase 2 plan to apply to this system.

Implementation and Design of Artificial Intelligence Face Recognition in Distributed Environment (분산형 인공지능 얼굴인증 시스템의 설계 및 구현)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.1
    • /
    • pp.65-75
    • /
    • 2004
  • It is notorious that PIN(Personal Identification Number) is used widely for user verification and authentication in networked environment. But, when the user Identification and password are exposed by hacking, we can be damaged monetary damage as well as invasion of privacy. In this paper, we adopt face recognition-based authentication which have nothing to worry what the ID and password will be exposed. Also, we suggest the remote authentication and verification system by considering not only 2-Tier system but also 3-Tier system getting be distributed. In this research, we analyze the face feature data using the SVM(Support Vector Machine) and PCA(Principle Component Analysis), and implement artificial intelligence face recognition module in distributed environment which increase the authentication speed and heightens accuracy by utilizing artificial intelligence techniques.

  • PDF

The Implementation of Integrity Verification Tool for Fingerprint Recognition Systems (지문인식시스템 무결성 검증 도구 구현)

  • 윤덕현;김기욱;김창수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.941-946
    • /
    • 2002
  • 지문인식 시스템이 네트워크 기반에서 서버 매칭 형식으로 운영될 경우 클라이언트 매칭과는 달리 데이터의 전송과정에 많은 취약성이 존재한다. 지문인식은 휴대의 불편함이 없고, 분실이나 도난의 위험성도 없으며, 추측이 거의 불가능하므로 높은 안전성을 제공하는 장점을 가지고 있다. 그러나 지문데이터는 한 번 도난을 당하거나 네트워크 상에서 전송 도중 공격자를 통해 도청이 된다면 그 사용자는 앞으로 지문인식을 이용할 수 없다는 단점이 존재한다. 이에 대하여 전송 포맷 기술과 전송 데이터 보안의 표준화가 이루어지고 있다. 따라서 본 논문에서는 클라이언트에서 추출한 지문 특징점 데이터를 매칭을 위해 서버로 데이터를 전송할 경우 무결성의 적합성을 검증하기 위한 도구를 구현하였다. 신분위장 및 재전송 공격들의 위협으로부터 안전한 사용자 신분 확인을 보장하기 위해서 전송되는 지문 데이터의 인중, 무결성, 기밀성이 요구되며, 이를 위해 지문 데이터의 MAC(Message Authentication Code)과 암호화 기법을 이용하였다. 이때 전송 데이터의 기밀성을 위해서 Triple-DES와 SEED 암호 알고리즘을 사용하였고 무결성을 위해 MD5와 SHA-1 해쉬 함수를 사용하였다. 클라이언트에서 데이터를 전송할 때 두 가지의 지문데이터를 전송하는 실험을 통하여 결과를 비교하였다. 첫째, 변조된 지문데이터를 전송하였을 경우 데이터가 변조되었음을 알려주는 결과를 보여준다. 둘째, 변조되지 않은 지문데이터를 전송하였을 경우 이 데이터는 변조되었다는 메시지를 출력함으로써 무결성 검증 실험은 이루어진다.

  • PDF

Privacy-Preserving ID-based Service in Anonymity-based Ubiquitous Computing Environment (익명기반 유비쿼터스 환경의 프라이버시 보장 ID기반 서비스)

  • Kim Hak-Joon;Hwang Kyoung-Soon;Lee Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.65-68
    • /
    • 2005
  • Privacy preservation is crucial in ubiquitous computing environment in which lots of privacy- sensitive information can be collected and distributed without appropriate control. The anonymity-based approach is a famous one used for privacy preservation communication, which allows users to use pseudonyms instead of real ID so as not to reveal their identities. This approach is effective in that it can hide the identity of users. However, it makes it difficult to provide ID-based services like buddy service, dangerous area alert, P2P communication in the ubiquitous computing. We proposes a system architecture which enables ID-based services in the ubiquitous computing environment employing anonymity - based privacy - preserving approach.

Based PKI System for Secure Authentication on IPTV (IPTV에서 PKI기반의 안전한 인증시스템)

  • Shuai, Wang;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.899-905
    • /
    • 2009
  • IPTV service is one of the representatives for the integration of broadcasting industry and communication industry, which also can meet users' various demands and provide efficient service. As the increasing number of IPTV users and contents servers, it is necessary to provide the safety authority system to prevent the illegal audio-visual, incorrect audio-visual authority, and illegal authority control. This thesis puts forward PKI(public Key Infrastructure) as the foundation key production mechanism. Through this mechanism, the key can be transferred safely to users and authenticate the ID of users and contents servers. In a word, our system can provide safe and efficient service for mutual authentication.

The Design of Security Protocol for An Efficient Distribution and Renewal Method of Group Key (효율적인 그룹키 분배 및 갱신을 위한 보안 프로토콜의 설계)

  • O, Myeong-Uk;Kim, Seong-Yeol;Bae, Yong-Geun;Jeong, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.331-336
    • /
    • 2002
  • In this paper, we propose a new distribution and renewal scheme for a group key suitable for secure mobile communications based on identification protocol, in which all members of the group can reshare the new group common key except revoked members by using a key distribution center (a trusted center). The security of this scheme is based on the difficulty of the discrete logarithm problem. The proposed scheme can be appropriately managed in case that terminal's capability of storage and computing power is relatively small and more than one caller are revoked. It also renews a group key easily when the center changes this key intervally for security.

Evaluation on Effectiveness of the Compensation System for Reproducing or Interactively Transmitting Works in Libraries (도서관의 저작물 복제.전송 보상금제도 효용성 평가)

  • Hong, Jae-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.42 no.3
    • /
    • pp.351-379
    • /
    • 2011
  • The compensation system for reproducing or interactively transmitting works in libraries has been introduced in 2003. It has passed more than 7 years since this system has been implemented in July 2004. This study investigated current situation of operation on the compensation system for reproducing or interactively transmitting works in libraries. The survey on the effectiveness of the compensation system was conducted to a group of authors and librarians. First, the difference of the effectiveness of the compensation system between a group of authors and librarians was analyzed. In addition, the difference of the effectiveness of the compensation system according to status variable of author group was analyzed. Also the difference of the effectiveness of the compensation system according to status variable of librarian group was analyzed. Finally, this study pointed out the problems of the compensation system and presented the way to improve the problems.