• Title/Summary/Keyword: 안전채널

검색결과 324건 처리시간 0.031초

Integrity test and depth estimation of deep foundations (깊은 기초의 건전도시험과 근입깊이 조사)

  • Jo Churl-hyun;Jung Hyun-key;Lee Tai-sup;Kim Hag-soo
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 한국지구물리탐사학회 1999년도 제2회 학술발표회
    • /
    • pp.202-216
    • /
    • 1999
  • The deep foundation is frequently used for the infrastructures. Since the quality control of the cast-in-place concrete foundations such as CIP piles and slurry walls is not so easy as that of the ready made PC(prestressed concrete) piles, it is necessary to get the information on the integrity of the concrete of the foundation. The depth estimation of foundations whose depths are unknown is also very important in repair and reinforcement works or in safety inspection and assessment to the big structures. The cross-hole sonic logging(CSL) system and the single channel reflection seismic measurement system were developed to test the integrity of pile. The former is well applied to CIP structures, while the later to all kinds of piles with less accurate result compared to that of CSL. To estimate the depth of the deep foundations, parallel seismics, borehole RADAR, and borehole magnetics can be used.

  • PDF

Design and Implementation of Beacon based Wireless Sensor Network for Realtime Safety Monitoring in Subway Stations (지하철 역사에서 실시간 안전 모니터링 위한 비컨 기반의 무선 센서 네트워크 설계 및 구현)

  • Kim, Young-Duk;Kang, Won-Seok;An, Jin-Ung;Lee, Dong-Ha;Yu, Jae-Hwang
    • Journal of the Korean Society for Railway
    • /
    • 제11권4호
    • /
    • pp.364-370
    • /
    • 2008
  • In this paper, we proposed new sensor network architecture with autonomous robots based on beacon mode and implemented real time monitoring system in real test-bed environment. The proposed scheme offers beacon based real-time scheduling for reliable association process with parent nodes and dynamically assigns network address by using NAA (Next Address Assignment) mechanism. For the large scale multi-sensor processing, our real-time monitoring system accomplished the intelligent database processing, which can generate not only the alert messages to the civilians but also process various sensing data such as fire, air, temperature and etc. Moreover, we also developed mobile robot which can support network mobility. Though the performance evaluation by using real test-bed system, we illustrate that our proposed system demonstrates promising performance for emergence monitoring systems.

Design and Measured Data Analysis of a Shipboard Indoor Signal Propagation Characteristics Based on Signature Sequence-Two Way Packet Mode (서명 수열-양방향 패킷 방식 기반 선내 전파 전달특성 측정시스템 설계 및 분석)

  • Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제40권1호
    • /
    • pp.183-186
    • /
    • 2015
  • Recently, the demand for the safety and the information delivery system in the ship increases. The deployment of the wireless sensor networks instead of using the built-in wired networks or the setup of the new wired networks is more desirable than the deployment of the wired networks in a ship after its final production since it can reduce the cost and the time of the brand new wired networks by deforming some of the internal structure of the ship. In this paper, the shipboard signal propagation measurement system based on the signature sequence-two way slave mode are designed and its measurement data are analysed after measuring the signal propagation characteristics. Consequently, it is expected that the reliable and cost-effective signal measurement system for the deployment of the shipboard wireless networks can be built.

Mobile Payment System Design with Transaction Certificate Mode (거래 인증 모드를 사용한 이동 결제 시스템 설계)

  • Sung, Soon-Hwa;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제24권5호
    • /
    • pp.931-939
    • /
    • 2014
  • The Web or Mobile channel of previous Web access authentication system for a payment only provides the authentication of remote users, and does not provide the authentication between a user and a bank/financial institution. Therefore, this paper proposes the Transaction Certificate Mode(TCM) for a payment which can preserve the mutual authentication between a user and a bank/financial institution for Web-based payment systems. The proposed system has designed for wireless network instead of Secure Electronic Transaction (SET) designed for wired electronic transaction. In addition, this system with TCM is able to support an account-based transaction for wireless networks instead of a disadvantage of SET such as a card-based transaction for wired networks. Therefore, customers can check their balances without logging on their bank's web site again due to mutual authentication between a customer and his bank/financial institution.

A Basic Study on Development of VTS Control Guideline based on Ship's Operator's Consciousness (선박운항자 의식 기반 적정 관제시기 분석에 관한 기초 연구)

  • Park, Sang-Won;Park, Young-Soo
    • Journal of Navigation and Port Research
    • /
    • 제40권3호
    • /
    • pp.105-111
    • /
    • 2016
  • In ports of Korea, the marine traffic flow is congested due to a large number of vessels coming in and going out. In order to improve the safety and efficiency of these vesse's movement, South Korea is operating with a Vessel Traffic System, which is monitoring its flow 24-7. However despite these efforts of the VTS (Vessel Traffic System) officers, marine accidents are occurring continuously in their control area. VTS Officers are controlling subjectively based on their experience due to no VTS control guideline of dangerous situation among vessels. On this paper, we listened to Busan VHF channel for 3days and analyzed the message. With collision risk model, We analyzed a moment of risk which officers advise or recommend to vessel in encounter situation, VTSO's career, and day&night.

Enhanced Diffie-Hellman Key Distribution using Mobile-phone (이동전화기를 이용한 Diffie-Hellman 키 교환기법의 개선방안)

  • Lee, Yoon-Jin;Lee, Jae-Guen;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제13권12호
    • /
    • pp.2563-2568
    • /
    • 2009
  • Although a symmetric cryptographic system has many advantages in speed of encryption decryption, the security problems with the distribution method of secret keys have been still raised. Especially, the distribution method of secret keys for unspecified individuals who want secret communication is becoming a core issue. As a simple solution to this issue, Diffie-Hellman key exchange methods were proposed, but proved to be insufficient in depending MITM(Main In The Middle) attacks. To find effective solution to problems mentioned above, this paper proposes the strengthened Diffie-Hellman key exchange methods applied for the mobile-phone channel which are widely used. This paper emphasizes the way to distribute the synthesized session keys to the sender and the receiver, which are created with authentication numbers exchanged between the mobile-phones and Diffie-Hellman key. Using proposed ways, MITMattacks can be effectively defended.

Development of High Speed Scalar Product Operation System for ECC Public Key (타원곡선 공개키 생성을 위한 고속 스칼라곱 연산 시스템 구현)

  • Kim, Kap-Yol;Lee, Chul-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제14권2호
    • /
    • pp.394-402
    • /
    • 2010
  • At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.

Location-based Frequency Interference Management Scheme Using Fingerprinting Localization Algorithms (Fingerprinting 무선측위 알고리즘을 이용한 영역 기반의 주파수 간섭 관리 기법)

  • Hong, Aeran;Kim, Kwangyul;Yang, Mochan;Oh, Sunae;Jung, Hongkyu;Shin, Yoan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제37C권10호
    • /
    • pp.901-908
    • /
    • 2012
  • In an intelligent automated manufacturing environment, an administrator may use M2M (Machine-to-Machine) communication to recognize machine movement and the environment, as well as to respond to any potential dangers. However, commonly used wireless protocols for this purpose such WLAN (Wireless Local Area Network), ZigBee, and Bluetooth use the same ISM (Industrial Science Medical) band, and this may cause frequency interference among different devices. Moreover, an administrator is frequently exposed to dangerous conditions as a result of being surrounded by densely distributed moving machines. To address this issue, we propose in this paper to employ a location-based frequency interference management using fingerprinting scheme in industrial environments and its advanced localization schemes based on k-NN (Nearest Neighbor) algorithms. Simulation results indicate that the proposed schemes reduce distance error, frequency interference, and any potential danger may be responded immediately by continuous tracing of the locations.

Secure Steganography Based on Triple-A Algorithm and Hangul-jamo (Triple-A 알고리즘과 한글자모를 기반한 안전한 스테가노그래피)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • 제11권5호
    • /
    • pp.507-513
    • /
    • 2018
  • Steganography is a technique that uses hidden messages to prevent anyone apart from knowing the existence of a secret message, except the sender and trusted recipients. This paper applies 24 bit color image as cover medium. And a 24-bit color image has three components corresponding to red, green and blue. This paper proposes an image steganography method that uses Triple-A algorithm to hide the secret (Hangul) message by arbitrarily selecting the number of LSB bits and the color channel to be used. This paper divides the secret character into the chosung, jungsung and jongsung, and applies crossover, encryption and arbitrary insertion positions to enhance robustness and confidentiality. Experimental results of the proposed method show that insertion capacity and correlation are excellent and acceptable image quality level. Also, considering the image quality, it was confirmed that the size of LSB should be less than 2.

SDGs approach towards Building Resilience to Disaster and Climate Change (재해에 대한 리질리넌스 확보를 위한 지속가능개발목표의 이행)

  • Hong, Ilpyo;Park, Jihyeon
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 한국수자원학회 2016년도 학술발표회
    • /
    • pp.77-77
    • /
    • 2016
  • 최근 기후변화로 인한 수문기상학적인 극한 사상들은 점점 대형화되고 있고, 그 발생빈도 또한 잦아지고 있다. 인구의 증가와 급격한 도시화, 자산 가치의 증가 등으로 물과 관련된 재해로 인한 피해는 점점 더 규모가 커지고 있다. 홍수와 가뭄, 허리케인, 쓰나미와 같이 물과 관련된 재해는 그 영향을 받는 사람들의 수로 본다면 지구상의 재해 중 90%를 차지하고 있을 만큼 그 규모가 크다 할 수 있으며, 전세계적으로 물관련 재해로 인한 재산상의 피해를 약 1,000억 달러 규모로 추산하고 있는데, 2030년에는 그 현재의 두 배가 될 것으로 예측하고 있다. 이와 같은 재해로 인한 피해는 개도국이나 최빈국뿐만 아니라 관련 인프라가 잘 구축되어 있는 선진국 또한 예외는 아니다. 2015년 9월 UN 세계지속가능 정상 회의에서 각국의 수반들 또한 17개의 "지속가능개발목표(Sustainable Development Goals; SDGs)"를 채택함으로서 post-2015 아젠다가 세계를 지속가능하고 균형 있게 바꾸어 나가기 위해서 취해야 하는 가장 시급하고 필요한 과감한 혁신적인 조치임을 인식하였다. 재해경감과 지속가능개발은 2005년 채택된 "효고프레임웍(Hyogo Framework for Action) 2005-2015"에서 도 중요하게 다루어 졌다. 2015년 3월 제3차 세계재해경감대회에서 채택된 "센다이 프레임웍(Sendai Framework for Disaster Risk Reduction) 2015-2030"은 Post-2015 개발의제의 첫 번째 합의 결의안이라 할 수 있으며, 인명피해의 실질적인 감소와 재해에 의한 영향으로 피해 보는 사람들의 수를 줄이고, 경제적 손실과 대형 인프라 피해의 경감을 주요 타겟으로 하고 있다. 이와 같은 리질리언스의 중요성은 SDGs의 Goal 11인 "안전하고 지속가능한 도시와 정주지 조성(Make cities and human settlements inclusive, safe, resilient and sustainable)"에서 강조되고 있을 뿐만 아니라 다양한 골에서 재해로 부터의 리질리언스 확보에 대한 필요성을 강조하고 있다. 재해 위험을 경감시키기 위해서 국제적으로, 지역적으로 또는 국경을 넘어서는 협력 관계의 구축이 중앙정부나 지방정부를 비롯한 국가적으로 절대적으로 필요한 노력이라 할 수 있다. 특히나, Post-2015 개발 아젠다에 대한 기후변화와 재해경감을 위한 금융지원을 포함한 최빈국, 개도국, 군소 도서국가들과 중견국 선진국들의 양자간이나 다자간 협력 채널을 통한 역량 강화가 필요하다.

  • PDF