• Title/Summary/Keyword: 위치추적시스템

Search Result 1,293, Processing Time 0.029 seconds

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

MICROLEAKAGE OF THE CLASS V CAVITY ACCORDING TO RESTORATION SITE AND CAVITY SIZE USING SEM AND THREE-DIMENSIONAL RECONSTRUCTION TECHNIQUES (SEM과 3차원 재구성법을 이용한 수복면의 위치와 와동 크기에 따른 미세누출도 분석)

  • Yang, In-Seo;Shin, Dong-Hoon
    • Restorative Dentistry and Endodontics
    • /
    • v.30 no.2
    • /
    • pp.112-120
    • /
    • 2005
  • This study was done to evaluate whether there were any differences in microleakage of class V composite restorations according to restoration site and cavity size. Total sixty-four restorations were made in molar teeth using Esthet-X. Small ($2\;{\times}\;2\;{\times}\;1.5\;mm$) and large ($4{\times}2{\times}1.5\;mm$) restorations were made at the buccal/lingual surface and the proximal surface each. After 1,000 times of thermocycling ($5^{\circ}\;-\;55^{\circ}C$), resin replica was made and the percentage of marginal gap to the whole periphery of the restoration was estimated from SEM evaluation. Thermocycled tooth was dye penetrated with $50\%$ silver nitrate solution. After imbedding in an auto-curing resin, it was serially ground with a thickness of 0.25 mm. Volumetric microleakage was estimated after reconstructing three dimensionally. Two-way ANOVA and independent T-test for dye volume, Mann-Whitney U test for the percentage of marginal gap, Spearman's rho test for the relationship between two techniques were used, The results were as follows : 1. The site and size of the restoration affected on the microleakage of restoration. Namely, much more leakage was seen in the proximal and the large restorations rather than the buccal/lingual and the small restorations. 2. Close relationship was found between two techniques (Correlation coefficient = 0.614/ P = 0.000). Within the limits of this study, it was noted that proximal and the large restorations leaked more than buccal/lingual and the small restorations. Therefore, it should be strictly recommended large exposure of margins should be avoided by reducing unnecessary tooth reduction.

멕시코 로얄 은광산 잠재성 평가

  • Heo, Cheol-Ho;Kim, Ui-Jun
    • 한국지구과학회:학술대회논문집
    • /
    • 2010.04a
    • /
    • pp.108-109
    • /
    • 2010
  • IMPACT Silver 주식회사는 Zacualpan 프로젝트의 Royal Mines(이하 로얄 광산)을 인수했다. $124.5\;km^2$에 해당하는 지역의 소유권은 두 개의 멕시코 사기업으로부터 가행중인 광산의 채굴권 구입과 운영 중인 기반시설의 임대를 조건으로 한다. 프로젝트 지역은 멕시코시티로부터 남서방향으로 100 km와 Taxco Silver 광산으로부터 북서방향으로 25 km 떨어진 지점에 위치한다. 기반시설은 비포장 도로, 충분한 전력과 물의 공급 및 숙련공들을 갖추어 우수한 평가를 받고 있다. 소유권은 멕시코인의 개인소유 하에서 무한한 매장량 혹은 자원량을 갖고 운영된 채광과 가공시설을 인수하는 것이다. 소유권 지역을 대상으로 한 IMPACT Silver사의 주 탐사목적은 이미 알려진 광화대의 확장을 위한 잠재성 평가와 다른 지역에서 신규 광상의 유망지역을 발견하는 것이다. Zacualpan 프로젝트의 로얄 광산은 남동 Guerrero terrane의 북부에 위치한다. Teloloapan subterrane은 주로 저변성 녹색편암상으로 구성된 쥬라기 후기에서 백악기 초기의 화산성 퇴적층으로 구성된다. 대부분의 유망지역은 Lower Villa de Ayala층의 중성 내지 염기성 화산성 쇄설암을 모암으로 한다. 다상의 변성작용은 지역 전반에 걸쳐 나타나고, Zacualpan 광산지역에서 수반되는 광화작용을 규제한다. Zacualpan 광산지역은 Sierra Madre del Sur로 알려진 유망 광화대에 해당한다. 이 지역은 화산성 괴상 황화광상과 천열수 맥상광상이 우세하다. 대부분의 천열수 광화작용은 3.2-3.8억 년 전 마그마의 생성이 활발한 판구조 체제 동안 발생하였다. 역사적으로 가장 주요한 지역은 Lipton Vein이다. 현재 Zacualpan 지구에서 채광량은 은 200-500 g/t 정도로 보고되고 있다. 일부 지역은 고품위 은 광화작용(은 1,000 g/t 이상)을 수반하고 있으며, 이는 탐사의 주 타겟이 되고 있다. Zacualpan에서 은 광화작용은 은이 부화된 중유황 천열수 맥상광상으로 상당히 유명하다. Fresnillo, Pachuca 및 Taxco 광산을 포함한 멕시코 소유의 대규모의 잘 알려진 광산들이 이에 해당한다. 이러한 광산들은 부산물로서 금, 아연, 연이 생산된다. 이러한 광상들은 맥상과 각력상 및 산점상 또는 망상세맥의 형태로 산출된다. 광화작용은 석영과 탄산염 맥 내에 주로 황철석과 다양한 섬아연석, 방연석, 은 혹은 금 광물들을 수반한다. 경제성을 갖는 광화작용의 수직적인 연장은 평균적으로 대략 300 m이고, 멕시코 중부에 위치한 Fresnillo의 광화작용은 100 m에서 960 m의 연장을 갖는 것으로 알려져 있다. 아주 오랫동안 Zacualpan에서 광산관계자의 관측과 IMPACT Silver에서 최근 작업의 결과를 토대로, Zacualpan 광산지역의 탐사모델은 새로운 광상의 탐사를 위한 가이드로서 개발되었다. Zacualpan 광산지역에서 가장 높은 경제성을 갖는 광화작용은 북서와 남북방향의 맥 구조를 따라 수반된다. 이러한 맥 구조들은 종종 이 지역을 가로질러 수 km까지 추적되지만, 경제성을 갖는 광화작용은 맥 구조를 따라서 구조적으로 유리한 지역에서 부광대를 형성한다. 부광대를 형성하기 위한 가장 유리한 구조적 지역은 북서와 남북방향으로 발달한 맥 구조들이 교차하는 지역이다. 지난 30년간 채광된 주요 부광대는 폭이 2-6 m 이고 수평연장은 30-150 m 그리고 수직연장은 230-300 m에 이른다. 가장 높은 생산량을 보이는 부광대는 남북방향의 이차 맥들이 Guadalupe 광산의 Lipton 맥을 가로지르는 지역에서 발달한다. 남동쪽으로 현재 Compadres 광산의 Silver Shoot No. 1으로부터 고품위 은을 생산하는 지역은 북서방향의 San Agustin 맥이 북향의 Cometa Navideno 맥에 의해 절단되는 지역에서 산출한다. 모암은 광화작용을 규제하는 또 다른 중요한 요소이다. 광산지역에서 경제성을 갖는 모든 광화작용은 중성 내지 염기성 화산암 특히 안산암과 관련 모암에 배태된다. 부광대가 셰일 혹은 편암으로 전이되는 지역에서, 맥들은 소규모의 세맥으로 나뉘어 진다. Zacualpan의 전형적인 천열수 광상에서 부광대는 상부로 가면서 은의 함량이 증가하고, 하부로 가면서 연 아연의 함량이 증가하는 수직적 대상을 보인다. 금의 함량 변화는 보다 예측이 어려우나 상당히 중요하다. Zacualpan 광산지역의 탐사모델에 사용된 토양 채취, 정밀지도제작, 트렌치 및 시추탐광은 현재 IMPACT Silver사가 이 지역을 대상으로 한 가장 효율적인 탐사방법으로 입증되었다. Zacualpan 프로젝트의 로얄 광산은 하루 500 톤을 제련하는 기반시설과 수반된 채굴권을 갖는 가행 광산들을 포함한다. 현재 IMPACT Silver사는 두 곳의 타겟 지역에서 정밀지도제작, 토양 및 암석 채취, 12공 총 1866 m의 시추탐광에 의한 사전조사로 구성된 4 단계 탐사를 수행했다. 암석 1,953개, 토양 1,631 개, 389 개의 시추코어 시료가 채집되고 분석되었다. 이러한 작업은 추가탐사를 요구하는 수많은 유망 광화대를 규명했다. Compadres 광산에서 현재 가행중인 지하갱 시료는 레벨 1에서 0.9 m의 폭을 갖는 광체에서 은 680 g/t과 금 0.3 g/t, 레벨 3에서 1.67 m의 폭을 갖는 광체에서 은 12,591 g/t과 금 12.07 g/t의 품위를 갖는 것으로 나타났다. 레벨 1에서 3까지 2-3 m의 폭과 30-40 m 연장으로 채광되었다. 시추탐광은 고품위를 갖는 몇몇의 중첩된 맥을 발견했다. Compadres 광산에서 남동방향으로 200 m지점에 위치한 Soledad 지역에서 5 개의 시추공으로부터 동일 맥 시스템이 발견되었고, 고품위 부광대의 상부로 간주되는 몇몇 중요 지점이 발견되었다. 초기 단계의 탐사는 유망 시추탐광 지역인 중간정도 내지 고품위 유망 광화대를 규명했다.

  • PDF

The Simulation for the Organization of Fishing Vessel Control System in Fishing Ground (어장에 있어서의 어선관제시스템 구축을 위한 모의실험)

  • 배문기;신형일
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.36 no.3
    • /
    • pp.175-185
    • /
    • 2000
  • This paper described on a basic study to organize fishing vessel control system in order to control efficiently fishing vessel in Korean offshore. It was digitalized ARPA image on the fishing processing of a fleet of purse seiner in conducting fishing operation at Cheju offshore in Korea as a digital camera and then simulated by used VTMS. Futhermore, it was investigated on the application of FVTMS which can control efficiently fishing vessels in fishing ground. The results obtained were as follows ; (1) It was taken 16 minutes and 35 minutes to casting and hauling net in fishing processing respectively. The length of rope pulled by scout boat was 200m, tactical diameter in casting net was 340.8m, turning speed was 6kts as well. (2) The processing of casting and hauling net was moved to SW, NE as results of simulation when the current direction and speed set into NE, 2kts and SW, 2kts respectively. Such as these results suggest that can predict to control the fishing vessel previously with information of fishing ground, fishery and ship's maneuvering, etc. (3) The control range of VTMS radar used in simulation was about 16 miles. Although converting from a radar of the control vessel to another one, it was continuously acquired for the vector and the target data. The optimum control position could be determined by measuring and analyzing to distance and direction between the control vessel and the fleet of fishing vessel. (4) The FVTMS(fishing vessel traffic management services) model was suggested that fishing vessels received fishing conditions and safety navigation information can operate safely and efficiently.

  • PDF

Current State for Temperature Management of Cold and Frozen Food Transportation Vehicles in Jeonbuk Province (전북권내 냉장·냉동식품 유통차량 온도관리 현황)

  • Park, Myoung-Su;Bahk, Gyung-Jin
    • Journal of Food Hygiene and Safety
    • /
    • v.32 no.2
    • /
    • pp.107-113
    • /
    • 2017
  • To understand of the present state for temperature management of cold and frozen food transportation vehicles, we surveyed and measured the temperatures of eight transportation vehicles (including 3 small & medium and 5 large businesses) in Jeonbuk province, Korea. In the transportation vehicles of small & medium businesses, the mean temperature of cold and frozen foods was $8.35{\pm}5.72^{\circ}C$ and $-3.45{\pm}16.88^{\circ}C$; in large businesses, $3.92{\pm}1.44^{\circ}C$ and $-15.38{\pm}2.98^{\circ}C$, respectively. In the difference of temperature by the locations within transportation vehicles, the difference in each cold and frozen was $2.40{\pm}1.45^{\circ}C$ and $2.37{\pm}2.52^{\circ}C$, as a mean. But there was not statistically significant difference in locations between cold and frozen (p > 0.05). In the difference of surface temperatures on various foods before and after door opening during the loading, the temperatures of cold and frozen foods increased by $0.55^{\circ}C$ and $1.18^{\circ}C$, as means, respectively. The temperature of foods over time and placement of cold and frozen foods in transportation vehicles were not consistently maintained at optimal values in distribution. Therefore, the development of time-temperature history (TTH) system technology at the distribution level for cold and frozen foods is required.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

Analysis of Determinant Factors of Apartment Price Considering the Spatial Distribution and Housing Attributes (공간지리적 요인과 주거특성을 고려한 공동주택 가격결정 분석)

  • Moon, Tae-Heon;Jeong, Yoon-Young
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.11 no.1
    • /
    • pp.68-79
    • /
    • 2008
  • Because local cities are different from large cities, they need to reflect their own characteristics of housing market. Thus in order to obtain useful implications for the establishing sound housing market in Jinju City, this paper investigated the characteristics of spatial distribution and determinant factors that affect apartment price in Jinju City. GIS representation of the apartments showed that most of old and small apartments were built in 'land readjustment project' areas executed in 1970s. On the contrary, new and large scale apartment complexes were built quite recently and distributed in the western and southern parts of the city. Next, in order to examine the factors which affect apartment price, this paper subtracted firstly several variables from the related studies. However in order to avoid multi-colinearity, variables were summarized by means of factor analysis. Then, setting apartment price as a dependant variable, 12 hedonic price models were established with 33 independent variables. As results, building age, floor area, accessibility to university and hospital, accessibility to arterial road, and stair-type building were turned out to be significant. These results will be used in making the supply and allocation plan of urban facilities and housing. Finally as conclusions this paper emphasized the need of periodic analysis of local housing market and establishing detailed housing information systems.

  • PDF

Multi channel reservation scheme for underwater sensor network (수중 센서 네트워크에서 다중 채널 예약방법)

  • Lee, Dong-Won;Kim, Sun-Myeng
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.336-339
    • /
    • 2011
  • In the RTLS(Real Time Location Based System), in case of existing a number of moving target, extremely complecated data flow is can be occurred. In the network where single gateway exists, various data which was collected from sensor node is transmitted along the simple route as time goes by. In case of multi-gateway configuration, the collected data is transmitted through diverse routes rather than simple route. This kind of data causes jams on nodes and this brings down the performance of the network. Different from existing studies, in this thesis, MAC (Media Access Control) protocol which minimizes data collision between nodes and guarantees QoS(Quality of Service) is suggested, in order to communicate efficiently in multi-gateway underwater sensor network environment. In the suggested protocol, source node which wants to transmit data makes a channel reservation to a number of destination node using a RTS packet. Source node reserves a channel without collision, by scheduling CTS response time using expected delay information from neighbor nodes. Once the reservation is made, source node transmit data packet without collision. This protocol analyzes/estimates the performance compared to a method provided from existing studies via simulation. As a results of the analysis, it was comfirmed that the suggested method has better performance, such as efficiency and delay.

  • PDF

Method of a Multi-mode Low Rate Speech Coder Using a Transient Coding at the Rate of 2.4 kbit/s (전이구간 부호화를 이용한 2.4 kbit/s 다중모드 음성 부호화 방법)

  • Ahn Yeong-uk;Kim Jong-hak;Lee Insung;Kwon Oh-ju;Bae Mun-Kwan
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.2 s.302
    • /
    • pp.131-142
    • /
    • 2005
  • The low rate speech coders under 4 kbit/s are based on sinusoidal transform coding (STC) or multiband excitation (MBE). Since the harmonic coders are not efficient to reconstruct the transient segments of speech signals such as onsets, offsets, non-periodic signals, etc, the coders do not provide a natural speech quality. This paper proposes method of a efficient transient model :d a multi-mode low rate coder at 2.4 kbit/s that uses harmonic model for the voiced speech, stochastic model for the unvoiced speech and a model using aperiodic pulse location tracking (APPT) for the transient segments, respectively. The APPT utilizes the harmonic model. The proposed method uses different models depending on the characteristics of LPC residual signals. In addition, it can combine synthesized excitation in CELP coding at time domain with that in harmonic coding at frequency domain efficiently. The proposed coder shows a better speech quality than 2.4 kbit/s version of the mixed excitation linear prediction (MELP) coder that is a U.S. Federal Standard for speech coder.