• Title/Summary/Keyword: 진화 설계

Search Result 639, Processing Time 0.023 seconds

Role Based Smart Health Service Access Control in F2C environment (F2C 환경에서 역할 기반 스마트 헬스 서비스 접근 제어)

  • Mi Sun Kim;Kyung Woo Park;Jae Hyun Seo
    • Smart Media Journal
    • /
    • v.12 no.7
    • /
    • pp.27-42
    • /
    • 2023
  • The development of cloud services and IoT technology has radically changed the cloud environment, and has evolved into a new concept called fog computing and F2C (fog-to-cloud). However, as heterogeneous cloud/fog layers are integrated, problems of access control and security management for end users and edge devices may occur. In this paper, an F2C-based IoT smart health monitoring system architecture was designed to operate a medical information service that can quickly respond to medical emergencies. In addition, a role-based service access control technology was proposed to enhance the security of user's personal health information and sensor information during service interoperability. Through simulation, it was shown that role-based access control is achieved by sharing role registration and user role token issuance information through blockchain. End users can receive services from the device with the fastest response time, and by performing service access control according to roles, direct access to data can be minimized and security for personal information can be enhanced.

An Empirical Study on Fear and Dizziness Using UAM Simulator (UAM 시뮬레이터를 활용한 공포심과 어지러움에 대한 실증 연구)

  • Se-Jun Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.3
    • /
    • pp.262-268
    • /
    • 2023
  • Based on the government's willingness to commercialize UAM with the goal of 2025, it is making remarkable achievements in various fields, including the development of UAM. In addition, based on the concept of UAM, it is evolving into an Advanced Air Mobility(AAM) concept that includes commercial operation between long-distance or short-range cities, cargo delivery, public services, aviation tourism, and personal/leisure aircraft. however, research on physical problems such as low-altitude operation characteristics, speed within three dimensions, and dizziness caused by external environment has yet to be found. Therefore, in this study, actual images are taken while flying at the expected altitude and speed of UAM using a helicopter, and by experiencing it to the general public using a UAM simulator equipped with VR and Motion, physical reactions such as fear and dizziness of passengers that may occur during actual UAM operation of UAM are analyzed.

Implementation of IoT Application using Geofencing Technology for Mountain Management (산악 관리를 위한 지오펜싱 기술을 이용한 IoT 응용 구현)

  • Hyeok-jun Kweon;Eun-Gyu An;Hoon Kim
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.3
    • /
    • pp.300-305
    • /
    • 2023
  • In this paper, we confirmed that an efficient sensor network can be established at a low cost by applying Geofencing technology to a LoRa-based sensor network and verified its effectiveness in disaster management such as forest fires. We detected changes through GPS, gyro sensors, and combustion detection sensors, and defined the validity size of the Geofencing cell accurately. We proposed a LoRa Payload Frame Structure that has a flexible size according to the size of the sensor information.

An Efficient Post-Quantum Signature Scheme Based on Multivariate-Quadratic Equations with Shorter Secret Keys (양자컴퓨터에 안전한 짧은 비밀키를 갖는 효율적인 다변수 이차식 기반 전자서명 알고리즘 설계)

  • Kyung-Ah Shim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.211-222
    • /
    • 2023
  • Multivariate quadratic equations (MQ)-based public-key cryptographic algorithms are one of promising post-quantumreplacements for currently used public-key cryptography. After selecting to NIST Post-Quantum Cryptography StandardizationRound 3 as one of digital signature finalists, Rainbow was cryptanalyzed by advanced algebraic attacks due to its multiple layered structure. The researches on MQ-based schemes are focusing on UOV with a single layer. In this paper, we propose a new MQ-signature scheme based on UOV using the combinations of the special structure of linear equations, spare polynomials and random polynomials to reduce the secret key size. Our scheme uses the block inversion method using half-sized blockmatrices to improve signing performance. We then provide security analysis, suggest secure parameters at three security levels and investigate their key sizes and signature sizes. Our scheme has the shortest signature length among post-quantumsignature schemes based on other hard problems and its secret key size is reduced by up to 97% compared to UOV.

Implementation and Performance Analysis of Partition-based Secure Real-Time Operating System (파티션 기반 보안 실시간 운영체제의 구현 및 성능 분석)

  • Kyungdeok Seo;Woojin Lee;Byeongmin Chae;Hoonkyu Kim;Sanghoon Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.99-111
    • /
    • 2022
  • With current battlefield environment relying heavily on Network Centric Warfare(NCW), existing weaponary systems are evolving into a new concept that converges IT technology. Majority of the weaponary systems are implemented with numerous embedded softwares which makes such softwares a key factor influencing the performance of such systems. Furthermore, due to the advancements in both IoT technoogies and embedded softwares cyber threats are targeting various embedded systems as their scope of application expands in the real world. Weaponary systems have been developed in various forms from single systems to interlocking networks. hence, system level cyber security is more favorable compared to application level cyber security. In this paper, a secure real-time operating system has been designed, implemented and measured to protect embedded softwares used in weaponary systems from unknown cyber threats at the operating system level.

A Study on Threat Detection Model using Cyber Strongholds (사이버 거점을 활용한 위협탐지모델 연구)

  • Inhwan Kim;Jiwon Kang;Hoonsang An;Byungkook Jeon
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • With the innovative development of ICT technology, hacking techniques of hackers are also evolving into sophisticated and intelligent hacking techniques. Threat detection research to counter these cyber threats was mainly conducted in a passive way through hacking damage investigation and analysis, but recently, the importance of cyber threat information collection and analysis is increasing. A bot-type automation program is a rather active method of extracting malicious code by visiting a website to collect threat information or detect threats. However, this method also has a limitation in that it cannot prevent hacking damage because it is a method to identify hacking damage because malicious code has already been distributed or after being hacked. Therefore, to overcome these limitations, we propose a model that detects actual threats by acquiring and analyzing threat information while identifying and managing cyber bases. This model is an active and proactive method of collecting threat information or detecting threats outside the boundary such as a firewall. We designed a model for detecting threats using cyber strongholds and validated them in the defense environment.

A Library Service Model Toward Ubiquitous City (U-City 구현을 위한 도서관서비스 모델)

  • Chung, Jun-Min
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.20 no.3
    • /
    • pp.163-169
    • /
    • 2009
  • The concept of library is newly interpreted and designed under the environment of U-City. The basic notion of the library should not changed its kernel nevertheless, the new technologies like ubiquitous computing services are applied to the library, which functions in terms of information services, continuous learning programs and communities of practice(CoP). The library is fit for any technologies or environments as organism. Actually the library has been shown in terms of new information technologies with the changes of the times. It leads to comprehend the library as its appearance not as it is. The libraries including even cities have evolved toward ubiquitous(computing) environment. On the other words, the libraries have sought ubiquitous at the past, now they are still chasing it.

Research on the Implementation of 5G SA Test Network Test Bed Function Based on Service-Based Architecture (SBA 기반 5G SA 시험망 시스템 기능 구현에 관한 연구)

  • Park, Jea-Seok;Yoon, Mahn-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.529-531
    • /
    • 2022
  • The 5th generation mobile communication (5G) is being commercialized by major domestic and foreign mobile telecommunication businesses and is spreading to general customers mainly on smart devices such as smartphones, wearables, and IoT. If 4G networks and 5G access equipment were utilized by introducing NSA(None-Stand Alone) technology when 5G was first introduced, recently, 5G convergence services are being realized by gradually expanding evolution to 5G standalone networks through SA (Stand Alone) technology. The purpose of this study is to study a design plan for implementing necessary service-oriented functions from the perspective of communication network users on the configuration of 5G SA equipment based on SBA(Service-based Architecture) mentioned in the 3GPP technical specification document. Through this research, it is expected that companies that need to enter the 5G market can easily access the 5G SA network to develop and supplement specialized 5G convergence services to improve product performance and quality.

  • PDF

Design of pRBFNNs Pattern Classifier-based Face Recognition System Using 2-Directional 2-Dimensional PCA Algorithm ((2D)2PCA 알고리즘을 이용한 pRBFNNs 패턴분류기 기반 얼굴인식 시스템 설계)

  • Oh, Sung-Kwun;Jin, Yong-Tak
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.1
    • /
    • pp.195-201
    • /
    • 2014
  • In this study, face recognition system was designed based on polynomial Radial Basis Function Neural Networks(pRBFNNs) pattern classifier using 2-directional 2-dimensional principal component analysis algorithm. Existing one dimensional PCA leads to the reduction of dimension of image expressed by the multiplication of rows and columns. However $(2D)^2PCA$(2-Directional 2-Dimensional Principal Components Analysis) is conducted to reduce dimension to each row and column of image. and then the proposed intelligent pattern classifier evaluates performance using reduced images. The proposed pRBFNNs consist of three functional modules such as the condition part, the conclusion part, and the inference part. In the condition part of fuzzy rules, input space is partitioned with the aid of fuzzy c-means clustering. In the conclusion part of rules. the connection weight of RBFNNs is represented as the linear type of polynomial. The essential design parameters (including the number of inputs and fuzzification coefficient) of the networks are optimized by means of Differential Evolution. Using Yale and AT&T dataset widely used in face recognition, the recognition rate is obtained and evaluated. Additionally IC&CI Lab dataset is experimented with for performance evaluation.

Experimental Investigation on Behavior of Single Horizontal Buoyant Jet (단일수평부력제트의 거동에 관한 실험적 연구)

  • Seo, Il-Won;Kim, Ho-Jung;Kwon, Seok-Jae
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2005.05b
    • /
    • pp.1011-1015
    • /
    • 2005
  • 본 실험에서는 부력 조건이 달라질 때 단공방류구에서 정체수역으로 수평방류되는 부력제트의 거동을 규명하였다. LIF (Laser Induced Fluorescence) 시스템을 이용하여 수행하였는데, LIF 시스템은 고해상도의 이미지를 취득할 수 있어 데이터의 정확도가 높으며, 동시에 한 평면상의 농도장을 일시에 측정할 수 있는 장점이 있는 기술이다. LIF 시스템은 크게 세부분으로 구성되어 있는데 방출시스템, 포착시스템, 처리시스템이 그것이다. 실험 조건을 고려해서 온수를 이용하여 주변수와의 밀도차를 재현하였으며, LIF 시스템의 추적입자로 형광염료 Rhodamine B를 사용하였다. 또한, 실험 데이터 취득과정에서 필요한 검정과정을 수행하였는데, LIF 시스템에서 검정과정은 레이저 입사광의 강도가 불균등한 분포를 가지는 점과 주변수의 매질에 의한 근의 감쇠가 발생하는 문제를 해결하기 위한 것이다. LIF 시스템은 부력제트의 농도장을 매우 정밀하게 측정할 수 있는데, 방류밀도 Froude 수가 변함에 따라 측정된 순간이미지를 통해 제트의 진화과정을 상세하고 가시적으로 확인할 수 있었다. 검정과정을 거친 농도 종단면에서 중심선의 연장선이 LIF 시스템에 의해 측정된 순간이미지의 중심선 궤적과 거의 일치하는 것도 알 수 있었다. 또한 LIF 시스템을 통해서 취득된 단일수평부력제트의 궤적과 중심선 희석률을 기존의 상용모형인 VISJET과 CORMIX1에 의해 예측된 결과와 비교$\cdot$분석한 결과, 제트 중심선 궤적의 경우, LIF 시스템을 이용한 측정값은 대체로 VISJET 모형의 결과와 일치하는 것으로 밝혀졌다. 중심선 희석률의 경우, LIF 측정값은 대체로 CORMIX1 모형, Cederwall(1968)의 경험식과 일치하는 경향을 보였다.0\%$일 때가 밸브를 $60\%$$80\%$ 개폐시켰을 때보다 $0.3kg/cm^2,\;0.29kg/cm^2$ 낮게 나타나 밸브를 전체 개방 했을 때 관로내의 수압이 상수설계기준에 적합한 수압을 유지함을 알 수 있다. 상수관로 설계 기준에서는 관로내 수압을 $1.5\~4.0kg/cm^2$으로 나타내고 있는데 $6kg/cm^2$보다 과수압을 나타내는 경우가 $100\%$로 밸브를 개방하였을 때보다 $60\%,\;80\%$ 개방하였을 때가 더 빈번히 발생하고 있으므로 대상지역의 밸브 개폐는 $100\%$ 개방하는 것이 선계기준에 적합한 것으로 나타났다. 밸브 개폐에 따른 수압 변화를 모의한 결과 밸브 개폐도를 적절히 유지하여 필요수량의 확보 및 누수방지대책에 활용할 수 있을 것으로 판단된다.8R(mm)(r^2=0.84)$로 지수적으로 증가하는 경향을 나타내었다. 유거수량은 토성별로 양토를 1.0으로 기준할 때 사양토가 0.86으로 가장 작았고, 식양토 1.09, 식토 1.15로 평가되어 침투수에 비해 토성별 차이가 크게 나타났다. 이는 토성이 세립질일 수록 유거수의 저항이 작기 때문으로 생각된다. 경사에 따라서는 경사도가 증가할수록 증가하였으며 $10\% 경사일 때를 기준으로 $Ro(mm)=Ro_{10}{\times}0.797{\times}e^{-0.021s(\%)}$로 나타났다.천성 승모판 폐쇄 부전등을 초래하는 심각한 선천성 심질환이다. 그러나 진단 즉시 직접 좌관상동맥-대동맥 이식술로 수술적 교정을 해줌으로써 좋은 성적을 기대할 수 있음을 보여주었다.특히

  • PDF