• Title/Summary/Keyword: 추적방지모델

Search Result 37, Processing Time 0.032 seconds

Design of Electronic Software Distribution Protocol for Software Copyright Protection (소프트웨어 저작권 보호를 위한 전자 소프트웨어 유통 프로토콜의 설계)

  • Kim, Young-Jun;Lee, Sung-Min;Rhee, Yoon-Jung;Park, Nam-Sup;Lee, Byung-Rae;Kim, Tai-Yun
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.641-650
    • /
    • 2001
  • In recent years, e-Commerce is very active on the Internet, especially the World Wide Web along with the popularization of Internet using high-speed networks. Especially, Electronic Software Distribution(ESD) is widely being focused as one of the popular researches. However, the existing models of ESD lack substantial illegal copy protection or copyright protection as they have the shortcomings of guaranteeing anonymity of users. This study suggests an ESD protocol that guarantees substantial copyright protection and anonymity based on the Public Key Infrastrncture(PKl). The suggested method does not give the information of a buyer who doesn't want to reveal to a seller, and protects illegal copy and distribution as well. When it happens that illegal copies are in circulation, this method provides a device to trace back its original distributor so that it helps protect the copyright. In addition, it provides more convenient environment to the user by not using the methods of serial number input and extra installation to use.

  • PDF

Performance Enhancement Study of a Final Clarifier by the Optimum Design of Inlet and Baffle Condition (유입구 및 정류벽 최적설계에 의한 최종 침전지 성능 개선 연구)

  • Kim, Hey-Suk;Shin, Mi-Soo;Jang, Dong-Soon;Jung, Sung-Hee;Gang, Dong-Hyo
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.27 no.2
    • /
    • pp.177-183
    • /
    • 2005
  • The effluent quality is directly affected by the separation of biological solids in a final clarifier because the majority of discharged $BOD_5$ and SS are virtually dependent on the results of biological solids in the sedimentation tank effluent. If a final clarifier is effectively designed and operated, the desired goal of clarification for wastewater can be achieved together with the cost reduction in the treatment of wastewater. To this end flow characteristics and the removal efficiency of SS are numerically investigated especially by the change of the inlet position and the installation of baffle to improve the performance of a rectangular final clarifier. The 2-D computer program developed in a rectangular coordinates has been successfully validated against experimental residence time distribution(RTD) curves obtained by tracing radio-isotope. The lowering of the inlet position weakens the density current and induces the settling of SS in the front zone of a clarifier. Thus the decreased traveling distance of the sludge increases the removal efficiency of SS in the effluent. The inlet baffle installed in the front region of clarifier prevents the short circuiting flow and induces to flow into the dense underflow, which eventually improves the effluent quality. In the case of lower inlet position, however, installation of baffle results in degradation of effluent quality. Consequently it is strongly recommended that in-depth numerical study be performed in advance for optimizing a clarifier design and retrofitting to improve effluent quality in a final clarifier.

Development of a Sensor Data Service System for Telematics (텔레매틱스를 위한 센서 데이타 서비스 시스템 개발)

  • Jeon, Sang-Hun;Hong, Dong-Suk;Kim, Dong-Oh;Kim, Joung-Joon;Han, Ki-Joon
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 2005.11a
    • /
    • pp.141-146
    • /
    • 2005
  • 최근 들어 텔레매틱스 분야에서 자동차의 위치 및 상태를 감시하고 관리하기 위해 무선 센서 네트워크의 활용이 크게 확장되고 있다. 기존에는 위치, 속도, 온도와 같은 이 기종 플랫폼간의 센서 데이타 수집 및 운용을 위해 독립적인 어플리케이션을 사용하고 있으며, 그러한 데이타 교환과 통합을 위하여 많은 비용이 소요되었다. OGC(OpenGIS Consortium)에서는 이러한 문제를 해결하고자 Sensor Collection Service 구현 명세를 제안하였다. Sensor Collection Service 구현 명세는 센서 데이타에 대한 질의를 처리하기 위한 표준 인터페이스를 정의하고 있으며, 질의 결과로는 센서에 대한 정보 및 센서데이타를 반환하도록 정의하고 있다. 본 논문에서는 Sensor Collection Service 표준 인터페이스를 이용하여 센서로부터 획득된 위치 및 속도, 온도 등의 다양한 데이타에 웹을 통하여 접근할 수 있도록 센서 데이타 서비스 시스템을 설계 잊 구현하였다. 따라서 사용자들은 센서 데이타 서비스 시스템을 통하여 센서의 종류와 위치에 관계없이 웹 상에서 위치 및 속도, 온도 등과 같은 다양한 센서 데이타를 획득할 수 있으며 시스템간 데이타의 교환 및 통합이 가능하다. 또한, 사용자가 쉴게 검색 및 분석할 수 있도록 Sensor Collection Service 표준 인터페이스 질의를 통하여 획득된 데이타를 센서의 위치와 측정 시간에 기반하여 보여주고 있다. 본 시스템은 다양한 센서 데이타의 획득과 타 시스템과의 데이타 교환이 용이하므로 텔레매틱스, 위치 추적 시스템, 상태 감시 시스템 등 다양한 분야에 효과적인 도구로 활용될 수 있다.이루어졌다 가능한 창조 모델로 이용될 수 있을 것으로 생각된다.}94,\;29.4{\pm}30.3,\;45.1{\pm}44$로 Mel 10군과 Mel 30군이 유의적인 감소를 보였으나(p<0.05) 이들 두 군 간의 차이는 나타나지 않았다. 이상의 결과로, 랫트에서 복강수술 후 melatonin 10mg/kg투여가 복강 내 유착 방지에 효과적이라고 생각된다.-1}{\cdot}yr^{-1}$로서 두 생태계에 축적되었다.여한 3,5,7군에서 PUFA 함량이 증가한 반면, SFA 함량은 감소하여 P/S 비율, n-3P/n-6P 비율은 증가하는 경향이었으며 이는 간장의 인지질, 콜레스테롤 에스테르, 총 지질의 지방산조성에서도 같은 경향을 볼 수 있었다.X>$(C_{18:2})$와 n-3계 linolenic acid$(C_{18:3})$가 대부분을 차지하였다. 야생 돌복숭아 과육 중의 지방산 조성은 포화지방산이 16.74%, 단불포화지방산 17.51% 및 다불포화지방산이 65.73%의 함유 비율을 보였는데, 이 중 다불포화지방산인 n-6계 linoleic acid$(C_{18:2})$와 n-3계 linolenic acid$(C_{18:3})$가 지질 구성 총 지방산의 대부분을 차지하는 함유 비율을 나타내었다.했다. 하강하는 약 4일간의 기상변화가 자발성 기흉 발생에 영향을 미친다고 추론할 수 있었다. 향후 본 연구에서 추론된 기상변화와 기흉 발생과의 인과관계를 확인하고 좀 더 구체화하기 위한 연구가 필요할 것이다.게 이루어질 수 있을 것으로 기대된다.는 초과수익률이 상승하지만, 이후로는 감소하므로,

  • PDF

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF

The Simulation for the Organization of Fishing Vessel Control System in Fishing Ground (어장에 있어서의 어선관제시스템 구축을 위한 모의실험)

  • 배문기;신형일
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.36 no.3
    • /
    • pp.175-185
    • /
    • 2000
  • This paper described on a basic study to organize fishing vessel control system in order to control efficiently fishing vessel in Korean offshore. It was digitalized ARPA image on the fishing processing of a fleet of purse seiner in conducting fishing operation at Cheju offshore in Korea as a digital camera and then simulated by used VTMS. Futhermore, it was investigated on the application of FVTMS which can control efficiently fishing vessels in fishing ground. The results obtained were as follows ; (1) It was taken 16 minutes and 35 minutes to casting and hauling net in fishing processing respectively. The length of rope pulled by scout boat was 200m, tactical diameter in casting net was 340.8m, turning speed was 6kts as well. (2) The processing of casting and hauling net was moved to SW, NE as results of simulation when the current direction and speed set into NE, 2kts and SW, 2kts respectively. Such as these results suggest that can predict to control the fishing vessel previously with information of fishing ground, fishery and ship's maneuvering, etc. (3) The control range of VTMS radar used in simulation was about 16 miles. Although converting from a radar of the control vessel to another one, it was continuously acquired for the vector and the target data. The optimum control position could be determined by measuring and analyzing to distance and direction between the control vessel and the fleet of fishing vessel. (4) The FVTMS(fishing vessel traffic management services) model was suggested that fishing vessels received fishing conditions and safety navigation information can operate safely and efficiently.

  • PDF

Characterization of Fault Kinematics based on Paleoseismic Data in the Malbang area in the Central Part of the Ulsan Fault Zone (고지진학적 자료를 이용한 울산단층대 중부 말방지역에서의 단층운동 특성 해석)

  • Park, Kiwoong;Prasanajit, Naik Sambit;Gwon, Ohsang;Shin, Hyeon-Cho;Kim, Young-Seog
    • Journal of the Korean earth science society
    • /
    • v.43 no.1
    • /
    • pp.151-164
    • /
    • 2022
  • According to the records of historical and instrumental earthquakes, the southeastern part of the Korean Peninsula is considered the highest seismic activity area. Owing to recent reports of numerous Quaternary faults along the Yangsan and Ulsan fault zones, paleoseismological studies are being actively conducted in these areas. The study area is located in the central part of the Ulsan fault zone, where the largest number of active faults have been reported. Based on lineament and geomorphic analysis using LiDAR images and aerial photographs, fault-related landforms showing topographic relief were observed and a trench survey was conducted. The trench length 20 m, width 5 m, depth 5 m is located approximately 300 m away to the northeast from the previously reported Malbang fault. From the trench section, we interpreted the geometric and kinematic characteristics of the fault based on the deformed features of the Quaternary sedimentary layers. The attitude of the reverse fault, N26°W/33°NE, is similar to those of the reported faults distributed along the Ulsan fault zone. Although a single apparent displacement of approximately 40 cm has been observed, the true displacement could not be calculated due to the absence of the slickenline on the fault plane. Based on the geochronological results of the cryogenic structure proposed in a previous study, the most recent faulting event has been estimated as being earlier than the late Wurm glaciation. We interpreted the thrust fault system of the study area as an imbrication structure based on the previous studies and the fault geometry obtained in this additional trench. Although several previous investigations including many trench surveys have been conducted, they found limited success in obtaining the information on fault parameters, which could be due to complex characteristics of the reverse fault system. Additional paleoseismic studies will contribute to solving the mentioned problems and the comprehensive fault evolution.