• Title/Summary/Keyword: Automation, Security

Search Result 231, Processing Time 0.023 seconds

A Study on Living Space with the Internet Information Appliances (인터넷 정보가전을 활용한 주거공간 연구)

  • 전흥수;김주연
    • Korean Institute of Interior Design Journal
    • /
    • no.28
    • /
    • pp.44-50
    • /
    • 2001
  • This study propose the new concept of residence by analyzing the change of residence through the characteristic of popularity and degree of development of technology on home network information appliance for intelligent home. Accordingly, Cyber village represented as home automation and extend to information of society. it encourage need of information and multimedia of home. It expect home information infrastructure for accepting informations, which make smart home to linked home-working home-learning home-treatment. home-shopping and home-banking. The system of intelligent home is the intelligence of human-biology in the side of environmental friendly and multi-function. it distinguish the system of security, controlling system of inside environment, supporting system of house-working, automatic controlling, house working. Future house require to meet demand of young generation, such as small residental space, the multi-functional space, the flexible space, making mood for dual income couple and of single as intelligent home. Accordingly, basic purpose which are pleasantness, the safe and the convenience the mobile multi-function as well as networking with controlling of temperature, security, health-test, home-entertainment, home-office and consider environment together.

  • PDF

Design and Implementation of the Security Solution using Android Application (안드로이드 애플리케이션을 이용한 보안 솔루션의 설계 및 구현)

  • Park, Jong-Chang;Park, Geon-Yong;Jeong, Hwi-Woon;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2013.01a
    • /
    • pp.263-264
    • /
    • 2013
  • 본 연구에서는 기존의 홈오토메이션 보안 솔루션에서 더욱 기능이 확장된 보안솔루션 설계 및 구현하였다. 구현된 안드로이드 기반의 애플리케이션은 스마트폰으로 서버와의 통신을 통해 CCTV에서 촬영된 영상을 원격지에서 직접 확인 할 수 있고, 사용자는 사용에 친숙한 안드로이드 애플리케이션을 통해 CCTV의 방향을 제어함으로써 기존의 보안솔루션에 비해 보다 효과적인 보안성을 제공한다.

  • PDF

A Study of security improvements to access in port (Focus on Container Terminal) (항만보안 출입통제에 관한 연구 및 개선점 고찰 (컨테이너 터미널 중심으로))

  • Kwak, Kyu-Seok;Nam, Ki-Chan;Jeong, Su-Cheon;Min, Se-Hong;Park, Seung-Jae
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.205-206
    • /
    • 2014
  • 세계화의 진전 및 시장 개방의 가속화로 인해 국내외 항만물류산업의 중요성이 높아지고 있다. 우리나라는 항만의 경쟁에서 살아남기 위해 첨단기술을 적용한 무인 자동화 컨테이너 터미널의 구축 등을 통해 생산성, 경제성, 보안성 및 서비스 수준을 향상을 위해 연구 하고 있다. 하지만 컨테이너터미널 내부 효율 및 생산성을 향상시키는 연구가 대부분이며 보안업무 등을 처리하는 연구는 미흡한 실정이다. 컨테이너 터미널 보안의 중요성은 갈수록 중요 ${\cdot}{\cdot}$(중략)${\cdots}{\cdot}$.

  • PDF

Hierarchical Identity-Based Encryption with Constant-Size Private Keys

  • Zhang, Leyou;Wu, Qing;Hu, Yupu
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.142-145
    • /
    • 2012
  • The main challenge at present in constructing hierarchical identity-based encryption (HIBE) is to solve the trade-off between private-key size and ciphertext size. At least one private-key size or ciphertext size in the existing schemes must rely on the hierarchy depth. In this letter, a new hierarchical computing technique is introduced to HIBE. Unlike others, the proposed scheme, which consists of only two group elements, achieves constant-size private keys. In addition, the ciphertext consists of just three group elements, regardless of the hierarchy depth. To the best of our knowledge, it is the first efficient scheme where both ciphertexts and private keys achieve O(1)-size, which is the best trade-off between private-key size and ciphertext size at present. We also give the security proof in the selective-identity model.

Secure Information Sharing Model in P2P: IAA based Approach (P2P에서의 안전한 정보 공유 모델 : IAA 기반 접근방식)

  • 진홍태;김동성;박종서
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.443-446
    • /
    • 2003
  • 본 논문에서는 P2P(Peer-to-Peer) 환경에서 효율적이고 안전하게 정보를 공유할 수 있는 시스템 구조를 제안한다. 기존의 Server-Client 환경에 비해 P2P 환경이 네트워크를 확장시키고 병목 현상을 줄일 수 있는 방안으로 떠오르게 됨에 따라 그에 따른 보안문제도 필수적으로 고려해야 할 사항이 되었다. 따라서 P2P 환경에서도 안전하게 정보를 공유할 수 있고, 각 Peer들의 정보를 보호해 줄 수 있는 보안 기술이 필요하다. 본 논문에서 제안하는 시스템은 IAA(Intelligent Automation Agent)를 이용한 접근방식을 제공함으로서, 다른 시스템에 응용 가능하고 보안 환경의 변화에 민첩하게 유기적으로 대처할 수 있는 통합된 관리 방법을 제시한다.

  • PDF

EFFICIENT OPEN SOURCE DISTRIBUTED ERP SYSTEM FOR LARGE SCALE ENTERPRISE

  • ELMASSRY, MOHAMED;AL-AHAMADI, SAAD
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.280-292
    • /
    • 2021
  • Enterprise Resource Planning (ERP) is a software that manages and automate the internal processes of an organization. Process speed and quality can be increased, and cost reduced by process automation. Odoo is an open source ERP platform including more than 15000 apps. ERP systems such as Odoo are all-in-one management systems. Odoo can be suitable for small and medium organizations, but duo to efficiency limitations, Odoo is not suitable for the large ones. Furthermore, Odoo can be implemented on both local or public servers in which each has some advantages and disadvantages such as; the speed of internet, synced data or anywhere access. In many cases, there is a persistent need to have more than one synchronized Odoo instance in several physical places. We modified Odoo to support this kind of requirements and improve its efficiency by replacing its standard database with a distributed one, namely CockroachDB.

Secret Key and Tag Generation for IIoT Systems Based on Edge Computing

  • Koh, Giheon;Yu, Heungsik;Kim, Sungun
    • Journal of Multimedia Information System
    • /
    • v.8 no.1
    • /
    • pp.57-60
    • /
    • 2021
  • Industry 4.0 is continuous automation by applying the latest smart technologies to traditional manufacturing industries. It means that large-scale M2M (Machine-to-Machine) communication and IoT (Internet of Things) technologies are well integrated to build efficient production systems by analyzing and diagnosing various issues without human intervention. Edge computing is widely used for M2M services that handle real-time interactions between devices at industrial machinery tool sites. Here, secure data transmission is required while interacting. Thus, this paper focused on a method of creating and maintaining secret key and security tag used for message authentication between end-devices and edge-device.

Design and Implementation of a Secure Smart Home with a Residential Gateway

  • Kim, Sang-kon;Kim, Tae-kon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.9-17
    • /
    • 2022
  • In this paper, we propose a secure smart home network model and a novel cryptographic protocol called the Smart Home Security Protocol (SHSP). Authentication, key distribution, and encryption functions are properly supported in order to make a smart home secure, and a residential gateway (RG) plays a central role in performing these functions. According to the characteristics of networks and attached devices, we classify smart homes into three different types of sub-networks and these networks are interconnected with one another by the RG. Depending on a sub-network, we use different types of secure schemes to reduce the burden of the process and the delay in devices while it provides proper security functions. The proposed secure smart home model is implemented and verified by using a variety of embedded system environments.

Automatic Gesture Recognition for Human-Machine Interaction: An Overview

  • Nataliia, Konkina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.129-138
    • /
    • 2022
  • With the increasing reliance of computing systems in our everyday life, there is always a constant need to improve the ways users can interact with such systems in a more natural, effective, and convenient way. In the initial computing revolution, the interaction between the humans and machines have been limited. The machines were not necessarily meant to be intelligent. This begged for the need to develop systems that could automatically identify and interpret our actions. Automatic gesture recognition is one of the popular methods users can control systems with their gestures. This includes various kinds of tracking including the whole body, hands, head, face, etc. We also touch upon a different line of work including Brain-Computer Interface (BCI), Electromyography (EMG) as potential additions to the gesture recognition regime. In this work, we present an overview of several applications of automated gesture recognition systems and a brief look at the popular methods employed.

A Methodology of Automated Analysis and Qualitative Assessment of Legislation and Court Decisions

  • Trofimov, Egor;Metsker, Oleg;Kopanitsa, Georgy
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.229-235
    • /
    • 2022
  • This study aims to substantiate an interdisciplinary methodology for automated analysis and qualitative assessment of legislation and court decisions. The development of this kind of methodology will make it possible to fill a number of methodological gaps in various research areas, including law effectiveness assessment and legal monitoring. We have defined a methodology based on the interdisciplinary principles and tools. In general, it should be noted that even at the level of qualitative assessment made with the use of the methodology described above, the accumulation of knowledge about the relationship between legal objectives, indicators and computer methods of their identification can reduce the role of expert knowledge and subjective factor in the process of assessment, planning, forecasting and control over the state of legislation and law enforcement. Automation of intellectual processes becomes inevitable in a digital society, but, releasing experts from routine work, simultaneously reorients it to development of interdisciplinary methods and control over their application.