• Title/Summary/Keyword: BIN 데이터

Search Result 487, Processing Time 0.027 seconds

A study on Zigbee Authentication Protocol Using System IDs in Environments of Smart Grid (스마트 그리드 환경에서 시스템 ID를 이용한 지그비 인증 프로토콜에 관한 연구)

  • Kim, Kyoung-Mok;Im, Song-Bin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.101-110
    • /
    • 2011
  • A smart grid networks delivers electricity from suppliers to consumers using digital technology with two-way communications to control appliances at consumers' homes to save energy, reduce cost and increase reliability and transparency. Security is critically important for smart grid networks that are usually used for the electric power network and IT environments that are opened to attacks, such as, eavesdroping, replay attacks of abnormal messages, forgery of the messages to name a few. ZigBee has emerged as a strong contender for smart grid networks. ZigBee is used for low data rate and low power wireless network applications. To deploy smart grid networks, the collected information requires protection from an adversary over the network in many cases. The security mechanism should be provided for collecting the information over the network. However, the ZigBee protocol has some security weaknesses. In this paper, these weaknesses are discussed and a method to improve security aspect of the ZigBee protocol is presented along with a comparison of the message complexity of the proposed security protocol with that of the current ZigBee protocol.

Experimental Study of Internal Distribution of Temperature and Relative Humidity in Notebook LCD Module (노트북용 액정 모듈 내부의 온도 및 상대 습도 변화에 관한 실험적 연구)

  • Kim, Tae-Woo;Kim, Gi-Bin;Lee, Jae-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.36 no.2
    • /
    • pp.217-221
    • /
    • 2012
  • As a part of basic research to improve screen quality, which deteriorates when strain occurs within optical sheets in LCD modules for laptop computers, a measurement system is needed to analyze the influence of heat and moisture, which are the main factors causing the strain. It is assumed that the existence of an air gap less of than 0.5 mm inside the LCD module causes humid air from outside to permeate through the module. To investigate this phenomenon, in this study a thin printed circuit board (PCB) of compact sensors that measure temperature and humidity is inserted into LCD modules, and thus, the changes in temperature and humidity can be analyzed in real time. The results can be used as basic data for simulation of the deformation behavior and structural design of LCD modules in the future.

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

A Study on Developing the Contents of Historical Education Using Social Network Analysis (사회연결망분석을 활용한 거대사 교육 콘텐츠 개발 방향 제안)

  • Yun, Hye-Jeong;Seo, Hee-Chang;Park, Eun-Soo;Lee, Yoon-Sun;Kim, Jae-Jun;Lee, Hee-Soo;Lim, Seong-Bin;Lee, Tai-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.6
    • /
    • pp.606-615
    • /
    • 2015
  • This study aims to provide suggestions for the development of educational contents on historical events that can solve the existing curriculum's problems, such as the disproportionate weight given to Western historical events. The study focuses on content ranging from the start of the Agricultural Revolution (7000 BC.) to the start of the Industrial Revolution (AD. 1760). The results are as follows. We used the Delphi technique for deriving global historical events. Among them, 56 historical events were selected as the data for Social Network Analysis (SNA). The results of SNA showed that topics related to Civilization has a high priority. In addition, the results of a coagulation analysis showed the events can be divided into seven groups. The classification criteria is different from the criteria used for the current period. We expect that the suggested framework developed for historical contents will constitute a new approach to historical interpretation through network visualization and linkage analysis.

A Study on the U-City Information Characterization for the Effective Information Management (효율적 정보관리를 위한 U-City 정보 특성분석에 관한 연구)

  • Ahn, Jong-Wook;Shin, Dong-Bin;Kim, Jung-Hoon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.1
    • /
    • pp.119-127
    • /
    • 2010
  • In this study, U-City to effectively manage information as a basis for studies of U-City Info characteristics were analyzed. U-City services are currently being discussed which is about 228. Short-term possibility of applying these services, the service's practicality and availability of services based on public services analyzed, 39 were selected. Next, the selected U-City to target services to analyze the flow of information and analysis based on the characteristics of U-City information was derived. U-City information derived from this study, the characteristics of real-time information, and service-specific mandatory and optional information, melting complex information, dynamic information, large amounts of data, user-customized information, and information security vulnerabilities, revealing personal information and privacy is. The results of this study, governments and municipalities to promote the construction of the U-City can be used effectively. To do so, considering the characteristics of U-City information, information management standards should be established.

Development of a Verification and Certification Method of Green Infrastructure and Low Impact Development Technologies (그린인프라 및 저영향개발 기술의 검증 및 인증 기법 개발)

  • Shin, Hyun Suk;Park, Jong Bin;Lee, Jae Hyuk
    • Ecology and Resilient Infrastructure
    • /
    • v.3 no.2
    • /
    • pp.92-99
    • /
    • 2016
  • This study developed a verification and certification method of technologies of green infrastructure (GI) and low impact development (LID) that gained interest recently. The outdoor testbed used in this study consisted of a building type, a road type, a parking lot type, a rain garden type and a bioretention type. Indoor test facilities were ready for testing using hydrology efficient analysis, pavement and soil analysis and water environment analysis. The development of outdoor and indoor test facilities were used to certify the efficiency of GI & LID technologies, and this was expected to contribute to the activation of the related projects by providing reliable data for the application of GI & LID techniques.

Study on Assumptions for Fractional Ages in Life Insurance (생명보험에서 수명분포 단수부분에 대한 가정에 관한 연구)

  • Lee, Soo-Bin;Cha, Ji-Hwan
    • The Korean Journal of Applied Statistics
    • /
    • v.25 no.1
    • /
    • pp.1-13
    • /
    • 2012
  • An assumption for fractional ages should be made to obtain the net premium of the whole life insurance payable at the moment of death based on the life table. Most existing studies adopt the assumption of the uniform distribution(UDD) for the fractional ages. However, as seasonal changes may frequently lead to the deaths of elderly people, it is questionable whether the assumption of the uniform distribution is the most appropriate one for the entire age intervals. In this article, based on a real mortality data set, the appropriateness of UDD assumption for the entire age intervals is examined. And then we propose a more suitable model for fractional ages. We analyze the effect of UDD assumption through the net premium and the corresponding risk when the true distribution for the fractional ages is not uniform.

Automatic Image-to-Image Registration of Middle- and Low-resolution Satellite Images Using Scale-Invariant Feature Transform Technique (SIFT 기법을 이용한 중.저해상도 위성영상간의 자동 기하보정)

  • Han, Dong-Yeob;Kim, Dae-Sung;Lee, Jae-Bin;Oh, Jae-Hong;Kim, Yong-Il
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.24 no.5
    • /
    • pp.409-416
    • /
    • 2006
  • To use image data obtained from different sensors and different techniques, the preprocessing step that registers them in a common coordinate system is needed. For this purpose, we developed the methodology to register middle- and low-resolution satellite images automatically. Firstly, candidate matching points were extracted using the Harris and Harris-affine algorithm. Secondly, we used the correlation coefficient, normalized correlation coefficient and SIFT algorithm to detect conjugate matching points from candidates. Then, to test the feasibility of approaches, we applied the developed methodology to various kinds of satellite images and compared results. The results clearly demonstrate that the methology using the SIFT is appropriate to register these multi-resolution satellite images automatically, compared with the classical cross-correlation.

A Study on Corrosion Product Behavior Prediction for Domestic PWR Primary System by using CRUDTRAN (CRUDTRAN을 이용한 국내 PWR 1차계통내 부식생성물 거동예측에 관한 연구)

  • Song, Jong Soon;Yoon, Tae-Bin;Lee, Sang-Heon
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.13 no.4
    • /
    • pp.253-262
    • /
    • 2015
  • Radionuclide deposited on the surface of several internal and external systems in a nuclear power plant is created by the activation of corrosion products from nuclear reactor structural materials and fission products. Especially, the constant contact between water and the surface corrodes the inside where primary system makes coolants and corrosion products mixed. Also, these are circulated along the systems. For comparing models, CRUDTRAN, DISER, MIGA-RT and CPAIR codes are analyzed to predict the quantity of radionuclide and corrosion product of primary reactor that are used at the stage of designing. The corrosion products behavior of domestic PWR primary system was predicted by using CRUDTRAN. This study aims to increase the reliability of corrosion product evaluation model by comparing the actual values and calculated values with the data of a Westing House-type Nuclear Power Plant.