• Title/Summary/Keyword: Digital ID

Search Result 212, Processing Time 0.025 seconds

A Designing Method of Digital Forensic Snort Application Model (Snort 침입탐지 구조를 활용한 디지털 Forensic 응용모델 설계방법)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.1-9
    • /
    • 2010
  • Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and approximately 300,000 registered users. Snort identifies network indicators by inspecting network packets in transmission. A process on a host's machine usually generates these network indicators. This means whatever the snort signature matches the packet, that same signature must be in memory for some period (possibly micro seconds) of time. Finally, investigate some security issues that you should consider when running a Snort system. Paper coverage includes: How an IDS Works, Where Snort fits, Snort system requirements, Exploring Snort's features, Using Snort on your network, Snort and your network architecture, security considerations with snort under digital forensic windows environment.

Development of ADWHM(Advanced Digital Watt-Hour Meter) for Remote Management of Distribution Systems (배전원격관리를 위한 차세대 디지털 적산전력계 개발)

  • 고윤석;윤상문;서성진;강태규
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.6
    • /
    • pp.316-323
    • /
    • 2004
  • This paper develops an ADWHM(Advanced Digital Watt-Hour Meter) which integrates and implements the voltage management data record function and the load management data record function in the electronic watt-hour meter. ADWHM is developed based on PIC16F874 which is 8bit micro-controller of RISK type for the easy of programing and maintenance, and electronic power signal processing module is located at front of it to reduce the computing load of processor. Also, a 16kbyte EEPROM is used to record the voltage management data and load management data for a week as well as watt-hour data and USART communication mode is used to transfer data from ADWHM to PC. The accuracy of the voltage and unt measuring for ADWHM is verified by identifying the LCD display values of the ADWHM after the voltage signals of id levels from digital function generator is applied to PT(Potential Transformer) and CT(Current Transformer) output under state which it is separated from real power line. On the its basic functions such as watt-hour data recording function, voltage management data recording function and load management data recording function was verified by showing data for three days among the collected data to PC by RS232C communication from ADWHM which was connected to real power lines for a week.

A Literature Study on Digital Currency and Historical Developments of Money: Dynamic Pattern in Currency, Central Bank Digital Currency and Libra (디지털화폐와 화폐 변천과정에 관한 문헌적 연구: 동적패턴, CBDC, 리브라를 중심으로)

  • Kim, Euiseok
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.109-126
    • /
    • 2020
  • This study attempts to find out the characteristics of digital currency and currency transformation through the analytical descriptions of the literature. In the early days of the emergence of new currency, market-oriented autonomous monetary adjustment was made along with various attempts by the private sector, and then government-centered central currency management and coordination were made for the national monopoly of profits and power. Digital currency can be seen as the emergence of a new form of money that will bring about paradigm changes. CBDC can be divided into direct and indirect types. CBDC is expected to require a strategic approach by the government or firm as it will bring about changes in the ecosystem of related industries. Libra is a stablecoin designed to minimize price fluctuations, and if it succeeds in commercializing it, it is expected to bring about revolutionary changes in the financial industry around the world.

Development of Integrated Public Address System for Intelligent Building (지능형 빌딩을 위한 디지털 통합 전관 방송 시스템 개발)

  • Kim, Jung-Sook;Song, Chee-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.2
    • /
    • pp.212-217
    • /
    • 2011
  • In this paper, we developed an intelligent minimized integrated digital public address which can provide context awareness of various events occurring in future intelligent buildings. It is able to recognize both voices and sounds, such as a fire bell and a disaster bell, which signal to escape in emergence situations and it can sense information which is sent from various sensors, for example, the inner temperature, humidity, and environment status in an intelligent building. Also, the intelligent digital integrated public address can broadcast information to individual places, according to context awareness that is from sensing information, by using network with an ID. And we are developing a minimized integrated digital public address system that has facilities such as external input, Mic., CD, MP3 and Radio. Developing an integrated digital public address system with operational MICOM will make it possible to control the facilities of digital devices centrally. The operational MICOM is composed of 3 layers which are a control layer, a processing layer and a user interface layer.

A Study on the patterns of land use change based on the digital parcels (필지중심 토지이용변화패튼엔 관한 연구)

  • 김정훈
    • Spatial Information Research
    • /
    • v.10 no.1
    • /
    • pp.153-164
    • /
    • 2002
  • This used a new method to capture the neighbouring relationship among parcels. To define the neighbouring relationship, all the surrounding parcels in the study area can be identified as neighbours of the current parcel as long as they touch each other even at a point. To examine neighbouring parcels on all polygons of the study area, this study used ArcViews avenue programming which visited each polygon in turn and produced an outfile containing the parcel record ID and the contents of each of the adjacent parcels. The second thing is to translate the record IDs of neighbouring parcels into land use. For this, this study used the Lookup function in Excel to obtain neighbouring land use. To deal with how to calculate the ratio of each land use to neighbouring land uses, this study used Visual Basic. finally, this study considered a term of neighbour land use as the ratio of the number of urban use adjacent parcels to the total number of adjacent parcels. This study shows that GIS and spatial analysis can be applied to land use change in the urban fringe area at a very detailed level using municipal parcel data which occupies about 80% of administrative affairs, especially at the local government level in Korea. The results of analysis can be useful for local government to understand its situation and to manage land use efficiently in the urban fringe. The methodology developed in this study is especially useful for an empirical approach.

  • PDF

RMCS Plan and the Embodiment for the Home Network Service which is Safeent (안전한 Home Network 서비스를 위한 RMCS 설계 및 구현)

  • Sun, Jae-Hoon;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.19-27
    • /
    • 2005
  • As home network is increasing to use, home network industry is developing too. Also, it is to be a popular subject in the network's topics. In this reasons, home network become a important thing because home gateway function is working between access network and home network. In the home network, it relates on the personal computer, home pad, and digital television. But, home gateway is not prepared standard point about techniques. Therefore, many kind of technique want to try for developing of home gateway's functions. Usually, we use ID/PASSWORD method in network control system. But, we found a lot of problems about classical network system while we experienced Jan/25 big trouble. We are considering about that home network system are using same network net. Therefore, seriously we have to check about security and safety at the home network's environment. This report focus on the home network's environment to control for using and efficiency and then it wants to find ways to protect from the internal and external attacks. Existing ID/PASSWORD method it used a electronic signature and the security against the approach from of external watch, the MIB structure of role base and the security of the Home network which leads the authority control which is safe even from the Home network inside it strengthened it used compared to it proposed.

  • PDF

A Study on the Droplet Formation of Liquid Metal in Water-Mercury System as a Surrogate of Molten Salt-Liquid Metal System at Room Temperature (용융염-액체금속 계의 대용물인 물-수은 계에서 액체금속 액적의 생성에 대한 연구)

  • Kim, Yong-il;Park, Byung Gi
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.16 no.2
    • /
    • pp.165-172
    • /
    • 2018
  • As an approach for estimation of the droplet size in the molten salt-liquid metal extraction process, a droplet formation experiment at room temperature was conducted to evaluate the applicability of the Scheele-Meister model with water-mercury system as a surrogate that is similar to the molten salt-liquid metal system. In the experiment, droplets were formed through the nozzle and the droplet size was measured using a digital camera and image analysis software. As nozzles, commercially available needles with inner diameters (ID) of 0.018 cm and 0.025 cm and self-fabricated nozzles with 3-holes (ID: 0.0135 cm), 4-holes (ID: 0.0135 cm), and 2-holes (ID: 0.0148 cm) were used. The mercury penetration lengths in the nozzles were 1.3 cm for the needles and 0.5 cm for the self-fabricated nozzles. The droplets formed from each nozzle maintained stable spherical shape up to 20 cm below the nozzle. The droplet size measurements were within a 10% error range when compared to the Scheele-Meister model estimates. The experimental results show that the Scheele-Meister model for droplet size estimation can be applied to nozzles that stably form droplets in a water-mercury system.

An Interpretive Approach to Conflicts Appeared in the Process towards National Electronic Identification Card System (전자주민카드 추진과정에서 나타난 갈등에 관한 소고)

  • Kim, Yong-Mi
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.177-184
    • /
    • 2012
  • It was emphasized that national electronic identification card system should be a prerequisite for the entire administrative services. Furthermore, the government so designed the plan on the assumption of national electronic identification card system that it could manage services for the public, elections, and most of decision-making processes. Nevertheless, national electronic identification card system has drifted for a fairly long time without being institutionalized. On the basis of the policy examples, this study tries to examine the process and discuss on what elements of conflict have been shown. Though it is all water under the bridge, it is thought that, when the new policy emerges in the future, recurrent failures can be reduced by a case study like this.

Development of E.C.G. Telemetry System Using Digital Communication Method (디지탈 통신방식을 이용한 심전도 텔레메트리 시스템의 개발)

  • 이준하;이상학;신현진;유동수;서희돈;박정연
    • Progress in Medical Physics
    • /
    • v.5 no.2
    • /
    • pp.27-34
    • /
    • 1994
  • In this study, we developed E.C.G telemetry system by using a digital communication method. This system is composed of a number of Ambulatory Telemetry System(ATS)'s that use for the same frequency and one center monitoring system(CMS) utilized the personal computer. The purpose of the ATS is, Therefore, to present for acqusition ECG data and transmitting to CMS. The ATS hardware is based on one chip microprocessor (8096) included A/D convert, ECG pre amplifier, ID-decoder, TRX Gateway and FM TRX module. Using the PC can be convinet to processing and deposite for long terms continued patient data.

  • PDF

A Digital Watermarking Algorithm Using PIM and 2D Barcode (PIM과 2D 바코드를 이용한 워터마킹 알고리즘)

  • Han Su-Young;Kim Hong-Ryul;Lee Kee-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.103-108
    • /
    • 2005
  • In this Paper, we proposed a novel robust watermarking technique using PIM and 2D barcode for the copyright of the digital images. Because human is impervious to the change in the complex area, the embedding watermark to the selected coefficients using PIM enhances invisibility. A 2D barcode image is used for watermark in this research. The 2D barcode contains more information than conventional ID barcode and includes the error correction algorithm. Therefore the watermarking algorithm using 2D barcode enhances the robustness of watermark. From the experimental results , the proposed algorithm shows better invisibility and robustness performance in a general signal Processing such as JPEG and SPIHT lossy compression.

  • PDF