• Title/Summary/Keyword: Electronic Security(System)

Search Result 847, Processing Time 0.03 seconds

Random Vibration Analysis of Portable Power Supply Container for Radar With U.S. Military Standards (미 군사규격을 적용한 레이더 전력공급용 이동식 컨테이너의 Random Vibration 해석)

  • Do, Jae-Seok;Hur, Jang-Wook
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.21 no.9
    • /
    • pp.71-77
    • /
    • 2022
  • In times of war or emergencies, weapon systems, such as radars, must receive stable power. This can be achieved using improved onboard portable power systems made of steel containers. However, a breakdown can occur in the event of random vibration during transportation via a vehicle or train. Electrical-power shortages or restrictions pose a significant threat to security. In this study, Composite Wheeled Vehicle(CWV) data and rail cargo data with Acceleration Spectral Density(ASD), specified in MIL-STD-810H METHOD 514.8, were interpreted as input data of the three-axis random vibration method using ANSYS 19.2. Modal analysis was performed up to 500 Hz, and deformations in modes 1 to 117 were calculated to utilize all ASD data. The maximum equivalent stress in the three-axis direction was obtained using a random vibration analysis. Similarly, the margin of safety was calculated using the derived equivalent stress and material properties. Overall, the analysis verified that the portable container designed for the power supply system satisfied the required vibration demands.

Privacy Information Protection Applying Digital Holography to Blockchain

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.6 no.5
    • /
    • pp.453-462
    • /
    • 2022
  • Blockchain technology provides a decentralized and peer-to-peer network, which has the advantages of transparency and immutability. In this paper, a novel secure authentication scheme applying digital holography to blockchain technology is proposed to protect privacy information in network nodes. The transactional information of the node is chained permanently and immutably in the blockchain to ensure network security. By designing a novel two-dimensional (2D) array data structure of the block, a proof of work (PoW) in the blockchain is executed through digital holography technology to verify true authentication and legal block linkage. A hash generated from the proposed algorithm reveals a random number of 2D array data. The real identity of each node in the network cannot be forged by a hacker's tampering because the privacy information of the node is encrypted using digital holography and stored in the blockchain. The reliability and feasibility of the proposed scheme are analyzed with the help of the research results, which evaluate the effectiveness of the proposed method. Forgery by a malicious node is impossible with the proposed method by rejecting a tampered transaction. The principal application is a secure anonymity system guaranteeing privacy information protection for handling of large information.

A Study on Fault Diagnosis for Planar Active Phased Array Antenna (평면 능동위상배열안테나 결함소자 진단방법에 관한 연구)

  • Jin-Woo Jung;Seung-Ho Kang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.1
    • /
    • pp.11-22
    • /
    • 2023
  • A radiating elements fault diagnosis method with simplified radiation pattern measurement procedure was presented for planar active phased array antenna system. For presenting the mentioned method, the technique for linear approximation based on the radiation characteristics of a planar array configuration and a technique for solving a unique solution problem that occur in process of diagnosing a fault in a radiating elements were presented. Based on the presented method and a genetic algorithm, experimental simulations were performed for radiating element defect diagnosis according to various planar active phased array antenna configurations. As a result, it was confirmed that the presented radiating element fault diagnosis method can be smoothly applied to planar active phased antennas having various configurations.

Three channel Skin-Detection Algorithm for considering all constituent in YCbCr color space (YCbCr 색 좌표계의 모든 요소를 고려한 3-channel 피부 검출 알고리즘)

  • Shin, Sun-Mi;Im, Jeong-Uk;Jang, Won-Woo;Kwak, Boo-Dong;Kang, Bong-Soon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.127-130
    • /
    • 2007
  • Skin detection research is important role in the 3G of mobile phone for video telephony and security system by using face recognition. We propose skin detection algorithm as preprocessing to the face recognition, and use YCbCr color space. In existing skin detection algorithm using CbCr, skin colors that is brightened by camera flash or sunlight at outdoor in images doesn't acknowledged the skin region. In order to detect skin region accuracy into any circumstance, this paper proposes 3-channel skin detection algorithm.

  • PDF

Cable Effect Analysis Inside an Electrically Large Structure from an External Electromagnetic Waves (전자파에 의한 대형구조물 내부 케이블 영향 해석)

  • Lee, Jae-Min;Yoon, Seong-Sik;Lee, Jae-Wook;Han, Jung-Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.2
    • /
    • pp.155-158
    • /
    • 2017
  • With the help of technical development in the electronic industries, the electronic devices employing the cutting-edged technology are spread in all the area requiring electromagnetic communications. Especially, because of the presence of electronic devices in a variety of research fields like automotive vehicle, train, and aircraft, the research area such as the malfunction and critical damage of the internal system and microwave devices due to the unexpected radiated high-powered EM effects are very important even for the possible occurrence of human damage. In this paper, the effects of electromagnetic fields into the cable connecting the electronic devices and many sensors inside the target structure is treated because of potential malfunction or hardware disorders. In addition, correlation function and transmission line theory have been employed for the analysis of the induced current on the cable inside an electrically large resonant structure.

Anonymous Blockchain Voting Model using the Master Node Network (마스터 노드 네트워크를 사용한 블록체인 익명 투표 모델)

  • Cho, Jae-Han;Lee, Lee-Sub;Choi, Chang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.394-402
    • /
    • 2021
  • Electronic voting systems have been widely used in many countries around the world since the mid-1990s. In recent years, studies have applied blockchain to existing electronic voting systems in order to provide reliability, fairness, and transparency for voters. This approach is highly useful as a technology that promotes decentralized citizen participation. However, the existing electronic voting systems using blockchain have not sufficiently considered anonymity. Lack of anonymity acts as an important constraint in cases of small- and medium-sized voting, which is often required in decentralized citizen participation. In this study, we propose a model that provides anonymity to a voting system using blockchain by applying the concept of the master node in Dash cryptocurrency. First, we define the differences in the requirements of the transfer and voting systems in blockchain. We propose a parallel and autonomous model and algorithm to provide anonymity in the blockchain-that is, a decentralized development environment. In addition, a discussion of security and the environment for the proposed model is described.

PDF Publication Solution based on Web (웹을 기반으로 한 PDF 출판 솔류션에 관한 연구)

  • Lee Jae-Deuk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.2
    • /
    • pp.109-116
    • /
    • 2005
  • In the previous C/S publishing system, the editor or contributor can arbitrarily modify the document created by the author, in which case it is difficult to identify the changes made in the document. Another shortcoming is in that when the document is in need of tracking or editing, the client must have the respective editing system. To solve this problem, the gist of the document must be preserved along with the document itself, and the process of handling the document must be standardized. Publishing on the web ensures a more stable and accurate result in processing documents. The significance of web publishing is made clear, when we consider the importance of information per se and the growing demand for immediate publication in the present day. The need for a simple and straightforward apache-based PDF publishing system, in which HTML and CSS are supported, and a converting engine provides PDF standard security application support, is prominent. This provides a library in which one can directly create a PDF via Windows, Linux, or Unix without having to rely on a client, allowing high-speed PDF creation. The development of a web-accessed PDF converting engine forms the basis for e-transactions, online brochures, electronic B/L, and many other industrial sectors.

The Trustable Billing System for Mobile Internet (무선 인터넷에서 신뢰할 수 있는 과금 시스템)

  • 장석철;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.3
    • /
    • pp.298-306
    • /
    • 2002
  • As the mobile communication related services are becoming popular, the payment issues on charging for the content services are getting more and more attention. Many contents providers are having difficulties for correctly charging services they provide, because they do not have appropriate payment systems yet. There are also the privacy protection issues, security problems that arise during transactions, and the authentication issues for both the user and the business, to be taken care of. In this paper, the billing system in the mobile internet environment will be discussed. Topics related to the key distribution for exchanging data, and the authentication mechanism for communications will be discussed. Based on this, a trustworthy billing system will be proposed.

  • PDF

Discrete-Time Gaussian Interfere-Relay Channel

  • Moon, Kiryang;Yoo, Do-Sik;Oh, Seong-Jun
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.299-310
    • /
    • 2016
  • In practical wireless relay communication systems, non-destination nodes are assumed to be idle not receiving signals while the relay sends messages to a particular destination node, which results in reduced bandwidth efficiency. To improve the bandwidth efficiency, we relax the idle assumption of non-destination nodes and assume that non-destination nodes may receive signals from sources. We note that the message relayed to a particular node in such a system gives rise to interference to other nodes. To study such a more general relay system, we consider, in this paper, a relay system in which the relay first listens to the source, then routes the source message to the destination, and finally produces interference to the destination in sending messages for other systems. We obtain capacity upper and lower bounds and study the optimal method to deal with the interference as well as the optimal routing schemes. From analytic results obtained, we find the conditions on which the direct transmission provides higher transmission rate. Next, we find the conditions, by numerical evaluation of the theoretical results, on which it is better for the destination to cancel and decode the interference. Also we find the optimal source power allocation scheme that achieves the lower bound depending on various channel conditions. We believe that the results provided in this paper will provide useful insights to system designers in strategically choosing the optimal routing algorithms depending on the channel conditions.

Performance Analysis of a Satellite Communication System based on IPsec VPN (IPsec VPN 기반 위성 통신 시스템 성능 분석)

  • Jeong, Won-Ho;Hwang, Lan-Mi;Kim, Ki-Hong;Park, Sang-Hyun;Yang, Sang-Woon;Lim, Jeong-Seok;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.53-60
    • /
    • 2015
  • Satellite signal is excellent broadband, can provide the same information in a wide range, but there is a disadvantage that much less of the security level of the data. Therefore, supplementation of safety is a serious problem than anything in the satellite communication. In this paper, it was simulated by applying ARIA in encryption technique and by applying transport mode, tunnel mode in security header AH and ESP in order to examine the effect of IPsec VPN. In addition, we had compare with general services that do not apply encryption in order to analyze the impact of the encryption algorithm. Channel, by applying the Markov channel and adding AWGN, is constituted a satellite communication environment. In case of retransmission based error control scheme, we applied Type-II HARQ scheme and Type-III HARQ scheme which are performance is a good way in recently, and it is constituted by a turbo code and BPSK modulation scheme. we were analyzed performance in BER and Throughput in order to compare the simulation more effectively.