• Title/Summary/Keyword: Identification Code

Search Result 345, Processing Time 0.024 seconds

Threats according to the Type of Software Updates and White-List Construction Scheme for Advanced Security (소프트웨어 업데이트 유형별 위협요소와 안전성 강화를 위한 화이트리스트 구성 방안)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1369-1374
    • /
    • 2014
  • In case of APT attacks, the update server is being used as a means of dissemination, the update program is running malicious code or data in applications such as anti-virus signature is vulnerable to manipulation, SW Update threat identification and prevention measures are urgently required. This paper presents a natiional and international SW update structure, update process exploits and response measures to examine, Through the extraction/analysis of a domestic famous SW update log, we are willing to select the necessary component of the normal program update to identify a white list.

A Transparent Logic Circuit for RFID Tag in a-IGZO TFT Technology

  • Yang, Byung-Do;Oh, Jae-Mun;Kang, Hyeong-Ju;Park, Sang-Hee;Hwang, Chi-Sun;Ryu, Min Ki;Pi, Jae-Eun
    • ETRI Journal
    • /
    • v.35 no.4
    • /
    • pp.610-616
    • /
    • 2013
  • This paper proposes a transparent logic circuit for radio frequency identification (RFID) tags in amorphous indium-gallium-zinc-oxide (a-IGZO) thin-film transistor (TFT) technology. The RFID logic circuit generates 16-bit code programmed in read-only memory. All circuits are implemented in a pseudo-CMOS logic style using transparent a-IGZO TFTs. The transmittance degradation due to the transparent RFID logic chip is 2.5% to 8% in a 300-nm to 800-nm wavelength. The RFID logic chip generates Manchester-encoded 16-bit data with a 3.2-kHz clock frequency and consumes 170 ${\mu}W$ at $V_{DD}=6$ V. It employs 222 transistors and occupies a chip area of 5.85 $mm^2$.

Implementation of Adult Authentication System Using Smartphone and Near-Field Communication (스마트폰과 근거리 무선 통신을 이용한 성인 인증 시스템의 개발)

  • Lee, Chongho;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.617-624
    • /
    • 2015
  • In this paper, an adult authentication system based on authentication certificate was designed and implemented using smartphone and near-field communication. It has three advantages. First, it achieves easy, convenient, and fast authentication by using smartphone and near-field communication. Second, it achieves extremely high security and reliability by exploiting authentication certificate. Third, it achieves extremely low risk of personal information leakage by generating and sending only virtual identification code. Finally, it has a proper legal basis by Digital Signature Act. It consists of adult authentication module, near-field communication control module, policy server module, and database server module. A prototype of the proposed system was designed and implemented, and it was verified to have correct operation.

A Study on the Application of RFID to Container Terminals

  • Kim Sung-Soo;Lee Myoun-Soo;Song Yong-Seok;Nam Ki-Chan;Kwak Kyu-Suk
    • Journal of Navigation and Port Research
    • /
    • v.29 no.9
    • /
    • pp.789-793
    • /
    • 2005
  • The container terminals in Korea usually adopts both the bar code and the image recognition systems at the gate complex to capture necessary information on containers passing through the gate. With the rapid advancement of Information Technology(IT) these systems, however, seem to make the user not satisfied due to the inherent limitations such as the long process time taken, low rate of recognition etc., This paper, therefore, examines the adoption of Radio Frequency Identification (RFID) technology to container terminals, and tried to get some implication for the way to improve the productivity of the terminal. The results imply that some improvement in the gate and storage yard operation is feasible by the benefit of using the information of vehicles and containers collected in advance by RFID technology.

A Cryptography Algorithm using Telescoping Series (망원급수를 이용한 암호화 알고리즘)

  • Choi, Eun Jung;Sakong, Yung;Park, Wang Keun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

Computerization of the Central National Library; Development of Korean MARC System (국립중앙도서관 자료관리의 전산화연구 -기계가독목록의 개발과 활용-)

  • Chung Young Mee;Hyeon Kyu Seob
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.8
    • /
    • pp.3-72
    • /
    • 1981
  • The necessity of computerizing the Central National Library of Korea has been widely recognized. The purpose of this research is to develop Korean Machine Readable Cataloging system as a first step toward an integrated library system and suggests the ways of utilizing the MARC file in Korean libraries as well as in the Central National Library. In this paper the following studies are included: 1. An analysis of the functions and current procedures of the Central National Library 2. Development of a standard record format for KOR MARC 3. Production and utilization of KOR MARC files 4. Identification of problems in developing KOR MARC system In conclusion, the following recommendations are made: 1. Standardization of the internal code and input/output equipments should be proceded for hangul and chinese data processing. 2. The libraries planning or having accomplished computerization process should be cooperative in standardizing and distributing bibliographic data bases including KOR MARC tapes. 3. Training of competent librarians and strong support from the government are required for a successful implementation of the Library's computerization project.

  • PDF

Vulnerability assessment of strategic buildings based on ambient vibrations measurements

  • Mori, Federico;Spina, Daniele
    • Structural Monitoring and Maintenance
    • /
    • v.2 no.2
    • /
    • pp.115-132
    • /
    • 2015
  • This paper presents a new method for seismic vulnerability assessment of buildings with reference to their operational limit state. The importance of this kind of evaluation arises from the civil protection necessity that some buildings, considered strategic for seismic emergency management, should retain their functionality also after a destructive earthquake. The method is based on the identification of experimental modal parameters from ambient vibrations measurements. The knowledge of the experimental modes allows to perform a linear spectral analysis computing the maximum structural drifts of the building caused by an assigned earthquake. Operational condition is then evaluated by comparing the maximum building drifts with the reference value assigned by the Italian Technical Code for the operational limit state. The uncertainty about the actual building seismic frequencies, typically significantly lower than the ambient ones, is explicitly taken into account through a probabilistic approach that allows to define for the building the Operational Index together with the Operational Probability Curve. The method is validated with experimental seismic data from a permanently monitored public building: by comparing the probabilistic prediction and the building experimental drifts, resulting from three weak earthquakes, the reliability of the method is confirmed. Finally an application of the method to a strategic building in Italy is presented: all the procedure, from ambient vibrations measurement, to seismic input definition, up to the computation of the Operational Probability Curve is illustrated.

Experimental Method for the Identification of the Propeller Blade Vibration Characteristics (프로펠러 날개의 진동특성에 대한 실험적 연구)

  • Lee, Hyun-Yup;Kim, Young-Joong;Nho, In-Sik;Lee, Chang-Sup
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.42 no.2 s.140
    • /
    • pp.136-141
    • /
    • 2005
  • An experiment method has been developed to analyse the vibration characteristics of marine propeller blades, and vibration tests have been carried out on the model scale propeller in air and in water. The driving point transfer function(acceleration/excitation force) has been measured and modified by compensating the attachment effect of the impedance head. The measured natural frequencies in air have been compared with the theoretical results by an in-house FEM code PROSTEC. The added masses have been derived by comparing the measured natural frequencies in air and in water, and the results have been compared to the results using existing formula based on experience.

Voice Recognition Sensor Driven Elevator for High-rise Vertical Shift (동굴관광용 고층수직이동 승강기의 긴급 음성구동 제어)

  • Choi, Byong-Seob;Kang, Tae-Hyun;Yun, Yeo-Hoon;Jang, Hoon-Gyou;Soh, Dea-Wha
    • Journal of the Speleological Society of Korea
    • /
    • no.88
    • /
    • pp.1-7
    • /
    • 2008
  • Recently, it is one of very interest technology of Human Computer Interaction(HCI). Nowadays, it is easy to find out that, for example, inside SF movies people has talking to computer. However, there are difference between CPU language and ours. So, we focus on connecting to CPU. For 30 years many scientists experienced in that technology. But it is really difficult. Our project goal is making that CPU could understand human voice. First of all the signal through a voice sensor will move to BCD (binary code). That elevator helps out people who wants to move up and down. This product's point is related with people's safety. Using a PWM for motor control by ATmega16, we choose a DC motor to drive it because of making a regular speed elevator. Furthermore, using a voice identification module the elevator driven by voice sensor could operate well up and down perfectly from 1st to 10th floor by PWM control with ATmega16. And, it will be clearly useful for high-rise vertical shift with voice recognition sensor driven.

Evaluation of correlations for prediction of onset of heat transfer deterioration for vertically upward flow of supercritical water in pipe

  • Sahu, Suresh;Vaidya, Abhijeet M.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.4
    • /
    • pp.1100-1108
    • /
    • 2021
  • Supercritical water has great potential as a coolant for nuclear reactor. Its use will lead to higher thermal efficiency of Rankine cycle. However, in certain conditions heat transfer may get deteriorated which may lead to undesirable high clad surface temperature. It is necessary to estimate the operating conditions in which heat transfer deterioration (HTD) will take place, so as to establish thermal margins for safe reactor operation. In the present work, the heat flux corresponding to onset of HTD for vertically upward flow of supercritical water in a pipe is obtained over a wide range of system parameters, namely pressure, mass flux, and pipe diameter. This is done by performing large number of simulations using an in-house CFD code, which is especially developed and validated for this purpose. The identification of HTD is based on observance of one or more peak/s in the computed wall temperature profile. The existing correlations for predicting the onset of HTD are compared against the results obtained by present simulations as well as available sets of experimental data. It is found that the prediction accuracy of the correlation proposed by Dongliang et al. is best among the existing correlations.