• Title/Summary/Keyword: Physical security

Search Result 1,047, Processing Time 0.025 seconds

Design of Constellation Content for Children Applied to Car Glass Roof (승용차 글라스루프를 활용한 어린이용 별자리 콘텐츠 디자인)

  • Choe, Jong-Hoon;Jung, Su-Young;Choi, Yu-Mi;Kwon, Min-Jeong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.7
    • /
    • pp.141-149
    • /
    • 2013
  • Recently, the time in which children moves by car become frequent, they stay longer in the car because leisure life including camping and etc. increased. Children whose physical activities are active were subject to restriction because of the limited car boarding visual space and on security. Because of limited space in cars, domestic and foreign automotive companies show the different glass roof applied in cars that exhibited wide clear view in order to remove tedious and stuffy of children while they stay for a long time inside the car. In addition, the potential probability in which the Smart Car that the IT technology is grafted research and research that it utilizes the door window glass as the display is progressed and which the glass roof can be used as the screen can be sufficient. In this study, the in-vehicle display application case and Smart Devices constellation application were benchmarked. The car glass roof application method of the constellation studying content which performed the user survey for the child by the car with the parents whose movement is frequent and considers the child and fundamental interaction way tried to be drawn and we try to propose.

A Study on the Architectural Planning of the Magnet Resonance Imaging Unit in General Hospital (종합병원 자기공명단층촬영유니트에 관한 건축계획적 연구)

  • Yun Woo-Yong;Chai Choul-Gyun
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.4 s.57
    • /
    • pp.89-96
    • /
    • 2006
  • Magnetic Resonance Imaging (MRI) scanner is the device to draw an image of conditions and the spread of various tissue in the body. It is used by making the patient into rounded superconductor and using high frequency which cause resonances. It uses superconduction magnet and high frequency that is non-ionizing radiation so can acquire biochemical, physical, and functional information of tissue. It is also very useful because it can scan tomography from many different angles to diagnose disease of a nervous system, the heart, and a skeletal structure. It also has advantages of that there is no risk of radiation exposure and the ability of observation on organizations such as brains, livers and the spinal cord of people. Since these features, the rate of use has been increased accordingly more considerations of the security are required when it plans. The weight of devices and the cover problem of the strong magnetic field which is occurred by magnetic resonance at the time of diagnosis can cause very important structure problems and architectural condition. That also the recent tendency which needs stronger equipment means that planning of the MRI unit should generally aim at purposing of the proximity for the device maintenance and up-grade and of further expansion. However there are not enough studies and data on the magnet resonance imaging in domestic hospitals. According to these reasons, this study has an object of indicating basic data on MRI unit plan standard and alternative proposals.

Design of Data Exchange Technique for Power Facilities Monitoring using Augmented Reality (증강현실을 이용한 전력 설비 모니터링 시스템의 데이터 교환 기법 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.16-22
    • /
    • 2020
  • Since it is difficult for individual power producers and non-professionals who lack basic knowledge to control, manage, and operate facilities through EMS (Energy Management System), augmented reality and virtual reality monitoring systems are applied. However, in the existing systems, data access efficiency is inferior due to the process of analyzing column values for analog signal values collected from sensors and converting data after combining the columns. In addition, high-speed operation processing is difficult due to a large number of indexes for accommodating access patterns for various analog signal waveforms. Therefore, in this paper, a bitmap generator is inserted into a non-tree structure to convert the data collected from power facilities into physical property information, and the converted information is encrypted with a common key, so that the resources for the resources shared between each device are We propose a method of exchanging data for an augmented reality-based power system that is controlled by measurement.

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

Biometric and Identity Reference Protection (개인식별정보와 바이오인식정보의 보호기법)

  • Shin, Yang-Nyuo;Kwan, Man-Jun;Lee, Yong-Jun;Park, Jin-Il;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2009
  • This paper describes how to protect the personal information of a biometric reference provider wherein biometric reference and personally identifiable information are bounded in a biometric system. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person is usually adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular individual when combining with the other information. As a result, secure protection methods are required for generating, storing, and transmitting biometric information. Considering these issues, this paper proposes a method for ensuring confidentiality and integrity in storing and transferring personally identifiable information that is used in conjunction with biometric information, by extending the related X9.84 standard. This paper also outlines the usefulness of the proposition by defining a standard format represented by ASN.1, and implementing it.

Development Paradigm of Repression and Desire Embodied by Body and Clothing (몸·복식에서 억압과 욕망의 패러다임 개발)

  • Jeong, Ki-Sung;Kim, Min-Ja
    • Journal of the Korean Society of Costume
    • /
    • v.63 no.6
    • /
    • pp.97-112
    • /
    • 2013
  • In this study, physical, social and psychological repression embodied by the body and clothing are referred to instinctual, power and creative desires, respectively, from the point of biological, social and aesthetic views. Desire refers to a behavior to overcome men's imperfections with individual security, sense of belonging and the pursuit of an ideal, which are obtained by living as a social creature. Repression through the body is sub-categorized depending on whether it is temporary or permanent. Repression expressed through clothing is seen through revealing/concealing, contraction/expansion, and deconstruction/ reconstruction. What enables human beings to embrace changes in fashion without fierce resistance or backlash is the changes of formativeness demonstrated by repression through the body and clothing. The aesthetic values drawn from the exhibition of repression and on the body and clothing are categorized into narcissism, fetishism and aestheticism. While narcissism is an instinctive desire grounded on the originality and confidence of the self that results in refusing repression, fetishism is a desire for power that expedites repression in the pursuit of materialistic value or sexual fantasy. Aestheticism is a desire for creativity that symbolizes the body-and-clothing repression in the pursuit of aesthetic idealism. Repression evokes desire, and the pursuit of desire leads to another repression. The aesthetic values of desire for instinct, power and creativity can be substituted with each other for interpretation according to the attitudes of an initiator, a user and a spectator.

Data Hiding Method Utilizing Skipping Based Hybrid Histogram Shifting (도약기반의 하이브리드 히스토그램 시프팅을 이용하는 데이터 은닉 방법)

  • Choi, YongSoo;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.371-376
    • /
    • 2018
  • In the system security technology, the information hiding field is developed as technologies for embedding information, which are generally used as contents media. The proposed technique is a technical steganography technique which uses a technique of concealing certain information through physical / statistical change of signal values of contents. Recently, there have been various studies based on histogram shifting in reversible data concealment. In multi - peak histogram shifting, the capacity of data concealment gradually increased by applying multiple peak histogram method. In this paper, we analyze the effect of concealment in terms of adopting the histogram shift method including skipping. In addition, we propose multi - branch data concealment as a general method to improve concealment capacity. The above proposal has proved to be an example using mathematical expressions, and further improvement measures could be derived.

Relative Location based Risk Calculation to Prevent Identity Theft in Electronic Payment Systems (전자지불거래에서 상대위치와 연동한 도용 위험성 산출방법)

  • Suh, Hyo-Joong;Hwang, Hoyoung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.455-461
    • /
    • 2020
  • Electronic payment system using Internet banking is a very important application for users of e-commerce environment. With rapidly growing use of fintech applications, the risk and damage caused by malicious hacking or identity theft are getting significant. To prevent the damage, fraud detection system (FDS) calculates the risk of the electronic payment transactions using user profiles including types of goods, device status, user location, and so on. In this paper, we propose a new risk calculation method using relative location of users such as SSID of wireless LAN AP and MAC address. Those relative location information are more difficult to imitate or copy compared with conventional physical location information like nation, GPS coordinates, or IP address. The new method using relative location and cumulative user characteristics will enable stronger risk calculation function to FDS and thus give enhanced security to electronic payment systems.

An Study on the Environment Analysis and the Correspondence Strategy of Electronic Commerce (전자상거래의 환경분석과 대응전략에 관한 연구 -전라북도 기업을 중심으로-)

  • Kim Dong-Gyoon;Cha Soon-Kwean
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.29-66
    • /
    • 2000
  • The current economic environmental changes such as globalization, information and opening of the market is calling for or needing the more rapid change of management and/or marketing strategies of the company than they did before to survive in tile borderless international competition. Under this situation, this study focuses on the correspondence strategies of Electronic Commerce which is one of the key elements to overcome or lead the above demands through seeking the problems of the current EC acception and application specially in Chollabuk Do province. For the above purpose, this study surveys the questionary with business firms of above area and figures out what is the correlation between business form and size and EC acception and application and what is the problems on it. And than provides several counter strategies which are following based on the survey to keep this area companies from out of business and lead the above economic environmental changes. To expand the adoption and application of EC to this area, firstly, top managers of the company must recognize the necessity and importance of EC compared with traditional commerce and change their perception and attitude concerning EC positively, and than try to accept it as soon as possible. Secondly, the company need the retained earning to invest to EC and educate their managers and employees with total participation. Thirdly, local government has to improve its attention to EC as a best way or opportunity to reduce and overcome the economical gap and development its economy because EC can remove the physical time or distance and space, scale and capital limitations. Finally, government has to expand and establish information infrastructure such as technical infrastructure(communication and security technology), Functional infrastructure like standard protocol, Organizational infrastructure(interchange agreement, relative law) and social infrastructure to improve efficient electronic transaction which can Increase the company' international compatitiveness under the current economy trend.

  • PDF

A Method to Improve Energy Efficiency Using a Function that Evaluate the Probability of Attempts to Verify a Report at Intermediate Node in USN (USN에서 중간 노드에서의 보고서 검증 시도 확률 평가 함수를 이용한 에너지 효율 향상 기법)

  • Lee, Hyun-Woo;Moon, Soo-Young;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.4
    • /
    • pp.21-29
    • /
    • 2011
  • Wireless sensor nodes operate in open environments. The deployed sensor nodes are very vulnerable to physical attacks from outside. Attackers compromise some sensor nodes. The compromised nodes by attackers can lead to false data injection into sensor networks. These attacks deplete the limited energy of sensor nodes. Ye et al. proposed the Statistical En-Route Filtering (SEF) as a countermeasure of the attacks. The sensor node in SEF examines the event reports based on certain uniform probability. Thus, the same energies are consumed in both legitimate reports and false reports. In this paper, we propose a method that each node controls the probability of attempts to verify a report to reduce energy consumption of sensor nodes. The probability is determined in consideration of the remaining energy of the node, the number of hops from the node to SINK node, the ratio of false reports. the proposed method can have security which is similar with SEF and consumes lower energy than SEF.