• Title/Summary/Keyword: Platform security

Search Result 821, Processing Time 0.03 seconds

Implementation of a Gesture Recognition Signage Platform for Factory Work Environments

  • Rho, Jungkyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.171-176
    • /
    • 2020
  • This paper presents an implementation of a gesture recognition platform that can be used in a factory workplaces. The platform consists of signages that display worker's job orders and a control center that is used to manage work orders for factory workers. Each worker does not need to bring work order documents and can browse the assigned work orders on the signage at his/her workplace. The contents of signage can be controlled by worker's hand and arm gestures. Gestures are extracted from body movement tracked by 3D depth camera and converted to the commandsthat control displayed content of the signage. Using the control center, the factory manager can assign tasks to each worker, upload work order documents to the system, and see each worker's progress. The implementation has been applied experimentally to a machining factory workplace. This flatform provides convenience for factory workers when they are working at workplaces, improves security of techincal documents, but can also be used to build smart factories.

Platform for Manipulating Polarization Modes Realized with Jones Vectors in MATHEMATICA

  • Choi, Yong-Dae;Kim, Bogyeong;Yun, Hee-Joong
    • Journal of Astronomy and Space Sciences
    • /
    • v.32 no.2
    • /
    • pp.151-159
    • /
    • 2015
  • The fundamental conception in physics of the propagation of the electromagnetic wave polarization in matter is newly understood as the cardinal keyword in free-space quantum communication technology and cosmology in astrophysics. Interactive visualization of the propagation mechanism of polarized electromagnetism in a medium with its helicity has accordingly received attention from scientists exploiting the protocol of quantum key distribution (QKD) to guarantee unconditional security in cryptography communication. We have provided a dynamic polarization platform for presenting the polarization modes of a transverse electromagnetic wave, converting the state of polarization through the arrangement of optical elements, using Jones vectors calculations in Methematica. The platform graphically simulates the mechanism of production and propagation of the polarized waves in a medium while satisfying Maxwell's equations.

An automatic Notification Service Using the OSGi Service Platform and SMS module

  • Kang, Kyu-Chang;Kang, Dong-Oh;Lee, Jeon-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.55.1-55
    • /
    • 2002
  • In the era of home automation, we need more context-aware and intelligent service applications than before. For these applications, a service gateway as a platform is required to bridge the gap between external data networks to internal home networks. Also, the sonics gateway enables customers to receive new classes of home services. The OSGi service platform is a good solution for the service gateway since it can deliver new applications dynamically from a broader network. In the near future, every home will be equipped with a residential gateway powered by the OSGi, and will demand value-added service applications, such as home security monitoring and safety alerts. In this pa...

  • PDF

IU_AMDroid : An Integrated User Authority Manager Model for the Android Platform (안드로이드 플랫폼을 위한 통합적인 사용자 인증 관리 모델)

  • Nam, Choon-Sung;Jang, Kyung-Soo;Shin, Dong-Ryeol
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.533-540
    • /
    • 2013
  • Currently, as the Android platform only supports single-user protection, it needs security solution for multi-users. Specially, it has to protect specific applications which have personal and financial information, and be available to support authority management for contents access. Thus, this paper proposes an integrated user authority manger model for the Android platform. It helps application authority which is capable to divide into three statuses: installation, execution, deletion with the help of information technology.

Empirical study on the acceptance intention of online service platform - Focused on international logistics (온라인 플랫폼서비스 수용의도에 대한 실증연구 -국제물류중심)

  • Kim, Sun-Nam;Kim, Young-Bin;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.18 no.2
    • /
    • pp.101-107
    • /
    • 2016
  • This study is to find out the acceptance intention of international logistics platform which meet the needs of each other of shipper and international logistics company in the online. As you may know, the many korean traditional international logistics companies which have to compete with global logistics companies focused on economics of scale, have been in a big trouble. In this circumstances, though they should get used to the change to survive, they do not know what they try to overcome. So, I hope that this study would be helpful to them.

Security in Display Information with Digital Image Processing using 2-Dimensional Median Filter (2차원 중간값 필터 디지털 영상 처리 기법을 적용한 화면 정보 보안)

  • Whang, Ho Young;Lee, Seungju;Lee, Seokchan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.878-879
    • /
    • 2015
  • 어플리케이션 구동 시에 화면에 표시되는 데이터는 보안 알고리즘이 적용되지 않은 채로 사용자 및 악의적인 해커들에게 노출된다. 본 논문에서는 악의적인 사용자가 화면을 캡쳐하여 이미지 파일로 저장하거나 디지털카메라로 화면에 노출된 정보의 사진을 찍었을 때 중요 데이터가 유출되지 않도록 화면 출력 이미지를 디지털 영상 처리 기법을 이용하여 변조한다. 사용자가 육안으로 볼 때에는 데이터를 식별할 수 있도록 화면 주사율에 맞추어 변조된 영상에 대한 보완 영상을 번걸아 출력한다.

Train detection in railway platform area using image processing technology (영상처리를 이용한 철도 승강장 영역에서의 열차상태 검지방법)

  • Oh, Sehchan;Yoon, Yongki;Baek, Jonghyun;Jo, Hyunjeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6098-6104
    • /
    • 2012
  • Currently, dozens of CCTVs are widely used in railway station for monitoring passengers in danger and security areas. The most frequent accidents occur at the platform area where passengers boarding the train. However, It is almost impossible that station operator monitors dozens of CCTV screens and recognizes immediately accidents and handle them. Therefore, railway platform monitoring system using image processing technology which automatically detects platform accidents is needed, and in order to that, preferentially, accurate determination of train state in the platform is required. In the paper, we propose train state detection algorithm for vision based railway platform monitoring system. the proposed algorithm determines four different states i.e. trains approach(IN), departure(OUT), stop(ON), and empty(OFF) of the train, in the platform. To evaluate the proposed algorithm, we present the train detection results for the Seoul Metro Line 4 Dongjak and Namtaeryeong Station.

An Object-Oriented Analysis and Design Methodology for Security of Web Applications (웹 응용 보안을 위한 객체지향 분석·설계 방법론)

  • Joo, Kyung-Soo;Woo, Jung-Woong
    • Journal of Internet Computing and Services
    • /
    • v.14 no.4
    • /
    • pp.35-42
    • /
    • 2013
  • Nowadays many tasks are performed using the Web. Accordingly, many web-based application systems with various and complicated functions are being requested. In order to develop such web-based application systems efficiently, object-oriented analysis and design methodology is used, and Java EE(Java Platform, Enterprise Edition) technologies are used for its implementation. The security issues have become increasingly important. For such reasons, Java EE provides mechanism related to security but it does not provide interconnections with object-oriented analysis and design methodology for developing web application system. Consequently, since the security method by Java EE mechanism is implemented at the last step only, it is difficult to apply constant security during the whole process of system development from the requirement analysis to implementation. Therefore, this paper suggests an object-oriented analysis and design methodology emphasized in the security for secure web application systems from the requirement analysis to implementation. The object-oriented analysis and design methodology adopts UMLsec, the modeling language with an emphasis on security for the requirement analysis and system analysis & design with regard to security. And for its implementation, RBAC (Role Based Access Control) of servlet from Java EE technologies is used. Also, the object-oriented analysis and design methodology for the secure web application is applied to online banking system in order to prove its effectiveness.

User Dynamic Access Control for Privacy Protection in Smart Home (스마트 홈에서 프라이버시 보호를 위한 사용자 동적 접근제어)

  • Cho, Do-eun;Kim, Si-jung
    • Journal of Platform Technology
    • /
    • v.6 no.3
    • /
    • pp.17-22
    • /
    • 2018
  • Smart home is a technology for monitoring and controlling all the information about a house by integrating various home applications like cooling, heating, lighting, kitchen and security systems into a network. Although home appliances have become more convenient to use due to the development of smart home technology, they are also more vulnerable to information security hazards. Unauthorized visitors may have access to any of home appliance to arbitrarily control it or acquire information. This causes serious privacy and security problems, which should be solved to further smart home technology. This present paper proposed a dynamic user access control system for privacy protection in smart homes. The proposed system defines the role of a user of smart home services by automatically identifying the status information of the user and dynamically controls the access range for the service. In this way, the privacy of a user can be protected and the inter-smart device service is effectively provided. Consequently, the proposed dynamic user access control for smart home will improve the security service for protecting privacy in smart home devices.

An Improved High-Performance Protocol for Security Vulnerability of GSM based on SIM Card (SIM 카드 기반 보안 취약성을 개선한 고성능 GSM 보안 프로토콜)

  • Kim, Hee-Jung;Jeon, Ha-Yong;Lee, Ju-Hwa;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.902-911
    • /
    • 2007
  • GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement. In less than ten years since the first GSM network was commercially launched, it became the world's leading and fastest growing mobile standard, using over 1 billion GSM subscribers across more than 200 countries of the world. GSM platform evolved into 3th generation mobile communication which includes not only voice call services but also the international roaming and various kinds of the multimedia services. GSM is an essential element techniques a safe data transmission and a personal private protection while support services. However, a crypto algorithm and a secure protocol for a safe data communication using GSM are indicating various kinds of problems. In this paper, we propose a more safer and more efficient authentication protocol in 3th generation network through analysis of GSM security mechanism of 2th/2.5th generation. This security protocol offers enforced security efficiency by using user verification between SIM/ME and reduction of authentication and key agreement step between SIM/ME/AuC.

  • PDF