• Title/Summary/Keyword: Protection time

Search Result 2,906, Processing Time 0.027 seconds

Implementation of Smart Card Identification System Using 1 vs. 1 Fingerprint Matching (1대1 지문매칭을 이용한 스마트 카드 인증 시스템의 구현)

  • 최순우;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.517-520
    • /
    • 2001
  • According to the rapid development of information and communication, various services are offered using information and communication infrastructure for example e-commerce, internet banking stork dealings, etc. This time, the most important problem is personal identification. But now secret number that is used to personal identification mostly can be misappropriated. To solve this problem, this paper proposes smart card identification system using 1 vs. 1 fingerprint matching. Information protection and security of smart card excel and use is convenient. And fingerprint becomes the focus of public attention in biometric field. Implemented system in this paper is based on PC. This system stores minutia that is fingerprint information into smart card and compare it with personal minutia. Therefore this system is sure to be on personal identification. If this system is applied to various services, safety degree of services will be enhanced.

  • PDF

Design and Implementation of TCP Supporting Optional Encryption Functionalities (선택적인 암호화 기능을 지원하는 TCP의 설계 및 구현)

  • Seong, Jeong-Gi;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.190-195
    • /
    • 2018
  • Recently, Due to the ongoing increase in cyber attacks and the improved awareness of privacy protection, most Internet services encrypt the traffic by using security protocols. Existing security protocols usually have additional layer between transport layer and application layer, and they incur additional costs because of encrypting all the traffic transmitted. This results in unnecessary performance degradation because it also encrypts data that does not require confidentiality. In this paper, we propose TCP OENC(Optional Encryption) which enables users of the application layer to optionally encrypt only confidential data. TCP OENC operates by TCP option to allow the application layer to encrypt the TCP stream transmitted only on demand. And it ensures transparency between the TCP layer and the application layer. To verify this, we verified that TCP OENC optionally encrypts the stream of TCP session on the embedded board. And then analyzed the performance of the encrypted stream by measuring the elapsed time.

A Study on the Protection System on the Electric Railways (전철급전회로 보호시스템에 관한 연구)

  • Chang, Sang-Hoon;Lee, Chang-Moo;Han, Moon-Seob;Oh, Kwang-Hae;Shin, Han-Soon;Kim, Jung-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.1166-1169
    • /
    • 1998
  • The Load characteristic of electric railway requires the power demand of the high capacity which amplitude is spacial-temporally fluctuated due to frequent starting and stopping with large tractive force. The conventional electric railway mainly consists of the resistance controlled and the thyristor controlled locomotives, are compensated for their bad characteristics of the power factor$(70\sim80%)$ with installation of another capacitor improving power factor at the substation. Since 1994, VVVF train car with good characteristics of power factor(100%) have been introduced and operated in Kwa-Chon Line. From the present technical tendency, it is judged that introduction of the locomotive with various controlled methods is necessary. The protective equipments installed at the substation are complicated and various aspects to detect faults and reduce their extension, so the universal countermeasures are required. Specially in the case of the fault occurrence it is difficult to calculate the fault location because of the change in the contactline constant according to modifying the characteristics of the contactline (the dualized catenary wire and extension, etc), so much time is required for the detection of fault location. In BT-fed method distance-relays and fault-locators are not installed, we have so many difficulties in the quick accident recovery.

  • PDF

Approaching Green Buildings Using Eco-Efficient Construction Materials: A Review of the state-of-the-art

  • Aghdam, Karim Aligholizadeh;Rad, Alireza Foroughi;Shakeri, Hamed;Sardroud, Javad Majrouhi
    • Journal of Construction Engineering and Project Management
    • /
    • v.8 no.3
    • /
    • pp.1-23
    • /
    • 2018
  • Since the protection the of human being from natural disaster and atmospheric factors have become an essential requirement, some attempts have been taken place to provide shelter and create a safe environment to a more comfortable life with welfare. For this purpose, using existing resources in nature and exploiting them in a different manner have been taken into account. Initially, the performed exploitations for construction had the least damage to the environment, but over time and as a result of population growth, aggressive exploitation of nature has led to destroying effects on the environment and resulted in consequences such as pollution and environmental destruction. Thus, the construction industry has been identified as the top pollutant factors of the environment. Among various construction factors, the building materials used in this industry are considered as the most important effective factors on the environment, as they have direct influences on the environment from the beginning of construction of the final steps. This research focuses on the review of the most of the existing green materials definitions and various approaches towards using eco-efficient construction materials. It presents and discusses possible ways of reducing the destructive effects on the environment by selecting and using green materials, review current literature and highlight the necessity of applying such materials in future constructions in all communities. This paper provides a base for this purpose that sustainable development communities and environment is realized by elimination of environmental pollution and approaching the criteria of green building by using sustainable materials.

The Importance of Military Security -Mainly focused on the Battle of Gaeseong, the early part of the Korean War- (전투사례로 본 군사보안의 중요성 연구 - 6.25 전쟁 초기, 개성일대 전투를 중심으로-)

  • Kim, Gyu-Nam;Lee, Hyun-Hee
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.51-58
    • /
    • 2016
  • "History is a mirror" means that we should be prepared for the threats of enemies through learning from repeating history. Currently South Korea is facing various provocations, including North Korea's nuclear weapons and missile s. For the protection of the life and property of its people, South Korea should regard North Korea as a main enemy and be fully prepared for the threats. The Korean War was a war between well-prepared North Korea and ill-prepa red South Korea. After Liberation, North Korean army incorporated the Chinese Communist army, placed battle equi pment with the support of the Soviet army, and finished corps-level training while South Korea at that time did not finish battalion-level training. In wartime and peacetime, an army should improve military security by concealing its own information and find its enemy's information. North Korea carefully prepared for the war, collecting information about the organization, deployment and operation of the South Korean army. South Korean army failed to cope with it and had hard times in its early battles. In this paper, I will emphasize the importance of military security, focusing on the Battle of Gaeseong, the early part of the Korean War.

Analysis on Information Use of Smartphone in the context of Tourists (관광객 대상 스마트폰 사용의 정보이용 분석)

  • Jee, Geun-Sung;Kim, Min-cheol;Ha, Tai-Hyun
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1543-1550
    • /
    • 2017
  • Previous research on smartphone has been focused on personal performance, accessibility, and information gaps in information system quality. In order to analyze the relationship between the use of smartphone information and personal characteristics, this study conducted a survey of 300 tourists at Jeju Airport, by using three variables of self-efficacy, 'impulsiveness and demographic variables (age, sex, education level, etc.) of smartphone use with personal characteristics. In conclusion, self-efficacy and impulsiveness seem to be positively related to the use of smartphone because it seems to be a living environment in which the desired information can be acquired within a desired time. In addition, there seems to be a difference between a mobile native environment in which online and offline boundaries are always connected and an environment in which 40 to 50 digital literacies are connected. This can be interpreted as a result of additional analysis.

A Study on the method of existing system migration for Cloud computing (클라우드 컴퓨팅 환경을 위한 기존 시스템의 이전 방안 연구)

  • Park, Sung-Hee;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.271-282
    • /
    • 2014
  • Cloud computing technology will provide application that needs many resources and various services to customers without any restriction of time and place. So, many of companies are now adopting cloud computing technology to this business and this trend is now increasing. However, cloud technology adoption rate is low because of security, compatibility, loss of control, security, data protection, performance and uptime, to the risk of vendor lock-in Cloud computing services, and compatibility with existing systems and anxiety. Now, many people are interest on the migration of existing systems but there are many study on this issue. So, more of study on this issue should be needed. This paper will show you the method that how to adopt cloud computing to their business and also show you evolution of cloud computing for existing system.

Performance of steel beams at elevated temperatures under the effect of axial restraints

  • Liu, T.C.H.;Davies, J.M.
    • Steel and Composite Structures
    • /
    • v.1 no.4
    • /
    • pp.427-440
    • /
    • 2001
  • The growing use of unprotected or partially protected steelwork in buildings has caused a lively debate regarding the safety of this form of construction. A good deal of recent research has indicated that steel members have a substantial inherent ability to resist fire so that additional fire protection can be either reduced or eliminated completely. A performance based philosophy also extends the study into the effect of structural continuity and the performance of the whole structural totality. As part of the structural system, thermal expansion during the heating phase or contraction during the cooling phase in most beams is likely to be restrained by adjacent parts of the whole system or sub-frame assembly due to compartmentation. This has not been properly addressed before. This paper describes an experimental programme in which unprotected steel beams were tested under load while it is restrained between two columns and additional horizontal restraints with particular concern on the effect of catenary action in the beams when subjected to large deflection at very high temperature. This paper also presents a three-dimensional mathematical modelling, based on the finite element method, of the series of fire tests on the part-frame. The complete analysis starts with an evaluation of temperature distribution in the structure at various time levels. It is followed by a detail 3-D finite element analysis on its structural response as a result of the changing temperature distribution. The principal part of the analysis makes use of an existing finite element package FEAST. The effect of columns being fire-protected and the beam being axially restrained has been modelled adequately in terms of their thermal and structural responses. The consequence of the beam being restrained is that the axial force in the restrained beam starts as a compression, which increases gradually up to a point when the material has deteriorated to such a level that the beam deflects excessively. The axial compression force drops rapidly and changes into a tension force leading to a catenary action, which slows down the beam deflection from running away. Design engineers will be benefited with the consideration of the catenary action.

A Legislative consideration on protection and regulation of Assembly and Demonstration at sea (해상 집회 및 시위의 보호와 규율을 위한 입법정책적 고찰)

  • Soon, Gil-Tae
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.5
    • /
    • pp.524-530
    • /
    • 2015
  • In this study, I present solutions to properly regulate assembly and demonstration at sea which has not been relatively secured and regulated compared to that of on land and inland waters so it may not violate public safety and order, and at the same time to secure it as a basic human right. Firstly, to protect and regulate in the same way with assembly and demonstration on land, I suggest to make amendments to "Law on Assembly and Demonstration" so that Korea Coast Guard Station can accept applications and administrator maritime assembly and demonstration. Secondly, in special cases where there are difficulties in the application of "Law on Assembly and Demonstration" due to the special maritime environment, following the example of Japan, America and England who have regulations in related special laws, I suggest an legislative alternative to add regulations on maritime assembly and demonstration in "Law on Maritime Guard" so that we can administer maritime assembly and demonstration in a way which there should be no conflict between basic human right of people and conservation of public safety.

Experimental Study on Reduction of Emissions for Marine Diesel Engines with a Double Post Injection (선박용 디젤엔진에서 이단지연분사에 따른 배기 배출물 저감에 관한 실험 연구)

  • Lee, Won-Ju;Choi, Jae-Hyuk;Cho, Kwon-Hae
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.4
    • /
    • pp.418-424
    • /
    • 2015
  • Marine Environment Protection Committee of the International Maritime Organization has decided to reinforce the NOx emission standards for ships passing an ECA(Emission Control Area) with Tier III standards from January 1, 2016. In this study, real-time measurements of the exhaust gas, cylinder pressure and fuel consumption were conducted at each load of a T/S Hanbada main engine of Korea Maritime and Ocean University, which is controlled by single injection and double post injection for reducing NOx emissions. The results showed that the quantity of CO2 and NOx increased in proportion to the engine load, whereas the CO concentration was inversely proportional to the engine load. In addition, double post injection decreased 10 % of P-max and reduced 25~30 % of the NOx emissions compared to single injection, whereas there was a trade-off relation, such as increase 3~5 % of SFOC (Specific Fuel Oil Consumption).