• Title/Summary/Keyword: Secured data storage

Search Result 24, Processing Time 0.025 seconds

A Study on Quantity and Quality of Collected Rainwater by Collected Materials (우수 이용을 위한 포집재료별 포집수량과 수질에 관한 연구)

  • Lee, Young-Bok;Lee, Seung-Keun;Wang, Chang-Keun
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.18 no.1
    • /
    • pp.66-72
    • /
    • 2004
  • In this study, quantity and quality of collected rainwater by sand, gravel, soil, lawn and concrete surface, as collection materials were investigated and Rainwater Collection Prediction Model was developed to predict the amount of collected rainwater. The quantity of collected rainwater in concrete surface, gravel, sand, soil and lawn collection system was 1,067L(93.2%), 1,006L(87.8%), 902L(78.8%), 800L(69.9%), 788.5L(68.8%) for 8 months period, respectively. The average turbidity of collected rainwater in concrete surface, gravel, sand, soil and lawn collection system was 3.2NTU, 2.2NTU, 1.9NTU, 1.7NTU, 1.5NTU for 8 months period, respectively. For sand collection material, predicted amount by the Model and actual collected amount were 931.5L and 902L, which were very closed. For gravel collection material, predicted amount by Model and actual collected amount were 1,028.21. and 1,006L, which were very closed. To simulate the optimal rainwater storage volume, the rainfall and evaporation data in Dae-jeon city were used. For sand collection system with 30m2 area, the maximum storage volume was $17m^3$ and 62% of the year was secured for use of 240L/day.

An Effective Encryption Algorithm for 3D Printing Model Based on Discrete Cosine Transform

  • Pham, Ngoc-Giao;Moon, Kwnag-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.1
    • /
    • pp.61-68
    • /
    • 2018
  • In this paper, we present an effective encryption algorithm for 3D printing models in the frequency domain of discrete cosine transform to prevent illegal copying, access in the secured storage and transmission. Facet data of 3D printing model is extracted to construct a three by three matrix that is then transformed to the frequency domain of discrete cosine transform. The proposed algorithm is based on encrypting the DC coefficients of matrixes of facets in the frequency domain of discrete cosine transform in order to generate the encrypted 3D printing model. Experimental results verified that the proposed algorithm is very effective for 3D printing models. The entire 3D printing model is altered after the encryption process. The proposed algorithm is provide a better method and more security than previous methods.

Vulnerability Analysis Method of Software-based Secure USB (소프트웨어 기반 보안 USB에 대한 취약성 분석 방법론)

  • Kim, Minho;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo;Kim, Minsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1345-1354
    • /
    • 2012
  • The modern society with the wide spread USB memory, witnesses the acceleration in the development of USB products that applied secure technology. Secure USB is protecting the data using the method as device-based access control, encryption of stored files, and etc. In terms of forensic analyst, to access the data is a lot of troubles. In this paper, we studied software-based data en/decryption technology and proposed for analysis mechanism to validation vulnerability that secured on removable storage media. We performed a vulnerability analysis for USB storage device that applied security mechanism. As a result, we found vulnerabilities that extracts a source file without a password.

A comparative study on the architectural characterictics of the recently constructed houses in Kyongsangnam-do with standard housing plan (경남지역 신축 농가주택과 표준주택안의 건축적 특성에 관한 비교연구)

  • 박경옥
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 1992.11a
    • /
    • pp.91-101
    • /
    • 1992
  • The aim of this study is to offer the basic data concerning the architectural characteristics of the recently constructed farmhouses built by the residents’ self-planning after 1987, compared with the standard housing plan, for the desirable farmhouse planning. The 77 farmhouses, scattered in Milyang-gun, Yangsan-gun and Ulsan-gun near Ulsan city, were selected for the field measurement and the data, compared with the 14 standard housing plans, were analysed by the qualitative method. The farmhouses studied here showed average size of 25-pyongs(82.5m2) and took the flat slab type of roof by the masonry construction of the red blicks. The characteristics in planning were \circled1 the Anbang placed adjacent above the living room, \circled2 a pare of double-sliding doers for the Anbang. \circled3 a pare of double-sliding doors between the living room and the yard for the openness of the living room, \circled4 a door between the living room and the kitchen, \circled5 the multiuse-room by the kicthen for supplemental use, and \circled6 the storage space as attics secured indoor. The standard housing plans, different from these of the recently constructed farmhouses, placed emphasis on the separativeness of each space using the one hinged doors. The farmhouses built recently therefore were not affected by the characteristics of the standard housing plans.

  • PDF

Smart-Coord: Enhancing Healthcare IoT-based Security by Blockchain Coordinate Systems

  • Talal Saad Albalawi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.32-42
    • /
    • 2024
  • The Internet of Things (IoT) is set to transform patient care by enhancing data collection, analysis, and management through medical sensors and wearable devices. However, the convergence of IoT device vulnerabilities and the sensitivity of healthcare data raises significant data integrity and privacy concerns. In response, this research introduces the Smart-Coord system, a practical and affordable solution for securing healthcare IoT. Smart-Coord leverages blockchain technology and coordinate-based access management to fortify healthcare IoT. It employs IPFS for immutable data storage and intelligent Solidity Ethereum contracts for data integrity and confidentiality, creating a hierarchical, AES-CBC-secured data transmission protocol from IoT devices to blockchain repositories. Our technique uses a unique coordinate system to embed confidentiality and integrity regulations into a single access control model, dictating data access and transfer based on subject-object pairings in a coordinate plane. This dual enforcement technique governs and secures the flow of healthcare IoT information. With its implementation on the Matic network, the Smart-Coord system's computational efficiency and cost-effectiveness are unparalleled. Smart-Coord boasts significantly lower transaction costs and data operation processing times than other blockchain networks, making it a practical and affordable solution. Smart-Coord holds the promise of enhancing IoT-based healthcare system security by managing sensitive health data in a scalable, efficient, and secure manner. The Smart-Coord framework heralds a new era in healthcare IoT adoption, expertly managing data integrity, confidentiality, and accessibility to ensure a secure, reliable digital environment for patient data management.

A Study of the Reverse Engineering of a Two-Stage Impeller-Submerged Pump for Cryogenic Fluids (극저온용 2단 임펠러 액중펌프 역설계에 관한 연구)

  • Kweon, Byung Soo;Yi, Chung-Seob;Lee, Chi-Woo
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.16 no.3
    • /
    • pp.9-15
    • /
    • 2017
  • This study represents basic research for the development of submerged pump technology applicable to transfer and storage of a cryogenic liquids. Its purpose is to secure baseline design data by applying reverse engineering to the process of developing a submerged cryogenic pump. The two-stage model included in the ARTICK Series LNG Submerged Pump produced by Vanzetti of Italy was selected for analysis for development of a localized product, and was disassembled for reverse engineering. The pump was disassembled after analyzing its processing/assembly characteristics such as shrinkage of fittings. In addition, the materials used in manufacturing of the main components were analyzed, and the ingredients were confirmed. As a result, a design drawing for each component required for product development was secured via foundational design, and a test product was manufactured by maximizing the application of appropriate domestic technologies.

DNA Sequences Compression using Repeat technique and Selective Encryption using modified Huffman's Technique

  • Syed Mahamud Hossein; Debashis De; Pradeep Kumar Das Mohapatra
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.85-104
    • /
    • 2024
  • The DNA (Deoxyribonucleic Acid) database size increases tremendously transmuting from millions to billions in a year. Ergo for storing, probing the DNA database requires efficient lossless compression and encryption algorithm for secure communication. The DNA short pattern repetitions are of paramount characteristics in biological sequences. This algorithm is predicated on probing exact reiterate, substring substitute by corresponding ASCII code and engender a Library file, as a result get cumulating of the data stream. In this technique the data is secured utilizing ASCII value and engendering Library file which acts as a signature. The security of information is the most challenging question with veneration to the communication perspective. The selective encryption method is used for security purpose, this technique is applied on compressed data or in the library file or in both files. The fractional part of a message is encrypted in the selective encryption method keeping the remaining part unchanged, this is very paramount with reference to selective encryption system. The Huffman's algorithm is applied in the output of the first phase reiterate technique, including transmuting the Huffman's tree level position and node position for encryption. The mass demand is the minimum storage requirement and computation cost. Time and space complexity of Repeat algorithm are O(N2) and O(N). Time and space complexity of Huffman algorithm are O(n log n) and O(n log n). The artificial data of equipollent length is additionally tested by this algorithm. This modified Huffman technique reduces the compression rate & ratio. The experimental result shows that only 58% to 100% encryption on actual file is done when above 99% modification is in actual file can be observed and compression rate is 1.97bits/base.

Analysis of food availability and food security status in Nepal for forest resource conservation purpose

  • Panta, Menaka;Kim, Kye-Hyun;Neupane, Hari Sharma;Joshi, Chudamani
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.153-161
    • /
    • 2008
  • Agriculture and forest are basis for livelihood in Nepal while both sectors constitute around 40 percent of the national product and over two-thirds of the economically active population is dependent on agriculture. However, radical changes in land use, depletion in crops production and food availability are major threats due to loss of soil fertilityand severe environmental degradation. In this study, we used time series data from 1986/87 to 2005/06 about food crop production and population published by Government of Nepal, Ministry of Agriculture and Cooperatives and Central Bureau of Statistics. Descriptive statistics and ArcGIS were used to assess and map the food security status of Nepalese Terai based on the local food demand and supply system. Food supply to demand ratio(FSDR) was the main idea of assessment. Our results showed that out of 20 districts, only 8 districts were categorised under secured food districts whereas 5 districts were still under food unsecured situation. The analysis further revealed that 7 districts had faced food deficit more than 8-16 times during the last 20 year periods. Data further showed that there was surplus food supply relative to the requirements dictated by FSDR. However, the average FSDR was less than 1.2(less than 20% surplus) exploring fact that most of the districts were not producing sufficient food to cope up the food shock and after 1995 it was relatively stagnant. Our prediction reveals that food supply in Terai even in the future would remain at almost the same level as now, and there will not more than 16-17% surplus by 2021 considering medium vibrant population growth. The findings thus, indicate that Terai may not be a food secure region in the future, even though the region is considered as a food storage house of Nepal. In addition, this paper suggests ways to make future comprehensive case studies more widely comparable in Terai, Nepal.

  • PDF

International Comparisons of Management Systems for Medical Waste and Suggestions for Future Direction of Medical Waste Management System in Korea (세계 각국의 의료폐기물 관리 제도 비교: 한국 의료폐기물 관리체계에 대한 시사점)

  • Oh, Se-Eun;Ji, Kyung-hee;Park, Seokhwan;Kim, Pangyi;Lee, Kyoung-Mu
    • Journal of Environmental Health Sciences
    • /
    • v.43 no.6
    • /
    • pp.532-544
    • /
    • 2017
  • Objectives: Because the amount of medical waste (i.e., health-care waste) generated in Korea is rapidly increasing and social concern against its safety is widespread, a number of issues related with medical wastes are being discussed. The purpose of this study is to compare diverse medical waste management systems worldwide and propose future directions of a medical waste management system in Korea. Methods: Literature review was conducted mainly on the WHO, and developed countries such as the European Union (Germany, Belgium and UK), Japan and the United States. For these countries, the data with respect to their systems for medical waste management ranging from the definition of medical waste to the whole processes of collection, transportation and disposal were summarized and compared. Results: The terminology and classification of medical wastes were not consistent for WHO recommendation, EU, Japan, US and Korea. Comparison of the collection, storage, transportation and disposal of medical waste showed that Korea had rather stronger regulations for medical waste management compared to developed countries including Belgium (Flanders region), Germany, Japan and the US. Considering that developed countries adopt rather flexible disposal system especially for general medical wastes which pose lower possibility of infection, Korean government could consider diversifying disposal methods other than incineration. It may also be very important to try to reduce the amount of medical wastes and enough capacity for off-site incineration are secured. Conclusion: Our study of international comparisons suggests that it is necessary to continue to identify advantages and disadvantages of the current medical waste management systems and establish more effective one in Korea.

Estimation of Surplus Solar Energy in Greenhouse (II) (온실내 잉여 태양에너지 산정(II))

  • Suh, Won-Myung;Bae, Yong-Han;Ryou, Young-Sun;Lee, Sung-Hyoun;Kim, Hyeon-Tae;Km, Yong-Ju;Yoon, Yong-Cheol
    • Journal of Bio-Environment Control
    • /
    • v.20 no.2
    • /
    • pp.83-92
    • /
    • 2011
  • This study is about an analysis of surplus solar energy by important greenhouse type using Typical Meteorological Year (TMY) data which was secured in order to provide basic data for designing an optimum thermal storage system to accumulate surplus solar energy generated in greenhouses during the daytime. The 07-auto-1 and 08-auto-1 types showed similar heat budget tendencies regardless of greenhouse types. In other words, the ratios of surplus solar energy were about 20.0~29.0% regardless of greenhouse type. About 54.0~225.0% and 53.0~218.0% of required heating energy will be able to be supplemented respectively according to the greenhouse types. The 07-mono-1 and 07-mono-3 types also showed similar heat budget tendencies regardless of greenhouse types. In other words, the ratios of surplus solar energy were about 20.0~26.0% and 21.0~27.0% respectively by greenhouse type. About 57.0~211.0% and 62.0~228.0% of required heating energy will be able to be supplemented by greenhouse type. Except for Daegwallyeong and Suwon area, other regions can cover heating energy only by surplus solar energy, according to the study.