• Title/Summary/Keyword: Security Design

Search Result 3,387, Processing Time 0.033 seconds

Memory-Free Skin-Detection Algorithm and Implementation of Hardware Design for Small-Sized Display Device (소형 DISPLAY 장치를 위한 비 메모리 피부 검출 알고리즘 및 HARDWARE 구현)

  • Im, Jeong-Uk;Song, Jin-Gun;Ha, Joo-Young;Kang, Bong-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1456-1464
    • /
    • 2007
  • The research of skin-tone detection has been conducting continuously to enlarge the importance in security, surveillance and administration of the information and 'Password Control System' for using face and skin recognition in airports, harbors and general companies. As well as tile rapid diffusion of the application range in image communications and an electron transaction using wide range of communication network, the importance of the accurate detection of skin color has been augmenting recently. In this paper, it will set up the boundaries of skin colors using the information of Cb and Cr in YCbCr color model of human skin color which is from hundreds compiled portrait images for each race, and suggest a efficient yet simple structure about the skin detection which has been followed by whether the comprehension of the boundaries of skin or not with adaptive skin-range set. With the possibility of the 1D Processes which does not use any memory, it is able to be applied to relatively small-sized hardware and system such as mobile apparatuses. To add the selective mode, it is not only available the improvement of tie skin detection, but also showing the correspondent results about previous face recognition technologies using complicated algorithm.

A Comparison Study of New Hanbok Brand Skirt Pattern for Developing of Customizing System

  • Cha, Su-Joung;An, Myung-Sook;Heo, Seung-Yeun;Ra, Joung-Hei;Jeon, Woong-Ryul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.183-191
    • /
    • 2020
  • In this study, in order to obtain basic data on the development of a new hanbok skirt pattern for developing a customizing system, a new hanbok brand skirt pattern was compared and analyzed. After analyzing the patterns of six new hanbok brands, virtual simulation was performed to evaluate the appearance, clothing pressure, and airgap. As a result of analyzing the waist skirt patterns of commercial new hanbok brands A, B, C, D, E, and F, it was found that they were produced in different dimensions despite the free size skirt of the same design. The pattern of new hanbok waist skirt was composed of a flat pattern like the traditional hanbok. As a result of appearance evaluation, it was evaluated that there were significant differences between the patterns of the six brands in all the evaluation items on the front, side, and back. In the appearance evaluation, it was evaluated that the waist skirt of the B brand was excellent. As a result of examining the color distribution and airgap, it was evaluated that the airgap was large in most parts due to the characteristics of the waist skirt worn around the waist, and the garment pressure was low. In this paper, we propose a basic data for standardizing dimensions and patterns according to activation New Hanbok. It is thought that a unified pattern development based on the B brand pattern should be made.

Effect of Intercropping Ratio on the Cherry Tomato with Basil on the Growth, Physiological, and Productivity Parameters on the Rooftop in Urban Agriculture (옥상 도시농업에서 방울토마토(Lycopersicon esculentum)와 바질(Ocimum basilicum)간의 공영식재가 생육, 생리, 생산성에 미치는 영향)

  • Ju, Jin-Hee;Song, Hee-Yeon;Oh, Deuk-Kyun;Park, Sun-Yeong;Yoon, Yong-Han
    • Journal of Environmental Science International
    • /
    • v.30 no.9
    • /
    • pp.709-717
    • /
    • 2021
  • This study evaluated the growth, physiological responses and productivity based on the intercropping ratio of cherry tomato (Lycopersicon esculentum L.) with basil (Ocimum basilicum L.). on the rooftops to determine out the efficient ratio in urban agriculture. From April to September 2019, an experiment was conducted on the rooftop of Konkuk University Glocal Campus. Cherry tomato and basil were selected as companion plants for eco-friendly urban agriculture on the rooftops. Each plot was created with a width of 100 cm, length of 100 cm, and height of 25 cm. After installing drainage and waterproof layers from bottom to top, substrate was laid out with a height of 20 cm. Intercropping ratio was consisted of a single tomato plant (TC), 2:1 tomato to basil (T2B1), 1:1 tomato to basil (T1B1), 1:2 tomato to basil 2 (T1B2), and a single basil plant (BC), were conducted using a randomized complete plot design with five treatments and three replication (a total 15 plots). Measurements were divided into growth, physiological responses, and productivity parameters, and detailed items were investigated and analyzed by classifying them into plant height, leaf length, leaf width, number of leaves, root length, root collar caliper, chlorophyll contents, fresh weight, dry weight, number of fruit, fruit caliper, fruit weight, and sugar content. Comparative analyses of cherry tomato with basil plants by intercropping ratio, growth, physiological, and productivity responses are determined to be efficient when the ratio of cherry tomato to basil ratio is 2:1 or 1:1.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

Privacy Assurance and Consumer Behaviors in e-Business Environments (e-비즈니스 환경에서 기업의 개인정보보호 활동이 소비자 행위에 미치는 영향)

  • Park, JaeYoung;Jung, Woo-Jin;Lee, SangKeun;Kim, Beomsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.1-17
    • /
    • 2018
  • Recently, most online firms are trying to provide personalized services based on customer's data. However, customers are reluctant to give their information to online firm because of concerns about data breach. Online firms are seeking to increase their trust by ensuring the protection of personal information for customers through privacy seal (e.g. e-privacy) or data breach insurance. This research examines the effects of privacy assurance(i.e. privacy seal, data breach insurance) on consumer behavior in online environment. An experiment based on the hypothetical scenario was conducted using a between-subjects 2 (type of privacy assurance) + 1 (control) design. We found that both privacy seal and data breach insurance increased perceived privacy trust. In addition, privacy seal has a positive effect on the intention to provide personal information through perceived privacy trust. Finally, in the case of the group with a high (low) disposition to trust, higher perceived privacy trust is formed through privacy seal (data breach insurance). Theoretical and practical implications are discussed.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.

Design and Implementation of a Hardware Accelerator for Marine Object Detection based on a Binary Segmentation Algorithm for Ship Safety Navigation (선박안전 운항을 위한 이진 분할 알고리즘 기반 해상 객체 검출 하드웨어 가속기 설계 및 구현)

  • Lee, Hyo-Chan;Song, Hyun-hak;Lee, Sung-ju;Jeon, Ho-seok;Kim, Hyo-Sung;Im, Tae-ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1331-1340
    • /
    • 2020
  • Object detection in maritime means that the captain detects floating objects that has a risk of colliding with the ship using the computer automatically and as accurately as human eyes. In conventional ships, the presence and distance of objects are determined through radar waves. However, it cannot identify the shape and type. In contrast, with the development of AI, cameras help accurately identify obstacles on the sea route with excellent performance in detecting or recognizing objects. The computer must calculate high-volume pixels to analyze digital images. However, the CPU is specialized for sequential processing; the processing speed is very slow, and smooth service support or security is not guaranteed. Accordingly, this study developed maritime object detection software and implemented it with FPGA to accelerate the processing of large-scale computations. Additionally, the system implementation was improved through embedded boards and FPGA interface, achieving 30 times faster performance than the existing algorithm and a three-times faster entire system.

Development of IFC Standard for Securing Interoperability of BIM Data for Port Facilities (항만 BIM 데이터의 상호운용성 확보를 위한 IFC 표준 개발)

  • Moon, Hyoun-Seok;Won, Ji-Sun;Shin, Jae-Young
    • Journal of KIBIM
    • /
    • v.10 no.1
    • /
    • pp.9-22
    • /
    • 2020
  • Recently, BIM has been extended to infrastructures such as roads and bridges, and the demand for BIM standard development for ports is increasing internationally. Due to the low level of utilization of classification system and drawing standards compared to other infrastructures, and the closed nature of national security facilities, ports have insufficient level of connection and sharing environment among external systems or users. In addition, since the standardization of data for port facilities is not made, it is still necessary to establish an independent DB for each system and to ensure interoperability of data between these systems since it does not have a shared environment among similar data. Therefore, the purpose of this study is to develop and verify IFC, the international standard for BIM, in order to cope with the BIM environment and to be commonly used in the design, construction, and maintenance of port facilities. To this end, we build a standard schema with port-specific Express Notation according to buildingSMART International's standard development methodology. First, domestic and international reference model standards were analyzed to derive components such as space and facilities of port facilities. Based on this, the components of the port facility were derived through the codification, categorization, and normalization process developed by the research team. This was extended based on the port BIM object classification system developed by the research team. Normalization results were verified by designers and associations. Then, IFC schema construction was based on Express-G data modeling based on IFC 4 * 2 Candidate, which is a bridge candidate standard based on IFC4 (ISO16739), and IFC 4 * 3 Draft, which is developed by buildingSMART International. The final schema was validated using the commercialized validation tool. In addition, in order to verify the structural verification of the port IFC schema, the transformation process was verified by converting the caisson model into a Part21 file. In the future, this result will not only be used as a delivery standard for port BIM products, but will also be applied as a linkage standard between systems and a common data format for port BIM platforms when BIM is used in the maintenance phase. In particular, it is expected to be used as a core standard for data exchange in the port maintenance stage.

A Study on the Design and Implementation of Multi-Disaster Drone System Using Deep Learning-Based Object Recognition and Optimal Path Planning (딥러닝 기반 객체 인식과 최적 경로 탐색을 통한 멀티 재난 드론 시스템 설계 및 구현에 대한 연구)

  • Kim, Jin-Hyeok;Lee, Tae-Hui;Han, Yamin;Byun, Heejung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.4
    • /
    • pp.117-122
    • /
    • 2021
  • In recent years, human damage and loss of money due to various disasters such as typhoons, earthquakes, forest fires, landslides, and wars are steadily occurring, and a lot of manpower and funds are required to prevent and recover them. In this paper, we designed and developed a disaster drone system based on artificial intelligence in order to monitor these various disaster situations in advance and to quickly recognize and respond to disaster occurrence. In this study, multiple disaster drones are used in areas where it is difficult for humans to monitor, and each drone performs an efficient search with an optimal path by applying a deep learning-based optimal path algorithm. In addition, in order to solve the problem of insufficient battery capacity, which is a fundamental problem of drones, the optimal route of each drone is determined using Ant Colony Optimization (ACO) technology. In order to implement the proposed system, it was applied to a forest fire situation among various disaster situations, and a forest fire map was created based on the transmitted data, and a forest fire map was visually shown to the fire fighters dispatched by a drone equipped with a beam projector. In the proposed system, multiple drones can detect a disaster situation in a short time by simultaneously performing optimal path search and object recognition. Based on this research, it can be used to build disaster drone infrastructure, search for victims (sea, mountain, jungle), self-extinguishing fire using drones, and security drones.