• Title/Summary/Keyword: Security SoC

Search Result 198, Processing Time 0.029 seconds

A Study on the Classification and Causative Factor of Vacant Houses - Focused on the Incheon Metropolitan City - (빈집발생의 유형과 발생에 영향을 미치는 요인에 관한 연구 - 인천광역시 사례를 중심으로 -)

  • Lim, Chang-Il;Na, In-Su
    • Journal of KIBIM
    • /
    • v.10 no.1
    • /
    • pp.23-29
    • /
    • 2020
  • The vacant houses commonly observed in urban aging are considered to be representative signs of urban decline. Vacant houses are themselves vulnerable to security, and in particular, they are exposed to disasters due to poor management, which can accelerate the decline of the area. This study is to classify the area and analyze the causes and characteristics of the occurrence of vacant houses by type based on the data through the survey on the vacant houses in Incheon. This research analyze vacant house data survey so to characterized and categorized types of vacant houses. The criteria of vacant houses analysis are population density, population growth, aging extent. In conclusion there are four types of region in Incheon area according to housing types, hazard classes, building age and building areas. Type A is inner city, type B is mixed, type C is expandable and type D is unsular types.

Implementation of an Indoor Mobile Robot and Environment Recognition using Line Histogram Method (실내 자율주행 로봇의 구현 및 라인 히스토그램을 이용한 환경인식)

  • Moon, Chan-Woo;Lee, Young-Dae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.2
    • /
    • pp.45-50
    • /
    • 2009
  • The environment exploration is an essential process for indoor robots such as clean robot and security robot. Apartment house and office building has common frame structure, but internal arrangement of each room may be slightly different. So, it is more convenient to use a common frame map than to build a new map at every time the arrangement is changed. In this case, it is important to recognize invariant features such as wall, door and window. In this paper, an indoor mobile robot is implemented, and by using the laser scanner data and line segment histogram with respect to segment orientation and distance, an environment exploration method is presented and tested. This robot is fitted with a laser scanner, gyro sensor, ultra sonic sensor and IR sensor, and programed with C language.

  • PDF

Fully Homomorphic Encryption Scheme without Key Switching (키 전환이 필요 없는 완전 준동형 암호화 기법)

  • Kim, Jae-Heon;Yoo, Sang-Kyung;Lee, Sang-Han
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.428-433
    • /
    • 2013
  • We present a fully homomorphic encryption (FHE) scheme without key switching based on ring- learning with errors (RLWE) problems and some other assumption. Previous FHE schemes based on LWE needed a step called key switching to reduce the dimension of ciphertext. The key switching step actually needs a heavy computation and severe increasement of keys. So the key switching step is a big burden for implementing FHE Schemes. We suggest a FHE scheme without key switching step by reducing the dimension of ciphertexts in other way. Instead of throwing away key switching, we need another hardness assumption of the difficulty of solving quadratic equation over rings.

Current Differential Relaying Algorithm for Power Transformer Protection Operating in Conjunction with a CT Compensating Algorithm (보상 알고리즘을 적용한 변압기 보호용 전류차동 계전방식)

  • Kang, Yang-Cheol;Park, Jong-Min;Lee, Mi-Sun;Jang, Sung-Il;Kim, Yong-Gyun;So, Soon-Hong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.56 no.11
    • /
    • pp.1873-1878
    • /
    • 2007
  • Current differential relays may maloperate during magnetic inrush and over-excitation because a significant differential current is produced. To prevent maloperation, the relays adopt some harmonic components included in the differential current. The harmonic restraints may increase the security of a relay but cause the operating time delay of a relay when an internal fault occurs. Moreover, the operating time delay is more increased if a current transformer (CT) is saturated. This paper describes a current differential relaying algorithm for power transformer protection with a compensating algorithm for the secondary current of a CT. The comparative study was conducted with and without the compensating algorithm. The performance of the proposed algorithm was investigated when the measurement CT (C400) and the protection CT (C400) are used. The proposed algorithm can compensate the distorted current of a CT and thus reduce the operating time delay of the relay significantly for an internal fault with CT saturation.

Computer vision monitoring and detection for landslides

  • Chen, Tim;Kuo, C.F.;Chen, J.C.Y.
    • Structural Monitoring and Maintenance
    • /
    • v.6 no.2
    • /
    • pp.161-171
    • /
    • 2019
  • There have been a few checking frameworks intended to ensure and improve the nature of their regular habitat. The greater part of these frameworks are constrained in their capacities. In this paper, the insightful checking framework intended for debacle help and administrations has been exhibited. The ideal administrations, necessities and coming about plan proposition have been indicated. This has prompted a framework that depends fundamentally on ecological examination so as to offer consideration and security administrations to give the self-governance of indigenous habitats. In this sense, ecological acknowledgment is considered, where, in light of past work, novel commitments have been made to help include based and PC vision situations. This epic PC vision procedure utilized as notice framework for avalanche identification depends on changes in the normal landscape. The multi-criteria basic leadership strategy is used to incorporate slope data and the level of variety of the highlights. The reproduction consequences of highlight point discovery are shown in highlight guide coordinating toward discover steady and coordinating component focuses and effectively identified utilizing these two systems, by examining the variety in the distinguished highlights and the element coordinating.

Efficiency Analysis of Government Budget to HRD Program in the field of Information Technology : IT Research Center Case (정보통신분야 HRD사업에 대한 정부예산 지원의 효율성 분석 : 대학의 IT연구센터를 중심으로)

  • Lee, Jung-Mann;Cheon, Won-Suk
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.55-62
    • /
    • 2012
  • This paper analyze the DEA(Data Envelopment Analysis) efficiency of government budget to HRD program(ITRC) and correlation and regression between its inputs and outputs in the field of information technology. First, empirical results show that the relationship between the supporting period of government budget and scientific research & HRD outputs is respectively irrelevant. Second, another finding is that the relationship between government budget and HRD output is positive. Finally, DEA efficiency analysis implicates that SW/digital contents, digital TV, information security, intelligence robot, next generation PC, next generation mobile telecommunication, home network, mathematics, IT SoC are more efficient than any other technology fields.

The design of coffer dam utilized P.R.D. method (P.R.D. 공법을 활용한 가물막이 설계)

  • Park, Chal-Sook;Lee, Kyu-Tak;Yum, Kyung-Taek;Kim, Yoon-Ku;Kang, Bong-Gwon;Lee, Jae-Weon;Lim, Seok-San;Jeong, Ji-Yearl
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2008.10a
    • /
    • pp.869-887
    • /
    • 2008
  • Coffer dam for tunnel type spillway in inflow section of Dae-am dam was originally planned as 2 lines sheet piles with Water Zet method. But, the result of pilot test was caused of some problems that vibration during installation of pile could pollute water and water leakage could the lower part. So, sheet piles was not satisfactory for faculty of coffer dam. Structural instability of sheet pile system need to reinforcement. Characteristic of Dae-am dam was small reservoir capacity but wide drainage area, of which it was judgment that security of leakage and stability was difficult during excavation of inlet part. So, we consider that water curtain method utilized with in site pouring concrete pile method was designed at weir part of spillway. We were known about basement rock that geological boring was carried out in weir part. After taking a deep consideration, PRD method was accepted as a new method. Concrete pile by PRD was installed to below country rock. CJM method was carried out with PRD. After making concrete wall using Top-down method, earth anchors were installed for supporting it. According to the result of numerical analysis, as water level rises, wall is stable.

  • PDF

VLIS Design of OCB-AES Cryptographic Processor (OCB-AES 암호 프로세서의 VLSI 설계)

  • Choi Byeong-Yoon;Lee Jong-Hyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1741-1748
    • /
    • 2005
  • In this paper, we describe VLSI design and performance evaluation of OCB-AES crytographic algorithm that simulataneously provides privacy and authenticity. The OCB-AES crytographic algorithm sovles the problems such as long operation time and large hardware of conventional crytographic system, because the conventional system must implement the privancy and authenticity sequentially with seqarated algorithms and hardware. The OCB-AES processor with area-efficient modular offset generator and tag generator is designed using IDEC Samsung 0.35um standard cell library and consists of about 55,700 gates. Its cipher rate is about 930Mbps and the number of clock cycles needed to generate the 128-bit tags for authenticity and integrity is (m+2)${\times}$(Nr+1), where m and Nr represent the number of block for message and number of rounds for AES encryption, respectively. The OCB-AES processor can be applicable to soft cryptographic IP of IEEE 802.11i wireless LAN and Mobile SoC.

Design of Reconfigurable Processor for Information Security System (정보보호 시스템을 위한 재구성형 프로세서 설계)

  • Cha, Jeong-Woo;Kim, Il-Hyu;Kim, Chang-Hoon;Kim, Dong-Hwi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.113-116
    • /
    • 2011
  • 최근 IT 기술의 급격한 발전으로 개인정보, 환경 등 다양한 정보를 수시로 수집 및 관리하면서 사용자가 원할시 즉각적인 정보서비스를 제공하고 있다. 그러나 유 무선상의 데이터 전송은 정보의 도청, 메시지의 위 변조 및 재사용, DoS(Denial of Service)등 외부의 공격으로부터 쉽게 노출된다. 이러한 외부 공격은 개인 프라이버시를 포함한 정보서비스 시스템 전반에 치명적인 손실을 야기 시킬 수 있기 때문에 정보보호 시스템의 필요성은 갈수록 그 중요성이 부각되고 있다. 현재까지 정보보호 시스템은 소프트웨어(S/W), 하드웨어(ASIC), FPGA(Field Progr- ammable Array) 디바이스를 이용하여 구현되었으며, 각각의 구현방법은 여러 가지 문제점이 있으며 그에 따른 해결방법이 제시되고 있다. 본 논문에서는 다양한 환경에서의 정보보호 서비스를 제공하기 위한 재구성형 SoC 구조를 제안한다. 제안된 SoC는 비밀키 암호알고리즘(AES), 암호학적 해쉬(SHA-256), 공개키 암호알고리즘(ECC)을 수행 할 수 있으며, 마스터 콘트롤러에 의해 제어된다. 또한 정보보호 시스템이 요구하는 다양한 제약조건(속도, 면적, 안전성, 유연성)을 만족하기 위해 S/W, ASIC, FPGA 디바이스의 모든 장점을 최대한 활용하였으며, MCU와의 효율적인 통신을 위한 I/O 인터페이스를 제안한다. 따라서 제안된 정보보호 시스템은 기존의 시스템보다 다양한 정보보호 알고리즘을 지원할 뿐만 아니라 속도 및 면적에 있어 상충 관계를 개선하였기 때문에 저비용 응용뿐만 아니라 고속 통신 장비 시스템에도 적용이 가능하다.

Evaluation of Steep Slopes Adjacent to Multi-use Facilities in National Parks using GIS (GIS를 활용한 국립공원 다중이용시설 인접 급경사지 평가)

  • Lee, Dong Hyeok;Jun, Kye Won;Jung, Min Jin;Park, Jun Hyo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.4
    • /
    • pp.29-36
    • /
    • 2021
  • Recently, due to climate change, the slope is increasing, and the risk of steep slope disasters such as the occurrence of slope collapse in the east coast and Busan region in 2019 and the Gokseong landslide in 2020 is increasing. Particularly, most national parks are made up of mountainous areas, and the risk of disasters on steep slopes is increasing. As the ground of the national park is aging and the weathering and jointing of the bedrock are accelerating due to climate change, the slope collapse and rockfall are increasing, and the annual number of visitors is increasing, it is necessary to manage steep slopes adjacent to multi-use facilities with many users. In this study, dangerous steep slopes that affect multi-use facilities in national parks were analyzed using GIS and verified through field surveys. As a process for extracting steep slopes adjacent to multi-use facilities in national parks, the slope was made in DEM and slopes of 34 degrees or higher were extracted. The difference between the maximum and minimum heights of the extracted slopes was used to confirm that the slopes met the standard for steep slopes, and the analysis of the slope direction was used to confirm whether it had an effect on the multi-use facilities. After that, precision aerial images and field photos were analyzed to finally identify risks at 4 sites, and field surveys were conducted. As a result of the field survey, all 4 sites were found to be steep slopes, 3 were graded D and 1 was graded C, so it was confirmed that management was required as a risk of collapse. All steep slopes extracted through GIS were found to be dangerous, so it is judged that the extraction of steep slopes through GIS would be appropriate.