• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.04 seconds

Wireless Buoy System with Remote Sensing and Access Capability (원격탐지기능을 갖는 무선부표시스템)

  • Kwon, Won-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.549-556
    • /
    • 2011
  • In this paper, high performance radio buoy system for inshore and deep sea fishery is proposed and implemented. Binary FSK modulation technique is used for real-time communication & control between buoys and buoy finder, and optimum access protocol is adopted for minimizing the power consumption of radio buoy system. Using the GPS and sensor techniques, location and environments of radio buoy can be accurately monitored and traced by the mother ship. Developed buoy system with 10 W transmitting power can cover over 120km coastal range and operate more than 73 days of battery life. Proposed digital coding methods can also assure high security from burglary and loss.

A Critical Review of Current Crisis Simulation Methodology

  • Kim, Hak-Kyong;Lee, Ju-Lak
    • International Journal of Contents
    • /
    • v.7 no.1
    • /
    • pp.58-64
    • /
    • 2011
  • This paper is concerned with simulation exercises used to train key response agencies for crisis situations. While 'multi-agency' simulations are increasingly acknowledged as a necessary and significant training tool for emergency response organisations, many current crisis simulations are still focused on the revision of existing response plans only. However, a crisis requires a rapid reaction, yet in contrast to an 'emergency', the risks for critical decision makers in crisis situations are difficult to measure, owing to their ill-structure. In other words, a crisis situation is likely to create great uncertainty, unfamiliarity and complexity, and consequently should be managed by adaptive or second order expertise and techniques, rather than routine or structured responses. In this context, the paper attempts to prove that the current practices of simulation exercises might not be good enough for uncertain, unfamiliar, and complex 'crisis' situations, in particular, by conducting case studies of two different underground fire crises in Korea (Daegu Subway Fire 2003) and the UK (King's Cross Fire 1987). Finally, it is suggested that the three abilities: 'flexibility', 'improvisation' and 'creativity' are critical in responding to a crisis situation.

Study on the environment design element of Japan subway station wall - Laying stress on techniques of ceramic mural that is manufactured in 2000 years - (일본 지하철 역 벽면의 환경디자인 요소에 관한 연구 - 2000년도에 제작된 도자 벽화의 기법을 중심으로 -)

  • 이병수
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2003.05a
    • /
    • pp.170-173
    • /
    • 2003
  • Because effect about environmental effect that get to human visually is absolute, ability that mural of subway interior considers relation with space is required. Also, public environment element should be designed must intend agreeableness sex by same traitor effect of quality of the material and color and can be evaluated by cultural inheritance that is powerful enemy same time. Wish to accomplish access as meaning of city environment improvement of wall of subway station or underground space etc. through Japan course South Korea's illustration regarding environment landscaping features that is designed in wall of latest domestic building subway interior in this research. Various and new reading by that study and analyze manufactured wall environment landscaping features recently that could find and was approached in variouser technique, practical use of material than single material and is expressed according to history's special quality and planning know can. Underground space can give agreeableness feel and psychological sense of security by user though expression method, material, color plan etc. consist because is having image blockade enemy. Therefore, wall environment landscaping features of underground space to be cultural value and environment Dija because diversified research that is accompanied in element is gone subway interior space of our country and underground space etc. as new culture space develop be able to must.

  • PDF

Advances in Cyber-Physical Systems Research

  • Wan, Jiafu;Yan, Hehua;Suo, Hui;Li, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.1891-1908
    • /
    • 2011
  • Cyber-physical systems (CPSs) are an emerging discipline that involves engineered computing and communicating systems interfacing the physical world. The widespread applications of CPSs still face enormous challenges because of the lack of theoretical foundations. In this technical survey, we review state-of-the-art design techniques from various angles. The aim of this work is to provide a better understanding of this emerging multidisciplinary methodology. The features of CPSs are described, and the research progress is analyzed using the following aspects: energy management, network security, data transmission and management, model-based design, control technique, and system resource allocation. We focus on CPS resource optimization, and propose a system performance optimization model with resource constraints. In addition, some classic applications (e.g., integrating intelligent road with unmanned vehicle) are provided to show that the prospects of CPSs are promising. Furthermore, research challenges and suggestions for future work are outlined in brief.

A Test Scenario Generation Technique based on Task Information for Interaction Testing among Android Components (안드로이드 컴포넌트 상호작용 테스팅을 위한 태스크 정보기반 테스트 시나리오 생성 기법)

  • Baek, Tae-San;Lee, Woo Jin
    • Journal of KIISE
    • /
    • v.44 no.6
    • /
    • pp.595-600
    • /
    • 2017
  • Android applications are composed of one or more components. The components within an application or several applications may interact with each other primarily through intents. Such interactions may cause security and reliability issues such as broadcast theft, activity hijacking, and intent spoofing. These problems need to be resolved through testing techniques using various interaction test scenarios before an application gets launched. However, with the existing test scenario generation approach, some infeasible test scenarios may be generated since they do not consider the re-execution order based on activity setting when pressing the back button. This paper proposes a test case generation technique which removes infeasible interaction paths by utilizing the activity stack information.

A Study on Vulnerability Analysis Techniques for Secure Weapon System Software (안전한 무기체계 소프트웨어를 위한 취약점 분석 기법에 관한 연구)

  • Kim, Jong-Bok;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.459-468
    • /
    • 2018
  • Cyberattacks on information systems used by applications related to weapon system and organizations associated with national defense put national security at risk. To reduce these threats, continuous efforts such as applying secure coding from the development stage or managing detected vulnerabilities systematically are being made. It also analyzes and detects vulnerabilities by using various analysis tools, eliminates at the development stage, and removes from developed applications. However, vulnerability analysis tools cause problems such as undetected, false positives, and overdetected, making accurate vulnerability detection difficult. In this paper, we propose a new vulnerability detection method to solve these problems, which can assess the risk of certain applications and create and manage secured application with this data.

Optimization of multiplication-techniques for a Pairing for sensor network security protocol based on bilinear map (Bilinear map 기반 센서네트워크 보안프로토콜을 위한 Pairing용 곱셈 최적화 기법)

  • Seo, Hwa-Jeong;Lee, Dong-Geon;Kim, Ho-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06a
    • /
    • pp.166-170
    • /
    • 2010
  • 센서네트워크는 유비쿼터스 환경을 실현할 수 있는 기술로서, 최근 무인 경비 시스템이나 에너지 관리, 환경 모니터링, 홈 자동화, 헬스케어 응용 등과 같은 다양한 응용 분야에 활용되고 있다. 하지만 자신의 정보가 무선통신상에 쉽게 노출됨으로써 도청과 전송 메시지에 대한 위변조, 서비스 거부 공격을 받을 위험이 있다. 더욱이 센서네트워크의 자원 제약성(적은 메모리, 컴퓨팅 성능의 제약)과 키분배 관리의 어려움으로 인해 기존의 공개키, 대칭키 기반의 면안프로토콜을 대체할 수 있는 프로토콜이 필요하다. 그러므로 키분배 관리에 장 접을 가지는 Bilinear map 기반 프로토콜은 적합한 대안이다. 하지만 프로토콜에 사용되는 Pairing연산은 높은 컴퓨팅 성능이 요구된다. 따라서 제한된 성능을 가진 센서상의 구현을 위해서는 Computation Cost를 줄이고 연산 수행 속도를 가속화 할 필요성이 있다. 본 논문에서는 프로토콜 구현에 필요한 Pairing의 핵심 연산인 Multiplication을 대표적인 센서노드 프로세서인 MSP430상에서 최적화 구현함으로써 성능을 개선한다.

  • PDF

Spatial Operation Allocation Scheme over Common Query Regions for Distributed Spatial Data Stream Processing (분산 공간 데이터 스트림 처리에서 질의 영역의 겹침을 고려한 공간 연산 배치 기법)

  • Chung, Weon-Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.6
    • /
    • pp.2713-2719
    • /
    • 2012
  • According to increasing of various location-based services, distributed data stream processing techniques have been widely studied to provide high scalability and availability. In previous researches, in order to balance the load of distributed nodes, the geographic characteristics of spatial data stream are not considered. For this reason, distributed operations for adjacent spatial regions increases the overall system load. We propose a operation allocation scheme considering the characteristics of spatial operations to effectively processing spatial data stream in distributed computing environments. The proposed method presents the efficient share maximizing approach that preferentially distributes spatial operations sharing the common query regions to the same node in order to separate the adjacent spatial operations on overlapped regions.

Design of False Alerts Reducing Model Using Fuzzy Technique for Intrusion Detection System (퍼지기법을 이용한 침입 탐지 시스템 오류경고메시지 축소 모델 설계)

  • Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.794-798
    • /
    • 2007
  • As the development of information technology and thus the growth of security incidents, so implement are coming out for defense the intrusion about the system. However the error detection program has got a difficulty to find out the intrusions because that has become so many false alert messages. In this study is how to reduce the messages for the false alerts which come from the internal of the network and using the Fuzzy techniques for reduce the uncertainty of the judge. Therefore it makes the model which can decrease false alert message for better detection.

  • PDF

Predictive maintenance architecture development for nuclear infrastructure using machine learning

  • Gohel, Hardik A.;Upadhyay, Himanshu;Lagos, Leonel;Cooper, Kevin;Sanzetenea, Andrew
    • Nuclear Engineering and Technology
    • /
    • v.52 no.7
    • /
    • pp.1436-1442
    • /
    • 2020
  • Nuclear infrastructure systems play an important role in national security. The functions and missions of nuclear infrastructure systems are vital to government, businesses, society and citizen's lives. It is crucial to design nuclear infrastructure for scalability, reliability and robustness. To do this, we can use machine learning, which is a state of the art technology used in various fields ranging from voice recognition, Internet of Things (IoT) device management and autonomous vehicles. In this paper, we propose to design and develop a machine learning algorithm to perform predictive maintenance of nuclear infrastructure. Support vector machine and logistic regression algorithms will be used to perform the prediction. These machine learning techniques have been used to explore and compare rare events that could occur in nuclear infrastructure. As per our literature review, support vector machines provide better performance metrics. In this paper, we have performed parameter optimization for both algorithms mentioned. Existing research has been done in conditions with a great volume of data, but this paper presents a novel approach to correlate nuclear infrastructure data samples where the density of probability is very low. This paper also identifies the respective motivations and distinguishes between benefits and drawbacks of the selected machine learning algorithms.