• 제목/요약/키워드: Security Techniques

Search Result 1,571, Processing Time 0.033 seconds

The Kinematical Analysis of Li Xiaopeng Motion in Horse Vaulting (도마운동 Li Xiaopeng 동작의 운동학적 분석)

  • Park, Jong-Hoon;Yoon, Sang-Moon
    • Korean Journal of Applied Biomechanics
    • /
    • v.13 no.3
    • /
    • pp.81-98
    • /
    • 2003
  • The purpose of this study is to closely examine kinematic characteristics by jump phase of Li Xiaopeng motion in horse vaulting and provide the training data. In doing so, as a result of analyzing kinematic variables through 3-dimensional cinematographic using the high-speed video camera to Li Xiaopeng motion first performed at the men's vault competition at the 14th Busan Asian Games, the following conclusion was obtained. 1. It was indicated that at the post-flight, the increase of flight time and height and twisting rotational velocity has a decisive effect on the increase of twist displacement. And Li Xiaopeng motion showed longer flight time and higher flight height than Ropez motion with the same twist displacement of entire movement. Also the rotational displacement of the trunk at peak of COG was much short of $360^{\circ}$(one rotation) but twist displacement showed $606^{\circ}$. Likewise, Li Xiaopeng motion was indicated to concentrate on twist movement in the early flight. 2. It was indicated that at the landing, Li Xiaopeng motion gets the hip to move back, the trunk to stand up and the horizontal velocity of COG to slow down. This is thought to be the performance of sufficient landing, resulting from large security of rotational displacement of airborne and twist displacement. 3. It was indicated that at the board contact, Li Xiaopeng motion made a rapid rotation uprighting the trunk to recover slowing velocity caused by jumping with the horse in the back, and has already twisted the trunk nearly close to $40^{\circ}$ at board contact. Under the premise that elasticity is generated without the change of the feet contacting the board, it will give an aid to the rotation and twist of pre-flight. Thus, in the round-oH phase, the tap of waist according to the fraction and extension of hip joint and arm push is thought to be very important. 4. It was indicated that at the pre-flight, Li Xiaopeng motion showed bigger movement than the techniques of precedented studies rushing to the horse, and overcomes the concern of relatively low power of jump through the rapid rotation of the trunk. Li Xiaopeng motion secured much twist distance, increased rotational distance with the trunk bent forward, resulting in the effect of rushing to the horse. 5. At horse contact, Li Xiaopeng motion makes a short-time contact, and maintains horse take-off angle close to vertical, contributing to the increase of post-flight time and height. This is thought to be resulted from rapid move toward movement direction along with the rotational velocity of trunk rapidly earned prior to horse contact, and little shave of rotation axis according to twist motion because of effective twist in the same direction.

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.

The Analysis on Game Content of Karate Excellent Player (공수도 우수선수들의 경기내용 분석)

  • Jeang, Il-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.129-135
    • /
    • 2015
  • This study was the content and flow of the present study Karate match. 2011, second elimination rounds national developmen, 7th Korea Open International Championships and National development in first elimination rounds, 2012 is a World Cup game against Karate1 in Busan. Man Of The match in the final three games by 5 grade were selected to match match 15, 30 people. I was about to score the study Karate and attack techniques. The conclusion is as follows: 1) In this study, there was a significant difference in use between the class score and the frequency of use of attack technology. The frequency of use of the technology of attack of each class per 60kg or less, 67kg or less, 75kg or less, was the order of 84kg and more than 84kg or less. Frequency of use disonchigi, apsonchigi, apdollyeochagi, geolgi aphurigi. It was followed by scores of attack technology of class per 84kg or more, 60kg or less, 67kg or less, 75kg or less, the following 84kg. 2) Winner has a lot of attack skills than the loser. The game was a draw and the loser disonchigi, apdollyeochagi, apsonchigi. The winner is aphurigi, apdollyeochagi, apsonchigi in the order of many uses.

Design and Implementation of a Backup System for Object based Storage Systems (객체기반 저장시스템을 위한 백업시스템 설계 및 구현)

  • Yun, Jong-Hyeon;Lee, Seok-Jae;Jang, Su-Min;Yoo, Jae-Soo;Kim, Hong-Yeon;Kim, Jun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.1
    • /
    • pp.1-17
    • /
    • 2008
  • Recently, the object based storage devices systems(OSDs) have been actively researched. They are different from existing block based storage systems(BSDs) in terms of the storage unit. The storage unit of the OSDs is an object that includes the access methods, the attributes of data, the security information, and so on. The object has no size limit and no influence on the internal storage structures. Therefore, the OSDs improve the I/O throughput and the scalability. But the backup systems for the OSDs still use the existing backup techniques for the BSDs. As a result, they need much backup time and do not utilize the characteristics of the OSDs. In this paper, we design and implement a new object based backup system that utilizes the features of the OSDs. Our backup system significantly improves the backup time over existing backup systems because the raw objects are directly transferred to the backup devices in our system. It also restores the backup data much faster than the existing systems when system failures occur. In addition, it supports various types of backup and restore requests.

An Efficient Query-based XML Access Control Enforcement Mechanism (효율적인 질의 기반 XML 접근제어 수행 메커니즘)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • As XML is becoming a de facto standard for distribution and sharing of information, the need for an efficient yet secure access of XML data has become very important. To enforce the fine-level granularity requirement, authorization models for regulating access to XML documents use XPath which is a standard for specifying parts of XML data and a suitable language for both query processing. An access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query access. Developing an efficient mechanism for XML databases to control query-based access is therefore the central theme of this paper. This work is a proposal for an efficient yet secure XML access control system. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form which is guaranteed to have no access violations using tree-aware metadata of XML schemes and set operators supported by XPath 2.0. The scheme can be applied to any XML database management system and has several advantages over other suggested schemes. These include implementation easiness, small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

Design of NePID using Anomaly Traffic Analysis and Fuzzy Cognitive Maps (비정상 트래픽 분석과 퍼지인식도를 이용한 NePID 설계)

  • Kim, Hyeock-Jin;Ryu, Sang-Ryul;Lee, Se-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.811-817
    • /
    • 2009
  • The rapid growth of network based IT systems has resulted in continuous research of security issues. Probe intrusion detection is an area of increasing concerns in the internet community. Recently, a number of probe intrusion detection schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of probe intrusion. They can not detect new patterns of probe intrusion. Therefore, it is necessary to develop a new Probe Intrusion Detection technology that can find new patterns of probe intrusion. In this paper, we proposed a new network based probe intrusion detector(NePID) using anomaly traffic analysis and fuzzy cognitive maps that can detect intrusion by the denial of services attack detection method utilizing the packet analyses. The probe intrusion detection using fuzzy cognitive maps capture and analyze the packet information to detect syn flooding attack. Using the result of the analysis of decision module, which adopts the fuzzy cognitive maps, the decision module measures the degree of risk of denial of service attack and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.094% and the max-average false negative rate of 2.936%. The true positive error rate of the NePID is similar to that of Bernhard's true positive error rate.

The Literature Study about the Origin of Sipgan-Sipiji (십간십이지의 기원에 관한 문헌적 고찰)

  • Na, Hyeok-Jin;Kim, Ki-Seung
    • Industry Promotion Research
    • /
    • v.5 no.1
    • /
    • pp.117-124
    • /
    • 2020
  • The purpose of this paper is to find out the origin and significance of Sipgan-Sipiji that Yinyang and five elements are assigned. By looking at the hypotheses that Sipgan-Sipiji may have originated from the ancient Chinese calendar, the contents of the materials recorded in the classical literature, and the records left in the Oracle bone script, we wanted to explore the starting point of Sipgan-Sipiji in Eastern humanities and social sciences that could never be overlooked. Through the literature review of Sipgan-Sipiji, the researcher believes that this code system was completed by Hwangje and his teacher Daeyo, who led paternal clan society in the latter part of the Chinese Neolithic Age, because of supporting the use of the October calendar associated with Sipgan, and because Sipgan in the Oracle bone script seems to keep the sacredness and at the same time to be used to document the time. I believe that this consideration of Sipgan-Sipiji will be helpful for future related research in the process of underlying the research effort of Myeongri Science, such as the security of the logic of the theoretical framework for the theory system and the proof through statistical social science techniques.

DSRC Strategy and Future ITS (DSRC 전략과 향후의 ITS)

  • Park In-Gyu
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.105-119
    • /
    • 2006
  • The car navigation system to be accompanied to the car on-board equipment system or the development of mobile communication technique, the demand in information communication which connects an interior and the car outside is coming to be high, As applications, ETC/VISC/AHS classes get deceived supply are advanced. The research of DSRC radio systems actively, with medium of communication between the automobile and road, is advanced. DSRC radio systems are appropriate in massive data transfer, in the case which the traffic accident evasion is urgent, the notarization of the preferential control function which is necessary to a medium of communication, guarantee and security are suitable in the high-speed network. Accompanied to the cellular phone which is to be supplied recently suddenly, By complementing and coexisting each other, and it will be developed simultaneously. However, in a connection of this kind of communication system and high-speed DSRC radio system, Hand-over technique (network, radio transmission hand-over), there is a technical subject of the high-speed transmission techniques against the mobile devices and the realization is expected to be difficult in near, until 2010 year is becoming the plan of putting to practical use. Also as the next generation DSRC with 5.8GHz built-on board equipment and the road-side equipment are expected in near. In this paper DSRC systems which will be developed are discussed.

Fingerprint Recognition Algorithm using Clique (클릭 구조를 이용한 지문 인식 알고리즘)

  • Ahn, Do-Sung;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.2
    • /
    • pp.69-80
    • /
    • 1999
  • Recently, social requirements of personal identification techniques are rapidly expanding in a number of new application ares. Especially fingerprint recognition is the most important technology. Fingerprint recognition technologies are well established, proven, cost and legally accepted. Therefore, it has more spot lighted among the any other biometrics technologies. In this paper we propose a new on-line fingerprint recognition algorithm for non-inked type live scanner to fit their increasing of security level under the computing environment. Fingerprint recognition system consists of two distinct structural blocks: feature extraction and feature matching. The main topic in this paper focuses on the feature matching using the fingerprint minutiae (ridge ending and bifurcation). Minutiae matching is composed in the alignment stage and matching stage. Success of optimizing the alignment stage is the key of real-time (on-line) fingerprint recognition. Proposed alignment algorithm using clique shows the strength in the search space optimization and partially incomplete image. We make our own database to get the generality. Using the traditional statistical discriminant analysis, 0.05% false acceptance rate (FAR) at 8.83% false rejection rate (FRR) in 1.55 second average matching speed on a Pentium system have been achieved. This makes it possible to construct high performance fingerprint recognition system.

  • PDF

A Risk Factor Detour Multi-Path Routing Scheme in Wireless Multimedia Sensor Networks (무선 멀티미디어 센서 네트워크 환경에서 위험요소 우회 다중 경로 라우팅 기법)

  • Hwang, Donggyo;Son, In-Goog;Park, Junho;Seong, Dong-Ook;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.30-39
    • /
    • 2013
  • In recent years, with the development of devices to collect multimedia data such as small CMOS camera sensor and micro phone, studies on wireless multimedia sensor network technologies and their applications that extend the existing wireless sensor network technologies have been actively done. In such applications, various basic schemes such as the processing, storage, and transmission of multimedia data are required. Especially, a security for real world environments is essential. In this paper, in order to defend the sniffing attack in various hacking techniques, we propose a multipath routing scheme for physically avoiding the data transmission path from the risk factors. Our proposed scheme establishes the DEFCON of the sensor nodes that are geographically close to risk factors and the priorities according to the importance of the data. Our proposed scheme performs risk factor detour multipath routing through a safe path considering the DEFCON and data priority. Our experimental results show that although our proposed scheme takes the transmission delay time by about 5% over the existing scheme, it reduces the eavesdropping rate that can attack and intercept data by the risk factor by about 18%.