• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.03 seconds

Optimal Placement Design of Phase-Shifting Transformers for Power System Congestion Problems (계통 혼잡처리를 위한 Phase-Shifting Transformers의 최적 위치 선정)

  • Kim Kyu-Ho;Song Kyung-Bin
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.12
    • /
    • pp.567-572
    • /
    • 2005
  • This paper presents a scheme to design optimal placement of phase-shifting transformers for power system congestion problems. A good design of phase-shifting transformers placement can improve total transfer capability in interconnected systems. In order to find the optimal placement of phase-shifting transformers, the power flows of the interesting transmission lines are evaluated using sequential quadratic programming technique. This algorithm considers power balance equations and security constraints such as voltage magnitudes and transmission line capacities. The proposed scheme is tested in 10 machines 39 buses and IEEE 57 buses systems. Test result shows that the proposed method can find the optimal placement of phase-shifting transformers to solver power system congestion problems.

A Study on the Improvement in Image of Police Box (파출소 이미지 개선에 관한 연구)

  • 이정림
    • Korean Institute of Interior Design Journal
    • /
    • no.9
    • /
    • pp.116-126
    • /
    • 1996
  • Modern society has achieved rapid growth in economy and materials whereas it caused such problems as municipal extension and high density of population, Due to rapid change of social environment, it became more complicated and multifarious than ever it before. Helping the people all kinds of routine affairs police box is giving a negative image to the citizens, for its environment doesn't have got rid of its old fashion . It's being an unharmonious factor to its surroundings, a solution is needed. So, this study is focused on recognizing the change of value system with the flow of time, planning a new image of police box for the change and in consequence recovering the trustworthy between people and the nation. For this , by grasping the characteristics of each space and through space-dividing and design corresponding to it, the plan is provided to make a pleasant interior environment of police box and to make it a symbol of local society. As a result of this study, we will have the police box not only as an office providing the locals with security and service but also as eyes of the country which watches the municipal environment.

  • PDF

A Framework of Rate Control and Power Allocation in Multipath Lossy Wireless Networks

  • Radwan, Amr;Kim, Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1404-1414
    • /
    • 2016
  • Cross-layer design is a concept, which captures the dependencies and interactions and enables information sharing among layers in order to improve the network performance and security. There are two key challenges in wireless networks, lossy features of links and power assumption of network nodes. Cross-layer design of congestion control and power allocation in wireless lossy networks has been studied in the existing literature; however, there has been no contribution proposed in the literature that exploits the path diversity. In this paper, we are motivated to develop a cross-layer design of congestion control and power allocation, which takes into account lossy features of wireless links and transmission powers of network nodes and can be implemented in a distributed manner. Numerical simulation is conducted to illustrate the performance of our proposed algorithm and the comparison with current alternative approaches.

Virtualization based high efficiency naval combat management system design and performance analysis

  • Kwon, Sang-Min;Jung, Seung-Mo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.9-15
    • /
    • 2018
  • The Ministry of National Defense announced 'Defense Reform 2.0' that aims to strengthen the country's security for decrease of regional uncertainties, growing requirements for advanced technologies, and a need for more efficiency in the Republic of Korea(RoK) Armed Forces this year. It said RoK Armed Forces have to change efficiently in preparation for rapid decline in military service resources as demographic cliff turning into reality, and the rapid evolution of the "battlefield environment" caused by developments in military science and technologies. RoK Navy combat Management System(CMS) made by domestic proprietary technology since 2000s and development centered on Agency for Defense Development require design changes for added requirements. So in this paper, I propose method of design a low cost and high efficiency navy CMS architecture based on high performance server and virtualization technology. And I create a test environment for analysis performance and compare the performance of proposed navy CMS and existing navy CMS.

Algorithm Design to Judge Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.50-58
    • /
    • 2019
  • The clear and specific objective of this study is to design a false news discriminator algorithm for news articles transmitted on a text-based basis and an architecture that builds it into a system (H/W configuration with Hadoop-based in-memory technology, Deep Learning S/W design for bigdata and SNS linkage). Based on learning data on actual news, the government will submit advanced "fake news" test data as a result and complete theoretical research based on it. The need for research proposed by this study is social cost paid by rumors (including malicious comments) and rumors (written false news) due to the flood of fake news, false reports, rumors and stabbings, among other social challenges. In addition, fake news can distort normal communication channels, undermine human mutual trust, and reduce social capital at the same time. The final purpose of the study is to upgrade the study to a topic that is difficult to distinguish between false and exaggerated, fake and hypocrisy, sincere and false, fraud and error, truth and false.

A Study on the Effectiveness of an Authorization System for Domestic Crime Prevention Through Environmental Design (국내 범죄예방 환경설계 인증제도의 효과성에 관한 연구)

  • Lim, Dong-Hyun;Lee, Kyung-Hoon
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.6
    • /
    • pp.85-92
    • /
    • 2018
  • This study was to confirm the effectiveness of crime prevention in an apartment complex environmentally designed for domestic crime prevention. The researchers surveyed 267 residents on the community, fear of crime, and crime victimization. They arrived at the following conclusions. The authorization complex received higher security satisfaction results than the unauthorized complex; residents were less afraid of crime and more active in the apartment complex community. These results differ from previous studies in that the fear of crime is not related to a crime victim experience and that the fear of crime is low when there are less households in the apartment complex. Therefore, effectiveness of crime prevention abroad should not be accepted in a domestic residential environment.

Development of MCI Extended Reality-based Cognitive and Motor Training Workbench and Contents Design Proposal for Older People (Extended Reality 기반 고령자 대상 인지·운동 기능 훈련 워크벤치 개발 및 콘텐츠 설계 제안)

  • Kim, Taehong;Kim, Joong Il;Seo, Jeong-Woo;Do, Jun-Hyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1755-1758
    • /
    • 2022
  • One of the most negative social changes of the last decade is population aging which leads to 19 times more patients with Mild Cognitive Disorder(MCI). It is well established that MCI is the most important state that can prevent dementia with early diagnosis and intervention. However, the social security system for patients with dementia is not working properly due to the coronavirus pandemic and the limited human power. This article proposes a form of workbench and design principles for dementia training programs of extended reality devices. and the findings in this study provide a guide for considering the cognitive and physical and social functions of patients.

The Study on the e-Service Quality Factors in m-Shopping Mall App based on the Kano Model (카노 모형을 이용한 모바일 쇼핑몰 앱의 서비스 품질 요인 분석에 관한 연구)

  • Kim, Sang-Oh;Youn, Sun-Hee;Lee, Myung-Jin
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.12
    • /
    • pp.63-72
    • /
    • 2018
  • Purpose - In this study, it is classified the service quality dimension of mobile shopping app using Kano model. In addition, it is evaluated quality factors suitable for strategic management from the viewpoint of service provider through mobile application through binary dimension analysis. Research design, data, and methodology - In this study, seven quality dimensions such as information quality, reliability, immediacy, convenience, design, security and customer service were derived through related studies to make binary shopping quality app quality measurement. 37 sub-variables were set by each quality dimensions. Each questionnaire was composed of positive and negative items like Kano's proposed method, and the satisfaction coefficient suggested by Timko(1993) was examined to understand the influence of each factors on customer satisfaction. Results - As a result of research, shopping app users perceived unity quality factor in most items of service quality dimension such as information quality, reliability, immediacy, convenience and customer service. In addition, the satisfaction coefficient showed a good impression, quick response of the result, fast delivery, and the unsatisfactory coefficient showed more interest in personal information such as payment method safety, and transaction security. As a result of research, shopping app users perceived unity quality factor in most items of service quality dimension such as information quality, reliability, immediacy, convenience and customer service. And, in information quality, the information overload was classified as an apathetic quality component, while the related information provision belonged to an attractive quality component. In reliability quality, customized service provision was classified as an attractive quality component. In instant connectivity, the quality of the connection during transport was classified as an attractive quality component. In convenience quality, access to product information was classified as a one-way quality component. All components of designs quality were classified as attractive quality components, and in security quality, all of their components were all classified as one quality component. Lastly, in customer service, they components were all classified as a single quality component. In addition, the satisfaction coefficient showed a good impression, quick response of the result, fast delivery, and the unsatisfactory coefficient showed more interest in personal information such as payment method safety, and transaction security. Conclusion - In the online service environment, which is difficult to differentiate in terms of upward upgrading only by technological implementation and function, the results of this study can be suggested as a differentiating factor for major channels with customers rather than improve the brand image.

Design of Modified CGA for Address Autoconfiguration and Digital Signature in Hierarchical Ad Hoc Network (개선된 CGA(Modified CGA)를 이용한 계층적 애드 혹 네트워크에서의 주소 자동 설정 및 전자 서명 제공 방안)

  • Lee, Hye-Won;Kim, Guk-Boh;Mun, Young-Song
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.175-182
    • /
    • 2006
  • The CGA proposed by IETF working group prevents address spoofing and stealing and provides digital signature to users, but key collision problem arises. To solve this critical problem, the CGA defines the SEC field within address format, which is set to high value when high security is required and vice versa, but the CGA faces a dilemma between security and the processing time. As SEC value increases, the processing time to generate the CGA grows dramatically while key collision ratio increases if low SEC value is applied to the CGA. We propose modified CGA (MCGA) that has shorter processing time than the CGA and offers digital signature with small overheads. To solve key collision problem, we employ hierarchical ad hoc network. The MCGA is applicable to IPv6 networks as well public networks. In this paper, we design a mathematical model to analyze the processing time for MCGA and CGA first and evaluate the processing time via simulations, where the processing time for MCGA is reduced down 3.3 times when SEC value is set to 0 and 68,000 times when SEC value is set to 1. Further, we have proved that the CGA is inappropriate for both ad hoc networks and IPv6 networks when the SEC field is set to more than 3.

Design of Multimode Block Cryptosystem for Network Security (네트워크 보안을 위한 다중모드 블록암호시스템의 설계)

  • 서영호;박성호;최성수;정용진;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11C
    • /
    • pp.1077-1087
    • /
    • 2003
  • In this paper, we proposed an architecture of a cryptosystem with various operating modes for the network security and implemented in hardware using the ASIC library. For configuring a cryptosystem, the standard block ciphers such as AES, SEED and 3DES were included. And the implemented cryptosystem can encrypt and decrypt the data in real time through the wired/wireless network with the minimum latency time (minimum 64 clocks, maximum 256 clocks). It can support CTR mode which is widely used recently as well as the conventional block cipher modes such as ECB, CBC and OFB, and operates in the multi-bit mode (64, 128, 192, and 256 bits). The implemented hardware has the expansion possibility for the other algorithms according to the network security protocol such as IPsec and the included ciphering blocks can be operated simultaneously. The self-ciphering mode and various ciphering mode can be supported by the hardware sharing and the programmable data-path. The global operation is programmed by the serial communication port and the operation is decided by the control signals decoded from the instruction by the host. The designed hardware using VHDL was synthesized with Hynix 0.25$\mu\textrm{m}$ CMOS technology and it used the about 100,000 gates. Also we could assure the stable operation in the timing simulation over 100㎒ using NC-verilog.