• Title/Summary/Keyword: Security design

Search Result 3,415, Processing Time 0.031 seconds

Behavioral, physiological, and hormonal responses during pre-slaughter handling in goats: a comparison between trained and untrained handlers

  • Pavan Kumar;Ahmed Abubakar Abubakar;Muideen Adewale Ahmed;Muhammad Nizam Hayat;Fakhrullah Abd Halim;Md. Moklesur Rahman;Mokrish Ajat;Ubedullah Kaka;Yong-Meng Goh;Awis Qurni Sazili
    • Animal Bioscience
    • /
    • v.37 no.11
    • /
    • pp.2000-2007
    • /
    • 2024
  • Objective: The livestock handler attitude and their handling of animals is crucial for improving animal welfare standards, minimizing stress, improving productivity and meat quality. The present study was undertaken to assess the effect of training livestock handlers on behavioral, physiological, and hormonal responses during preslaughter handling in goats. Methods: A total of 6 handlers were divided into trained (trained in basic animal handling practices, animal behavior, and animal welfare), contact trained (not trained directly but interacted and saw the working of trained handlers), and untrained groups (no formal training). The handling experiment was conducted on 18 male goats by following a crossover design. The goats were moved from lairage to slaughter point by trained, contact-trained, and untrained handlers. Various behavioral, physiological, and hormonal parameters were recorded at the lairage before handling and at the slaughter point after handling the goats. Results: The training of livestock handlers had a significant effect on behavioral, physiological, and hormonal responses in goats. The goats handled by untrained and contact-trained handlers were recorded with intense vocalization, significant (p<0.05) increase in heart rate and blood glucose, and catecholamines (adrenaline and nor-adrenaline), thereby indicating stress and poor animal welfare. The trained handlers were observed to use visual interactions (waving of hands or objects, blocking, hand raising, etc), and lower stress responses were recorded in the goats handled by this group. Conclusion: The present study highlights the importance of training to livestock handlers in improving animal welfare and minimizing stress in goats during pre-slaughter stress.

Efficient Hardware Architecture of SEED S-box for Smart Cards

  • Hwang, Joon-Ho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.4 no.4
    • /
    • pp.307-311
    • /
    • 2004
  • This paper presents an efficient architecture that optimizes the design of SEED S-box using composite field arithmetic. SEED is the Korean standard 128-bit block cipher algorithm developed by Korea Information Security Agency. The nonlinear function S-box is the most costly operation in terms. of size and power consumption, taking up more than 30% of the entire SEED circuit. Therefore the S-box design can become a crucial factor when implemented in systems where resources are limited such as smart cards. In this paper, we transform elements in $GF(2^8)$ to composite field $GF(((2^2)^2)^2)$ where more efficient computations can be implemented and transform the computed result back to $GF(2^8)$. This technique reduces the S-box portion to 15% and the entire SEED algorithm can be implemented at 8,700 gates using Samsung smart card CMOS technology.

A Design of Giga-bit security module Using Fully pipelined CTR-AES (Full-pipelined CTR-AES를 이용한 Giga-bit 보안모듈 설계)

  • Vinh, T.Q.;Park, Ju-Hyun;Kim, Young-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.225-228
    • /
    • 2008
  • In this paper, we presented our implementation of a counter mode AES based on Virtex4 FPGA. Our design exploits three advanced features: composite field arithmetic SubByte, efficient MixColumn transformation, and On-the-Fly Key-Scheduling for fully pipelined architecture. By pipelining the composite field implementation of the S-box, the area cost is reduced to average 17 percent. By designing the On-the-Fly key scheduling, we implemented an efficient key-expander module which is specialized for a pipelined architecture.

  • PDF

A Study on the Escape capacity for Evacuation safety Design of PBD foothold in Korea(I) (국내 PBD기반 피난안전설계를 위한 피난용량 산정에 관한 연구(I) - 국내외 피난용량 산정방안의 비교 -)

  • Seo, Dong-Goo;Hwang, Eun-Kyung;Hwang, Keum-Suk;Kwon, Young-Jin
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2008.11a
    • /
    • pp.340-347
    • /
    • 2008
  • Recently the consideration for occupant's security has been raised as very important design element from the fire by building's large sized, higher storied, and its compounded. But the domestic laws regulated the predicative laws according to the technical standard which has no difference from the past domestic evacuation regulation. Therefore, regulation of escape code and developing technology for Korean conditions are needed to reduce victims during disaster by protecting occupant and guiding people to safe places.

  • PDF

Rights Control for the Exchange and Sharing of IFC Model-based Standard Construction Drawing Information (IFC 모델기반 표준건설도면 정보의 교환 및 공유를 위한 권한제어에 관한 연구)

  • Hong, Kang-Han;Kim, In-Han
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.4
    • /
    • pp.286-295
    • /
    • 2008
  • Construction industry, which is a composite industry being performed by organic combination of various tasks, gives birth to a various of information in the stages of planning, designing, and maintenance management. In particular, the drawing information is broad in the scope of use because it contains all information about buildings as wall as bid, materials, contracts. Therefore, the management of drawing information security is one of the most important factors, which determines the success of failure of business. The major findings and result of this study are as follows to control the distributed drawing information in the collaboration environment. 1) Analysis for function and practical use of DRM in the construction industry. 2) Proposal for applications of DRM that can secure IFC model-based drawing information in the collaboration environment. 3) Extraction from additional IFC entities to apply DRM to part 21 physical files 4) Analysis for functions which are necessary in DRM application prototype system and development of the system. 5) Development IFC model-based DRM prototype system.

A study on improvement of walking safety in newtown schoolzone way (신도시 교육환경개선에 관한 연구 -통학로의 안전성 확보를 중심으로-)

  • Yoon, Yong-Gi
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.10 no.1
    • /
    • pp.53-63
    • /
    • 2011
  • The purpose of this study is to suggest a scheme to provide children safer and more comfortable walking circumstances by survey current walking circumstances of schoolzone ways. A scheme suggested in this study was based on the analysis of survey to elementary school in 3 Newtowns(Dongtan, Dongbaek and Gumdan City) and actually surveyed data on school zone, the scheme can be summed up as follows; First, to avoid pedestrian roads being interrupted and to expend waiting space near schoolzone ways, several measures are needed including fixing roads and building additional gateway. Second, pedestrian crossings in front of school gate should be located at least 30m away from the left side of the gate. Third, to secure pedestrians' safety in school zone ways should be planed and established more security concepts und facilities.

Design of Secure Log System in Cloud Computing Environment (클라우드 컴퓨팅 환경에서의 안전한 로그 시스템 설계)

  • Lee, Byung-Do;Shin, Sang Uk
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.300-307
    • /
    • 2016
  • Cloud computing that provide a elastic computing service is more complex compared to the existing computing systems. Accordingly, it has become increasingly important to maintain the stability and reliability of the computing system. And troubleshooting and real-time monitoring to address these challenges must be performed essentially. For these goals, the handling of the log data is needed, but this task in cloud computing environment may be more difficult compared to the traditional logging system. In addition, there are another challenges in order to have the admissibility of the collected log data in court. In this paper, we design secure logging service that provides the management and reliability of log data in a cloud computing environment and then analyze the proposed system.

Speed Optimized Implementation of HUMMINGBIRD Cryptography for Sensor Network

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.683-688
    • /
    • 2011
  • The wireless sensor network (WSN) is well known for an enabling technology for the ubiquitous environment such as real-time surveillance system, habitat monitoring, home automation and healthcare applications. However, the WSN featuring wireless communication through air, a resource constraints device and irregular network topology, is threatened by malicious nodes such as eavesdropping, forgery, illegal modification or denial of services. For this reason, security in the WSN is key factor for utilizing the sensor network into the commercial way. There is a series of symmetric cryptography proposed by laboratory or industry for a long time. Among of them, recently proposed HUMMINGBIRD algorithm, motivated by the design of the well-known Enigma machine, is much more suitable to resource constrained devices, including smart card, sensor node and RFID tags in terms of computational complexity and block size. It also provides resistance to the most common attacks such as linear and differential cryptanalysis. In this paper, we implements ultra-lightweight cryptography, HUMMINGBIRD algorithm into the resource constrained device, sensor node as a perfectly customized design of sensor node.

Design of Network Controller for Proportional Flow Control Solenoid Valve (비례유량제어밸브 네트워크 제어기 설계)

  • Jung, G.H.
    • Transactions of The Korea Fluid Power Systems Society
    • /
    • v.8 no.4
    • /
    • pp.17-23
    • /
    • 2011
  • Proportional control solenoid is a type of modulating valve that can continuously control the valve position with magnetic force of solenoid. Recent microcontroller based digital servocontroller for proportional valve is being developed toward the smart valve with additional features such as enhanced control algorithm for finer process and intelligent on-board diagnosis for maintenance. In this paper, development of servocontroller network control with CAN bus which is free from problems of security and network traffic jam is presented. Design of network control system includes modes of communication between master and slave, assignment of 29bit message identifier and message objects, transaction of communication sequence, etc. Monitoring function and control experiments for remote valve through CAN network prove the extended function of smart valve control system.

A DRM Framework for Distributing Digital Contents through the Internet

  • Lee, Jun-Seok;Hwang, Seong-Oun;Jeong, Sang-Won;Yoon, Ki-Song;Park, Chang-Soon;Ryou, Jae-Cheol
    • ETRI Journal
    • /
    • v.25 no.6
    • /
    • pp.423-436
    • /
    • 2003
  • This paper describes our design of a contents distribution framework that supports transparent distribution of digital contents on the Internet as well as copyright protection of participants in the contents distribution value chain. Copyright protection must ensure that participants in the distribution channel get the royalties due to them and that purchasers use the contents according to usage rules. It must also prevent illegal draining of digital contents. To design a contents distribution framework satisfying the above requirements, we first present four digital contents distribution models. On the basis of the suggested distribution models, we designed a contract system for distribution of royalties among participants in the contents distribution channel, a license mechanism for enforcement of contents usage to purchasers, and both a packaging mechanism and a secure client system for prevention of illegal draining of digital contents.

  • PDF