• Title/Summary/Keyword: Security design

Search Result 3,415, Processing Time 0.035 seconds

Study of Eye Blinking to Improve Face Recognition for Screen Unlock on Mobile Devices

  • Chu, Chung-Hua;Feng, Yu-Kai
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.953-960
    • /
    • 2018
  • In recently, eye blink recognition, and face recognition are very popular and promising techniques. In some cases, people can use the photos and face masks to hack mobile security systems, so we propose an eye blinking detection, which finds eyes through the proportion of human face. The proposed method detects the movements of eyeball and the number of eye blinking to improve face recognition for screen unlock on the mobile devices. Experimental results show that our method is efficient and robust for the screen unlock on the mobile devices.

Conceptual Design of a Remote Monitoring and Control System for Nuclear Power Plants

  • Lee Seung Jun;Kim Jong Hyun;Seong Poong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.35 no.3
    • /
    • pp.243-250
    • /
    • 2003
  • Nuclear power plants (NPPs) will be highly connected network enabled systems in the future. Using the network and web enabled tools, NPPs will be remotely monitored by operators at any time from any place connected to the network via a general web browser. However, there will be two major issues associated with this implementation. The first is the security issue. Only the authorized persons need to be allowed to access the plant since NPP is a safety-critical system. However, the web technology is open to the public. The second is the network disturbance issue. If operators can not access the plant due to network disturbances, the plant will come into the out-of-control situation. Therefore, in this work, we performed a conceptual design of a web-based remote monitoring and control system (RMCS) considering these issues.

Design and Analysis of the GOST Encryption Algorithm (GOST 암호화 알고리즘의 구현 및 분석)

  • 류승석;정연모
    • Journal of the Korea Society for Simulation
    • /
    • v.9 no.2
    • /
    • pp.15-25
    • /
    • 2000
  • Since data security problems are very important in the information age, cryptographic algorithms for encryption and decryption have been studied for a long time. The GOST(Gosudarstvennyi Standard or Government Standard) algorithm as a data encryption algorithm with a 256-bit key is a 64-bit block algorithm developed in the former Soviet Union. In this paper, we describe how to design an encryption chip based on the GOST algorithm. In addition, the GOST algorithm is compared with the DES(Data Encryption Standard) algorithm, which has been used as a conventional data encryption algorithm, in modeling techniques and their performance. The GOST algorithm whose key size is relatively longer than that of the DES algorithm has been expanded to get better performance, modeled in VHDL, and simulated for implementation with an CPLD chip.

  • PDF

A Study of an Effective Database Design Method for Power System Protection (효율적인 계통보호 데이터베이스 디자인 방법에 관한 연구)

  • Ahn, Y.T.;Choi, M.S.;Lee, S.J.;Kang, S.H.;Kim, H.P.;Choi, H.S.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.905-907
    • /
    • 1998
  • The setting of protective relays, which is critical to the system security, requires a huge volume of data and a lot of repetitive calculations. Since an effective design of a database is essential. The relay setting database must accommodate a variety of protective devices. Also its information can be viewed and updated with easy by humans and by computer programs. This paper describes several existing database designs for power system protection, their advantages and disadvantages. Also this paper develops an effective database for power system protection with their advantages.

  • PDF

A Study on the Disaster Safety Assessment on the Analysis of Educational Facilities due to Disasters (교육시설 재난사고 실태 분석에 따른 재난안전 평가 방향에 관한 연구)

  • Heo, Byung-Iee;Kim, Sung-Joong
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.11 no.3
    • /
    • pp.25-35
    • /
    • 2012
  • Even though newly formed schools do struggle to strengthen their security in safety, existed schools have limitations for active response against natural disaster. From analyzing the results of accident cases and states in misfortune and the safety supervision of school facilities, it is said that damages by wind, flood and fire are typical types of disaster accidents. Also, according to the basic law of misfortune and the safety supervision, it emphasizes education, training, and actions that prevent from being a victim of natural disaster. In terms of these finding, establishing disaster safety organization, control system and having students an opportunity to learn how to response against disaster should be critical component in managing disaster safety of school facilities.

Pressure impulse diagrams for simply-supported steel columns based on residual load-carrying capacities

  • Park, Jong Yil;Krauthammer, Theodor
    • Structural Engineering and Mechanics
    • /
    • v.39 no.2
    • /
    • pp.287-301
    • /
    • 2011
  • This paper is focused on the residual capacity of steel columns, as a damage criterion. Load-Impulse (P-I) diagrams are frequently used for analysis, design, or assessment of blast resistant structures. The residual load carrying capacity of a simply supported steel column was derived as a damage criterion based on a SDOF computational approach. Dimensionless P-I diagrams were generated numerically with this quantitative damage criterion. These numerical P-I diagrams were used to show that traditional constant ductility ratios adopted as damage criteria are not appropriate for either the design or damage assessment of blast resistant steel columns, and that the current approach could be a much more appropriate alternative.

Arduino Based Smart Home System for the Elderly Living Alone (아두이노 기반의 독거노인을 위한 스마트홈 시스템)

  • Lee, In-Gu;Cho, Myeon-Gyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.5
    • /
    • pp.307-315
    • /
    • 2015
  • Recently, Smart Home System(SHS) is applied in order to provide comfort, energy efficient and better security to the residence. Thus, by introducing the SHS in the house of elderly people, it is possible to provide a convenient and safe life for old people especially living alone. This paper presents the design and implementation of a low cost but yet flexible and secure smart-phone based SHS. The design is based on inter-working between Arduino board with Bluetooth and Arduino board with Ethernet shield, and the home monitor/appliances are connected to the input/output ports of this board via sensors/relays. In addition, when the old man is put on an emergency, the proposed system will automatically notify it the family. Therefore, we have implemented an inexpensive and efficient SHS for the elderly living alone by inter-working smart phones, internet server and Arduino micro-controller.

Neutral Reference Model for Engineering Change Propagation in Global Top-down Modeling Approach

  • Hwang, Jin-Sang;Mun, Du-Hwan;Han, Soon-Hung
    • International Journal of CAD/CAM
    • /
    • v.7 no.1
    • /
    • pp.81-89
    • /
    • 2007
  • As the modular production is an important issue in globalized manufacturing industries, sub modules or parts of the final product are provided by many suppliers. Some part suppliers design their own products for themselves. In some cases, part supplier may provide the same type product to multiple 1-tier companies. Because all suppliers and 1-tier companies can not use the same CAD system in general case, the engineering change in the CAD model of one company could not propagate to related CAD models of other companies directly. Although they use the same CAD system, it is hard to share their CAD model with each other because of company security policy. In this paper, the neutral reference model, which consists of the neutral skeleton model and the external reference model, is proposed to apply a global top-down modeling approach to collaborating companies.

Architecture Design for Guaranteeing Quality of Data Communication in NGcN (차세대 통합망에서 데이터 통신의 품질을 보장하기 위한 기법)

  • Ryu Sang-Hoon;Baik Doo-Kwon
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.1-4
    • /
    • 2005
  • Information communication environment integrates communication, broadcasting and internet, and Digital Convergence service emerges in result. Thus, the effective routers are needed so that they can transmit a huge number of data to core internet through appropriate base center. Therefore, the network guaranteeing QoS in transport layer supports interoperability with different wireless networks. So as to users receive necessary information anywhere seamlessly, the network architecture focuses on packet transmission and it is efficient for the control layer switches and controls packets between different networks. Since individual users take advantage of different services and data, the effective router architecture must be designed. Hence in this paper we design monitoring technique to solve security problem and to support premium service to ultimate users. Thereafter, we run opnet simulation and show the improvement of proposed router architecture.

  • PDF

Design of a Cryptographic Processor Dedicated to VPN (VPN에 특화된 암호가속 칩의 설계 및 제작)

  • Lee, Wan-Bok;Roh, Chang-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.852-855
    • /
    • 2005
  • This paper introduces a case study of designing a cryptographic processor dedicated to VPN/SSL system. The designed processor supports not only block cipher algorithm, including 3DES, AES, and SEED, but also 163 bit ECC public key crypto algorithm. Moreover, we adopted PCI Master interface in the design, which guarantees fast computation of cryptographic algorithm prevalent in general information security systems.

  • PDF