• Title/Summary/Keyword: Security design

Search Result 3,415, Processing Time 0.029 seconds

Ergonomic Design of Standard Wheelchair for Korean Adults (한국 성인용 표준 휠체어의 인간공학적 설계)

  • Lee, Sang-Do;Yoo, Byung-Chul
    • Journal of the Korean Society of Safety
    • /
    • v.8 no.2
    • /
    • pp.94-98
    • /
    • 1993
  • This study discusses a possible ergonomics application for adult wheelchair design in consideration of anthropometry, physical load, control ability, posture, subjective analysis, security and so on. Korean normal adults who ever used wheelchairs are examined. And anthropometric data and basic data to make standard wheelchair are provided.

  • PDF

System Design and Realization for Real Time DVR System with Robust Video Watermarking (강인한 비디오 워터마킹을 적용한 실시간 DVR 시스템의 설계 구현)

  • Ryu Kwang-Ryol;Kim Ja-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1019-1024
    • /
    • 2006
  • A system design and realization for real time DVR system with robust video watermarking algorithm for contents security is presented in this paper. The robust video watermarking is used the intraframe space region and interframe insertion simultaneously, and to be processed at real time on image data and algorithm is used the 64bits special purpose quad DSP processor with assembly and soft pipeline codes. The experimental result shows that the processing time takes about 2.5ms in the D1 image per frame for 60% moving image.

Design and Implementation of Role-Based Access Control Package for Java Applications (자바 애플리케이션을 위한 역할기반 접근제어 패키지의 설계 및 구현)

  • Oh, Se-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1134-1141
    • /
    • 2006
  • Java is platform-independent and supports uniform solutions from mobile area (J2ME) to enterprise area (J2EE), so Java is a good development tool for the environment of heterogeneous machines and distributed applications. Java applications need access control module as a Java package. In this paper, we design and implement it. Therefore Java developers can reduce development time, and system managers easily do access control work. Proposed module is based on Role-Based Access Control (RBAC) model and includes a Java package and administration tool.

  • PDF

An Effect of Website quality on Service Value and Customer Satisfaction in the Internet Banking (인터넷뱅킹에서 웹사이트 품질이 서비스가치와 고객만족에 미치는 영향)

  • Jo, Cheol-Ho;Park, Jeong-Won;Kim, Jong-Won
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2006.04a
    • /
    • pp.216-223
    • /
    • 2006
  • An Effect of Website quality on Service Value and Customer Satisfaction in the Internet Banking Internet Banking is very popular in Korea these days. More than 25million are using Internet Banking. This study is to find Quality Factors for Internet Banking Services and relationship among Internet Banking Service Value, Customer Satisfaction and Reuse. In this study we found that Service Value is prior to Customer Satisfaction. And also, Service Value and Customer Satisfaction affect customers reuse respectively. This study also found that 7 factors compose Internet Banking Service Quality. They are Convenience Security, Informal ion Providing, Communication, Design, System Correcteness. Convenience, Informal ion Providing, Communication and Design affect Internet Banking Service Value. System, Correcteness and Convenience affect Customer Satisfaction. So we learened that Internet Banking Customers discriminate Service Value from Satisfaction.

  • PDF

Performance Evaluation and Design of Intrusion Detection System Based on Immune System Model (면역 시스템 모델을 기반으로 한 침입 탐지 시스템 설계 및 성능 평가)

  • 이종성
    • Journal of the Korea Society for Simulation
    • /
    • v.8 no.3
    • /
    • pp.105-121
    • /
    • 1999
  • Computer security is considered important due to the side effect generated from the expansion of computer network and rapid increase of the use of computers. Intrusion Detection System(IDS) has been an active research area to reduce the risk from intruders. We propose a new IDS model, which consists of several computers with IDS, based on the immune system model and describe the design of the IDS model and the prototype implementation of it for feasibility testing and evaluate the performance of the IDS in the aspect of detection time, detection accuracy, diversity which is feature of immune system, and system overhead. The IDSs are distributed and if any of distributed IDSs detect anomaly system call among system call sequences generated by a privilege process, the anomaly system call can be dynamically shared with other IDSs. This makes the IDSs improve the ability of immunity for new intruders.

  • PDF

A Study on Noise in Waste Facilities (폐기물 소각시설 내부 소음에 관한 연구)

  • Seo, Byung-Suk;Park, Ro-Gook;Jeon, Yong-Han
    • Journal of the Korea Safety Management & Science
    • /
    • v.22 no.2
    • /
    • pp.15-21
    • /
    • 2020
  • Industrial facilities need design to predict and reduce noise from design to prevent and reduce noise. The purpose of this study is to predict worker's environment and evaluate safety by analyzing noise inside underground blower room and air compressor room with fluid machinery in waste facility. This waste incineration facility was analyzed based on the ground floor, ground floor blower chamber, and air compressor chamber. The results of SPL(Sound Pressure Level) analysis at 1.5m away, which are frequently used to measure the SPL as a noise source, are as follows. SPL of basement level: 46.80[dB], SPL of ground layer: 48.57[dB]. As a result, it was expected that the noise level would be considerably lower than the 8 hours 50[dB] noise exposure per day.

Diffractive Optical Element for Noise-reduced Beam Shaping of Multi-array Point Light Source

  • Lee, Jonghyun;Hahn, Joonku;Kim, Hwi
    • Current Optics and Photonics
    • /
    • v.5 no.5
    • /
    • pp.506-513
    • /
    • 2021
  • An arrayed diffractive optical element design for the beam-shaping of a multi-array light source is proposed. This is an essential device for recent optical security and face recognition applications. In practice, we devise a DC noise reduction technique featuring high fabrication error tolerance regarding the multi-array light source diffractive optical elements, as a necessary part of the proposed design method. The spherical diverging illumination leads to DC-conjugate noise spreading. The main idea is tested experimentally, and the multi-array light source diffraction pattern is investigated numerically.

Ring Signature Scheme Based on Lattice and Its Application on Anonymous Electronic Voting

  • Zhou, Yihua;Dong, Songshou;Yang, Yuguang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.287-304
    • /
    • 2022
  • With the development of quantum computers, ring signature schemes based on large integer prime factorization, discrete logarithm problem, and bilinear pairing are under threat. For this reason, we design a ring signature scheme based on lattice with a fixed verification key. Compared with the previous ring signature scheme based on lattice, our design has a fixed verification key and does not disclose the signer's identity. Meanwhile, we propose an anonymous electronic voting scheme by using our ring signature scheme based on lattice and (t, n) threshold scheme, which makes up for the lack of current anonymous electronic voting that cannot resist attacks of the quantum computer. Finally, under standard model (SM), we prove that our ring signature scheme based on lattice is anonymous against the full-key exposure, and existentially non-forgeable against insider corruption. Furthermore, we also briefly analyze the security of our anonymous electronic voting scheme.

Fitting acyclic phase-type distributions by orthogonal distance

  • Pulungan, Reza;Hermanns, Holger
    • Advances in Computational Design
    • /
    • v.7 no.1
    • /
    • pp.37-56
    • /
    • 2022
  • Phase-type distributions are the distributions of the time to absorption in finite and absorbing Markov chains. They generalize, while at the same time, retain the tractability of the exponential distributions and their family. They are widely used as stochastic models from queuing theory, reliability, dependability, and forecasting, to computer networks, security, and computational design. The ability to fit phase-type distributions to intractable or empirical distributions is, therefore, highly desirable for many practical purposes. Many methods and tools currently exist for this fitting problem. In this paper, we present the results of our investigation on using orthogonal-distance fitting as a method for fitting phase-type distributions, together with a comparison to the currently existing fitting methods and tools.

Discernment of Android User Interaction Data Distribution Using Deep Learning

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.143-148
    • /
    • 2022
  • In this paper, we employ deep neural network (DNN) to discern Android user interaction data distribution from artificial data distribution. We utilize real Android user interaction trace dataset collected from [1] to evaluate our DNN design. In particular, we use sequential model with 4 dense hidden layers and 1 dense output layer in TensorFlow and Keras. We also deploy sigmoid activation function for a dense output layer with 1 neuron and ReLU activation function for each dense hidden layer with 32 neurons. Our evaluation shows that our DNN design fulfills high test accuracy of at least 0.9955 and low test loss of at most 0.0116 in all cases of artificial data distributions.