• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.034 seconds

Using PHP on the Internet Design and Implementation of Used Transaction System (인터넷 상에서 PHP를 이용한 중고거래 시스템의 설계 및 구현)

  • Hwang, Ho-yeon;kwon, Se-hyun;Jo, Su-jang;Hwang, Seung-jin;Yoo, Ji-yeon;Shin, Seong-Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.712-714
    • /
    • 2018
  • The system of this paper designs and implements a used trading system that is commonly used on the Internet. In order to pursue local transactions based on location, we designed the system by dividing the region in consideration of the general characteristics of used transactions that are restricted by transactions through distance and location. To do this, I used MySQL as the database engine and I used PHP, an Internet server-based scripting language, for database interworking. Due to the characteristics of secondary transactions, information security and design of each product are considered.

  • PDF

Using PHP on the Internet Design and Implementation of Used Transaction System (인터넷 상에서 PHP를 이용한 중고거래 시스템의 설계 및 구현)

  • Hwang, Ho-yeon;kwon, Se-hyun;Jo, Su-jang;Hwang, Seung-jin;Yoo, Ji-yeon;Shin, Seong-Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.353-355
    • /
    • 2018
  • The system of this paper designs and implements a used trading system that is commonly used on the Internet. In order to pursue local transactions based on location, we designed the system by dividing the region in consideration of the general characteristics of used transactions that are restricted by transactions through distance and location. To do this, I used MySQL as the database engine and I used PHP, an Internet server-based scripting language, for database interworking. Due to the characteristics of secondary transactions, information security and design of each product are considered.

  • PDF

Development of a Simplified Vulnerability Analysis Program for Naval Vessel (함정 간이 취약성 해석 프로그램 개발에 대한 연구)

  • Shin, Yun-Ho;Kwon, Jeong-Il;Chung, Jung-Hoon
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.50 no.6
    • /
    • pp.383-389
    • /
    • 2013
  • Analysis and review of survivability is one of the most important aspects when naval vessels are designed. Because aiming points of threat towards the naval vessels in the battle field could not be estimated exactly, probabilistic and statistic approach is frequently introduced to evaluate and enhance the vessel survivability. Some commercial survivability analysis programs are used to perform the analysis for enhancement of susceptibility, vulnerability and recoverability but, they are usually classified and impossible to be exported to other countries because of their national security. In this paper, a simplified vulnerability analysis program is developed to evaluate the vulnerability of the warship in aspects of structure, redundancy and its mission capability at the conceptual design stage. To verify the developed program, the analysis results were compared with those of the commercial program MOTISS(Measure of Total Integrated System Survivability).

Design and Fabrication of Low Power Sensor Network Platform for Ubiquitous Health Care

  • Lee, Young-Dong;Jeong, Do-Un;Chung, Wan-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1826-1829
    • /
    • 2005
  • Recent advancement in wireless communications and electronics has enabled the development of low power sensor network. Wireless sensor network are often used in remote monitoring control applications, health care, security and environmental monitoring. Wireless sensor networks are an emerging technology consisting of small, low-power, and low-cost devices that integrate limited computation, sensing, and radio communication capabilities. Sensor network platform for health care has been designed, fabricated and tested. This system consists of an embedded micro-controller, Radio Frequency (RF) transceiver, power management, I/O expansion, and serial communication (RS-232). The hardware platform uses Atmel ATmega128L 8-bit ultra low power RISC processor with 128KB flash memory as the program memory and 4KB SRAM as the data memory. The radio transceiver (Chipcon CC1000) operates in the ISM band at 433MHz or 916MHz with a maximum data rate of 76.8kbps. Also, the indoor radio range is approximately 20-30m. When many sensors have to communicate with the controller, standard communication interfaces such as Serial Peripheral Interface (SPI) or Integrated Circuit ($I^{2}C$) allow sharing a single communication bus. With its low power, the smallest and low cost design, the wireless sensor network system and wireless sensing electronics to collect health-related information of human vitality and main physiological parameters (ECG, Temperature, Perspiration, Blood Pressure and some more vitality parameters, etc.)

  • PDF

Innovative Model-Based PID Control Design for Bus Voltage Regulation with STATCOM in Multi-Machine Power Systems (STATCOM을 사용한 다기 전력 계통의 버스 전압 조절을 위한 모델 기반 PID 제어기 설계)

  • Kim, Seok-Kyoon;Lee, Young Il;Song, Hwachang;Kim, Jung-Su
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.4
    • /
    • pp.299-305
    • /
    • 2013
  • The complexity and severe nonlinearity of multi-machine power systems make it difficult to design a control input for voltage regulation using modern control theory. This paper presents a model-based PID control scheme for the regulation of the bus voltage to a desired value. To this end, a fourth-order linear system is constructed using input and output data obtained using the TSAT (Transient Security Assessment Tool); the input is assumed to be applied to the grid through the STATCOM (STATic synchronous COMpensator) and the output from the grid is a bus voltage. On the basis of the model, it is identified as to which open-loop poles of the system make the response to a step input oscillatory. To reduce this oscillatory response effectively, a model-based PID control is designed in such a way that the oscillatory poles are no longer problematic in the closed loop. Simulation results show that the proposed PID control dampens the response effectively.

A Study on the Environment Characteristics and Continuous Usage Intention for Improvement of Fintech (핀테크 활성화를 위한 사용환경특성과 지속사용의도)

  • Jung, Dae-Hyun;Chang, Hwal-Sik;Park, Kwang-O
    • The Journal of Information Systems
    • /
    • v.26 no.2
    • /
    • pp.123-142
    • /
    • 2017
  • Purpose The development of the Fintech industry can be on the basis of the development in IT technologies such as Big data, IoT, cloud computing, it can be considered that the financial industry is repeating the evolution into Fintech. But the awareness of the consumers is still very low. Therefore the current dissertation, tries to deduce the suggestions for invigoration measures for Fintech by conducting an empirical study on the factors that influence the intention of reuse of Fintech on the consumer's point of view. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the Expectation Confirmation Theory. This paper empirically analyzes the impact of Continuous Usage Intention for Improvement of Fintech. The 302 survey responses were used to verify research hypotheses through covariate structural equation model. Findings According to the empirical analysis result, this study confirmed that the ultimate purpose of the Fintech service is to eliminate the social cost's waste element occurring from issue of money by not using or reducing the usage of cash. Since many Fintech users have pointed out security as the priority task, a direction for the related institutions has been proposed. Second, the content of the current dissertation will be the opportunity of broadening the perception of the current consumers that perceive Fintech as only a NFC simple payment service.

Study on the System Design of a Service Method for a Customized Electronic Card (주문형 전자카드 서비스 방법 및 시스템설계에 관한 연구)

  • Park Hwa-Jin;Kim Sang-Beom
    • Journal of Digital Contents Society
    • /
    • v.4 no.1
    • /
    • pp.1-10
    • /
    • 2003
  • This research focuses on the system design of a service method for a customized electronic card on the internet. It develops the system which covers from the input stage of the credit information including a credit card number, a debit card number, and a bank account number, through the process of decision for issuing the customized electronic card and for the payment of business transaction, to the payment stage. Users are allowed to make their own customized card depending on their situations by choosing a limit of balance, a number of usage, expiration date, recharge, and, anonymity of electronic card on the internet. These characteristics enhances convenience and security of card users. In addition, user's financial damage can be minimized when a credit card is lost by any reason.

  • PDF

Predictive maintenance architecture development for nuclear infrastructure using machine learning

  • Gohel, Hardik A.;Upadhyay, Himanshu;Lagos, Leonel;Cooper, Kevin;Sanzetenea, Andrew
    • Nuclear Engineering and Technology
    • /
    • v.52 no.7
    • /
    • pp.1436-1442
    • /
    • 2020
  • Nuclear infrastructure systems play an important role in national security. The functions and missions of nuclear infrastructure systems are vital to government, businesses, society and citizen's lives. It is crucial to design nuclear infrastructure for scalability, reliability and robustness. To do this, we can use machine learning, which is a state of the art technology used in various fields ranging from voice recognition, Internet of Things (IoT) device management and autonomous vehicles. In this paper, we propose to design and develop a machine learning algorithm to perform predictive maintenance of nuclear infrastructure. Support vector machine and logistic regression algorithms will be used to perform the prediction. These machine learning techniques have been used to explore and compare rare events that could occur in nuclear infrastructure. As per our literature review, support vector machines provide better performance metrics. In this paper, we have performed parameter optimization for both algorithms mentioned. Existing research has been done in conditions with a great volume of data, but this paper presents a novel approach to correlate nuclear infrastructure data samples where the density of probability is very low. This paper also identifies the respective motivations and distinguishes between benefits and drawbacks of the selected machine learning algorithms.

Design of Smart Tourism in Big Data (빅데이터 기반 스마트 투어리즘의 설계)

  • Jang, Jae-Youl;Kim, Do-Moon;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.4
    • /
    • pp.637-644
    • /
    • 2017
  • This paper is based on the information left on SNS by the experienced tourist and, First, the tourist gathers various tourist information from SNS through Smart Tourism as suggested, Second, providing scheduling information for future tourist and the future tourist can modify and apply the information from experienced tourist. Third, the goal of this study is to design virtual tourism service based on above services where future tourist can post and modify tourism scheduling. Therefore, it is to obtain the effect of providing reliable tourism service to maximize the satisfaction of the tour through matching process between experience experiences and experience schedule.

Ubiquitous intelligent lesson management system (유비쿼터스 지능형 교육관리 시스템)

  • Hong, Sung-Moon;Oh, Suk-Kyung;Lim, Hyung-Min;Cho, Jae-Min;Kim, Dong-Suk;Park, Sang-Gug
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.739-742
    • /
    • 2011
  • This paper describes system design and realization to the ubiquitous intelligent lesson management. This system includes students management by utilizing RFID and web-cam, personal security certification by fingerprint recognition, keyboard locking of PC by hooking technology, personal data management by cloud system, internet block access by a packet monitoring. We have design and realize this system, In the future, we will applicate our system to the classes using computer.

  • PDF