• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.034 seconds

An SNS Based Construction Information Communication and Sharing System (SNS기반 건설현장 정보소통 및 공유 시스템 구축)

  • Ahn, Jaesang;Kim, Namho;Chin, Sangyoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.5
    • /
    • pp.115-126
    • /
    • 2014
  • Although various IT-based services including PMIS are used at construction field, there have been limits on communications, such as fast reaction, information loss, and information security in the real world. Therefore, this paper proposes to adapt a social network service (SNS) that has already been used for information management and sharing information at the company level in other industries in order to support construction information management and communication in a fast and accurate manner. Following the requirement analysis through literature review and site interviews, the paper presents an SNS-based construction information communication and sharing system named PMIS+. PMIS+ was tested and validated for its feasibility at construction sites and it was proved that the proposed system and information management framework using the system could be helpful for effective information management at construction fields.

Design of OpenScenario Structure for Content Creation Service Based on User Defined Story (사용자 정의 스토리 기반 콘텐츠 제작 서비스를 위한 오픈 시나리오 언어 구조 설계)

  • Lee, Hyejoo;Kwon, Ki-Ryong;Lee, Suk-Hwan;Park, Yun-Kyong;Moon, Kyong Deok
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.170-179
    • /
    • 2016
  • It is a story-based content creation service that provides any user with some proper contents based on a story written by the user in order to utilize a lot of contents accumulated on Internet. For this service, the story has to be described in computer-readable representation. In this paper, analyzing the structure of scenario, as known as screenplay or scripts, a structure of story representation, which is referred to as OpenScenario, is defined. We intend users to produce their own contents by using massive contents on Internet by the proposed method. The proposed method's OpenScenario consists two main parts, OSD (OpenScenario Descriptors) which is a set of descriptors to describe various objects of shots such as visual, aural and textual objects and OSS (OpenScenario Scripts) which is a set of scripts to add some effects such as image, caption, transition between shots, and background music. As an usecase of proposed method, we describe how to create new content using OpenScenario and discuss some required technologies to apply the proposed method effectively.

A Study on the Oral Health Belief and Oral Health Education Awareness of Workers in the Workplace (사업장 근로자의 구강건강신념과 구강보건교육 인식에 관한 조사연구)

  • Moon, Seon-Jeong;Ku, In-Young;Choi, Hwa-Young;Ka, Kyung-Hwan
    • The Korean Journal of Health Service Management
    • /
    • v.9 no.3
    • /
    • pp.159-174
    • /
    • 2015
  • Objectives : A survey was conducted to investigate oral health belief and education awareness of oral health of workers in the workplace and to obtain the basic data necessary to promote their oral health and design an oral health education program. Methods : This study conducted a self-administered survey. Results : The following conclusion was made. For oral health beliefs based on the type of work that the workers did, workers in production and technical services had more benefits than those in other fields(security, guard, etc.), and workers on night duty had more oral health hygiene problems than that of regular day-time workers. The longer the period of service was, the more sensitive and serious the workers were and the less beneficial the work was; workers working for eight hours or less had higher levels of importance than those working for ten hours. They were well aware of the need for oral health education but were less aware of the need for an oral health room. Conclusions : It is necessary to emphasize oral health beliefs when developing an oral health education program that promotes oral health for workers in the workplace. If an oral health education program attempts to reflect the concerns of workers in the workplace and provides preferred contents and methods on oral health education, the program is expected to promote the active and positive participation of the workers.

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.

A Study on New Selective Agent Attack Technology in Windows System (윈도우시스템에서 새로운 선택적 에이전트 공격 기술에 관한 연구)

  • Kim, Yeong-Woo;Lim, Young-Hwan;Park, Won-Hyung
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.2
    • /
    • pp.226-233
    • /
    • 2012
  • Recently, Like we saw with 3.4 DDoS Cyber Terror, a behavior of cyber terror becomes increasingly more complicated, sophisticated and larger, and there has been largely damage on industry, the general economy. For responding cyber terrors which occur in the future, we should recognize security holes of system which isn't exposed yet before attacker in advance as we anticipate and implement new technique of cyber attack which not exist hitherto. We design and implement a new technique of cyber attack; it seems to us that a server denies agent' service by altering value of registry in windows system. Network connections of agent are restricted to the new technique we suggest as the a value of registry is changed to a less value than a necessary value and there has happened packet loss by attacker.

A Design of Advanced Channel Creation in e-Passport (전자여권의 향상된 채널생성 기법 설계)

  • Lee, Gi-Sung;Jeon, Sang-Yeob;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4814-4821
    • /
    • 2012
  • An e-passport is equipped with bio information by adding the non-attachable IC chip with a smart function. In order to solve such a problem, the user's privacy is protected by using the BAC, PA, AA and EAC mechanisms. However, the password key used in the BAC mechanism is made of the combination of the MRZ values. As a result, it is possible to decode the password by using the indiscriminate attacking program after finding out the combined rules of MRZ. This thesis suggests the mechanism with an improved level of efficiency through the time-stamp values by using the information of images and fingerprints and checking the forge or falsification of the e-passport when establishing a safe channel between the chip of the e-passport and the decoding system.

Design and Implementation of U-healthcare system with zigbee in service integration system (서비스 통합 시스템에서 지그비를 이용한 유비쿼터스 헬스케어 시스템의 설계 및 구현)

  • Jang, Mun-Suck;Shin, Kwang-Sik;Cheong, Jin-Ha;Yee, Yang-Hee;Shim, Jae-Hong;Lee, Eung-Hyuk;Choi, Sang-Bang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.16-24
    • /
    • 2006
  • In this paper, we implement a U-healthcare system that can be applied to a service integration system. This system consists of a wireless network system a sensor module, and a integration server. The wireless network system collects data and the sensor module measures body fat, blood pressure, quantity of exercise, and SPO2. The server integrates user certification, security service and VOD service and collects user health information in real-time, and sends the data in case of emergency to a doctor or guardian.

Seismic vibration control of an innovative self-centering damper using confined SMA core

  • Qiu, Canxing;Gong, Zhaohui;Peng, Changle;Li, Han
    • Smart Structures and Systems
    • /
    • v.25 no.2
    • /
    • pp.241-254
    • /
    • 2020
  • Using confined shape memory alloy (SMA) bar or plate, this study proposes an innovative self-centering damper. The damper is essentially properly machined SMA core, i.e., bar or plate, that encased in buckling-restrained device. To prove the design concept, cyclic loading tests were carried out. According to the test results, the damper exhibited desired flag-shape hysteretic behaviors upon both tension and compression actions, although asymmetric behavior is noted. Based on the experimental data, the hysteretic parameters that interested by seismic applications, such as the strength, stiffness, equivalent damping ratio and recentering capacity, are quantified. Processed in the Matlab/Simulink environment, a preliminary evaluation of the seismic control effect for this damper was conducted. The proposed damper was placed at the first story of a multi-story frame and then the original and controlled structures were subjected to earthquake excitations. The numerical outcome indicated the damper is effective in controlling seismic deformation demands. Besides, a companion SMA damper which represents a popular type in previous studies is also introduced in the analysis to further reveal the seismic control characteristics of the newly proposed damper. In current case, it was found that although the current SMA damper shows asymmetric tension-compression behavior, it successfully contributes comparable seismic control effect as those having symmetrical cyclic behavior. Additionally, the proposed damper even shows better global performance in controlling acceleration demands. Thus, this paper reduces the concern of using SMA dampers with asymmetric cyclic behavior to a certain degree.

Monitoring on Crop Condition using Remote Sensing and Model (원격탐사와 모델을 이용한 작황 모니터링)

  • Lee, Kyung-do;Park, Chan-won;Na, Sang-il;Jung, Myung-Pyo;Kim, Junhwan
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.5_2
    • /
    • pp.617-620
    • /
    • 2017
  • The periodic monitoring of crop conditions and timely estimation of crop yield are of great importance for supporting agricultural decision-makings, as well as for effectively coping with food security issues. Remote sensing has been regarded as one of effective tools for crop condition monitoring and crop type classification. Since 2010, RDA (Rural Development Administration) has been developing technology for monitoring on crop condition using remote sensing and model. These special papers address recent state-of-the-art of remote sensing and geospatial technologies for providing operational agricultural information, such as, crop yield estimation methods using remote sensing data and process-oriented model, crop classification algorithm, monitoring and prediction of weather and climate based on remote sensing data,system design and architecture of crop monitoring system, history on rice yield forecasting method.

Implementation of the Access Control System for Hangul Document System (한글 문서 접근 제어시스템 구현)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.2
    • /
    • pp.323-329
    • /
    • 2018
  • In this paper, we implemented an access control system that only allows specific users to use documents in Hangul document system. The system structure designed in this paper is to transform header information of Hangul document by analyzing the structure of Hangul document. By modifying the function of a specific field of the header information in Hangul document, it prevents users that do not have data for the modified information to open and view the document. By controlling the access rights to important Hangul documents, it is possible to manage Hangul files more safely. In this paper, the actual design of information was implemented and experiments were carried out. Results of the experiment confirmed that the access control system is operated in normal way. In this paper, we implemented an access control system that only allows specific users to use documents in Hangul document system.