• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.03 seconds

Design and Implement a Smart Control System of Door Security Guard (도어 안전고리 스마트 제어시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.6 no.1
    • /
    • pp.61-67
    • /
    • 2017
  • A large number of people living in modern times prefer remaining unmarried or living alone independently for the reason of their own will or another person's will. This is because they dislike being interfered with by other persons or because there is a financial problem. This behavior has become mainstream in persons working for professional jobs, persons having a strong disposition toward individual activity or college students. In particular, career women pursuing their own comfortable life have the tendency to prefer single life. However, sometimes, they become a target of crime that targets and makes bad use of this point. For these reasons. Consequently, sometimes, they additionally install and use a security system such as door security guard at front door and so on. It is not so difficult to lock the door security guard at the front door. However, it is apt to be forgotten. And when they are on the bedspread before falling asleep, in case they should check whether the door security guard is locked or in case they should lock it, they should get up, go to the entrance, and check and lock the door security guard. They often don't lock the door security guard due to their feeling that it is all right because of annoyance and inconvenience. This paper is intended to work for safety from crime such as illegal housebreaking by more conveniently using the door security guard after designing and implementing a system that can remotely control the door security guard, using a smartphone as a method of resolving this annoyance and keeping life more safe.

A Pipelined Design of the Block Cipher Algorithm SEED (SEED 블록 암호 알고리즘의 파이프라인 하드웨어 설계)

  • 엄성용;이규원;박선화
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.3_4
    • /
    • pp.149-159
    • /
    • 2003
  • The need for information security increases interests on cipher algorithms recently. Especially, a large volume of data transmission over high-band communication network requires faster encryption and decryption techniques for real-time processing. It would be a good solution for this problem that we implement the cipher algorithm in forms of hardware circuits. Though some previous researches use this approach, they focus only on repeatedly executing the core part of the algorithm to minimize the hardware chip size, while most cipher algorithms are inherently parallel. In this paper, we propose a new design for the SEED block cipher algorithm developed by KISA (Korea Information Security Agency) in 1998 as Korean standard cipher algorithm. It exploits the parallelism of the algorithm basically and implements it in a pipelined fashion. We described the design in VHDL program and performed functional simulations on the program, and then found that it worked correctly. In addition, we synthesized it and verified that it could be implemented in a single FPGA chip, implying that the new design can be Practically used for the actual hardware implementation of a high-speed and high-performance cipher system.

Study on design indicator for wood structure of forest engineering works in Japan(2) - Focus on the design and construction - (일본에 있어서 산림토목 목제구조물 설계지침에 관한 연구(2) - 설계 및 시공을 중심으로 -)

  • Kim, Min-Sik;Chun, Kun-Woo;Lee, Jin-Ho;Ezaki, Tuzio
    • Journal of Forest and Environmental Science
    • /
    • v.22 no.1
    • /
    • pp.50-57
    • /
    • 2006
  • The design instruction put in the wood structure construction manual of forest engineering works issued in Japan in 2004 is composed of the introduction, the use and characteristic of wood, investigation, planning, design, and etc. We analyzed planing and construction. By the results, the contents for the design are shown about applied woody conditions and deterioration, structure, selection of tree, the standardization of the size displays in wood, safety and examination of intensity, intensity of wood, the ranges of wood size allowance, and etc. With respect to the construction of wood structure, there are detailed descriptions regarding security of wood quality, confirmation of wood quality by preservative treatment and security methods of function in wood structure, the regular investigation method, the qualitative standard criterion and the quantitative examination method on the deterioration of wood.

  • PDF

Design of Uni-directional Optical Communication Structure Satisfying Defense-In-Depth Characteristics against Cyber Attack (사이버공격에 대비한 심층방호 특성을 만족하는 단방향 광통신 구조 설계)

  • Jeong, Kwang Il;Lee, Joon Ku;Park, Geun Ok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.561-568
    • /
    • 2013
  • Instrumentation and control system in nuclear power plant performs protecting, controling and monitoring safety operation of Nuclear Power Plant. As cyber attack to the control equipment of instrumentation and control system can cause reactor shutdown and radiation release, it is required to design the instrumentation and control system considering cyber security in accordance with regulatory guides and industrial standards. In this paper, we proposed a design method of uni-directional communication structure which is required in the design of defense-in-depth model according to regulatory guides and industrial standards and we implemented a communication board with the proposed method. This communication board was tested in various test environments and test items and we concluded it can provide uni-directional communication structure required to design of defense-in-depth model against cyber attack by analyzing the results. The proposed method and implemented communication board were applied in the design of SMART (system-integrated modular advanced reactor) I&C (instrumentation and control) systems.

A Pilot Evaluation Study for the Establishment of CPTED Criteria of Flat or Multiple Dwelling Houses (범죄로부터 안전한 다세대·다가구주택 계획기준 마련을 위한 시범평가 연구)

  • Kim, Yong-Gook;Cho, Young-Jin
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.4
    • /
    • pp.27-34
    • /
    • 2018
  • Flat or Multiple Dwelling Houses are relatively vulnerable to crime safety. Crime prevention measures are urgently needed because crime is 2.6 times higher than in real apartments. Through the analysis of domestic and foreign crime prevention design standards, field survey, and interviews with experts, 27 items of crime prevention design criteria for flat or multiple dwelling house were derived, and ten design criteria that should be considered first by the expert AHP were derived. As a result of the pilot evaluation of existing flat or multiple dwelling house, the houses completed after 2015 have relatively high level of crime prevention, but the houses constructed before that are very vulnerable. The policy and system improvement plan based on the analysis result is as follows. First, new housing should be promoted to meet minimum criteria by supplying and educating public officials, architects, and building owners in the short term to provide criteria for flat or multiple dwelling house crime prevention plans. Second, existing housing should be supported with basic crime prevention support projects such as security windows for flat or multiple dwelling house where security of residential environment such as urban renewal policy is poor. Third, the Enforcement Decree of the Building Act shall be revised to make the crime prevention environment design of flat or multiple dwelling house obligatory, and the criteria of flat or multiple dwelling house crime prevention plan should be reflected in the notice of crime prevention building standard.

System Specification-based Design of Mobile Alarm System for Privacy Protection (시스템 명세화 기법 기반의 개인정보보호 모바일 알람 시스템 설계 및 구현)

  • Jang, Eun-Young;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.113-121
    • /
    • 2010
  • The system specification is a system theory based formal representation method for systems' structure and behavior modeling. When we make use of the system specification method in each step of software development, we can derive a hierarchical and modularized system design which enables us to manage the software development process flexibly. This research presents system specification based design of a mobile alarm system which sends alerts about illegal usage of private information and manages the response against the each alert. In our design of mobile alarm system, there are formal definition of alert message overcoming the functional limitation of mobile device and hierarchical modularized modeling of alarm processing using system specification. The efficiency of making use of the system specification is shown by applying the specification method to implementation of mobile alarm system. The contribution of this work is in design and implementation of mobile alarm system which enables us to handle the private information leakage situation more flexible way using system specification based software designing method.

Analysis of sustainable interior design elements (지속가능한 실내디자인 요소 분석)

  • Lee, Hyun-Chang;Nam, Kyung-Sook
    • Proceedings of the Korean Institute of Interior Design Conference
    • /
    • 2007.11a
    • /
    • pp.169-172
    • /
    • 2007
  • Sustainable interior design elements are related with human health. We know that a demand for environmental-friendly housing and all about the others demanding are for human health. We have to make up basement of natural environment for sustainable space composition. If natural environment is polluted that surrounded by human, we have to effort to revive without any pollution. We have to get accomplished stability, comfortable, security, convenience and organize interior design elements for sustainable space to enhance for the quality of life. Furthermore, it needs to get a respect lifestyle on personal. To study composing of the sustainable interior design, we arranged interior design elements to compose sustainable space of housing. We investigated how to compose energy-efficiency, sustainable, interior tree-planting, alterable of the space.

  • PDF

A Study on the Design Structural Concepts and the Elemental Characteristics for the Utilization of Underground Space (지하공간 활용을 위한 디자인 구성개념 및 요소특성에 관한 연구)

  • 이영수;김민경
    • Korean Institute of Interior Design Journal
    • /
    • no.29
    • /
    • pp.94-102
    • /
    • 2001
  • The urban land is incapacitated to grow and correspond to demand the space in urban area. And recently, rapid increasing of population and complex of urban function on pushed to develop the underground space. In Korea, the underground space development in inefficient in aspect. because development of underground space have not consistent and systematic planning method in underground environment inclounding interion design, extererior design. Therefore this study is suggested the design element for comfortable underground living environment and assortment on utilization of underground space. The results of this study on utilization are security of space through land use efficiency, conservation of historical place, building and natural environment, and technological characteristics, mental image. Accordingly, this study is proposed design element that make comfortable underground space as aspect from stimulation and diversity, sapciousness and feeling of warmth and dryness to compensate improper image of underground space, spacial orientation and way finding.

  • PDF

Design of Port Security System Using Deep Learning and Object Features (딥러닝과 객체 특징점을 활용한 항만 보안시스템 설계)

  • Wang, Tae-su;Kim, Minyoung;Jang, Jongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.50-53
    • /
    • 2022
  • Recently, there have been cases in which counterfeit foreign ships have entered and left domestic ports several times. Vessels have a ship-specific serial number given by the International Maritime Organization (IMO) to identify the vessel, and IMO marking is mandatory on all ships built since 2004. In the case of airports and ports, which are representative logistics platforms, a security system is essential, but it is difficult to establish a security system at a port and there are many blind spots, which can cause security problems due to insufficient security systems. In this paper, a port security system is designed using deep learning object recognition and OpenCV. The security system process extracts the IMO number of the ship after recognizing the object when entering the ship, determines whether it is the same ship through feature point matching for ships with entry records, and stores the ship image and IMO number in the entry/exit DB for the first arrival vessel. Through the system of this paper, port security can be strengthened by improving the efficiency and system of port logistics by increasing the efficiency of port management personnel and reducing incidental costs caused by unauthorized entry.

  • PDF

Distributed Data Management based on t-(v,k,1) Combinatorial Design (t-(v,k,1) 조합 디자인 기반의 데이터 분산 관리 방식)

  • Song, You-Jin;Park, Kwang-Yong;Kang, Yeon-Jung
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.399-406
    • /
    • 2010
  • Many problems are arisen due to the weakness in the security and invasion to privacy by malicious attacker or internal users while various data services are available in ubiquitous network environment. The matter of controlling security for various contents and large capacity of data has appeared as an important issue to solve this problem. The allocation methods of Ito, Saito and Nishizeki based on traditional polynomial require all shares to restore the secret information shared. On the contrary, the secret information can be restored if the shares beyond the threshold value is collected. In addition, it has the effect of distributed DBMS operation which distributes and restores the data, especially the flexibility in realization by using parameters t,v,k in combinatorial design which has regularity in DB server and share selection. This paper discuss the construction of new share allocation method and data distribution/storage management with the application of matrix structure of t-(v,k,1) design for allocating share when using secret sharing in management scheme to solve the matter of allocating share.