• Title/Summary/Keyword: SystemC infrastructure

Search Result 201, Processing Time 0.027 seconds

Design and Implementation of Public key-based Video Conference System for Authentication and Encryption (공개키기반 사용자인증과 암호화를 적용한 영상회의 시스템 설계 및 구현)

  • Jung Yong-Deug;Lee Sang-Hun;Jin Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.971-980
    • /
    • 2004
  • This paper describes the design and implementation of the video conferencing system using public key infrastructure which is used for user authentication and encryption. Public key infrastructure reinforces the authentication process for conference participant, and the symmetric key system blocks malicious access to information and protect conference control information. This paper shows the implementation of the trans portation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric encryption algorithm (DES, 3DES and AES) for media stream encryption. In this paper, we deal with two ways of protecting information : transportation layer secure protocol secures user authentication process and the conference control information; while public key-based authentication system protects personal information of users when they connect to the network. When distributing the session keys for encryption, Internet Key Exchange is used for P2P communication, and secure protocol is employed for 1 : N multi-user communication in the way of distributing the public key-based en-cryption key.

Trusted Third Party for Clearing Consumption Tax of Global Electronic Commerce and System Architecture of Global Electronic Tax Invoice (GETI)

  • Yeoul , Hwang-Bo;Jung, Yang-Ook
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.261-267
    • /
    • 2003
  • This study deals with controversial issues surrounding the today′s cyber-taxation and recommends feasible consumption tax system architecture titled Global Electronic Tax Invoice System (GETI). The GETI is an electronic consumption tax architecture to provide "all-in-one" tax and e-payment services through a trusted third party (TTP). GETI is designed to streamline the overall cyber-taxation process and provide simplified and transparent tax invoice services through an authorized np. To ensure information security, GETI incorporates public Key infrastructure (PKI) based digital certificates and other data encryption schemes when calculating, reporting, paying, and auditing tax in the electronic commerce environment. GETI is based on the OECD cyber-taxation agreement that was reached in January 2001, which established the taxation model for B2B and B2C electronic commerce transactions. For the value added tax systems, tax invoice is indispensable to commerce activities, since they provide documentations to prove the validity of commercial transactions. As paper-based tax invoice systems are gradually phased out and are replaced with electronic tax invoice systems, there is an increasing need to develop a reliable, efficient, transparent, and secured cyber-taxation architecture. To design such architecture, several desirable system attributes were considered -- reliability, efficiency, transparency, and security. GETI was developed with these system attributes in mind.

  • PDF

Design and Implementation of a Network Packet Scanner based on Multi-Platform (멀티 플랫폼 기반의 네트워크 패킷 스캐너 설계 및 구현)

  • Lee, Woo-In;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.101-112
    • /
    • 2010
  • The recent trend of the hacking deals with all the IT infrastructure related to the profit of the companies. Presently, they attack the service itself, the source of the profit, while they tried to access to the service infrastructure through the non-service port in the past. Although they affect the service directly, it is difficult to block them with the old security solution or the old system and they threaten more and more companies with the demand of money menacing the protection of customers and the sustainable management. This paper aims to design and implement multi-platform network packet scanner targeting the exception handling network intrusion detection system which determines normal, abnormal by traffic. Linux and unix have the various network intrusion detection and packet management tools like ngrep, snort, TCPdump, but most of them are based on CUI (Character based User Interface) giving users discomfort who are not used to it. The proposed system is implemented based on GUI(Graphical User Interface) to support the intuitive and easy-to-use interface to users, and using Qt(c++) language that supports multi-platform to run on any operating system.

Enhanced Network Intrusion Detection using Deep Convolutional Neural Networks

  • Naseer, Sheraz;Saleem, Yasir
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.10
    • /
    • pp.5159-5178
    • /
    • 2018
  • Network Intrusion detection is a rapidly growing field of information security due to its importance for modern IT infrastructure. Many supervised and unsupervised learning techniques have been devised by researchers from discipline of machine learning and data mining to achieve reliable detection of anomalies. In this paper, a deep convolutional neural network (DCNN) based intrusion detection system (IDS) is proposed, implemented and analyzed. Deep CNN core of proposed IDS is fine-tuned using Randomized search over configuration space. Proposed system is trained and tested on NSLKDD training and testing datasets using GPU. Performance comparisons of proposed DCNN model are provided with other classifiers using well-known metrics including Receiver operating characteristics (RoC) curve, Area under RoC curve (AuC), accuracy, precision-recall curve and mean average precision (mAP). The experimental results of proposed DCNN based IDS shows promising results for real world application in anomaly detection systems.

A study on design development for wooden cultural products by using CNC M/C (CNC M/C을 활용한 목제문화상품디자인개발 연구)

  • 곽우섭
    • Journal of the Korea Furniture Society
    • /
    • v.12 no.2
    • /
    • pp.51-59
    • /
    • 2001
  • Opening 21th Century, all the Countries of the world has been focusing on build up the foundation of cultural infrastructure in a various way, since the awareness of importance for cultural design products has been turnover. On the other hand, our cultural crafts' industry has not escaped from poor working environment and lagging behind conventional product system, and yet there is no complete system for mass production. The study is collaboration with Tourism Industry Innovation Center in Kwangju University for development of cultural products of wooden crafts by using cultural resources in Kwangju area and CNC M/C which is up-to-date digital technology. It aims to make possibility of mass production and discrimination on design for wooden crafts which is based on highly skilled technical manpower and creativities, and expects to develop and merchandise global wooden cultural products.

  • PDF

A Study on the Security Management for Critical Key Infrastructure(SCADA) (중요핵심기반시설(SCADA)에 대한 보안 관리 연구)

  • Kim InJung;Chung YoonJung;Koh JaeYoung;Won Dongho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.8C
    • /
    • pp.838-848
    • /
    • 2005
  • Most of the national critical key infrastructure, such as power, piped gas and water supply facilities, or the high-speed railroad, is run on the SCADA system. Recently, concerns have been raised about the possibility of these facilities being attacked by cyber terrorists, hacking, or viruses. Thus, it is time to adopt the relevant security management techniques. This paper attempts to propose such security management techniques, including information protection measures and troubleshooting, based on a risk analysis process concerning assets, threats/vulnerability, and hazards, and to examine the security management status of critical key infrastructure in the U.S. and Japan.

Application of Artificial Neural Networks for Prediction of the Strength Properties of CSG Materials

  • Lim, Jeongyeul;Kim, Kiyoung;Moon, Hongduk;Jin, Guangri
    • Journal of the Korean GEO-environmental Society
    • /
    • v.19 no.5
    • /
    • pp.13-22
    • /
    • 2018
  • The number of researches on the mechanical properties of cemented sand and gravel (CSG) materials and the application of the CSG Dam has been increased. In order to explain the technical scheme of strength prediction model about the artificial neural network, we obtained the sample data by orthogonal test using the PVA (Polyvinyl alcohol) fiber, different amount of cementing materials and age, and established the efficient evaluation and prediction system. Combined with the analysis about the importance of influence factors, the prediction accuracy was above 95%. This provides the scientific theory for the further application of CSG, and will also be the foundation to apply the artificial neural network theory further in water conservancy project for the future.

Importance, Support and Application for Contract Foodservice Management Company′s Infra-System in the Viewpoint of Headquarters and Branch Office (위탁급식전문업체의 운영관리 인프라 시스템에 대한 본사와 업장 측면에서의 중요도, 지원도, 활용도 탐색)

  • 양일선;박문경;한경수;채인숙;박소현;이해영
    • Korean Journal of Community Nutrition
    • /
    • v.9 no.2
    • /
    • pp.233-240
    • /
    • 2004
  • This study was design to grope the suggestions leading synergic effects by bridging the gap between headquarters and branch office, and so to identify the infra-system of contract foodservice management company (CFMC) necessary for operating any kind of branch office including school, hospital and business and industry (B&I). Among 8 categories consisted of infra-system in CFMC, 'C8. Evaluation & analysis for branch office's operation' was the most important category in the headquarter's viewpoint, while 'C3. Sanitation management system' was the most important category in branch office's viewpoint. In support and application, 'C3. Sanitation management system' was the highest category in both headquarters and branch offices including school, hospital and B&I. As a result of analysis on gap between main and branch office in importance, support and application in 8 categories, the efforts of communication and community of perception for infrastructure were needed, because 'C4. Education & training for human resource management (HRM) system' and 'C8. Evaluation & analysis for branch office's operation' in importance, 'C2. Menu management system', 'C4. Education & training for HRM system', 'C6. Facility & utility support system' and 'C8. Evaluation & analysis for branch office's operation' in support had a gap. Correlation analysis to grasp the relation between importance of infra-system and headquarters' support or branch office's application showed that headquarters's importance and support were correlated positively in 'C3. Sanitation management system', 'C6. Facility & utility support system', 'C7. Customer satisfaction management system' and 'C8. Evaluation & analysis for branch office's operation' and branch office's importance and application were correlated positively in 'C1. Procurement & food processing system', 'C5. Management Information system', 'C7. Customer satisfaction management system' and 'C8. Evaluation & analysis for branch office's operation'. Lastly, 'C6. Facility & utility support system' in the branch office of school and hospital and 'C2. Menu management system' in the branch office of B&I were high in importance, low in support and application, therefore Intensive support for these categories was needed. In conclusion, continuous check and improvement for categories, which were identified as an urgent problems to be solved in this study, among infra-structure qualifying for CFMC, would enable contract foodservice industry that has grown quantitatively till now to grow qualitatively.

A Study on The Improvement of Weapon System Test and Evaluation - Focusing on the weapon system in the research development stage - (연구개발무기체계 시험평가 발전방안에 관한 연구)

  • Lee, Kang-Un;Boo, Joon-Hyo
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.383-420
    • /
    • 2010
  • This article is focusing on the improvement of weapon system test & evaluation, aimed at the weapon system in the research development stage. This article suggests improvement directions in three aspects(organization and system, skilled manpower and technology, test facilities of weapon system test & evaluation) as follows. 1) Weapon system test & evaluation organization and system a. Establishment of comprehensive test & evaluation system b. Making regulation for comprehensive test infrastructure management. c. Standardization of test & evaluation process, which can be used in special subject to army, navy and air force. 2) Skilled manpower and technology of weapon system test & evaluation a. Training & education, management of test & evaluation experts. b. Establishment of skill management system of test & evaluation. 3) Test facilities of weapon system test & evaluation a. Establishment of comprehensive improvement direction of test & evaluation installation and equipment. b. Consideration of counter measures to prevent overlapping investment, and to use the test & evaluation resources efficiently. c. Establishment of organic network for the effective use of test & evaluation installation and equipment. d. Establishment of detailed cooperation plan for the commonage of test & evaluation facility and equipment.

  • PDF

Assessment of Physical Habitat and the Fish Community in Korea Stream

  • Hur, Jun Wook;Joo, Jin Chul;Choi, Byungwoong
    • Ecology and Resilient Infrastructure
    • /
    • v.9 no.1
    • /
    • pp.59-67
    • /
    • 2022
  • The purpose of this study is to provide essential data necessary to assess ecological flow requirements by understanding habitat conditions for fish species through monitoring an ecological environment in the Korea stream (Dal Stream) and building related database. On-site surveys were conducted for identifying ecological and habitat conditions at the four monitoring sites. Fish sampling was carried out at the selected four sites (St.) during the period ranging from September, 2008 to September, 2009. At the four sampling sites, we measured water surface elevation, depth and velocity at the cross-sections. Optimal Ecological Flowrates (OEFs) were estimated using the Habitat Suitability Index (HSI) established for four fish species Zacco koreanus (St.1), Pungtungia herzi (St.2), Coreoleuciscus splendidus (St.3), and Zacco platypus (St.4) selected as icon species using the Physical HABitat SIMulation system (PHABSIM). Eighteen species (56.3%) including Odontobutis interrupta, Coreoperca herzi and C. splendidus were found endemic out of the 32 species in eight families sampled during this study period. The endangered species was collected Acheilognathus signifier, Pseudopungtungia tenuicorpa and Gobiobotia macrocephala, and this relative abundance was 9.4%. The most frequently found one was Z. platypus (31.3%) followed by C. splendidus (17.6%) and Z. koreanus (15.7%). The estimated IBI values ranged from 27.3 to 34.3 with average being 30.3 out of 50, rendering the site ecologically poor to fair health conditions. For C. splendidus (St.3), the dominant fish species in the stream, the favored habitat conditions were estimated to be 0.3-0.5 m for water depth, 0.4-0.7 m/s for flow velocity and sand-cobbles for substrate size, respectively. An OEFs of 8.5 m3/s was recommended for the representative fish species at the St.3.