• Title/Summary/Keyword: User protection

Search Result 688, Processing Time 0.024 seconds

Analysis of sports knee brace products - Focusing on Chinese websites - (스포츠 무릎보호대 제품 분석 - 중국 웹사이트를 중심으로 -)

  • Xiaoqing Ma;Jeongah Jang
    • The Research Journal of the Costume Culture
    • /
    • v.31 no.5
    • /
    • pp.692-704
    • /
    • 2023
  • This study analyzed 214 sports knee braces found on Chinese websites between October 2022 and November 2022 to assess product type (impact protection material, fastening method, and protection method), material composition, size, weight, and main characteristics. The product type was further categorized according to (1) use of hard guard and soft guard protection method; (2) cover type, strap type, and slip-on type fastening method; and (3) pressure type and support type protection method. It also noted the physical shock protection materials used, including foam (EVA or polyurethane) attached to joints as a buffer material and plastic (TPU or PP) that protects the user's knee from external impacts. The study found that the materials that primarily comprise sports knee braces are a combination of nylon, polyester, and neoprene. Additionally, it found that most sports knee braces available on the market are available in three sizes based on knee circumference: M (35-38cm), L (38-41cm), and XL (41-44cm), while some products are available in one size only. Furthermore, the majority of the 214 products studied weighed 200g, followed by 1,000g. Finally, in terms of product characteristics, many sports knee braces utilize ring-shaped silicone pads to distribute the load pressure on the knees or incorporate sturdy adhesive velcro to improve knee stability.

User Signature Protection Model for Different Cloud Areas (이질적인 클라우드 환경에 적합한 사용자 서명 보호 모델)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.23-28
    • /
    • 2019
  • Cloud services are services developed to serve a wider variety of users in different fields. However, although cloud services are designed to reflect the needs of different users, a variety of security damages resulting from them are increasing and technologies are needed to address them. This paper proposes a user signature management model that prevents third parties from exploiting the user's signature in a heterogeneous cloud The proposed model strengthens the functionality of the intermediate devices that make up the hierarchical cloud while also managing the signature information of the partitioned user. As a result of the performance assessment, the proposed model not only distributed user signature management, but also improved efficiency by 8.5% on average because intermediate devices distributed user signature processing, and reduced the user's signature latency by 13.3% on average when performing user authentication processing. On average, the overhead generated by intermediate devices processing a user's signature was 10.1 percent lower than that of conventional techniques.

Development of HIMI for Integrated Protection System Environment (보호계전 종합환경을 위한 HIMI 개발)

  • Lee, N.H.;Min, B.U.;Lee, S.J.;Choi, M.S.;Kang, S.H.;Cho, B.S.;Lee, O.H.;Choi, H.S.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.200-202
    • /
    • 2000
  • The protective relaying setting job which has been performed manually, takes a long time and is vulnerable to errors. The goal of this paper is to develop the user-friendly interface for integrated protection system environment and to control protection-related jobs and the database management efficiently and conveniently.

  • PDF

A Study on the Design of the Bay Controller for Generator Protection and Control (발전기 보호제어를 위한 Bay Controller 설계에 관한 연구)

  • Jang, Nak-Won;Woo, Chun-Hee;Lee, Sung-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.57 no.1
    • /
    • pp.46-55
    • /
    • 2008
  • In this paper, we designed the bay control unit that is based on the microprocessors and integrates with the new technology of electrical, electronic, and mechanical fields. Nowadays the customers have required much more integrated multi-protection relay, monitoring, control devices and power management for better and easier maintenance, performance, electrical system analysis and communication according to new trend of switchboard This bay controller supplies those requirements of customers with easy handling and operation. This bay controller provides a graphic display with rear-lit liquid crystal LCD and push buttons as kinds of HMI(Human Machine Interface). This bay controller provides the parameter setting program, control setting program, various editors and fault recording and analysis program on Windows/95/98/NT/2000/XP for HMI. In addition, this bay controller can be set manually and this manual setting function helps user to interface easily.

A Cache Privacy Protection Mechanism based on Dynamic Address Mapping in Named Data Networking

  • Zhu, Yi;Kang, Haohao;Huang, Ruhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.6123-6138
    • /
    • 2018
  • Named data networking (NDN) is a new network architecture designed for next generation Internet. Router-side content caching is one of the key features in NDN, which can reduce redundant transmission, accelerate content distribution and alleviate congestion. However, several security problems are introduced as well. One important security risk is cache privacy leakage. By measuring the content retrieve time, adversary can infer its neighbor users' hobby for privacy content. Focusing on this problem, we propose a cache privacy protection mechanism (named as CPPM-DAM) to identify legitimate user and adversary using Bloom filter. An optimization for storage cost is further provided to make this mechanism more practical. The simulation results of ndnSIM show that CPPM-DAM can effectively protect cache privacy.

Design of DRM Frame for Digital Contents Protection in Network (네트워크 상에서 디지털 콘텐츠 보호를 위한 DRM 프레임 설계)

  • Kim Jong-Woo;Han Seung-Jo;Yang Won-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.101-113
    • /
    • 2006
  • This study is intended to provide more secure contents authentication and user authentication by applying public key algorithm and hardware binding to the DRM system. The proposed system is capable of protecting distributed contents and copyrights as well as resetting any interoperability issues among those involved in transparent and secure contents distribution. The proposed algorithm also affords transparency in the DRM distribution system and protection from unauthorized distribution.

An Exploratory Study on 3D-based Building Information Management for Multi-User Fire Protection System

  • Kim, Dahee;Cha, Heesung
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1162-1169
    • /
    • 2022
  • As buildings become more and more complicated, the importance of developing and managing facility management information is increasing. In a building fire situation, various information is generated and needed to be quickly shared among participants. However, the current fire response system fails to monitor the relevant information in a real time basis. This study aims to develop a system prototype for fire protection management which can quickly and accurately manage and effectively deliver the pertinent information to the target participants. The research contributes to the efficiency of fire protection endeavors by interpreting both dynamic and static fire information in an appropriate manner.

  • PDF

User-Oriented Multimedia Service in the Ubiquitous Home Environment (유비쿼터스 흠 환경에서의 사용자 중심 멀티미디어 서비스)

  • Park Jong-Hyuk;Lee Sang-Jin;Koh Byoung-Soo;Lee Sang-Won
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1531-1542
    • /
    • 2005
  • In multimedia service of Ubiquitous Home Environment(UHE), the requirements such as intelligent service that is executed automatically without direct order of user and fitted service compatible for each user and comfortable of user, interoperability of multimedia contents between incompatible devices will increase. Multimedia protection and management, authentication and authority administration methods that are suitable for above demands are also required. In this paper, we suggest authentication method suited for UHE and propose user oriented multimedia service(UHMS: Ubiquitous Home Multimedia Service) that provides the interoperability of multimedia between incompatible devices, conducts intelligently the context information (preference information, device information etc.) using sensor module and home server, provides and secure services.

  • PDF

User Authentication Technology using Multiple SSO in the Cloud Computing Environment

  • Cho, Min-Hee;Jang, Eun-Gyeom;Choi, Yong-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.4
    • /
    • pp.31-38
    • /
    • 2016
  • The interface between servers and clients and system management in the cloud computing environment is different from the existing computing environment. The technology for information protection. Management and user authentication has become an important issue. For providing a more convenient service to users, SSO technology is applied to this cloud computing service. In the SSO service environment, system access using a single key facilitates access to several servers at the same time. This SSO authentication service technology is vulnerable to security of several systems, once the key is exposed. In this paper, we propose a technology to solve problems, which might be caused by single key authentication in SSO-based cloud computing access. This is a distributed agent authentication technology using a multiple SSO agent to reinforce user authentication using a single key in the SSO service environment. For user authentication reinforcement, phased access is applied and trackable log information is used when there is a security problem in system to provide a safe cloud computing service.

Behavior Realization of Multi-Robots Responding to User's Input Characters (사용자 입력 문자에 반응하는 군집 로봇 행동 구현)

  • Jo, Young-Rae;Lee, Kil-Ho;Jo, Sung-Ho;Shin, In-Sik
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.18 no.5
    • /
    • pp.419-425
    • /
    • 2012
  • This paper presents an approach to implement the behaviors of multi-robots responding to user's input characters. The robots are appropriately displaced to express any input characters. Using our method, any user can easily and friendly control multirobots. The responses of the robots to the user's input are intuitive. We utilize the centroidal Voronoi algorithm and the continuoustime Lloyd algorithm, which have popularly been used for the optimal sensing coverage problems. Collision protection is considered to be applied for real robots. LED sensors are used to identify positions of multi-robots. Our approach is evaluated through experiments with five mobile robots. When a user draw alphabets, the robots are deployed correspondingly. By checking position errors, the feasibility of our method is validated.