• Title/Summary/Keyword: address system

Search Result 2,413, Processing Time 0.032 seconds

Research on Communication and The Operating of Server System for Vehicle Diagnosis and Monitoring (차량진단 및 모니터링을 위한 통신과 서버시스템 운용에 관한 연구)

  • Ryoo, Hee-Soo;Won, Yong-Gwan;Park, Kwon-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.6
    • /
    • pp.41-50
    • /
    • 2011
  • This article is concerned with the technology to provide car driver the car's status which are composed of car trouble code in car engine and many sensors. In addition, it installs vehicle diagnostic programs on wireless communication's portable device, for example, Smart phone, PDA, PMP, UMPC. As a result, this is to provide car manager with many information of car sensors when we go to car maintenance. it can monitor relevant information on vehicle by portable device in real time, alert drivers with specific messages and also enable them to address abnormalities immediately. Moreover, the technology could help the drivers who perhaps don't know very well about their vehicles to drive safely and economically as well; the reason is because the whole system is composed of just Vehicle-information collecting device and personal wireless communication's portables and transfers the relating data to server computers through wireless network in order to handle information on vehicles. This technology make us monitor vehicle's running, failure and disorder by using wireless communication's portable device. Finally, this study system is composed of a lot of application to display us the car's status which get car's inner sensor information while driving a car.

A Secure AIS Protocol Suggestion with Analyses of the Standard AIS Protocol (표준 AIS 프로토콜 분석을 통한 보안 AIS 프로토콜 제안)

  • Lee, Jung-Su;Heo, Ouk;Kim, Jae-Hwan;Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.49-57
    • /
    • 2016
  • Recently, marine accidents such as the sinking accident Mongol freighter ship and the sinking accident of Sewol ferry in Jindo continuously happen. In order to decrease the number of these marine accidents, Korean ships are obliged to follow the AIS(Automatic Identification System) system. The AIS protocol includes all information for sailing ships. However, the standard AIS protocol does not provide any security function, In addition, it is possible to hijack the standard AIS protocol in case of using a satellite communication device called FUNcuve Dongle Pro+. Therefore, this paper analyzes weak points of the security in the standard AIS protocol. Furthermore, this paper ensures reliability by marking the MAC Address of sender and receiver for secure communication and suggests the protocol that can securely send data, using the VPN Tunnelling method. Therefore, the suggested AIS protocol provides the secure communication to the AIS protocol and protect the messages in the AIS protocol, which can serve safe voyages by decreasing the marine accidents.

Design of the Copyright Protection for ePub e-Book System using Certification Information (인증 정보를 이용한 전자책 ePub의 저작권 보호 시스템 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2197-2204
    • /
    • 2015
  • In recent times, the high-tech society has become the most important issue by IT technology and publication network. Today such flows have also been the case in the e-book field. Today's electronic publication is changing day by day. But there are some problems according to the prevalence of e-book. E-book is similar to p-book(paper-book). There is a limit to have perfect feeling of a texture of p-book. In order to purchase an e-book, people use online. People having malicious intent could copy and distribute it illegally. It leads to cyber abuses. This paper aims at the copyright protection of e-book ePub writers. The proposed e-book copyright protection system is designed using e-book production Sigil environment and C program environment. This system uses client-server communication through e-book ePub as authentication information. It discerns whether to permit or not for a client to read the e-book using authentication information. Authentication information includes ID, password, IP address, limited time of authentication information, GUID(Globally Unique Identifier). If authentication information about e-book meets requirements, people can use it. But if not, it blocks people's approach by quitting program.

The Innovation System of the Korean Motion Picture Sector (한국 영화산업의 기술혁신체제 분석)

  • Ji, Ill-Yong;Ko, Young-Wook;Seo, Eun-Young;Choung, Jae-Yong
    • Journal of Korea Technology Innovation Society
    • /
    • v.14 no.2
    • /
    • pp.343-372
    • /
    • 2011
  • Since the introduction of motion picture in the early 20th century, Korean motion picture industry has gradually evolved as one of the world leaders. However, due to the rapid technological change as exemplified by the emergence of the new digital and 3D cinema technologies, there is a need to re-consider the existing technology policy and strategy designed for the adoption and effective use of new technologies. In this paper, the authors address this issue by emphasizing the technological development side rather than the use/adoption side. In order to provide policy makers with critical information on the current status of the sector, we analyzed the sectoral innovation system of the Korean motion picture industry. In order to conduct this analysis, we re-visited previous literature and interviewed experts in the motion picture sector. Then, the authors attempted to identify the characteristics and problems of the current Korean motion picture industry. Based on the insights gained from this research, we draw policy implications for technological innovation in this sector. However, the implications from this paper are not limited to the motion picture industry. As the motion picture industry is a new case for innovation studies, our paper may provide new research opportunities to the academia.

  • PDF

Wildfire-induced Change Detection Using Post-fire VHR Satellite Images and GIS Data (산불 발생 후 VHR 위성영상과 GIS 데이터를 이용한 산불 피해 지역 변화 탐지)

  • Chung, Minkyung;Kim, Yongil
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_3
    • /
    • pp.1389-1403
    • /
    • 2021
  • Disaster management using VHR (very high resolution) satellite images supports rapid damage assessment and also offers detailed information of the damages. However, the acquisition of pre-event VHR satellite images is usually limited due to the long revisit time of VHR satellites. The absence of the pre-event data can reduce the accuracy of damage assessment since it is difficult to distinguish the changed region from the unchanged region with only post-event data. To address this limitation, in this study, we conducted the wildfire-induced change detection on national wildfire cases using post-fire VHR satellite images and GIS (Geographic Information System) data. For GIS data, a national land cover map was selected to simulate the pre-fire NIR (near-infrared) images using the spatial information of the pre-fire land cover. Then, the simulated pre-fire NIR images were used to analyze bi-temporal NDVI (Normalized Difference Vegetation Index) correlation for unsupervised change detection. The whole process of change detection was performed on a superpixel basis considering the advantages of superpixels being able to reduce the complexity of the image processing while preserving the details of the VHR images. The proposed method was validated on the 2019 Gangwon wildfire cases and showed a high overall accuracy over 98% and a high F1-score over 0.97 for both study sites.

A Study on the Improvement of Safety Training of Shipbuilding Industry by Analysis of Serious Accidents in Shipbuilding Industry (조선업 중대재해 분석을 통한 조선업 안전교육 개선에 관한 연구)

  • Lee, Jin-Woo;Han, Cheol-Ho;Lee, Young-Ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.7
    • /
    • pp.858-868
    • /
    • 2017
  • Korea's shipbuilding industry has led the world in the technical area over the last century. Despite this commendable performance, around 2,000 workers experience accidents almost every year with 40 being killed. This raises a question of whether the safety level of our shipbuilding industry, in particular the safety of workers, is actually at the world-class level. Accordingly, this research has analyzed several types of safety training currently provided in the field through investigating statistical data of serious accidents occurring from 2006 to 2015 in the domestic shipbuilding industry, analyzing its occurrence and causes, and conducting a survey targeting employees in the shipbuilding industry. Based on this, it has investigated problems of safety training in the shipbuilding industry and suggested improvements. First, it is essential to create a standard system for safety training in the shipbuilding industry to address problems of different kinds and levels of safety training provided by each shipyard and low quality of training, and operate more organized and systemized training. Second, safety training curriculum specializing in the shipbuilding industry should continue to be developed and standardized based on a standard system for safe training to prevent serious accidents and improve safety awareness of workers. Lastly, both employers and employees should actively provide and participate in safety training to secure safety of workers through preventing serious accidents and ultimately create safety-first culture in workplace.

RDP-based Lateral Movement Detection using PageRank and Interpretable System using SHAP (PageRank 특징을 활용한 RDP기반 내부전파경로 탐지 및 SHAP를 이용한 설명가능한 시스템)

  • Yun, Jiyoung;Kim, Dong-Wook;Shin, Gun-Yoon;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.1-11
    • /
    • 2021
  • As the Internet developed, various and complex cyber attacks began to emerge. Various detection systems were used outside the network to defend against attacks, but systems and studies to detect attackers inside were remarkably rare, causing great problems because they could not detect attackers inside. To solve this problem, studies on the lateral movement detection system that tracks and detects the attacker's movements have begun to emerge. Especially, the method of using the Remote Desktop Protocol (RDP) is simple but shows very good results. Nevertheless, previous studies did not consider the effects and relationships of each logon host itself, and the features presented also provided very low results in some models. There was also a problem that the model could not explain why it predicts that way, which resulted in reliability and robustness problems of the model. To address this problem, this study proposes an interpretable RDP-based lateral movement detection system using page rank algorithm and SHAP(Shapley Additive Explanations). Using page rank algorithms and various statistical techniques, we create features that can be used in various models and we provide explanations for model prediction using SHAP. In this study, we generated features that show higher performance in most models than previous studies and explained them using SHAP.

Improvement of Permanent Disability Benefit System in Korean Worker's Compensation Insurance from the Perspective of Life Cycle (생애주기를 고려한 산재보험 장해연금 개선 방안 연구)

  • Oh, Jongeun
    • 한국사회정책
    • /
    • v.23 no.1
    • /
    • pp.203-225
    • /
    • 2016
  • The permanent disability benefit(PDB) system whose purpose lies in helping affected workers with their self-realization through compensating them for their work-related injury or disease and facilitating their timely return to work is very important in terms of social welfare. Actually, the portions of PDB's in all WCI expenditures have been on the sharp increase. In spite of its positive aspects like this, however, an excessive amount of PDB's may have negative impacts on the affected workers' will to work or return to work, and increasing trends in the amount of PDB's payable in annuity will remain in an aging or aged society a potentially risky factor posing a threat to the soundness of WCI budgets. In this respect, the author attempted herein to identify the long-term reality of trends in the number of claimants entitled to PDB's and the amount of PDB's payable to them through making the long-term budget projections of PDB's; address problems with PDB's payable in annuity, which are or will potentially be one of the gravest burdens in securing the soundness of WCI budgets; and discuss how to optimize the amount of PDB's through studying & analyzing overseas cases and income replacement rates and what kinds of improvements are thinkable. It's recommended to reduce the absolute amount of benefits payable in annuity in a phased way considering claimants' life-cycle instead of sticking to the current system, which takes the form of lifelong pension plan.

Comprehensive Study on Security and Privacy Requirements for Retrieval System over Encrypted Database (암호화된 데이터베이스 검색 시스템의 보안 요구사항에 대한 통합적 관점에서의 연구)

  • Park, Hyun-A;Lee, Dong-Hoon;Chung, Taik-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.621-635
    • /
    • 2012
  • Although most proposed security schemes have scrutinized their own security models for protecting different types of threats and attacks, this naturally causes a problem as follows-- if a security analysis tool would fit a certain scheme, it may not be proper to other schemes. In order to address this problem, this paper analyzes how security requirements of each paper could be different by comparing with two schemes: Agrawal et al.'s scheme OPES (Order Preserving Encryption Scheme) and Zdonik et al.'s FCE (Fast Comparison Encryption). Zdonik et al. have formally disproved the security of Agrawal et al.'s scheme OPES. Thereafter, some scholars have wondered whether the OPES can guarantee its applicability in a real world for its insecurity or not. However, the analysis by Zdonik et al. does not have valid objectivity because they used the security model INFO-CPA-DB for their scheme FCE to analyze Agrawal et al.'s scheme OPES, in spite of the differences between two schemes. In order to analyze any scheme correctly and apply it to a real world properly, the analysis tool should be comprehensively standardized. We re-analyze Zdonik et al.'s analysis for OPES and then propose general formalizations of security and privacy for all of the encrypted retrieval systems. Finally, we recommend the minimum level of security requirements under our formal definitions. Additional considerations should be also supplemented in accordance with the conditions of each system.

Political Economic Analysis of the Central Bank Digital Currency (중앙은행 디지털 화폐에 대한 정치경제학적 분석)

  • YoungBin Hahn
    • Analyses & Alternatives
    • /
    • v.7 no.2
    • /
    • pp.147-178
    • /
    • 2023
  • While most of countries today are opposing the issuance of private-led cryptocurrency, nevertheless they are actively jumping into the issuance of government-led digital currency such as CBDC. This article aims to find an answer to this dual attitude of countries. To achieve the purpose, this article finds out the characteristics of political power and economic interest that digital currency has and applies it to the international dimension of the Bretton Woods II System. Then come up to the conclusion that the answer can be found in the fact that the current dual attitude of countries is closely related to the crisis of the international monetary order. The Bretton Woods II System, which led the world economy through reckless monetary expansion based on credit currency, exposed its limitations through the 2008 global financial crisis and put countries into difficulties. In this situation, the cryptocurrency, which appeared by raising the issue of the monopoly power of the central authority in issuing currency, had no choice but to act as an opportunity to drive countries further and further into a corner. This article views CBDC as a national response to address these issues. In other words, countries maintain their monetary power by absorbing the challenge of private digital currency at the government level through CBDC, and use this as a stepping stone to reorganize the international monetary order in crisis with the intention to use it as a means to their advantage. That is what this article is trying to argue.