• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.036 seconds

Development and Evaluation of 3-Axis Gyro Sensor based Servo motion control (3-Axis Gyro Sensor based on Servo Motion Control 장치의 성능평가기준 및 시험규격개발)

  • Lee, WonBu;Chang, Chulsoon;Kim, JeongKuk;Park, Soohong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.627-630
    • /
    • 2009
  • The combination of the marine use various multi sensor surveillance system technology with the development of servo motion control algorithm and gyro sensor in six freedom motion is implemented to analyze the movement response. The stabilization of the motion control is developed and Nano driving Precision Pan-Tilt/Gimbal system is obtained from the security positioning cameras with ultra high speed device is used to carry out the exact behavior of the device. The exact behavior will be used to make a essential equipment. Finally the development of the Nano Driving Multi Sensor, Nano of Surveillance System Driving Precision Pan-Tilt/Gimbal optimal design and production, 3-aix Gyro Sensor based with Servo Motion Control algorithm development, Image trace video software and hardware tracking the development is organized and discuss in details. The development of the equipment and the system integration are fully experimented and verified.

  • PDF

Development of Camera System Board Using ARM (ARM을 이용한 카메라 시스템 보드 개발에 관한 연구)

  • Choi, Young-Gyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.664-670
    • /
    • 2018
  • In modern society, CCTV, which is the eye of surveillance, is being used to collect image data in various ways in daily life. CCTV is used not only for security, surveillance, and crime prevention but also in many fields such as automobile and black box. In this paper, we have developed a STM32F407 ARM chip based camera system for various applications. In order to develop camera system, modeling of camera system based on 3D structure was carried out in SolidWorks environment. The PCB board design was developed to extract the PCB parts from the camera system modeling files into iges files, convert them from the Altium Designer tool into 3D and 2D boards, After designing the camera system circuit and PCB, we have been studying the implementation of the stable system by using TRM (Thermal Risk Management) tool to cope with the heat simulation generated on the board.

A Study on Food Truck business model utilizing NFC (NFC를 활용한 Food Truck 비즈니스 모델에 관한 연구)

  • Yoon, Youngdoo;Choi, Eunyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.135-137
    • /
    • 2014
  • The expansion of the transportation card, and the popularity of smart phones has been increasing social concern about the NFC technology. Has been focused on the use of e-commerce, most of the NFC, fulfilling the security problems or technical topic for this, but the reality is that the current debate on the new value added contents industry and a nonexistent connection. Leverage NFC for efficient order management system in order to build lunch or dinner by being pushed to ease restrictions on remodeling and renovation projects Food Truck vehicle through a small business support programs in the current government, but increasing interest in the Food Truck I study a model of ordering system for food truch 재소 s-guide system. A lot of the effectiveness of management as appropriate to the use of NFC for small business that operates as a server system is highly Food Truck tendencies tied to one router and server on the intranet without the need of internet connection system. I believe in this study S-Guide system contributes for business success for food truck of small business.

  • PDF

Design of Remote Broadcasting System Using LTE Moudule (LTE 모듈을 활용한 원격방송 시스템 설계)

  • Chae, Min-uk;Lee, Choong Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.389-391
    • /
    • 2019
  • In this study, we design a remote broadcasting system that can output announcement to a remote place using wired/wireless telephone. The designed remote broadcasting system uses the LTE module to amplify the telephone voice received wirelessly through the amplifier and output it. Also, a text message for broadcasting can be sent to a remote broadcasting system through a wired/wireless telephone capable of transmitting a text message, and the remote broadcasting system that receives the broadcasting text message can automatically output the corresponding announcement stored in the voice device. For security reasons, the telephone number of the receiver is analyzed by a comparison algorithm so that only the administrator and registered users can use the system. At this time, the recorded announcement broadcast is outputted through the speaker only when it is confirmed as the registered user. The system designed in this study allows the user to output announcements quickly without being limited by time and place.

  • PDF

A Study on The Practical Risk Mitigation Methodology for Systematical Risk Management of Information System (정보시스템의 체계적인 위험관리를 위한 실용적인 위험감소 방법론에 관한 연구)

  • Eom, Jung-Ho;Woo, Byeong-Koo;Kim, In-Jung;Chung, Tai-M.
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.125-132
    • /
    • 2003
  • In the paper, we can select the best safeguard as proposed the definite and systematical method and procedure on risk mitigation of risk management for information system. The practical risk mitigation methodology has a good fulfillment procedure and a definition to fulfill procedure on each phase. So, it is easy to fulfill and can apply to any risk management methodology. The practical risk mitigation is composed of 6 phases, which are the existing safeguard assessment, safeguard means selection, safeguard technique selection, risk admission assessment, cost-effective analysis and safeguard embodiment. The practical risk mitigation's advantages are as follow. Efficient selection of safeguards to apply to risk's features with safeguard's means and techniques before embodying safeguards. Prevention of redundant works and security budgets waste as re-using the existing excellent safeguards through the existing safeguard assessment. Reflection of organization's CEO opinions to require special safeguards for the most important information system.

Road Sign Recognition and Geo-content Creation Schemes for Utilizing Road Sign Information (도로표지 정보 활용을 위한 도로표지 인식 및 지오콘텐츠 생성 기법)

  • Seung, Teak-Young;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.252-263
    • /
    • 2016
  • Road sign is an important street furniture that gives some information such as road conditions, driving direction and condition for a driver. Thus, road sign is a major target of image recognition for self-driving car, ADAS(autonomous vehicle and intelligent driver assistance systems), and ITS(intelligent transport systems). In this paper, an enhanced road sign recognition system is proposed for MMS(Mobile Mapping System) using the single camera and GPS. For the proposed system, first, a road sign recognition scheme is proposed. this scheme is composed of detection and classification step. In the detection step, object candidate regions are extracted in image frames using hybrid road sign detection scheme that is based on color and shape features of road signs. And, in the classification step, the area of candidate regions and road sign template are compared. Second, a Geo-marking scheme for geo-content that is consist of road sign image and coordinate value is proposed. If the serious situation such as car accident is happened, this scheme can protect geographical information of road sign against illegal users. By experiments with test video set, in the three parts that are road sign recognition, coordinate value estimation and geo-marking, it is confirmed that proposed schemes can be used for MMS in commercial area.

A Framework for Time Awareness System in the Internet of Things (사물인터넷에서 시각 정보 관리 체계)

  • Hwang, Soyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1069-1073
    • /
    • 2016
  • The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications and covers a variety of protocols, domains, and applications. Key system-level features that IoT needs to support can be summarized as device heterogeneity, scalability, ubiquitous data exchange through proximity wireless technologies, energy optimized solutions, localization and tracking capabilities, self-organization capabilities, semantic interoperability and data management, embedded security and privacy-preserving mechanisms. Time information is a critical piece of infrastructure for any distributed system. Time information and time synchronization are also fundamental building blocks in the IoT. The IoT requires new paradigms for combining time and data. This paper reviews conventional time keeping mechanisms in the Internet and presents issues to be considered for combining time and data in the IoT.

One-Time Key Generation System for Agent Data Protection in Mobile Agent Systems (이동 에이전트의 데이타 보호를 위한 일회용 에이전트 키 생성 시스템)

  • Park, Jong-Youl;Lee, Dong-Ik;Lee, Hyung-Hyo;Park, Joong-Gil
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.309-320
    • /
    • 2001
  • This paper deals with security issues in a mobile agent system, especially protecting agent data from malicious agent servers. For this purpose, one-time key generation system, OKGS in short, is proposed. In OKGS, we integrate notions of a one-way hash function and a coupler. One-way function plays a major role in ensuring confidentiality and integrity of agent data. And the notion of a coupler is used to establish inter-relationship among consecutive encryption keys for agent data, i.e. all agent keys form a unidirectional chain. With these two features of OKGS, therefore, only the agent owner, who creates the agent bearing data, can decrypt and protect all the agent data which are gathered in the itinerary.

  • PDF

A Design of Maritime Information Network System Based on Mesh Network (Mesh Network 기반의 해상 정보 네트워크 시스템 설계)

  • Seo, Ki-Yeol;Oh, Se-Woong;Choi, Deuk-Jae;Park, Sang-Hyun;Suh, Sang-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.31 no.6
    • /
    • pp.497-502
    • /
    • 2007
  • The important purposes of research in ship operation are to ensure safe navigation, high efficiency of transportation, high accuracy, and security. IMO, develops a broad strategy for incorporating the use of new technologies in a structured way to ensure that their use is compliant with the various electronic navigational and communication technologies and services that are already available. As a base research for E-Navigation, therefore, this paper proposes a maritime information network based on Mesh Network that is one of the maritime broadband solutions. Firstly, this paper analyzes an international port network system and the requirements of port network for E-Navigation. Finally, it designs the maritime information network system based on Mesh Network and shows its validity for E-Navigation.

Implementation of Group Management System with Smart Phone Devices and Wireless Sensor Network (스마트폰 및 무선 센서 네트워크를 기반으로 한 그룹관리 시스템의 구현)

  • Lee, Seung-Joon;Jung, Kyung-Kwon;Lee, Hyun-Kwan;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.378-381
    • /
    • 2011
  • The group management system with Wireless Sensor Network and android application is proposed in this paper. The proposed system was composed of personal devices with sensor nodes of WSN, manager device of android platform, and the web server. The sensor node used by each group member send a data packet to the manager device every 2 seconds. The leader device displays and transmits entire information to the web server. The web server represents these information through web page. Therefore, guardians can assure their group member's safety and security on the web page. The RSSI value of each sensor node converted by computed log-normal path loss model into distance value and displays on the manager device and the web page.

  • PDF