• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.039 seconds

Quality Enhancement of a Complex Holographic Display Using a Single Spatial Light Modulator and a Circular Grating

  • Bang, Le Thanh;Piao, Yan Ling;Kim, Jong Jae;Kim, Nam
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.1
    • /
    • pp.70-77
    • /
    • 2016
  • This paper proposes an optical system for complex holographic display that enhances the quality of the reconstructed three-dimensional image. This work focuses on a new design for an optical system and the evaluation of the complex holographic display, using a single spatial light modulator (SLM) and a circular grating. The optical system is based on a 4-f system in which the imaginary and real information of the hologram is displayed on concentric rectangular areas of the SLM and circular grating. Thus, this method overcomes the lack of accuracy in the pixel positions between two window holograms in previous studies, and achieves a higher intensity of the real object points of the reconstructed hologram than the original phase-reconstructed hologram. The proposed method provides approximately 30% less NMRS (Normal Root Mean Square) error, compared to previous systems, which is verified by both simulation and optical experiment.

A Study on Construction of Crime Prevention System using Big Data in Korea (한국에서 빅데이터를 활용한 범죄예방시스템 구축을 위한 연구)

  • Kim, SungJun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.217-221
    • /
    • 2017
  • Proactive prevention is important for crime. Past crimes have focused on coping after death and punishing them. But with Big Data technology, crime can be prevented spontaneously. Big data can predict the behavior of criminals or potential criminals. This article discusses how to build a big data system for crime prevention. Specifically, it deals with the way to combine unstructured data of big data with basic form data, and as a result, designs crime prevention system. Through this study, it is expected that the possibility of using big data for crime prevention is described through fingerprints, and it is expected to help crime prevention program and research in future.

Multiple Object Detection and Tracking System robust to various Environment (환경변화에 강인한 다중 객체 탐지 및 추적 시스템)

  • Lee, Wu-Ju;Lee, Bae-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.6
    • /
    • pp.88-94
    • /
    • 2009
  • This paper proposes real time object detection and tracking algorithm that can be applied to security and supervisory system field. A proposed system is devide into object detection phase and object tracking phase. In object detection, we suggest Adaptive background subtraction method and Adaptive block based model which are advanced motion detecting methods to detect exact object motions. In object tracking, we design a multiple vehicle tracking system based on Kalman filtering. As a result of experiment, motion of moving object can be estimated. the result of tracking multipul object was not lost and object was tracked correctly. Also, we obtained improved result from long range detection and tracking.

An Accuracy Improvement on Acquisition Time of SCADA RTU Status Event (SCADA RTU 상태이벤트 취득시간 정확도 개선)

  • Lee, Ju-Heon;Lee, Sang-Joong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.3
    • /
    • pp.332-341
    • /
    • 2013
  • SCADA RTU is a remote control unit equipped in substations for automatic operation of a power system. The RTU monitors and measures the operation status of remote substations to transmits the signals to upper SCADA system and receives control command signals from dispatch center to actuate corresponding apparatus. The RTU receives the standard time from GPS receiver to synchronize the times for all devices and acquires the status event of power apparatus using DIM. Without the time synchronization between GPS and RTU, stable operation of the power system and accurate analysis of the system fault are impossible due to the time error of SOE. In this paper, a test is performed to identify if the operation time of SCADA RTU DIM coincides with the standard time. And we tried to find the reason of error, to minimize the time discrepancy. Through this study, RTU operation time could be synchronized with the standard time within 10[ms] to improve the reliability of SOE data.

Optical Visual Cryptography based on Binary Phase Exctraction JTC (BPEJTC를 이용한 광 비쥬얼 크립토그래피)

  • 이상이;이승현
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.8
    • /
    • pp.589-597
    • /
    • 2003
  • Visual cryptography made it possible to decrypt thresholding scheme with not digital system but human vision system. This method, however, has some limit in it. Optical visual cryptography was proposed which used laser instead of human eyesight. As a result, it was possible to adapt cryptography to optical system. However, it also had some difficulties because it did not overcome the existing problem of visual cryptography completely. These problems occurred in the process of transferring data processing system from visual to optics. Therefore, it is appropriate to approach these problems in terms of optics. This paper analyzes the level of noise and the security characteristics for optical visual cryptography in terms of frequency based on joint transform correlator.

Development of Loss Prevention System WatchDog for Safe Saving and Management of Edited E-mail Attachment (전자 메일첨부 편집파일의 안전한 저장과 관리를 위한 분실 방지 시스템 WatchDog 개발)

  • Hong, Jun-Hu;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1059-1064
    • /
    • 2018
  • Many users feel a great pain owing to losing edited files. It is very serious loss in time and money. This problem occurs because email attachments are edited in 'Inbox' and the compute immediately shuts down with 'Save'. This is caused by the illusion that the 'save' in a temporary folder is saved to a secure hard disk. Our thesis proposes a loss-prevention system WatchDog for safe storage and folder management of the e-mail attachments. The proposed system operates a warning window pop-up when we 'Open(O)' and 'Save' the attachment. In addition, convenient folder management plans for safe copying and movement are shown through example programs.

Distributed Secure Mail System For Roaming User (이동 사용자를 위한 분산 보안 메일 시스템)

  • Yang, Jong-Phil;Sur, Chul;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.825-834
    • /
    • 2003
  • In this paper, we propose a new certified e-mail system which reduces user's computational overhead and distributes confidentiality of TTP(Trusted Third Partty). Based on the traditional cryptographic schemes and server-supported signiture for fairness and confidentiality of message, we intend to minimize to computation overhead of mobile device on public key algorithm. Therefore, our proposal becomes to be suitable for mail user sho uses mobile devices such as cellular phone and PDA. Moreover, the proposed system is fault-tolerant, secure against mobile adversary and conspiracy attack, since it is based on the threshold cryptography on server-side.

A Design and Implementation of a Secure Internet Phone System (인터넷 폰 보안 시스템의 설계 및 구현)

  • Park, Jae-Hui;Kim, Il-Min
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.157-162
    • /
    • 2002
  • In this study, the secure Internet phone system using digital signature and data encryption with DES algorithm and EDE algorithm was implemented. And new key distribution algorithm was suggested utilizing the Diffie-bellman algorithm. For reducing processing time, a table combined with S-BOX and P-BOX of the DES was used. The proposed system was implemented with Java and the results showed the processing time using DES algorithm for encryption was 1.46 seconds and that of EDE algorithm was 3.25 seconds respectively. This system can be applied to Protect the copyright of sound products and data using internet.

Study of Application of Block Chain for Vehicle-To-Grid System (Vehicle-To-Grid 시스템에서 블록체인 활용에 관한 연구)

  • Lee, Sunguk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.759-764
    • /
    • 2021
  • Because sensitive and private information should be exchanged between electric vehicles and a V2G service provider, reliable communication channel is essential to operate Vehicle-to-Grid (V2G) system which considers battery of electric vehicles as a factor of smart grid. The block chain is a platform for cryptocurrency transaction and fully distributed database system running by only equivalent node in the network without help of any central management or 3rd party. In this paper, the structure and operation method of the blockchain are investigated, and the application of the blockchain for the V2G system was also explained and analyzed.

Influencing Factors on Outsourcing Success in the Defense Sector (국방부문의 아웃소싱 성공도에 영향을 미치는 요인에 관한 연구)

  • Yu, Dae Beom;Oh, Jay In
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.79-103
    • /
    • 2016
  • The Korean Army has to construct a system that will enable it to cope immediately with the flexible military relationships in Northeast Asia by systematizing and improving the efficiency of operations. These improvements include building a smart and strong army, concentrating on cost-effective combat skills, maximizing the utilization of private resources, and establishing a military structure based on information and technology. Accordingly, this study proposes solutions to solve the problems affecting the success of outsourcing in the defense industry. Unlike outsourcing in other government ministries, outsourcing in the national defense sector may be unrealistic because this strategy is related to the renovation project of the Ministry of the National Defense. In general, the objective of outsourcing in the defense industry, similar to other businesses, is to improve efficiency and not to reduce troops and national defense budget. Several factors, such as identification and security guarantee, risk reduction, cost saving, quality improvement, the reliability of enterprise, and professional technology, are necessary to ensure outsourcing success in the national defense sector. In terms of effectiveness, the improvement in service quality significantly influences outsourcing success in the national defense sector. Eventually, the national defense forces must be strengthened to prevent the provocative actions of North Korea and other threats by improving identification, sense of national security, and quality unlike the current outsourcing of the government, as well as emulating German GEBB or PMC, which utilizes social capital.