• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.032 seconds

A Basic Study of iBUM Development based on BIM/GIS Standard Information for Construction of Spatial Database (공간자료 구축을 위한 BIM/GIS 표준정보 기반 건축도시통합모델(iBUM)의 개발에 관한 기초연구)

  • Ryu, Jung Rim;Choo, Seung Yeon
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.27-41
    • /
    • 2014
  • Recently, BIM(Building Information Modeling) has been applied to the infrastructure such as road and bridge, and information about the outside environment of buildings is needed for maintaining and managing the large urban facilities. In addition, the convergence between spatial information and Big-data has a large potentiality, in respect that considerable profits and developments in other application problems such as various simulations and urban plans, national land security, may be brought about on the basis of the interoperability of information between BIM and GIS. Therefore, this study attempted to suggest the development direction of a model integrating building for spatial information analysis and city on the subject by comparing and analyzing difference between information system and shape expression of IFC, CityGML and LandXML to efficiently link information between IFC as a standard model of BIM and CityGML as a standard model in the GIS sector and to prepare a basic fusion strategy and a method of utilization between BIM and GIS. The result of the study are as follow. Firstly, contents and structure of IFC, CityGML and LandXML are compared and analyzed. Secondly, the development direction of iBUM(Integrated Building and Urban Model) suggested, which is based on convergence technology for analysis of space information. Finally, a strategy and method of the BIM and GIS are proposed in the iBUM environment.

Design of a effective Authorization Mechanism based on Kerberos (커버로스 기반의 효율적인 허가 메커니즘 설계)

  • Kim, Eun-Hwan;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.287-294
    • /
    • 2003
  • Authentication and authorization are essential functions for the security of distributed network environment. Authorization is determining and to decide whether a user or process is permitted to perform a particular operation. In this paper, we design an authorization mechanism to make a system more effective with Kerberos for authentication mechanism. In the authorization mechanism, Kerberos server operates proxy privilege server. Proxy privilege server manages and permits right of users, servers and services with using proposed algorithm. Also, privilege attribute certificate issued by proxy privilege server is used in delegation. We designed secure kerberos with proposed functions for effective authorization at the same time authentication of Kerberos mechanism.

Metabolic Rate Estimation for ECG-based Human Adaptive Appliance in Smart Homes (인간 적응형 가전기기를 위한 거주자 심박동 기반 신체활동량 추정)

  • Kim, Hyun-Hee;Lee, Kyoung-Chang;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.5
    • /
    • pp.486-494
    • /
    • 2014
  • Intelligent homes consist of ubiquitous sensors, home networks, and a context-aware computing system. These homes are expected to offer many services such as intelligent air-conditioning, lighting control, health monitoring, and home security. In order to realize these services, many researchers have worked on various research topics including smart sensors with low power consumption, home network protocols, resident and location detection, context-awareness, and scenario and service control. This paper presents the real-time metabolic rate estimation method that is based on measured heart rate for human adaptive appliance (air-conditioner, lighting etc.). This estimation results can provide valuable information to control smart appliances so that they can adjust themselves according to the status of residents. The heart rate based method has been experimentally compared with the location-based method on a test bed.

An Implementation of a RFID Reader Firmware for ISO/IEC 18000-6 Type B Specification (ISO/IEC18000-6 Type B 규격에 적합한 리더 펌웨어 개발)

  • Yang, Jing-Gil;Bae, Sung-Woo;Jung, Myung-Sub;Jang, Byung-Jun;Kim, Jun-O;Park, Jun-Seok;Seong, Yeong-Rak;Oh, Ha-Ryoung
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1039-1042
    • /
    • 2005
  • Recently, a considerable number of studies have been made on the $RFID^{[1-6]}$ systems. RFID is a technique of identifying an object using radio frequency transmission. The technology can be used to identify, track, sort or detect a wide variety of objects. The RFID system is composed of two main elements: a reader and a tag. Tags can either be active (powered by battery) or passive (powered by the reader field). The passive tags communicate back to the reader with a technique called 'backscatter'. RFID technology can be applied to the supply chain, security, logistics industry and etc. Especially, UHF RFID is worth noticing because of its relatively long identification range and commercial UHF RFID systems are under development. In this paper, we designed and implemented a UHF RFID reader firmware for ISO/IEC 18000-6 Type B specification.

  • PDF

Anti-interference Methods using Vector-based GPS Receiver Mode

  • Viet, Hoan Nguyen;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.5
    • /
    • pp.545-557
    • /
    • 2018
  • The Global Positioning System (GPS) has become popular and widely used in many fields from military to civilian applications. However, GPS signals are suffered from interference due to its weak signal over wireless channel. There are many types of interference, such as jamming, blocking multipath, and spoofing, which can mislead the operation of GPS receiver. In this paper, vector-based tracking loop model with integrity check is proposed to detect and mitigate the harmful effect of interference on GPS receiver operation. The suggested methods are implemented in the tracking loop of GPS receiver. As a first method, integrity check with carrier-to-noise ratio (C/No) monitoring technique is applied to detect the presence of interference and prevent contaminated channels out of tracking channels to calculate position. As a second method, a vector-based tracking loop using Extended Kalman Filter with adaptive noise covariance according to C/No monitoring results. The proposed methods have been implemented on simulated dataset. The results demonstrates that the suggested methods significantly mitigate interference of Additive White Gaussian Noise (AWGN) and improve position calculation by 44%.

Review on the Trends of Social Sciences Research in the International Agricultural Research Institute - Focused on the International! Rice Research Institute (IRRI) - (국제농업연구기관의 사회과학연구 동향 고찰 -국제미작연구소를 중심으로-)

  • 윤순덕
    • The Korean Journal of Community Living Science
    • /
    • v.15 no.3
    • /
    • pp.45-56
    • /
    • 2004
  • The purpose of this paper is to review research evolution and achievements, major activities, research manpower, and difficulties for social scientists, using IRRI's internal web site and Social Sciences Division's research literatures. The major findings are as follows: 1) Social research started with the establishment of Agricultural Economics Division (AED) in 1966, and it was developed into the Social Sciences Division (SSD) in 1990; 2) Their research has been geared towards developing technological and policy interventions that improve food security and raise the well-being of rice farmers through sustainable increase in the productivity of a rice-based production system; 3) Major activities of social sciences research for about four decades can be classified into the identification of technology needs, technology impact assessment, policy analysis, research prioritization, and capacity building for social science research in NARS (National Agricultural Research Systems). They have become increasingly important in alleviating the poverty of the rice growing and consuming population; 4) Social researchers at IRRI include economists, anthropologists, gender specialists, geographic information specialists, and rural sociologists; 5) Finally, this paper discusses the difficulties faced by social researchers.

  • PDF

Relay Selection for Two-hop Cooperative Jamming Network with Multiple Eavesdroppers (다수의 중계기와 도청자가 존재하는 협력 재밍 네트워크를 위한 중계기 선택 기법)

  • Choi, Yongyun;Lee, Jae Hong
    • Journal of Broadcast Engineering
    • /
    • v.21 no.1
    • /
    • pp.105-108
    • /
    • 2016
  • In this paper, a cooperative jamming network with multiple relays and multiple eavesdroppers is investigated. Among the relays, one best relay is selected to amplify and forward the signal to destination through two phases. To confuse eavesdroppers, the destination transmits a jamming signal in the first phase and the source transmits jamming signal in the second phase. Secrecy rate of this system is derived, and based on the available channel state information (CSI), relay selection schemes are proposed, respectively. Numerical results show that the performance of the proposed relay selection scheme outperforms than that of random relay selection scheme.

A Study on the Adaptation and Prospects of the 3-dimensional Computer graphics in the field of Fashion Design (웹스페이스 시대에 3차원 컴퓨터 그래픽스를 도입한 의상디자인 분야의 현황 및 전망에 관한 연구)

  • Bae Lee-Sa;Lee In-Seong
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.7 no.2
    • /
    • pp.1-10
    • /
    • 2005
  • This study intends to examine extensively on the current situation where the full capacity of 3D CG is not being highlighted because of the lack of the information and the awareness and to look at how the virtual reality technology is being applied ranging from the design of the clothes to the marketing. A set of processes ranging from the development of the clothing design to the marketing will be performed on the web. Designers will design with 3D CG and make the patterns and will hand this over to the producer together with the virtual swatch. But there are important problems to work out. First, it is the problem of the virtual fitting room. Second, it is the absence of the 3D CG, which is easy and convenient for the clothing design. Third, it is to perfect the visual reconstruction. Fourth, it is the security of the distribution system. Fifth, it also calls for the strengthened internet network that can smooth the flow of the tremendous data. Consumer will be able to produce according to their needs and will become designer and producer at the same time, resulting in the achievement of the consumer-oriented marketing in real sense.

  • PDF

Adaptive Face Region Detection and Real-Time Face Identification Algorithm Based on Face Feature Evaluation Function (적응적 얼굴검출 및 얼굴 특징자 평가함수를 사용한 실시간 얼굴인식 알고리즘)

  • 이응주;김정훈;김지홍
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.2
    • /
    • pp.156-163
    • /
    • 2004
  • In this paper, we propose an adaptive face region detection and real-time face identification algorithm using face feature evaluation function. The proposed algorithm can detect exact face region adaptively by using skin color information for races as well as intensity and elliptical masking method. And also, it improves face recognition efficiency using geometrical face feature and geometric evaluation function between features. The proposed algorithm can be used for the development of biometric and security system areas. In the experiment, the superiority of the proposed method has been tested using real image, the proposed algorithm shows more improved recognition efficiency as well as face region detection efficiency than conventional method.

  • PDF

Color Analysis for the Quantitative Aesthetics of Qiong Kiln Ceramics

  • Wang, Fei;Cha, Hang;Leng, Lu
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.97-106
    • /
    • 2020
  • The subjective experience would degrade the current artificial artistic aesthetic analysis. Since Qiong kiln ceramics have a long history and occupy a very important position in ceramic arts, we employed computer-aided technologies to quickly automatically accurately and quantitatively process a large number of Qiong kiln ceramic images and generate the detailed statistical data. Because the color features are simple and significant visual characteristics, the color features of Qiong kiln ceramics are analyzed for the quantitative aesthetics. The Qiong kiln ceramic images are segmented with GrabCut algorithm. Three moments (1st-order, 2nd-order, and 3rd-order) are calculated in two typical color spaces, namely RGB and HSV. The discrimination powers of the color features are analyzed according to various dynasties (Tang Dynasty, Five Dynasties, Song Dynasty) and various utensils (Pot, kettle, bowl), which are helpful to the selection of the discriminant color features among various dynasties and utensils. This paper is helpful to promoting the quantitative aesthetic research of Qiong kiln ceramics and is also conducive to the research on the aesthetics of other ceramics.