• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.037 seconds

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

Implementation of a unified live streaming based on HTML5 for an IP camera (IP 카메라를 위한 HTML5 기반 통합형 Live Streaming 구현)

  • Ryu, Hong-Nam;Yang, Gil-Jin;Kim, Jong-Hun;Choi, Byoung-Wook
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.9
    • /
    • pp.99-104
    • /
    • 2014
  • This paper presents a unified live-streaming method based on Hypertext Mark-up Language 5(HTML5) for an IP camera which is independent of browsers of clients and is implemented with open-source libraries. Currently, conventional security systems based on analog CCTV cameras are being modified to newer surveillance systems utilizing IP cameras. These cameras offer remote surveillance and monitoring regardless of the device being used at any time, from any location. However, this approach needs live-streaming protocols to be implemented in order to verify real-time video streams and surveillance is possible after installation of separate plug-ins or special software. Recently, live streaming is being conducted through HTML5 using two different standard protocols: HLS and DASH, that works with Apple and Android products respectively. This paper proposes a live-streaming approach that is linked on either of the two protocols which makes the system independent with the browser or OS. The client is possible to monitor real-time video streams without the need of any additional plug-ins. Moreover, by implementing open source libraries, development costs and time were economized. We verified usefulness of the proposed approach through mobile devices and extendability to other various applications of the system.

A Study on the Improvement of Maritime Traffic Management by Introducing e-navigation (E-navigation을 활용한 해상교통관리체계 개선방안에 관한 연구)

  • An, Kwang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.2
    • /
    • pp.164-170
    • /
    • 2015
  • This study proposes the improvement of maritime traffic management for domestic ships and fishing vessels by introducing the e-navigation environment. This study discusses the development of present Vessel Traffic service (VTS) in a systematic aspect and a fuctional aspect. The concept and architecture of e-navigation operation system based on the General Information Center on Maritime Safety and Security (GICOMS) are proposed as a solution for the improvement of maritime traffic management in Korean coastal waters. Especially, means of data exchange between ships and ship-shore based on the Maritime Cloud and regional e-Data Center are discussed. This study will help to the implementation of the Korean e-navigation project which focuses on the safety of small ships and fishing vessels. In the future, it is needed to study for the development and operation of accident prevention system under the e-navigation environment.

Sound Monitoring System of Machining using the Statistical Features of Frequency Domain and Artificial Neural Network (주파수 영역의 통계적 특징과 인공신경망을 이용한 기계가공의 사운드 모니터링 시스템)

  • Lee, Kyeong-Min;Vununu, Caleb;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.8
    • /
    • pp.837-848
    • /
    • 2018
  • Monitoring technology of machining has a long history since unmanned machining was introduced. Despite the long history, many researchers have presented new approaches continuously in this area. Sound based machine fault diagnosis is the process consisting of detecting automatically the damages that affect the machines by analyzing the sounds they produce during their operating time. The collected sound is corrupted by the surrounding work environment. Therefore, the most important part of the diagnosis is to find hidden elements inside the data that can represent the error pattern. This paper presents a feature extraction methodology that combines various digital signal processing and pattern recognition methods for the analysis of the sounds produced by tools. The magnitude spectrum of the sound is extracted using the Fourier analysis and the band-pass filter is applied to further characterize the data. Statistical functions are also used as input to the nonlinear classifier for the final response. The results prove that the proposed feature extraction method accurately captures the hidden patterns of the sound generated by the tool, unlike the conventional features. Therefore, it is shown that the proposed method can be applied to a sound based automatic diagnosis system.

Diagnosis of Induction Motor Faults Using Inverter Input Current Analysis (인버터 입력전류 분석을 이용한 유도전동기 고장진단)

  • Han, Jungho;Song, Joong-Ho;Choi, Kyu-Hyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.492-498
    • /
    • 2016
  • It is well known that since abrupt faults in induction motors tend to lead to subsequent faults and deterioration of the drive apparatus, motor faults may lead to several operating restrictions, such as security problems and economic loss. A lot of research has been done in the area of diagnosis to detect machine faults and to prevent catastrophic hazards in the motor drive system. This paper presents a new method of motor current signature analysis in which the DC-link current of the inverter-driven induction motor system, where a single current sensor is employed instead of three AC current sensors, is measured, and fast Fourier transform analysis is performed. This proposed method makes it possible to easily discern and clearly separate the motor fault current signature from the normal operation current flowing through the stator and rotor windings.

A Proposal of Interoperability between Social Media and Blockchain-based Smart Contract System for Artwork Trading (예술품 거래를 위한 소셜 미디어와 블록체인 기반 스마트 계약 시스템의 연동 제안)

  • Lee, Eun Mi
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.2
    • /
    • pp.109-116
    • /
    • 2020
  • Social media is growing rapidly as a means of promoting artists' artworks and a channel for sales. However, since social media is not fundamentally a platform designed for trading, it has various limitations that make it difficult to ensure trust and security in carrying out transactions. In this paper, it is proposed interoperability between social media and blockchain-based smart contract system that can record and preserve the artist's profile, information related to artworks and details of the contract on the blockchain. The proposed interoperability allows artwork trading participants on social media to maintain mutual trust and to conduct the contract transparently. Also, the proposed interoperability consists of an API provided by the social media developer or an open source API without having to modify existing social media. This study is expected to contribute to the growth of the art trading market on social media by complementing the art trading practices on social media.

Design and Implementation of Walking Activity Prediction Service for Exercise Motive (운동 동기 부여를 위한 걷기 활동량 예측 서비스 설계 및 구현)

  • Kim, Bogyeong;Lee, Cheolhyo;Kim, DoHyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.99-104
    • /
    • 2016
  • The walking exercise can alleviate stress and also it can improve health fortheir lifetime. Recent development in Information and Communication Technologies (ICT) has laid the foundation for Internet of Things (IoT) to become the future technology. IoT has many applications in industry automation, security, smart homes and cities, education, health etc. In personal health-care domain, IoT is mainly used for monitoring fitness condition by observing current activity of individual. In this paper, we have proposed a novel IoT based personal wellness care system. Proposed system not only keep track of current fitness level but also provide future activity prediction based on history data along with standard recommendations. Predicted activity helps in motivating the individual to achieve the desired fitness level. Initially, we consider only walking activity for testing purpose and later, other types of activities/exercise will be captured for improved health care support.

Fault Diagnosis System based on Sound using Feature Extraction Method of Frequency Domain

  • Vununu, Caleb;Kwon, Oh-Heum;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.4
    • /
    • pp.450-463
    • /
    • 2018
  • Sound based machine fault diagnosis is the process consisting of detecting automatically the damages that affect the machines by analyzing the sounds they produce during their operating time. The collected sounds being inevitably corrupted by random disturbance, the most important part of the diagnosis consists of discovering the hidden elements inside the data that can reveal the faulty patterns. This paper presents a novel feature extraction methodology that combines various digital signal processing and pattern recognition methods for the analysis of the sounds produced by the drills. Using the Fourier analysis, the magnitude spectrum of the sounds are extracted, converted into two-dimensional vectors and uniformly normalized in such a way that they can be represented as 8-bit grayscale images. Histogram equalization is then performed over the obtained images in order to adjust their very poor contrast. The obtained contrast enhanced images will be used as the features of our diagnosis system. Finally, principal component analysis is performed over the image features for reducing their dimensions and a nonlinear classifier is adopted to produce the final response. Unlike the conventional features, the results demonstrate that the proposed feature extraction method manages to capture the hidden health patterns of the sound.

Design of Network-based Game Using the GoF Design Patterns

  • Kim Jong-Soo;Kim Tai-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.6
    • /
    • pp.742-749
    • /
    • 2006
  • In the network-based game where it uses the Internet infrastructure, the implementation is possible with the various methods. Such Applications are developed in the multi-tired architecture. There are many cases for the server to be separated from the hardware or the software. In this case, a lot of applications make the distributed process possible and are made as the multi-tiered architecture to develop the reusability of the existing software module. Especially, it is mostly general to separate for the case of a database server to a new tier. One of the important points of multi-tiered server side applications is security and because of this, it is difficult to share the related data about the design skill. Using design patterns, it gives help in reusing the existing written-code for the design of the game that needs a lot of money and time. Design Patterns are related to the software reuse. For the development of more efficient games, if well-defined design patterns are provided to the developers, then it would make more easy advanced game API and make possible the framework for the game development based on the API Through the analysis of the general network-based game currently servicing in the Internet, in this paper, we discuss how to implement a business logic tier using database system among the server side architectures. The main objective of this article is to show an efficient APIs(Application Programming Interfaces) design method which can be used to manage the data that must be saved to the database system among the packets that client/server have to be exchange.

  • PDF

The Development of Blood Bank Management Program (혈액 은행 전산 처리 프로그램의 개발)

  • Kim, Jong-Won;Lee, Seung-Kuk;Han, Kyou-Sup;Kim, Jin-Q;Cho, Han-Ik;Kim, Sang-In
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1989 no.05
    • /
    • pp.75-76
    • /
    • 1989
  • The blood bank is a field of clinical pathology which requires the most accuratemaintenanceofrecording. Because the mistake in it is directly related to a patient's life. So, the computerization of the blood bank is urgent to maintain a log blook arid to compare the patient's current data with past result. We developed the blood bank management program using 32 bit minicomputer. This is composed of 4 parts; a management of routine test result, special test result, the blood issue and statistics. The management of routine test result handles the patient's information and blood typing and compares above results with the past one of same patient. The management of special test result are for special immunohematologic tests like an irregular antibody, Coombs' test, and etc. Blood issue part records the type of the blood bag, component, and the name of issuer. Statistic part are made to get statistics of each day and each month by the blood type, and the type the blood component. The program is secured by the maintenance of operator's operation history and thu provision of the security code to each operator, without which no one can enter the system and after the content. So the stability and reliability of the data is obtained. This program will be upgraded for bar-code using system in the near future.

  • PDF