• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.039 seconds

Implementation of PersonalJave™ AWT using Light-weight Window Manager (경량 윈도우 관리기를 이용한 퍼스널자바 AWT 구현)

  • Kim, Tae-Hyoun;Kim, Kwang-Young;Kim, Hyung-Soo;Sung, Min-Young;Chang, Nae-Hyuck;Shin, Heon-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.3
    • /
    • pp.240-247
    • /
    • 2001
  • Java is a promising runtime environment for embedded systems because it has many advantages such as platform independence, high security and support for multi-threading. One of the most famous Java run-time environments, Sun's ($PersonalJave^{TM}$) is based on Truffle architecture, which enables programmers to design various GUIs easily. For this reason, it has been ported to various embedded systems such as set-top boxes and personal digital assistants(PDA's). Basically, Truffle uses heavy-weight window managers such as Microsoft vVin32 API and X-Window. However, those window managers are not adequate for embedded systems because they require a large amount of memory and disk space. To come up with the requirements of embedded systems, we adopt Microwindows as the platform graphic system for Personal] ava A WT onto Embedded Linux. Although Microwindows is a light-weight window manager, it provides as powerful API as traditional window managers. Because Microwindows does not require any support from other graphics systems, it can be easily ported to various platforms. In addition, it is an open source code software. Therefore, we can easily modify and extend it as needed. In this paper, we implement Personal]ava A WT using Microwindows on embedded Linux and prove the efficiency of our approach.

  • PDF

Fast Detection of Finger-vein Region for Finger-vein Recognition (지정맥 인식을 위한 고속 지정맥 영역 추출 방법)

  • Kim, Sung-Min;Park, Kang-Roung;Park, Dong-Kwon;Won, Chee-Sun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.1
    • /
    • pp.23-31
    • /
    • 2009
  • Recently, biometric techniques such as face recognition, finger-print recognition and iris recognition have been widely applied for various applications including door access control, finance security and electric passport. This paper presents the method of using finger-vein pattern for the personal identification. In general, when the finger-vein image is acquired from the camera, various conditions such as the penetrating amount of the infrared light and the camera noise make the segmentation of the vein from the background difficult. This in turn affects the system performance of personal identification. To solve this problem, we propose the novel and fast method for extracting the finger-vein region. The proposed method has two advantages compared to the previous methods. One is that we adopt a locally adaptive thresholding method for the binarization of acquired finger-vein image. Another advantage is that the simple morphological opening and closing are used to remove the segmentation noise to finally obtain the finger-vein region from the skeletonization. Experimental results showed that our proposed method could quickly and exactly extract the finger-vein region without using various kinds of time-consuming filters for preprocessing.

Performance Enhancement Method Through Science DMZ Data Transfer Node Tuning Parameters (Science DMZ 데이터 전송 노드 튜닝 요소를 통한 성능 향상 방안)

  • Park, Jong Seon;Park, Jin Hyung;Kim, Seung Hae;Noh, Min Ki
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.33-40
    • /
    • 2018
  • In an environment with a large network bandwidth, maximizing bandwidth utilization is an important issue to increase transmission efficiency. End-to-end transfer efficiency is significantly influenced by factors such as network, data transfer nodes, and intranet network security policies. Science DMZ is an innovative network architecture that maximizes transfer performance through optimal solution of these complex components. Among these, the data transfer node is a key factor that greatly affects the transfer performance depending on storage, network interface, operating system, and transfer application tool. However, tuning parameters constituting a data transfer node must be performed to provide high transfer efficiency. In this paper, we propose a method to enhance performance through tuning parameters of 100Gbps data transfer node. With experiment result, we confirmed that the transmission efficiency can be improved greatly in 100Gbps network environment through the tuning of Jumbo frame and CPU governor. The network performance test through Iperf showed improvement of 300% compared to the default state and NVMe SSD showed 140% performance improvement compared to hard disk.

Empirical Study on the Performance Analysis and Function of Jindo Coastal Vessel Traffic Service (진도 연안VTS의 성과 분석 및 기능에 관한 실증적 연구)

  • Jeong, Jae-Yong;Jung, Cho-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.18 no.4
    • /
    • pp.308-315
    • /
    • 2012
  • Hebei Spirit Oil Spill that happened in 2007 had prompted the need of revisiting the coastal safety. In response to this, Korea had made an effort to implement VTS in every coastline in the country. There are a lot of theoretical studies on VTS function nowadays, but coastal VTS are less frequently studied. In this paper, performance analysis results and accident prevention activities of Jindo Coastal VTS center were summarized and the Coastal VTS function are investigated. Jindo Coastal VTS covers relatively wide area and various places with various maritime traffic characteristics are the major navigation vessels, which means that it is important to control these vessels. Since the probability of accidents due to human error is relatively high in coastal area due to negligence tendency of crews during coastal area navigation, coastal VTS has to provide sufficient assistance to navigating vessels. Like most harbour VTS, Coastal VTS provides not only main information service, navigational assistance and traffic organization services but also various services related with advanced search-and-rescue assistance, marine national security, maritime crime prevention, oil spill response, traffic services for non-service vessel, and safety supervision for water leisure boats.

Overview of the KIOST-HYU Joint Experiment for Acoustic Propagation in Shallow Water Geological Environment (천해 지질환경에서의 음파전달 특성 연구를 위한 KIOST-한양대 공동실험 개요)

  • Cho, Sungho;Kang, Donhyug;Lee, Cheol-Ku;Jung, Seom-Kyu;Choi, Jee Woong;Oh, Suntaek
    • The Journal of the Acoustical Society of Korea
    • /
    • v.34 no.6
    • /
    • pp.411-422
    • /
    • 2015
  • This paper presents an overview of the geological environment investigation and underwater acoustic measurements for the purpose of "Study on the Relationship between the Geological Environment and Acoustic Propagation in Shallow Water", which are jointly carried out by KIOST (Korea Institute of Ocean Science & Technology) and Hanyang University in the western shallow water off the Taean peninsula in the Yellow Sea in April-May 2013. The experimental site was made up of various sediment types and bedforms due to the strong tidal currents and coastal geomorphological characteristics. The geological characteristics of the study area were intensively investigated using multi-beam echo sounder, sub-bottom profiler, sparker system and grab sampler. Acoustic measurements with a wide range of research topics in a frequency range of 20~16,000 Hz: 1) low frequency sound propagation, 2) mid-frequency bottom loss, 3) spatial coherence analysis of ambient noise, and 4) mid- frequency bottom backscattering were performed using low- and mid-frequency sound sources and vertical line array. This paper summarizes the topics that motivated the experiment, methodologies of the acoustic measurements, and acoustic data analysis based on the measured geological characteristics, and describes summary results of the geological, meteorological, and oceanographic conditions found during the experiments.

An Empirical Study on Improving Competitiveness of Korean Shipping Industry (한국 해운산업의 경쟁력강화 정책방안에 관한 실증연구)

  • Lee, Choong-Bae;Noh, Jin-Ho
    • Journal of Korea Port Economic Association
    • /
    • v.26 no.3
    • /
    • pp.259-278
    • /
    • 2010
  • This study analyzes the achievement of the shipping policies and the priority for the promotion of such policies, in order to consider the features of the shipping industries in Korea and other advanced shipping countries and manage the rapidly changing shipping environment actively. Based on such analysis, this study also discusses the promotional strategy to strengthen the international competitiveness of the shipping industry. Regarding the promotion of the related policies, it is necessary to establish a base for growth, strengthen a capacity of leading the market, and create an opportunity in the market. By considering such three factors, it has become known that the establishment of the market order is important for the establishment of a base for growth. It is important to consider the advancement of the shipping tax system. Also, the information-orientation and the knowledge-industrialization of the shipping industry need to be considered. In order to strengthen a capacity of leading the market, the stable security of the labor force in the shipping industry is the most important factor. Also, it is important to consider the development and the upbringing of the global mega career and the shipping business. Regarding the creation of an opportunity in the market, it is important to expand the range of the shipping exchange between South Korea and North Korea, which will influence the administrative and the operative results related with the promotion of the related policies.

Encryption Method Based on Chaos Map for Protection of Digital Video (디지털 비디오 보호를 위한 카오스 사상 기반의 암호화 방법)

  • Yun, Byung-Choon;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to the rapid development of network environment and wireless communication technology, the distribution of digital video has made easily and the importance of the protection for digital video has been increased. This paper proposes the digital video encryption system based on multiple chaos maps for MPEG-2 video encoding process. The proposed method generates secret hash key of having 128-bit characteristics from hash chain using Tent map as a basic block and generates $8{\times}8$ lattice cipher by applying this hash key to Logistic map and Henon map. The method can reduce the encryption overhead by doing selective XOR operations between $8{\times}8$ lattice cipher and some coefficient of low frequency in DCT block and it provides simple and randomness characteristic because it uses the architecture of combining chaos maps. Experimental results show that PSNR of the proposed method is less than or equal to 12 dB with respect to encrypted video, the time change ratio, compression ratio of the proposed method are 2%, 0.4%, respectively so that it provides good performance in visual security and can be applied in real time.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

A Study of Policy Direction on O2O industry developing (O2O산업 발전을 위한 정책방향 연구)

  • Kim, Hee Yeong;Song, Seongryong
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.13-25
    • /
    • 2017
  • The purpose of this study is to suggest the direction of O2O industry policy for solving the conflict problems with the traditional industry stakeholder and for enhancing the regulations as new industry development is inevitable. We make use of TAIDA that is one of scenario methods to accomplish the purpose and suggest the direction of policy. First, it is needed to prepare directly by government the environment that new business models are able to emerge easily with various consulting services and information supports like public system servers and IT infra, it is practical support policy. Second, positive legal application for new business and making the law for new business are needed in legal issues situation as soon as possible. Third, the conflicts with old and new industry would be managed to the direction of "predictable" progressively. Incongruity among laws, safety and security problems, and the conflict of stakeholder are urgent. Because of the limit in this study, it is expected that O2O industry is categorized in detail aligned to the characteristics and that new policies along to the separate industry areas are developed by the following study.

A Policy-driven RFID Data Management Event Definition Language (정책기반 RFID 데이터 관리 이벤트 정의 언어)

  • Song, Ji-Hye;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.55-70
    • /
    • 2011
  • In this paper, we propose a policy-driven RFID data management event definition language, which is possibly applicable as a partial standard for SSI (Software System Infrastructure) Part 4 (Application Interface, 24791-4) defined by ISO/IEC JTC 1/SC 31/WG 4 (RFID for Item Management). The SSI's RFID application interface part is originally defined for providing a unified interface of the RFID middleware functionality―data management, device management, device interface and security functions. However, the current specifications are too circumstantial to be understood by the application developers who used to lack the professional and technological backgrounds of the RFID middleware functionality. As an impeccable solution, we use the concept of event-constraint policy that is not only representing semantic contents of RFID domains but also providing transparencies with higher level abstractions to RFID applications, and that is able to provide a means of specifying event-constraints for filtering a huge number of raw data caught from the associated RF readers. Conclusively, we try to embody the proposed concept by newly defining an XML-based RFID event policy definition language, which is abbreviated to rXPDL. Additionally, we expect that the specification of rXPDL proposed in the paper becomes a technological basis for the domestic as well as the international standards that are able to be extensively applied to RFID and ubiquitous sensor networks.