• Title/Summary/Keyword: security control center

Search Result 215, Processing Time 0.032 seconds

Development and Evaluation of Real-time Acoustic Detection System of Harmful Red-tide Using Ultrasonic Sound (초음파를 이용한 유해적조의 실시간 음향탐지 시스템 개발 및 평가)

  • Kang, Donhyug;Lim, Seonho;Lee, Hyungbeen;Doh, Jaewon;Lee, Youn-Ho;Choi, Jee Woong
    • Ocean and Polar Research
    • /
    • v.35 no.1
    • /
    • pp.15-26
    • /
    • 2013
  • The toxic, Harmful Algal Blooms (HABs) caused by the Cochlodinium polykrikoides have a serious impact on the coastal waters of Korea. In this study, the acoustic detection system was developed for rapid HABs detection, based on the acoustic backscattering properties of the C. polykrikoides. The developed system was mainly composed of a pulser-receiver board, a signal processor board, a control board, a network board, a power board, ultrasonic sensors (3.5 and 5.0 MHz), an environmental sensor, GPS, and a land-based control unit. To evaluate the performance of the system, a trail was done at a laboratory, and two in situ trials were conducted: (1) when there was no red tide, and (2) when there was red tide. In the laboratory evaluation, the system performed well in accordance with the number of C. polykrikoides in the received level. Second, under the condition when there was no red tide in the field, there was a good correlation between the acoustic data and sampling data. Finally, under the condition when there was red tide in the field, the system successfully worked at various densities in accordance with the number of C. polykrikoides, and the results corresponded with the sampling data and monitoring result of NFRDI (National Fisheries Research & Development Institute). From the laboratory and field evaluations, the developed acoustic detection system for early detecting HABs has demonstrated that it could be a significant system to monitor the occurrence of HABs in coastal regions.

A Study on the Authentication Model using Integrated Management Center (통합관리센터를 이용한 인증 모델에 관한 연구)

  • Jin, Kwang-Youn;Choi, Shin-Hyeong;Seo, Jang-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.576-583
    • /
    • 2010
  • U-City includes various information devices and network techniques, which connect among several information devices. Integrated Management Center, which is the core element of u-City, is designed to manage all services of u-City and carry out the control function for a city. Accordingly, u-City needs the methods of user authentication and security, so these methods must be implemented to integrated management center. This paper is devoted to describe some conventional authentication techniques, and authentication methods and procedures that may be available to u-City network context. Proposed u-City integrated authentication model assigns IP to only right user after authenticating information terminals and users in u-City and authorizes users according to the policy, so this model plays an important role for the security of integrated management center.

Implementation of the Intelligent MUX System for Green USN (녹색 유비쿼터스 지능형 다중화장비의 구현)

  • Kang, Jeong-Jin;Chang, Hark-Sin;Lee, Young-Chul
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.1-5
    • /
    • 2010
  • Recently emphasizing the importance of security such as national major institutions' facilities or major industrial facilities for the maintenance of security/crime prevention due to specialization of the Green Information Technology(G-IT) and Green Ubiquitous Technology(G-UT) industry fields, The Security System Building linked high technology within the government-related organization, enterprise and army the military is urgently required. This paper is about the green USN intelligent an unmanned guard MUX system that receive the signals, from alarm device within surveillance area, with various ways of communication techniques and then transmit to local control center and remote control server trough TCP/IP network. This study enables the mutual senergy effect by realizing a total solution of an unmanned guard system and also significantly contributes to the global/domestic market expansion. That can be applied to the crime prevention/security fields in the Green Ubiquitous Environment Implemented Business(survalance-Home, Gu-City, Gu-Health, etc.), and will contribute to expand companies with international competitiveness that can provide the Green Ubiquitous Vision(Gu-Vision).

Design of Information Security in Ubiquitous City (u-City에서의 정보보안 설계 방안)

  • Yoon, Seuk-Kyu;Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.37-42
    • /
    • 2011
  • In this paper, the design methodology of information security is analyzed to implement the ubiquitous city (u-City). The definition, concept, and main u-services of u-City are presented. The main components, functio ns and offering services of u-City management center are presented, and the laws and network security requirements related to protect the personal information in collecting, processing, and exchanging are also analyzed. Three step security levels of Router/Switch, Firewall/VPN, and IPS are applied where main functions of in terception of abnormal packets($1^{st}$ level), access control for each service($2^{nd}$ level), and real-time network monitoring($3^{rd}$ level) are performed. Finally, application cases are presented to validate the security of personal information in providing the u-City services.

A Research and development of integrated Platform for data security between different smart home devices (안드로이드 기반 스마트 홈 디바이스의 통신 데이터 보안 및 통합 관리 플랫폼 연구개발)

  • Lee, Jeong-Gi;Yang, Chul-Seung;Kim, Jun-Ha;Kim, Kang-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1173-1179
    • /
    • 2015
  • In this paper is given to implements the Android-based integration platform to provide convenience for gender development and scalability , easy access for the user. Sensor-based smart home-related products have a different way of the data exchange so platform can be integrated easily and connect heterogeneous network products and external data transmission security processing for data communication and supported to enable the integration

Configuration of ACK Trees for Multicast Transport Protocols

  • Koh, Seok-Joo;Kim, Eun-Sook;Park, Ju-Young;Kang, Shin-Gak;Park, Ki-Shik;Park, Chee-Hang
    • ETRI Journal
    • /
    • v.23 no.3
    • /
    • pp.111-120
    • /
    • 2001
  • For scalable multicast transport, one of the promising approaches is to employ a control tree known as acknowledgement (ACK) tree which can be used to convey information on reliability and session status from receivers to a root sender. The existing tree configuration has focused on a 'bottom-up' scheme in which ACK trees grow from leaf receivers toward a root sender. This paper proposes an alternative 'top-down' configuration where an ACK tree begins at the root sender and gradually expands by including non-tree nodes into the tree in a stepwise manner. The proposed scheme is simple and practical to implement along with multicast transport protocols. It is also employed as a tree configuration in the Enhanced Communications Transport Protocol, which has been standardized in the ITU-T and ISO/IEC JTC1. From experimental simulations, we see that the top-down scheme provides advantages over the existing bottom-up one in terms of the number of control messages required for tree configuration and the number of tree levels.

  • PDF

A study on embedded & wireless fault code transmission device development for railroad vehicle (철도차량용 임베디드 무선전송장치의 개발에 관한 연구)

  • Kim, Jong-Keol;Shim, Ja-Hyun;Shon, Kang-Ho
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.1255-1261
    • /
    • 2010
  • An operating information and fault recode of train is very important information for safety driving and maintenance. And these information is increased and need high speed as the number of trains is increased. Wireless LAN or CDMA network is efficient to report more complicated and various information from vehicle to server in control center. Existing wireless transmission system has weakness due to transmission system is separated with TDCS and standalone. At first, standalone system needs space to be installed and cost is increased. And data transmission capacity and speed is limited by complicated structure that transmission system receive data thru serial communication like RS232 and then data transmission system send data to server in control center. This article is study to develop embedded & wireless fault code transmission device to be installed in TDCS to overcome weakness of space and to have more cost effective and simple structure. It is adapted 802.11b/g WiFi for wireless communication and OS is used embedded Linux that can easily implement wireless communication environment and ensure TCP/IP communication’s security. We also implement simple server to test wireless communication between embedded & wireless fault code transmission device and server in control center.

  • PDF

A Study on the Dynamic Voltage Stability Considering the Power System Security Control (계통(系統)의 안전성(安全性) 제어(制御)를 고려(考慮)한 동적(動的) 전압안정도(電壓安定度)에 관(關)한 연구(硏究))

  • Lee, Geun-Joon;Hwang, Jong-Young;Lee, Gil-Soon;Jeong, Tay-Ho;Kim, Keon-Jung;Kim, Yong-Bae
    • Proceedings of the KIEE Conference
    • /
    • 1994.11a
    • /
    • pp.54-60
    • /
    • 1994
  • The cause of black out of Tokyo Power in 1987 has been identified as the voltage stability problem. After this event many researchers has been interested in voltage stability or voltage collapse phenomena. The voltage instability is different Com the transient stability in the sense of reactive power mismatch and the long duration time. In this study, we developed efficient tool for analyze and control the dynamic voltage instability. To analize specific condition of dynamic voltage stability, quasi-dynamic simulation method is developed. To provide proper mathmatical model for dynamic voltage stability, generator, SVC, OLTC, induction motor models are introducted. To provide specified dynamic voltage stability, the authors considered to use reactive loss function(${\partial}Q/{\partial}p_L$) as reactive power facility control index. This program was tested and identified its usefulness in real KEPCO system.

  • PDF

Is there an association between labor induction and attention-deficit/hyperactivity disorder among children?

  • Jenabi, Ensiyeh;Seyedi, Mahdieh;Bashirian, Saeid;Fereidooni, Bita
    • Clinical and Experimental Pediatrics
    • /
    • v.64 no.9
    • /
    • pp.489-493
    • /
    • 2021
  • Background: There is evidence of destructive effects of oxytocin use during labor on neurodevelopment. Purpose: This meta-analysis pooled all observational studies to determine the association between labor induction and the risk of attention-deficit/hyperactivity disorder (ADHD) among children. Methods: All observational studies (case-control and cohort) were reviewed until September 2020 after searches of the PubMed, Scopus, and Web of Science databases, the gray literature, and conference proceedings. The pooled odds ratios (ORs), relative ratios (RRs), and 95% confidence intervals (CI (swere calculated as random effect estimates of association among studies. Results: All observational studies were reviewed, including 4 cohort studies including 2,885,743 participants and 3 case-control studies including 51,135 participants (10,961 with ADHD and 40,174 in control groups) with a sample size of 2,936,878 participants. The pooled estimates of OR and RR did not indicate a significant association between labor induction and ADHD among children (OR, 1.13; 95% CI, 0.90-1.35) and (RR, 1.10; 95% CI, 0.96-1.24). Conclusions: The findings showed that labor induction is not associated with an increased risk of ADHD among children. However, more studies are needed to investigate the relationship between labor induction and ADHD.

A Study on User Authentication with Smartphone Accelerometer Sensor (스마트폰 가속도 센서를 이용한 사용자 인증 방법 연구)

  • Seo, Jun-seok;Moon, Jong-sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1477-1484
    • /
    • 2015
  • With the growth of financial industry with smartphone, interest on user authentication using smartphone has been arisen in these days. There are various type of biometric user authentication techniques, but gait recognition using accelerometer sensor in smartphone does not seem to develop remarkably. This paper suggests the method of user authentication using accelerometer sensor embedded in smartphone. Specifically, calibrate the sensor data from smartphone with 3D-transformation, extract features from transformed data and do principle component analysis, and learn model with using gaussian mixture model. Next, authenticate user data with confidence interval of GMM model. As result, proposed method is capable of user authentication with accelerometer sensor on smartphone as a high degree of accuracy(about 96%) even in the situation that environment control and limitation are minimum on the research.