• Title/Summary/Keyword: 기술적 요소

Search Result 9,651, Processing Time 0.037 seconds

Design of Digital Media Protection System using Elliptic Curve Encryption (타원 곡선 암호화를 이용한 영상 저작권 보호 시스템 설계)

  • Lee, Chan-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.1
    • /
    • pp.39-44
    • /
    • 2009
  • The advance of communication and networking technology enables high bandwidth multimedia data transmission. The development of high performance compression technology such as H.264 also encourages high quality video and audio data transmission. The trend requires efficient protection system for digital media rights. We propose an efficient digital media protection system using elliptic curve cryptography. Only key parameters are encrypted to reduce the burden of complex encryption and decryption in the proposed system, and the digital media are not played back or the quality is degraded if the encrypted information is missing. We need a playback system with an ECC processor to implement the proposed system. We implement an H.264 decoding system with a configurable ECC processor to verify the proposed protection system We verify that the H.264 movie is not decoded without the decrypted information.

A Password-Based Searchable Encryption using Smart Cards (스마트 카드를 이용한 패스워드 기반의 검색 가능한 암호화 기술)

  • Lee, Dong-Kun;Rhee, Hyun-Sook;Lim, Jong-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.56-61
    • /
    • 2012
  • User authentication is a necessity to set up secure system which only an authorized user can use various resource on the Internet. Encryption is to provide data privacy. Also, searchable encryption is to provide both data privacy and efficient management of data by searching with a keyword. The public key based searchable encryption requires in advance the authentication of user's public key as well as the secure management of a publlic/private key of a user, respectively. In cloud, it is purpose to use cloud various resources by using various devices, meanwhile, it is not sufficient resource that some devices manage public/private keys and certificates and it is not easy to implement these clients. To solve this problem, we propose a password-based saerchable encryption using smart cards which are temper-resistant devices.

A Study on the Preference by Groups and Quality Improvement Surveying of the Important Factor of 3D Spatial Information by Equipment (장비에 따른 3차원 공간정보 품질향상 요인추출 및 집단 간 선호도에 관한 연구)

  • Oh, Min-Kyun;Bea, Sang-Tea;Kim, Tea-Woo;Lee, Jung-Il
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.1
    • /
    • pp.3-21
    • /
    • 2016
  • This study analyzes the key factors of 3D spatial information in accordance with the establishment of aerial and ground equipment fusion, and the quality improvement solutions are delivered from the preference survey. Furthermore, it investigates the factors affecting the quality of the individual technical elements through the establishment of three-dimensional spatial information. It is for identifying the priority which needs to be improved, and this data will be used to identify the evaluation for factors, the technology development and its application. For this purpose, the presence or absence of equality is judged by the quantitative techniques through the preference survey of the gap between the experts of spatial information and survey and the general users who have experiences on 3D spatial information.

Mobile Contents Adaptation Network using Active Network Mechanisms (액티브 네트워크 메커니즘을 이용한 이동 컨텐츠 적응형 네트워크)

  • 김기조;이준호;임경식;오승희;남택용;손승원
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.4
    • /
    • pp.384-392
    • /
    • 2004
  • Mobile contents service providers have some difficulties to timely and proper service deployment due to rapid development cycle of diverse portable devices with different capabilities. A way to resolve the problem is to introduce a mobile contents service paltform that can adapt original mobile contents to diverse devices dynamically and automatically. In this paper, we propose a mobile contents service platform based on active network mechanisms, called Mobile Content Adaptation Network(MobiCAN). The MobiCAN node provides effective service deployment, execution, and maintenance features and accommodates service layering and service customization capabilities for easy deployment. The basic functional units of the MobiCAN node are micro services with well-defined service interfaces and service layering features. For reliable services among the MobiCAN nodes, we design new distributed and robust Overlay Management Protocols(OMPs). As an example of practical MobiCAN applications, we finally describe Dynamic Contents Customization Proxy(DCCP) service.

A Study of Methodology Based on Role-Based Serucity Agent Medical Information System Security Architecture Design (보안 에이전트 역할 기반에 기초한 의료정보시스템 소프트웨어 보안아키텍쳐 설계방안)

  • Lee, Dae-Sung;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.77-83
    • /
    • 2011
  • In addition to the rapid development of health information technology services for the development of new medical information, a lot of research is underway. Improve health care services for patients are many ways to help them. However, no information about the security, if only the technology advances in health care systems will create an element of risk and threat. Today's issues and access issues are stable over a public network. Ad hocsensor network using secure, non-integrated health information system's security vulnerabilities does not solve the security vulnerabilities. In the development and utilization of health information systems to be subject to greater restrictions. Different security policies in an environment with a medical information system security policy mechanism that can be resolved if people get here are needed. Context-aware and flexible policy of integration and confidential medical information through the resistance should be guaranteed. Other cross-domain access control policy for telecommunications should be protected. In this paper, that the caller's medical information system, diversification, diversification Security agent in the environment, architecture, design, plan, role-based security system are proposed. The proposed system architecture, design work in the field and in the utilization of one model are expected to be.

Performance Review of a Cycloid Speed Reducer for Ship Transport Vehicles using FEM (유한요소해석을 이용한 선박수송차량용 사이클로이드 감속기의 성능 검토)

  • Kang, Hyung-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.5
    • /
    • pp.2061-2066
    • /
    • 2011
  • A cycloid speed reducer is one of the rotational speed regulation devices of the machinery. A cycloid speed reducer has an advantage of transmitting high torque, but is known to be unsuitable for high speed rotation. However, it is almost impossible in an analytical method to find a use limit speed when installing such a speed reducer in a 200ton loading transporter. In this research the cycloid reducer was simulated to get its performance depending on friction energy loss in time domain by using by LS-DYNA. The maximum torque of the cycloid speed reducer is 3.5ton-m, so the comparison of analysis results between a case of 60rpm rotation and a case of 162rpm rotation with such a torque showed the following results. In the case of 60rpm rotation, the maximum stress appearing in the RV gear and the pin gear was 463MPa and 507MPa. Lost power due to friction was 50kW; In the case of 162rpm rotation, the maximum stress appearing in the RV gear and the pin gear was 550MPa and 538MPa. Lost power due to friction was 175kW, which was shown to be almost impossible to use.

Vehicle Detection in Dense Area Using UAV Aerial Images (무인 항공기를 이용한 밀집영역 자동차 탐지)

  • Seo, Chang-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.3
    • /
    • pp.693-698
    • /
    • 2018
  • This paper proposes a vehicle detection method for parking areas using unmanned aerial vehicles (UAVs) and using YOLOv2, which is a recent, known, fast, object-detection real-time algorithm. The YOLOv2 convolutional network algorithm can calculate the probability of each class in an entire image with a one-pass evaluation, and can also predict the location of bounding boxes. It has the advantage of very fast, easy, and optimized-at-detection performance, because the object detection process has a single network. The sliding windows methods and region-based convolutional neural network series detection algorithms use a lot of region proposals and take too much calculation time for each class. So these algorithms have a disadvantage in real-time applications. This research uses the YOLOv2 algorithm to overcome the disadvantage that previous algorithms have in real-time processing problems. Using Darknet, OpenCV, and the Compute Unified Device Architecture as open sources for object detection. a deep learning server is used for the learning and detecting process with each car. In the experiment results, the algorithm could detect cars in a dense area using UAVs, and reduced overhead for object detection. It could be applied in real time.

A Study on the Overlay Welding Process Optimization of GTAW by Double Torch (GTAW Double Torch의 육성용접 공정최적화에 관한 연구)

  • Lim, Byung-Chul;Son, Young-San
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.3
    • /
    • pp.73-78
    • /
    • 2016
  • In this study, GTAW was carried out on austenitic STS316 stainless steel. Overlay welding with the stellite-base filler metal was implemented using a double torch. The response variable was calculated on the measured Vickers hardness for process optimization using the Taguchi method and its response variable was then analyzed about effect on overlay welding characteristics. The optimal process design by the Taguchi method is extremely effective in the overlay welding process for the multiple response variables. In addition, the effects of contribution rate about each response variable was analyzed easily. The conditions of the optimal process were 105A, 18V, pre-heat treatment at $200^{\circ}C$, and post weld heat treatment at $100^{\circ}C$. The Vickers hardness of the specimens produced under the optimal condition of GTAW by the double torch was 8.19% higher than that by a single torch.

Design and Implementation of Workspace Safety Management System based on RFID using Variable Radio Wave Oscillation (가변적 전파발진을 이용한 RFID기반 작업장 안전관리 시스템 설계 및 구현)

  • Min, So-Yeon;Lee, Kwang-Hyoung;Jang, Seung-Jae;Lee, Keun-Wang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.8
    • /
    • pp.3660-3669
    • /
    • 2011
  • Demands for systemized management of workers' safety systemically in construction sites have been increased. Industrial accidents at work places are often happened by risk factors of construction sites, and also it brings a lot of loss as the correct direction for workers about locations to work is not delivered properly. In this paper, a safety supervision system for construction sites is designed and implemented to figure out the location of workers accurately and to provide the information about the status of works and workers in real-time by personal device which is based on RFID. The system designed in this paper achieved high performance in its function and efficiency through a performance test, compared with existing analogous systems.

Numerical Experimentations on Flow Impact Phenomena for 2-D Wedge Entry Problem (2차원 쐐기형 구조물 입수 시 발생하는 유체 충격 현상에 대한 수치 실험적 연구)

  • Yum, Duek-Joon;Du, Hun;Kim, Young-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.8
    • /
    • pp.3374-3383
    • /
    • 2011
  • In this study, numerical analyses for slamming impact phenomena have been carried out using a 2-dimensional wedge shaped structure having finite deadrise angles. Fluid is assumed incompressible and entry speed of the structure is kept constant. Geo-reconstruct(or PLIC-VOF) scheme is used for the tracking of the deforming free surface. Numerical analyses are carried out for the deadrise angles of $10^{\circ}$, $20^{\circ}$ and $30^{\circ}$. For each deadrise angle, variations are made for the grid size on the wedge bottom and for the entry speed. The magnitude and the location of impact pressure and the total drag force, which is the summation of pressure distributed at the bottom of the structure, are analyzed. Results of the analyses are compared with the results of the Dobrovol'skaya similarity solutions, the asymptotic solution based on the Wagner method and the solution of Boundary Element Method(BEM).