• Title/Summary/Keyword: 설계공모

Search Result 178, Processing Time 0.023 seconds

다세대주택설계계획안 현상공모 당선작 발표

  • Korea Institute of Registered Architects
    • Korean Architects
    • /
    • no.11 s.200
    • /
    • pp.71-85
    • /
    • 1985
  • 1984년 12월 31일 법률 제3766호로 건축법이 개정됨에 따라 새로운 주거유형인 다세대주택의 건축적 ‘아이디어’를 개발하여 국민주거 환경의 개선을 도모하기 위한 지침적 설계도서를 작성하여 이를 널리 보급코자 다세대주택 설계계획안 현상공모를 실시한바 지난 7월 15일부터 8월 31일 까지의 공모기간에 총 368명이 응모하여 3차에 걸친 심사결과 다음과 같이 수상자를 선정 하였기에 그 명단 및 당선작의 도면만을 소개하고자 한다.

  • PDF

현상설계경기 - 기흥상갈지구 주공아파트

  • Korea Institute of Registered Architects
    • Korean Architects
    • /
    • no.9 s.329
    • /
    • pp.116-117
    • /
    • 1996
  • 대한주택공사가 올해 100만호 주택건설을 이룬 기념사업의 일환으로 모범적인 주거환경을 위하여 경기도 용인시 기흥상갈지구를 100만호 시범단지로 지정하여 현상설계를 공모한 결과 총23개 업체(A블럭:10개업체, B블럭:13개업체)가 참여하여 A블럭의 최우(수작으로는 한빛건축사사무소(민승렬)의 안, B블럭의 최우수작은 (주)건축사사무소 창일엔지니어링(문정일)의 안이 당선되었으며 최종 8개 업체가 입선되었다. 특히, 이번 현상설계공모방식에서 특기할 만한 점은 2개 블록으로 나누어 공모함으로써 많은 신진건축가들의 참여도를 높여 그 결과 다양하고 참신한 아이디어를 많이 수렴할 수 있었다는 것이다.

  • PDF

디지털 핑거프린팅에 대한 공모 공격 기술

  • 김원겸;서용석;이선화
    • Review of KIISC
    • /
    • v.16 no.1
    • /
    • pp.49-58
    • /
    • 2006
  • 디지털 핑거프린팅(Digital Fingerprinting) 기술은 온라인상에서 멀티미디어 콘텐츠의 저작권을 보호하기 위한 기술의 하나로 워터마킹(Watermarking) 기술과 같이 콘텐츠에 저작권을 증명하기 위한 부가정보를 비인지적으로 삽입하고 추출하는 기술이다. 핑거프린팅 기술에서는 주로 구매자의 정보를 삽입하기 때문에 콘텐츠를 처음 유포한 구매자를 역추적 할 수 있는 기능(trace traitor)을 제공한다. 본 고에서는 핑거프린팅 된 콘텐츠에서 악의적인 사용자가 핑거프린트를 제거하기 위하여 같은 콘텐츠를 구매한 다른 구매자와 공모하는 기술과, 이런 공모 후에도 핑거프린트를 추출할 수 있도록 삽입 코드를 공모 허용하도록 설계하는 공모보안코드에 대해 고찰한다.

Construction of an Asymmetric Traitor Tracing Schemes with Anonymity (익명성을 보장하는 비대칭 공모자 추적 기법의 설계)

  • Lee, Moonsik;Kang, SunBu;Lee, Juhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.6
    • /
    • pp.1231-1242
    • /
    • 2012
  • Traitor tracing schemes deter traitors from sharing their private keys by tracing at least one of the subscribers who were implicated in the construction of a pirate decoder. In general, it is assumed that the system manager in the scheme generates and distributes the subscribers' private key. But if the system manager knows the subscribers' private keys, he cannot convince a third party of a certain subscriber's piracy. To solve this problem, the system manager should not know the whole parts of subscribers' private keys and this leads to researches of asymmetric schemes. Moreover for the purpose of enhancing subscribers' privacy, there were two proposals of introducing anonymity onto asymmetric traitor tracing schemes, but one of them turned out to be a failure. In this paper, we point out that the other proposal also has flaws. We consider how to introduce anonymity to traitor tracing schemes, as a result, we suggest a new framework which is practical. We also construct a scheme by using an anonymous credential system and an asymmetric traitor tracing scheme. We prove the security of our scheme and consider the typical applications.

An Embedded System Design of Collusion Attack Prevention for Multimedia Content Protection on Ubiquitous Network Environment (유비쿼터스 네트워크 환경의 멀티미디어 콘텐츠 보호를 위한 공모공격 방지 임베디드 시스템 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.15-21
    • /
    • 2010
  • This paper proposes the multimedia fingerprinting code insertion algorithm when video content is distributed in P2P environment, and designs the collusion codebook SRP(Small RISC Processor) embedded system for the collusion attack prevention. In the implemented system, it is detecting the fingerprinting code inserted in the video content of the client user in which it requests an upload to the web server and in which if it is certified content then transmitted to the streaming server then the implemented system allowed to distribute in P2P network. On the contrary, if it detects the collusion code, than the implemented system blocks to transmit the video content to the streaming server and discontinues to distribute in P2P network. And also it traces the colluders who generate the collusion code and participates in the collusion attack. The collusion code of the averaging attack is generated with 10% of BIBD code v. Based on the generated collusion code, the codebook is designed. As a result, when the insert quantity of the fingerprinting code is 0.15% upper in bitplane 0~3 of the Y(luminance) element of I-frame at the video compression of ASF for a streaming service and MP4 for an offline offer of video content, the correlation coefficient of the inserted original code and the detected code is above 0.15. At the correlation coefficient is above 0.1 then the detection ratio of the collusion code is 38%, and is above 0.2 then the trace ratio of the colluder is 20%.

Design and Implementation of Competition Application for Artists (예술인들을 위한 공모전 어플리케이션 설계 및 구현)

  • Kim, Hyo-Su;Choi, Yue-Soon;Joung, Suck-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.107-113
    • /
    • 2018
  • In this paper, we design and implement a contest application that enables artists to participate in contest activities, manpower, and job information using smart-phone, and to share and systematically manage the information. While the competition is very important for the artists, it is not easy for them to search the competition information due to lack of time. Therefore, it is effective to provide them with contest information suitable for their interests and to be more immersed in creative activities by sharing them. The core function is to provide a space where artists can share contests in real time through the contest bulletin board and aims to provide a variety of functions for convenient convenience, such as buying and selling of works by artists and spoon market for purchasing materials and art tools do.

KpqC 공모전 1 라운드 격자 기반 PKE/KEM 알고리즘 분석

  • Joohee Lee
    • Review of KIISC
    • /
    • v.33 no.3
    • /
    • pp.39-47
    • /
    • 2023
  • 양자컴퓨팅 기술이 발전함에 따라, 양자컴퓨터를 이용한 공격에도 안전한 암호인 양자내성암호(Post-Quantum Cryptography, PQC) 기술의 중요성이 대두되고 있다. NIST에서는 2016년부터 시작된 표준화 공모 1,2,3 라운드를 통해 2022년 공개키 암호 및 Key-establishment, 전자서명 분야의 양자내성암호 표준을 선정한 바 있으며, 현재는 4 라운드와 전자서명 분야 추가 선정 공모를 진행 중이다. 이러한 배경에서 2022년 국내에서도 양자내성암호 알고리즘 표준화 공모인 KpqC 공모전 1라운드를 시작하였고, 공개키 암호 및 Key-establishment 7종, 전자서명 9종의 알고리즘이 표준 후보로 제출되었다. 본고에서는 KpqC 공모전 1 라운드 공개키 암호 및 Key-establishment 알고리즘 중 격자 기반 공개키 암호/KEM(Key Encapsulation Mechanism) 알고리즘 3종 NTRU+, SMAUG, TiGER에 대해 분석 및 소개한다. 각 알고리즘의 기반 문제, 설계 방식, 특징, 안전성 분석 방식 등을 분석하고, 구현성능을 비교 분석한다.

Types of Landscape Design Concepts through Analysis of Award-Winners for Urban Park Design Competitions (도시공원 설계공모 수상작을 통해 본 조경설계개념의 유형)

  • Kim, A-Yeon
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.50 no.2
    • /
    • pp.102-115
    • /
    • 2022
  • The purpose of this study is to present types of design concept based on the specificity of landscape design, and to derive a theoretical framework for the landscape design concepts by analyzing the design concepts appearing in urban park design competitions. Through literature review, five types of landscape design concepts were categorized into value and vision, analysis and interpretation, form and structure, program and element, and process and operation. Using this framework, the design concepts shown in 96 works submitted to 18 domestic and overseas urban park design competitions were analyzed. The results of the analysis are summarized as follows. First, due to the complexity of contemporary urban parks, design concepts are presented as mixtures of main concepts and secondary concepts in multiple layers. Second, it was identified that design concepts of 'form and structure' were used the most in urban park designs, followed by the 'program and element' concepts. The 'value and vision' and 'analysis and interpretive' concepts are introduced as third and fourth. Third, the reason that the 'form and structure' concept is widely used as main and secondary concepts is judged to be because the form of a space, which is the key result of the design, has an important influence on the identity of the design. Fourth, the reason that the 'program and element' concept type is widely introduced is that urban park design has a stronger planning aspect to produce programs during the design process, compared with other design fields where programs are usually given in advance. Lastly, it is difficult to see that the properties of the site solely affect the type of design concept, because a design concept is the result of a complex and creative process in which a designer subjectively interprets the objective characteristics of the site and project, and given design guidelines can affect the type of design concept.

끊임없이 변화를 시도하는 건축가 아라타 이소자키

  • Baek, Ji-Hyeon
    • 주택과사람들
    • /
    • s.198
    • /
    • pp.66-67
    • /
    • 2006
  • 건축가 아라타 이소자키(Arata Isozaki)는 우리에게도 낯설지 않다. 세계 곳곳에서 수많은 작품들을 진행했을 뿐만 아니라 우리나라에 서도 백남준미술관 건립을 위한 건축설계 아이디어 국제 공모전의 심사위원, 행정도시 국제 공모전의 심사위원을 맡았기 때문이다.

  • PDF