• Title/Summary/Keyword: 안전블록

Search Result 570, Processing Time 0.025 seconds

An Authentication Management using Biometric Information and ECC in IoT-Edge Computing Environments (IoT-EC 환경에서 일회용 생체정보와 ECC를 이용한 인증 관리)

  • Seungjin Han
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.142-148
    • /
    • 2024
  • It is difficult to apply authentication methods of existing wired or wireless networks to Internet of Things (IoT) devices due to their poor environment, low capacity, and low-performance processor. In particular, there are many problems in applying methods such as blockchain to the IoT environment. In this paper, edge computing is used to serve as a server that authenticates disposable templates among biometric information in an IoT environment. In this environment, we propose a lightweight and strong authentication procedure using the IoT-edge computing (IoT-EC) system based on elliptic curve cryptographic (ECC) and evaluate its safety.

Bitcoin(Gold)'s Hedge·Safe-Haven·Equity·Taxation (비트코인(금)의 헷지·안전처·공평성·세제 소고)

  • Hwang, Y.
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.13-32
    • /
    • 2018
  • Btcoin has made a big progress through anonymity, decentralized authority, sharing economy, multi-ledger book-keeping, block-technology and the convenient financial vehicle. Bitcoin has the characteristics of mining and supply by decentralized suppliers, limited supply quantity and the partial money-like function as well as gold. The paper studies the hedge and safe-haven of Bitcoin and gold on daily frequency data over the period of July 20, 2010-Dec. 27, 2017 employing Asymmetric Vector GARCH. It finds that gold has the hedge and safe-haven against inflation and capital markets while Bitcoin has the weak hedge and the weak safe-haven. It shows insignificant effects of inflations of US and Korea on the volatilities of Bitcoin and gold. It also suggests the necessity of clearing of vagueness behind the anonymity for fair and transparent trade through the law application in the absence or fault in law (Lucken im Recht). following the spirit of the living constitution (lebendige gutes Recht oder Vorschrift). The relevant institutions are hoped to be given some of obligations such as registration, minimum required capital. report, disclosure, explanation, compliance and governance with autonomous corresponding rights. The study also suggests the reestablishment of the relevant financial law and taxation law. The hedge would not be successfully accomplished without the vigilant cautions of investors.

Correlation between Urban Green Areas and Outdoor Crime Rates - A Case Study of Austin, Texas - (도시녹지와 옥외범죄율 간의 상관관계 연구 - 텍사스 오스틴 지역을 중심으로 -)

  • Kim, Young-Jae
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.47 no.1
    • /
    • pp.49-56
    • /
    • 2019
  • Urban green spaces have been contributing to the improvement of environmental, mental, and physical health for humans. In addition, recent studies showed the potential role of vegetation in reducing the amount of crime in inner-city neighborhoods at the micro-scale level. However, little is known about the positive role of urban green areas in improving urban safety at the regional level. The purpose of this study is to examine the relationship between urban green areas and actual outdoor crime rates, while also considering socio-demographic factors. The study area is the city of Austin, Texas, USA, which consists of 506 block groups. This study utilized socio-demographic factors based on U.S. Census data and vegetation-related factors utilizing GIS and ENVI software. For analyses, the analysis of variance (ANOVA) and an ordinary least square (OLS) regression were utilized. The results from ANOVA showed that yearly crime rates per acre for areas having 0%~25% trees in their neighborhoods were 0.46% and 1.05% higher than those of having 25%~50% and >50% trees in the neighborhoods, respectively. The results from the OLS regression represented that income, NDVI and park rates in neighborhoods were negatively associated with the crime rate per acre, whereas the percentage of minorities and the percentage of teenage school dropouts were positively associated with the crime rate per acre. This study implies that urban green areas may help to improve the safety of urban areas.

Comparison of shaping ability between single length technique and crown-down technique using Mtwo rotary file (Mtwo 전동 파일을 사용한 single length technique과 crown-down technique의 근관성형 효율 비교)

  • Lim, Yoo-Kyoung;Park, Jeong-Kil;Hur, Bock;Kim, Hyeon-Cheol
    • Restorative Dentistry and Endodontics
    • /
    • v.32 no.4
    • /
    • pp.385-396
    • /
    • 2007
  • The aims of this study were to compare the shaping effect and safety between single length technique recommended by manufacturer and crown-down technique using Mtwo rotary file and to present a modified method in use of Mtwo file. Sixty simulated root canal resin blocks were used. The canals were divided into three groups according to instrument and the manner of using methods. Each group had 20 specimens. Group MT was instrumented with single length technique of Mtwo, group MC was instrumented with crown-down technique of Mtwo and group PT was instrumented with crown-down technique of ProTaper. All of the rotary files used in this study were operated by an electric motor. The scanned canal images of before and after preparation were superimposed. These superimposed images were evaluated at apical 1 to 8 mm levels Angle changes were calculated. The preparation time, weight loss, instrument failure and binding, canal aberrations, and centering ratio were measured. Statistical analysis of the three experimental groups was performed with ANOVA and Duncan's multiple range tests for post-hoc comparison and Fisher's exact test was done for the frequency comparison. In total preparation time, group MT and group MC were less than group PT. In the aberrations, group MT had more elbows than those of group MC and group PT. The binding of group MC was least and group MT was less than group PT (P < 0.05). Under the condition of this study, crown-down technique using Mtwo rotary file is better and safer method than single length technique recommended by the manufacturer.

Optimized Implementation of Block Cipher PIPO in Parallel-Way on 64-bit ARM Processors (64-bit ARM 프로세서 상에서의 블록암호 PIPO 병렬 최적 구현)

  • Eum, Si Woo;Kwon, Hyeok Dong;Kim, Hyun Jun;Jang, Kyoung Bae;Kim, Hyun Ji;Park, Jae Hoon;Song, Gyeung Ju;Sim, Min Joo;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.8
    • /
    • pp.223-230
    • /
    • 2021
  • The lightweight block cipher PIPO announced at ICISC'20 has been effectively implemented by applying the bit slice technique. In this paper, we propose a parallel optimal implementation of PIPO for ARM processors. The proposed implementation enables parallel encryption of 8-plaintexts and 16-plaintexts. The implementation targets the A10x fusion processor. On the target processor, the existing reference PIPO code has performance of 34.6 cpb and 44.7 cpb in 64/128 and 64/256 standards. Among the proposed methods, the general implementation has a performance of 12.0 cpb and 15.6 cpb in the 8-plaintexts 64/128 and 64/256 standards, and 6.3 cpb and 8.1 cpb in the 16-plaintexts 64/128 and 64/256 standards. Compared to the existing reference code implementation, the 8-plaintexts parallel implementation for each standard has about 65.3%, 66.4%, and the 16-plaintexts parallel implementation, about 81.8%, and 82.1% better performance. The register minimum alignment implementation shows performance of 8.2 cpb and 10.2 cpb in the 8-plaintexts 64/128 and 64/256 specifications, and 3.9 cpb and 4.8 cpb in the 16-plaintexts 64/128 and 64/256 specifications. Compared to the existing reference code implementation, the 8-plaintexts parallel implementation has improved performance by about 76.3% and 77.2%, and the 16-plaintext parallel implementation is about 88.7% and 89.3% higher for each standard.

Gate-Level Conversion Methods between Boolean and Arithmetic Masks (불 마스크와 산술 마스크에 대한 게이트 레벨 변환기법)

  • Baek, Yoo-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.11
    • /
    • pp.8-15
    • /
    • 2009
  • Side-channel attacks including the differential power analysis attack are often more powerful than classical cryptanalysis and have to be seriously considered by cryptographic algorithm's implementers. Various countermeasures have been proposed against such attacks. In this paper, we deal with the masking method, which is known to be a very effective countermeasure against the differential power analysis attack and propose new gate-level conversion methods between Boolean and arithmetic masks. The new methods require only 6n-5 XOR and 2n-2 AND gates with 3n-2 gate delay for converting n-bit masks. The basic idea of the proposed methods is that the carry and the sum bits in the ripple adder are manipulated in a way that the adversary cannot detect the relation between these bits and the original raw data. Since the proposed methods use only bitwise operations, they are especially useful for DPA-securely implementing cryptographic algorithms in hardware which use both Boolean and arithmetic operations. For example, we applied them to securely implement the block encryption algorithm SEED in hardware and present its detailed implementation result.

On-Site Construction Method for U-Girder with Pre-tension and Verification of Analytical Performance of Anchoring Block (프리텐션 U형 거더 현장 제작 방법 및 정착 블록 해석적 성능 검증)

  • Park, Sangki;Kim, Jaehwan;Jung, Kyu-San;Seo, Dong-Woo;Park, Ki-Tae;Jang, Hyun-Ock
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.67-77
    • /
    • 2022
  • In South Korea, U-type girder development was attempted as a means to increase the length of I-type girder, but due to the large self-weight according to the post-tension method, the application of rail bridges of 30m or less is typical. There are not many examples of application of pre-tension type girder. This study does not limit the post-tension method, but applies the pre-tension method to induce a reduction in self-weight and materials used due to the reduction of the cross-section. In addition, we intend to apply the on-site pre-tensioning method using the internal reaction arm of the U-type girder. The prestressed concrete U-type girder bridge is composed of a concrete deck slab and a composite section. Compared to the PSC I-type, which is an open cross-section because the cross section is closed, structural performance such as resistance and rigidity is improved, the safety of construction is increased during the manufacturing and erection stage, and the height ratio is reduced due to the reduction of its own weight. Therefore, it is possible to secure the aesthetic scenery and economical of the bridge. As a result, it is expected that efficient construction will be possible with high-quality factory-manufactured members and cast-in-place members. In this paper, the introduction of the pre-tension method on-site and the analytical performance verification of the anchoring block for tension are included.

Assessment of Applicability of CNN Algorithm for Interpretation of Thermal Images Acquired in Superficial Defect Inspection Zones (포장층 이상구간에서 획득한 열화상 이미지 해석을 위한 CNN 알고리즘의 적용성 평가)

  • Jang, Byeong-Su;Kim, YoungSeok;Kim, Sewon ;Choi, Hyun-Jun;Yoon, Hyung-Koo
    • Journal of the Korean Geotechnical Society
    • /
    • v.39 no.10
    • /
    • pp.41-48
    • /
    • 2023
  • The presence of abnormalities in the subgrade of roads poses safety risks to users and results in significant maintenance costs. In this study, we aimed to experimentally evaluate the temperature distributions in abnormal areas of subgrade materials using infrared cameras and analyze the data with machine learning techniques. The experimental site was configured as a cubic shape measuring 50 cm in width, length, and depth, with abnormal areas designated for water and air. Concrete blocks covered the upper part of the site to simulate the pavement layer. Temperature distribution was monitored over 23 h, from 4 PM to 3 PM the following day, resulting in image data and numerical temperature values extracted from the middle of the abnormal area. The temperature difference between the maximum and minimum values measured 34.8℃ for water, 34.2℃ for air, and 28.6℃ for the original subgrade. To classify conditions in the measured images, we employed the image analysis method of a convolutional neural network (CNN), utilizing ResNet-101 and SqueezeNet networks. The classification accuracies of ResNet-101 for water, air, and the original subgrade were 70%, 50%, and 80%, respectively. SqueezeNet achieved classification accuracies of 60% for water, 30% for air, and 70% for the original subgrade. This study highlights the effectiveness of CNN algorithms in analyzing subgrade properties and predicting subsurface conditions.

Development of Switching and Heating Devices in Embedded Rack Track for Environmental-friendly Mountain Railway (친환경 산악철도 매립형 궤도의 선로전환기 및 히팅장치 개발)

  • Seo, Sung-il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.2
    • /
    • pp.503-510
    • /
    • 2020
  • Eco-friendly mountain railways operate on concrete rack tracks embedded on existing sharp curved and steep roads to preserve the environment in mountainous areas. Owing to the narrow roads, single lines are inevitable, and many branches are required. In branches, previous switchers and heating devices cannot be applied, because of the limited spacing for the rack and the slow removal of thick ice. To solve these problems, a switch and a heating device have been developed. The switcher changes the line by moving the block of concrete track with hydraulic actuators. The lack of discontinuity reduces the derailment risk and makes locking simple. The heating device uses high frequency induction coils to increase the efficiency and melt the thick ice rapidly. The prototype switcher and heating device were produced and operated to prove their performance. The heating device yielded a 10 times greater efficiency than the previous one. The switcher and heating device are the essential core technologies for the operation of mountain trams in winter and contribute to the spread of mountain railways to domestic or foreign resort areas by enhancing safety and efficiency. In addition, they can provide transportation rights to local residents in poor winter traffic, and bring about tourism and local economic growth.

Efficient Pseudo Random Functions for the e-seal Protection Protocol (e-seal 보안 프로토콜을 위한 효율적인 Pseudo Random Function)

  • Min Jung-Ki;Kang Seok-Hun;Chung Sang-Hwa;Kim Dong-Kyue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.274-276
    • /
    • 2006
  • e-seal은 RFID(Radio Frequency IDentification) 기술을 사용하여 원격에서 자동으로 봉인상태를 확인할 수 있는 컨테이너 봉인 장치를 말한다. RFID의 특징상 반도체 칩에 기록된 정보를 제 삼자가 쉽게 판독 및 변조할 수 있다는 취약점으로 인하여 활성화되지 못하고 있는 실정이다. ISO에서는 RFID의 취약점을 보안하기 위한 표준작업(ISO 18185)을 진행 중이다. 이 중, ISO 18185-4는 e-seal에 저장되는 자료나 리더와의 RF통신에서 데이터 보호를 위한 표준이다. 이와 관련된 연구로는 인증 프로토콜과 ISO 18185-4를 위한 보고서로 제출된 보안 프로토콜이 있다. 제안된 e-seal 보안 프로토콜을 적용하기 위해서는 e-seal과 리더 간의 데이터를 암/복호화할 키가 필요하지만, 키 서버를 통해 전달받은 마스터 키를 데이터 암/복호화 키로 바로 사용하는 것은 보안 상의 문제점을 야기할 수 있기 때문에 PRF(Pseudo Random Function)을 이용하여 마스터 키로부터 MTK(Mutual Transient Key)를 유도하고, MTK를 암/복호화 키로 사용해야 한다. 기존의 PRF는 일방향 해시 함수(MD5, SHA 등)를 기반으로 하는 HMAC[2. 3]을 일반적으로 사용하였다. 그러나 일방향 해시 함수는 e-seal과 같은 제한된 자원을 갖는 환경에 적합하지 않다. 따라서, 본 논문에서는 e-seal 보안 프로토콜을 위한 효율적인 PRF을 제안한다. 기존의 일방향 해시 함수 기반이 아닌 블록 암호화 알고리즘을 기반으로 하는 MAC을 이용하여 PRF을 보다 효율적으로 구현하였고, 블록 암호화 알고리즘은 AES를 선택 합성체 $GF((2^4)^2)$을 통해 하드웨어 모듈을 최적화 하였다. AES를 기반으로 하는 MAC은 HMAC에 비해 면적 및 처리율에서 뛰어난 결과를 보여주었다.<0.01).이상의 연구 결과, cook-chill생산 시 녹차 추출물의 첨가가 미생물적 품질유지에 효과가 있다고 사료되는 바 본 연구결과를 기초로 급식소에서 음식 생산 시 녹차 추출물 및 천연 항균성 물질 첨가에 따른 미생물적 품질 및 관능적 품질검사를 통한 레시피 개발에 관한 지속적인 연구가 수행되어야 하겠다.다.다리다보니 점심시간을 활용할 수 없게 되는 문제점에 대한 재검토가 필요하다. 따라서 차후 학교급식의 안전성 확보를 위한 급식환경 개선의 일환으로 식당공간 확보 시 신속한 시간 내에 급식이 가능하도록 넓은 공간과 쾌적한 환경의 식당 조성에 대해 관심을 기울여야 할 것으로 사료된다. 이상 여부를 반영하는 임상증상의 빈도가 높은 청소년기 남녀 중학생의 경우 아침과 저녁의 결식빈도 및 외식과 간식의 빈도가 높았고, 아침식사의 질과 체형만족도가 낮은 것으로 나타나 청소년의 건강과 식습관 및 체형만족도가 상호 관련성이 높은 것으로 나타났다. 따라서 본 연구 결과는 성장기 청소년의 건강 유지를 위하여 바람직한 식습관의 중요성을 재인식할 수 있었으며, 올바른 식습관 확립을 위한 영양교육의 중요성이 재확인되었다.경제적일 것으로 판단된다.er 90 % of good relative dynamic modulus of elasticity due to fineness of formation caused by the increase of the unit powder content and the improvement of flowability, without regard to the replacement of crushed stone fines. Therefore, it can be said that the usage of crushed stone fines can control the strength of super flowing concrete by replacement and re

  • PDF