• Title/Summary/Keyword: 안전블록

Search Result 577, Processing Time 0.025 seconds

The Risk Analysis and Stability Estimation of Ship Collision Protection of Myodo-Gangyang Suspension Bridge (묘도-광양간 현수교의 선박충돌 방지공의 위험도 분석 및 안정성 평가)

  • Chang, Yong-Chai;Park, Ki-Chul;Kim, Kyung-Taek
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.15 no.2
    • /
    • pp.127-133
    • /
    • 2009
  • The suspension bridge between Myodo and Gwangyang is located in the main navigation channel to Gwangyang Harbor. So, there is need for the collision protection against large vessels. In this paper, the method of risk analysis and non-linear numerical analysis are conducted to consider the ship collision effects. The results of risk analysis, the annual frequency of collapse is more than the acceptable frequency 0.0001. Therefore, as a ship collision protection, island protection with concrete block quay wall is planned. The ship collision force on the pylon is less than the lateral capacity of pylon from the nonlinear numerical analysis.

  • PDF

A Study of Way guide System Design for a Visual Handicapped in School (교육기관 내 시각장애인 목적지안내 시스템 디자인 연구)

  • Lee, Joong-Yeu;Cho, Wan-Sup
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.75-82
    • /
    • 2010
  • At this time, our country's social welfare system for the handicapped is switching to increase independence, education is the most important. This study increases the quality of Visual handicapped people's life which have limit to learn and reduces their inconvenience which may occur during their independent school life through the development of the system which helps them safely to reach their destination by themselves using IT technologies in an educational institute which helps their ability to get information and be independent. This study supports Visual handicapped people to move safely by using cell phone which is necessary items for most modern people, RFID tags and white canes with antenna and reader which read the information installed in the raised blocks outside of school buildings and in the hall or aisle inside of buildings and inform the path by voice and vibration.

Mutual Authentication Protocol for Safe Data Transmission of Multi-distributed Web Cluster Model (다중 분산 웹 클러스터모델의 안전한 데이터 전송을 위한 상호 인증 프로토콜)

  • Lee, Kee-Jun;Kim, Chang-Won;Jeong, Chae-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.731-740
    • /
    • 2001
  • Multi-distributed web cluster model expanding conventional cluster system is the cluster system which processes large-scaled work demanded from users with parallel computing method by building a number of system nodes on open network into a single imaginary network. Multi-distributed web cluster model on the structured characteristics exposes internal system nodes by an illegal third party and has a potential that normal job performance is impossible by the intentional prevention and attack in cooperative work among system nodes. This paper presents the mutual authentication protocol of system nodes through key division method for the authentication of system nodes concerned in the registration, requirement and cooperation of service code block of system nodes and collecting the results and then designs SNKDC which controls and divides symmetrical keys of the whole system nodes safely and effectively. SNKDC divides symmetrical keys required for performing the work of system nodes and the system nodes transmit encoded packet based on the key provided. Encryption packet given and taken between system nodes is decoded by a third party or can prevent the outflow of information through false message.

  • PDF

Analysis on the Scour Reduction Effect by Controlling Downflow (하강류 제어를 통한 교각세굴 감소 효과 분석)

  • Lee, Ho Jin;Oh, Hyoun Sik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.2
    • /
    • pp.61-67
    • /
    • 2018
  • Scour protection methods can be categorized as two types: The first is to reduce the horseshoe and wake vortices which are the main reasons for local scour. Either small cylindrical structures or separated vertical deflectors can be placed in front of the pier or the horizontal deflector (or collar) can be attached to the pier like the spoiler to reduce the dynamics of vortical structures. The second is to employ the protection layer to keep the bed material in place, which is a common method with a merit of immediate effect by using block mat or tetrapod. This study examined the effect of scour reduction using the former method. The relationship between the reflector interval and reduction of scour was not clear. It is assumed that the width of the reflector is somewhat correlated with the reduction of the scour. As the KC numbers increases, the Effect of Scour reduction rate is shown to decrease. Also, Scour reduction rate showed a rapid change at $U_R=25$ or KC = 8.

A Study on primitive polynomial in stream cipher (스트림암호에서 원시다항식에 대한 고찰)

  • Yang, Jeong-mo
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.27-33
    • /
    • 2018
  • Stream cipher is an one-time-pad type encryption algorithm that encrypt plaintext using simple operation such as XOR with random stream of bits (or characters) as symmetric key and its security depends on the randomness of used stream. Therefore we can design more secure stream cipher algorithm by using mathematical analysis of the stream such as period, linear complexity, non-linearity, correlation-immunity, etc. The key stream in stream cipher is generated in linear feedback shift register(LFSR) having characteristic polynomial. The primitive polynomial is the characteristic polynomial which has the best security property. It is used widely not only in stream cipher but also in SEED, a block cipher using 8-degree primitive polynomial, and in Chor-Rivest(CR) cipher, a public-key cryptosystem using 24-degree primitive polynomial. In this paper we present the concept and various properties of primitive polynomials in Galois field and prove the theorem finding the number of irreducible polynomials and primitive polynomials over $F_p$ when p is larger than 2. This kind of research can be the foundation of finding primitive polynomials of higher security and developing new cipher algorithms using them.

  • PDF

On derivation the System Analysis and Evaluation Indicators of Blockchain-based Smart Electronic Transport Waybill Platform for Improvement of Logistics Service Operation Efficiency and Personal Information Security (물류 서비스 운영 효율과 개인정보 보안 향상을 위한 블록체인 기반 스마트 전자 운송장 플랫폼 시스템 분석 및 평가지표 도출에 관한 연구)

  • Park, Jae-Min;Won, JoNg-Woon;Seong, Ki-Deok;Kim, Young-Min
    • Journal of the Korea Safety Management & Science
    • /
    • v.22 no.4
    • /
    • pp.75-86
    • /
    • 2020
  • With the advent of the 4.0 era of logistics due to the Fourth Industrial Revolution, infrastructures have been built to receive the same services online and offline. Logistics services affected by logistics 4.0 and IT technology are rapidly changing. Logistics services are developing using technologies such as big data, artificial intelligence, blockchain, Internet of things, and augmented reality. The convergence of logistics services and various IT new technologies is accelerating, and the development of data management solution technology has led to the emergence of electronic cargo waybill to replace paper cargo waybill. The electronic waybill was developed to supplement paper waybill that lack economical and safety. However, the electronic waybill that appeared to complement the paper waybill are also in need of complementation in terms of efficiency and reliability. New research is needed to ensure that electronic cargo waybill gain the trust of users and are actively utilized. To solve this problem, electronic cargo waybill that combine blockchain technology are being developed. This study aims to improve the reliability, operational efficiency and safety of blockchain electronic cargo waybill. The purpose of this study is to analyze the blockchain-based electronic cargo waybill system and to derive evaluation indicators for system supplementation.

Design of DID-based Verification Protocol for Strengthening Copyright Holders' Sovereignty (저작권자의 주권 강화를 위한 DID 기반 검증 프로토콜 설계)

  • Kim, Ho-Yoon;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.9
    • /
    • pp.47-58
    • /
    • 2022
  • Digital content is difficult to distinguish between the original and the replica due to its nature. For this reason, NFT technology using blockchain technology is attracting attention because it can guarantee the proof and scarcity of the original digital content. However, the NFT buyer does not own the copyright to the digital content, but the ownership. In particular, since the minting process of issuing NFTs is possible for anyone, there is a copyright threat to the copyright holder. In this study, we propose a verification protocol based on DID for the process of issuing and transacting NFTs for copyright protection of copyright holders' digital contents. As a research method, the problems of research cases related to digital contents were analyzed and the safety was comparatively analyzed. NFT issuance can only be issued by copyright holders whose identity has been verified through DID, and only users who have completed authentication can participate in the transaction to prevent indiscriminate theft and use of digital content and form a safe and transparent transaction market.

A Study on Stress Redistribution Mechanism for Tunneling in an Unconsolidated Ground with Inclined Layers (미고결 층상지반에서 터널굴착시 응력재분배 메커니즘에 관한 연구)

  • Park, Si Hyun;Ahn, Sang Ro
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.1C
    • /
    • pp.53-61
    • /
    • 2006
  • This study is aimed at to examine the stress redistribution mechanism for tunneling in an unconsolidated ground with inclined layers through model tests. To make the unconsolidated ground, two dimensional model ground is prepared with aluminum rods and blocks, which are frictional resistance free between testing apparatus walls and ground materials, by establishing the ground materials self-supporting. It is carried out to measure the ground deformation and the stress redistribution for model ground with tunneling by measuring apparatus respectively. For the ground deformation, surface settlements are measured to examine the deformation features during tunnel excavation. For the stress redistribution, the earth pressure acting on both the tunneling part and its surrounding parts is measured to examine their mutual relationship. Based on test results, precise examination is conducted on the stress redistribution mechanism in the unconsolidated ground with inclined layers during tunnel construction.

Distributed Identity Authentication System based on DID Technology (DID 기술에 기반 한 분산 신원 인증 시스템)

  • Chai Ting;Seung-Soon Shin;Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.17-22
    • /
    • 2023
  • Traditional authentication systems typically involve users entering their username and password into a centralized identity management system. To address the inconvenience of such authentication methods, a decentralized identity authentication system based on Distributed Identifiers(DID) is proposed, utilizing decentralized identity technology. The proposed system employs QR code scanning for login, enhancing security through the use of blockchain technology to ensure the uniqueness and safety of user identities during the login process. This system utilizes DIDs and integrates the InterPlanetary File System(IPFS) to securely manage organizational members' identity information while keeping it private. Using the distributed identity authentication system proposed in this study, it is possible to effectively manage the security and personal identity of organization members. To improve the usability of the system proposed in this study, research is needed to expand it into a solution.

Encryption of Specific Area in Digital Contents for Improving Speed of Cipher (암호화 속도 향상을 위한 디지털 콘텐츠의 특징 영역 암호화)

  • Cho, Sang-Il;Hong, Kwang-Jin;Jung, Kee-Chul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.148-150
    • /
    • 2005
  • 디지털 영상 콘텐츠는 쉽고 빠르게 복제와 전송이 가능하기 때문에 다수의 사용자가 동일한 콘텐츠를 공유하는 것이 가능하다. 이러한 디지털 콘텐츠의 특징은 많은 디지털 영상 콘텐츠 제작자의 창작 의욕을 저하시키고 콘텐츠 산업 발달을 저해하는 원인이 되고 있다. 따라서 최근 디지털 콘텐츠의 보호를 위한 다양한 연구가 활발하게 이루어지고 있다. 그러나 기존의 가산 암호 방식은 암호의 비도면에서 영상 암호화에 사용된 암호키를 추정할 수 있다는 단점이 있으며 난수 정보가 해독될 우려가 있다. 또한 주사선내 신호 절환 방식은 원영상의 히스토그램 정보를 그대로 담고 있어 암호화된 영상의 히스토그램 정보로 원영상의 종류를 추정할 수 있는 단점이 있고 블록간의 상관 관계를 계산하여 해독할 수 있다는 단점이 있다. 본 논문에서는 디지털 영상 콘텐츠의 특정 영역을 추출하고 이 영역에 대한 암호화를 함으로써, 새로운 암호 알고리즘의 개발 없이 기존의 알고리즘을 이용하여 암호화 속도를 개선하고 안전성을 향상시킬 수 있다.

  • PDF