• Title/Summary/Keyword: 역할기반 접근제어

Search Result 210, Processing Time 0.031 seconds

The Smart Contract based Conference Key Distribution Scheme (스마트계약 기반 회의용 키 분배 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.1-6
    • /
    • 2020
  • Recently, epidemic of covid-19 causes rapid increase in demand for untact video conferences. In existing server-client based video conference systems such as Zoom, Google Meet, etc., the server generates the conference key and controls the access rights of meeting members and their contents with it. In this case, the server can fabricate or repudiate the meeting. So, the privacy of the meeting members is not guaranteed. It's necessary to make the conference key distribution scheme where all participants can verify the trustfulness without help of the server. The smart contract is the program stored to the blockchain. Its contents cannot be altered due to the property of the blockchain, and everybody can verify the execution results of it. In this study, we propose the smart contract based conference key distribution scheme. The proposed scheme is consisted of smart contract deployment, conference key generation and verification stages. The smart contract replaces the role of existing trustful server and the meeting members can generate the conference key according to the protocols implemented on it. The proposed scheme can be applied to the video conference systems and only the meeting members can access the conference key.

Image Processing System based on Deep Learning for Safety of Heat Treatment Equipment (열처리 장비의 Safety를 위한 딥러닝 기반 영상처리 시스템)

  • Lee, Jeong-Hoon;Lee, Ro-Woon;Hong, Seung-Taek;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.77-83
    • /
    • 2020
  • The heat treatment facility is in a situation where the scope of application of the remote IOT system is expanding due to the harsh environment caused by high heat and long working hours among the root industries. In this heat treatment process environment, the IOT middleware is required to play a pivotal role in interpreting, managing and controlling data information of IoT devices (sensors, etc.). Until now, the system controlled by the heat treatment remotely was operated with the command of the operator's batch system without overall monitoring of the site situation. However, for the safety and precise control of the heat treatment facility, it is necessary to control various sensors and recognize the surrounding work environment. As a solution to this, the heat treatment safety support system presented in this paper proposes a support system that can detect the access of the work manpower to the heat treatment furnace through thermal image detection and operate safely when ordering work from a remote location. In addition, an OPEN CV-based deterioration analysis system using DNN deep learning network was constructed for faster and more accurate recognition than general fixed hot spot monitoring-based thermal image analysis. Through this, we would like to propose a system that can be used universally in the heat treatment environment and support the safety management specialized in the heat treatment industry.

An Elliptic Curve Cryptosystem based on Trust and RBAC to Reduce Security Overhead in Sensor Networks (센서네트워크의 보안 오버헤드를 줄이기 위한 신뢰와 RBAC 기반의 타원곡선암호)

  • Kim, Hyojin;Park, Ho-Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.11
    • /
    • pp.747-756
    • /
    • 2013
  • It is important to reduce unnecessary overhead in sensor network using battery. In addition encryption is important because of necessity of security. Since unavoidable overhead occurs in case of encryption, security and overhead are in trade-off condition. In this paper, we use a concept called trust to reduce the encryption overhead. We reduce overhead by controlling encryption key sizes while maintaining the security level where high and low trust nodes are mixed. We simulated and compared normal encryption and trust value based encryption. As a result, the latter has lower execution time and overhead. If we define a standard of trust levels considering purpose and circumstances of real network, we can use constrained resources efficiently in sensor network.

Exploring Cancer-Specific microRNA-mRNA Interactions by Evolutionary Layered Hypernetwork Models (진화연산 기반 계층적 하이퍼네트워크 모델에 의한 암 특이적 microRNA-mRNA 상호작용 탐색)

  • Kim, Soo-Jin;Ha, Jung-Woo;Zhang, Byoung-Tak
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.10
    • /
    • pp.980-984
    • /
    • 2010
  • Exploring microRNA (miRNA) and mRNA regulatory interactions may give new insights into diverse biological phenomena. Recently, miRNAs have been discovered as important regulators that play a major role in various cellular processes. Therefore, it is essential to identify functional interactions between miRNAs and mRNAs for understanding the context- dependent activities of miRNAs in complex biological systems. While elucidating complex miRNA-mRNA interactions has been studied with experimental and computational approaches, it is still difficult to infer miRNA-mRNA regulatory modules. Here we present a novel method, termed layered hypernetworks (LHNs), for identifying functional miRNA-mRNA interactions from heterogeneous expression data. In experiments, we apply the LHN model to miRNA and mRNA expression profiles on multiple cancers. The proposed method identifies cancer-specific miRNA-mRNA interactions. We show the biological significance of the discovered miRNA- mRNA interactions.

An Implementation of IMS Based PoC Service Deployment (IMS 기반의 PoC 서비스 전개 구현)

  • Lee, Jae-Oh;Lee, Hong-Kyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4878-4883
    • /
    • 2015
  • The IP Multimedia Subsystem(IMS) is a framework that provides access to the content of Internet and Telecom services anytime and anywhere with guaranteed Quality of Service(QoS) and manageability by separating control functions from bearer and services. The Service Delivery Platform(SDP) provides common interfaces and protocols to deploy existing or new services in an efficient way. Therefore SDP over IMS plays a role of bridge between established network and new IMS network by simplifying the interaction among application services. In order to enrich the multimedia network communication, we try to deploy the Push-to-talk over Cellular(PoC) service which is considered as the outstanding and distinguished half-duplex Voice over IP(VoIP) application service among deployable candidate services over mobile network. In this paper we investigate the advantages of PoC service and PoC architecture firstly, and then focus on the its practical implementation for the prototype to validate the feasibility of its deployment and realization.

A Security Protocol for Swarming Technique in Peer-to-Peer Networks (피어 투 피어 네트워크에서 스워밍 기법을 위한 보안 프로토콜)

  • Lee, Kwan-Seob;Lee, Kwan-Sik;Lee, Jang-Ho;Han, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1955-1964
    • /
    • 2011
  • With fast deployment of high-speed networks and various online services, the demand for massive content distribution is also growing fast. An approach that is increasingly visible in communication research community and in industry domain is peer-to-peer (P2P) networks. The P2P swarming technique enables a content distribution system to achieve higher throughput, avoid server or network overload, and be more resilient to failure and traffic fluctuation. Moreover, as a P2P-based architecture pushed the computing and bandwidth cost toward the network edge, it allows scalability to support a large number of subscribers on a global scale, while imposing little demand for equipment on the content providers. However, the P2P swarming burdens message exchange overheads on the system. In this paper, we propose a new protocol which provides confidentiality, authentication, integrity, and access control to P2P swarming. We implemented a prototype of our protocol on Android smart phone platform. We believe our approach can be straightforwardly adapted to existing commercial P2P content distribution systems with modest modifications to current implementations.

Human Emotion Recognition using Power Spectrum of EEG Signals : Application of Bayesian Networks and Relative Power Values (EEG 신호의 Power Spectrum을 이용한 사람의 감정인식 방법 : Bayesian Networks와 상대 Power values 응용)

  • Yeom, Hong-Gi;Han, Cheol-Hun;Kim, Ho-Duck;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.2
    • /
    • pp.251-256
    • /
    • 2008
  • Many researchers are studying about human Brain-Computer Interface(BCI) that it based on electroencephalogram(EEG) signals of multichannel. The researches of EEG signals are used for detection of a seizure or a epilepsy and as a lie detector. The researches about an interface between Brain and Computer have been studied robots control and game of using human brain as engineering recently. Especially, a field of brain studies used EEG signals is put emphasis on EEG artifacts elimination for correct signals. In this paper, we measure EEG signals as human emotions and divide it into five frequence parts. They are calculated related the percentage of selecting range to total range. the calculating values are compared standard values by Bayesian Network. lastly, we show the human face avatar as human Emotion.

Face Detection in Color Images Based on Skin Region Segmentation and Neural Network (피부 영역 분할과 신경 회로망에 기반한 칼라 영상에서 얼굴 검출)

  • Lee, Young-Sook;Kim, Young-Bong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.1-11
    • /
    • 2006
  • Many research demonstrations and commercial applications have been tried to develop face detection and recognition systems. Human face detection plays an important role in applications such as access control and video surveillance, human computer interface, identity authentication, etc. There are some special problems such as a face connected with background, faces connected via the skin color, and a face divided into several small parts after skin region segmentation in generally. It can be allowed many face detection techniques to solve the first and second problems. However, it is not easy to detect a face divided into several parts of regions for reason of different illumination conditions in the third problem. Therefore, we propose an efficient modified skin segmentation algorithm to solve this problem because the typical region segmentation algorithm can not be used to. Our algorithm detects skin regions over the entire image, and then generates face candidate regions using our skin segmentation algorithm For each face candidate, we implement the procedure of region merging for divided regions in order to make a region using adjacency between homogeneous regions. We utilize various different searching window sizes to detect different size faces and a face detection classifier based on a back-propagation algorithm in order to verify whether the searching window contains a face or not.

  • PDF

A Comparative Study on the Acceptability and the Consumption Attitude for Soy Foods between Korean and Canadian University Students (한국과 캐나다 대학생들의 콩가공식품에 대한 수응도 및 소비실태 비교 연구)

  • Ahn Tae-Hyun;Paliyath Gopinadhan
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.51 no.5
    • /
    • pp.466-476
    • /
    • 2006
  • The objective of this study was to compare and analyze the acceptability and consumption attitude for soy foods between Korean and Canadian university students as young consumers. This survey was carried out by questionnaire and the subjects were n=516 in Korea and n=502 in Canada. Opinions for soy foods in terms of general knowledge were that soy foods are healthy (86.5% in Korean and 53.4% in Canadian) or neutral (11.6% in Korean and 42.8% in Canadian), dairy foods can be substituted by soy foods (51.9% in Korean and 41.8% in Canadian), and soy foods are not only for vegetarians and milk allergy Patients but also for ordinary People (94.2% in Korean and 87.6% in Canadian). In main sources of information about soy foods, the rate by commercials on TV, radio or magazine was the highest (58.0%) for Korean students and the rate by family or friend was the highest(35.7%) for Canadian students. In consumption attitude, all of Korean students have purchased soy foods but only 55.4% of Canadian students have purchased soy foods, and soymilk was remarkably recognized and consumed then soy beverage and margarine in order. 76.4% of Korean students and 65.1% of Canadian students think soy foods are general and popular and can purchase easily, otherwise, in terms of price, soy foods were expensively recognized as 'more expensive than dairy foods' was 59.1% (Korean) and 54.7% (Canadian), and 'similar to dairy foods' was 36.8% (Korean) and 39.9% (Canadian). Major reasons for the rare consumption were 'I am not interested in soy foods' in Korean students (27.3%) and 'I prefer dairy foods to soy foods' in Canadian students (51.7%). However, consumption of soy foods in both countries are very positive and it will be increased.

A Design and Implementation of the Management Sever for the Gateway Supporting Home Networking Using the UML (UML을 이용한 흠 네트워킹 지원 게이트웨이 관리 서버 설계 및 구현)

  • 권진혁;민병조;강명석;남의석;김학배
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.3
    • /
    • pp.393-404
    • /
    • 2004
  • Recently, public home have used a more than two computer connected with network, and several home appliances using independently with internet or network are developing to be related closely with the network. Therefore, the home utilized for a simple terminal of the global network in the past is being expanded to another part of the sub network. For a variety of connecting home-area protocols with the existing existing network, we require a new Residential Gateway(RG) that does not only make the home-area network operating in the sub network but also connects to the external network. In this paper, RG has intrinsic limits against flexible service due to IP address assignment and hardware capacity. In order to solve this problem in the RG, we propose a Management Server(MS). The MS that offers the integrated managements and control services for a variety of devices connected the RG in the home-area. It can not only solve the dynamic IP address assigning problem but also assigns private IP addresses to the home network devices through the Network Address Translation(NAT). It also provides somewhat useful functions for the home network and the RG for other additional services. <중략> The MS is using a SNMP protocol for managing the RG in the domain, a polling method of the MS and the RG compose a sequence polling method, a polling method using a multi-process and a multi-thread. In this paper, we introduce a problem with polling method separately, show a polling method between the MS and the RG using a multi-thread.

  • PDF