• Title/Summary/Keyword: 위치정보 보호

Search Result 590, Processing Time 0.032 seconds

Development of MATLAB GUI Based Software for Analysis of KASS Availability Performance (KASS 가용성 성능 평가를 위한 MATLAB GUI 기반 소프트웨어 설계)

  • Choi, Bong-kwan;Han, Deok-hwa;Kim, Dong-uk;Kim, Jung-beom;Kee, Chang-don
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.5
    • /
    • pp.384-390
    • /
    • 2018
  • This paper introduces a MATLAB graphical user interface (GUI) based software for analysis of korea augmentation satellite system (KASS) availability performance. This software uses minimum variance (MV) estimator and Kriging algorithm to generate integrity information such as user differential range error (UDRE) and grid ionospheric vertical error (GIVE). The information is offered to ground and aviation users in Korean region. The software also gives accuracy data, protection level data and availability map about each user position by using the integrity information. In particular the software calculates the protection level along a path of aircraft. We verified the result of protection level of aviation user by comparing them with the results of SBASimulator#2, which is a simulation tool of european geostationary navigation overlay service (EGNOS). As a result, the protection level error between the result of our software and the SBASimulator#2 was about 2% which means that the result of our software is accurate.

A study on the method of longitudinal connectivity for stream networks (하천의 종적 연속성 평가방법에 관한 연구)

  • Hong, Il;Kim, Won
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.459-459
    • /
    • 2021
  • 오래 전부터 농업용수 취수 등의 목적을 위해 설치된 하천 내 횡단구조물이 약 34,000개에 달하고, 홍수피해 방지를 위해 하천변을 따라 많은 제방이 설치되어 있다. 특히 보, 낙차공, 교각 보호공 등의 횡단구조물은 흐름의 단차를 발생시킴으로써 어류의 이동 등 하천의 종적 연속성을 훼손 또는 단절하고 있어 하천 수생태계 연속성 확보 측면에서 매우 중요한 요인으로 볼 수 있다. 하천 종적 연속성과 관련된 연구는 북미, 호주, 유럽, 일본 등에서 수생 종 특히, 어류를 중심으로 장벽의 영향을 분석하는 데 중점을 두고 진행되어 왔다. 하천 네트워크 규모에서 다수의 장벽 설치에 대한 누적 효과를 분석한 사례는 거의 없으며, 서식지 및 수생태계 연결과 관련하여, 하천 시스템의 네트워크 규모에서 속성을 설명하고 정량화하는 도구 역시 찾아보기 어렵다. 본 연구에서는 하천 네트워크 내의 종적 방향의 연결성을 정량화하기 위한 방법으로 Cote 등(2009)이 제시한 DCI(Dendritic Connectivity Index) 지표를 이용하였다. 수계 연속성 지표(DCI)는 하천 수계 내의 종적 연속성 평가를 목적으로 횡단구조물의 개소수와 위치, 어류의 이동률을 누적하여 정량화한 방법으로써, 구조물 단위 평가가 아닌 하천 단위 평가 방법이다. 곡성천과 삼척오십천을 대상으로 국가어도정보시스템 및 항공사진을 통해 구축한 구조물의 개소수와 위치정보를 이용하여 시계열 DCI를 산정하였다. 그리고 2차 조사에 걸쳐 횡단구조물 현황 및 수리 특성, 어류현황 및 이동특성 조사 및 분석결과를 DCI에 반영하여 DCIm을 산정하였다. 곡성천의 경우 현재(2018년) DCI 결과는 5.63%이며, 어류 이동률 적용 결과 DCIm은 6.29%로 산정되었고, 약 11.7% 증가하는 것으로 나타났다. 삼척오십천의 현재(2018년) DCI 결과는 9.78%이며, 어류 이동률 적용결과 DCIm은 10.34%로 산정되었고, 약 5.7% 증가하는 것으로 나타났다. 향후 하천 내 수생태계의 연속성을 확보하기 위해서는 우선적으로 하천 수생태계 훼손, 단절, 연속을 효과적으로 비교·평가할 수 있으며, 이를 통해 개선사업의 우순순위 등 의사결정을 위한 방법론의 개발이 필요하다.

  • PDF

Design of Real-time Disaster Safety management Solution in a Smart Environment (스마트 환경에서의 실시간 재난 안전 관리 솔루션 설계)

  • Seo, Ssang-Hee;Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.31-36
    • /
    • 2020
  • In recent years, increasing the variety of disasters and accidents that accompany large-scale damage. Disasters are accidents with uncertainty and have a direct impact on people's lives, safety and property protection. Therefore, it is necessary to establish and operate safety management systems such as prevention, response, and recovery for various disasters. Therefore, in this paper, a real-time disaster safety management solution in a smart environment was designed to systematically respond to disaster accidents. To this end, 1: 1 or 1: N situation propagation was performed to the situation room, related organizations, and experts through smart devices. Through this, the solution was configured to respond quickly and appropriately through multi-party information sharing and communication. In other words, we designed a solution that applied functions such as real-time and multi-party HD video transmission, mobile-type report management, voice / text situation propagation, location information sharing, recording and history management, and security.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

A Study on the Selection of the Optimal Region for Digital Watermarking in the Frequency Domain (주파수 영역에서의 최적의 워터마크 삽입영역 선정에 대한 연구)

  • Oh, Jae-Ho;Kim, Sun-Hyung;Lim, Hae-Jin
    • The KIPS Transactions:PartB
    • /
    • v.9B no.4
    • /
    • pp.459-464
    • /
    • 2002
  • In this paper, we propose a private digital watermarking method based on a wavelet transform to protect digital contents copyrights. We find out the optimal watermark insertion region and the optimal amount of watermark in order to satisfy robustness and imperceptibility against various attacks such as noise, compression, collusion, clipping, scaling to transfer the contents safely. Through this experiment, we could find out the adequate location of watermark insertion and proper amount of watermark, and transfer the watermarked image safely.

Otter Habitat Analysis and Regional Development Strategies in Dadohae National Park Using GIS Techniques (GIS기법을 이용한 다도해국립공원의 수달 서식가능지 분석과 지역개발 정책에 관하여)

  • Chang, Eun-Mi;Park, Kyeong;Chae, Hee-Young
    • Spatial Information Research
    • /
    • v.16 no.3
    • /
    • pp.343-357
    • /
    • 2008
  • Hongdo and Huksando belong to the Dadohae national park parks in Korea and are famous sightseeing spots in Shinahn-gun. One of the keystone species in this area is otter (Lutra lutra). We accomplished field works for finding its present habitat and condition analyses for the potential habitat in the area via spatial analyses with digital elevation model and satellite imagery. Isolated condition with coastal cliffs was one of the superior conditions over habitat in the main land, but the road kills of small animals were also observed. Three underground eco-corridors were suggested for the protection of otter habitat in the Shinahn-gun area. Regional development strategies of Shinahn-gun should be focused on the protection of safe and pristine habitat for otter population.

  • PDF

A Study on Data Storage and Recovery in Hadoop Environment (하둡 환경에 적합한 데이터 저장 및 복원 기법에 관한 연구)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.569-576
    • /
    • 2013
  • Cloud computing has been receiving increasing attention recently. Despite this attention, security is the main problem that still needs to be addressed for cloud computing. In general, a cloud computing environment protects data by using distributed servers for data storage. When the amount of data is too high, however, different pieces of a secret key (if used) may be divided among hundreds of distributed servers. Thus, the management of a distributed server may be very difficult simply in terms of its authentication, encryption, and decryption processes, which incur vast overheads. In this paper, we proposed a efficiently data storage and recovery scheme using XOR and RAID in Hadoop environment.

Monitoring Service Model of Dementia Patients (치매환자의 모니터링 서비스 모델 연구)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Young-Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.648-651
    • /
    • 2014
  • In this paper, we introduce the trends in age-related health care services for dementia research due to the rapid aging society. In Korea, the current increase in dementia patients and the disappearance of runaway because social welfare policy is insufficient state and requires a lot of effort in order to protect the patient's guardian. Therefore, In this paper, we propose the need for a monitoring service for dementia patients. The attachment by the wearable sensor and monitor the mobility of the patient causes the protector as possible to trace the location of the patient to monitor the safety of the patient standing with the system provides.

  • PDF

Study on Technical trend of physical security and future service (물리보안의 기술동향과 미래 서비스에 대한연구)

  • Shin, Byoung-Kon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.159-166
    • /
    • 2010
  • From public insecurity, access of wealth, alteration of population structure, and changes of security recognition, physical security has been continuously developed and changed. In these days, typical systems for physical security are unmanned security system using telephone network and security equipment, image recognition system using DVR and camera, and access control system by finger print recognition and RFID cards. However, physical security system is broadening its domain towards ICT based convergence with networked camera, biometrics, individual authentication, and LBS services. This paper proposes main technical trends and various security convergences for future physical security services by classifying the security categories into 3 parts; Individual security for personal protection, IT Convergence for large buildings, and Homeland Security for omni-directional security.

A Study on Estimation of Gait Acceleration Signal Using Gait Video Signal in Wearable Device (걸음걸이 비디오를 활용한 웨어러블 기기 사용자 걸음걸이 가속도 신호 추정)

  • Lee, Duhyeong;Choi, Wonsuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1405-1417
    • /
    • 2017
  • Researches that apply the acceleration signal due to user's gait measured at the wearable device to the authentication technology are being introduced recently. The gait acceleration signal based authentication technologies introduced so far have assumed that an attacker can obtain a user's gait acceleration signal only by attaching accelerometer directly to user's body. And the practical attack method for gait acceleration signal based authentication technology is mimic attack and it uses a person whose physical condition is similar to the victim or identifies the gait characteristics through the video of the gait of the victim. However, mimic attack is not effective and attack success rate is also very low, so it is not considered a serious threat. In this paper, we propose Video Gait attack as a new attack method for gait acceleration signal based authentication technology. It is possible to know the position of the wearable device from the user's gait video signal and generate a signal that is very similar to the accelerometer's signal using dynamic equation. We compare the user's gait acceleration signal and the signal that is calculated from video of user's gait and dynamic equation with experiment data collected from eight subjects.