• Title/Summary/Keyword: 위치 보호

Search Result 1,147, Processing Time 0.027 seconds

Information Security Management System on Cloud Computing Service (클라우드 컴퓨팅 서비스에 관한 정보보호관리체계)

  • Shin, Kyoung-A;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.155-167
    • /
    • 2012
  • Cloud computing service is a next generation IT service which has pay-per-use billing model and supports elastically provisioning IT infra according to user demand. However it has many potential threats originating from outsourcing/supporting service structure that customers 'outsource' their own data and provider 'supports' infra, platform, application services, the complexity of applied technology, resource sharing and compliance with a law, etc. In activation of Cloud service, we need objective assessment standard to ensure safety and reliability which is one of the biggest obstacles to adopt cloud service. So far information security management system has been used as a security standard for a security management and IT operation within an organization. As for Cloud computing service it needs new security management and assessment different from those of the existing in-house IT environment. In this paper, to make a Information Security Management System considering cloud characteristics key components from threat management system are drawn and all control domain of existing information security management system as a control components are included. Especially we designed service security management to support service usage in an on-line self service environment and service contract and business status.

DMZ and Border Area Cultural Heritage Statuses and Protection Plans - Focusing on the Goseong area of Gangwon-do - (강원 고성지역 사례로 본 DMZ와 접경지역 문화유산 현황과 보호 방안)

  • SIM, Jaeyoaun
    • Korean Journal of Heritage: History & Science
    • /
    • v.55 no.3
    • /
    • pp.178-188
    • /
    • 2022
  • This article cites examples of cultural heritages that urgently require protection measures, and the reinterpretation of beacons, fortresses, and extremities identified in the process of conducting a cultural heritage investigation of the DMZ and bordering areas. It is true that there are various difficulties involved in implementing thorough protection measures considering the reality of the two Koreas' division. Despite this, the "Ordinance for the Protection of Military Cultural Properties" and the "Act on the Protection and Investigation of Buried Cultural Heritage" have been enacted and are in effect. In particular, in the "Ordinance for the Protection of Military Cultural Properties," the value of protecting "military assets" is emphasized. The identification and investigation of cultural heritages in the DMZ and border areas must continue. Although field research is currently difficult, the primary investigation conducted by high-altitude terrain analysis and literature research is considered effective. Furthermore, there are parts that require correction and supplementation with future field investigations. Although some trial and error is expected during these various cultural heritage investigations, they need to continue.

산업.물류.유아보호까지 '걱정 뚝'

  • Kim, Jong-Yul
    • 정보화사회
    • /
    • s.179
    • /
    • pp.8-9
    • /
    • 2006
  • 텔레매틱스의 한 분야를 차지하고 있는 LBS(지리정보서비스)는 도시 구석구석이 유.무선 네트워크로 연결돼 편리하고 안전한 환경을 조성하는 'U-시티' 시대를 구성할 수 있을 뿐아니라 생활의 편리함을 안겨준다는 이유에서 차세대 컨텐츠로 각광받고 있다. 모바일 분야의 경우, 그 동안 게임 위주의 오락 이 시장을 이끌어왔지만 향후에는 위치정보가 주도할 것으로 평가되고 있다.

  • PDF

A Study on DDoS Attack Mitigation Technique in MANET (MANET 환경에서 DDoS 공격 완화 기법에 관한 연구)

  • Yang, Hwan-Seok;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.3-8
    • /
    • 2012
  • MANET composed wireless nodes without fixed infrastructure provides high flexibility, but it has weak disadvantage to various attack. It has big weakness to DDoS attack because every node perform packet forwarding especially. In this paper, packet transmission information control technique is proposed to reduce damage of DDoS attack in MANET and search location of attacker when DDoS attacks occur. Hierarchical structure using gateway node is adopted for protect a target of attack in this study. Gateway node in cluster is included like destination nodes surely when source nodes route path to destination nodes and it protects destination nodes. We confirmed efficiency by comparing proposed method in this study with CUSUM and measured the quantity consumed memory of cluster head to evaluate efficiency of information control using to location tracing.

A Study on Islanding Detection of Distributed Generation Considering Fault Location (사고위치를 고려한 분산전원의 단독운전 상태 검출에 관한 연구)

  • 정승복;김재철
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.4
    • /
    • pp.118-123
    • /
    • 2004
  • This paper studies islanding detection of DG(distributed generation) considering fault location. Through the past studies, we found that islanding detection has been studied that DG disconnected when power islanding was detected by power state change and output change of DG. But, fault location was not considered. For example, fault in adjacent distribution line, fault on interconnection line fault, load shave by overload and normal operation were not considered. In this paper, We distinguish these considerations through power state change. Also, we proved islanding detection algorithm through PSCAD/EMTDC simulation.

Analysis of the wave motion and the relationship at the submerged breakwater with porous wave absorber using analytic solution (해석해를 통한 수중방파제와 다공성 소파장치에서의 파의 거동 해석 및 관계 분석)

  • Park, Jin-Ho;Yoo, Je-Seon;Cho, Yong-Sik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2008.05a
    • /
    • pp.2170-2174
    • /
    • 2008
  • 기후상승으로 해수면의 상승으로 인해 삼면이 바다로 둘러싸인 지형적 특성을 가진 우리나라 연안에 파도로부터 시설물의 보호가 중요한 요인으로 꼽히고 있다. 파의 에너지를 저감하여 연안에 위치한 시설물 보호에 많은 연구가 진행되고 있다. 여기서 다루게 될 수중방파제와 다공성 소파장치는 반사와 수심의 변화에 따른 분산효과로 입사파의 에너지 감소를 통해 연안에 위치한 구조물과 배후시설에 대한 피해를 줄이는데 주목적이 있다. 사다리꼴 수중방파제의 전 후면의 기울기를 변화시키며 장주기파의 입사파와 투과파에 대한 연구가 Chang과 Liou(2004)에 의해 연구되었고, 수직 다공성 소파장치의 두께를 변화하며 반사계수와의 상관 관계에 대한 연구가 Madsen(1983)에 의해 진행되었다. 본 연구에서는 해석해를 통해 수중방파제와 다공성 소파장치가 있는 경우에 투과파와 소파장치 전 후면에서의 처오름 높이의 변화에 대해 알아보고, 그에 따른 관계를 알아보고자 한다. 구간은 각각 수심이 일정한 지역과 변화하는 지역, 다공성 소파제가 있는 지역으로 설정하여 각 구간마다 해석해를 적용하여 파고를 측정하였다. 측정된 파고를 이용하여 투과율은 수중방파제를 통과한 입사파와 투과파의 관계를 통해 측정할 수 있다. 수중방파제를 투과한 파는 다공성 소파장치를 통과하면서 파고가 급감하는 현상을 다공성 소파장치 전 후면에서 측정되는 파고를 통해 알 수 있다.

  • PDF

DWT Based Multiwatermarking for Authentication and Detection of Image Modification (이미지 인증과 변형 검출을 위한 DWT기반 다중워터마킹)

  • Kang Tae-Hwan;Jang Ho-Hyun;Kim Dong-Seo;Joo Nak-Keun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.480-484
    • /
    • 2005
  • In this paper, the multiwatermarking method to make it possible to the authentication, modification detection and copyright protection of the digital image was proposed. After the original image is transformed by the DWT(Discrete Wavelet Transform), the encrypted watermark information is embedded into the LSB(Least Significant Bit) of LL band on the low frequence domain for authenticating and detecting modified position in the image. And watermark information is embedded by exchanging the wavelet coefficient for the copyright protection. Thereby, we can authenticate the modification and detect the modified location by extracting the values of LSB on the low frequence domain. And we can perceive the copyright information of original image by extracting the embedded watermark on the high frequence domain.

  • PDF

A Hybrid Digital Watermarking Technique for Copyright Protection and Tamper Detection on Still images (정지영상에서 저작권 보호 및 위변조 검출을 위한 하이브리드 디지털 워터마킹 기법)

  • Yoo Kil-Sang;Song Geun-Sil;Choi Hyuk;Lee Won-Hyung
    • Journal of Internet Computing and Services
    • /
    • v.4 no.4
    • /
    • pp.27-34
    • /
    • 2003
  • Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Therefore. copyright protection of digital contents and insurance of digital image integrity become major issues. In this paper, we propose a hybrid watermarking method to identify locations of tampered region as well as copyright. Our proposed algorithms embed the PN-sequence into low frequency sub-band of the wavelet transform domain and it doesn't need the original image in extraction procedure. The experimental results show good robustness against any signal processing with tamper detection on still image.

  • PDF

Wider Depth Dynamic Range Using Occupancy Map Correction for Immersive Video Coding (몰입형 비디오 부호화를 위한 점유맵 보정을 사용한 깊이의 동적 범위 확장)

  • Lim, Sung-Gyun;Hwang, Hyeon-Jong;Oh, Kwan-Jung;Jeong, Jun Young;Lee, Gwangsoon;Kim, Jae-Gon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.06a
    • /
    • pp.1213-1215
    • /
    • 2022
  • 몰입형 비디오 부호화를 위한 MIV(MPEG Immersive Video) 표준은 제한된 3D 공간의 다양한 위치의 뷰(view)들을 효율적으로 압축하여 사용자에게 임의의 위치 및 방향에 대한 6 자유도(6DoF)의 몰입감을 제공한다. MIV 의 참조 소프트웨어인 TMIV(Test Model for Immersive Video)에서는 복수의 뷰 간 중복되는 영역을 제거하여 전송할 화소수를 줄이기 때문에 복호화기에서 렌더링(rendering)을 위해서 각 화소의 점유(occupancy) 정보도 전송되어야 한다. TMIV 는 점유맵을 깊이(depth) 아틀라스(atlas)에 포함하여 압축 전송하고, 부호화 오류로 인한 점유 정보 손실을 방지하기 위해 깊이값 표현을 위한 동적 범위의 일부를 보호대역(guard band)으로 할당한다. 이 보호대역을 줄여서 더 넓은 깊이값의 동적 범위를 사용하면 렌더링 화질을 개선시킬 수 있다. 따라서, 본 논문에서는 현재 TMIV 의 점유 정보 오류 분석을 바탕으로 이를 보정하는 기법을 제시하고, 깊이 동적 범위 확장에 따른 부호화 성능을 분석한다. 제안기법은 기존의 TMIV 와 비교하여 평균 1.3%의 BD-rate 성능 향상을 보여준다.

  • PDF

Location Management System of Moving Objects to Considering Location of Guardian based on WiFi Technology (보호자의 위치를 고려한 WiFi 기술 기반 이동 객체의 위치 관리 시스템)

  • Kim, Jin-Deog;Kang, Hyo-Woon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2345-2351
    • /
    • 2013
  • LBS(Location Based System) usually uses GPS technology to measure the exact position of the moving object. However, the method of managing location which utilizes the WiFi technology of mobile phone has not been introduced so far. The method of managing moving objects in view of the location of guardian has also not been proposed. In this paper, a new location management system of moving objects which take guardian's location into consideration is proposed. Specifically, the three methods of searching for missing child proposed in this paper are as follows : 1) a method based on an app for smart phone, 2) a method based on control server, 3) a method based on control server and fixed APs. Because the proposed system reflects the location of the guardian, the guardian is able to identify the state of child immediately and the workload can be reduced.