• Title/Summary/Keyword: Dual Security

Search Result 143, Processing Time 0.028 seconds

A Study on the Practical Methodology of Engineering Education through Multi-account Service Composition with Enhanced User Security (사용자 보안을 강화한 다중 계정 서비스 구성을 통해 이루어진 공학 교육 실천 방법론에 관한 연구)

  • Kang, Kyoung-Bo;Park, Jea-Soon;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.10 no.1
    • /
    • pp.1-7
    • /
    • 2018
  • The dual security system that manages user's account information and uses NFC and OTP has been proposed. It also enhances the security of the user authentication phase by using the features that recognize within the range of less than 1m of NFC and the high security of NFC itself. During the graduation work design process which was carried out for one year and six months in a group of two in the electronics engineering major of the four-year undergraduate system was conducted. In the interim results, we participated in the conferences and thesis contest at the Institute of related to major for three times. Finally passed the examination process for three times judged by 6 professors in the major. The results were published in a graduation thesis together with other people who passed and composed in thesis form. Through the experience gained through these stages of design and production, it has gained the confidence to gain employment opportunities and actively pursue the growth stage, and presented a methodology to practice engineering education through employment.

Application to 2-D Page-oriented Data Optical Cryptography Based on CFB Mode (CFB 모드에 기반한 2 차원 페이지 데이터의 광학적 암호화 응용)

  • Gil, Sang-Keun
    • Journal of IKEEE
    • /
    • v.19 no.3
    • /
    • pp.424-430
    • /
    • 2015
  • This paper proposes an optical cryptography application to 2-D page-oriented data based on CFB(Cipher Feedback) mode algorithm. The proposed method uses a free-space optical interconnected dual-encoding technique which performs XOR logic operations in order to implement 2-D page-oriented data encryption. The proposed method provides more enhanced cryptosystem with greater security strength than the conventional CFB block mode with 1-D encryption key due to the huge encryption key with 2-D arrayed page type. To verify the proposed method, encryption and decryption of 2-D page data and error analysis are carried out by computer simulations. The results show that the proposed CFB optical encryption system makes it possible to implement stronger cryptosystem with massive data processing and long encryption key compared to 1-D block method.

Physiology and Gene Expression Analysis of Tomato (Solanum lycopersicum L.) Exposed to Combined-Virus and Drought Stresses

  • Samra Mirzayeva;Irada Huseynova;Canan Yuksel Ozmen;Ali Ergul
    • The Plant Pathology Journal
    • /
    • v.39 no.5
    • /
    • pp.466-485
    • /
    • 2023
  • Crop productivity can be obstructed by various biotic and abiotic stresses and thus these stresses are a threat to universal food security. The information on the use of viruses providing efficacy to plants facing growth challenges owing to stress is lacking. The role of induction of pathogen-related genes by microbes is also colossal in drought-endurance acquisition. Studies put forward the importance of viruses as sustainable means for defending plants against dual stress. A fundamental part of research focuses on a positive interplay between viruses and plants. Notably, the tomato yellow leaf curl virus (TYLCV) and tomato chlorosis virus (ToCV) possess the capacity to safeguard tomato host plants against severe drought conditions. This study aims to explore the combined effects of TYLCV, ToCV, and drought stress on two tomato cultivars, Money Maker (MK, UK) and Shalala (SH, Azerbaijan). The expression of pathogen-related four cellulose synthase gene families (CesA/Csl) which have been implicated in drought and virus resistance based on gene expression analysis, was assessed using the quantitative real-time polymerase chain reaction method. The molecular tests revealed significant upregulation of Ces-A2, Csl-D3,2, and Csl-D3,1 genes in TYLCV and ToCV-infected tomato plants. CesA/Csl genes, responsible for biosynthesis within the MK and SH tomato cultivars, play a role in defending against TYLCV and ToCV. Additionally, physiological parameters such as "relative water content," "specific leaf weight," "leaf area," and "dry biomass" were measured in dual-stressed tomatoes. Using these features, it might be possible to cultivate TYLCV-resistant plants during seasons characterized by water scarcity.

Development of UHF Band Tag Antenna using Radio Frequency Identification Multipurpose Complex Card (RFID 다기능 복합 카드용 UHF 대역 소형 태그 안테나 개발)

  • Byun, Jong-Hun;Sung, Bong-Geun;Choi, Eun-Jung;Ju, Dae-Geun;Yoo, Dae-Won;Cho, Byung-Lok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1452-1458
    • /
    • 2009
  • In this paper, Our proposed Multipurpose Complex Card UHF band RFID small-size Tag antenna. Multi purpose Complex Card UHF band RFID small-size Tag antenna that is to minimize the low efficiency of RFID Tag Read Range that generates space limitation and a conductor surrounded by inducing fingerpring system with dual(HF, UHF) Card is presented. Our proposed UHF band RFID small-size Tag antenna is for the Multipurpose Complex Card that is mounted on the fingerpring system as well as the HF Tag. It also enables to minimize and facilitates Tag chip matching by adjusting Tapered, Meander line and Loop structure. Given the card substance properties and periphery circuit, the proposed small-size Tag antenna, in this report, is designed with PET film with size of $50{\times}15mm^2$. The RFID small-size Tag method for measurements is used by EPCglobal Static Test instrument in Anechoic Chamber, which is tested with dual Card, within the car and in wallet. It is found that Read Range is 3.8m from the EPCglobal Static Test, Maximum Read Range within the car from the field test results in 7.6m. Proposed Tag antenna is will be used in the parking control security system.

Damping Analysis using IEEEST PSS and PSS2A PSS

  • Lee Sang-Seung;Kang Sang-Hee;Jang Gwang-Soo;Li Shan-Ying;Park Jong-Keun;Moon Seung-Il;Yoon Yong-Tae
    • Journal of Electrical Engineering and Technology
    • /
    • v.1 no.3
    • /
    • pp.271-278
    • /
    • 2006
  • This paper scrutinized the damping effects of installing the prototype PSSs by a transient analysis for eight buses of faults in the South Korean power system. The PSSs used have the co-PSS blocks for IEEEST model with a single input and the co+power PSS blocks for PSS2A model with dual inputs. The simulation tool was a TSAT(Transient Security Assessment Tool) developed by Powertech Labs Inc. The voltages of the transmission line for simulations were 765kV and 345kV, and the faults for eight cases were sequenced by considering the open state and the close state of the lines. In the simulations, the three-phase line to ground (L-G) fault generated different points for each region. The simulations were compared to the cases of no PSS, partial IEEEST and PSS2A, absolute IEEEST, and absolute PSS2A to show that the power system oscillation can be effectively damped by PSS modules. Simulations were conducted to confirm the effectiveness for the KEPCO (Korea Electric Power Corporation) power system.

Voice and Video Call Continuity for Enterprise Users (기업형 사용자들을 위한 음성/영상 서비스 이동성 제공 방안)

  • Jung, Chang-Yong;Kim, Hyeon-Soo;Moon, Jeong-Hyeon;Kim, Hee-Dong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.99-103
    • /
    • 2009
  • Recently, as wired and wireless communication services have rapidly developed and multimodal mobile devices which have various characteristics have widely spread, the need for new convergence services increases. The growing population of VoIP technologies and the high communication expense yield that the market of IP based telephony such as WiFi phone and IP phone is substituted for one of the conventional PSTN telephony. With the help of this trend, the wireline network operators desire to find a market in mobile networks. Therefore, they focus on Fixed Mobile Convergence (FMC) service as one of the key factors to accomplish this goal. FMC services are able to provide the mobility of voice services between circuit switched and packet switched networks. IP Multimedia Subsystem (IMS) based Voice Call Continuity (VCC) is one of the schemes to embody FMC services. As Application Server (AS) which has this VCC function provides seamless handover of services between heterogeneous networks, FMC subscribers can communicate seamlessly with others m WiFi domain and COMA domain using WiFi-COMA dual phone. Most of enterprises have already introduced IP network infrastructure and IP-PBX (Private Branch eXchange) for telephony. However, the problems of high communication cost and work inefficiency due to frequent outside jobs or business trips have remained. In order to solve these problems, demands for enterprise FMC services increase. In this paper, we introduce a new IP-PBX based VCC model that can provide seamless handover of voice services between WiFi and COMA networks for enterprise users and we investigate some interworking and security issues between Soft Switch (SSW) and IMS, or between IMSs. In addition, we introduce a new service that can provide the continuity of voice sessions as well as video sessions using Multimedia Session Continuity (MMSC) technology which has evolved from VCC. This service is expected to be one of the next-generation personalized services based on user's context.

  • PDF

Anomie Social Environment and Juvenile Delinquency (아노미(Anomie)적 사회환경과 청소년 범죄: 소셜 미디어를 중심으로)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.37-44
    • /
    • 2015
  • There appears a variety forms of crime type and age in accordance with the change of social structure. In this paper it is described for combining the Anomie theory of Emile Durkheim. Anomie refers to the absence of dual standards or norms. In other words, while weakening the existing norms prevailing when the new rules has not been established. That situation would cause social chaos. Rules on the dissemination and utilization of SNS due to the development of information and communication technology undermine the social norms while online regulations are being a weak state not established. In the confusion of these norms it has been shown to increase in juvenile delinquency. Social media has characteristics such as openness, accessibility, relationships, and content diversity. The social media itself is not subject to the general mechanisms of consumption and production due to growing as a kind of organism. It has characteristic to make the most content by utilizing the users to voluntarily share information. Social media using as communication, contact and information in the youth, thus the possibility of crime is high. Social media is also direct and indirect influence on youth crime but no apparent systemic regulation of this situation.

Plans to Integrate for the Polygraph Institution (거짓말탐지기 교육기관의 일원화 방안)

  • Kang, Dong Beom;Bae, Du Yeol
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.49-57
    • /
    • 2015
  • As the capitalist society was launched, false has been increasing day by day for the personal profit. Study after study since a long time ago has concluded that today's polygraph developed in order to determine these false. In Korea the polygraph has been used actively in current investigation agency, and passively in a private enterprise by a former polygraph examinant from the investigation agency. Each investigation agency is recruiting polygraph examinants through the strict qualifications, training education. Decisions of Supreme Court precedents about the polygraph test results are denying admissibility of evidence in reliability on the efficiency of a test equipment, way to ask, qualities of polygraph examinant, etc. The most fundamental cause of the issues mentioned in the precedents is that examinants of each investigation agency are being trained by dual education not centralized. Because of each investigation agency has its own training and polygraph examinant, each agency can occur variations every agency or every examinant, therefore ensuring the centralized educational system is needed. In this way, ensuring the centralized educational system will contribute to improve the reliability of polygraph test results and make a retrenchment in the educational budget in accordance with examinant training of each agency.

Optical CBC Block Encryption Method using Free Space Parallel Processing of XOR Operations (XOR 연산의 자유 공간 병렬 처리를 이용한 광학적 CBC 블록 암호화 기법)

  • Gil, Sang Keun
    • Korean Journal of Optics and Photonics
    • /
    • v.24 no.5
    • /
    • pp.262-270
    • /
    • 2013
  • In this paper, we propose a modified optical CBC(Cipher Block Chaining) encryption method using optical XOR logic operations. The proposed method is optically implemented by using dual encoding and a free-space interconnected optical logic gate technique in order to process XOR operations in parallel. Also, we suggest a CBC encryption/decryption optical module which can be fabricated with simple optical architecture. The proposed method makes it possible to encrypt and decrypt vast two-dimensional data very quickly due to the fast optical parallel processing property, and provides more security strength than the conventional electronic CBC algorithm because of the longer security key with the two-dimensional array. Computer simulations show that the proposed method is very effective in CBC encryption processing and can be applied to even ECB(Electronic Code Book) mode and CFB(Cipher Feedback Block) mode.

Design and Implementation of Packet Filtering Mechanism for Secure Teredo Service (안전한 Teredo 서비스를 위한 패킷 필터링 메커니즘 설계 및 구현)

  • Heo, Seok-Yeol;Shin, Bum-Joo;Han, Ki-Jun;Lee, Wan-Jik
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.3
    • /
    • pp.47-59
    • /
    • 2007
  • IPv4 NAT, which often used in households or under SOHO environments, is one of the factors that delays IPv6 propagation. As IPv4 NAT does not operate properly under the transition mechanism like ISATAP or 6to4 that acts as IPv6-in-IPv4 tunneling type, Microsoft proposed Teredo in order to resolve this issue. However, tunneling transition mechanism like Teredo has a security problem. That is, being tunneled packets have dual IP headers; general firewall systems apply the filtering rules only to the outer header but not inner header when these packets pass the firewall. Furthermore, attacks using unregistered server and relay can take place in Teredo. To resolve these problems, we propose a new packet filtering mechanism exclusively for Teredo. The proposed packet filtering mechanism was designed and implemented by using Linux Netfilter and ip6tables. Through functional and experimental performance tests, this packet filtering system was found operating properly and solving the Teredo packet filtering problems without serious performance degradation.

  • PDF