• Title/Summary/Keyword: Establishment devices

Search Result 181, Processing Time 0.024 seconds

Establishment of Test & Evaluation Criteria in the Military Electro-Optical / Infrared Devices (군용 EO/IR장비의 시험평가 기준 정립방안)

  • Park, Jong Wan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.5
    • /
    • pp.613-617
    • /
    • 2016
  • Development-concerned parties, business managers and test evaluators have experienced conflicts among themselves due to the absence of standardized criteria for military electro-optical(EO) and infrared(IR) devices in test evaluation planning and evaluation phases. Therefore, establishment of objectified test and evaluation criteria for EO/IR devices is required. This paper applies South Korea's weather measurement average of minimum 15 km for visibility range, 3 bar from Johnson criteria for EO device and 4 bar from NATO's STANAG-4347 for IR device for target type, and 50 % probability for evaluation criteria, respectively. Based upon these criteria, this paper will establish suitable criteria that are improved for development weapon system in consideration of required capability of demanding forces and field environment.

A Study on the Establishment of an Electric Vehicle Education System based on High-power Electric Devices and Improvement of Qualifications (고전원 전기장치 기반 전기자동차 교육 체계 구축과 자격 부여의 제고 방안 연구)

  • Byeong Rae Son;Changsin Park;Ki Hyeon Ryu
    • Journal of Auto-vehicle Safety Association
    • /
    • v.15 no.4
    • /
    • pp.32-38
    • /
    • 2023
  • With the transition from internal combustion engine vehicles to eco-friendly cars, it has become essential to systematically construct an education system for electric vehicles based on high-voltage electric devices. In this study, we discussed the establishment of an educational system for electric vehicles based on high-voltage electric devices and proposed methods for qualifications after completing the education. To ensure systematic education, we presented a classification of learners according to their levels and job competencies. Additionally, we emphasized the importance of providing adequate practical training equipment for courses that require higher qualifications. Finally, to distinguish between the levels of completion of training and practical skills, we highlighted the necessity of implementing a system to certificates to individuals who have successfully completed the systematic training program.

Key Establishment and Pairing Management Protocol for Downloadable Conditional Access System Host Devices

  • Koo, Han-Seung;Kwon, O-Hyung;Lee, Soo-In
    • ETRI Journal
    • /
    • v.32 no.2
    • /
    • pp.204-213
    • /
    • 2010
  • In this paper, we investigate the possible security threats to downloadable conditional access system (DCAS) host devices. We then propose a DCAS secure micro (SM) and transport processor (TP) security protocol that counters identified security threats using a secure key establishment and pairing management scheme. The proposed protocol not only resists disclosed SM ID and TP ID threats and indirect connection between TA and TP threats, but also meets some desirable security attributes such as known key secrecy, perfect forward secrecy, key compromised impersonation, unknown key-share, and key control.

Efficient End-to-End Key Establishment Scheme in ZigBee Networks (ZigBee 망에서의 효율적인 단대단 키 설정 기술)

  • Kim, Hyun-Jue;Chung, Jong-Moon
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.169-170
    • /
    • 2008
  • To achieve secure communication in current ZigBee networks, encrypted messages using security keys need to be shared among devices. A link key shared by two devices is used for unicast communications, where the master key is the starting point for establishing a link key. The ZigBee protocol has some limitations in end-to-end key establishment, which are discussed and an improved end-to-end key establishment scheme is presented.

  • PDF

Efficient Authentication Establishment Scheme between IoT Device based on Pascal Triangle Theory (파스칼 삼각 이론 기반의 IoT 장치간 효율적인 인증 설립 기법)

  • Han, Kun-Hee;Jeong, Yoon-Su
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.15-21
    • /
    • 2017
  • Recently, users' interest in IoT related products is increasing as the 4th industrial revolution has become social. The types and functions of sensors used in IoT devices are becoming increasingly diverse, and mutual authentication technology of IoT devices is required. In this paper, we propose an efficient double signature authentication scheme using Pascal's triangle theory so that different types of IoT devices can operate smoothly with each other. The proposed scheme divides the authentication path between IoT devices into two (main path and auxiliary path) to guarantee authentication and integrity of the IoT device. In addition, the proposed scheme is suitable for IoT devices that require a small capacity because they generate keys so that additional encryption algorithms are unnecessary when authenticating IoT devices. As a result of the performance evaluation, the delay time of the IoT device is improved by 6.9% and the overhead is 11.1% lower than that of the existing technique. The throughput of IoT devices was improved by an average of 12.5% over the existing techniques.

A Study on Fashion Business Reengineering for Korean Fashion Industry (우리 나라 패션 산업을 위한 패션 비즈니스 리엔지니어링에 관한 연구)

  • 김문숙;한정지;최은정;홍인숙
    • The Research Journal of the Costume Culture
    • /
    • v.7 no.4
    • /
    • pp.1-13
    • /
    • 1999
  • The purpose of this study is to remind the necessity of reengineering establishment of future-oriented fashion industry and to research the devices for the devices for the system establishment at this present time when the consumer\`s demands level is extremely high. This research has been done by the literature review of the relative articles, books and the case study. First, through the analysis of the important changes and movements of fashion industry environment by the environmental interpretation model of Draft and Weick, the strategic development, corresponding the environment change of fashion industry, has been attempted. Second, this study examined QR integration management method according to the Kunz\`s behavior theory of the apparel firms. Third, as the prior occupation strategy regarding the things can be done very well from now on the things are needed, the necessity and establishment of SCM, based on companionship and beyond the boundary between the companies has been studied through the exchange of the data of manufacture and sales which has been regarded as the secret of the companies. Finally, to become a company to lead the market, in addition to the re-organization of the internal process of a company with the leadership which has the clear vision for the consumer\`s satisfaction, the process have ti be integrated under the cooperation with its business partners and the cost have to be reduces, and the which takes to correspond to the consumer\`s requirements have to be reduced.

  • PDF

A Study of Establishment of Parameter and Modeling for Yield Estimation (수율 예측을 위한 변수 설정과 모델링에 대한 연구)

  • 김흥식;김진수;김태각;최민성
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.30A no.2
    • /
    • pp.46-52
    • /
    • 1993
  • The estimation of yield for semiconductor devices requires not only establishment of critical area but also a new parameter of process defect density that contains inspection mean defect density related cleanness of manufacure process line, minimum feature size and the total number of mask process. We estimate the repaired yield of memory devide, leads the semiconductor technique, repaired by redundancy scheme in relation with defect density distribution function, and we confirm the repaired yield for different devices as this model. This shows the possibility of the yield estimation as statistical analysis for the condition of device related cleanness of manufacture process line, design and manufacture process.

  • PDF

Analysis of Narrative for Mobile e-book Applications with Haeinsa Buddhist Tales

  • Lee, Young-Suk;Kim, Sang-Nam;Lee, Jong Dae
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.3
    • /
    • pp.429-436
    • /
    • 2015
  • This study describes the humanistic perspective inherent in Korean Buddhism. It is based on a narrative of the establishment of Haeinsa Temple, which is one of the three major Korean traditional temples, and represents the heritage of Korean Buddhism. With this narrative, we developed and implemented mobile content for Android devices titled "Treasures from the Palace of the Dragon King". Its scenario, which is a folktale of the establishment of the Haeinsa Temple, was created using A.J. Greimas' Actantial model as the research method. As a result, the content developed by the reconstruction of the scenario consists of mini-games and animations offering an intuitive user experience (UX), which is implemented in a compound E-BOOK for mobile devices. We aim to promote Korea's traditional culture throughout the world, using this content as a starting point for the future.

Covert Channel Based on Instruction Gadgets in Smart Sensing Devices

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.6 no.4
    • /
    • pp.56-59
    • /
    • 2017
  • In this paper, we design a covert channel based on instruction gadgets in smart sensing devices. Unlike the existing convert channels that usually utilize diverse physical characteristics or user behaviors or sensory data of smart sensing devices, we show that instruction gadgets could be exploited for covert channel establishment in smart sensing devices. In our devised covert channels, trojan smart sensing devices exchange attack packets in such a way that they encode an attack bit in attack packet to a series of addresses of instruction gadgets and decode an attack bit from a series of addresses of instruction gadgets.

A study on the Establishment of a Digital Healthcare Next-Generation Information Protection System

  • Kim, Ki-Hwan;Choi, Sung-Soo;Kim, Il-Hwan;Shin, Yong-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.57-64
    • /
    • 2022
  • In this paper, the definition and overview of digital health care that has emerged recently, core technology, and We would like to propose a plan to establish a next-generation information protection system that can protect digital healthcare devices and data from cyber attacks. Various vulnerabilities exist for digital healthcare devices and data, and cyber attacks are possible for those vulnerabilities. Through an attack on digital health care devices and information and communication networks, it can directly adversely affect human life and health, Since digital healthcare data contains sensitive and personal information, it is essential to safely protect it from cyber attacks. In the case of this proposal, for continuous safe management of data and cyber attacks on equipment and communication networks for digital health devices, It is expected to be able to respond more effectively and continuously through the establishment of the next-generation information protection system.