• Title/Summary/Keyword: General connection

Search Result 666, Processing Time 0.031 seconds

Hash based Secure RFID Authentication Protocol for User Privacy Protection (사용자 프라이버시 보호를 위한 해쉬 기반의 안전한 RFID 인증 프로토콜)

  • Lee, Han-Kwon;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • RFID, a non-contact wireless identification technology is being noticed as a technology to alternate barcode system in distribution industry and general industry. Despite of merit of RFID, there are issues to be solved for practical use. One of them, which are most important, is resolution of user's information protection. RFID system without security function bears risk exposing personal data and user's privacy. In this paper, we propose mutual authentication protocol for RFID system in order to solve this security issue. This study aimed to protect user's privacy by providing dynamic ID for tag through authentication protocol safe from security threats. Information being transmitted between backend, reader and tag has no direct connection with ID of tag, and it conducts authentication process using one-way hash function, which prevents attacker's obtaining of tag information using information being transmitted.

  • PDF

A Study on the Systematic Construction of the Utility Space in General Hospital (국내 종합병원 Utility Space의 체계 구축에 관한 연구)

  • Kim, Eun Seok;Yang, Nae Won
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.23 no.4
    • /
    • pp.77-84
    • /
    • 2017
  • Purpose: In terms of the flexibility in hospital architecture, there are fixed elements of hospital architecture: mechanical, electrical, aeration rooms and shafts, which are the main utility spaces. Thus, it is necessary to recognize the utility space as a system that helps internal functions and flexible internal changes. This study analyzes the notion of the main utility space in hospital architecture and the architectural planning features of the main utility spaces as the system in the design process of the recently built hospitals. Methods: The design factors are extracted comparing two hospitals' plans in each stage and the systematic characteristics of utility spaces are analyzed accordingly. The opinions gathered from interviews of practitioners, architects and facility planning experts directly involved in the architecture design process are analyzed and reflected in the results. Results: Planning for utility spaces should be accompanied by the architectural plan from the basic design process, and proceeded with recognizing utility spaces as a system, which is a fixed element. Utility spaces are highly organically connected. Horizontal and vertical distribution of air chambers can reduce the length and number of ducts, and thus save story height, and reduce the number of shafts, the vertical connection passage. This is advantageous in securing the variable area, which is the ultimate objective of the system-centered hospital architecture plan. Implications: Thereby aims to provide fundamental data on systematic utility space planning in the hospital architecture planning.

Case Study on the 6th Graders' Understanding of Concepts of Variable (초등학교 6학년 학생들의 변수 개념 이해에 관한 사례 연구)

  • Ha, Su-Hyun;Lee, Gwang-Ho
    • The Mathematical Education
    • /
    • v.50 no.2
    • /
    • pp.213-231
    • /
    • 2011
  • The purpose of this study is to analyze the 6th graders' understanding of the concepts of variable on various aspects of school algebra. For this purpose, the test of concepts of variable targeting a sixth-grade class was conducted and then two students were selected for in-depth interview. The level of mathematics achievement of the two students was not significantly different but there were differences between them in terms of understanding about the concepts of variable. The results obtained in this study are as follows: First, the students had little basic understanding of the variables and they had many cognitive difficulties with respect to the variables. Second, the students were familiar with only the symbol '${\Box}$' not the other letters nor symbols. Third, students comprehended the variable as generalizers imperfectly. Fourth, the students' skill of operations between letters was below expectations and there was the student who omitted the mathematical sign in letter expressions including the mathematical sign such as x+3. Fifth, the students lacked the ability to reason the patterns inductively and symbolize them using variables. Sixth, in connection with the variables in functional relationships, the students were more familiar with the potential and discrete variation than practical and continuous variation. On the basis of the results, this study gives several implications related to the early algebra education, especially the teaching methods of variables.

Security-intensified SSL VPN and WLCAPT Virtual Server Design (SSL VPN의 보안 강화와 WLCAPT 가상 서버 설계)

  • Jeong Eun-Hee;Choi Eun-Sil;Lee Byung-Kwan
    • Journal of Internet Computing and Services
    • /
    • v.5 no.6
    • /
    • pp.45-58
    • /
    • 2004
  • This paper consists of two parts, One is the ECC( GF(2/sup m/)) algorithm to improve the security strength and the processing time of SSL VPN and the other is the WLCAPT algorithm instead of LSNAT for the security strength of virtual server. In general when corporates use SSL protocol in order to build VPN, they use RSA algorithm with the problem of security and processing time about authentication and confidentiality, In this paper, a shared public key is generated with ECSPK which uses ECC( GF(2/sup m/)) algorithm to improve the security and processing time instead of RSA In addition, WLCAPT algorithm proposed in this paper is applied to virtual server which resides in the server side and then after NAT translation, the actual server of headquarter is securely communicated with it.

  • PDF

IP Spoofing 대응 기능을 가진 방화벽 시스템 구현

  • 최석윤;김중규
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 1997.03a
    • /
    • pp.163-181
    • /
    • 1997
  • This dissertation provides a theroetic study on the network security in general , the firewall in particular . In fact, the firewall has been recognized as a very promising option to obtain the security in the real world network environment . The dissertation provides a thorough theoretic investigation on the various problems raised in the computer network, and also explores a methodology of the security against IP spoofing. Moreover, it investigates a systematic procedure to make analysis plans of the firewall configuration. Based on the above investigation and analysis , this dissertation provides two approaches to network security, which address a number of issues both at the network and at application level. At the network level. a new methdo is proposed which uses packet filtering based on the analysis of the counter plot about the screen router. On the other hand at the application level, a novel method is exlored which employs security software , Firewall-1, on Bastion host. To demonstrate the feasibility and the effectiveness of the proposed methodologes, a prototype implementation is made. The experiment result shows that the screen router employing the proposesed anti-IP spoofing method at the network level is effective enough for the system to remain secure without being invaded by any illegarl packets entering from external hackers. Meanwhile , at the application level. the proposed software approach employing Firewall -1 is proved to be robust enough to provent hackings from the outer point to point protocol connection. Theoretically, it is not possible to provide complete secuirty to the network system, because the network security involove a number of issues raised from low level network equipments form high level network protocol. The result in this dissertation provides a very promising solution to network security due to its high efficiency of the implementation and superb protectiveness from a variety of hacking.

Problems of Korean Mural Villages and Ways to Make Use of Digital Contents (한국 '벽화마을'의 문제점과 디지털 콘텐츠 활용 방안)

  • Eum, Yeong-Cheol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.1
    • /
    • pp.39-48
    • /
    • 2015
  • In this research the problems and ways to improve the three mural villages and how to make use of digital contents have been sought. Three ways of solutions were searched for the problems. Firstly, The geographical and cultural advantages of the villages were not in practical use, so in long term, making proper brands of the villages is recommended. Secondly, most of the paintings are wall paintings. So in the aspects of esthetics, more wall paintings are encouraged to be made with ceramic works. Lastly, there should be various festivals in connection with the villages. Various smart phone applications should be prepared for easier use of digital contents such as sights, foods, and accommodation, Mural villages have become one of attractions for both local and foreign tourists. More tourists should feel free to visit the mural villages.

Time-Deterministic Event Processing in Terabit Optical-Circuit-Packet Converged Switching Systems (테라비트 광-회선-패킷 통합 스위칭 시스템에서 시간결정성 높은 이벤트 처리에 관한 연구)

  • Kim, Bup-Joong;Ryoo, Jeong-dong;Cho, Kyoungrok
    • Korean Journal of Optics and Photonics
    • /
    • v.27 no.6
    • /
    • pp.212-217
    • /
    • 2016
  • In connection-oriented data-transport services, data loss can occur when the service experiences a problem on its end-to-end path. To promptly resolve this problem, the data-switching systems providing the service should quickly modify their internal configurations distributed among different places in each system. This is performed through a sequence of problem (event) recognition, sharing, and handling procedures among multiple control processors in the system. This paper proposes a method for event sharing and messaging between control processors, to improve the time determinacy of event processing. This method simplifies runtime event sharing and minimizes the time variability caused by the event data, resulting in a decrease in the latency time in processing global events. The proposed method lessens the latency time of global event processing by about 40%, compared to general methods, for 738 internal path changes.

A Study on the Trade Structure in Korea-China Info-Communication Equipment Industry (한·중 정보통신기기 산업의 무역구조 분석)

  • Lee, Dong Whuy
    • International Area Studies Review
    • /
    • v.12 no.3
    • /
    • pp.517-545
    • /
    • 2008
  • This study, tried to describe the corporations and competitiveness of IT industries in Korea and China as well as the general trend in trade using import-export structure. Further, based on trade intensity index, revealed comparative advantage index, Grubel-Lloyd index, constant market share, the trade structure between Korea and China was analyzed for the equipment in the fields of communication, information, broadcasting and their parts. The results are; first, since 2004, China has been catching up with Korea in the number of their companies listed in the global top 500 conglomerates. Second, the trade intensity index increased in 2007 4.57% up from 2002, showing increasingly closer connection between the two countries in the area of communications equipment. Third, according to revealed comparative advantage index, Korea's info-communications equipment seems to comparatively lag behind, but in terms of import-export structure is in the black. Fourth, in recent years, Korean equipment's market share in the Chinese market has been dropped due to the weakening competitiveness and the changing commodity supplies.

Construction of Aquatic Environmental Database Near Wolsong Nuclear Power Plant (월성 원전 주변 수생 환경 자료 구축)

  • Suh, Kyung-Suk;Min, Byung-Il;Yang, Byung-Mo;Kim, Jiyoon;Park, Kihyun;Kim, Sora
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.17 no.2
    • /
    • pp.235-243
    • /
    • 2019
  • Radioactive materials are released into the air and deposited on the surface soil after a nuclear accident. Radionuclides deposited in soil are transported by precipitation to nearby environments and contaminate the surface water system. Basic data on surface watershed and soil erosion models have been collected and analyzed to evaluate the behavior of radionuclides deposited on surface soil after a nuclear accident. Data acquisition and analysis in aquatic environment were performed to investigate the physical characteristics and variation of biota in rivers and lakes of the Nakdong river area near the Wolsong nuclear power plant. For these purposes, a digital map, and hydrological, water quality and biota data were gathered and a systematic database (DB) was constructed in connection with them. Constructed aquatic DB will be supplied and used in surface watershed and soil erosion models for investigation of long-term movement of radionuclides in adsorptive form in surface soil. Finally, basic data and established models will be utilized for general radiological impact assessment in aquatic environment.

A Development of Recommendations to Promote Maker Education at the Korean Primary & Secondary School Level in Korea through Analysis of Global Maker Education Best Practices (해외 메이커교육 우수 사례 분석을 통한 국내 초·중등 메이커교육 활성화를 위한 방안 도출)

  • Cha, Hyun-jin;Park, Taejung
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.97-113
    • /
    • 2018
  • In global advanced countries, various efforts about maker education with maker-space into the formal education has been made. However, in Korea, the physical infrastructure and instructional supports for the maker education in connection with K-12 curriculum are insufficient. Therefore, this study aims to suggest how to promote maker education in domestic K-12 education field by examining best practices of maker education in the globe. To achieve the objective, 7 best practices, which consist of 3 cases led by a government-driven policy, 2 cases initiated by world-class universities, and 2 cases made by international schools, are examined and analyzed. As a result, the recommendations to integrate and promote maker education into the K-12 school level in Korea in terms of 3 different perspectives, the policies which government should consider, the efforts and considerations the institutions should be made, and the roles teachers and instructors play were drawn.