• Title/Summary/Keyword: Implementation technique

Search Result 2,093, Processing Time 0.034 seconds

A study of Recognition level of Factors for the Successful implementation of the 'Return to Farm and Rural' of the local Government' Policies (군지자체 귀농·귀촌정책의 성공적인 추진을 위한 요인의 중요도 인식 수준)

  • Oh, Sang-young
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.37-42
    • /
    • 2019
  • This study investigated the policies of return to farm & rural of the local government 's local communities. Through this, we intend to provide information for the successful establishment of the policies of the local village. The local economy is difficult due to the declining population. Therefore, it is also important as a way to increase the population. It is also important as a way to revitalize agriculture. The results of this study are as follows. The main factors are education, self-sufficiency, adaptation, funding, and consulting. In addition, the importance of these was highest in the self-supporting environment (28%). Followed by adaptation (21%) and funding (20%). Followed by consulting (17%) and education (15%). We can conclude that the factors that show a somewhat lower proportion are less important, but we can also conclude that the importance of the factors is high due to the high maturity of the factors. The importance analysis used AHP technique. The results of this study can be a guide for government policy.

Multi-objective Optimization of BMPs for Controlling Water Quality in Upper Basin of Namgang Dam (남강댐 상류유역 수질관리를 위한 BMPs의 다목적 최적화)

  • Park, Yoonkyung;Lee, Jae Kwan;Kim, Jeongsook;Kim, Sangdan
    • Journal of Korean Society on Water Environment
    • /
    • v.34 no.6
    • /
    • pp.591-601
    • /
    • 2018
  • Optimized BMP plans for controlling water quality using the Pareto trade-off surface curve in upper basin of Namgang Dam is proposed. The proposed alternatives consist of BMP installation scenarios in which the reduction efficiency of non-point pollutants is maximized in a given budget. The multi-objective optimization process for determining the optimal alternatives was performed without direct implementation of a watershed model such as SWAT analysis, thereby reducing the time taken. The shortening of the calculation time further enhances the applicability of the multi-objective optimization technique in preparing regional water quality management alternatives. In this study, different types of BMP are applied depending on the land use conditions. Fertilizer input control and vegetative filter strip are considered as alternatives to applying BMP to the field but only control of fertilizer input can be applied to rice paddies. Fertilizer input control and vegetative filter strip can be installed separately or simultaneously in a hydrologic response unit. Finally, 175 BMP application alternatives were developed for the water quality management of the upper river basin of Namgang dam. The proposed application alternative can be displayed on the map, which has the advantage of clearly defining the BMP installation location.

Security Implementation using Flexible Keypad (Flexible Keypad를 활용한 보안 구현)

  • An, Kyuhwang;Kwon, Hyeokdong;Kwon, Yongbin;Seo, Hwajeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.613-621
    • /
    • 2019
  • In the case of door locks most widely used in the market, the most used area as a one-dimensional problem is worn out, and a worn area which does not use a special attack method enables password guessing. To solve this problem, various methods such as a keypad for randomly displaying numbers are introduced, but this is also not completely safe. The common feature of all the solutions so far is that the keypad area is fixed. In this paper, we consider that point in reverse and create a new area smaller than the entire area in the entire area of the keypad, making the keypad of the new area move randomly, thereby preventing the password from being deduced. When using this technique, a new type of keypad is proposed for the first time because of the impossibility of a shoulder surfing attack even though the number of keypad is left as it is.

A Novel Method of Infant Chest Compression: A Study on the Cross-Simulation of Randomization Using Manekin (새로운 영아 가슴압박법의 비교: 마네킨을 이용한 랜덤화 교차 시뮬레이션 연구)

  • Yun, Seong-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.525-527
    • /
    • 2019
  • Cardiac arrest is a series of conditions occur when the heart is stopped, regardless of the cause. one of the only ways to save a patient's life in the event of cardiac arrest is cardiopulmonary resuscitation, which is very important beacause it can maintain circulation through this technique, and high-quality CPR affects the survival rate and neurological prognosis of the patient. For infant cardiopulmonary resuscitation, use two finger to compress the chest. Hower, this method can be diffcult to reach the chest commpressions recommended by the American Heart Association because of the anatomically increased fatigue of the fingers and diffculty of vertical pressure. The study aims to verify the effects of new chest compressions in the implementation of chest compressions during infant cardiopulmonary resuscitation. The study also showed singnificant differences in chest depth and average rate of pressure(p<0.001). Based on the results of this study, we can see that the accuracy of the new chest compressions during infant cardiopulmonary resuscitation is increased, and the depth of chest compressions is improved, improving the quality index of chest compressions.

  • PDF

Observation of Diverse Aluminum Oxide Structures in a Phosphoric Acid Solution according to the Applied Anodization Voltage (인산용액에서 양극산화 인가전압에 따른 알루미늄 산화피막 성장 관찰)

  • Jeong, Chanyoung
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.26 no.1
    • /
    • pp.35-39
    • /
    • 2019
  • To date, porous alumina structures have been implemented by electrochemical anodization technique. The anodizing methods can easy to make a porous aluminum oxide film with a regular arrangement, but oxide film with complex structure type such as pillar-on-pore is relatively difficult to implement. Therefore, this study aims to observe the change of anodized oxide pore size, thickness, and structure in a phosphoric acid solution according to applied anodization voltage conditions. For the implementation of hybrid composite oxide structures, it is possible to create by modulating anodization voltage. The experimental conditions were performed at the applied anodization voltage of 100 V and 120 V in 10% phosphoric acid solution, respectively. The experimental results were able to observe the structure of oxides in the form of porous and composite structures (pillar-on-pore), depending on each condition.

A Study on the Perception of Data 3 Act through Big Data Analysis (빅데이터 분석을 통한 데이터 3법 인식에 관한 연구)

  • Oh, Jungjoo;Lee, Hwansoo
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.19-28
    • /
    • 2021
  • Korea is promoting a digital new deal policy for the digital transformation and innovation accelerating of the industry. However, because of the strict existing data-related laws, there are still restrictions on the industry's use of data for the digital new deal policy. In order to solve this issue, a revised bill of the Data 3 Act has been proposed, but there is still insufficient discussion on how it will actually affect the activation of data use in the industry. Therefore, this study aims to analyze the perception of public opinion on the Data 3 Act and the implications of the revision of the Data 3 Act. To this end, the revision of the Data 3 Act and related research trends were analyzed, and the perception of the Data 3 Act was analyzed using a big data analysis technique. According to the analysis results, while promoting the vitalization of the data industry in line with the purpose of the revision, the Data 3 Act has a concern that it focuses on specific industries. The results of this study are meaningful in providing implications for future improvement plans by analyzing online perceptions of the industrial impact of the Data 3 Act in the early stages of implementation through big data analysis.

Design and Implementation of Secure UART based on Digital Signature and Encryption (디지털 서명과 암호화 기반 보안 UART의 설계와 구현)

  • Kim, Ju Hyeon;Joo, Young Jin;Hur, Ara;Cho, Min Kyoung;Ryu, Yeon Seung;Lee, Gyu Ho;Jang, Woo Hyun;Yu, Jae Gwan
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.29-35
    • /
    • 2021
  • UART (Universal asynchronous receiver/transmitter) is a hardware device that converts data into serial format and transmits it, and is widely used for system diagnosis and debugging in most embedded systems. Hackers can access system memory or firmware by using the functions of UART, and can take over the system by acquiring administrator rights of the system. In this paper, we studied secure UART to protect against hacker attacks through UART. In the proposed scheme, only authorized users using the promised UART communication protocol are allowed to access UART and unauthorized access is not allowed. In addition, data is encrypted and transmitted to prevent protocol analysis through sniffing. The proposed UART technique was implemented in an embedded Linux system and performance evaluation was performed.

Implementation of 3D Video using Time-Shortening Algorithm (시간단축 알고리즘을 통한 3D 동영상 구현)

  • Shin, Jin-Seob;Jeong, Chan-Woong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.123-128
    • /
    • 2020
  • In this paper, we presents a new cone beam computerized tomography (CBCT) system for the reconstruction of 3 dimensional dynamic images. The system using cone beam has less the exposure of radioactivity than fan beam, relatively. In the system, the reconstruction 3-D image is reconstructed with the radiation angle of X-ray in the image processing unit and transmitted to the monitor. And in the image processing unit, the Three Pass Shear Matrices, a kind of Rotation-based method, is applied to reconstruct 3D image because it has less transcendental functions than the one-pass shear matrix to decrease a time of calculations for the reconstruction 3-D image in the processor. The new system is able to get 3~5 3-D images a second, reconstruct the 3-D dynamic images in real time. And we showed the Rotation-based method was good rather than existing reconstruction technique for 3D images, also found weakness and a solution for it.

Scheme of Secure IoT based Group communication (확장성과 보안을 보장하는 IoT 디바이스 기반의 그룹통신 기법)

  • Kim, Ki-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.1
    • /
    • pp.98-103
    • /
    • 2021
  • In this study, we propose a group communication technique that guarantees security and expandability by configuring a network consisting of IoT terminals equipped with security functions. As the number of devices participating in the network increases, network resources are proportionally reduced, and adding a security function to the IoT device increases the delay time due to encryption in the IoT device. If the error rate that occurs in the network increases, network resources are quickly consumed due to retransmission. Therefore, IoT terminals are grouped to ensure scalability while supporting security, reducing the consumption of network resources even when the number of participating nodes increases, thus ensuring scalability. For the future implementation, the encryption method used in IoT terminals considered the standard of IEEE802.5.4, and the standardization trend was investigated and classified. The proposed method applies IoT devices that provide security functions of the IEEE802.5.4 standard to the group communication base to ensure reliability and scalability. In the performance evaluation, the effectiveness of the proposed method was confirmed by comparing the delay times when grouping IoT devices with security functions through simulation.

Design of an Efficient AES-ARIA Processor using Resource Sharing Technique (자원 공유기법을 이용한 AES-ARIA 연산기의 효율적인 설계)

  • Koo, Bon-Seok;Ryu, Gwon-Ho;Chang, Tae-Joo;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.39-49
    • /
    • 2008
  • AEA and ARIA are next generation standard block cipher of US and Korea, respectively, and these algorithms are used in various fields including smart cards, electronic passport, and etc. This paper addresses the first efficient unified hardware architecture of AES and ARIA, and shows the implementation results with 0.25um CMOS library. We designed shared S-boxes based on composite filed arithmetic for both algorithms, and also extracted common terms of the permutation matrices of both algorithms. With the $0.25-{\mu}m$ CMOS technology, our processor occupies 19,056 gate counts which is 32% decreased size from discrete implementations, and it uses 11 clock cycles and 16 cycles for AES and ARIA encryption, which shows 720 and 1,047 Mbps, respectively.