• Title/Summary/Keyword: Security Design

Search Result 3,382, Processing Time 0.028 seconds

Research to define facility type, project consideration and restriction when conceiving civil-military sharing facilities, by applying the Delphi technique (델파이기법을 활용한 민군간 공용 시설유형 및 고려요소 판단 연구)

  • Gong, Keum Rok;Kang, Han-Seung;Ahn, Jin-Ho;Park, Young Jun
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.34 no.2
    • /
    • pp.57-66
    • /
    • 2018
  • When developing projects to build facilities to be shared by both military bases and surrounding communities, strategies are needed to achieve two objectives: 1) minimize missteps and opposition from local communities in the process of developing and implementing such projects, and 2) promote cost-benefit optimization and user-satisfaction. With aim of promoting co-operation and co-existence between military bases and adjust communities, this research proposes esthetical factors to be considered in conceiving civil-military sharing facilities. It seeks experts' opinions on the development of civil-military sharing facilities, and examines critical factors (economic feasibility, security, and satisfaction, etc.) for project development as well as building types suitable for shared-use between military bases and local residents. It then establishes a method to prioritize facility-type and narrow down design factors (considerations and restrictions) in project development by applying quantitative analysis. The methodological approach of the research employs the Delphi survey method to quantitatively analyze qualitative information drawn from experts' opinions. At the first round of the survey, facility types, items for consideration and restrictions are drawn, and then at the second round of the survey, criticality of each item is analyzed. Finally, it reaches a conclusion on suitability of facility types for civil-military sharing facilities, and selects project considerations and restrictions when developing this kind of project.

A Parallel Streaming Server for the Realtime 3D Internet Broadcasting (병렬 스트리밍 서버 기반 실시간 3D 인터넷 방송 서비스)

  • Kang, Mi-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.7
    • /
    • pp.879-884
    • /
    • 2020
  • In the conventional video file system, videos are stored in a high performance server which has mass storage hard disks or disk arrays. For 3D internet broadcasting, real time operations are required to transmit video files to many clients. This paper describes the design of the 3D internet broadcasting system which can provide realtime streaming service to many users in the 5G environment. In reality, unicast is used to transmit multimedia contents over the internet rather than IP multicast since IP multicast has its own drawbacks in deployment, security, maintenance and so on. In addition, multimedia broadcasting service system like VoD has difficulties in applying to 3D internet broadcasting system since it requires a large amount of system and network resources. In this work, we develop a 3D internet broadcasting system which can construct effective data delivery by minimizing performance-degrading factors.

Design and Implementation of Side-Type Finger Vein Recognizer (측면형 지정맥 인식기 설계 및 구현)

  • Kim, Kyeong-Rae;Choi, Hong-Rak;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.159-168
    • /
    • 2021
  • As the information age enters, the use of biometrics using the body is gradually increasing because it is very important to accurately recognize and authenticate each individual's identity for information protection. Among them, finger vein authentication technology is receiving a lot of attention because it is difficult to forge and demodulate, so it has high security, high precision, and easy user acceptance. However, the accuracy may be degraded depending on the algorithm for identification or the surrounding light environment. In this paper, we designed and manufactured a side-type finger vein recognizer that is highly versatile among finger vein measuring devices, and authenticated using the deep learning model of DenseNet-201 for high accuracy and recognition rate. The performance of finger vein authentication technology according to the influence of the infrared light source used and the surrounding visible light was analyzed through simulation. The simulations used data from MMCBNU_6000 of Jeonbuk National University and finger vein images taken directly were used, and the performance were compared and analyzed using the EER.

Study on the Removal of the Cable Braid Inside the Missile (유도탄 탄내케이블 브레이드 제거에 따른 고찰)

  • Eun, Hee-hyun;Kim, Ji-min;Lee, Min-hyoung;Jung, Jae-won
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.105-110
    • /
    • 2018
  • The North Korea nuclear issue is now posing a serious security threat to the Korea and Northeast Asia. Accordingly, the South Korean military is pushing for the introduction of long-range air-to-surface flights and the development of domestic nuclear facilities that can precisely hit North Korea headquarters building and nuclear facility even hundreds of kilometers above the border. In this paper, we removed the cable braid for securing the weight of the missile among several design elements for long-range air-to-surface missile development and estimated and analyzed the resulting performance. The possibility of braid removal was analyzed in terms of crosstalk inside the cable and CS114, RE101 of MIL-STD-461F.

A Study of Incentive Problems of Welfare State (복지국가의 인센티브 문제에 관한 연구)

  • Cheon, Byung You
    • 한국사회정책
    • /
    • v.20 no.2
    • /
    • pp.69-96
    • /
    • 2013
  • This paper is to critically review the economic reasoning of non-sustainability of welfare state due to its intrinsic incentive problems and to see how the nordic welfare state responds to them. The welfare state as a political design of state to pursue equality has social insurance as its main economic function. It survives market failure of private insurance to contribute to human capital investment and industrial restructuring. The universal tax-financed welfare state, however, has the problem of tragedy of commons such as reduced work incentive and work ethics. But, the existing nordic welfare state overcomes it through employment-focused policy arrangements, maintenance of work ethics and benefits moral, incentive mechanism of wage-compression, public educational investment and its complementation with social security. The Nordic model shows that problems of incentive and moral are not about those of theory and reasoning, but about their reality which policies and institutions could respond to.

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.

Relationship among e-Service Quality, Relationship Quality, and e-Loyalty of Small Medical Clinic (소형병원의 e-서비스품질, 관계의 질, e-충성도의 영향관계)

  • Kim, JI-Young
    • Journal of the Korean Applied Science and Technology
    • /
    • v.38 no.3
    • /
    • pp.689-699
    • /
    • 2021
  • The spread of the COVID-19 pandemic has been increasing non-face-to-face activities; as a result, this has resulted in the number of individuals obtaining medical information from the websites and mobile contents of medical institutions increasing. The study conducted the structural equation modeling to test hypotheses; as a result, all sub-factors of e-service quality of small medical clinic websites and mobile contents, usability, security, responsiveness, design, and information, had a significant positive effect on relationship quality, and relationship quality had a significant positive effect on e-Loyalty. Moreover, the structural equation model showed a good model fit, χ2/df of 2.021, NFI of .954, TLI of .969, CFI of .976, RMSEA of .046. Future research is suggested to study relationship quality by developing a system able to quickly and accurately respond to websites and mobile contents users; furthermore, improving e-service quality and relationship quality is likely to strengthen e-loyalty.

Chinese Employees' Collectivism Orientation, Organizational Commitment, and Interpersonal Helping Behavior: A Generational Difference (중국 조직구성원의 집단주의 성향과 조직몰입 및 대인간 도움행위의 관계: 세대간 차이를 중심으로)

  • Fan, Wei;Yang, Xin-Feng;Choi, Byoung-Kwon
    • Asia-Pacific Journal of Business
    • /
    • v.11 no.2
    • /
    • pp.81-98
    • /
    • 2020
  • Purpose - This study aims to examine the relationship between Chinese employees' collectivism orientation and organizational commitment and interpersonal helping behavior and verify the differences of such relationships between new and the previous generation of employees. Design/methodology/approach - The 262 Chinese employees participated in self-reported survey through online platform. The confirmatory factor analysis and the hierarchical regression analysis were performed to test hypotheses. Findings - We found that Chinese employees' collectivism orientation positively influenced their organizational commitment and interpersonal helping behavior. Regarding the moderating role of generation, our result revealed that while the positive relationship between collectivism orientation and organizational commitment was significant for previous generation of employees, such relationship was not valid for new generation employees. However, there was no significant generational difference in the relationship between collectivism orientation and interpersonal helping behavior. Research implications or Originality - Considering that there have been relatively few empirical studies examining the interaction between employees' cultural characteristic and generations, this study contributes to demonstrate that the positive influence of Chinese employees' collectivism orientation on organizational commitment vary depending on Chinese generations. In addition, this study provides implications that organizational leaders in China should understand that the generational difference can influence how employees' collectivism orientation leads to their attitudes towards organizations and need to establish human resource management system by reflecting generational difference.

A Lightweight Hardware Accelerator for Public-Key Cryptography (공개키 암호 구현을 위한 경량 하드웨어 가속기)

  • Sung, Byung-Yoon;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1609-1617
    • /
    • 2019
  • Described in this paper is a design of hardware accelerator for implementing public-key cryptographic protocols (PKCPs) based on Elliptic Curve Cryptography (ECC) and RSA. It supports five elliptic curves (ECs) over GF(p) and three key lengths of RSA that are defined by NIST standard. It was designed to support four point operations over ECs and six modular arithmetic operations, making it suitable for hardware implementation of ECC- and RSA-based PKCPs. In order to achieve small-area implementation, a finite field arithmetic circuit was designed with 32-bit data-path, and it adopted word-based Montgomery multiplication algorithm, the Jacobian coordinate system for EC point operations, and the Fermat's little theorem for modular multiplicative inverse. The hardware operation was verified with FPGA device by implementing EC-DH key exchange protocol and RSA operations. It occupied 20,800 gate equivalents and 28 kbits of RAM at 50 MHz clock frequency with 180-nm CMOS cell library, and 1,503 slices and 2 BRAMs in Virtex-5 FPGA device.

Cybersecurity of The Defense Information System network connected IoT Sensors (IoT Sensor가 연결된 국방정보통신망의 사이버보안 연구)

  • Han, Hyun-Jin;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.802-808
    • /
    • 2020
  • The IoT(Internet of Things) is based on the development of sensor technology and high-speed communication infrastructure, and the number of IoT connected to the network is increasing more than the number of people, and the increase is also very fast. In the field of defense, IoT is being deployed in various fields such as operations, military, base defense, and informatization, and the need is also increasing. Unlike the existing PC/server information protection system, cyber threats are also increasing as IoT sensors, which are vulnerable to information protection, are increasing in the network, so it is necessary to study the platform to protect the defense information and communication network. we investigated the case of connecting wired and wireless IoT to the defense network, and presented an efficient interlocking design method of the IoT integrated independent network with enhanced security by minimizing the contact point with the defense network.