• Title/Summary/Keyword: Security Design

Search Result 3,368, Processing Time 0.035 seconds

A Study on the Unmanned convenience Store Operation System from the Viewpoint of Visual Merchandising (비주얼 머천다이징 관점에서의 무인 편의점 운영시스템에 관한 연구)

  • Seo, Jung-Hwa;Yang, Hoe-Chang;Park, Chul-Ju;Youn, Myoung-Kil
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.12
    • /
    • pp.45-53
    • /
    • 2018
  • Purpose - The purpose of the study was to investigate operation system of current convenience store and competing retail store and to find out development of unattended convenience store. Operators can save labor cost and solve labor seeking when opening shop under suitable environment and commerce area, and assure of employee's safety. Customers are allowed to select commodity comfortably without disclosure of face and to shorten standby time at simple store opening, buying and paying and to produce convenient living environment by financing, delivery and goods control. This study examined effect and problems of operation of existing and unattended convenience store from point of view of visual merchandising to find out model of unattended convenience store and to strengthen competitiveness of convenience store business. Research design, data, and methodology - Research procedure of accomplishment of goal of the study was: The study investigated state of distribution business, and role and definition of VMD. First, VMD played an important role of promotion and competitiveness of unattended convenience stores. Second, the author investigated research and cases of unattended convenience stores 14 months, that is to say, from August 15, 2017 to October 15, 2018. Third, the author investigated on-the-spot three of common convenience stores, three of unattended convenience stores and three of retailers one month, that is to say, June 1, 2018 to July 1, 2018. The subject was convenience stores and retailers selling similar type of products at Seoul and metropolitan area. Results - Layout, selling place, brand identity, goods assortment, authentication system, product information cognition and control, buying and payment system, security system, salesmen, promotion and other services should be improved from point of view of merchandising. Structure, furniture, lighting, voice, façade, VP, PP, IP and POP should be developed. Conclusions - Unattended convenience stores saved operating cost and lessened labor and gave visitors convenience and comfortable shopping and made use of resources effectively. Further studies with quantitative analysis shall find out strategic conditions for promotion of unattended convenience stores.

A Study on the Fire Prevention Activities and Suppression Measures of Utility-Pipe Conduit (지하공동구 화재예방활동 및 진압대책에 관한 연구)

  • Lee, Jung-Il
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.10 no.4
    • /
    • pp.63-68
    • /
    • 2010
  • Utility-Pipe Conduit is, Housing and city effectively accommodate what they absolutely need power, communications, gas, pipeline, water supply, drainage, energy facilities etc, according to expansion of urban infrastructure are derived, several ways to solve problems in, collection facilities in place are maintained and managed facility. If Utility-Pipe Conduit is damaged, as well as national security, because their impact on society as a whole, by introducing large vulnerability in the fire prevention activities and suppression measures and disaster for our situation by introducing measures, comprehensive analysis of the fire risk, it shall establish fire prevention activities and suppression through analysis of Utility-Pipe Conduit design, institutional issues, the problem of fire protection facilities, fire spread phenomenon etc. Because of Utility-Pipe Conduit is an enclosed place, so incomplete combustion due to lack of oxygen supply that there are problem such dark smoke, carbon monoxide etc, toxic combustion products and heat generation and visual impairment is an issue difficult to enter. As well as fire prevention activities, the fire In light of the particularity of the under ground than above ground fire, so this phenomenon is weak fire fighting that fire to become effective fire fighting tactics, basically it is necessary difficulty softening, non-burn softening and prevent combustion expansion of the cable is installed on the Utility-Pipe Conduit, having to considering the specificity of the response command system and relevant organizations to establish an on-site, Structural identification and other information gathering required to record of Response agencies, keep air conditioning system 24 hours and strengthening Virtual Total Training of Response agen

Design and Implementation of Factory Equipment Monitoring System using Grid-based Key Pre-Distribution (그리드 기반 키 선분배 방식을 사용하는 공장 설비 모니터링 시스템 설계 및 구현)

  • CHO, YANGHUI;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.51-56
    • /
    • 2016
  • In this paper, we propose an Arduino-based plant monitoring system. The proposed system is based on the Arduino platform, using an environmental sensor and a pressure sensor for measuring temperature, humidity and illuminance in order to monitor the state of the environment and the facilities of the plant. Monitoring data are transmitted to a ZigBee coordinator connected to a server through a radio frequency transceiver. When using a pressure sensor and the environment sensor data stored on the host server, checking the pressure in the environment of the plant and equipment is intended to report any alarm status to the administrator. Using a grid line-based key distribution scheme, the authentication node dynamically generates a data key to protect the monitoring information. Applying a ZigBee wireless sensor network does not require additional wiring for the actual implementation of a plant monitoring system. Possible working-environment monitoring of an efficient plant can help analyze the cause of any failure by backtracking the working environment when a failure occurs. In addition, it is easy to expand or add a sensor function using the Arduino platform and an expansion board.

A Study on the Development of Souvenirs as Local Cultural Tourism Products - Focused on developing souvenir design - (지역 문화관광상품으로서의 기념품 개발 연구 - 기념품 디자인 개발 중심으로 -)

  • Hwang, Gyun-Jeong
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.73-79
    • /
    • 2020
  • With the recent strengthening of local autonomy and the recognition of the culture and tourism industry as a driving force for the fourth industrial revolution, the importance of research on the revitalization of the local culture and tourism industry is further emphasized. Thus, in this paper, the concept and type of local culture and tourism products were summarized and the research direction was presented through this. As a research method, the internal and external factors of the culture and tourism industry in Korea were used as the SWOT analysis method. In the text, three representative sites were selected and analyzed for the development of local cultural and tourism products, and Seoul, Jeju Island, and Gyeongju all found that they lacked local cultural and tourism products. It also found another value through its role of cultural development as well as the economic aspect of the development of cultural tourism products. In order to revitalize the local culture and tourism industry, which has become more important, the government proposed measures to promote differentiated creative products, efficient marketing, and legal security in various ways. In order for this study to be better data for researchers in the culture and tourism industry and related industries, research should be conducted with detailed surveys that could not be conducted due to various restrictions in the future.

Study on development of the remote control door lock system including speeker verification function in real time (화자 인증 기능이 포함된 실시간 원격 도어락 제어 시스템 개발에 관한 연구)

  • Kwon, Soon-Ryang
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.714-719
    • /
    • 2005
  • The paper attempts to design and implement the system which can remotely check visitors' speech or Image by a mobile phone. This system is designed to recognize who a visitor is through the automatic calling service, not through a short message, via the mobile phone, even when the home owner is outside. In general, door locks are controlled through the home Server, but it is more effective to control door locks by using DTMF signal from a real-time point of view. The technology suggested in this paper makes it possible to communicate between the visiter and the home owner by making a phone call to tile home owner's mobile phone automatically when the visiter visits the house even if the home owner is outside, and if necessary, it allows for the home owner to control the door lock remotely. Thanks to the system, the home owner is not restricted by time or space for checking the visitor's identification and controlling the door lock. In addition, the security system is improved by changing from the existing password form to the combination of password and speaker verification lot the verification procedure required for controlling the door lock and setting the environment under consideration of any disadvantages which may occur when the mobile Phone is lost. Also, any existing problems such as reconnection to tile network for controlling tile door lock are solved by controlling the door lock in real time by use of DTMF signal while on the phone.

Examining the Influencing Factors of Third-Party Mobile Payment Adoption: A Comparative Study of Alipay and WeChat Pay

  • Mu, Hong-Lei;Lee, Young-Chan
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.247-284
    • /
    • 2017
  • Purpose The first purpose of this study is to investigate factors that are likely to influence user's intention to adopt third-party mobile payment platform. A comprehensive study about mobile payment services have used various variables to explain user's use intention based on the theory of reasoned action (TRA) or the theory of planned behavior (TPB). Variables such as simplicity, security, costs, relative advantage, individual mobility, subjective norm, trust, satisfaction, attitude towards use, perceived usefulness, perceived ease of use and so on. Among these factors, we expect to find out the most influential factors effecting user's use intention of the third-party mobile payment services. Second, we also examine whether the most influential factors have the same influence to different third-party mobile payment services by conducting comparative study of Alipay and WeChat Pay. Design/methodology/approach Empirical data for this study were collected from Chinese who has the experience using or have used Alipay or WeChat Pay. Participants needed to be familiar with Alipay or WeChat Pay because such users may be more aware of both the advantages and disadvantages of Alipay and WeChat Pay. We conduct a pilot test using Smart PLS 2.0, which includes 50 Alipay users and 82 WeChat Pay users. The result indicates that all the measurement fit for the context. And then 980 questionnaires were mainly sent out to the college students and the e-mails users randomly. To encourage participation, we give the participants a small gift as a present. Finally, we received a total of 683 replied. Data from respondents who gave incomplete or invalid answers were excluded to assure the validity of the constructs. 79 questionnaires were rejected, finally the valid data are 604 (with 372 Alipay users and 232 WeChat Pay users). Findings The results suggest that users' intention is determined by their trust on third-party mobile payment service and perceived usefulness of use. Comparative study results also indicated that the factors have different influence on Alipay group and WeChat Pay group, which offers a new aspect for academic field, and provides useful information to mobile payment service providers in China.

A Unified ARIA-AES Cryptographic Processor Supporting Four Modes of Operation and 128/256-bit Key Lengths (4가지 운영모드와 128/256-비트 키 길이를 지원하는 ARIA-AES 통합 암호 프로세서)

  • Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.795-803
    • /
    • 2017
  • This paper describes a dual-standard cryptographic processor that efficiently integrates two block ciphers ARIA and AES into a unified hardware. The ARIA-AES crypto-processor was designed to support 128-b and 256-b key sizes, as well as four modes of operation including ECB, CBC, OFB, and CTR. Based on the common characteristics of ARIA and AES algorithms, our design was optimized by sharing hardware resources in substitution layer and in diffusion layer. It has on-the-fly key scheduler to process consecutive blocks of plaintext/ciphertext without reloading key. The ARIA-AES crypto-processor that was implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,658 gate equivalents (GEs), and it can operate up to 95 MHz clock frequency. The estimated throughputs at 80 MHz clock frequency are 787 Mbps, 602 Mbps for ARIA with key size of 128-b, 256-b, respectively. In AES mode, it has throughputs of 930 Mbps, 682 Mbps for key size of 128-b, 256-b, respectively. The dual-standard crypto-processor was verified by FPGA implementation using Virtex5 device.

A Study on Normal Project Duration for Water Resource Project (수자원시설 건설공사 표준공기 산정을 위한 기초연구)

  • Lee, Bongsu;Kim, Kinam;Lee, Minjae
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.1
    • /
    • pp.35-43
    • /
    • 2015
  • It is important to have enough design and construction duration for infrastructure projects. However, recent water resource project in Korea shows several problems caused by their fast-tract schedule. National Audit Committee report several water resource projects have quality problems caused by insufficient project duration. Especially, water resource projects such as dam and water pipeline construction should have proper time to secure their structure quality. Normal project duration for these projects should be estimated based on previous similar projects' historical data analysis. However there is no standard model which can estimate normal project duration for water resource projects in Korea. There are several normal project duration estimation models for building project developed by public(LH) and private construction companies. However, there is no proper model for water resource projects. So, this study developed normal project duration model for dam and water pipeline projects using historical data and show application of models.

Design of PUF-Based Encryption Processor and Mutual Authentication Protocol for Low-Cost RFID Authentication (저비용 RFID 인증을 위한 PUF 기반 암호화 프로세서와 상호 인증 프로토콜 설계)

  • Che, Wonseok;Kim, Sungsoo;Kim, Yonghwan;Yun, Taejin;Ahn, Kwangseon;Han, Kijun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.831-841
    • /
    • 2014
  • The attacker can access the RFID systems illegally because authentication operation on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because of Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the mutual authentication protocol are proposed for low-cost RFID authentication. The challenge-response pairs (PUF's input and output) are utilized as the authentication key and encrypted by the PUF's characteristics. The encryption method is changed each session and XOR operation with random number is utilized. Therefore, it is difficult for the attacker to analyze challenge-response pairs and attack the systems. In addition, the proposed method with PUF is strong against physical attacks. And the method protects the tag cloning attack by physical attacks because there is no authentication data in the tag. Proposed processor is implemented at low cost with small footprint and low power.

Low Power Implementation of Integrated Cryptographic Engine for Smart Cards (스마트카드 적용을 위한 저전력 통합 암호화 엔진의 설계)

  • Kim, Yong-Hee;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.6
    • /
    • pp.80-88
    • /
    • 2008
  • In this paper, the block cipher algorithms, 3-DES(Triple Data Encryption Standard), AES(Advanced Encryption Standard), SEED, HASH(SHA-1), which are domestic and international standards, have been implemented as an integrated cryptographic engine for smart card applications. For small area and low power design which are essential requirements for portable devices, arithmetic resources are shared for iteration steps in each algorithm, and a two-level clock gating technique was used to reduce the dynamic power consumption. The integrated cryptographic engine was verified with ALTERA Excalbur EPXA10F1020C device, requiring 7,729 LEs(Logic Elements) and 512 Bytes ROM, and its maximum clock speed was 24.83 MHz. When designed by using Samsung 0.18 um STD130 standard cell library, the engine consisted of 44,452 gates and had up to 50 MHz operation clock speed. It was estimated to consume 2.96 mW, 3.03 mW, 2.63 mW, 7.06 mW power at 3-DES, AES, SEED, SHA-1 modes respectively when operating at 25 MHz clock. We found that it has better area-power optimized structure than other existing designs for smart cards and various embedded security systems.