• Title/Summary/Keyword: Security Function

Search Result 1,549, Processing Time 0.026 seconds

Development of the Wind Wave Damage Estimation Functions based on Annual Disaster Reports : Focused on the Western Coastal Zone (재해연보기반 풍랑피해예측함수 개발 : 서해연안지역)

  • Choo, Tai-Ho;Cho, Hyoun-Min;Shim, Sang-Bo;Park, Sang-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.1
    • /
    • pp.154-163
    • /
    • 2018
  • Not only South Korea but also Global world show that the frequency and damages of large-scale natural disaster due to the rise of heavy rain event and typhoon or hurricane intensity are increasing. Natural disasters such as typhoon, flood, heavy rain, strong wind, wind wave, tidal wave, tide, heavy snow, drought, earthquake, yellow dust and so on, are difficult to estimate the scale of damage and spot. Also, there are many difficulties to take action because natural disasters don't appear precursor phenomena However, if scale of damage can be estimated, damages would be mitigated through the initial damage action. In the present study, therefore, wind wave damage estimation functions for the western coastal zone are developed based on annual disaster reports which were published by the Ministry of Public Safety and Security. The wind wave damage estimation functions were distinguished by regional groups and facilities and NRMSE (Normalized Root Mean Square Error) was analyzed from 1.94% to 26.07%. The damage could be mitigated if scale of damage can be estimated through developed functions and the proper response is taken.

Intelligent Mobile Surveillance System Based on Wireless Communication (무선통신에 기반한 지능형 이동 감시 시스템 개발)

  • Jang, Jae-Hyuk;Sim, Gab-Sig
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.11-20
    • /
    • 2015
  • In this paper, we develop an intelligent mobile surveillance system based on binary CDMA for the unmanned automatic tracking and surveillance. That is, we implement a intelligent surveillance system using the binary CDMA wireless communication technology which is applied the merit of CDMA and TDMA on it complexly. This system is able to monitor the site of the accident on network in real time and process the various situations by implementing the security surveillance system. This system pursues an object by the 360-degree using camera, expands image using a PTZ(Pan/Tilt/Zoom) camera zooming function, identifies the mobile objects image within a screen and transfers the identified image to the remote site. Finally, we show the efficiency of the implemented system through the simulation of the controlled situations, such as tracking coverage on objects, object expansion, object detection number, monitoring the remote transferred image, number of frame per second by the image output signal etc..

Authentication eXtention Scheme of Fast Handover for Secure NEMO-based PMIPv6 Networks (안전한 NEMO 기반 PMIPv6 네트워크를 위한 빠른 핸드오버를 지원하는 확장 인증기법)

  • Im, Illkyun;Jeong, Jongpil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.5
    • /
    • pp.107-119
    • /
    • 2013
  • This paper reinforced security under the network evaluation of wire wireless integration of NEMO (NEwork MObility) supporting mobility and network-based PMIPv6 (Proxy Mobile IPv6). It also proposes $SK-L^2AS$ (Symmetric Key-Based Local-Lighted Authentication Scheme) based on simple key which reduces code calculation and authentication delay costs. Moreover, fast handover technique was also adopted to reduce handover delay time in PMIPv6 and X-FPMIPv6 (eXtension of Fast Handover for PMIPv6) was used to support global mobility. In addition, AX-FPMIPv6 (Authentication eXtension of Fast Handover for PMIPv6) is proposed which integrated $SK-L^2AS$ and X-FPMIPv6 by applying Piggybacks method to reduce the overhead of authentication and signaling. The AX-FPMIPv6 technique suggested in this paper shows that this technique is better than the existing schemes in authentication and handover delay according to the performance analysis.

Driver Assistance System By the Image Based Behavior Pattern Recognition (영상기반 행동패턴 인식에 의한 운전자 보조시스템)

  • Kim, Sangwon;Kim, Jungkyu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.123-129
    • /
    • 2014
  • In accordance with the development of various convergence devices, cameras are being used in many types of the systems such as security system, driver assistance device and so on, and a lot of people are exposed to these system. Therefore the system should be able to recognize the human behavior and support some useful functions with the information that is obtained from detected human behavior. In this paper we use a machine learning approach based on 2D image and propose the human behavior pattern recognition methods. The proposed methods can provide valuable information to support some useful function to user based on the recognized human behavior. First proposed one is "phone call behavior" recognition. If a camera of the black box, which is focused on driver in a car, recognize phone call pose, it can give a warning to driver for safe driving. The second one is "looking ahead" recognition for driving safety where we propose the decision rule and method to decide whether the driver is looking ahead or not. This paper also shows usefulness of proposed recognition methods with some experiment results in real time.

Operating μTESLA based on Variable Key-Slot in Multi-Hop Unattended WSN (멀티 홉 Unattended WSN에서 가변 키 슬롯 기반 μTESLA의 운영)

  • Choi, JinChun;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.3
    • /
    • pp.223-233
    • /
    • 2014
  • As a broadcast message authentication method in wireless sensor networks, ${\mu}$TESLA enables sensor nodes efficiently authenticate message from base station (BS). However, if we use ${\mu}$TESLA that has very short length of key slot in unattended wireless sensor network (UWSN), sensors may calculate a huge amount of hashs at once in order to verify the revealed secret key. In contrast, if we set the length of ${\mu}$TESLA's key slot too long in order to reduce the amount of hashs to calculate, BS should wait out the long slot time to release key. In this paper, we suggest variable key slot ${\mu}$TESLA in order to mitigate the problem. As showing experiment results, we prove that our suggestion improve sensor node's response time and decrease of number of hash function calculation.

The Direction Governing the Future of korean Seafood Market -in view of societal marketing concept- (한국 수산물시장이 나아갈 방향 - 사회적 마케팅컨셉트의 관점에서 -)

  • 김수관;강연실
    • The Journal of Fisheries Business Administration
    • /
    • v.30 no.1
    • /
    • pp.31-50
    • /
    • 1999
  • The purpose of this paper is to offer policies or laws governing the future of Korean seafood markets in view of societal marketing concept. The environment surrounding those markets is changing quickly and constantly. The proposals in this paper are meant to help the Korean seafood market coping with this swiftly changing environment. This paper sorts this changing environment in terms of institutional side and secio-economical side. The institutional side involves the enforcement of international and domestic seafood trade standards, the increase of seafood importation, the adoption of optional seafood sales system, the openness of distribution market, and the adoption of TAC system. The secio-economical side involves the development of telecommunication and transportation, and the changing of seafood consumption pattern. The forecast about the future of seafood market could be classified into three fields, that is, the production field, the distribution field, and the consumption field of seafood. In the production field of seafood, the stabilization of supply of seafood and the production management oriented seafood market could be forecasted. In the distribution field, the formulating of enforced trade standards, the dispersion of marketing function among fisher, wholesaler and retailer, the development of marketing skills, and the promotion of marketing information system could be forecasted. Finally, in consumption field, the promotion of standardization and diversification, the appearance of intellectual consumers could be forecasted. This paper seeks to offer policies or laws fur the three categories of the seafood market-the government, the fisher, and the distributor-coping with the changing environment on the above three fields, thereby benefiting the consumer's long-term welfare. For the government, this paper suggests the construction of a Seafood Transaction Information Infrastructure, a Seafood Dealer License System, and a Seafood Safety Security System. For the fishers, this paper proposes an Eco-labelling System, a Sustainable Production System, and a Real Naming System in dealing seafood. Finally, for the distributors, this paper offers a Seafood Production Controlling System, a Nature-friendly Marketing System, and a Consumer-oriented Marketing System.

  • PDF

A Study on the Protection Plan of Fisheries Resources against Illegal Fishing of Chinese Fishing Vessel (중국 어선의 불법조업에 대한 우리나라 수산자원의 보호방안)

  • JUNG, Bong-Kyu
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.6
    • /
    • pp.1549-1560
    • /
    • 2016
  • Today, all the countries of the world newly recognize importance of sea, which are focused on efforts for security of marine territory and fishes resources. Many of the coastal state, to strengthen the rights of their own country EEZ, marine survey and continental shelf development, travels through such maritime jurisdiction in the territorial sovereignty and the EEZ overlaps, deepening complex interests between neighboring countries cooperation activities of the fierce competition, the domestic and foreign been has been carried out. Under such circumstances, is devastated coastal of China, our territorial waters and EEZ has been violated more and more, in spite of the powerful crackdown maritime public power, illegal fishing more resistance intensified. They tend to be gradually organization, collectivization and atrocities. Currently, illegal fishing of Chinese fishing boats in the West Sea of Korea, including the waters near Yeonpyeong Island is prevalent as operating in the coast of the country. Furthermore regrettable one is illegal on a scale and the situation where South Korea of scale of damage caused by it have not been accurately grasp of the operation, but that there is damage of Korea official duty enforcement to crack down the increase to illegal operations year after year have occurred. Violent, illegal fishing of Chinese fishing boats, in order to eradicate the operations of insane at our sea, we investigated to the infringement situations of fisheries resources by multiple fields. each of problems presenting a specific preservation plan in accordance with the function and role of the maritime enforcement organization and other government organization the point. at the same time we will try to seek measures such as a scheme that it is possible to increase the capacity.

A Study on the Status Quo and the Improvements of Blue Tourism Websites in the Context of Electronic Commerce (해양관광 사이트의 전자상거래 지원지능에 대한 실태 및 개선방안)

  • 김진백
    • The Journal of Fisheries Business Administration
    • /
    • v.35 no.1
    • /
    • pp.57-85
    • /
    • 2004
  • To develop an blue tourism website(BTW) for electronic commerce(EC), information requirements of BTW are defined firstly. We defined information requirements of BTW from two aspects, i.e., front office and back office. Information requirements for front office were derived by consumer purchasing decision process. And information requirements for back office were derived by tourism value chain. Total 29 functions are identified as critical EC related functions of BTW. Among them, 25 functions were investigated into BTW. BTWs were searched by search engines - Yahoo and Empas - to Korean websites. There are 12 specialized BTWs, except one cyber museum website. For 12 websites, 25 functions were probed. By the results, in need recognition stage of blue tourism, only weather information was provided in most websites. In information search stage of blue tourism, package recommendation and various contents were provided in most websites. In consumption stage of blue tourism, traffic information were provided in most websites. And in after - sales service stage of blue tourism, bulletin board function was implemented in most websites. The rest of the functions were scarcely implemented. On the whole, it was concluded that most EC related functions of BTW in Korea were not implemented properly. To improve the status quo, it is expected in the dimension of individual website, that marketing planning, customized service, intelligent service, reinforcing purchasing assistance functions, customer relationship management, and escrow service etc. need to be implemented. And it is expected in the dimension of blue tourism industry, that standardizing product catalog, security assistance policy, information sharing by industrial database, finding referral model of BTW, elevating information mind, revising related laws etc. are needed.

  • PDF

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

A Comparison Study on Data Caching Policies of CCN (콘텐츠 중심 네트워킹의 데이터 캐시 정책 비교 연구)

  • Kim, Dae-Youb
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.327-334
    • /
    • 2017
  • For enhancing network efficiency, various applications/services like CDN and P2P try to utilize content which have previously been cached somewhere. Content-centric networking (CCN) also utilizes data caching functionality. However, dislike CDN/P2P, CCN implements such a function on network nodes. Then, any intermediated nodes can directly respond to request messages for cached data. Hence, it is essential which content is cached as well as which nodes cache transmitted content. Basically, CCN propose for every nodes on the path from the content publisher of transmitted object to a requester to cache the object. However, such an approach is inefficient considering the utilization of cached objects as well as the storage overhead of each node. Hence, various caching mechanisms are proposed to enhance the storage efficiency of a node. In this paper, we analyze the performance of such mechanisms and compare the characteristics of such mechanisms. Also, we analyze content utilization patterns and apply such pattern to caching mechanisms to analyze the practicalism of the caching mechanisms.