• Title/Summary/Keyword: Security Technique

Search Result 1,683, Processing Time 0.035 seconds

Elemental Analysis by Neutron Induced Nuclear Reaction - Prompt Gamma Neutron Activation Analysis for Chemical Measurement - (중성자 핵반응을 이용한 원소 검출기술 - 즉발감마선 중성자 방사화분석법을 이용한 검출기술 -)

  • Song, Byung Chul;Park, Yong Joon;Jee, Kwang Yong
    • Analytical Science and Technology
    • /
    • v.16 no.5
    • /
    • pp.1041-1051
    • /
    • 2003
  • Neutron induced prompt gamma activation analysis (PGAA) offers a nondestructive, sensitive and relatively rapid method for the determination of trace and major elements and is proven to be convenient for online analysis of minerals, metals, coal, cement, petrochemical, coating, paper as well as many other materials and products. The technique has found many uses in medicine, industry, research, security and the detection of contraband items. This report reviews the present status and future trends of the PGAA techniques. Requirements for the system are neutron source, high resolution HPGe detectors with a high-voltage power supply, an amplifier, analog-to-digital converter, and a multichannel analyzer for the detection and measurement of prompt ${\gamma}$-ray emit form the neutron capture elements. Introducing a ${\gamma}$-${\gamma}$ coincidence system also improves the quality of the ${\gamma}$-ray spectrum by suppressing the background created from the Compton scattering of high energy prompt ${\gamma}$-rays. A PGAA system using a $^{252}Cf$ neutron source is currently under construction for the on-line measurement of several elements in aqueous samples at KAERI. The system can be applied for the detection of chemical weapons and explosives as well as various narcotics.

Determinants of IT Industry Employees' Intent to Leave (IT업계 종사자들의 이직의도 결정요인)

  • Lee, Woo-Kyung;Choi, Soo-Il
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.5
    • /
    • pp.369-383
    • /
    • 2011
  • The purpose of this study was to investigate the determinants of intent to leave among IT industry employees, based on the Price's structural model of employee turnover. The sample used in this study were composed of 370 employees from 10 IT firms located in Seoul and Gyeonggi-Do. Data were collected with self-administered questionnaires and analyzed using structural equation modelling technique. This study found that four task reward variables(job variety, job autonomy, job challenge, and role ambiguity), two social reward variables (supervisory support and coworker support), three organizational reward variables(promotional chances, job security, and distributive justice) and one environmental variable(job opportunity), had significant effects on IT industry employees' intent to leave in terms of total effects and his directions of those significant effects were consistent with theoretical predictions; and that two mediating variables, job satisfaction and organizational commitment had the most important effects on IT industry employees' intent to leave in terms of total effects. The theoretical and practical implications of the research findings were discussed and the directions for future research were suggested.

Improvement Issues of Personal Information Protection Laws through Meta-Analysis (메타분석을 통한 개인정보보호법의 개선과제)

  • Cho, Myunggeun;Lee, Hwansoo
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.1-14
    • /
    • 2017
  • As we enter the era of big data, the value of personal information is becoming ever more important. However, personal information protection laws in Korea have several issues. Furthermore, existing research are limited in their ability to facilitate a comprehensive understanding of measures to improve personal information protection laws. Accordingly, this study analyzes improvements to be made in the current personal information protection laws based on existing research. A total of 39 research articles discussing the problems of the personal information protection law were selected and analyzed by applying the meta - analysis technique. According to the results, the various issues such as the meaning and scope of personal information, the role and obligations of relevant parties, provision of personal information to third parties, and redundant and imbalanced regulations in special acts in each field. that exist in the current personal information protection laws were confirmed. This study contributes to the improvement of inconsistency between information protection laws and related special laws in each field in practice. Academically, it will contribute to understanding the problems of th law from the macro perspective and suggesting the integrated improvement ways of the law.

Hierarchical Image Encryption System Using Orthogonal Method (직교성을 이용한 계층적 영상 암호화)

  • Kim, Nam-Jin;Seo, Dong-Hoan;Lee, Sung-Geun;Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.3
    • /
    • pp.231-239
    • /
    • 2006
  • In recent years, a hierarchical security architecture has been widely studied because it can efficiently protect information by allowing an authorized user access to the level of information. However, the conventional hierarchical decryption methods require several decryption keys for the high level information. In this paper, we propose a hierarchical image encryption using random phase masks and Walsh code having orthogonal characteristics. To decrypt the hierarchical level images by only one decryption key, we combine Walsh code into the hierarchical level system. For encryption process, we first perform a Fourier transform for the multiplication results of the original image and the random phase mask, and then expand the transformed pattern to be the same size and shape of Walsh code. The expanded pattern is finally encrypted by multiplying with the Walsh code image and the binary phase mask. We generate several encryption images as the same encryption process. The reconstruction image is detected on a CCD plane by a despread process and Fourier transform for the multiplication result of encryption image and hierarchical decryption keys which are generated by Walsh code and binary random phase image. Computer simulations demonstrate that the proposed technique can decrypt hierarchical information by using only one level decryption key image and it has a good robustness to the data loss such as random cropping.

The Attitude of the Korean Television Drama in Mongolia Market Impact Korea Country Image, Corporate and Product's Image Formation (몽골 시장에서 한국 드라마에 대한 태도가 한국 국가 이미지, 기업 및 제품 이미지 형성에 미치는 영향 연구)

  • Odmandakh, Batsukh;Lee, Kee-Sung;Jin, Chang-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.223-232
    • /
    • 2016
  • The purpose of the study is to explore the attitude of the Korean television drama in mongolia market impact Korea country image, corporate and product's image formation. The research is conducted effects of Korean image, its company, product and belief of its product and influence of procurement of Korean products in Mongolia in terms of Mongolian has enormously watched Korean drama since latest of 1990. Korean drama can influence Korean products image. Watching Kore and rama can influence view of Mongolian in quality of Korean products, design etc. Korean dramas can affect images of Korean company. Watching Korean drama can influence opinion of Mongolian in staff, culture, level of technique of Korean company moreover, competitiveness of Korean company in international market and etc. Korean drama can influence Korean image. Watching Korean drama can reach aspect of Mongolian in Korean education level, national security, reconstruction and income of population and etc. The most effective factor in product reliability and procurement was country image but company image can not influence that. In conclusion according to survey result within Mongolian customers that Korean drama has some influence in Korean image, its company image, product image, and product reliability and procurement of Korean product.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane (푸리에 영역에서의 위상 변조 Exclusive-OR 연산을 이용한 단일 경로 위상 암호화 시스템)

  • Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong;Noh, Duck-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.4
    • /
    • pp.326-333
    • /
    • 2005
  • Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.

A Crypto-processor Supporting Multiple Block Cipher Algorithms (다중 블록 암호 알고리듬을 지원하는 암호 프로세서)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Bae, Gi-Chur;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2093-2099
    • /
    • 2016
  • This paper describes a design of crypto-processor that supports multiple block cipher algorithms of PRESENT, ARIA, and AES. The crypto-processor integrates three cores that are PRmo (PRESENT with mode of operation), AR_AS (ARIA_AES), and AES-16b. The PRmo core implementing 64-bit block cipher PRESENT supports key length 80-bit and 128-bit, and four modes of operation including ECB, CBC, OFB, and CTR. The AR_AS core supporting key length 128-bit and 256-bit integrates two 128-bit block ciphers ARIA and AES into a single data-path by utilizing resource sharing technique. The AES-16b core supporting key length 128-bit implements AES with a reduced data-path of 16-bit for minimizing hardware. Each crypto-core contains its own on-the-fly key scheduler, and consecutive blocks of plaintext/ciphertext can be processed without reloading key. The crypto-processor was verified by FPGA implementation. The crypto-processor implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,500 gate equivalents (GEs), and it can operate with 55 MHz clock frequency.

A Technique to Specify and Generate .NET Components in MDA/PSM for Pervasive Service (MDA/PSM상에서 퍼베이시브 서비스를 지원하는 닷넷 컴포넌트의 명세 및 생성 기법)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.635-645
    • /
    • 2007
  • Component technology has been widely accepted as an effective way for building software systems with reusable components, and Microsoft (MS) .NET is one of the recent representative component technologies. Model Driven Architecture (MDA) is a new development paradigm which generates software by transforming design models automatically and incrementally. Transformation of structural models in MDA has been successfully applied. However, transformation of dynamic models and pervasive services, such as transaction service, security service, synchronization service and object pooling are largely remains as an area for further research. The recent enterprise system has multi tier distributed architecture, and the functionality of early mentioned pervasive services is essential for this architecture. .NET platform can implement Component Object Model+ (COM+) component for supporting pervasive services by specify Attribute code. In this paper, we specify the functionalities of the COM+ component offering pervasive services, and then those functionalities are defined by UML profile. By using the profile, the Platform Specific Model (PSM) for .NET/C# is specified, and .NET components are automatically generated through our tool. The development productivity, extensibility, portability, and maintenance of software can be dramatically improved by using of the proposed methods.