• 제목/요약/키워드: Security Test

Search Result 1,256, Processing Time 0.031 seconds

A Case Study on Intelligent Surveillance System for Urban Transit Environment (도시철도 환경에서 지능형 감시 시스템 구축 사례)

  • Chang, Il-Sik;An, Tae-Ki;Cho, Byeong-Mok;Park, Goo-Man
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1722-1728
    • /
    • 2011
  • The security issue in urban transit system has been widely considered as the common matters after the fire accident at Daegu subway station. The safe urban transit system is highly demanded because of the vast number of daily passengers, and it is one of the most challenging projects. We introduced a test model for integrated security system for urban transit system and built it at a subway station to demonstrate its performance. This system consists of cameras, sensor network and central monitoring software. We described the smart camera functionality in more detail. The proposed smart camera includes the moving objects recognition module, video analytics, video encoder and server module that transmits video and audio information.

  • PDF

Analysis of Indoor Signal Strength from Zigbee Sensor (지그비 센서의 실내 신호 세기 분석)

  • Lee, Jong-Chan;Park, Sang-Joon;Park, Ki-Hong
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.11-17
    • /
    • 2010
  • Recent technological advances allow us to envision a future where large numbers of low-power, inexpensive sensor devices are densely embedded in the physical environment, operating together in a wireless network. This paper considers localization for mobile sensors; localization must be invoked periodically to enable the sensors to track their location. Localizing more frequently allows the sensors to more accurately track their location in the presence of mobility. In this paper, we test and analyze the accuracy of a moving node localization by Received Signal Strength (RSS).

A Study on the Corrosion Property of Sprinkler Pipe and the Solution (스프링클러 배관의 부식 특성과 대책에 관한 연구)

  • Kim, Dongsung;Cho, Cheol Won;Kim, Byungseon;Lee, Tae Shik
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.2
    • /
    • pp.87-92
    • /
    • 2008
  • This paper investigates the corrosion property of sprinkler pipe and provides the prevention solution. This study examines the property of stainless pipe widely used as sprinkler pipe and performs theoretical studies on the corrosion procedure. It was found that corrosion of the pipes mainly results from deterioration of pipe and wrong installation. The test result is expected to be useful in designing of the pipe system and minimizing of the corrosion.

  • PDF

A Basic Method for Composite Power System Expansion Planning under Security Criteria (안전도 제약을 고려한 복합전력계통의 확충계획에 관한 기초연구)

  • Kwon, Jung-Ji;Tran, TrungTinh;Choi, Jae-Seok
    • Proceedings of the KIEE Conference
    • /
    • 2005.07a
    • /
    • pp.557-559
    • /
    • 2005
  • This paper proposes a method for choosing the best composite power system expansion plan considering a contingency security criterion. The proposed method minimizes the investment budget fer constructing new transmission lines subject to contingency criterion. it models the power system expansion problem as an integer programming one. The method solves for the optimal strategy using a branch and bound method that utilizes a network flow approach and the maximum flow-minimum cut set theorem. Although the proposed method is applied to a simple sample study, the test results demonstrate that the proposed method is suitable for solving the power system expansion-planning problem subject to practical future uncertainties.

  • PDF

A Study on the Early-Age Strength Property of Concrete Using Liquid Admixture (액상형 조강제를 사용한 콘크리트의 초기강도 특성에 관한 연구)

  • Song, Tae-Hyeob;Lee, Sea-Hyun;Ryu, Deug-Hyun;Park, Cho-Bum
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2006.05b
    • /
    • pp.469-472
    • /
    • 2006
  • Amount used of admixture fare is increasing for concrete economic efficiency and ability security. Security of economic efficiency and ability can expect by use of this admixture fare but is displaying a lot of problems on early age strength hold by hydrate delay relatively. Specially, in the case of construction site, concrete strength can speak that interrelation is high with mold removal of forms time. Therefore, is economical and need examination of plan that can secure robber within 3 days using admixture fare such as fly ash and blast furnace slage differential speech to secure function. In this study, adding liquid admixture within 1% of a binding agent quantity to examine these problem with physical characteristic after hardening ago specially, strength change at standard and air dry curing of observed change in priority. Air dried and water curing total strength enhancement effects appeared by thing which is in case of add test result liquid admixture by below 1% and strength deputy by passage of age could know is not big.

  • PDF

Why Do You Use A Podcast Service? : A UTAUT Model (당신은 왜 팟캐스트 서비스를 사용하는가? : UTAUT 모형)

  • Kim, Hyeong-Yeol;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.153-176
    • /
    • 2016
  • This study investigated factors affecting the use intention of podcast service users based on the unified theory of acceptance and use of technology (UTAUT). Performance expectancy, effort expectancy, social influence, facilitating condition, hedonic motivation, innovativeness, and media credibility were used as independent variables in the model. The survey data from the users of the podcast portal 'podbbang' were analyzed with Smart PLS 2.0 to test the structural equation model. The results revealed that the podcast service user's effort expectancy, facilitating condition, hedonic motivation, and media credibility have a significant influence on use intention. However, the relationship between the podcast service user's performance expectancy, social influence, innovativeness, and use intention were not identified as significant.

A Design of SEED Cipher Algorithm (SEED 암호화 알고리즘의 설계)

  • 권명진;김도완;이종화;조상복
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.313-316
    • /
    • 2002
  • (Korea Information Security Agency) is designed by using VHDL to Implement hardware architecture It has been adopted by most of the security systems in Korea SEED Is designed to utilize the S-boxes and permutations that balance with the current computing technology It has the Feistel structure with 16 rounds The same procedure for data encryption and decryption makes possible an easy and practical hardware implementation. The primary functions used In SEED are F function and G function. This paper proposes an Iterative architecture of F function, a modified architecture of G function and an Iterative architecture of key scheduling algorithm. The designed SEED encrypts and decrypts exactly the test vectors It is expected to extend to various application fields If the design of control blocks Is added.

  • PDF

Determinants of Consumer Trust in e-Business (e비즈니스에서 신뢰의 결정요인에 관한 연구)

  • Kwak, Won-Seob
    • Journal of Digital Convergence
    • /
    • v.2 no.2
    • /
    • pp.29-44
    • /
    • 2004
  • The main objective of this study is to investigate the determinants of consumer trust in e-business. It examines consumer perceptions trust in a Web site and address following research questions: What factors influence consumer trust in a Web site and what specific Web site cues are associated with trust and satisfaction? We test our hypothesis in a empirical data from 568 consumers across 4 Web sites. By factor analysis, the results show that Web site characteristics are such as product information and purchase process , system stability, navigation, privacy(security), design, information of seller, pay methods, and customer service. We also find that brand and Web site characteristics such as Web site design, navigation, privacy(security), and customer service can explain over 59% of the variance in Web site trust and 60% in satisfaction. The results offer important implication for Web site strategies that include the manipulation of factors influencing Web site trust. And the future directions of the present research are discussed.

  • PDF

Corrective-mode based Security constrained Benders decomposition approach toward Preventive-mode Optimal Reactive Power Planning (안전도 제약 Benders 분해법을 적용한 예방모드 무효전력투입 최적화 방안)

  • Jeong, Jong-Hoon;Song, Hwa-Chang;Lee, Byoung-Jun;Kwon, Sae-Hyuk
    • Proceedings of the KIEE Conference
    • /
    • 1999.11b
    • /
    • pp.184-186
    • /
    • 1999
  • This paper presents a method for security constrained optimal reactive power planning in electric power systems. This method deals with corrective mode optimal reactive power dispatch in each (n-1)contingency system state and determination of the location and amount of reactive sources in preventive mode. In this paper the proposed scheme uses Benders decomposition method to determine the proper amount and location of reactive support in order to maintain a proper voltage profile and minimize active power transmission losses. This method is tested on IEEE 30 bus test system to prove effectiveness.

  • PDF

Intrusion Detection Scheme Using Traffic Prediction for Wireless Industrial Networks

  • Wei, Min;Kim, Kee-Cheon
    • Journal of Communications and Networks
    • /
    • v.14 no.3
    • /
    • pp.310-318
    • /
    • 2012
  • Detecting intrusion attacks accurately and rapidly in wireless networks is one of the most challenging security problems. Intrusion attacks of various types can be detected by the change in traffic flow that they induce. Wireless industrial networks based on the wireless networks for industrial automation-process automation (WIA-PA) standard use a superframe to schedule network communications. We propose an intrusion detection system for WIA-PA networks. After modeling and analyzing traffic flow data by time-sequence techniques, we propose a data traffic prediction model based on autoregressive moving average (ARMA) using the time series data. The model can quickly and precisely predict network traffic. We initialized the model with data traffic measurements taken by a 16-channel analyzer. Test results show that our scheme can effectively detect intrusion attacks, improve the overall network performance, and prolong the network lifetime.