• Title/Summary/Keyword: Sense of security

Search Result 260, Processing Time 0.024 seconds

Design of Unproved Diffie-Hellman Key Agreement Protocol Based on Distance Bounding for Peer-to-peer Wireless Networks (향상된 경계 결정 기반의 Diffie-Hellman 키 일치 프로토콜)

  • Park, Sern-Young;Kim, Ju-Young;Song, Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1C
    • /
    • pp.117-123
    • /
    • 2008
  • We propose an improved Diffie-Hellman(DH) key agreement protocol over a radio link in peer-to-peer networks. The proposed protocol ensures a secure establishment of the shared key between two parties through distance bounding(DB). Proposed protocol is much improved in the sense that we now reduce the number of messages exchanged by two, the number of parameters maintained by four, and 2(7682(k/64)-64) of XOR operations, where k is the length of the random sequence used in the protocol. Also, it ensures a secure reusability of DH public parameters. Start after striking space key 2 times.

Computer vision monitoring and detection for landslides

  • Chen, Tim;Kuo, C.F.;Chen, J.C.Y.
    • Structural Monitoring and Maintenance
    • /
    • v.6 no.2
    • /
    • pp.161-171
    • /
    • 2019
  • There have been a few checking frameworks intended to ensure and improve the nature of their regular habitat. The greater part of these frameworks are constrained in their capacities. In this paper, the insightful checking framework intended for debacle help and administrations has been exhibited. The ideal administrations, necessities and coming about plan proposition have been indicated. This has prompted a framework that depends fundamentally on ecological examination so as to offer consideration and security administrations to give the self-governance of indigenous habitats. In this sense, ecological acknowledgment is considered, where, in light of past work, novel commitments have been made to help include based and PC vision situations. This epic PC vision procedure utilized as notice framework for avalanche identification depends on changes in the normal landscape. The multi-criteria basic leadership strategy is used to incorporate slope data and the level of variety of the highlights. The reproduction consequences of highlight point discovery are shown in highlight guide coordinating toward discover steady and coordinating component focuses and effectively identified utilizing these two systems, by examining the variety in the distinguished highlights and the element coordinating.

A Fair Certified Electronic Mail Protocol that Enhances Guarantee of Reception (수신 보장성이 향상된 공평한 배달 증명 전자 메일 프로토콜)

  • 박용수;조유근
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.86-94
    • /
    • 2003
  • Certified e-mail system guarantees that recipient will get mail content if and only if mall originator receives a receipt. Unlike previous schemes, Optimistic protocols recently published generate a receipt when it meets the condition that the mail content can be accessed by recliner at any time. So originator cannot assure the delivery of e-mail although he can get a receipt. In this paper, we show some flaws in optimistic protocols and propose improved schemes using delivery deadline. Modified protocols guarantee proof-of-receipt and eliminate the problem mentioned above. Furthermore, proposed modification technique can be applicable to most optimistic protocols and is efficient in the sense that modified schemes do not increase the number of messages.

A Study on the Dynamic Voltage Stability Considering the Power System Security Control (계통(系統)의 안전성(安全性) 제어(制御)를 고려(考慮)한 동적(動的) 전압안정도(電壓安定度)에 관(關)한 연구(硏究))

  • Lee, Geun-Joon;Hwang, Jong-Young;Lee, Gil-Soon;Jeong, Tay-Ho;Kim, Keon-Jung;Kim, Yong-Bae
    • Proceedings of the KIEE Conference
    • /
    • 1994.11a
    • /
    • pp.54-60
    • /
    • 1994
  • The cause of black out of Tokyo Power in 1987 has been identified as the voltage stability problem. After this event many researchers has been interested in voltage stability or voltage collapse phenomena. The voltage instability is different Com the transient stability in the sense of reactive power mismatch and the long duration time. In this study, we developed efficient tool for analyze and control the dynamic voltage instability. To analize specific condition of dynamic voltage stability, quasi-dynamic simulation method is developed. To provide proper mathmatical model for dynamic voltage stability, generator, SVC, OLTC, induction motor models are introducted. To provide specified dynamic voltage stability, the authors considered to use reactive loss function(${\partial}Q/{\partial}p_L$) as reactive power facility control index. This program was tested and identified its usefulness in real KEPCO system.

  • PDF

Research Trends Analysis of Big Data: Focused on the Topic Modeling (빅데이터 연구동향 분석: 토픽 모델링을 중심으로)

  • Park, Jongsoon;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.1
    • /
    • pp.1-7
    • /
    • 2019
  • The objective of this study is to examine the trends in big data. Research abstracts were extracted from 4,019 articles, published between 1995 and 2018, on Web of Science and were analyzed using topic modeling and time series analysis. The 20 single-term topics that appeared most frequently were as follows: model, technology, algorithm, problem, performance, network, framework, analytics, management, process, value, user, knowledge, dataset, resource, service, cloud, storage, business, and health. The 20 multi-term topics were as follows: sense technology architecture (T10), decision system (T18), classification algorithm (T03), data analytics (T17), system performance (T09), data science (T06), distribution method (T20), service dataset (T19), network communication (T05), customer & business (T16), cloud computing (T02), health care (T14), smart city (T11), patient & disease (T04), privacy & security (T08), research design (T01), social media (T12), student & education (T13), energy consumption (T07), supply chain management (T15). The time series data indicated that the 40 single-term topics and multi-term topics were hot topics. This study provides suggestions for future research.

Design of Fire Evacuation Guidance System using USN Mesh Routing in High-Rise Buildings (초고층 건물 화재에서 USN 메쉬 라우팅을 이용한 피난유도 시스템 설계)

  • Choi, Yeon-Yi;Joe, In-Whee
    • Fire Science and Engineering
    • /
    • v.22 no.3
    • /
    • pp.278-286
    • /
    • 2008
  • When big fire in high rise building and multiplex happens, the needs for high prevention system of disaster are being increased for getting the real-time scene state, quick lifesaver, and safe life security. In this paper the proposed evacuation guidance algorithm which analyzed the feature and danger of fire in high rise buildings, gave simplicity and scalability. Our research shows as fire and disaster occur in high rise buildings we construct sensor networks and sense realtime location information on fire alive people, and the situation information for fire instructed quick and safe escaping route by using mesh routing algorithm scheme relative to exit sign.

Customer Buying Process Based B2C Differentiation Strategy Analysis (고객 구매 프로세스 기반 B2C 차별화 전략 분석)

  • Gu, Ja-Heon;Park, U-Seong;Han, Hyeon-Su
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2007.11a
    • /
    • pp.488-492
    • /
    • 2007
  • In this study, we investigated how to distinguish customer delivered value to re-purchasing in fierce B2C industry. To identify key managerial variables that could distinctively impact re-purchasing, we first identified customer value proposition as per the customer buying decision process. Next, core value propositions of choice efficiency and competitive price are defined to determine vendor satisfaction during the searching stage and purchasing stage. The trust level is also introduced in the sense of reflecting confirmation to guarantee after purchase security. Then, significant managerial variables to impact on core value propositions are extracted. The resulting structural model illustrated that search convenience and quality assurance affect the choice efficiency, and re-purchase intention is strongly explained by both the vendor satisfaction and trust level. The empirical testing results also support that transaction cost reduction is key determinant of shopping at the Internet shopping mall. Furthermore, trust level should be combined to induce re-purchasing in addition to transaction cost savings.

  • PDF

Constructivist Implications of the 9.19 Military Implementation Agreement (9.19 군사합의서의 구성주의적 함의 고찰)

  • Lee, Kang Kyong;Seol, Hyeon Ju
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.101-110
    • /
    • 2020
  • Since the third inter-Korean summit, the inter-Korean summit in Pyongyang and the U.S.-North Korea summit in Singapore and Hanoi, denuclearization negotiations are under way that will determine the fate of the Korean Peninsula. However, the negotiations are stalled and some skepticism is expected due to the conflicting U.S.-North Korea stance over the terms of denuclearization. The reason why it is difficult to realize the complete denuclearization of North Korea is that there are a variety of variables such as the traditional security dilemma in Northeast Asia, the hegemonic competition between the U.S. and China, and the formation of a new cold-war system. At a turning point when three inter-Korean summits and three U.S.-North Korea summits were held in the wake of the 2018 PyeongChang Winter Olympics, North Korea's complete denuclearization has become a must-do historical task for Northeast Asia and world peace beyond the Korean Peninsula. In this sense, the inter-Korean summit in Pyongyang is seen as a historic occasion for presenting a new milestone for the denuclearization of North Korea and the development of inter-Korean relations through the 9.19 Pyongyang Joint Declaration and the Military Agreement. Meanwhile, Constructivism, which has become the main paradigm of international political theory, presents the view that ideological variables such as ideology, history and culture define material factors, identity and interests of state actors, and that the structure of international relations can be changed through interaction. In this study, the historical meaning of the 9.19 Pyongyang Declaration, which is now past its first anniversary, was considered from a constructivist perspective. To this end, the development process of constructivism theory and analysis model and the development process of inter-Korean relations were briefly reviewed, and the military implications of the 9.19 Military Agreement were presented.

The Korean Nationalist Characteristics of the Korean Blockbuster Films: Focusing on and (한국형 블록버스터 영화의 한국 민족주의적 특성: <공동경비구역 JSA>와 <한반도>를 중심으로)

  • Ryu, Jae-Hyung
    • Korean journal of communication and information
    • /
    • v.59
    • /
    • pp.116-137
    • /
    • 2012
  • What is 'nation' and 'nationalism?' What does 'korean nationalism' mean? And how is korean nationalism represented through a chain of films called 'the korean blockbuster films?' The purpose of this study is to answer to these questions. The characteristics of the korean blockbuster films have been studied for quite a long time and the researchers have agreed with the context about nationalism in a large sense. However, majority of the studies ends up in the journalistic or impressionistic criticism without any theoretical discussion. Few theoretical criticisms also have founded on the formation process of nation of the Western Europe and their nationalism. Hence I would like to add the discourse of korean nationalism and to seize more accurately the social/cultural/historical peculiarity of the korean blockbuster films. In addition, as non-nationalist narratives have recently emerged, korean blockbuster films are entering to the evolution process. On this, the significance of this study seems to exist in providing a cornerstone to the expected evolution theory of the korean blockbuster films by means of complementation and reestablishment of nationalism of their first generation. and , presenting socio-historical peculiarity of the Korean nation, are examined by the close textual analysis.

  • PDF

Influencing Factors on Outsourcing Success in the Defense Sector (국방부문의 아웃소싱 성공도에 영향을 미치는 요인에 관한 연구)

  • Yu, Dae Beom;Oh, Jay In
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.79-103
    • /
    • 2016
  • The Korean Army has to construct a system that will enable it to cope immediately with the flexible military relationships in Northeast Asia by systematizing and improving the efficiency of operations. These improvements include building a smart and strong army, concentrating on cost-effective combat skills, maximizing the utilization of private resources, and establishing a military structure based on information and technology. Accordingly, this study proposes solutions to solve the problems affecting the success of outsourcing in the defense industry. Unlike outsourcing in other government ministries, outsourcing in the national defense sector may be unrealistic because this strategy is related to the renovation project of the Ministry of the National Defense. In general, the objective of outsourcing in the defense industry, similar to other businesses, is to improve efficiency and not to reduce troops and national defense budget. Several factors, such as identification and security guarantee, risk reduction, cost saving, quality improvement, the reliability of enterprise, and professional technology, are necessary to ensure outsourcing success in the national defense sector. In terms of effectiveness, the improvement in service quality significantly influences outsourcing success in the national defense sector. Eventually, the national defense forces must be strengthened to prevent the provocative actions of North Korea and other threats by improving identification, sense of national security, and quality unlike the current outsourcing of the government, as well as emulating German GEBB or PMC, which utilizes social capital.