• 제목/요약/키워드: Special security

검색결과 545건 처리시간 0.023초

A Generalized Multicarrier Communication System - Part I: Theoretical Performance Analysis and Bounds

  • Imran Ali
    • International Journal of Computer Science & Network Security
    • /
    • 제24권9호
    • /
    • pp.1-11
    • /
    • 2024
  • This paper develops a generalized framework for the analysis of multicarrier communication system, using a generic pair of transmitters- and receiver side terraforms, Qτ | QR, such that the DFT-transform based "conventional OFDM" is its special case. This analysis framework is then used to propose and prove theorems on various performance metrics of a multicarrier communication system, which will apply to any system that fits the architecture, which most will do. The analysis framework also derives previously unknown closed-form expressions for these metrics, such as how the performance degradation due to carrier frequency offset or timing synchronization error, amongst others, are function of generic transforms. While extensive work exists on the impact of these challenges on conventional OFDM, how are these functions of transform matrices is unknown in the literature. It will be shown, how the analysis of OFDM based system is special case of analysis in this paper. This paper is Part I of three paper series, where the other two supplements the arguments present here.

RFID를 이용한 특수 자산 관리 시스템 개발 (Development of Special Asset Management System Using RFID)

  • 한상훈;민장근
    • 한국콘텐츠학회논문지
    • /
    • 제11권6호
    • /
    • pp.33-41
    • /
    • 2011
  • RFID기술은 이미 신분증, 교통카드 등 다양한 응용분야에 사용되고 있으며, UHF 대역의 RFID 기술은 물류, 유통, 보안 분야에서 많은 시스템들이 개발되어 왔다. 또한, 사람에 의해서 관리되는 허점을 보완하기 위해서 총기, 보석과 의약품과 같은 특수자산을 효율적으로 통합 관리하고, 실시간 모니터링이 가능한 시스템을 필요로 한다. 본 연구에서는 특별하게 관리되어져야 하는 특수자산을 안전하게 보관하고, 상태를 실시간으로 모니터링 가능하며, 자산의 유통 경로 및 이력 관리를 할 수 있는 특수자산 관리 시스템을 개발하고자 한다. 시스템의 형태는 캐비닛의 형태를 가지고 있기 때문에 스마트 캐비닛이라고 한다. 스마트 캐비닛은 RFID, 다양한 센서, 지문 인식, 스마트카드 등의 기술을 통합하여 특수자산을 안전하게 보호하며, 관리 서버와의 통신을 통하여 자산의 실시간 감시, 이력 관리, 유통 경로, 보안로그 등을 제공한다. 본 연구에서는 특수자산 관리시스템을 구성하는데 있어서 총기 및 의약품 관리 스마트 캐비닛을 개발하였으며, 이에 대한 효용성 및 가능성을 제시하였다.

드론과 A.I.를 이용한 특수교 주탑부 표면 손상 탐지 방법 연구 (A Study on the Surface Damage Detection Method of the Main Tower of a Special Bridge Using Drones and A.I.)

  • 이성진;주봉철;김정호;이태희
    • 한국방재안전학회논문집
    • /
    • 제16권4호
    • /
    • pp.129-136
    • /
    • 2023
  • 높은 주탑을 가지는 해상특수교량은 특수한 구조적 특징으로 인해 육안점검이 어려운 점검사각지대가 존재하게 되며, 이를 해결하기 위해 드론을 활용한 안전점검 방법들이 연구되고 있다. 본 연구에서는 드론을 이용하여 해상특수교량 주탑의 영상 데이터를 취득하고, 인공지능 알고리즘을 개발하여 주탑부 표면 손상에 대한 탐지를 수행하였다. 인공지능 알고리즘은 서로 다른 구조를 지닌 딥러닝 네트워크를 활용하여 앙상블을 형성한 모델을 구축하고 결과를 취합하는 스태킹 앙상블 학습법을 적용하였다.

북한 호위사령부의 경호요원 체육교육에 관한 연구 (A Study on the Physical Training for the Security Agents of the Security Headquaters in the North Korea)

  • 김정현
    • 시큐리티연구
    • /
    • 제8호
    • /
    • pp.45-64
    • /
    • 2004
  • The pivotal emphasis of the physical training for the security agents of the security headquarters in the North Korea is to inspire them with the defense physical training-centered ideology and the war spirit. Their special martial arts is the protectee-centered offensive arts rather than the self-centered arts. It puts emphasis on training black belt-holders in diverse martial arts rather than in a certain martial art. Thus, the physical training for security agents in the South Korea should be also developed into the ways to rear them as black belt-holders in diverse martial arts rather than to foster them as high grade-holders in a certain martial art. And also, professors majoring in security and physical science have to develop jointly the measures to improve the physical and mental agility and the basic physical strength to inspire rapid handling and perseverance, to develop the physical training program to reduce mental and physical stress of security guards, to develop the standard for the examination of physical strength suitable for the body figures of Korean people and the regular evaluation with the standard and to apply traditional folk-games such as the swing and the seesaw to the physical training for security guards.

  • PDF

Design of Network-based Real-time Connection Traceback System with Connection Redirection Technology

  • Choi, Yang-Sec;Kim, Hwan-Guk;Seo, Dong-Il;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2101-2105
    • /
    • 2003
  • Recently the number of Internet users has very sharply increased, and the number of intrusions has also increased very much. Consequently, security products are being developed and adapted to prevent systems and networks from being hacked and intruded. Even if security products are adapted, however, hackers can still attack a system and get a special authorization because the security products cannot prevent a system and network from every instance of hacking and intrusion. Therefore, the researchers have focused on an active hacking prevention method, and they have tried to develop a traceback system that can find the real location of an attacker. At present, however, because of the characteristics of Internet - diversity, anonymity - the real-time traceback is very difficult. To over-come this problem the Network-based Real-Time Connection Traceback System (NRCTS) was proposed. But there is a security problem that the victim system can be hacked during the traceback. So, in this paper, we propose modified NRCTS with connection redirection technique. We call this traceback system as Connection Redirected Network-based Real-Time Connection Traceback System (CR-NRCTS).

  • PDF

오디오 취득 기반의 방범용 시스템을 위한 환경 잡음과 비명소리 분석 (Analysis on Scream and Ambient Noise for Security System with Audio Capability)

  • 박주현;서지훈;이석필
    • 전기학회논문지
    • /
    • 제63권6호
    • /
    • pp.804-809
    • /
    • 2014
  • Recently, the prevention of crime using CCTV draws special in accordance with the higher crime incidence rate. Therefore security systems like a CCTV with audio capability are developing for giving an instant alarm. This paper proposes an analysis on screams and ambient noises for security systems with audio capability. This analysis result will be helpful for security systems to detect screams well with various ambient noises in real environment.

A Study on the Development Plan of Smart City in Korea

  • KIM, Sun-Ju
    • 융합경영연구
    • /
    • 제10권6호
    • /
    • pp.17-26
    • /
    • 2022
  • Purpose: This study analyzes advanced cases of overseas smart cities and examines policy implications related to the creation of smart cities in Korea. Research design, data, and methodology: Analysis standards were established through the analysis of best practices. Analysis criteria include Technology, Privacy, Security, and Governance. Results: In terms of technology, U-City construction experience and communication infrastructure are strengths. Korea's ICT technology is inferior to major countries. On the other hand, mobile communication, IoT, Internet, and public data are at the highest level. The privacy section created six principles: legality, purpose limitation, transparency, safety, control, and accountability. Security issues enable urban crime, disaster and catastrophe prediction and security through the establishment of an integrated platform. Governance issues are handled by the Smart Special Committee, which serves as policy advisory to the central government for legal system, standardization, and external cooperation in the district. Conclusions: Private technology improvement and participation are necessary for privacy and urban security. Citizens should participate in smart city governance.

Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution-Permutation Networks

  • Kang, Ju-Sung;Hong, Seok-Hie;Lee, Sang-Jin;Yi, Ok-Yeon;Park, Choon-Sik;Lim, Jong-In
    • ETRI Journal
    • /
    • 제23권4호
    • /
    • pp.158-167
    • /
    • 2001
  • We examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical and provable security of these diffusion layers against differential and linear cryptanalysis. First, in terms of practical security, we show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical and propose some special conditions in which those are identical. We also study the optimal diffusion effect for some diffusion layers according to their constraints. Second, we obtain the results that the consecutive two rounds of SPN structure provide provable security against differential and linear cryptanalysis, i.e., we prove that the probability of each differential (resp. linear hull) of the consecutive two rounds of SPN structure with a maximal diffusion layer is bounded by $p^n(resp.q^n)$ and that of each differential (resp. linear hull) of the SDS function with a semi-maximal diffusion layer is bounded by $p^{n-1}(resp. q^{n-1})$, where p and q are maximum differential and linear probabilities of the substitution layer, respectively.

  • PDF