• Title/Summary/Keyword: eCard

Search Result 270, Processing Time 0.024 seconds

A Study on the Web Based Monitoring System for the BIPV (BIPV에 적용된 웹기반 모니터링 시스템에 대한 연구)

  • Kang Byung-Bog;Yoon Jeong-Phil;Park Se-Jun;Yoon Pil-Hyun;Lim Jung-Yeol;Cha In-Su
    • Proceedings of the KIPE Conference
    • /
    • 2003.11a
    • /
    • pp.252-255
    • /
    • 2003
  • Digital environment that is represented to internet is displacing business way of industry and business achievement way with the fast speed being giving great change on life whole, improve existence business process utilizing internet and Web connection technology, information superhighway to tradition industrialist manufacture and e-transformation's propulsion that wish to maximize productivity and administration efficiency is spread vigorously. In this paper, we wish to accomplish generation equipment's heighten stability and believability through remote monitoring and control of BIPV system. This paper describes the design of the monitoring system for sensing the monitoring data and indirect controlling of the BIPV system. Most of the conventional monitoring system depend on the special hardware and software. Basic design goal of monitoring system is to provide the convenience for the user and the portability for the system. In order for the system to fulfill its requirements, it was designed using Labview GUI facility based on the Windows 2000 environment of IBM PC compatible and Add-on card based on the TCP/IP protocol. Advantage of the monitoring system are a personnel expenses curtailment effect, free of the place restriction and unmanned system of the generation plants, etc.

  • PDF

Design of Encryption/Decryption IP for Lightweight Encryption LEA (경량 블록암호 LEA용 암·복호화 IP 설계)

  • Sonh, Seungil
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Lightweight Encryption Algorithm(LEA) was developed by National Security Research Institute(NSRI) in 2013 and targeted to be suitable for environments for big data processing, cloud service, and mobile. LEA specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, block cipher LEA algorithm which can encrypt and decrypt 128-bit messages is designed using Verilog-HDL. The designed IP for encryption and decryption has a maximum throughput of 874Mbps in 128-bit key mode and that of 749Mbps in 192 and 656Mbps in 256-bit key modes on Xilinx Vertex5. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.

Analysis of Security Threats from Increased Usage of Mobile App Services (모바일 앱 서비스 이용 증가로 인한 보안 위협 분석)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.45-55
    • /
    • 2018
  • Recently, because the arrival of the fourth industrial revolution era, many information and telecommunication services have grown rapidly in the mobile business market. So, companies are based Mobile Apps on user customized services and expanding their services. From the standpoint of the business, to generate revenue, the company needs to maintain the existing current computer environment and develop Mobile Apps to offer convenience in various areas such as finance, admiration, e-commerce and sales support. However, as the number of users increase due to expansion of various Mobile services, security threats that are related to Mobile Apps are increasing and its damage is also increasing. Due to the rapid technological transformation of Mobile devices using the Internet, the level of security threats to Smartphones are rising and getting more advance, so this thesis is structured as follows. In Chapter 2, it will look at the overall trends of Mobile Apps as related research. In Chapter 3, it will discuss various security concerns that related to the latest Mobile Apps and learn about the threatening factors. In Chapter 4, it will compare and analyze the threatening factors. Then it will find and suggest the possible plan. In Chapter 5, it will end with conclusion. Finally, to protect mobile devices from security threats, the environment of operating system which manages the resources and data of Apps needs to be protected. Also, it is important that users to have awareness and check activation FinTech technology security in the process of simple payment with fingerprint or IC card.

The Role of The Prefrontal Lobes in Scientific Reasoning (과학적 추론 능력의 발달에서 전두엽연합령의 역할)

  • Hur, Myoung;Lawson, Anton E.;Kwon, Young-Ju
    • Journal of The Korean Association For Science Education
    • /
    • v.17 no.4
    • /
    • pp.525-540
    • /
    • 1997
  • The present study tested the hypothesis that maturation of the prefrontal lobes is a crucial factor determining the performance of scientific reasoning tasks, Functions of the prefrontal lobes, such as activating relevant information, sequential planning and monitoring, and inhibiting irrelevant information, are related thinking patterns with scientific reasoning. Therefore, we inferred the idea that the prefrontal lobes play an important role in scientific reasoning. To test the hypothesis. the present study investigated a prefrontal lobe patient's task solving procedures in scientific reasoning tasks and the correlation and regression analysis between a test of prefrontal lobe function and two scientific reasoning tasks, The perseverative errors in the Wisconsin Card Sorting Test(WCST) was used as a measure of the prefrontal lobe function, The Melinark Type Task and the Classroom Test of Scientific Reasoning were used as measures of scientific reasoning abilities. Ages and Group Embedded Figure Test were also used as measures of two alternative hypotheses, general maturation and field independency respectively. The prefrontal lobe patient showed a crucial deficiency in solving scientific reasoning tasks. In the tasks, the patient could not used the reasoning of If... and... then... therefore pattern. In correlation study, the perseveration errors of the WCST showed a significantly negative correlation with two scientific reasoning tasks. Multiple regression study also showed that the perseveration errors measured as a function of the prefrontal lobes have more contribution to scientific reasoning ability than contributions of alternative hypotheses. Therefore, the present study supported the hypothesis that prefrontal lobes play a crucial role in scientific reasoning ability, What function of the prefrontal lobes do play crucial role in scientific reasoning? The present study provided an explanation for the question, which inhibiting ability of the prefrontal lobes is responsible for the scientific reasoning ability, in a part at least. That is, perseverative tendency in task-solving procedures causes a deficiency of an ability to inhibit the wrong information to solve a task. The present study provided a possibility of neuropsychological approach in science education research. The present study also showed an importance of the prefrontal lobe development in the performance of scientific reasoning task.

  • PDF

Four unrecorded moss species from the Korean flora (한반도 미기록 선류식물 I)

  • Yoon, Young Jun;Sun, Byung-Yun
    • Korean Journal of Plant Taxonomy
    • /
    • v.40 no.3
    • /
    • pp.186-191
    • /
    • 2010
  • Four unrecorded species (Barbella flagellifera, Isothecium hakkodense, Mnium orientale and Fissidens gardneri) and with one unrecorded genus, Barbella, are reported new to the Korean moss flora. B. flagellifera (Meteoriaceae) was found on a tree at alt. 300-350 m of parasitic Seogeomun-oreum Volcano on Jeju Island. The species are mainly distributed in subtropic regions. I. hakkodense (Lembophyllaceae) was found around the top of Seongin-bong on Ulleung Island. This species is similar to I. subdiversiforme, however, it can be distinguished by the morphologies of branch leaves and alar cells. M. orientale (Mniaceae) was collected from Mt. Jiri. This is similar to M. heterophyllum, however, it can be distinguished by plant size, number of teeth in leaf margin and cell size on leaf. F. gardneri (Fissidentaceae) was found along the valley of Mt. Palyeong, Jeollanam Province. This species is similar to F. obscurirete, but distinguished by the size of the plants and their leaves as well as the costal lengths of the leaves.

Sensitivity Analysis on the Performance of Multimedia Stream Server using Simulation (시뮬레이선을 통한 멀티미디어 스트림 서버의 성능 민감도 분석)

  • Park, Jin-Won;Park, Chong-Won
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.2
    • /
    • pp.23-29
    • /
    • 2006
  • This paper studies the Internet stream server which serves multimedia stream services such as VoD and MoD. The Internet multimedia stream server is developed to provide 50 users with continuous multimedia stream contents simultaneously. This paper focuses on introducing design concepts, operation details and on evaluating system performance and doing sensitivity analysis with respect to the change of the system components. The performance evaluation is performed using simulation in order to identify the system component that mostly affects the system performance. The sensitivity analysis shows the service delay rates of the multimedia stream server depending on the user's service request pattern. Also, the analysis is made on the utilization rates of the core system components such as the PCI bus and the Ethernet card, and on the system performance change by adding more system components.

  • PDF

Implementation of the Smombie (smartphone zombie) VR experience game using Google Cardboard and Bluetooth controller (구글 카드보드와 블루투스 컨트롤러를 이용한 스몸비(스마트폰 좀비) VR 체험 게임)

  • Kim, Ji-hyun;Seo, Mi-hye;Yang, Seon-young;Lee, Bo-hyun;Jin, I-seul;Park, Su e;Park, Jung-kyu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.212-215
    • /
    • 2017
  • In this paper, VR game was produced to inform the danger of using smartphone while walking and to raise awareness. In this VR games, you can experience Smombie (smart phone and zombie compound word) like a real situation by using Google card board and Bluetooth controller. Designed as a directions game of everyday material, the user indirectly experiences the dangerous situations that may actually occur in everyday life. In the virtual space, you can see the map on the smartphone, navigate the route, and send text messages using the controller during the game. We will explain how to implement smartphone map and send text message using controller which are the main functions of VR game.

  • PDF

A study on Secure Payment Method & Security Technology of Electronic Commerce (전자상거래의 보안기술과 지불방법에 관한 연구)

  • 조원길
    • The Journal of Information Technology
    • /
    • v.2 no.1
    • /
    • pp.35-52
    • /
    • 1999
  • This study introduced the new technologies that are expanding the realm of electronic commerce to the Internet and small business. Each of the key components of electronic commerce(contracts, signatures, notaries, payment systems and adult trails)are supported in the new electronic commerce. Electronic commerce is more than just handling purchase transactions and funds transfers over the internet. Despite Electronic commerce's past roots in transactions between large corporations, banks, and other financial institutions, the use of the internet as a way to bring Electronic commerce to the individual consumer has led to shift in viewpoint. Over the past few years, both the press and the business community have increased their focus on Electronic commerce involving the consumer Effective payment system should be established for the internet commerce. In this study, we examined the current development and application of Electronic payment system. Two different payment systems are used and under application. One is IC-card type of payment system which has gained popularity in England, Hong-Kong, and many other countries as a substitution of cash. The other type of payment system is e-cash, which is used more conveniently for the payment through internet. The question of which method is better fitted for the internet commerce should be evaluated in the view of cost and benefit since the associated technology is still under evolution. This study conducted a study on Secure Payment Method & Security Technology of Electronic Commerce

  • PDF

A Study on Food Truck business model utilizing NFC (NFC를 활용한 Food Truck 비즈니스 모델에 관한 연구)

  • Yoon, Youngdoo;Choi, Eunyoung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.135-137
    • /
    • 2014
  • The expansion of the transportation card, and the popularity of smart phones has been increasing social concern about the NFC technology. Has been focused on the use of e-commerce, most of the NFC, fulfilling the security problems or technical topic for this, but the reality is that the current debate on the new value added contents industry and a nonexistent connection. Leverage NFC for efficient order management system in order to build lunch or dinner by being pushed to ease restrictions on remodeling and renovation projects Food Truck vehicle through a small business support programs in the current government, but increasing interest in the Food Truck I study a model of ordering system for food truch 재소 s-guide system. A lot of the effectiveness of management as appropriate to the use of NFC for small business that operates as a server system is highly Food Truck tendencies tied to one router and server on the intranet without the need of internet connection system. I believe in this study S-Guide system contributes for business success for food truck of small business.

  • PDF

Dual Signature Scheme to provide efficient message decryption (효율적인 메시지 복호화를 제공하는 이중 전자서명 방식)

  • 김근옥;남정현;김승주;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.129-136
    • /
    • 2003
  • A representative payment broker system is SET and one of its signature shcemes is a dual digital signature scheme. A dual digital signature scheme expose neither user's payment information(credit card number etc.) to merchandiser, nor user's order information to bank So it keeps user's Privacy safe. The digital signature scheme like this is being necessary as E-commerce is revitalized. But a dual digital signature of SET is not appropriate for wireless environments because it needs so many computations and communications. In this paper, we propose a signcryption scheme that generates a polynomial using a payment information for merchandiser and an order information for bank in order to reduce communications. We analyze the problem of existing signcryption schemes and dual digital signature schemes. Also we analyze the security properties of the proposed scheme.