• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.034 seconds

Development of a flower support for real flower decoration Automatic Production System (생화 장식 꽃받침 자동 생산 시스템 개발)

  • Song, Myung-Seok;Kim, Man-Joong;Kim, Seon-Bong;Ji, Peng;Ryuh, Beom-Sahng
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.7
    • /
    • pp.63-71
    • /
    • 2018
  • A flower support was developed for real flower decoration automation production system using an ultrasonic wave sealer to automatically produce a system. Because a flower support for real flower decoration that was produced manually could not meet the needs of the consumers, this study developed an automated manufacturing system to increase productivity. A flower support for real flower decoration was constructed using a cap consisting of plastic and plate made from non-woven fabric. The guide was designed to transport the cap to the ultrasonic wave sealer and optimal guide was developed from the test according to the material and shape. To produce the entire system, the guides and accessories were weighed and appropriate motors and pulleys were calculated. Control of the automation production system was based on a PCB board, which increased the reliability and security, and a remote controller with manual and automatic modes was prepared. After development, tests of the transfer precision and repetition accuracy revealed an X-axis of 2.7mm, a Y-axis of 1 mm, and a repetition of 0 mm. The productivity was also checked. The automated machine worked 8 hours/day to make 35 supports and 70 Therefore, the automatic system produces 200% more output than manual work

A Study on Informational(IT) Integration Model for Efficiency of National Police Agency Business (경찰청 업무의 효율성을 위한 정보화(IT) 통합 모델 연구)

  • Shin, Sung-Choul;Yang, Hae-Sool
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.203-212
    • /
    • 2008
  • Currently the problem that cannot attempt convenience anger to inner user and people has been stated in a National Police Agency(NPA) informatization system administered Executed an inquiry regarding users inner the our country NPA after analyzing Hint point a foreign NPA IT informatization organization decreasing by and analyzed improvement Point to measures regarding this problem at these papers, and derived from an efficient strategic plan for NPA informatization integration. As set up informatization vision of NPA and a goal, To utilize so that design a model integrated inforrnatization for advanced a business assistance system of the NPA where these results are objective for the people enhancement, and keep connection with other organization in its mind, and can accomplish a quality elevation of NPA information business. and expect as present improvement plan for efficiency of NPA information business.

  • PDF

A Study on Building System of e-Discovery about Logistics Information of Safty Agricultural-livestock Products (안심 농축수산물 물류정보에 관한 e-Discovery시스템 구축 연구)

  • Jung, Kyung-yong;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.287-290
    • /
    • 2014
  • The Large-scale Agricultural & Livestock Products consists largely of distribution at The nation's of school and military foods. but false information on the Agricultural & Livestock Products in a safe food supply has become a social issue. The food suppliers deliver food resource in a school-large food establishments such as Change to domestic high-quality Livestock products from low-quality foreign Livestock products, Change to eco-friendly agricultural produce from normal agricultural produce, Change to fresh vegetables from contaminated vegetables. In this paper, e-Discovery system applies to the methods and security of incorrect logistics information and evidential data about illegal products of agriculture & livestock, it is necessary as studies about compensation and liability.

  • PDF

The Performance Evaluation System for the Modern Pentathlon based on the Concept of Performance Analysis of Sport

  • Choi, Hyongjun;Han, Doryung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.117-123
    • /
    • 2020
  • This study intended to develop the Performance Evaluation system for the modern pentathlon such as an Olympic sporting event. The performance evaluation index system for the modern pentathlon was developed by Microsoft Excel 2016 with Visual Basic for Application that it is able to be understandable for the practical field in sport. Consequently, the system for the performance evaluation index is able to be developed within the concept of performance analysis of sport such as a notational analysis of sport. And the performance indicators for the performance evaluation index were selected by the skills to make successful outcomes. Finally, the simulation with big data gathering by the developed system would be requested that systematic reviews on successful outcomes in other sporting events would be necessary.

Synchronization and Secure Communication Application of Chaos Based Malasoma System (카오스 기반 Malasoma 시스템의 동기화 및 보안 통신 응용)

  • Jang, Eun-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.747-754
    • /
    • 2017
  • Chaos-based secure communication systems are alternative of standard spread-spectrum systems that enable spreading the spectrum of the information signals and encrypting information signals with simple and inexpensive chaotic circuitry. In secure communication area, like Lorenz, Chua, Rossler, Duffing etc, classical systems are widely used. Malasoma chaotic system is topologically simple but their dynamical behaviors are non-linear synchronization and secure communication applications has not seen in paper. This paper aims for introducing a new chaotic system which is able to use as alternative to classical chaotic systems into secure communication fields. In addition, this new model simulates a synchronous communication system using P-C (Pecora-Carroll) method by verifying security with chaos signal through simulation. Modelling, synchronization and secure communication applications of Malasoma are realized respectively in MATLAB-Simulink environment. Retrieved results show that this novel chaotic system is able to use in secure communication fields.

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

A Case Study of Mainframe Load Reduction Using The Client and Server Model (클라이언트/서버 모델에 의한 메인프레임 부하 분산 사례연구)

  • 고광병;공승욱;권기목;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.8
    • /
    • pp.1628-1639
    • /
    • 1994
  • In order to increase the utilization of the computing resources, universities connect a variety of computing resources such as mainframes, workstations, and personal computers via LAN. However, due to management and security reasons, most administrative applications are concentrated on mainframes which is the main cause of large work overload on mainframes for such applications as on-line course registration system where the entire student body must have access to the system during a short period of time. In this study, using a university system as the model and choosing on-line course registration system as the targeted distributed computing. APPC through IBM SNALU 6.2 link is proposed as the most appropriate means of distributed computing for the environment of the model university. In addition, the on-line course registration system is redesigned as client-server model where a mainframe serves as the file server responsible for file input and output and workstations becomes the client. Actual implementation and experiments have shown that the proposed distributed computing system yields a significant reduction in processing time.

  • PDF

A Novel Design of CDSK Receiver for Improving the BER Performance (BER 성능 향상을 위해 제안하는 새로운 CDSK 수신기)

  • Lee, Jun-Hyun;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.8
    • /
    • pp.638-643
    • /
    • 2013
  • Chaos communication system has a sensitive characteristic to initial conditions, because completely another signal is generated when initial condition of chaos equation is changed subtly. Also, chaos communication systems have the characteristics of non-periodic, non-predictability, the broadband signal, such as ease of implementation. Due to these characteristics, security of chaos communication system generally is evaluated better than other systems. However, BER(Bit Error Rate) performance is evaluated worse than other digital system, because existing chaos communication system's transmitter and receiver are strong influence by interference signal and noise. So, research to improve the BER performance of the chaotic communication system is performed continuously. In this paper, We will propose a new CDSK(Correlation Delay Shift Keying) receiver for BER performance improvement. After we compare to the performance of existing CDSK receiver and proposed CDSK receiver, BER performance of proposed CDSK receiver evaluate. Also, when using the new CDSK receiver, we evaluate the BER performance according to the spreading factors and find an optimum spreading factor. If chaos communication system use a new CDSK receiver, BER performance is improved than existing CDSK receiver. Also, if spreading factor's value is increased, BER performance is improved, because it is not nearly affected by interference signal and noise.

Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks

  • Chen, Yajun;Yi, Ming;Zhong, Zhou;Ma, Keming;Huang, Kaizhi;Ji, Xinsheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.4923-4939
    • /
    • 2019
  • In this paper, a secure transmission scheme based on the artificial noise is proposed for D2D communications underlaying the full-duplex cellular network, and a secure power allocation scheme to maximize the overall secrecy rate of both the cellular user and D2D transmitter node is presented. Firstly, the full-duplex base station transmits the artificial noise to guarantee the secure communications when it receives signals of cellular uplinks. Under this secure framework, it is found that improving the transmission power of the cellular user or the D2D transmitter node will degrade the secrecy rate of the other, although will improve itself secrecy rate obviously. Hence, a secure power allocation scheme to maximize the overall secrecy rate is presented subject to the security requirement of the cellular user. However, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program problem by utilizing the proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme.

1-out-of-L Electronic Voting System with Ballot-Cancellation (투표-취소가 가능한 1-out-of-L 전자투표 시스템)

  • Yang, Hyung-Kyu;An, Youn-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1C
    • /
    • pp.86-93
    • /
    • 2007
  • In this paper, we present an electronic voting system based on cryptographic techniques. Recently, some countries have used e-voting systems using an electronic voting device instead of a voting sheet. These e-voting systems are the early stage which is not online voting. Many cryptographers have studied on-line e-voting systems based on cryptographic techniques. The existing 1-out-of-L e-voting systems are based on E1Gamal cryptosystem. To reduce computational complexity, we use r-th residue encryption scheme and compare the computational complexity of our 1-out-of-L e-voting system with that of the 1-out-of-L e-voting system based on E1Gamal cryptosystem. Moreover, we extend the proposed 1-out-of-L e-voting system to ballot-cancellation property The existing e-voting systems had been overlooked the ballot-cancellation property. There is the reason that the ballot is cancelled according to an election law. For our e-voting system with ballot-cancellation property, we extend the homomorphic property based on r-th residue encryption. The extended homomorphic property is used to cancel votes with guaranteeing privacy and universal verifiability.