• Title/Summary/Keyword: network security

Search Result 6,093, Processing Time 0.036 seconds

Acceptance Intention of Digital Home Services Through Situational Inducement (디지털홈서비스의 상황적 유인을 통한 수용의사에 관한 연구)

  • Park Jeong-Hyun;Lee Yeong-Ro;Lee So-Young;Moon Yoo-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.255-265
    • /
    • 2005
  • This paper investigates potential favor and intention for acceptance of digital home services through the situational inducement. The result shows that digital home services for the interactive TV, security management, family management and geographical image affect users' intention for acceptance. And it shows that favorable attitudes of the interactive TV services increase in the younger generation and internet users, favorable attitudes of the family management services increase in the thirties, and favorable attitudes of the medical management services increase in the ages of the fifties. In addition it shows that relationship between favor and intention for acceptance of digital home services affects affirmatively, which was illustrated in the coefficient value (0.661) of the R-square by the regression analysis.

  • PDF

A Study on the Application Technique of Realtime Bridge Monitoring System based on GNSS (GNSS 기반의 실시간 교량변위 모니터링 시스템 적용기술 연구)

  • Yeon, Sang-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.362-369
    • /
    • 2016
  • Recently, Last to check the security status of various medium and large bridge structures using various kinds of measurement equipment, but most of the methods are used to measure and check the displacement behavior of the bridge by a certain period. In this study, receive GPS satellite signals that can be observed in real time the whole region, a bridge to automatically measure the displacement and behavior characteristics of the structure in real-time in mm over the 24 hours, the measurement information and transmits the data to the wireless network, by making use, it was applied to the real-time monitoring system in connection with a bridge to be able to automatically notify GNSS fine displacement behavior. In fact, analysis and receives the measurement data to GNSS provided in the upper bridge of the middle and large-sized aging for this purpose, measuring USN and at the same time is converted into a three-dimensional position information of a test study was conducted to monitor the bridge displacement in real time. As a result, a vertical displacement of about 0.027~0.037m at the measurement time of day of the measurement point is that the repeated and confirmed.

Fault Diagnosis System based on Sound using Feature Extraction Method of Frequency Domain

  • Vununu, Caleb;Kwon, Oh-Heum;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.4
    • /
    • pp.450-463
    • /
    • 2018
  • Sound based machine fault diagnosis is the process consisting of detecting automatically the damages that affect the machines by analyzing the sounds they produce during their operating time. The collected sounds being inevitably corrupted by random disturbance, the most important part of the diagnosis consists of discovering the hidden elements inside the data that can reveal the faulty patterns. This paper presents a novel feature extraction methodology that combines various digital signal processing and pattern recognition methods for the analysis of the sounds produced by the drills. Using the Fourier analysis, the magnitude spectrum of the sounds are extracted, converted into two-dimensional vectors and uniformly normalized in such a way that they can be represented as 8-bit grayscale images. Histogram equalization is then performed over the obtained images in order to adjust their very poor contrast. The obtained contrast enhanced images will be used as the features of our diagnosis system. Finally, principal component analysis is performed over the image features for reducing their dimensions and a nonlinear classifier is adopted to produce the final response. Unlike the conventional features, the results demonstrate that the proposed feature extraction method manages to capture the hidden health patterns of the sound.

A Design and Implementation of Web-based System for Real-Time Infographics of Airport Refueling Facilities (공항 급유 설비의 실시간 인포그래픽을 위한 웹 기반 시스템 설계 및 구현)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.305-310
    • /
    • 2015
  • A controlling system for airport refueling facilities is connected to sensors which collect various informations. Informations which are transmitted at a high speed in various sensors are processed by a dedicated software in the controlling system. The problems of system maintenance and network traffic caused by the use of dedicated software reduce the efficiency of the system operation. Therefore, a web-based system that can be accessed using the Internet environment is required. In this paper, we propose a system showing web-based real-time informations. To do this, we change the function of the communication by each sensor to a facade structure, and design a system for transferring web-based real-time informations. Also we propose data-driven infographics for displaying the real-time big data information at a high speed on the web. Finally, we compare and analyse the proposed system between the existing system and show that our system can effectively display the real-time information on the web.

Study on Component-Based Middleware for IoT Service Scalability (IoT 서비스 확장성을 고려한 컴포넌트 기반의 미들웨어에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.330-337
    • /
    • 2015
  • A service in the environments of internet of things (IoT) exist various types with automation facilities and sensors. There can configure so many communication protocols to networking facilities and sensors. To provide efficient various kind of service, a middleware platform, is based on the internet protocol network, is needed a unified access with devices, controlling and monitoring huge kind of facilities and sensors, to provide a efficient IoT service and application configurations. In this paper, we propose a middleware that an application and service interact with automation facilities and monitor sensors. The proposed middleware is designed with adapter pattern that one of the software engineering design pattern. The adapter pattern is to ensure communication with each sensor and to make sure of service scalability. Finally, the proposed component middleware shows that variety sensors can be easily configure the service in the IoT environment.

A Implementation of GPS applied Time-Synchronizer for PC based DVR (PC based DVR의 시각동기를 위한 GPS 시각동기유지시스템의 구현)

  • Lee, Gyung-Soo;Park, Kwang-Chae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.593-599
    • /
    • 2007
  • PC based DVR replaces existing analog CCTV system therefore expands the field and DVR is used for monitoring and security so it requires exact time(clock). But DVR system can't maintains exact clock causing several reasons. For providing exact time information we should use additional system. For economical and usable environment, using GPS system is most suitable suggested solution than use WAN(Wide Area Network). Therefore in this paper for analysis the result of PC based DVR's system clock using GPS system, 1) clock source receiving module that receives the clock form GPS satellite and 2) GPSW H/W units that provide clock source to PC Based DVR 3)Daemon software named PCSW which adjust PC's clock so system could reduced the clock difference with UTC clock and measured the result.

  • PDF

A Study on the Activation of Dual Use Technology Program (민.군겸용기술사업 활성화 방안 연구)

  • Kim, Chul-Whan;Choi, Eun-Ho;Heo, Whan
    • Journal of the military operations research society of Korea
    • /
    • v.32 no.1
    • /
    • pp.13-35
    • /
    • 2006
  • This study aims to propose alternative suggestions for practical and efficient implementation of Dual Use Technology Programs(CUTP) in Korea which can strengthen both national security and industrial competitiveness. DUTP of Korea has suffered from inefficiency and inactivity. This study analyzes the Inefficiency and negative factors of DUTP of Korea by examining the previous cases of the advanced countries. It also examines individual problems of DUTP carefully and attempts to derive alternative solutions to improve the current situation. First, a global government plan should be made considering Korea's weapon system and Korea's industrial characteristics. Second, DUTP should begin to develop core technology in connection with technology level evaluation and technology exchange project should establish a comprehensive information network system which links any civilian and military technology data. Third, technology transfer project should be promoted by utilizing cyber technology exchange market and military defense venture center. Fourth, standardization project should be expanded by establishing a national standard information system.

Elliptic Curve AMP Protocol (타원곡선을 이용한 AMP 프로토콜)

  • Ahn, Chang-Sup;Heu, Shin
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.11
    • /
    • pp.622-633
    • /
    • 2002
  • Authentication and Key Agreement using password provide convenience and amenity, but what human can remember has extremely low entropy. To overcome its defects, AMP(Authentiration and key agreement via Memorable Password) which performs authentication and key agreement securely via low entropy password are presented. AMP uses Diffie-Hellman problem that depends on discrete logarithm problem. Otherwise, this thesis applies elliptic curve cryptosystem to AMP for further efficiency That is, this thesis presents EC-AMP(Elliptic Curve-AMP) protocol based on elliptic curve discrete logarithm problem instead of discrete logarithm problem, and shows its high performance through the implementation. EC-AMP secures against various attacks in the random oracle model just as AMP Thus, we nay supply EC-AMP to the network environment that requires authentication and key agreement to get both convenience and security from elliptic curve discrete logarithm problem.

Abnormal SIP Packet Detection Mechanism using Co-occurrence Information (공기 정보를 이용한 비정상 SIP 패킷 공격탐지 기법)

  • Kim, Deuk-Young;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.130-140
    • /
    • 2010
  • SIP (Session Initiation Protocol) is a signaling protocol to provide IP-based VoIP (Voice over IP) service. However, many security vulnerabilities exist as the SIP protocol utilizes the existing IP based network. The SIP Malformed message attacks may cause malfunction on VoIP services by changing the transmitted SIP header information. Additionally, there are several threats such that an attacker can extract personal information on SIP client system by inserting malicious code into SIP header. Therefore, the alternative measures should be required. In this study, we analyzed the existing research on the SIP anomaly message detection mechanism against SIP attack. And then, we proposed a Co-occurrence based SIP packet analysis mechanism, which has been used on language processing techniques. We proposed a association rule generation and an attack detection technique by using the actual SIP session state. Experimental results showed that the average detection rate was 87% on SIP attacks in case of using the proposed technique.

An IDE based Hierarchical Node Authentication Protocol for Secure Data Transmission in WSN Environment (WSN 환경에서 안전한 데이터 전달을 위한 IDE 기반의 계층적 노드인증 프로토콜)

  • Cho, Young-Bok;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.149-157
    • /
    • 2012
  • In WSN environment, the sensor nodes collect sensed data, and transmit data to the BS. BS is difficult to trust the data from unauthenticated nodes. Therefore, many papers have been proposed about the node authentication and the safety of data. In the AM-E paper, data is delivered after node authentication. In this time, the sensor nodes are directly communicated to BS the AREQ/AREP message for authentication. Therefore, the sensor nodes consume more energy for authentication. Also, noes communicate directly with the BS for authentication will have problem due to the limited energy of nodes. In this paper, the same security with AM-E is supported, Furthermore, to minimize the energy consumption, IDE based hierarchical node authentication protocol is proposed. Compared with AM-E, the number of alive nodes is increased about 39%. Thus, the entire network life time is extended and energy efficiency is improved.