• Title/Summary/Keyword: protect system

Search Result 2,542, Processing Time 0.029 seconds

GPS based Green Zone Access Monitoring System (GPS 기반 그린존 접근감시 시스템)

  • Jang, Jae-Myung;Lee, Hyoung-Seon;Jeong, Do-Hyeong;Song, Hyun-Ok;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.612-613
    • /
    • 2016
  • Today, a variety of systems have been developed to protect women and children. However, crime rates are still rising in the Green Zone. So we need the system to protect it. In this paper, we propose a system that sends messages in real time to the Green Zone administrator when a registered offender access to the Green Zone area. The existing system is a passive data transmission through monitoring. But the proposed system when access to the Green Zone set, detects a GPS-based. Accordingly, It is expected to be able protection through to monitor in real time and manage for women and children from criminals.

  • PDF

A REID privacy protect scheme based on mobile (모바일 기반의 RFID 프라이버시 보호 기법)

  • Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.89-96
    • /
    • 2007
  • Radio Frequency Identification system based on EPC(Electronic Product Code) Network Environment can read or write information of tagged objects, using Rf signals without direct contact. This advantage which is to provide storage ability and contactless property is better than Bar-code system. Mobile RFID system which integrates Mobile system with RFID system will provide new additional service to users. However, an advantage for obtaining information of objects using RF signal causes personal privacy problem. In this paper, we propose techniques that can protect personal privacy based on mobile. Our scheme provides privacy protection of users and is more efficiently than another application service.

Efficient Proxy Re-encryption Scheme for E-Voting System

  • Li, Wenchao;Xiong, Hu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1847-1870
    • /
    • 2021
  • With the development of information and communication technologies, especially wireless networks and cell phones, the e-voting system becomes popular as its cost-effectiveness, swiftness, scalability, and ecological sustainability. However, the current e-voting schemes are faced with the problem of privacy leakage and further cause worse vote-buying and voter-coercion problems. Moreover, in large-scale voting, some previous e-voting system encryption scheme with pairing operation also brings huge overhead pressure to the voting system. Thus, it is a vital problem to design a protocol that can protect voter privacy and simultaneously has high efficiency to guarantee the effective implementation of e-voting. To address these problems, our paper proposes an efficient unidirectional proxy re-encryption scheme that provides the re-encryption of vote content and the verification of users' identity. This function can be exactly applied in the e-voting system to protect the content of vote and preserve the privacy of the voter. Our proposal is proven to be CCA secure and collusion resistant. The detailed analysis also shows that our scheme achieves higher efficiency in computation cost and ciphertext size than the schemes in related fields.

A semi-active mass damping system for low- and mid-rise buildings

  • Lin, Pei-Yang;Lin, Tzu-Kang;Hwang, Jenn-Shin
    • Earthquakes and Structures
    • /
    • v.4 no.1
    • /
    • pp.63-84
    • /
    • 2013
  • A semi-active mass damping (SMD) system with magnetorheological (MR) dampers focusing on low- and mid-rise buildings is proposed in this paper. The main purpose of this study is to integrate the reliable characteristics of the traditional tuned mass damper (TMD) and the superior performance of the active mass damper (AMD) to the new system. In addition, the commonly seen solution of deploying dense seismic dampers throughout the structure nowadays to protect the main structure is also expected to switch to the developed SMD system on the roof with a similar reduction performance. In order to demonstrate this concept, a full-size three-story steel building representing a typical mid-rise building was used as the benchmark structure to verify its performance in real life. A numerical model with the interpolation technique integrated was first established to accurately predict the behavior of the MR dampers. The success of the method was proven through a performance test of the designated MR damper used in this research. With the support of the MR damper model, a specific control algorithm using a continuous-optimal control concept was then developed to protect the main structure while the response of the semi-active mass damper is discarded. The theoretical analysis and the experimental verification from a shaking table test both demonstrated the superior mitigation ability of the method. The proposed SMD system has been demonstrated to be readily implemented in practice.

A Malicious Process Control System for Protecting Servers from Internet Worm Attacks (인터넷 웜 공격으로부터 서버를 보호하기 위한 악성 프로세스 제어 시스템)

  • Kim, Ik-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.431-439
    • /
    • 2010
  • The security systems using signatures cannot protect servers from new types of Internet worms. To protect servers from Internet worms, this paper proposes a system removing malicious processes and executable files without using signatures. The proposed system consists of control servers which offer the same services as those on protected servers, and agents which are installed on the protected servers. When a control server detects multicasting attacks of Internet worm, it sends information about the attacks to an agent. The agent kills malicious processes and removes executable files with this information. Because the proposed system do not use signatures, it can respond to new types of Internet worms effectively. When the proposed system is integrated with legacy security systems, the security of the protected server will be further enhanced.

Inspection System of Coating Layers by Thermal Behavior Effect (열 거동 영향에 따른 코팅층 검사 시스템)

  • Yun, Sung-Un;Kim, Jae-Yeol;Choi, Seung-Hyun;Kim, Hang-Woo
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.13 no.6
    • /
    • pp.1-7
    • /
    • 2014
  • Gas turbines for generation are operated under high temperatures, high pressures and in corrosive environments for long periods of time. This environment causes serious damage to these parts. Therefore, the material, coating, and cooling technology used with a gas turbine are important factors with regard to turbine blade development. One method that can be used to protect a product from harsh conditions is the coating technology. A turbine blade undergoes very aggressive thermal stress and experiences high-temperature fatigue. In order to reduce the surface temperature of the components and protect the blade from high-temperature flames, a thermal barrier coating (TBC) is applied to its substrate. This study confirms the applicability of an inspection system for the turbine blade coating layer using an artificial heat source.

THE DEVELOPMENT OF WEB SERVER FOR KOREAN ELECTRICAL DISTRIBUTION-SYSTEM PROTECTION (한국전력 송전 계통보호를 위한 웹 서버 개발)

  • Zhang, Li;Choi, M.S.;Lee, S.J.;Min, B.U.;Kim, S.H.;Oh, S.M.
    • Proceedings of the KIEE Conference
    • /
    • 2003.11a
    • /
    • pp.178-180
    • /
    • 2003
  • Since faults often occur on power system, relay protection has become an important part to protect the equipments of power system efficiently and safely. Database can store the data about the relay protection efficiently, and these data must be shown to users through the web. Proset2000(an overall program system to protect power system) can realize this function in some measure, but it needs to be developed. This paper is about the further development of Proset2000. In this paper, web of Proset2000 is made by ASP programming technology, and users can browse and search the useful data through the web. There are some new functions, such as the summary of setting values, the message board and the management of administrator.

  • PDF

Mitigation of Stray Current Interference from DC Electric Railroad(2) DICCP System (직류전기철도의 누설전류 간섭대책(2) 분포외부전원시스템)

  • Ha, Yoon-Cheol;Bae, Jeong-Hyo;Ha, Tae-Hyun;Lee, Hyun-Goo;Kim, Dae-Kyeong
    • Proceedings of the KIEE Conference
    • /
    • 2005.10c
    • /
    • pp.273-275
    • /
    • 2005
  • The national need to establish a new stray current mitigation method to protect the underground metallic infrastructures in congested downtown area forced us to design and develop the distributed impressed current cathodic protection (DICCP) system. The main purpose of this system is to replace the stray current drainage bond methods, which is widely adopted by pipeline owners in Korea. Currently, forced drainage makes up about 85% of total drainage facilities installed in Korea because polarized drainage can neither drain perfectly the stray currents during normal operation of electric vehicle nor drain the reverse current during regenerative braking at all. The forced drainage, however, has been abused as an alternative cathodic protection system, which impresses currents from rails to the pipelines and accordingly uses the rails as anodes. As a result, it is necessary to consider a new method to both cathodically protect the pipelines and effectively drain the stray currents. In this paper, we describe the design parameters and installation schemes of DICCP system that can meet these demands.

  • PDF

On the Capacities of Spectrum-Sharing Systems with Transmit Diversity

  • Asaduzzaman, Asaduzzaman;Kong, Hyung-Yun
    • Journal of electromagnetic engineering and science
    • /
    • v.10 no.3
    • /
    • pp.99-103
    • /
    • 2010
  • Motivated by recent works on spectrum-sharing systems, this paper investigates the effects of transmit diversity on the peak interference power limited cognitive radio(CR) networks. In particular, we derive the ergodic and outage capacities of a spectrum-sharing system with multiple transmit-antennas. To derive the capacities, peak interference power constraint is imposed to protect the primary receiver. In a CR transmitter and receiver pair with multiple antennas at the transmitter side, the allowable transmit power is distributed over the transmit-antennas to achieve transmit diversity at the receiver. We investigate the effect of this power distribution when a peak interference power constraint is imposed to protect the primary receiver. We show that the transmit diversity does not improve the ergodic capacity compared to the single-antenna system. On the other hand, the transmit diversity significantly improves the outage capacity. For example, two transmit-antennas improve the outage capacity 10 times compared to the single-antenna with a 0 dB interference constraint.

Motor Protection and Control with Digital Protective Relays (디지털 보호 계전기를 이용한 모터 보호 및 제어)

  • 이성환;안인석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.178-178
    • /
    • 2000
  • In this paper, intelligent methods using digital protection relay in power management and control system is developed in order to protect power systems by means of timely fault detection during operation and control at starting for induction motor which have various load environments and capacities in power systems. The digital protective relay was designed with DSP CPU(TMS320C31) to Protect and measure more quickly and precisely. The test result on the basis of KEMCl120 and IEC60255, show that the operation time error of the digital motor protection relay is improved within $\pm$5%. Also, we can control motors at starting according to starting types with simple method as programmable sequence editor. So we can improve the demerits of high cost and much manhour for rework.

  • PDF