• 제목/요약/키워드: security characteristic

검색결과 449건 처리시간 0.026초

동작인식 스마트 의류제품의 특징적 유형 분석 (The analysis of the characteristic types of motion recognition smart clothing products)

  • 임효빈;고현진
    • 복식문화연구
    • /
    • 제25권4호
    • /
    • pp.529-542
    • /
    • 2017
  • The purpose of this study is to utilize technology as basic data for smart clothing product research and development. This technology can recognize user's motion according to characteristics types and functions of wearable smart clothing products. In order to analyze the case of motion recognition products, we searched for previous research data and cases referred to as major keywords in leading search engines, Google and Naver. Among the searched cases, information on the characteristics and major functions of the 42 final products selected on the market are examined in detail. Motion recognition for smart clothing products is classified into four body types: head & face, body, arms & hands, and legs & feet. Smart clothing products was developed with various items, such as hats, glasses, bras, shirts, pants, bracelets, rings, socks, shoes, etc., It was divided into four functions health care type for prevention of injuries, health monitor, posture correction, sports type for heartbeat and exercise monitor, exercise coaching, posture correction, convenience for smart controller and security and entertainment type for pleasure. The function of the motion recognition smart clothing product discussed in this study will be a useful reference when designing a motion recognition smart clothing product that is blended with IT technology.

Java Card을 이용한 마일리지 통합 관리 시스템 구현 (Implementation of Loyalty System using Java Card)

  • 백장미;강병모;홍인식
    • 한국멀티미디어학회논문지
    • /
    • 제5권2호
    • /
    • pp.231-238
    • /
    • 2002
  • 인터넷을 통한 전자상거래가 활성화됨에 따라, 사용자에게 편리성을 제공하기 위한 기술이 등장하고 있으며, 보다 편리한 거래를 위하여, 스마트 카드의 활용이 높아지고 있다. 스마트 카드의 차세대 COS로 Java Card가 등장함으로써, 자바 언어를 이용한 다양한 어플리케이션의 개발이 가능해졌다. 본 논문은 차세대 COS로 주목받고 있는 Java Card를 이용하여 인터넷 상에서의 효율성 있는 마일리지 관리 시스템을 제안하였다. 본 시스템은 Java Card상에 저장되는 개인의 독립적인 프로그램으로 Java Card의 연산기능을 이용하여 서로 다른 마일리지 체계를 가지는 쇼핑몰의 마일리지를 직접 계산하고 적립할 수 있다. 기존의 제공되고 있는 마일리지 시스템과의 비교 분석과 구현된 프로그램의 시뮬레이션을 통하여 제안한 시스템의 실효성을 높이고자 한다.

  • PDF

A Shared Channel Design for the Power and Signal Transfers of Electric-field Coupled Power Transfer Systems

  • Su, Yu-Gang;Zhou, Wei;Hu, Aiguo Patrick;Tang, Chun-Sen;Hua, Rong
    • Journal of Power Electronics
    • /
    • 제16권2호
    • /
    • pp.805-814
    • /
    • 2016
  • Electric-field coupled power transfer (ECPT) systems have been proposed as an alternative wireless power transfer (WPT) technology in recent years. With the use of capacitive plates as a coupling structure, ECPT systems have many advantages such as design flexibility, reduced volume of the coupling structure and metal penetration ability. In addition, wireless communications are effective solutions to improve the safety and controllability of ECPT systems. This paper proposes a power and signal shared channel for electric-field coupled power transfer systems. The shared channel includes two similar electrical circuits with a band pass filter and a signal detection resistor in each. This is designed based on the traditional current-fed push-pull topology. An analysis of the mutual interference between the power and signal transmission, the channel power and signal attenuations, and the dynamic characteristic of the signal channel are conducted to determine the values for the electrical components of the proposed shared channel. Experimental results show that the designed channel can transfer over 100W of output power and data with a data rate from 300bps to 120 kbps.

Analysis Research on Preparation of 4th Wave (AI) of the Visegrad Group

  • Kim, Dong Hwa;Seo, Dae-Sung
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제5권4호
    • /
    • pp.201-211
    • /
    • 2018
  • The paper suggests making a policy and strategies for a way of exporting Korean ICT product effectively in the EU and Eastern area, and an effective preparation of 4th industrial revolution through analysis of preparation status of 4th industrial revolution of the Visegrad group. Analyze policy, status, what they want for 4th preparation in the Visegrad group from comparing characteristics analysis of each country's official data, publication data, portal, paper, and etc. They have been preparing for 4th industrial revolution long time ago as basic research and business before 4th wave word. With these basic results, they are trying to apply such as, AI, S/W, security, ICT, etc. of 4th wave core technology. For the development of new export market in EU, the Korean team should research with university and research center or venture company. Through these cooperation, they should understand their personal characteristic, lifestyle, and what consumers want to purchase in EU. And this results can be used in South Asia and India that give a big effect to all over the world ICT market. The external impact of the 4th wave must have a long-term shift in manpower, and production policy is related to the EU's strategic role, or the preparation of the 4th wave to the V4 country in the short term.

해쉬 함수의 근사적 모델과 연쇄패턴 (Approximated Model and Chaining Pattern of Hash Functions)

  • 이선영
    • 인터넷정보학회논문지
    • /
    • 제7권1호
    • /
    • pp.39-47
    • /
    • 2006
  • MD4를 기반으로 하는 MDx계열 해쉬 함수는 입력 워드의 치환, 순환 시프트 변수의 연쇄, 비선형 함수 등을 이용하여 구성된다. 그러나, 그 구성 방법에 대한 이론적, 실험적 배경은 알려져 있지 않고, 평가를 위한 일반적인 모델도 알려져 있지 않다. 본 논문에서는 해쉬 함수의 설계와 평가를 위하여 해쉬 함수를 일반화하기 위한 근사 모델을 제안하고, MD5에 근사모델을 적용하여 입력 차분의 확산을 고찰하였다. 그 결과, MD5의 약점이 완전 확산을 제공하지 않는데 있다는 것을 확인하였다. 제안된 근사 모델에서 완전 확산을 제공하기 위하여 해쉬 함수 내에 여러 가지 연쇄 패턴을 이용하는 다중 연쇄 패턴을 제안하고, 여분의 계산과 메모리 없이 완전 확산을 제공함을 MD5를 이용한 실험을 통하여 보이고, 그 차분 특성이 갖는 확률이 MD5보다 작음을 증명하였다.

  • PDF

CPN을 이용한 Honeypot 모델 설계 (Honeypot Model Analysis using CPN)

  • 현병기;구경옥;조도은;조용환
    • 한국통신학회논문지
    • /
    • 제28권5B호
    • /
    • pp.489-499
    • /
    • 2003
  • 본 논문은 CPN(Colored Petri Nets)을 이용한 Honypot 모델의 설계 및 구현에 관한 것이다. 제안된 Honeypot 모델은 해커의 침입을 능동적으로 유도하고 침입을 탐지 및 행동패턴의 파악을 위해 보안커널 모듈과 유도된 해커의 활동을 위한 가상 모듈로 구성되어 있으며, CPN을 이용한 모델과 기존의 Denning 모델 및 Shieh 모델과 비교 분석하였다. 본 논문에서 제안된 CPN을 이용한 Honeypot 모델은 침입패턴의 특성에 대한 분류가 가능하고, 침입패턴의 모델링과 패턴매칭 과정의 모델링이 가능하며. 다중 호스트를 통한 DDoS 공격의 탐지가 가능하고, 마지막으로 침입패턴의 분석을 위한 학습모델의 기반 제공이 가능하다.

선박수출거래에서 환급보증(Refund Guarantee) 주요 조항의 법적·실무적 고찰 (A Legal and Practical Study on the Main Clauses of a Refund Guarantee in a Shipbuilding Contract)

  • 김상만
    • 무역상무연구
    • /
    • 제72권
    • /
    • pp.25-55
    • /
    • 2016
  • The Buyer shall demand to the Builder the repayment of the pre-delivery instalments paid in case of the Builder's default under a ship-building contract. The Buyer require a refund guarantee issued by a financial institution for a security for the repayment of the pre-delivery instalments paid. As the title of a refund guarantee, in practice, is various, we should look into the contents or the expressions in a guarantee to decide whether a guarantee is a refund guarantee. A refund guarantee, a sort of independent bank guarantee, has characteristic of abstractness, and is independent from the ship-building contract. A refund guarantee is available against the beneficiary's first written demand and signed statement certifying that the Builder failed to make the refund in accordance with the ship-building contract. The guaranteed amount of a refund guarantee will be automatically increased in accordance with the Builder's receipt of the respective instalment, which is not in the other advance payment guarantee. These characteristics of a refund guarantee are derived from the expressions in a refund guarantee rather than inherent therein. This illustrates that careful attention is required to the contents and expressions of the main clauses in a refund guarantee.

  • PDF

목조 문화재 건축물의 화재 방재를 위한 조사 연구 (A Study on the Methods of Fire-Safety in Cultural Property Wooden Buildings)

  • 장형순;조원석;김흥기
    • 한국농촌건축학회논문집
    • /
    • 제10권4호
    • /
    • pp.25-32
    • /
    • 2008
  • The prevention of disasters in cultural property is very important management and historical duties. The reason can't be measured values with monetary scale of our contemporary. Therefore, this paper was considered fire-safety as one of terrible threat-disasters about the wooden buildings. This research deal with 47 cases cultural property wooden building by whole investigation(field survey and interview) in Gangnung province. The most buildings have basic fire extinguisher; ABC powder. A few buildings are rarely installed fire extinguishing equipments; outdoor fire hydrant, heat sensor, ground sprinkler, CO2-hose-reel. But these state is very insufficient for the fire-safety in cultural property wooden buildings. Specially as particular attention in province, forest fire of regional characteristic have close relation with cultural property fire. The majority of factor against forest and building fire is to provide monitoring and security system; CCTV, Fence, Sensor, Alarm and paid guard man against incendiary. Ultimately it is necessary to construct comprehensive disaster prevention system with the organic cooperation such as National Emergency Management Agency, Cultural Heritage Administration, Forest Service, local government officials and regional citizen.

  • PDF

디지털 상품 거래를 위한 네트워크형 전자결재 시스템 설계 및 구현 (A Design and Implementation of a Network-type Electronic Payment System Optimized for Digital Goods)

  • 한재균;한승조
    • 한국정보통신학회논문지
    • /
    • 제8권7호
    • /
    • pp.1537-1545
    • /
    • 2004
  • 인터넷이 상거래를 변환시키면서, 지불 방법이 인터넷을 통한 상거래를 성공적으로 이끄는 데에 중요한 요소가 되고 있다. 전자 화폐는 기존 실물 화폐가 가지는 모든 특성들을 가지면서 모든 거래에 대해 보안성을 보장해 준다. 따라서 전자 화폐를 기반으로 하는 인터넷 지불 시스템이 향후 전자 상거래에 있어서 안전하고 효율적인 지불 방법으로 기대된다. 디지털 상품과 같은 컨텐츠 상품은 상품의 전달과 대금 지불이 동일 네트워크에서 이루어질 수 있다는 특성을 가진다. 이것은 전자 상거래 시스템의 설계를 최적화하는데 도움이 된다. 본 논문에서는 인터넷을 통한 디지털 상품을 거래하기 위해 특별히 설계된 전자 지불 프로토콜을 제안한다. 제안된 프로토콜은 가상 ID를 사용하여 익명성을 보장하고 지불 단계를 최소화시켰다.

Two Factor Authentication for Cloud Computing

  • Lee, Shirly;Ong, Ivy;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • 제8권4호
    • /
    • pp.427-432
    • /
    • 2010
  • The fast-emerging of cloud computing technology today has sufficiently benefited its wide range of users from individuals to large organizations. It carries an attractive characteristic by renting myriad virtual storages, computing resources and platform for users to manipulate their data or utilize the processing resources conveniently over Internet without the need to know the exact underlying infrastructure which is resided remotely at cloud servers. However due to the loss of direct control over the systems/applications, users are concerned about the risks of cloud services if it is truly secured. In the literature, there are cases where attackers masquerade as cloud users, illegally access to their accounts, by stealing the static login password or breaking the poor authentication gate. In this paper, we propose a two-factor authentication framework to enforce cloud services' authentication process, which are Public Key Infrastructure (PKI) authentication and mobile out-of-band (OOB) authentication. We discuss the framework's security analysis in later session and conclude that it is robust to phishing and replay attacks, prohibiting fraud users from accessing to the cloud services.