• Title/Summary/Keyword: security characteristic

Search Result 449, Processing Time 0.027 seconds

(Design of Group Key Management Protocol for Information Security in Multicast) (멀티캐스트 정보 보호를 위한 그룰 키 관리 프로토콜의 설계)

  • 홍종준
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.9
    • /
    • pp.1235-1244
    • /
    • 2002
  • This paper proposes a group key management protocol for a secure of all the multicast user in PIM-SM multicast group communication. With prosed architect, subgroups for multicast secure group management will be divided by RP (Rendezvous-Point) unit and each RP has a subgroup manager. Each subgroup manager gives a secure key to it's own transmitter md the transmitter compress the data with it's own secure key from the subgroup manager. Before the transmitter send the data to receiver, the transmitter prepare to encrypt a user's service by sending a encryption key to the receiver though the secure channel, after choking the user's validity through the secure channel. As the transmitter sending a data after then, the architecture is designed that the receiver will decode the received data with the transmitter's group key. As a result, the transmitting time is shortened because there is no need to data translation by group key on data sending and the data transmition is possible without new key distribution at path change to SPT (Shortest Path Tree) of the router characteristic. Additionally, the whole architecture size is samller than the other multicast secure architecture by using the conventional PIM-SIM routing structure without any additional equipment.

  • PDF

A Study on the Characteristics of Repeat Foreign Tourists to Korea (한국을 재방문하는 외래 관광객의 특성에 관한 연구)

  • Kim, Su-Jeong
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.10
    • /
    • pp.507-517
    • /
    • 2018
  • This study is focused on analyzing the characteristics of repeat foreign tourists to Korea and suggest how to increase the repeat ratio. As the result of analysis, there were significant differences in the variables of sex, age, country in the case of demographic characteristics and in the variables of travel types, the number of company, the purpose of visit, accommodations, major visiting places and visiting areas in the case of travel characteristic. And also there were significant differences in the variables of accommodation fees per person and expenses per person in their own country in the case of travel expenses and in the variables of immigration formalities, public transportations, accommodations, foods, shopping, tourist attractions and security in the case of satisfaction. Lastly there were significant differences in the variables of revisit intention within 3 years, recommendation intention, the image of Korea(before trip) and the image of Korea(after trip) in the case of behavior intention after trip and image evaluation. Therefore it should be considered the characteristics of repeat foreign tourists when we make the tourism products to increase the repeat ratio.

An analysis on performance of visiting health care services by general characteristics of visiting nurse in public health center (보건소 방문간호사의 일반적인 특성에 따른 방문건강관리 서비스 수행도 분석)

  • Park, Jeong Sook;Oh, Yun Jung
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.381-393
    • /
    • 2014
  • The purpose of this research was to analyze the work performance and the general characteristics influencing work performance of customized home health care nurse. Research participants were 204 nurses who worked in the customized home health care of 33 public health centers in Daegu city and Gyeong-Buk Province. The data were collected by self report questionnaires from July, 1 to August, 30, 2011. The highest degree of work performance was the diabetes mellitus service, while the lowest degree was pregnant women services. Age, marital status, education level, religion, career at public health center, visiting nurses career and work area were the significant factors related to work performance in these subjects. Customized home health care nurses management policy which includes assignment tasks and employment security considering general characteristics of visiting nurses should be established to enhance of activation and stable settlement of customized home health care service.

A New Moving Mobile Base Station (MMBS) Scheme for Low Power RMIMS Wireless System (PARTI: MMBS general issues, clystering and signalling Procedures) (저전력 RMIMS 무선 터미널을 위한 새로운 움직이는 이동 기지국 시스템 구조 (1부 : MMBS 일반사항, 클러스터링 및 신호절차))

  • 박수열;고윤호;유상조;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2298-2319
    • /
    • 1999
  • In this paper, we propose a new moving mobile base station (MMBS) scheme for very low power and micro-size RMIMS (radio-interfaced micro information monitoring system) terminals. RMIMS terminals can be used in various application service areas such as pollution monitoring, environment surveillance, traffic monitoring, emergency monitoring (e.g., building, bridge, railroad breakdown), security monitoring (e.g., theft, alarm) and military application. For these applications based on wireless transmission technologies, sensor type RMIMS terminals must satisfy low cost and low power design (e.g., solar power, life limited battery) requirement. In RMIMS terminal design, this low power requirement limits transmission range of uplink or reverse link and means small cell size. Also these applications using RMIMS terminals may have a little bit non real-time traffic characteristic and low scattering density in service area.

  • PDF

Risk Assessment with the Development of CAES (Compressed Air Energy Storage) Underground Storage Cavern (CAES(Compresses Air Energy Storage) 지하 저장 공동 개발에 따른 리스크 사정)

  • Yoon, Yong-Kyun;Seo, Saem-Mul;Choi, Byung-Hee
    • Tunnel and Underground Space
    • /
    • v.23 no.4
    • /
    • pp.319-325
    • /
    • 2013
  • The objective of this study is to assess risks which might occur in connection with the storage of the highly compressed air in underground opening. Risk factors were selected throughout literature survey and analysis for the characteristic of CAES. Large risk factors were categorized in three components; planning and design phase, construction phase, and operation & maintenance phases. Large category was composed of 8 medium risk groups and 24 sub-risks. AHP technique was applied in order to analyze the questionnaires answered by experts and high-risk factors were selected by evaluating the relative importance of risks. AHP analysis showed that the operation & maintenance phases are the highest risk group among three components of large category and the highest risk group of eight medium risk groups is risk associated with the quality and safety. Risk having the highest risk level in 24 sub-risks is evaluated to be a failure of tightness security of inner containment storing compressed air.

The Efficient Signal Estimation Method for Monitor Electromagnetic Signal (모니터 전자파 신호를 위한 효과적인 신호 추정 기법)

  • Lee, Hyun-So;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2008
  • Recently according to the development of an information society the information technology equipments which a clock frequency has the facility over a number giga hertz have been developed much. And we have research which leakage electromagnetic signals can use at the communication security and tapping. In this paper, we restored leakage electromagnetic signals of the monitors. And we proposed efficient recovery technique to restore the screen of the monitor. First of all, we understand a screen characteristic of the monitor. And then we restored a monitor screen from leakage electromagnetic signals from the monitor. For also we tried to use a Wavelet transform and filters to remove the noise for better performance. In the result of the experiment, we used leakage electromagnetic signals and confirmed the possibility of a monitor screen of the recovery. And we improve the performance with Wavelet transform and filters.

  • PDF

Optical Security System Based on the Phase Characteristic of Joint Transform Correlator (결합변환 상관기의 위상특성을 이용한 광 암호화 시스템)

  • 박세준;서동환;김수종
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.6
    • /
    • pp.400-407
    • /
    • 2003
  • In this paper an optical encryption system, which can decrypt the original image by using the autocorrelation terms of a JTC, is proposed. Unlike the classical JTC, the joint input plane of the proposed system is composed in a frequency domain not a spatial domain, thus it needs only one Fourier transformation. To use like this, the phase component appeared in the output plane of JTC should be considered. We presents the effect of phase and provides the solution. An original image is encrypted to a complex-valued random image. The original image is reconstructed using the autocorrelation terms which is the main drawback of JTC, therefore the proposed system is more suitable for JTC and real time processing. By computer simulation and optical experiment, the analysis for the phase effect and the performance of the proposed system are confirmed.

Electro-fatigue Characteristic of Shape Memory Alloy Applied to the Electrosurgical Knee Wand of Variation of Wand Head Angle in Electrosurgical Knee Surgeries (헤드각이 변화하는 Electrosurgical Knee Wand에 적용된 형상기억합금 스프링의 전기적 피로특성)

  • An, Jae-Uk;Kim, Cheol-Woong;Lee, Ho-Sang;Wang, Joon-Ho;Oh, Dong-Joon
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.1547-1552
    • /
    • 2008
  • The tip of these catheter with straight needles is not able to reach in the vicinity of the disc bulging, which are the cause of the low back pain and because the far indirect radio-frequency treatment results in the decompression, the nucleoplasty has the limit. Many incurable diseases has not been solved due to the unexistence of the advanced technique for the MIS human body catheter device. To increase the possibility of nucleoplasty, the needle tip should be located at the closest area of the lesion. For this reason, the best way to increase the success rate of the operation is that the needle tip should access 3-dimensionally to the operating field as soon as possible. To achieve this aim, our studies are restricted as follows: 1) the SMA catheter design to control the 3-dimensional direction, 2) the security of the immediate response by the positive control of the SMA element thermal distribution using Peltier thermoelectric elements, 3) the aquisition of the control data by monitoring the relationship between the temperature of SMA element and the displacement, and 4) the design of the controller to guarantee the accurate location.

  • PDF

A Novel Design of CDSK Receiver for Improving the BER Performance (BER 성능 향상을 위해 제안하는 새로운 CDSK 수신기)

  • Lee, Jun-Hyun;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.8
    • /
    • pp.638-643
    • /
    • 2013
  • Chaos communication system has a sensitive characteristic to initial conditions, because completely another signal is generated when initial condition of chaos equation is changed subtly. Also, chaos communication systems have the characteristics of non-periodic, non-predictability, the broadband signal, such as ease of implementation. Due to these characteristics, security of chaos communication system generally is evaluated better than other systems. However, BER(Bit Error Rate) performance is evaluated worse than other digital system, because existing chaos communication system's transmitter and receiver are strong influence by interference signal and noise. So, research to improve the BER performance of the chaotic communication system is performed continuously. In this paper, We will propose a new CDSK(Correlation Delay Shift Keying) receiver for BER performance improvement. After we compare to the performance of existing CDSK receiver and proposed CDSK receiver, BER performance of proposed CDSK receiver evaluate. Also, when using the new CDSK receiver, we evaluate the BER performance according to the spreading factors and find an optimum spreading factor. If chaos communication system use a new CDSK receiver, BER performance is improved than existing CDSK receiver. Also, if spreading factor's value is increased, BER performance is improved, because it is not nearly affected by interference signal and noise.

Medical Image Watermarking Using Mallat Wavelet Transform (Mallat 웨이브릿 변환을 이용한 의료 영상 워터마킹)

  • 고창림;조진호
    • Journal of Biomedical Engineering Research
    • /
    • v.23 no.2
    • /
    • pp.81-85
    • /
    • 2002
  • In this paper, a new fragi1e watermarking algorithm for medical images is proposed. It makes possible to resolve the security and forgery problem of the medical images. In the proposed algorithm. the singularity which represents the inherent characteristic of the medical image is extracted and used as watermark. To extract the singularity point. we adopted Mallat wavelet transform because it can describe the edge of image exactly. Mallat wavelet transform produces horizontal and vertical subbands of the same resolution with the original image. The magnitude and phase components of the edge are obtained using these subbands. Based on the magnitude and phase components. LMM which will be used as watermark is determined. As LMM is the inherent singularity of image, if any forgery is applied to medical image, LMM of original and forged image are different each other Detecting the changes of LMM for the two images makes it possible whether any image is undergone forgery or not From the experimental results, we conformed that the proposed algorithm detects the forged area of the image very well.