• Title/Summary/Keyword: security component

Search Result 407, Processing Time 0.025 seconds

Visible Light Communication Method for Personalized and Localized Building Energy Management

  • Jeong, Jin-Doo;Lim, Sang-Kyu;Han, Jinsoo;Park, Wan-Ki;Lee, Il-Woo;Chong, Jong-Wha
    • ETRI Journal
    • /
    • v.38 no.4
    • /
    • pp.735-745
    • /
    • 2016
  • The Paris agreement at the 21st Conference of the Parties (COP21) emphasizes the reduction of greenhouse gas emissions and increase in energy consumption in all areas. Thus, an important aspect is energy saving in buildings where the lighting is a major component of the electrical energy consumption. This paper proposes a building energy management system employing visible light communication (VLC) based on LED lighting. The proposed management system has key characteristics including personalization and localization by utilizing such VLC advantages as secure communication through light and location-information transmission. Considering the efficient implementation of an energy-consumption adjustment using LED luminaires, this paper adopts variable pulse position modulation (VPPM) as a VLC modulation scheme with simple controllability of the dimming level that is capable of providing a full dimming range. This paper analyzes the VPPM performances according to variable dimming for several schemes, and proposes a VPPM demodulation architecture based on dimming-factor acquisition, which can obtain an improved performance compared to a 2PPM-based scheme. In addition, the effect of a dimming-factor acquisition error is analyzed, and a frame format for minimizing this error effect is proposed.

Highly dispersive substitution box (S-box) design using chaos

  • Faheem, Zaid Bin;Ali, Asim;Khan, Muhamad Asif;Ul-Haq, Muhammad Ehatisham;Ahmad, Waqar
    • ETRI Journal
    • /
    • v.42 no.4
    • /
    • pp.619-632
    • /
    • 2020
  • Highly dispersive S-boxes are desirable in cryptosystems as nonlinear confusion sublayers for resisting modern attacks. For a near optimal cryptosystem resistant to modern cryptanalysis, a highly nonlinear and low differential probability (DP) value is required. We propose a method based on a piecewise linear chaotic map (PWLCM) with optimization conditions. Thus, the linear propagation of information in a cryptosystem appearing as a high DP during differential cryptanalysis of an S-box is minimized. While mapping from the chaotic trajectory to integer domain, a randomness test is performed that justifies the nonlinear behavior of the highly dispersive and nonlinear chaotic S-box. The proposed scheme is vetted using well-established cryptographic performance criteria. The proposed S-box meets the cryptographic performance criteria and further minimizes the differential propagation justified by the low DP value. The suitability of the proposed S-box is also tested using an image encryption algorithm. Results show that the proposed S-box as a confusion component entails a high level of security and improves resistance against all known attacks.

Skin Pigment Recognition using Projective Hemoglobin- Melanin Coordinate Measurements

  • Yang, Liu;Lee, Suk-Hwan;Kwon, Seong-Geun;Song, Ha-Joo;Kwon, Ki-Ryong
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.6
    • /
    • pp.1825-1838
    • /
    • 2016
  • The detection of skin pigment is crucial in the diagnosis of skin diseases and in the evaluation of medical cosmetics and hairdressing. Accuracy in the detection is a basis for the prompt cure of skin diseases. This study presents a method to recognize and measure human skin pigment using Hemoglobin-Melanin (HM) coordinate. The proposed method extracts the skin area through a Gaussian skin-color model estimated from statistical analysis and decomposes the skin area into two pigments of hemoglobin and melanin using an Independent Component Analysis (ICA) algorithm. Then, we divide the two-dimensional (2D) HM coordinate into rectangular bins and compute the location histograms of hemoglobin and melanin for all the bins. We label the skin pigment of hemoglobin, melanin, and normal skin on all bins according to the Bayesian classifier. These bin-based HM projective histograms can quantify the skin pigment and compute the standard deviation on the total quantification of skin pigments surrounding normal skin. We tested our scheme using images taken under different illumination conditions. Several cosmetic coverings were used to test the performance of the proposed method. The experimental results show that the proposed method can detect skin pigments with more accuracy and evaluate cosmetic covering effects more effectively than conventional methods.

AMBIDEBTER Nuclear Complex - A Credible Option for Future Nuclear Energy Applications (AMBIDEXTER 원자력 복합체 - 신뢰성 있는 미래 원자력에너지 이용 방안)

  • 오세기;정근모
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 1998.05a
    • /
    • pp.235-242
    • /
    • 1998
  • Aiming at one of decisive alternatives for long term aspect of nuclear power concerns, an integral and closed nuclear system, AMBIDEXTER (Advanced Molten-salt Break-even Inherently-safe Dual-mission Experimental and TEst Reactor) concept is under development. The AMBIDEXTER complex essentially comprises two mutually independent loops of the radiation/material transport and the heat/energy conversion, centered at the integrated reactor assembly, which enables one to utilize maximum benefits of nuclear energy under minimum risks of nuclear radiation. And it provides precious radioisotopes and radiation sources from its waste stream. Also the reactor operates at very low level of fission products inventory throughout its lifetime. The nuclear and thermalhydraulic characteristics of the molten TH/$^{233}$ U fuel salt extend the capability of the self-sustaining AMBIDEXTER fuel cycle to enhance resource security and safeguard transparency. The reactor system is consisted of a single component module of the core, heat exchangers and recirculation pumps with neither pipe connections nor active valves in between, which will significantly improve inherent features of nuclear safety. States of the core technologies associated with designing and developing the AMBIDEXTER concept are mostly available in commercialized form and thus demonstration of integral aspects of the concept should be the prime area in future R&D programs.

  • PDF

Reliability Assessment Criteria of Module for the LED traffic signal (LED 교통신호등용 모듈의 신뢰성평가기준)

  • Kim, Jin-Sheon;Park, Chang-Kyu;Kim, Dae-Kyung;Jeong, Hai-Sung
    • Journal of Applied Reliability
    • /
    • v.10 no.4
    • /
    • pp.265-278
    • /
    • 2010
  • Module of the LED traffic signal is the core component for the care of driver and walker. Also it is important one to control the traffic. If it is against the criteria of brightness, it is the source of the people's death and traffic congestion. Therefore, it is a list of articles desired the security of stability. However, there is not the analysis of failure and not preserve the uniformity of quality. Therefore, it is necessary to establish the criteria of appreciation for the module of the LED traffic signal to analysis the data of failure. In this paper, we investigate the performance test, environment field test and test of reliability appreciation to improve the reliability. We also set up the criteria of success decision using the real measurement data.

An IDS in MANET with Cross Layer Concept (크로스 층에서의 MANET을 이용한 IDS)

  • Kim, Sang-Eun;Han, Seung-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.1
    • /
    • pp.41-48
    • /
    • 2010
  • Intrusion detection forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection technology with multi layer detection. Different types of Denial of Service (DoS) attacks thwart authorized users from gaining access to the networks and we tried to detect as well as alleviate some of those attacks. We have proposed a novel cross layer intrusion detection architecture to discover the malicious nodes. The information available across different layers of protocol stack are exploited in order to improve the accuracy of detection. We have used cooperative and distributive anomaly intrusion detection with data mining technique to enhance the proposed architecture. The simulation of the proposed architecture is done in OPNET simulator and the results are analyzed.

A Secure Face Cryptogr aphy for Identity Document Based on Distance Measures

  • Arshad, Nasim;Moon, Kwang-Seok;Kim, Jong-Nam
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.10
    • /
    • pp.1156-1162
    • /
    • 2013
  • Face verification has been widely studied during the past two decades. One of the challenges is the rising concern about the security and privacy of the template database. In this paper, we propose a secure face verification system which generates a unique secure cryptographic key from a face template. The face images are processed to produce face templates or codes to be utilized for the encryption and decryption tasks. The result identity data is encrypted using Advanced Encryption Standard (AES). Distance metric naming hamming distance and Euclidean distance are used for template matching identification process, where template matching is a process used in pattern recognition. The proposed system is tested on the ORL, YALEs, and PKNU face databases, which contain 360, 135, and 54 training images respectively. We employ Principle Component Analysis (PCA) to determine the most discriminating features among face images. The experimental results showed that the proposed distance measure was one the promising best measures with respect to different characteristics of the biometric systems. Using the proposed method we needed to extract fewer images in order to achieve 100% cumulative recognition than using any other tested distance measure.

A Study on SCM Improvement Plan using the Internet of Things (사물인터넷을 활용한 SCM 고도화 방안에 대한 연구)

  • Kim, MinJune;KIM, YoungKil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.553-554
    • /
    • 2018
  • Supply Chain Management (SCM) is the overall process (component procurement, production planning, delivery, inventory control, etc.). It is the process from the supplier to the consumer until the raw material becomes the finished product. Basically, traditional supply chain management is primarily aimed at cost reduction and efficiency. However, considering only cost reduction and efficiency, it is not easy apply the center of 4th industry to Smart Factory. In this study, I propose a form of supply chain management network. It can be satisfy the security by using block chain and automatic control of each element by adding the internet of things.

  • PDF

Robust Digital Watermarking for High-definition Video using Steerable Pyramid Transform, Two Dimensional Fast Fourier Transform and Ensemble Position-based Error Correcting

  • Jin, Xun;Kim, JongWeon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3438-3454
    • /
    • 2018
  • In this paper, we propose a robust blind watermarking scheme for high-definition video. In the embedding process, luminance component of each frame is transformed by 2-dimensional fast Fourier transform (2D FFT). A secret key is used to generate a matrix of random numbers for the security of watermark information. The matrix is transformed by inverse steerable pyramid transform (SPT). We embed the watermark into the low and mid-frequency of 2D FFT coefficients with the transformed matrix. In the extraction process, the 2D FFT coefficients of each frame and the transformed matrix are transformed by SPT respectively, to produce two oriented sub-bands. We extract the watermark from each frame by cross-correlating two oriented sub-bands. If a video is degraded by some attacks, the watermarks of frames contain some errors. Thus, we use an ensemble position-based error correcting algorithm to estimate the errors and correct them. The experimental results show that the proposed watermarking algorithm is imperceptible and moreover is robust against various attacks. After embedding 64 bits of watermark into each frame, the average peak signal-to-noise ratio between original frames and embedded frames is 45.7 dB.

A Study on the Temperature Characteristics of High Voltage Power Cable for Hybrid Electric Vehicle (하이브리드 자동차용 고압 케이블의 온도 특성에 관한 연구)

  • Lee, Ki-Yeon;Kim, Dong-Woo;Kim, Dong-Ook;Gil, Hyoung-Jun;Kim, Hyang-Kon;Choi, Chung-Seog
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.57 no.3
    • /
    • pp.338-342
    • /
    • 2008
  • Hybrid Electric Vehicle(HEV) is driven by an internal-combustion engine and an electric motor. It is a combination of an internal-combustion engine and several electrical equipments which use a high voltage battery, an electric motors, an inverter and others. But there is not any separate detailed enforcement regulations for high voltage electric appliances in the existing vehicle-related safety standards. So, test standards suggestion as well as test technique development need to be done for ensuring electrical safety, for an electric motor, a high voltage battery, a(n) inverter/converter and an electric power transmission units and other equipments to ensure the safety of high voltage electric appliances which is the HEV key electrical component. In this paper, We are to provide helpful data to support test technique development and test standard establishment for HEV design and electrical safety security by the following methods; by measuring the voltage, the electric current, and the frequency of HEV, by analyzing electrical characteristics of high voltage electric appliances, and by analyzing temperature characteristics of the electrical current among the analyzed electrical characteristics by thermal imagining cameras.