Chungbuk National University

Displaying 1-5 of 5 results

  • White Papers // May 2013

    Enhanced Security Communication System Using Digital Retrodirective Array Antenna

    Fast beam tracking and beam-forming technology are essential for the communication signal quality of high-capacity and high-quality. In this paper, the authors design a digital Retro Directive array Antenna (RDA) system possible for beam-forming technology without any prior location information for signal quality improvement and security improvement. Simulation results show...

    Provided By Chungbuk National University

  • White Papers // Jan 2013

    An Embedding Method for Real Characters into the 3D Virtual Space

    In this paper, the authors propose a method for embedding real characters in the 3D virtual space. Most systems have adopted virtual characters into the 3D virtual space to give more realistic situation, where the virtual characters have been controlled by user-steered interfaces. In order to take user immersion, they...

    Provided By Chungbuk National University

  • White Papers // Jun 2011

    Design of Guaranteeing System of Service Quality Through the Verifying Users of Hash Chain

    Cloud Computing Technique can use effective service whenever/wherever and get rid of the division of each source is soaring. However, in the Cloud Computing environment which all information are centered, there is no sufficient method for users to access data safely when accesses. In this paper, guaranteeing technique of service...

    Provided By Chungbuk National University

  • White Papers // Jun 2009

    Security Engine Management of Router Based on Security Policy

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router...

    Provided By Chungbuk National University

  • White Papers // Feb 2009

    Efficient Key Distribution Scheme for Secure Routing in Wireless Mesh Network Environment

    Wireless Mesh Network is gaining more respect as an efficient technique, either to construct an independent network using a wireless channel, or to build a transit network. Still, research on the security technique of Wireless Mesh Network is not given plenty of attention. Of course, those suggested in the existing...

    Provided By Chungbuk National University

  • White Papers // Jan 2013

    An Embedding Method for Real Characters into the 3D Virtual Space

    In this paper, the authors propose a method for embedding real characters in the 3D virtual space. Most systems have adopted virtual characters into the 3D virtual space to give more realistic situation, where the virtual characters have been controlled by user-steered interfaces. In order to take user immersion, they...

    Provided By Chungbuk National University

  • White Papers // Jun 2009

    Security Engine Management of Router Based on Security Policy

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router...

    Provided By Chungbuk National University

  • White Papers // Jun 2011

    Design of Guaranteeing System of Service Quality Through the Verifying Users of Hash Chain

    Cloud Computing Technique can use effective service whenever/wherever and get rid of the division of each source is soaring. However, in the Cloud Computing environment which all information are centered, there is no sufficient method for users to access data safely when accesses. In this paper, guaranteeing technique of service...

    Provided By Chungbuk National University

  • White Papers // Feb 2009

    Efficient Key Distribution Scheme for Secure Routing in Wireless Mesh Network Environment

    Wireless Mesh Network is gaining more respect as an efficient technique, either to construct an independent network using a wireless channel, or to build a transit network. Still, research on the security technique of Wireless Mesh Network is not given plenty of attention. Of course, those suggested in the existing...

    Provided By Chungbuk National University

  • White Papers // May 2013

    Enhanced Security Communication System Using Digital Retrodirective Array Antenna

    Fast beam tracking and beam-forming technology are essential for the communication signal quality of high-capacity and high-quality. In this paper, the authors design a digital Retro Directive array Antenna (RDA) system possible for beam-forming technology without any prior location information for signal quality improvement and security improvement. Simulation results show...

    Provided By Chungbuk National University