Chungbuk National University

Displaying 1-7 of 7 results

  • White Papers // May 2013

    Enhanced Security Communication System Using Digital Retrodirective Array Antenna

    Fast beam tracking and beam-forming technology are essential for the communication signal quality of high-capacity and high-quality. In this paper, the authors design a digital Retro Directive array Antenna (RDA) system possible for beam-forming technology without any prior location information for signal quality improvement and security improvement. Simulation results show...

    Provided By Chungbuk National University

  • White Papers // Jan 2013

    An Embedding Method for Real Characters into the 3D Virtual Space

    In this paper, the authors propose a method for embedding real characters in the 3D virtual space. Most systems have adopted virtual characters into the 3D virtual space to give more realistic situation, where the virtual characters have been controlled by user-steered interfaces. In order to take user immersion, they...

    Provided By Chungbuk National University

  • White Papers // Jun 2011

    Design of Guaranteeing System of Service Quality Through the Verifying Users of Hash Chain

    Cloud Computing Technique can use effective service whenever/wherever and get rid of the division of each source is soaring. However, in the Cloud Computing environment which all information are centered, there is no sufficient method for users to access data safely when accesses. In this paper, guaranteeing technique of service...

    Provided By Chungbuk National University

  • White Papers // Jun 2009

    Security Engine Management of Router Based on Security Policy

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router...

    Provided By Chungbuk National University

  • White Papers // Feb 2009

    Efficient Key Distribution Scheme for Secure Routing in Wireless Mesh Network Environment

    Wireless Mesh Network is gaining more respect as an efficient technique, either to construct an independent network using a wireless channel, or to build a transit network. Still, research on the security technique of Wireless Mesh Network is not given plenty of attention. Of course, those suggested in the existing...

    Provided By Chungbuk National University

  • White Papers // May 2008

    Message Efficient Leader Election in Synchronous Distributed System With Failure Detectors

    Leader election, simply election, is an important problem to construct fault-tolerant distributed systems. Depending on a network topology, many kinds of leader election algorithms to elect a high-priority leader have been presented so far. Some algorithms are based on complete topology and others based on ring topology or tree topology....

    Provided By Chungbuk National University

  • White Papers // May 2008

    An Authorization Scheme Using Partial ID for Privacy Protection in RFID

    The Radio Frequency Identification (RFID) has recently received much attention from various parties such as supply chain management. It is believed that RFID can bring revolutionary changes to supply chain, replacing the existing barcode systems. However, even though RFID system is widely used for industrial and individual applications, RFID tag...

    Provided By Chungbuk National University

  • White Papers // Jan 2013

    An Embedding Method for Real Characters into the 3D Virtual Space

    In this paper, the authors propose a method for embedding real characters in the 3D virtual space. Most systems have adopted virtual characters into the 3D virtual space to give more realistic situation, where the virtual characters have been controlled by user-steered interfaces. In order to take user immersion, they...

    Provided By Chungbuk National University

  • White Papers // May 2013

    Enhanced Security Communication System Using Digital Retrodirective Array Antenna

    Fast beam tracking and beam-forming technology are essential for the communication signal quality of high-capacity and high-quality. In this paper, the authors design a digital Retro Directive array Antenna (RDA) system possible for beam-forming technology without any prior location information for signal quality improvement and security improvement. Simulation results show...

    Provided By Chungbuk National University

  • White Papers // Jun 2009

    Security Engine Management of Router Based on Security Policy

    Security management has changed from the management of security equipments and useful interface to manager. It analyzes the whole security conditions of network and preserves the network services from attacks. Secure router technology has security functions, such as intrusion detection, IPsec(IP Security) and access control, are applied to legacy router...

    Provided By Chungbuk National University

  • White Papers // May 2008

    Message Efficient Leader Election in Synchronous Distributed System With Failure Detectors

    Leader election, simply election, is an important problem to construct fault-tolerant distributed systems. Depending on a network topology, many kinds of leader election algorithms to elect a high-priority leader have been presented so far. Some algorithms are based on complete topology and others based on ring topology or tree topology....

    Provided By Chungbuk National University

  • White Papers // May 2008

    An Authorization Scheme Using Partial ID for Privacy Protection in RFID

    The Radio Frequency Identification (RFID) has recently received much attention from various parties such as supply chain management. It is believed that RFID can bring revolutionary changes to supply chain, replacing the existing barcode systems. However, even though RFID system is widely used for industrial and individual applications, RFID tag...

    Provided By Chungbuk National University

  • White Papers // Jun 2011

    Design of Guaranteeing System of Service Quality Through the Verifying Users of Hash Chain

    Cloud Computing Technique can use effective service whenever/wherever and get rid of the division of each source is soaring. However, in the Cloud Computing environment which all information are centered, there is no sufficient method for users to access data safely when accesses. In this paper, guaranteeing technique of service...

    Provided By Chungbuk National University

  • White Papers // Feb 2009

    Efficient Key Distribution Scheme for Secure Routing in Wireless Mesh Network Environment

    Wireless Mesh Network is gaining more respect as an efficient technique, either to construct an independent network using a wireless channel, or to build a transit network. Still, research on the security technique of Wireless Mesh Network is not given plenty of attention. Of course, those suggested in the existing...

    Provided By Chungbuk National University