• Title/Summary/Keyword: 보안인식

Search Result 1,367, Processing Time 0.027 seconds

The Development Scheme of Domestic Third Party Logistics for Revitalization of Electronic Trade (전자무역의 활성화를 위한 국내 제3자물류 발전방안)

  • Cha, Soon-Kwean;Jang, Heung-Hoon
    • Journal of Korea Port Economic Association
    • /
    • v.24 no.2
    • /
    • pp.155-174
    • /
    • 2008
  • This paper proposed several activation strategies at both the government and company parts for the development of domestic third party logistics(TPL) to pull electronic trade era much earlier. In the government side, it must need to arrange and integrate complex regulation rules on the Logistics for more smooth access and use the TPL market. Also, it has to provide multiple support policies such as tax reduction, technical and financial service providing, and logistics information system to TPL. Finally, it should construct the government levels education system to train and forster a competent man who is well qualified as a electronic and logiscic expert. The TPL company must build up a total logistics information system concerned with an innovative operation system such as SCM, JIT etc. which can provide logistic services on demand to the electronic trade customers to maximize consumer satisfaction. In the shipper company level, it try to join a long-term strategic alliance with TPL to reduce logistic cost and increase logistic service to its electronic trade consumers.

  • PDF

Verification and Implementation of a Service Bundle Authentication Mechanism in the OSGi Service Platform Environment (OSGi 서비스 플랫폼 환경에서 서비스 번들 인증 메커니즘의 검증 및 구현)

  • 김영갑;문창주;박대하;백두권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.27-40
    • /
    • 2004
  • The OSGi service platform has several characteristics as in the followings. First, the service is deployed in the form of self-installable component called service bundle. Second, the service is dynamic according to its life-cycle and has interactions with other services. Third, the system resources of a home gateway are restricted. Due to these characteristics of a home gateway, there are a lot of rooms for malicious services can be Installed, and further, the nature of service can be changed. It is possible for those service bundles to influence badly on service gateways and users. However, there is no service bundle authentication mechanism considering those characteristics for the home gateway In this paper, we propose a service bundle authentication mechanism considering those characteristics for the home gateway environment. We design the mechanism for sharing a key which transports a service bundle safely in bootstrapping step that recognize and initialize equipments. And we propose the service bundle authentication mechanism based on MAC that use a shared secret created in bootstrapping step. Also we verify the safety of key sharing mechanism and service bundle authentication mechanism using a BAN Logic. This service bundle authentication mechanism Is more efficient than PKI-based service bundle authentication mechanism or RSH protocol in the service platform which has restricted resources such as storage spaces and operations.

An Adaptive Information Hiding Technique of JPEG2000-based Image using Chaotic System (카오스 시스템을 이용한 JPEG2000-기반 영상의 적응적 정보 은닉 기술)

  • 김수민;서영호;김동욱
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.4
    • /
    • pp.9-21
    • /
    • 2004
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method and the random changing method using the chaotic system. For ciphering the quantization index we use a novel image encryption algerian of cyclically shifted in the right or left direction and encrypts two quantization assignment method (Top-down/Reflection code), made change of data less. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the proposed methods implemented in software for about 500 images. consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

A Study on the Development of Souvenirs as Local Cultural Tourism Products - Focused on developing souvenir design - (지역 문화관광상품으로서의 기념품 개발 연구 - 기념품 디자인 개발 중심으로 -)

  • Hwang, Gyun-Jeong
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.73-79
    • /
    • 2020
  • With the recent strengthening of local autonomy and the recognition of the culture and tourism industry as a driving force for the fourth industrial revolution, the importance of research on the revitalization of the local culture and tourism industry is further emphasized. Thus, in this paper, the concept and type of local culture and tourism products were summarized and the research direction was presented through this. As a research method, the internal and external factors of the culture and tourism industry in Korea were used as the SWOT analysis method. In the text, three representative sites were selected and analyzed for the development of local cultural and tourism products, and Seoul, Jeju Island, and Gyeongju all found that they lacked local cultural and tourism products. It also found another value through its role of cultural development as well as the economic aspect of the development of cultural tourism products. In order to revitalize the local culture and tourism industry, which has become more important, the government proposed measures to promote differentiated creative products, efficient marketing, and legal security in various ways. In order for this study to be better data for researchers in the culture and tourism industry and related industries, research should be conducted with detailed surveys that could not be conducted due to various restrictions in the future.

A Study on the Therapists' Protective Actions of Medical Information Privacy - With a focus on physical and occupational therapists - (환자 프라이버시 보호행동 실천에 관한 연구 - 물리치료사와 작업치료사를 중심으로 -)

  • Kim, Jeong-Ja;Kweon, Eun-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.447-455
    • /
    • 2012
  • The present study was carried out with a view to examine the protective actions of physical and occupational therapists for patients's privacy. For this purpose, a survey was conducted with the questionnaires that were distributed to 297 physical and occupational therapists engaged in general hospitals as well as in rehabilitation clinics across the country from January 2 to 13, 2012. From the survey, it was made known that the overall extent of protective actions practiced by them was $3.54{\pm}.733$ in average. Divided by area, the average protective action in communication was $3.62{\pm}.776$, followed by $3.57{\pm}1.013$ in direct contact and $3.53{\pm}.780$ in maintenance and management, respectively. The analysis of general characteristics by each area showed that the older their age gets and the longer their career is, the more the protective action is practiced by them. Although they are well aware of the fact that the medical information of patients should be kept 100% secret and they practice it to almost excellent grade (5), the physical and occupational therapists, as key experts in charge of improving functions of patients, were found to have little concern for and little knowledge about contents of protecting medical information. It is thus required to perform public relation and instruction continuously to intensify their awareness of needs to protect patients' privacy and to implant ethical sense in this regard deep in their mind.

A Study on the Illustrations of Male and Female on the Middle School 「Technology·Home Economics」 Textbooks from the Gender Equality Perspective (양성평등 관점에서 본 중학교 「기술·가정」 교과서의 남녀 삽화 연구)

  • Lee, Eun Seon;Jun, Mikyung
    • Journal of Korean Home Economics Education Association
    • /
    • v.31 no.2
    • /
    • pp.137-153
    • /
    • 2019
  • This study reviewed the Technology & Home Economics Education textbooks to examine if their illustrations would be appropriate for students' balanced view of gender. To this end, the textbooks of 'Technology & Home Economics Education 1 and 2' from 12 publishers (24 books in total) were analyzed focusing on the formative and content characteristics of illustrations in the textbooks. The results of this study is as follows. There were areas in the textbooks that may not be considered gender-equal. Although the textbooks have been improved to some extent from the previous versions, they still show gender stereotypes biased towards men. If students are constantly exposed to the prescriptive characteristics that are in favor of certain gender, they would find it difficult to develop their personality strengths, due to the gender role pressures. In order to help students cultivate sensitivity and activism toward the gender equality issues, it is important that the textbooks are gender-equal. To summarize, in order to suggest to students a balanced image of society with male and female cooperating with each other in diverse domains, it is deemed necessary to constantly examine and revise the textbooks for their gender stereotypic contents, and thereby, improve them for gender equality.

An Empirical Study on the Prediction of Future New Defense Technologies in Artificial Intelligence (인공지능 분야 국방 미래 신기술 예측에 관한 실증연구)

  • Ahn, Jin-Woo;Noh, Sang-Woo;Kim, Tae-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.458-465
    • /
    • 2020
  • Technological advances in artificial intelligence are affecting many industries, such as telecommunications, logistics, security, and healthcare, and research and development related to economic, efficiency, linkage with commercial technologies are the current focus. Predicting the changes in the future battlefield environment and ways of conducting war from a strategic point of view, as well as designing/planning the direction of military development for a leading response is not only a basic element to prepare for comprehensive future threats but also an indispensable factor that can produce an optimal effect over a limited budget/time. From this perspective, this study was conducted as part of a technology-driven plan to discover potential future technologies with high potential for use in the defense field and apply them to R&D. In this study, based on research data collected in a defense future technology investigation, the future new technology that requires further research was predicted by considering the redundancy with existing defense research projects and the feasibility of technology. In addition, an empirical study was conducted to verify the significance between the future new defense technology and the evaluation indicators in the AI field.

Development Plan of Safety Management on Intelligent Robot (지능형 로봇에 대한 안전관리 발전방안)

  • Ju, Il-Yeop
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.89-119
    • /
    • 2011
  • The purpose of this study is to progress the development plan of safety management on the intelligent robot through safety analysis on the intelligent robot, major present condition of safety management on the intelligent robot, enforcement method of safety management on the intelligent robot. The following is the result of the study. First, we have to establish the provision or the special legislation to regulate the safety management of the intelligent robot substantially in the intelligent robot development and supply promotion law, the enforcement ordinance, the enforcement regulation. And, we should propel to establish the provision on the safety management of the intelligent robot in the laws related on ethics and safety. Second, we should establish the Robot Ethical Charter through the national and international agreement to give a guarantee against the safety management of the intelligent robot. Furthermore, we have to induces people's interest on the safety management of the intelligent robot through offering the public information of the Robot Ethical Charter for coexistence of human and robot and have to understand about rights of the intelligent robot. Third, the security industry and learned circles have to recognize the important effect that the intelligent robot gets in the security industry and try to grope the safety management and the application plan on the intelligent robot. Also, the security industry and learned circles should concern not only using and managing of the intelligent robot including the military robot, the security robot but also protecting human from the intelligent robot.

  • PDF

The Factor Influencing to the Effectiveness of Prevention Policies of the Criminal Victimization of North Korean Defectors (북한이탈주민 범죄피해 예방정책의 효과성에의 영향요인)

  • Lim, Chang-Ho;Kim, Yun-Young
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.223-249
    • /
    • 2017
  • The purpose of this study is to analyze the actual situation of crime victimization by North Korean defectors and to examine whether any of the protection and support systems for defectors has a statistically significant effect on the perceived effectiveness for preventing the criminal victimization of North Korean Defectors. The subjects of this study were 107 police officers from the 17 provincial police departments. Independent variables were (1) social adaptation education in Hanawon, (2) protection officer system, (3) legal support system, (4) private participation system, (5) support for family life, (6) community participation activity. And the dependent variable is the crime prevention effectiveness for the defectors. As a result of multiple regression analysis, it was found that the independent variables that have a significant effect on the effectiveness of prevention of crime victimization were protection officer system and support for family life. First, in order to prevent the crime victimization of North Korean defectors in advance, three kinds of protection officer system that will be received after the transfer of the residence should play the role successfully. Second, the efforts of the government and municipalities alone are insufficient for the early settlement of North Korean defectors. Therefore, it is necessary to diversify the support and protection programs for North Korean refugees through cooperation with civic organizations. Third, it is necessary to expand the legal education time so that North Korean defectors do not suffer crime because of lack of legal knowledge. Fourth, in order to prevent North Korean defectors from being victimized by various kinds of crime, it is necessary to actively support them so that family life can be stabilized.

  • PDF

Effective Feature Vector for Isolated-Word Recognizer using Vocal Cord Signal (성대신호 기반의 명령어인식기를 위한 특징벡터 연구)

  • Jung, Young-Giu;Han, Mun-Sung;Lee, Sang-Jo
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.3
    • /
    • pp.226-234
    • /
    • 2007
  • In this paper, we develop a speech recognition system using a throat microphone. The use of this kind of microphone minimizes the impact of environmental noise. However, because of the absence of high frequencies and the partially loss of formant frequencies, previous systems developed with those devices have shown a lower recognition rate than systems which use standard microphone signals. This problem has led to researchers using throat microphone signals as supplementary data sources supporting standard microphone signals. In this paper, we present a high performance ASR system which we developed using only a throat microphone by taking advantage of Korean Phonological Feature Theory and a detailed throat signal analysis. Analyzing the spectrum and the result of FFT of the throat microphone signal, we find that the conventional MFCC feature vector that uses a critical pass filter does not characterize the throat microphone signals well. We also describe the conditions of the feature extraction algorithm which make it best suited for throat microphone signal analysis. The conditions involve (1) a sensitive band-pass filter and (2) use of feature vector which is suitable for voice/non-voice classification. We experimentally show that the ZCPA algorithm designed to meet these conditions improves the recognizer's performance by approximately 16%. And we find that an additional noise-canceling algorithm such as RAST A results in 2% more performance improvement.