• Title/Summary/Keyword: 안전마크

Search Result 166, Processing Time 0.024 seconds

New EDI Developments in the Era of Electronic Commerce (전자상거래시대에 있어 전자문서교환(EDI)의 새로운 발전방향에 관한 소고)

  • 옥석재
    • Journal of Korean Port Research
    • /
    • v.13 no.1
    • /
    • pp.65-78
    • /
    • 1999
  • 운송에 필요한 각종 서류와 정보의 효율적 교환은 국제물류시스템의 중요한 일부분이 되었다. 또한 EDI(전자문서교환)는 수출입에 필요한 각종 상거래 서식을 컴퓨터가 읽을 수 있는 표준화된 전자문서의 형태로 바꾸어 교환함으로써 무역절차의 간소화와 운송서류의 신속한 교환을 가능하게 하여 물류 효율성을 증대시키는 것으로 알려져있다. 이러한 맥락에서 세계각국의 항만당국은 자국의 물류혁신을 도모하기 위하여 경쟁력으로 EDI의 도입을 추진해왔다. 그러나 90년대에 들어 EDI의 발전은 처음의 기대와는 달리 저조한 것으로 나타났다. 이는 크게 두가지로 설명된다. 첫째는 EDI 문서의 국제표준을 제정하는 UN/ECE 산하 WP4의 표준제정 미 공표의 비효율성으로 인해 실제 상거래에서 필요한 문서들의 EDI 표준화가 제때에 이루어지지 않았다는 점이다. 두 번째 이유는 대부분의 EDI 사용자가 전자문서의 교환통로로 이용해 왔던 부가가치통신망(VAN)서비스의 고비용적인 구조로 인하여 비용에 민감한 중소규모 화주들의 폭넓은 이용을 저해왔다는 점이다. 따라서 본고에서는 EDI의 확산을 저해했던 두가지 문제점에 입각하여 먼저 효율적 EDI 표준 제공을 위한 국제적 노력의 산물인 CEFACT(Center for Facilitation of Procedures and practices for Administration Commerce and Transport))와 보다 안전하고 신뢰성 있는 전자상거래 솔류션의 마련을 위해 이루어진 각종 국제기구들의 활동 및 결과물들을 소개하고 다음으로 인터넷의 급속한 확산으로 새롭게 개발되고 있는 Web-based EDI, XML/EDI, Simpl-EDI, Form-based EDI 그리고 Lite-EDI의 저비용적 구조 측면을 분석하여 중소규모화주들의 EDI에 대한 인식을 제고시킴으로써 EDI의 전반적인 확산을 도모하고 있다.

  • PDF

A Method of Enhancing Security of Internet Banking Service using Contents-Based CAPTCHA (콘텐츠 기반 캡차를 이용한 인터넷 뱅킹 서비스의 보안성 향상 기법)

  • Lee, Sang-Ho;Kim, Sung-Ho;Kang, Jeon-Il;Byun, Je-Sung;Nyang, Dea-Hun;Lee, Kyung-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.571-583
    • /
    • 2013
  • Internet banking service has a advantage that is unrestricted by time. If automated programs are able to attack Internet banking services, a number of accounts can be attacked at the same time and as a result, damage will be considerably increased. To cope with such attacks, two methods, VPS and MS watermark, were introduced by Arcot and MS respectively. The methods use text-based CAPTCHAs in the process of transfer approval to distinguish automated programs from legal human users. In this paper, we point out the security threats of the methods when those are applied to Internet banking services. Especially, we consider the attack that are performed by extract specific string from text-based CAPTCHAs and it's countermeasure. Also we suggest a method of enhancing security of internet banking services. Our method is based on contents-based CAPTCHAs that are consist of known transfer information between user and server.

Improvement of Image Scrambling Scheme Using DPSS(Discrete Prolate Spheroidal Sequence) and Digital Watermarking Application (DPSS(Discrete Prolate Spheroidal Sequence)를 이용한 영상 스크램블링 방식의 개선 및 디지털 워터마킹 응용)

  • Lee, Hye-Joo;Nam, Je-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.11
    • /
    • pp.1417-1426
    • /
    • 2007
  • As one of schemes to protect multimedia content. it is the selective encryption scheme to encrypt partially multimedia content. Compared AES(advanced encryption standard) of traditional encryption, the selective encryption scheme provides low security but is applicable to applications of multimedia content not to require high secrecy. In this paper, we improve the image scrambling scheme proposed by Van De Ville which scrambles an image without bandwidth expansion using DPSS(discrete prolate spheroidal sequence) to make it more secure based on Shujun's research which verifies the secrecy of Van De Ville's scheme. The proposed method utilizes an orthonormalized random matrix instead of Hadamard matrix for secret matrix and to add it for providing high secrecy against statistical attack or known-plaintext attack using some statistical property or estimate of secret matrix from a scrambled image. The experimental results show that the proposed method is more secure than the existing scheme. In addition, we show that the proposed method can be applied to access control or copy control of watermarking application.

  • PDF

Development of KML conversion technology of ENCs (전자해도의 KML 변환기술 개발)

  • Oh, Se-Woong;Park, Jong-Min;Lee, Moon-Jin;Ko, Hyun-Joo
    • Journal of Navigation and Port Research
    • /
    • v.35 no.1
    • /
    • pp.9-15
    • /
    • 2011
  • IMO adopt the revision of SOLAS convention on requirement systems for ECDIS and considered an ECDIS as the major system for E-Navigation strategy on marine transportation safety and environment protection. ENC(Electronic Navigational Chart) as the base map of ECDIS is considered as a principal information infrastructure that is essential for navigation tasks. Because ENCs are not easy to utilize for being encoded according to ISO/IEC 8211 file format, used for navigational purpose mainly, it's required to utilize in parts of Marine GIS and various marine application. In this paper, we developed KML conversion technology for ENC application. In details, we analyzed data model and encoding method of ENC, schema structure and data file of KML. Based on this results, we developed the program of KML conversion of ENCs.

Molding Analysis for the Production of Large Sun Visors in Vehicles (차량용 대형 선바이저 생산을 위한 성형해석)

  • Park, Jong-Nam;Noh, Seung-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.610-615
    • /
    • 2016
  • Diverse accessories are used in automobiles, such as navigation systems, front and rear cameras, spoilers, and sun visors. Sun visors block sunlight so that drivers can drive safely with a better view, and they are used in many automobile designs. However, when large plastic products are manufactured using injection molding, there are many difficulties that develop, like weld lines, short shots, flow marks, imperfections, and distortion. In this study, a CAE simulation was conducted based on previous results to predict potential problems in the injection molding of large products. The flow characteristics up to complete charge for the melting resins were captured using a computer-aided engineering simulation. The temperature departure on the front part of a flow was about $10^{\circ}C$ and very stable. The practical ejecting time of the cold runner was about 70 seconds in the simulation. Finally, the capability of a suitable injection machine was calculated and recommended by prediction of the injection pressure and the die clamping force.

Rosary : Topology-Aware Structured P2P Overlay Network for CDN System (Rosary : CDN 시스템을 위한 구조화된 토폴러지-인식 P2P 오버레이 네트워크)

  • Shin Soo-Young;Namgoong Jung-ll;Park Soo-Hyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12B
    • /
    • pp.818-830
    • /
    • 2005
  • Recently, Peer-to-Peer (P2P) overlay networks like CAN, Chord, Pastry and Tapestry offer a novel platform for scalable and decentralized distributed applications. These systems provide efficient and fault-tolerant routing, object location, and load balancing within a self-organizing overlay network. Content Delivery Network (CDN) is an intermediate layer of infrastructure that helps to efficiently deliver the multimedia content from content providers to clients. In this paper, We propose a topology-aware P2P overlay network for CDN, Rosary, in which CDN servers perform Intra-Pastry and Inter-Pastry routing based on a two-level structured overlay network. This proposed system extends pastry by adapting itself to CDN environments, where a semi-hashing based scheme for Intra-Pastry routing is introduced, and dynamic landmark technology is used to construct the topology-aware overlay network. Through simulations on NS-2, it is shown that Rosary is scalable, efficient, and flexible.

A Study on the Fire Drill Behavior Characteristics in Rehabilitation Center for Visually Impaired Persons (시각장애인 복지관의 화재 피난행태 특성분석 연구)

  • Lee, Jeong-Soo;Kwon, Heung-Soon;Kim, Eung Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.8
    • /
    • pp.5646-5653
    • /
    • 2015
  • This study focused on the architectural, interior and management guidelines in rehabilitation center for visually impaired persons. For these purposes, we reviewed the movement behaviors and the characteristics of fire drill in rehabilitation center for visually impaired persons. The results are as follows. : First, the liner circulation paths and interior landmarks are recommended, and dwelling units and program rooms should be located in ground floor for barrier free evacuation. Second, It is important to establish continuous handrail, variations of paving patterns and materials, good color definition, tactile informations and directional sound. Third, it is necessary to serve more specified architectural, interior, and management guidelines according to impaired prototypes.

Hetero-core Spliced Fiber Optic Sensing System for Environmental Monitoring (환경정보 모니터링을 위한 헤테로코어형 광파이버 센싱 시스템)

  • Kim, Young Bok;Kim, Young Bae;Lee, Hwan Woo
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.3
    • /
    • pp.77-81
    • /
    • 2008
  • In this paper, we introduce a multi purpose environmental monitoring system developed as a commercially available standard using the technique of hetero-core spliced fiber optic sensor. The monitoring system has been tested and evaluated in a possible outdoor condition in view of the full scaled operation at actual sites to be monitored. Additionally, the developed system in this work conveniently provides us with various options of sensor modules intended for monitoring such physical quantities as displacement, distortion, pressure, binary states, and liquid adhesion. Two channels of optical fiber line were monitored, in each of which three displacement sensor modules were connected in series, in order to examine the performance to a pseudo-cracking experiment in the outdoor situation, and to clarify temperature influences to the system in terms of the coupling of optical connectors and the OTDR stability. The pseudo-cracking experiment successfully observed the actually given cracks by means of calculation based on the detected displacement values and their geometrical arrangement of the used sensor modules. And the robustness to the temperature is verified in the various temperature change.

  • PDF

Asymmetric public-key watermarking based on correlation method (상관도 검출기반의 비대칭 공개 키 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.151-159
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks to remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched several researchers as a next generation watermarking technology. In this paper, we have expanded search space of secret key using the solution set of linear simultaneous equations. Secret key is generated by secure linear transformation method to prevent of guessing secret key from public key, and the correlation value between secret key and public key is high. At theresults, the multi bits information can be embedded and high correlation value was detected after JPEG compression.

  • PDF

Metadata production system based on MPEG-21 IPMP for protection of broadcasting contents (방송 콘텐츠 보호를 위한 MPEG-21 IPMP 기반의 메타데이터 저작 시스템)

  • Ryu, Kwang-Hee;Kim, Kwang-Yong;Kim, Jae-Gon;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.619-622
    • /
    • 2005
  • When Digital Contents goes through production${\cdot}$delivery${\cdot}$consumption, MPEG(Moving Picture Expers Group)-21 IPMP(Intellectual Property Management and Protection) defines standard which have defined by FCD(Final Committee Draft) level to keep the Digital Contents in safety. And development of system which applied to latest standard to protect and manage the broadcasting contents is required. Currently, the system to protect and manage the broadcast contents consists of fourth organizations which means production server, tool server, license server, consumption server. In this paper, we made production server to parse REL(Right Expression Language) document that has right information for content from license server, and create metadata based on MPEG-21 IPMP about the content that applied to watermark. then, after it do remuxing, transmit the protected data to consumption server.

  • PDF