• Title/Summary/Keyword: 위험대응

Search Result 1,446, Processing Time 0.028 seconds

Design and Implementation of Event Hierarchy through Extended Spatio-Temporal Complex Event Processing (시공간 복합 이벤트 처리의 확장을 통한 계층적 이벤트 설계 및 구현)

  • Park, Ye Jin;Yom, Jae-Hong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.6_1
    • /
    • pp.549-557
    • /
    • 2012
  • Spatial phenomena such as environment pollution, disease and the risk of spreading information need a rapid initial response to perceive spread event. Moving data perceive spread event through real-time processing and analysis. To process and analysis the event, spatial-temporal complex event processing is used. Previous spatialtemporal complex event processing is possible basis spatial operator but insufficient apply to design spatialtemporal complex event processing to perceive spatial phenomena of high complexity. This study proposed hierarchical spatio-temporal CEP design which will efficiently manage the fast growing incoming sensor data. The implementation of the proposed design is evaluated with GPS location data of moving vehicles which are used as the incoming data stream for identifying spatial events. The spatial component of existing CEP software engine has been extended during the implementation phase to broaden the capabilities of processing spatio-temporal events.

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

Trachea Necrosis after Thyroidectomy ; Case Report and Review (갑상선절제술 후 발생한 기도 괴사 ; 증례보고)

  • Choi, Ji Woo;Lee, Jeonghun;Song, Youngpeck;Kim, Chul-Ho;Soh, Euy Young
    • Korean Journal of Head & Neck Oncology
    • /
    • v.30 no.2
    • /
    • pp.109-114
    • /
    • 2014
  • 갑상선절제술은 내분비 외과의사가 하는 수술 중 가장 안전한 수술이지만 수술 중 기도나 식도가 손상 받을 수 있으므로 각별한 주의를 기울여야 한다. 특히 기도 괴사와 같이 생명에 위협을 주는 합병증이 있음을 유념해야 한다. 본 논문은 갑상선 전 절제술과 승모판 치환술을 함께 받은 72세 여성환자가 수술 후 3일만에 기도 괴사가 발생한 케이스이다. 3개의 기관륜에 걸쳐 괴사가 발생되어 있었다. 괴사된 조직을 제거하고, 이후 지속적인 괴사조직에 대한 제거와 치료와 적으로 기관개창술을 시행하고, 자연폐쇄를 유도하여 성공적으로 치료되었다. 비슷한 여러 논문들을 살펴본 결과 기도 괴사를 유발하는 요인으로는 조절되지 않는 기침, 여성, 갑상샘중독 결절, 기도 삽관 시 발생되는 손상, 삽관튜브 커프의 과팽창으로 기도가 장시간 높은 압력으로 압박되었을 때, 적절하기 않은 커프 크기, 삽관튜브 커프의 공기를 빼지 않고 무리하게 움직였을 때, 출혈이 많을 때, 과도한 전기소작으로 인한 손상, 기도로 가는 혈관손상으로 인한 혈액공급의 차단, 감염 등으로 보고 있다. 치료는 기도의 괴사와 감염의 정도에 따라 달라질 수 있다. 일차 봉합술, 일시적 스토마 형성, 일시적 기관조루술, 단단연결술, 기도 스텐트 설치술, 근육피판 재건술, 보존적 치료 등을 시행할 수 있다. 기도 괴사에 대한 위험인자와 치료에 대해서는 아직 확실히 적립되지 않은 상태이다. 드문 합병증이지만 생명을 위협할 수 있는 이러한 합병증에 대해 항상 염두 해 두고 수술 시 신중을 기하고 문제 발생시 신속한 대응을 해야겠다.

Road Lane and Vehicle Distance Recognition using Real-time Analysis of Camera Images (카메라 영상의 실시간 분석에 의한 차선 및 차간 인식)

  • Kang, Moon-Seol;Kim, Yu-Sin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2665-2674
    • /
    • 2012
  • This paper propose the method to recognize the lanes and distance between cars in real-time which detects dangerous situations and helps safe driving in the actual road environment. First of all, it extracts the area of interest corresponding to roads and cars from the road image photographed by using the forward-looking camera. Through the hough transform for the area of interest, this study detects linear components and also selects the lane and conducts filtering by calculating probability. And through the shadow threshold analysis of the cars in front within the area of interest, it extracts the objects of cars in front and calculates the distance from cars in front. According to the result of applying the suggested technology to recognize the lane and distance between cars to the road situation for testing, it showed over 95% recognition rate; thus, it has been proved that it can respond to safe driving.

Digital Culture and the Utility of Poetry in a Convergence Age (융복합시대에 디지털문화와 시의 효용성 연구)

  • Seo, Hae Ryen;Kim, Kyoung Soon
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.343-350
    • /
    • 2018
  • The purpose of this paper is to explore the characteristics of a digital culture, its negative effects, especially automatism of perception, a poetic strategy against automatism of perception and the utility of poetry including the therapeutic function of poetry. The new technologies offer us various experience, great opportunities and rosy future by freeing us from boring and laborious tasks, and difficult decisions. Through the excessive and habitual use of new technologies, we may become too dependent on machines, losing our thinking abilities, sensibility, perception and creativity. Therefore, we need poetry to recover the sensation of life and make us feel things. Reading poetry allows us to look into someone else's soul and cultivate the ability to empathize. As a healing fountain, poetry leads us to a way for a change of heart, a recovery of psychic health and universal love through perfect communion in ourselves and in society. Furthermore we need a systematic and in-depth study of digital poetry as well as traditional poetry.

Police Networks for Criminal Intelligence Functions: Based on Informal Social Network Analysis (경찰 범죄정보 수집 활동의 관계망 분석: 비공식적 사회연결망 분석을 중심으로)

  • Choi, Yeong Jin;Yang, Chang Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.448-459
    • /
    • 2020
  • Recently, the necessities of gathering, producing, and sharing criminal information are critically important as intelligence functions of police agencies to improving public safety and national security. However, the inadequacies and barriers within which police agencies have in regard to intelligence functions impede criminal information gathering, intelligence producing within their agency, and intelligence sharing with other agencies. In this study, we analyzed informal networks constructed from a survey dataset of information and intelligence sharing among officers in police agencies. The results revealed the different structural properties of intelligence networks between police agencies. We did find that officers with high indegree and outdegree in a network played critical role on the dynamics and degree of intelligence gathering and assessment responsibilities. Finally, we could find evidence that the potential role of intermediary triggered relational dynamics for developing and sharing critical information among all police agencies.

A Study on Situations of Safety Education in Universities and University Students' Awareness of Coping Methods for Safety Accidents (대학의 안전교육 현황 및 대학생의 안전사고 대처방법 인식에 관한 연구)

  • Chung, Sung-Il;Oh, Jae-Yeon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.518-529
    • /
    • 2016
  • This study researched methods for coping with safety accidents by university students, after considering the situation of safety education by universities in Korea. For this study, a survey of 411 students of universities in the cities of Gwangju and Daejeon was conducted. According to the results, the ratio was high for answers such as willingness to participate in safety education beginning with the departments of engineering, art and physical training, education, art and humanity, social sciences and natural sciences, and medical sciences. It was found that university students most preferred first aid among the contents of safety education. University students of all departments answered that they had experienced safety education, but were afraid to be embarrassed in the case of actual safety accidents, as was found through the results of investigations of their awareness of coping methods with safety accidents. It was verified that many times their suffered skin and other wound in an earlier safety accident that they had experienced. This study suggests that safety education needs to be accomplished in the university curriculum, predicting and practicing for causes and factors of danger in advance, in order to improve the level of safety awareness and safety competence among university students.

Development of Truck Shipment Incident Emergency Response System for Transporting Hazardous Materials Using GPS (GPS를 이용한 수송사고 조기경보시스템 개발(1단계 : 국내외 사례조사와 개발방법제시))

  • Oh Se-Chang;Cho Yong-Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.1 no.1
    • /
    • pp.79-88
    • /
    • 2002
  • As a part of NERI:;, Truck Shipment Safety Information is divided into Optimal Route Guidance system and Emergency Response system. This study which is for developing of Truck Shipment Incident Emergency Response System intends to prevent or early response damage caused by incidents through realtime monitoring about the position and the state of Hazard material transport truck. For this, we divide it into three scenarios; realtime monitoring, management of incidents, information provision to related organizations and present functional requirements and architecture coming with each scenario. As a result of the first step among total three steps, it would able to not only realtime management of trucks but also guide for auto-enforcement or management about illegal act like dumping scrapped material. It is now under examination about position of detection and technology of communication to application. From now on, it is expect to test in the range of Metropolitan after selecting appropriate technology.

  • PDF

A Study on Reforming the National Personal Identification Number System : The Unconnected Random Personal Identification Number System (국가 개인식별번호체계 개선에 관한 연구 : 독립적 난수기반 개인식별번호체계로 전환)

  • Han, Mun-Jung;Jang, GyeHyun;Hong, Seokhie;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.721-737
    • /
    • 2014
  • The Resident Registration Number(RRN) system has been effectively acted as a national identification system since it was enforced. On the other hand, there are some problems such as leakages of personal informations including RRNs on a large scale and each RRN makes a pair with each person in all areas of the society. Nevertheless leakages of them might cause a big damage, there is no radical countermeasure for they are never changed in actual fact. In Republic of Korea, a RRN acts as a primary key of a database, so it has to be protected by severing the connectivity between leaked RRNs and the other personal data. In this paper, the Unconnected Random Personal Identification Number system is proposed for preventing damage of data spills by removing a dependency which the RRN has. Furthermore, this paper suggests the solutions against some potential issues in the system.