• Title/Summary/Keyword: 위험수용

Search Result 387, Processing Time 0.025 seconds

Design and Implementation of the SSL Component based on CBD (CBD에 기반한 SSL 컴포넌트의 설계 및 구현)

  • Cho Eun-Ae;Moon Chang-Joo;Baik Doo-Kwon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.3
    • /
    • pp.192-207
    • /
    • 2006
  • Today, the SSL protocol has been used as core part in various computing environments or security systems. But, the SSL protocol has several problems, because of the rigidity on operating. First, SSL protocol brings considerable burden to the CPU utilization so that performance of the security service in encryption transaction is lowered because it encrypts all data which is transferred between a server and a client. Second, SSL protocol can be vulnerable for cryptanalysis due to the key in fixed algorithm being used. Third, it is difficult to add and use another new cryptography algorithms. Finally. it is difficult for developers to learn use cryptography API(Application Program Interface) for the SSL protocol. Hence, we need to cover these problems, and, at the same time, we need the secure and comfortable method to operate the SSL protocol and to handle the efficient data. In this paper, we propose the SSL component which is designed and implemented using CBD(Component Based Development) concept to satisfy these requirements. The SSL component provides not only data encryption services like the SSL protocol but also convenient APIs for the developer unfamiliar with security. Further, the SSL component can improve the productivity and give reduce development cost. Because the SSL component can be reused. Also, in case of that new algorithms are added or algorithms are changed, it Is compatible and easy to interlock. SSL Component works the SSL protocol service in application layer. First of all, we take out the requirements, and then, we design and implement the SSL Component, confidentiality and integrity component, which support the SSL component, dependently. These all mentioned components are implemented by EJB, it can provide the efficient data handling when data is encrypted/decrypted by choosing the data. Also, it improves the usability by choosing data and mechanism as user intend. In conclusion, as we test and evaluate these component, SSL component is more usable and efficient than existing SSL protocol, because the increase rate of processing time for SSL component is lower that SSL protocol's.

A Research Survey on the Characteristics of Burglaries: Focused on How to Utilize Private Security (침입절도 특성에 관한 조사연구: 민간경비 활용방안을 중심으로)

  • Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.15-35
    • /
    • 2010
  • A larceny means stealing others' properties, as one of crime types most closely connected with common people. Along with fraud, it is the mostly common property crime; in particular, the largest number of people are exposed to a burglary. This study aims to find the schemes to utilize private guards according to the characteristics of burglary. To do so, a questionnaire survey was conducted into an actual condition of official statistics of burglary and into the criminals of burglary, with a view to understanding the behavioral characteristics of burglary and suggesting defense mechanisms to prevent the crime. Burglary is not just a major crime to be dealt with by public guards like the police but also one to be handled increasingly more by private guards. It is why this study intends to identify how to utilize private guards in preventing the crime. Investigations were made into 208 burglars, who were inmates of 10 correctional institutions (prisons or detention houses) across the country. It is found that only about 24% of burglars committed the crime through rational choice, about 60.7% were feared of their arrest at the time of their crime, and a very high percentage (69.9%) of them were assured of their successful crime. Burglaries usually happened at night, mostly in a summer day when everybody goes away from home for vacation. Primarily, the crimes took place in a private house of urban residential quarters. What burglars considered mostly for target selection includes 'profitability,' followed by 'surveillance' and 'risk.' Most (42%) of them committed the crime for the first time ever. Generally, they were not inclined to commit the crime while under the influence of alcohol or drug, which might prevent them from making reasonable decisions. 73.9% of the criminals said that they committed the crime singly without any accomplices.

  • PDF

DISTRIBUTION OF AIRBORNE BACTERIA BY HANDPIECE AEROSOL CONDITIO (핸드피스 분무조건에 따른 부유세균 기균(氣菌) 의 분포)

  • Ko, Young-Han;Baik, Byeong-Ju;Kim, Jae-Gon;Yang, Yeon-Mi;Shin, Jeong-Geun
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.35 no.4
    • /
    • pp.628-634
    • /
    • 2008
  • In recent years, cross-contamination has become one of the noticeable issues in dental clinic. Two major routes of contamination are the direct-contamination through blood and oral secretion and the indirect-contamination through dental office equipments. Especially, air-contamination through air-floating pollutant in a confined space like hospital, and also contamination through aerosol ejected from high-speed handpiece in a dental office was interested. The purpose of this study was to understand risk of bacterial infection through aerosol from handpiece in a dental office, which will help the practitioner with prevention of contamination during dental treatment. The main findings are as follows. 1. In a comparative test, the group using handpiece has higher bacterial number than the group not using handpiece with significant statistical difference(P<0.01). 2. The group using handpiece with rubber dam has lower bacterial number than the group using handpiecewithout rubber dam with significant statistical difference(P<0.01). 3. Comparing the group using drainage water with the group using distilled water as a handpiece water source results in 22.4 cfu and 17.0 cfu respectively but the difference is no statistically significant(P>0.05). 4. Measuring cfu at 0.5m and 1.5m distance, 0.5m distance showed higher bacterial number with statistical significance(P<0.01). 5. Classification of bacterial types showed the largest bacterial number came from gram-positive micrococcus(73.9%), and gram-negative micrococcus, gram-negative bacillus, and gram-positive bacillus follow in descending order.

  • PDF

ANC Caching Technique for Replacement of Execution Code on Active Network Environment (액티브 네트워크 환경에서 실행 코드 교체를 위한 ANC 캐싱 기법)

  • Jang Chang-bok;Lee Moo-Hun;Cho Sung-Hoon;Choi Eui-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9B
    • /
    • pp.610-618
    • /
    • 2005
  • As developed Internet and Computer Capability, Many Users take the many information through the network. So requirement of User that use to network was rapidly increased and become various. But it spend much time to accept user requirement on current network, so studied such as Active network for solved it. This Active node on Active network have the capability that stored and processed execution code aside from capability of forwarding packet on current network. So required execution code for executed packet arrived in active node, if execution code should not be in active node, have to take by request previous Action node and Code Server to it. But if this execution code take from previous active node and Code Server, bring to time delay by transport execution code and increased traffic of network and execution time. So, As used execution code stored in cache on active node, it need to increase execution time and decreased number of request. So, our paper suggest ANC caching technique that able to decrease number of execution code request and time of execution code by efficiently store execution code to active node. ANC caching technique may decrease the network traffic and execution time of code, to decrease request of execution code from previous active node.

Seedling Production of Rabbitfish, Siganus canaliculatus (흰점독가시치, Siganus canaliculatus의 종묘생산)

  • Hwang, Hyung-Kyu;Lee, Jung-Uie;Rho, Sum;Yang, Sang-Geun;Kim, Seong-Cheol;Kim, Kyong-Min
    • Journal of Aquaculture
    • /
    • v.13 no.4
    • /
    • pp.277-284
    • /
    • 2000
  • Rabbitfish hatchlings were given a mixed food of rotifers (Brachionus rotundiformis) and trochophore larvae of oyster. Only the oyster-trochophore larvae were found in the gut of 62-h old fish larvae. The fish larvae, fed on rotifer and ciliate alone did not survive. However, their survival increased to 3.3 % on the 10th day after hatching, when trochophore was supplemented. Corresponding with the accelerated growth, the number of rotifers consumed increased from 11 in a 5-day old fish to 165 in a IS-day old fish. In a field ecosystem containing live diatom, Nannochloropsis oculata, rotifers and copepods, fish larvae were shocked and the oyster's trochophore larvae were fed from 2 to 7 days after hatching. A total of 76,000 seedling were produced after 50 days of hatching with 12.7 % survival. Mean total length and body weight were 65.6 mm and 3.4 g, respectively. Growth of body length (BL), body height (BH), body weight (BW) and head length (HL) as a function of the total length (TL) showed regressional relationships as follows; BL=0.8565 TL+0.0852 ($t^2$=0.9996); BH=0.3207 TL - 0.5052 (($t^2$=0.9641) BW=0.0652 TL2.3508 (($t^2$=0.9925); HL=0.2595 TL - 0.1898 (($t^2$=0.9901)

  • PDF

THE CLASSIFICATION OF ADOLESCENTS IN RUNAWAY SHELTERS BY THE EVALUATION OF THEIR PSYCHOPATHOLOGY (보호시설 가출청소년의 정신병리에 대한 평가와 분류)

  • Lee, Jong-Sung;Kwack, Young-Sook
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.12 no.2
    • /
    • pp.192-217
    • /
    • 2001
  • Object:This study was carried out to classify adolescents in runaway shelters by evaluating their psychopathology. And the ultimate purpose is to offer basic data for preventing adolescents‘ runaway and for diversifying runaway shelters suitable for the problem of individual adolescent. Method:128 adolescents who stay in the runaway shelters were asked to complete self-report qeustionnaires including basic sociodemographic data, Child Behavior Check List(CBCL), Minnesota Multiphasic Personality Inventory(MMPI), and Symptom Check List-90-Revised(SCL-90-R). Korean Wechsler Adult Intelligence Scale(K-WAIS)[or Korean Educational Developmental Institute-Wechsler Intelligence Scale for Children(KEDI-WISC)] and Bender-Gestalt test(BGT) were also done by clinical psychologists. Results:The most common age of the subjects were 15-year-old, and they dropped out their schools in the middle school most commonly. Mostly they were from middle class family and their parents' educational level were high school graduates. The first runaway episode was most common in the middleschool period, and their runaways were repeated. The most common frequency of runaways were more than 10 times. About 10% of them abused drugs and about 80% of them abused alcohol. One third of them had experiences of illegal problems and 10% of them engaged in sexual activity for money. 95 adolescents(83%) in CBCL, 42 adolescents(36%) in SCL-90-R, and 70 adolescents(69.3%) in MMPI showed clinical significance. In intelligence test, 22 adolescents(22%) were mentally retarded. In BGT, 35 adolescents(39.4%) manifested brain dysfunction signs. Conclusion:Runaway adolescents in the shelters have variable and severe psychopathology. Their psychopathology is classified as follows;The behavior disorder group, the mood disorder group with anxiety/depression, the somatic disorder group with somatic symptoms, and the psychosis group with possibility of severe psychopathology. Therefore it is very important to evaluate psychiatric problems of runaway adolescents, and specific therapeutic interventions according to their problems are required.

  • PDF

The Effects of the Change of Operating Income Disclosure Policy under K-IFRS - Evidence from KOSDAQ Market - (K-IFRS 이후 영업이익 공시정책의 변화에 대한 연구 - 코스닥 시장을 중심으로 -)

  • Baek, Jeong-Han;Choi, Jong-Seo
    • Management & Information Systems Review
    • /
    • v.33 no.3
    • /
    • pp.167-187
    • /
    • 2014
  • While Korean GAAP had detailed regulations for the measurement and disclosure of operating income in the past, K-IFRS did not provide specific rules for operating income until 2011. Some firms that adopted K-IFRS before 2011 did not disclose or calculated operating income in an inconsistent manner although operating income is usually considered as one of the core information items to assess firm valuation. Inconsistency in firms' treatment of operating income invoked much criticism from diverse users of financial statement. The Korean Accounting Institute (KAI hereafter) revised the K-IFRS rules relevant to operating income in September 2010 in response to the voices raised by the business community, whereby the operating income number is allowed to be calculated in conformity with the previous K-GAAP. This study was motivated by the revision of K-IFRS and aims to provide a clue on the validity of such policy decision. To achieve the research objective, we test the relative value relevance of the alternative operating income numbers under K-IFRS versus K-GAAP. Our main findings are as follows. The value relevance of operating income reported before K-IFRS is proved to be higher than after K-IFRS. K-IFRS operating income adjusted to the previous K-GAAP has greater explanatory power for market values relative to one calculated under the K-IFRS regime. In an additional analysis, the sample was decomposed according to whether the operating income under K-IFRS is greater than under K-GAAP. The difference in the value relevance of K-IFRS versus K-GAAP operating income is significant only in the subsample consisting of firms which reports higher operating income under K-IFRS compared to K-GAAP. Also, the firms which would have reported negative operating income on a consecutive basis are more likely to have chosen K-IFRS, resulting in higher numbers than otherwise. It is likely that firms facing the threat of delisting due to consecutive operating loss reporting are more likely to have adopted K-IFRS disclosure rules by which they could report higher operating income numbers. To sum up, these results corroborate the limitation inherent in the K-IFRS regarding operating income disclosures. This paper suggests that the recent revision of K-IFRS implemented by KAI is likely to mitigate some of afore-mentioned limitations effectively.

  • PDF

Comparison of Gefitinib and Erlotinib for Patients with Advanced Non-Small-Cell Lung Cancer (진행성 비소세포폐암 환자에서 Gefitinib와 Erlotinib의 비교)

  • Lee, Jin Hwa;Lee, Kyoung Eun;Ryu, Yon Ju;Chun, Eun Mi;Chang, Jung Hyun
    • Tuberculosis and Respiratory Diseases
    • /
    • v.66 no.4
    • /
    • pp.280-287
    • /
    • 2009
  • Background: The epidermal growth factor receptor tyrosine kinase inhibitors (EGFR-TKIs), became an attractive therapeutic option for advanced non-small-cell lung cancer (NSCLC). Several studies suggested that there might be some different efficacy or response predictors between gefitinib and erlotinib. We compared the efficacy and toxicity of gefitinib and erlotinib in Korean patients with advanced NSCLC and evaluated specific predictors of response for both gefitinib and erlotinib. Methods: We collected the clinical information on patients with advanced NSCLC, who were treated with gefitinib or erlotinib at the Ewha Womans University Hospital, between July 2003 and February 2009. Median survival times were calculated using the Kaplan-Meier method. Results: Eighty-six patients (52 gefitinib vs. 34 erlotinib) were enrolled. Patient median age was 64 years; 53 (62%) subjects were male. Out of the 86 patients treated, 83 received response evaluation. Of the 83 patients, 35 achieved a response and 12 experienced stable disease while 36 experienced progressive disease, resulting in a response rate of 42% and a disease control rate of 57%. After a median follow-up of 502 days, the median progression-free and overall survival time was 129 and 259 days, respectively. Comparing patients by treatment (gefitinib vs erlotinib), there were no significant differences in the overall response rate (44% vs. 39%, p=0.678), median survival time (301 days vs. 202 days, p=0.151), or time to progression (136 days vs. 92 days, p=0.672). Both EGFR-TKIs showed similar toxicity. In a multivariate analysis using Cox regression model, adenocarcinoma was an independent predictor of survival (p=0.006; hazard ratio [HR], 0.487; 95% confidence interval [CI], 0.292-0.811). Analyses of subgroups did not show any difference in response predictors between gefitinib and erlotinib. Conclusion: Comparing gefitinib to erlotinib, there were no differences in the response rate, overall survival, progression-free survival, or toxicity. No specific predictor of response to each EGFR-TKI was identified.

A Study on Scenario to establish Coastal Inundation Prediction Map due to Storm Surge (폭풍해일에 의한 해안침수예상도 작성 시나리오 연구)

  • Moon, Seung-Rok;Kang, Tae-Soon;Nam, Soo-Yong;Hwang, Joon
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.19 no.5
    • /
    • pp.492-501
    • /
    • 2007
  • Coastal disasters have become one of the most important issues in every coastal country. In Korea, coastal disasters such as storm surge, sea level rise and extreme weather have placed many coastal regions in danger of being exposed or damaged during subsequent storms and gradual shoreline retreat. A storm surge is an onshore gush of water associated with a tow pressure weather system, typically in typhoon season. However, it is very difficult to predict storm surge height and inundation due to the irregularity of the course and intensity of a typhoon. To provide a new scheme of typhoon damage prediction model, the scenario which changes the central pressure, the maximum wind radius, the track and the proceeding speed by corresponding previous typhoon database, was composed. The virtual typhoon scenario database was constructed with individual scenario simulation and evaluation, in which it extracted the result from the scenario database of information of the hereafter typhoon and information due to climate change. This virtual typhoon scenario database will apply damage prediction information about a typhoon. This study performed construction and analysis of the simulation system with the storm surge/coastal inundation model at Masan coastal areas, and applied method for predicting using the scenario of the storm surge.

Study on the Fire Risk Prediction Assessment due to Deterioration contact of combustible cables in Underground Common Utility Tunnels (지하공동구내 가연성케이블의 열화접촉으로 인한 화재위험성 예측평가)

  • Ko, Jaesun
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.1
    • /
    • pp.135-147
    • /
    • 2015
  • Recent underground common utility tunnels are underground facilities for jointly accommodating more than 2 kinds of air-conditioning and heating facilities, vacuum dust collector, information processing cables as well as electricity, telecommunications, waterworks, city gas, sewerage system required when citizens live their daily lives and facilities responsible for the central function of the country but it is difficult to cope with fire accidents quickly and hard to enter into common utility tunnels to extinguish a fire due to toxic gases and smoke generated when various cables are burnt. Thus, in the event of a fire, not only the nerve center of the country is paralyzed such as significant property damage and loss of communication etc. but citizen inconveniences are caused. Therefore, noticing that most fires break out by a short circuit due to electrical works and degradation contact due to combustible cables as the main causes of fires in domestic and foreign common utility tunnels fire cases that have occurred so far, the purpose of this paper is to scientifically analyze the behavior of a fire by producing the model of actual common utility tunnels and reproducing the fire. A fire experiment was conducted in a state that line type fixed temperature detector, fire door, connection deluge set and ventilation equipment are installed in underground common utility tunnels and transmission power distribution cables are coated with fire proof paints in a certain section and heating pipes are fire proof covered. As a result, in the case of Type II, the maximum temperature was measured as $932^{\circ}C$ and line type fixed temperature detector displayed the fire location exactly in the receiver at a constant temperature. And transmission power distribution cables painted with fire proof paints in a certain section, the case of Type III, were found not to be fire resistant and fire proof covered heating pipes to be fire resistant for about 30 minutes. Also, fire simulation was carried out by entering fire load during a real fire test and as a result, the maximum temperature is $943^{\circ}C$, almost identical with $932^{\circ}C$ during a real fire test. Therefore, it is considered that fire behaviour can be predicted by conducting fire simulation only with common utility tunnels fire load and result values of heat release rate, height of the smoke layer, concentration of O2, CO, CO2 etc. obtained by simulation are determined to be applied as the values during a real fire experiment. In the future, it is expected that more reliable information on domestic underground common utility tunnels fire accidents can be provided and it will contribute to construction and maintenance repair effectively and systematically by analyzing and accumulating experimental data on domestic underground common utility tunnels fire accidents built in this study and fire cases continuously every year and complementing laws and regulations and administration manuals etc.