• Title/Summary/Keyword: 인증기술

Search Result 3,848, Processing Time 0.034 seconds

The characteristics of Pacioli's Bookkeeping (파치올리 부기론의 특성에 관한 고찰)

  • Yoon Seok-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.297-306
    • /
    • 2005
  • Compendium of arithmetic, geometry, and proportions and proportionality' that was published in Venice in 1494 has been recognized as the first bookkeeping data in the world. Major characteristics of Pacioli's bookkeeping rules were reviewed in this study as follows: All the necessary particulars for double entry bookkeeping were provided in Pacioli's bookkeeping rules;. List of property was described at the time of start of business; Three major books were used; Details of daily transactions were considered to be important; Strike through was lined at each description in journal books, details of daily transactions, and list of property after entry of ledger; Amount columns were provided and Arabic numerals were used; Annual settlement custom was being initiated; Profit and loss account was prepared at year-end; Trial balance sheet was inevitably described; Books were verified prior to closing accounts; Control account was not established; Financial statements were not prepared and business analysis was made, too; Finished goods inventory was not adjusted; Mark was assigned to books; Inter-office account was prepared; Branch accounts and branch ledgers were prepared; There was entries of trust; Current arrangement was described; The principle 'Cost or market price, whichever is lower basis' was promoted: Petty cash system is explained Checks and bills of exchange are used in bank account. As mentioned, characteristics of Pacioli's bookkeeping rules were reviewed; the signs of necessity for preparation of profit and loss statement and balance sheet is found as well as preparation of trial balance sheet and the rules may be considered as a very excellent one in terms of the bookkeeping on initiating stage of double entry bookkeeping.

  • PDF

Molecular epidemiological study of measles virus throughout an imported epidemic outbreak in Gyeonggi-do in 2014 (2014년 경기지역에서 발생한 해외유입 홍역 바이러스의 분자역학적 특성 분석)

  • Yun, Hee-Jeong;Park, Po-Hyun;Hwang, Sun-Il;Huh, Jeong-Weon;Nam, Soo-Jung;Yong, Kum-Chan;Yoon, Mi-Hye
    • Korean Journal of Microbiology
    • /
    • v.53 no.1
    • /
    • pp.1-8
    • /
    • 2017
  • Measles virus is a highly contagious, exanthematic virus, preventable by the use of an effective live-attenuated vaccine. However, measles virus remains endemic in many area of the world causing nearly 200,000 deaths per year and still a major cause of child mortality, mostly in developing countries. In March 2014, Republic of Korea was certified as a 'national measles elimination' by the WHO as a result of a high-quality case-based surveillance system and population immunity, which was achieved by a high vaccination rate (>95.0% since 1996). But, since the beginning of 2014, the Gyeonggi province has experienced a resurgence of measles cases. In this study, we investigated the characteristics of measles viruses isolated from confirmed measles in Gyeonggi province during January 1, 2014 ~ July 31, 2014, 60 isolates were obtained from 72 confirmed measles specimens. Genotypic distributions and genetic diversities of isolated measles virus were analyzed by sequencing of nucleoprotein (N) gene. 58 (96.7%) imported cases were identified. The predominant genotype was B3, which reflects the circulating measles virus in adjacent countries. The sequences of nucleoprotein (N) gene of isolated MeV were showed that the strains characterized showed the highest degree of identity (99%) with the Philippine related strains in 2013-2014. Therefore, infected traveler returning from the Philippines transmitted secondary infection in Korea.

우리나라의 갈릴레오 탐색구조 지상시스템 개발 참여 방안

  • Ju, In-Won;Lee, Sang-Uk;Kim, Jae-Hun;Seo, Sang-Hyeon;Han, Dong-Su;Im, Jong-Geun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.608-611
    • /
    • 2006
  • COSPAS-SARSAT 시스템은 위성체와 지상 설비를 이용하여 항공기 또는 선박 등이 조난 시에 탐색구조(SAR: Search and Rescue) 활동을 도울 수 있도록 조난경보와 위치정보를 제공하는 시스템이다. COSPAS-SARSAT 서비스의 경우, 조난신호 접수에서 조난위치확정까지 평균 1시간 이상이 소요되고, 위치정확도가 수 Km 정도로 범위가 넓은 편이다. 이러한 문제점을 개선하기 위해서 중궤도 위성을 이용한 차세대 탐색구조 시스템 개발이 추진 중에 있으며 EU에서 2011년 FOC(Full Operation Capability)를 목표로 개발중인 갈릴레오 항법위성 프로젝트의 경우 SAR 중계기를 탑재하여 탐색구조 서비스를 제공할 계획에 있다. 갈릴레오 탐색구조(SAR/Galileo) 서비스는 수 m급의 위치정확도, 10분 이내의 조난신호 접수에서 구조까지 소요시간, 및 조난자에게 회신링크 서비스 제공 등 보다 향상된 탐색구조 성능을 제공하기 위해 개발 중에 있으므로, 갈릴레오 위성 서비스가 시작되면 탐색구조시스템 체계에 보다 신속하고 정확한 구조가 가능할 것으로 예상된다. 우리나라에서는 COSPAS-SARSAT 회원국으로 가입하여 현재 송도 해양경찰청 내에 LEOLUT와 MCC가 설치되어 운용되고 있다. 날로 더해가는 다양한 재난에 대한 인명구조를 신속하고 효과적으로 대처하기 위해 차세대 갈릴레오 탐색구조 지상국 도입이 절실하다고 할 수 있다. 따라서, 탐색구조 단말기를 포함한 지상국 인프라의 구축 등 갈릴레오 탐색구조 지상시스템 개발의 참여 방안에 관한 연구는 매우 시기적절하고 중요한 연구이다. 본 논문은 갈릴레오 사업에 참여하여 SAR/Galileo 개발을 주관하고 있는 중국의 사례를 분석함으로 우리나라가 차세대 갈릴레오 탐색구조 지상시스템 개발에 참여하기 위해서 필요한 참여방법 및 절차 등을 도출하고, 참여 가능한 개발범위, 참여전략 및 추진체계에 대해서 제안한다.법의 성능을 평가를 위하여 원본 여권에서 얼굴 부분을 위조한 여권과 기울어진 여권 영상을 대상으로 실험한 결과, 제안된 방법이 여권의 코드 인식 및 얼굴 인증에 있어서 우수한 성능이 있음을 확인하였다.진행하고 있다.태도와 유아의 창의성간에는 상관이 없는 것으로 나타났고, 일반 유아의 아버지 양육태도와 유아의 창의성간의 상관에서는 아버지 양육태도의 성취-비성취 요인에서와 창의성제목의 추상성요인에서 상관이 있는 것으로 나타났다. 따라서 창의성이 높은 아동의 아버지의 양육태도는 일반 유아의 아버지와 보다 더 애정적이며 자율성이 높지만 창의성이 높은 아동의 집단내에서 창의성에 특별한 영향을 더 미치는 아버지의 양육방식은 발견되지 않았다. 반면 일반 유아의 경우 아버지의 성취지향성이 낮을 때 자녀의 창의성을 향상시킬 수 있는 것으로 나타났다. 이상에서 자녀의 창의성을 향상시키는 중요한 양육차원은 애정성이나 비성취지향성으로 나타나고 있어 정서적인 측면의 지원인 것으로 밝혀졌다.징에서 나타나는 AD-SR맥락의 반성적 탐구가 자주 나타났다. 반성적 탐구 척도 두 그룹을 비교 했을 때 CON 상호작용의 특징이 낮게 나타나는 N그룹이 양적으로 그리고 내용적으로 더 의미 있는 반성적 탐구를 했다용을 지원하는 홈페이지를 만들어 자료 제공 사이트에 대한 메타 자료를 데이터베이스화했으며 이를 통해 학생들이 원하는 실시간 자료를 검색하여 찾을 수 있고 홈페이지를 방분했을 때 이해하기 어려운 그래프나 각 홈페이지가 제공하는 자료들에 대한 처리 방법을 도움말로 제공받을 수 있게 했다. 실시간 자료들을 이용한 학습은 학생들의 학습 의욕과 탐구 능력을 향상시켰으며 컴퓨터 활용 능력과 외국어 자료 활용 능력을 향상 시키는데도 도움을 주었다.지역산업 발전을 위한 기술역량이 강화될 것이다.정 ${\rightarrow}$ 분배 ${\rightarrow}$ 최대다수의 최대행복이다.는 역할을 한다. 따라

  • PDF

(An HTTP-Based Application Layer Security Protocol for Wireless Internet Services) (무선 인터넷 서비스를 위한 HTTP 기반의 응용 계층 보안 프로토콜)

  • 이동근;김기조;임경식
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.3
    • /
    • pp.377-386
    • /
    • 2003
  • In this paper, we present an application layer protocol to support secure wireless Internet services, called Application Layer Security(ALS). The drawbacks of the two traditional approaches to secure wireless applications motivated the development of ALS. One is that in the conventional application-specific security protocol such as Secure HyperText Transfer Protocol(S-HTTP), security mechanism is included in the application itself. This gives a disadvantage that the security services are available only to that particular application. The other is that a separate protocol layer is inserted between the application and transport layers, as in the Secure Sockets Layer(SSL)/Transport Layer Security(TLS). In this case, all channel data are encrypted regardless of the specific application's requirements, resulting in much waste of network resources. To overcome these problems, ALS is proposed to be implemented on top of HTTP so that it is independent of the various transport layer protocols, and provides a common security interface with security applications so that it greatly improves the portability of security applications. In addition, since ALS takes advantages of well-known TLS mechanism, it eliminates the danger of malicious attack and provides applications with various security services such as authentication, confidentiality integrity and digital signature, and partial encryption. We conclude this paper with an example of applying ALS to the solution of end-to-end security in a present commercial wireless protocol stack, Wireless Application Protocol.

A Wireless AP Power Saving Algorithm by Applying Sleep Mode and Transmission Power Coordination in IoT Environments (사물 인터넷 환경에서 무선 AP의 수면 모드 운영 및 송출 전력 조절을 통한 전력 소비 절감 알고리즘)

  • Jeong, Kyeong Chae;Choi, Won Seok;Choi, Seong Gon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.11
    • /
    • pp.393-402
    • /
    • 2014
  • We have experienced an explosive increase of the IoT(Internet of Things) technology based devices including smart phones and the wireless communications. Also the growing power consumption in IEEE 802.11 WLANs(Wireless LANs) driven by these dramatic increases in not only mobile users and but also wireless APs(Access Points). To reduce the power consumption, this paper proposes a wireless AP power saving algorithm, which minimizes the transmission power without decrease the transmission and carrier sense ranges. A wireless AP which is use in our algorithm checks its own original coverage periodically for whether there is a new STA(Station) or not when its transmission power is decreased. Moreover, if there are no signaling message to connect the wireless AP, it changes its operation mode Wake-up to sleep. A Result shows that the proposed AP algorithm can reduce the total power consumption of the wireless AP approximated 18% and 35% compared to the conventional wireless AP with and without the existing power saving algorithm, respectively.

A study on Communication Robustness Testing for Industrial Control Devices (산업용 제어기기의 통신 견고성 시험 방안 연구)

  • Park, Kyungmi;Shin, Donghoon;Kim, WooNyon;Kim, SinKyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1099-1116
    • /
    • 2019
  • Industrial control systems(ICS) are widely used in various industrial area and critical infrastructure. To mitigate security threats on ICS, the security assurance test for industrial control devices has been introduced and operating. The test includes testing of the security function of the device itself and testing of communication robustness. In this paper, we describe the security requirements of EDSA, Achilles, and Korea's TTA standard(security requirements for ICS). And also, we analyzed the characteristics of communication robustness test(CRT) of each certification. CRT verifies the device's operation of essential function while transmitting fuzzing and stress packets. Existing test methods are mostly focused on the embedded devices and are difficult to apply to various devices. We propose a method to test communication robustness which reflect the characteristics of control H/W, control S/W, field devices and network devices in ICS. In the future, we will apply the proposed communication robustness test to actual products and present solutions for arising issues.

A Scheme for listing on FAO GIAHS and Preservation of Juk-Bang-Ryeum in the Southern Coast of Korea (남해안 죽방렴의 세계중요농어업유산 등재 및 보존 방안)

  • Lee, Kyung-Joo;Kwon, Hojong;Jeong, Dae-Yul
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.4
    • /
    • pp.325-336
    • /
    • 2019
  • There are many bamboo weir (Juk-Bang-Ryeum) with the highest preservation value as a fisheries heritage from Sacheon to Namhae area in the Korea Hanrye National Marine Park. It was designated as a Korea National Cultural Property Sightseeing No. 71, and also as an important fishery asset listed in the Korea National Important Fisheries Heritage No. 3. It is an important cultural heritage that should be preserved for the future as a community asset to the local residents, and should be preserved as it's original form because of unique traditional fishery style in the world as well as natural environment oriented fishing system. The purpose of this study is to review the value of Juk-Bang-Ryeum in the South Sea as well as to preserve the tradition of it. This paper will make a contribution to the registration of it on the list of World Important Agricultural and Fishery Heritage (GIAHS), which is recognized by the United Nations Food and Agriculture Organization (FAO). To make basic data for listing on it, we will analyze the characteristics and structure of Juk-Bang-Ryeum, and also research the value of it from the historical literature review as well state of arts. We also develop a scheme for listing on FAO GIAHS through checking necessary items step by step. Finally, we suggest some idea to preserve it more effectively.

Designing a Platform Model for Building MyData Ecosystem (마이데이터 생태계 구축을 위한 플랫폼 모델 설계)

  • Kang, Nam-Gyu;Choi, Hee-Seok;Lee, Hye-Jin;Han, Sang-Jun;Lee, Seok-Hyoung
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.123-131
    • /
    • 2021
  • The Fourth Industrial Revolution was triggered by data-driven digital technologies such as AI and big data. There is a rapid movement to expand the scope of data utilization to the privacy area, which was considered only a protected area. Through the revision of the Data 3 Act, laws and systems were established that allow personal information to be freely transferred and utilized under their consent. But, it will be necessary to support the platform that encompasses the entire process from collecting personal information to managing and utilizing it. In this paper, we propose a platform model that can be applied to building mydata ecosystem using personal information. It describes the six essential functional requirements for building MyData platforms and the procedures and methods for implementing them. The six proposed essential features describe consent, sharing/downloading/ receipt of data, data collection and utilization, user authentication, API gateway, and platform services. We also illustrate the case of applying the MyData platform model to real-world, underprivileged mobility support services.

Content Regulation: Meeting the Regulatory Challenge in the Age of Media Convergence (미디어 융합시대 콘텐츠 규제방안과 과제 - 심의제도를 중심으로 -)

  • Ahn, Jung-Mihn
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.155-184
    • /
    • 2013
  • This study takes a critical perspective that current vertical regulatory framework for broadcasting, telecommunications, films and games cannot cope with media development in the age of convergence. Changes in media environment mitigate the uniqueness of terrestrial television causing doubts as to why television contents should be treated more strictly than the rest of media contents. Consensus is being reached that horizontal regulation would be the appropriate regulatory measure for media contents. However, which content should be aligned to what level of regulations have not been fully dealt with. The paper shows that the current regulatory framework which is established according to each delivery platform is no longer valid in convergent media environment. It shows why all content regulation should be applied in platform neutral manner. Then it also suggests both short and long term regulatory changes that need to be made in order to meet the future challenges in media convergence era.

Key Exchange Protocols for Domestic Broadband Satellite Access Network (광대역 위성 엑세스 방을 위한 키 교환 프로토콜 제안)

  • 오흥룡;염흥열
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.13-25
    • /
    • 2004
  • The key exchange protocols are very crucial tools to provide the secure communication in the broadband satellite access network. They should be required to satisfy various requirements such as security, key confirmation, and key freshness. In this paper, we present the guideline of security functions in BSAN(Broadband Satellite Access Network), and analyze the specification of the security primitives and the hey exchange Protocols for the authenticated key agreement between RCST(Return Channel Satellite Terminal) and NCC(fretwork Control Centre). In addition, we propose the security specification for a domestic broad satellite network based on the analysis on the analysis profile of ETSI(European Telecommunications Standards Institute) standards. The key exchange protocols proposed in ETSI standard are vulnerable to man-in-the-middle attack and they don't provide key confirmation. To overcome this shortcoming, we propose the 4 types of the key exchange protocols which have the resistant to man-in-the-middle-attack, key freshness, and key confirmation, These proposed protocols can be used as a key exchange protocol between RCST and NCC in domestic BSAN. These proposed protocols are based on DH key exchange protocol, MTI(Matsumoto, Takashima, Imai) key exchange protocol, and ECDH(Elliptic Curve Diffie-Hellman).