• Title/Summary/Keyword: 정보의 보호와 공유

Search Result 611, Processing Time 0.032 seconds

A Study on Contribution to Reducing Chemical Accidents of Reporting for Awarding a Contract of Hazardous Chemicals (유해화학물질 도급신고 제도가 화학사고 감소에 미치는 영향 연구)

  • Kim, Sungbum;Kwak, Daehoon;Jeong, Seongkyeong;Kim, Heetae;Mun, Dahui;Oh, Jun
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.3
    • /
    • pp.409-417
    • /
    • 2019
  • Purpose: Since the implementation of the Chemical Substance Management Act, data on the number of occurrences by annual chemical accident in Korea and the contractor's contract data received from the competent authority were used. After the implementation of the contract reporting system, the contribution to the reduction of chemical accidents is summarized by statistical data. The characteristics of each region, month, type and those of similar industries and human life were compared and analyzed. Method: 4 years of chemical accident statistics from 2015 to 2018 and since 2003, we have used data from the Chemical Safety Clearing-House (CSC), which provides safety information on cases of chemical accidents. Results and Conclusion: The risk of accidents increases as a number of unskilled workers are put into the workplace during the period when the hazardous chemical handling process is temporarily suspended. Through the reporting for awarding a contract, the operators are strengthening the safety management of chemical accidents by educating unskilled workers and wearing personal protective equipment.

Wearable oxygen saturation measurement platform for worker safety management (작업자의 안전관리를 위한 웨어러블 산소포화도 측정 플랫폼)

  • Lee, Yun Ju;Song, Chai Jong;Yoo, Sun Kook
    • Smart Media Journal
    • /
    • v.11 no.9
    • /
    • pp.30-38
    • /
    • 2022
  • It is important to grasp biometric data in real time for prompt action in the event of a safety accident at a work site where the risk of safety accidents exists. Among them, blood oxygen saturation is the most important factor in maintaining human life, so real-time oxygen saturation measurement and monitoring is necessary according to the situation as a preemptive response for worker safety management. By receiving real-time bio-signals from workers wearing health and life-risk protective clothing, and sharing and analyzing the worker's risk status in an external system, it is possible to diagnose the worker's current condition and efficiently respond to emergencies that may occur to the worker. In this paper, we propose a wearable oxygen saturation measurement platform technology that can monitor the risk of harmful gases and oxygen saturation of the wearer in real time and ensure the wearer's activity and safety in order to cope with emergency situations at the scene of an accident. If we overcome the limitations identified through the results of the proposed system later and apply improved biodata such as motion correction to the platform, we expect that it will be usable not only in hazardous gas environments, but also in hospitals and homes for emergency patients.

Research on the Investment environment changes and the business tax and value added tax in China (대중국 투자환경변화와 영업세 및 증치세에 관한 연구)

  • Park, Sang-Seob;Shin, Jae-Yeol;Pyun, Marley
    • Management & Information Systems Review
    • /
    • v.32 no.4
    • /
    • pp.127-153
    • /
    • 2013
  • The trend of China's industry has been changed from manufacturing industry based on cheap labor market to service industries gradually as a whole. The investment of Korean corporations toward Chines service industry is gradually being increased. The importance of Chinese service industry related taxations such as business tax and value-added tax are growing. This study, therefore, examines the changes of investment environment and does the business tax and VAT of growing importance in China. From the point of view that the taxation on services is mainly related to the business tax or VAT, this study, also, examines the changes of present condition of investment and corresponding trends of the Korean corporations, in accordance with the domestic investment environment changes tied to the business tax and the VAT in China. With regard to the business tax and the VAT, this study looks into their features and tax requisition and also makes comparison between them and VAT of Korea. This study examines the problems and situations from the cases of separation, integration and trial integration of the business tax and VAT, and also does the development direction of the above two taxation and the corresponding strategy of Korea and her companies The purpose of this study is to provide information about the changing trends of investment environment and the business tax and VAT and to present corresponding plan for the corporations advancing into China.

  • PDF

Design of Adaptive Security Framework based on Carousel for Cognitive Radio Network (인지무선네트워크를 위한 회전자 기반 적응형 보안프레임워크 설계)

  • Kim, Hyunsung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.165-172
    • /
    • 2013
  • Convergence is increasingly prevalent in the IT world which generally refers to the combination of two or more different technologies in a single device. Especially, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio (CR) is a convergence technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. However, the very process of convergence is likely to expose significant security issues due to the merging of what have been separate services and technologies and also as a result of the introduction of new technologies. The main purpose of this research is focused on devising an adaptive security framework based on carousel for CR networks as a distinct telecommunication convergence application, which are still at the stage of being developed and standardized with the lack of security concerns. The framework uses a secure credential, named as carousel, initialized with the location related information from objects position, which is used to design security mechanisms for supporting privacy and various securities based on it. The proposed adaptive security framework could be used as a security building block for the CR network standards and various convergence applications.

New QECCs for Multiple Flip Error Correction (다중플립 오류정정을 위한 새로운 QECCs)

  • Park, Dong-Young;Kim, Baek-Ki
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.907-916
    • /
    • 2019
  • In this paper, we propose a new five-qubit multiple bit flip code that can completely protect the target qubit from all multiple bit flip errors using only CNOT gates. The proposed multiple bit flip codes can be easily extended to multiple phase flip codes by embedding Hadamard gate pairs in the root error section as in conventional single bit flip code. The multiple bit flip code and multiple phase flip code in this paper share the state vector error information by four auxiliary qubits. These four-qubit state vectors reflect the characteristic that all the multiple flip errors with Pauli X and Z corrections commonly include a specific root error. Using this feature, this paper shows that low-cost implementation is possible despite the QECC design for multiple-flip error correction by batch processing the detection and correction of Pauli X and Z root errors with only three CNOT gates. The five-qubit multiple bit flip code and multiple phase flip code proposed in this paper have 100% error correction rate and 50% error discrimination rate. All QECCs presented in this paper were verified using QCAD simulator.

A hybrid intrusion detection system based on CBA and OCSVM for unknown threat detection (알려지지 않은 위협 탐지를 위한 CBA와 OCSVM 기반 하이브리드 침입 탐지 시스템)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Yun, Jiyoung;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.27-35
    • /
    • 2021
  • With the development of the Internet, various IT technologies such as IoT, Cloud, etc. have been developed, and various systems have been built in countries and companies. Because these systems generate and share vast amounts of data, they needed a variety of systems that could detect threats to protect the critical data contained in the system, which has been actively studied to date. Typical techniques include anomaly detection and misuse detection, and these techniques detect threats that are known or exhibit behavior different from normal. However, as IT technology advances, so do technologies that threaten systems, and these methods of detection. Advanced Persistent Threat (APT) attacks national or companies systems to steal important information and perform attacks such as system down. These threats apply previously unknown malware and attack technologies. Therefore, in this paper, we propose a hybrid intrusion detection system that combines anomaly detection and misuse detection to detect unknown threats. Two detection techniques have been applied to enable the detection of known and unknown threats, and by applying machine learning, more accurate threat detection is possible. In misuse detection, we applied Classification based on Association Rule(CBA) to generate rules for known threats, and in anomaly detection, we used One-Class SVM(OCSVM) to detect unknown threats. Experiments show that unknown threat detection accuracy is about 94%, and we confirm that unknown threats can be detected.

Diagnosis of Conflict Problem between the Marine Environmental Conservation and Development, and Policy Implication for Marine Spatial Planning (해양환경보전과 이용·개발의 상충 분석과 해양공간계획에 대한 시사점)

  • Lee, Dae In;Tac, Dae Ho;Kim, Gui Young
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.19 no.3
    • /
    • pp.227-235
    • /
    • 2016
  • This paper emphasized the necessity of the marine spatial planning (MSP) through the analysis of the major developmental projects which could make a contradiction based on the adequacy of the site selection and environmental impacts. The conflicting affairs between space utilization and management plan happen in the following ways: marine renewable energy development, sand mining, reclamation, construction of golf course in coastal area, thermal effluent and waste heat, erosion causing port development. The conflict of stakeholder continues caused by the accumulated environmental impact. For the reasons mentioned above, we found two things. First, it is necessary to comprehend the fact of developmental planning and MSP. Second, it is still unsatisfactory to connect the relevance of laws related to the spatial planning. For the reinforcement of marine environmental policy management, it is necessary to consolidate the property of site selection and assessment of developmental scale. Especially, while the strategic environmental assessment is in progress based on site selection and property of scale, consistent diagnosis is needed in the following concerns: the fact of the marine spatial planning, the relevance between national developmental plan and regional developmental plan, fisheries regulation, marine protected animals. For the environmentally sound and sustainable development (ESSD), MSP should have to be prepared based in a way of top-down including coastal and EEZ plan, relevance of ocean-use zoning and sector planning, 3-D spatial information. And also integrated information system have to be prepared through high-tech marine spatial information. In conclusion, consistent and relevant strategy for MSP should have to include the whole information related to the maritime affairs such as harbor, fishing port, fishing ground, coastal management, marine ecosystem generally.

A Study on Institutional Foundation on the Korea Counter-Terrorism System (한국 테러대응 시스템의 제도적 구축방안)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.27-61
    • /
    • 2010
  • This study looks at plans for the efficient functions of the current terror response system in Korea. The results are derived from by comparing and analyzing American, British, German, Japanese, and Korean terror response systems. It focuses especially on addressing some problems with Korea's terror response system and how to operate it effectively. The study will systematically compare and analyze each nation's terror countermeasure studying organizational, functional, and legal aspects as standards. This study shows that there is not an exclusive terror response center in Korea compared with other nations such as America, the United Kingdom, Germany, and Japan. Also it is difficult to expect effective and vigorous operations due to weak cooperation across the relevant organizations. The presidential directive of the state's anti-terrorism action guidelines is legally ineffective. This means that on legal grounds, it is difficult to take actions to prevent the terrorism. Therefore, keys to counteracting terrorism derived from this study are summarized below. In the first place, an integrated terror response system should be set up for expansion of information sharing which leads to emergence effect. In the second place, the superior legislative systems should be made for the cleardefinition and extent of what the terror is, rigid enforcement of investigation, immigration, and keeping an eye on the funds raised by terrorists and tracking down the terrorists, the plan for eco-terrorism. In the third place, to augment security of vital facilities and peoples' awareness of terrorism safety should be emphasized and a cooperative system between civil and government organizations need to be built. In the fourth place, system for crisis management must be provided in an effort to maximize management system of terrorism and unify a decentralized emergency countermeasures effectively.

  • PDF

A Strategy to Activate Design Industry for Provincial Development - Centering on the region of Daegu and Gyeongbuk - (지역발전을 위한 디자인산업 활성화 전략 -대구 경북지역을 중심으로-)

  • Yun, Young-Tae;Kim, Yun-Hee
    • Archives of design research
    • /
    • v.18 no.3 s.61
    • /
    • pp.55-62
    • /
    • 2005
  • Recently, the opening of the world economy and regional ization of national demand endless endeavors and investments to upbring design-industry for regional economic development. Our domestic commodities, declined in price competitiveness against China and Southeast Asian nations, need construction of brand image of commodities and consumers' response through expanded concernments in marketing spheres. The design-industry is a important means to strengthen competitiveness of the domestic industry through discrimination of commodities and creativity of high added value. Design-industry has some problems in circumstances; commodity development and marketing are below the level in the sphere of manufacture industry yet and businessmen are unwilling to invest demanded for development of new design. Establishment of the personal foundation, useful for accumulating competent designers' experiences and technologies, can not pass limit. In addition, a system and a policy to protect design-industry have a problem in effectiveness. Concrete strategies to activate design industry which meets social and cultural circumstances of Daegu and Gyeongbuk region are to establish policy for construction of specialists' infra, systematization of study & development of design, common ownership of information on design, and expansion of design company. The business to upbring design in the region should be operated to develop competitive commodities which is helpful to the regional economy and to increase value of the regional enterprises' brand. In addition, foundation of design should be expanded personal, material, and informational infra through design-centered so that they are helpful to activate economy of Daegu and Gyeongbuk through making design reformational cluster.

  • PDF

Algorithm to Search for the Original Song from a Cover Song Using Inflection Points of the Melody Line (멜로디 라인의 변곡점을 활용한 커버곡의 원곡 검색 알고리즘)

  • Lee, Bo Hyun;Kim, Myung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.5
    • /
    • pp.195-200
    • /
    • 2021
  • Due to the development of video sharing platforms, the amount of video uploads is exploding. Such videos often include various types of music, among which cover songs are included. In order to protect the copyright of music, an algorithm to find the original song of the cover song is essential. However, it is not easy to find the original song because the cover song is a modification of the composition, speed and overall structure of the original song. So far, there is no known effective algorithm for searching the original song of the cover song. In this paper, we propose an algorithm for searching the original song of the cover song using the inflection points of the melody line. Inflection points represent the characteristic points of change in the melody sequence. The proposed algorithm compares the original song and the cover song using the sequence of inflection points for the representative phrase of the original song. Since the characteristics of the representative phrase are used, even if the cover song is a song made by modifying the overall composition of the song, the algorithm's search performance is excellent. Also, since the proposed algorithm uses only the features of the inflection point sequence, the memory usage is very low. The efficiency of the algorithm was verified through performance evaluation.