• Title/Summary/Keyword: Certification scheme

Search Result 143, Processing Time 0.028 seconds

Legal Aspects for Quality Evaluation Standard of Plant Variety and Seed (식물 품종 및 종자의 품질평가 기준에 대한 규정현황)

  • 최근진
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.47
    • /
    • pp.200-215
    • /
    • 2002
  • There are some international standards and organization controling the quality characteristics of varieties and seeds such as UPOV, OECD, ISTA, AOSA. The National List system to check variety performance such as quality characteristics of plant varieties and seeds was established by each countries. The UPOV (International Union for the Protection of New varieties of Plant) regulates the requirement of plant variety protection that is distinctness (D), uniformity (U), stability (S) (here in after called DUS), Novelty and Denomination, and some quality characteristics are used to examine the requirement of plant variety protection by each crops. OECD (Organization for Economic Cooperation Development) seed scheme regulates the seed certification for seed trade between countries. ISTA (International Seed Testing Association) and AOSA(Association for Official Seed Analyst) regulates the seed analysis standard and methods. Most of the countries in Europe has the National List system, which check the value for cultivation and use(VCU), that is to say, variety performance such as yield, quality and stress to environment. All the seeds should be enlisted in the National List before sell the seed in their country. All the quality characteristics checked variety performance are for instance, amylose and amylopectin content in rice, molting quality, $\beta$-glucan, protein in barley, protein and sugar content in soybean, sugar and amylopectin content in corn etc. Conditions for the protection of new variety of plant are DUS. Quality characteristics may be the important characteristics and used to check DUS in crop by crop. It is very important to develop a new characteristics and establish standard method fur examine the VCU and DUS test for each crop.

Common Criteria of statistics using DEVS Modeling (DEVS 모델링을 이용한 보안제품 공동평가 통계)

  • Lee, Ki Sung;Kim, Tae Kyung;Seo, Hee Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.71-80
    • /
    • 2010
  • This thesis is purposed on developing security product co-evaluation statistics administrate program which is can administrate or analysis CC accreditation product using by DEVS modeling via portal site of member of CCRA. Via developing security product evaluation statistics administrate program, it can analysis the trend of all countries of the world in many ways, and noticed the ways of evaluation and accreditation of most countries via scheme analysis. Except this, it can analysis the situation of accreditation trend of any countries via data analysis of ICCC 2009. Also, For trend analysis to evaluation technique of CCRA member, it analyzed up to date technology and policy of the evaluation organization and the Certification Authority of most countries. And it peformed analysis the most trend of information security of evaluation authorization in CCRA member countries. In this program, It provide the function of trend statistics analysis which can statically analyzed the evaluation accreditation trends of most countries and automatical statistics by categorization ( by Product, Class and statistics in national) and report creation functions which can easily extraction and use the needed data. It has been updated the related informations until latest accredited product using by CC(Common Criteria) portal home page's data.

Six Sigma and the Cost of(Poor) Quality

  • Aca;U, Jichao-X
    • International Journal of Quality Innovation
    • /
    • v.3 no.2
    • /
    • pp.159-173
    • /
    • 2002
  • Any organization's Six Sigma program may be at high risk without heeding the lessons learned from the past and that tries to operate without a robust business foundation. A foundation that preferably should consist of stepping-stones such as a 5-S house-keeping program, an effective Integrated Management System (IMS), which includes a strong focus on planning for quality to fully capture the Voice of the Customer (VOC), and an organization-wide training scheme, as well as a reliable Cost of Poor Quality (COPQ) system. That's the best advise I can give to any organization that wishes to embark on a Six Sigma improvement program and hope to be successful. The paper will elaborate on the above issues and provide suggested solutions based on the review of published historical information and the experiences encountered over the last four decades by the author, as a quality practitioner and consultant, in industries that produced safety-critical product. This author maintains that few fundamentally new or useful things have been created in the field of Quality during the last couple of decades. Nevertheless, this paper deliberates on a number of relatively “newer” issues including the concept of “three types of customers”, the CTC, “Critical To Customer” term, the eight Quality Management Principles of the new ISO 9000 family, the growth of industry-specific standards, the adoption of Integrated Management Systems, the rebirth of AS2561 COQ standard, the spread of Six Sigma as well as related ASQ certification and the need for a robust business foundation to ensure Six Sigma survival.

A Study on Multi-Signature Scheme for Efficient User Authentication in Metaverse (메타버스 환경에서의 효율적인 사용자 인증을 위한 다중 서명 기법 연구)

  • Jae Young Jang;Soo Yong Jeong;Hyun Il Kim;Chang Ho Seo
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.27-35
    • /
    • 2023
  • Currently, online user authentication is perform using joint certificates issued by accredited certification authorities and simple certificates issued by private agency. In such a PKI(Public Key Infrastructure) system, various cryptographic technologies are used, and in particular, digital signatures are used as a core technology. The digital signature scheme is equally used in DID(Decentralized Identity), which is attracting attention to replace the existing centralized system. As such, the digital signature-based user authentication used in current online services is also applied in the metaverse, which is attracting attention as the next-generation online world. Metaverse, a compound word of "meta," which means virtual and transcendent, and "universe," means a virtual world that includes the existing online world. Due to various developments of the metaverse, it is expted that new authentication technologies including biometric authentication will be used, but existing authentication technologies are still being used. Therefore, in this study, we study digital signature scheme that can be efficiently used for user authentication in the developing metaverse. In particular, we experimentally analyze the effectiveness of ECDSA, which is currently used as a standard for digital signatures, and Schnorr signatures, which can quickly verify a large amount of signatures.

Key Exchange Protocol based on Signcryption in SMART Highway (SMART Highway 환경에서의 사인크립션 기반 키 교환 프로토콜)

  • Kim, Su-Hyun;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.2
    • /
    • pp.180-189
    • /
    • 2013
  • The SMART Highway project combines road construction with advanced technology and vehicle telecommunications. Its expected outcome is a world-leading intelligent road that is green, fast, and comfortable. A vehicular ad-hoc network(VANET) is the core technology of the SMART Highway, whose transport operation is based on road vehicles. The VANET is a next-generation networking technology that enables wireless communication between vehicles or between vehicles and a road side unit(RSU). In the VANET system, a vehicle accident is likely to cause a serious disaster. Therefore, some information on safety is essential to serve as the key exchange protocol for communication between vehicles. However, the key exchange scheme of the general network proposed for a fast-moving communication environment is unsuitable for vehicles. In this paper, communication between multiple vehicles more efficient and secure key exchange at the vehicle certification by signcryption is proposed.

A Study of Civil Unmanned Aerial System Category Classification (민간 무인항공기시스템 카테고리 분류에 관한 연구)

  • Ahn, Hyojung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.7
    • /
    • pp.657-667
    • /
    • 2015
  • With development of technology and increase of commercial demand for unmanned aerial system(UAS), the related regulation has been prepared and complemented with the advanced countries such as Unite States and European Union(EU). However it is difficult for regulation to cover all areas of UASs practically since UASs have been developed in a variety of configurations and performance depending on their purpose. Therefore the reasonable criteria for the classification of UASs and their category should be suggested before development of the regulation. For this reason, many countries have been studying the standard for UASs classification and International Civil Aviation Organization(ICAO) makes an effort to prepare the international standards. In this paper, the new classification scheme which can complement domestic regulation is suggested based on investigation of the global trend of UAS classification and their researches.

A Study on the Scheme of the Pulp Price Discrimination from Certified forests and Non-certified forests for Sustainable Forest Management (지속가능한 산림관리를 위한 인증산림과 비인증산림에서 생산된 펄프재의 가격차별화 방안)

  • Choi, Sang Hyun;Lee, Jae Hwan;Woo, Jong-Choon
    • Journal of Korean Society of Forest Science
    • /
    • v.103 no.4
    • /
    • pp.696-702
    • /
    • 2014
  • This study was conducted to provide resonable price of timber that come out from certified forests for sustainable forest management. To accomplish this study objectives, we analyzed compound interest method, willingness to pay (WTP) and price sensitivity measurement (PSM) when buying certified pulp. In case of compound interest method, we used prime cost by average price per ha of each area (Hongcheon, Inje, Shinnam) and unit price that add up the pulp price and investment costs. Interest rate reflects 2 to 6% and investment period apply to 5 years. WTP and PSM data were collected from questionnaire survey. As a result, if apply to interest rate of 2% and investment period of 3 years, result values are quite similar to WTP of 5% and optimal pricing point of PSM. That also showed similar pattern in each area.

Distributed Authentication Model using Multi-Level Cluster for Wireless Sensor Networks (무선센서네트워크를 위한 다중계층 클러스터 기반의 분산형 인증모델)

  • Shin, Jong-Whoi;Yoo, Dong-Young;Kim, Seog-Gyu
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.3
    • /
    • pp.95-105
    • /
    • 2008
  • In this paper, we propose the DAMMC(Distributed Authentication Model using Multi-level Cluster) for wireless sensor networks. The proposed model is that one cluster header in m-layer has a role of CA(Certificate Authority) but it just authenticates sensor nodes in lower layer for providing an efficient authentication without authenticating overhead among clusters. In here, the m-layer for authentication can be properly predefined by user in consideration of various network environments. And also, the DAMMC uses certificates based on the threshold cryptography scheme for more reliable configuration of WSN. Experimental results show that the cost of generation and reconfiguration certification are decreased but the security performance are increased compared to the existing method.

  • PDF

A Study on the amendment of regulation of Korean Seamen's Act to exempt the seafarers who have completed advanced safety refresher training from basic safety refresher training (선원법상 상급안전 재교육 이수자의 기초안전 재교육 면제 규정의 개정에 관한 연구)

  • HAN, Se-Hyun;CHO, Jang-Won;LEE, Chang-Hee
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.4
    • /
    • pp.925-935
    • /
    • 2016
  • It is provided that seafarers qualified in accordance with STCW(International Convention on Standards of Training Certification and Watch-keeping for Seafarers) convention and code in safety training shall be required, every five years, to provide evidence of having maintained the required standard of competence, to undertake the tasks, duties and responsibilities listed in Chapter VI, section A-VI/1 of the STCW Code A. Every party to the STCW Convention has amended the relevant national regulations according to the above international convention and code. These amended Seaman's Act require the updating safety training which is only five years valid for existing seafarers serving onboard ship on international voyage. And above specified existing seafarers must, as of the 1st January 2017, have documentary evidence of either having completed the training course or updated their training within the last 5 years. In relation to the above international trend, the Korean Ministry of Oceans and Fisheries also has completed an amendment to its Seaman's Act. But, the Korean Seaman's Act has a supplementary provision to exempt the seafarers who have completed STCW advanced safety training from basic safety training. The purpose of this study is to define the problems of above mentioned exemption provisions and to make better policies for improvement. In order to complete the purpose, the research team has conducted an in-depth survey of various foreign cases on STCW safety training. Moreover, the team has suggested an improvement scheme in consonance with Korean shipping industry and society through out this report.

Digital Video Watermarking Using Block Reordering Algorithm Based on DCT (DCT 기반의 블록 재정렬 알고리즘을 이용한 디지털 비디오 워터마킹)

  • Kim Kyoung-Sik;Park Kyung-Jun;Ko Hyung Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.696-705
    • /
    • 2005
  • The rapid progress of the software has enabled individuals to copy and remake digital contents, which was only done by professionals. However, this rapid growth of software has brought many other defects. As a solution to the problems, contents producer needs to have certification and inspection of its contents text and hold the proprietary rights. In this paper, the new video watermarking scheme is proposed which is appropriate for the requirements mentioned for digital video contents and it is applied to MPEG-2 video encoder and decoder. In order to insert watermark sequence for digital video data, watermarking used blocks reordering algorithm and SCL(secret code list). It is satisfied two properties of cryptography that confidentiality and integrity. We test the proposed algorithm to see its performance in terms of watermark capacity, compression robustness and visual quality impact. According to the experiment of proposed watermarking algorithm, we obtained satisfactory results that watermark can still be extracted after MPEG-2 re-encoding at lower bit rates. It is important property for data hiding and user authentication in video data.