• Title/Summary/Keyword: Establishment devices

Search Result 181, Processing Time 0.028 seconds

Assessment of The Priority Order of Monitoring Devices on Maintenance for The Long-Term Safety of Existing Fill Dam (기존 필댐 장기간 안전관리를 위한 계측항목 유지보수 우선순위 산정)

  • Lee, Jongwook;Jeon, Jaesung;Lim, Heuidae
    • Journal of the Korean GEO-environmental Society
    • /
    • v.10 no.7
    • /
    • pp.67-79
    • /
    • 2009
  • Although readjustment of monitoring system for existing fill dam maintenance is needed by the sustainable increasing of the abandonment rate of monitoring devices by malfunction through the life-cycle of dam, monitoring plans for long-term dam safety has relied on the experience and the opinion of minor expert group without systematic and quantitative analysis on the failure modes and the priority order of monitoring devices on maintenance. In this study the priority order of monitoring devices of existing 5 fill dams was evaluated quantitatively based on the preceding study (Andersen et al, 1999) and the result recommended the establishment of real-time monitoring system for seepage, pore pressure and crest settlement as the readjustment plan for existing fill dam monitoring system. This readjustment plan matches well with the recommendation of PWRI (1984), JCOLD (1986) and the results from Bagherzadeh-Khakkahali and Mirghasemi (2005).

  • PDF

Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things (사물인터넷의 경량화 장치를 위한 안전한 Pre-shared Key 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.1-6
    • /
    • 2015
  • The IoT(Internet of things) technology enable objects around user to be connected with each other for sharing information. To support security is the mandatory requirement in IoT because it is related to the disclosure of private information but also directly related to the human safety. However, it is difficult to apply traditional security mechanism into lightweight devices. This is owing to the fact that many IoT devices are generally resource constrained and powered by battery. PSK(Pre-Shared Key) based approach, which share secret key in advance between communication entities thereafter operate security functions, is suitable for light-weight device. That is because PSK is costly efficient than a session key establishment approach based on public key algorithm. However, how to safely set a PSK of the lightweight device in advance is a difficult issue because input/output interfaces such as keyboard or display are constrained in general lightweight devices. To solve the problem, we propose and develop a secure PSK configuration scheme for resource constrained devices in IoT.

A Study on Origin of Coastal-Offshore Illegal Fisheries and some Establishment Devices of Fishery Order in Korea (우리나라 연근해 불법어업의 유형별 발생원인과 어업질서 확립방안에 관한 연구)

  • CHOI, Jong-Hwa;JEONG, Do-Hun;CHA, Cheol-Pyo
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.14 no.2
    • /
    • pp.191-212
    • /
    • 2002
  • The economic and social bad influences of the illegal fishery bring about the results of the fishery resources exhaustion, of the fishery disorder and of the obstruction to sound management for fishery. The typical illegal fishery conducted in the coastal and offshore area of Korea can be divided as follows; fishery conducted by legally unauthorized method, fishery without permission from the Government, and fishery conducted in contravention of the laws and regulations concerning the fishing vessel, fishing gear and fishing method etc. The major reasons of origination of the illegal fishery in the coastal and offshore area of Korea are; Firstly, almost of the fishermen are poorly equipped in economical scale, Secondly, it is very easy to approach the illegal fishery because the domiciliation condition of the fishing village is deteriorated. Thirdly, almost of the fishermen are lacking in lawabiding spirit. Fourthly, the insolvent and unstable fisheries management policy with the lukewarm enforcement of the fisheries laws and regulations by the Government. Fifthly, the small scale family supporting fisheries are widespreaded. Sixthly, to retrieved the economical difficulties the fishermen are easily led astray the illegal fishery. As a conclusion the authors made some suggestions to stamp out the illegal fishery by this study. For the first, temptation fishermen into lawabiding fishery through intensification of the penal regulations is required. Second, simplification of the fishery type through combination of resemble fishing methods is required. Third, actual improvement of the fundamental fishery permission regime is required. Fourth, Introduction of the self-regulating or co-management system for the fishery management is required.

An efficient session management scheme for low-latency communications in 5G systems

  • Kim, Jae-Hyun;Kim, Seog-Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.83-92
    • /
    • 2020
  • In this paper, we propose an efficient session management scheme for low-latency communications in 5G systems. The main idea of the proposed scheme is to prevent unnecessary reattempt signalling overhead when the session establishment for low-latency communications fails. Also, this method avoids network resource waste and battery drain of mobile devices. If a UE(User Equipment) fails to establish an Always-on PDU session for low-latency communications with the 5G systems because of network failure or resource unavailability, the proposed method prevents the UE's re-establishment of the Always-on PDU session by the specific information in the NAS(Non-Stratum) message from the 5G systems. Through simulation, we show that the proposed efficient session management scheme (ESMS) minimizes unnecessary signalling overhead and improves battery efficiency of mobile devices compared to existing legacy mechanism in 5G systems.

A Study on the Analysis, and Improvement of Fire Investigation Related to Product Liability Law (제조물 책임법에 따른 화재조사의 실태분석 및 개선방안에 관한 연구)

  • Ko, Gi-Bong;Lee, Si-Young
    • Fire Science and Engineering
    • /
    • v.24 no.6
    • /
    • pp.112-119
    • /
    • 2010
  • In this research paper, the analysis, and improvement, of conditions of fire investigation related to products were derived. The results of the research showed that the main entity that plays the role of coordinator on the scene of fire investigation is unclear, systematic devices to protect the rights and interests of fire victims are inadequate, there are limitations in deriving the cause of fire due to the lack of fire appraisal organizations in fire departments, and the product companies are passive in their initial actions. As for improvement measures, it was found that the adoption of the system in which fire departments can play the role of mediator on the scene of fire investigation, the establishment and operation of fire appraisal organizations and research institutes in fire departments, and the establishment of network between fire departments and product companies are needed.

Effects of Technology Transfer Policies on the Technical Efficiency of Korean University TTOs

  • HAN, JAEPIL
    • KDI Journal of Economic Policy
    • /
    • v.40 no.4
    • /
    • pp.23-45
    • /
    • 2018
  • The Korean government has provided various policy devices to boost technology transfers between academia and industry since the establishment of the Technology Transfer Promotion Act in 2000. Along with the enactment of the law, the Korean government mandated the establishment of a technology transfer office at national and public universities and encouraged technology transfer activities. Despite the quantitative expansion of technology transfer offices (TTOs), operational inefficiency was brought up. As a supplementary policy, the Korean government implemented a line of projects to support the labor and business expenses of leading TTOs. This research questions whether the project greatly affected the technical efficiency of TTOs. We analyze publicly available university panel data from 2007 to 2015 using a one-step stochastic frontier analysis. The results suggest that the program was marginally effective at shifting the technical efficiency distribution to the right on average, but it failed to maximize its impact by diversifying the policy means based on targets. The marginal effects of the program on technical efficiency differ according to the research capability and size of each school. We also compare technical efficiency against the licensing income at the start and end of the program. Technical efficiency increased for the leading TTOs, and both measures show improvements for unsupported TTOs. Our empirical results imply that diversifying the program for universities with different characteristics may have improved the effectiveness of the policy.

Countermeasure to Underlying Security Threats in IoT communication (사물인터넷 통신기술에 내재된 보안위협과 대응 전략)

  • Mun, Hyung-Jin;Choi, Gwang-Houn;Hwang, Yooncheol
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.37-43
    • /
    • 2016
  • Due to the remarkable improvement of ICT, with the popularization of mobile devices and every sector of society connected by networks, an era, in which peer to peer, peer to thing, thing to thing can be connected to one another everywhere, has begun. As all the electronic devices are connected to Internet, they have become more intellectualized and automated, making convergence and process of information through the connection of the devices possible to provide a lot better services. However, those devices communicate mutually to send information and they are exposed to various security threats. Therefore, this study analyzes ZigBee, CoAP, MQTT, XMPP, which are communication-related technology of IoT, draws security threats they have, and suggests requirements that components of IoT should have. Plus, it examines real cases about security threats in IoT, and suggests a countermeasure so as to contribute to establishment of a basis for IoT to be used much more safely in the future.

A Study of Authentication Scheme using Biometric-Based Effectiveness Analysis in Mobile Devices (모바일 장치에서 신체정보기반의 효용성 분석을 이용한 인증기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.795-801
    • /
    • 2013
  • As the life which existed only offline has changed into a life part of which is led online, it is an important problem to identify whether an online user is legitimate one or not. Biometric authentication technology was developed to identify the user more correctly either online or in offline daily life. Biometric authentication is a technology where a person is identified by his or her unique characteristics, and is highlighted as a next-generation authentication technology replacing password. There are various kinds of traits unique to each individual, and biometric authentication technologies drawing on such traits use various devices and algorithms. Firstly, this paper classified such various biometric authentication technologies, and analyzed the effects of them when they are applied on smartphone, smartwatch and M2M of the different devices platforms. Secondly, it suggested the effectiveness-based AIB(Authentication for Integrated Biometrics) authentication technique, a comprehensive authentication technique, which can be used in different devices platforms. We have successfully included the establishment scheme of the effectiveness authentication using biometrics.

Effect of Media Literacy on the Formation of Smart Divide (미디어 리터러시가 스마트 디바이드 형성에 미치는 영향)

  • Lee, Seungmin
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.2
    • /
    • pp.19-38
    • /
    • 2021
  • This study empirically analyzed the effect of media literacy on the formation of the smart divide, which is a multi-faceted digital divide that occurs in the context of the use of smart devices. As a result, most of the factors of media literacy affect the establishment of social relations and social network through the use of smart devices, which, in turn, leads to the expansion of the range of informational and social activities. In addition, media literacy has a significant effect on the competence to evaluate the value of information acquired through the use of smart devices. Based on these results, there can be social disparity between those who have secured media literacy and those who do not from the perspective of informational and social benefits through the use of smart devices, which can function as a mechanism to generate the smart divide.

Mutual Authentication and Key Establishment Protocol to Implement Secure M2M Communication Environments (안전한 M2M 통신 구축을 위한 상호인증 및 키 교환 프로토콜)

  • Eun, Sun-Ki;Jeon, Seo-Kwan;Ahn, Jae-Young;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.73-83
    • /
    • 2010
  • Recently, as IT technologies developed, communication technologies of a various forms that satisfied convenience of user are being researched. Among various research, unlike traditional forms of communication, M2M communication is getting attention that without any control or involvement of people to establish communication between devices. However, the M2M communication could more easily be exposed to many security problems such as data exposure, data theft, unauthorized change and delete and privacy. Therefore, in this paper, we derive security requirements and propose the M2M communication architecture that provide a secure M2M communication environment. Also, we propose a secure mutual authentication and key establishment protocol between a M2M device or gateway domain and a M2M network domain. The proposed protocol is secure against replay attack, impersonation attack and protect a user privacy and tracing.