• Title/Summary/Keyword: Protection model

Search Result 2,212, Processing Time 0.026 seconds

A Study on Development of Fire Accident Analysis System Using Classification Model and Database (화재사고 분류모델 및 데이터베이스를 이용한 화재사고 분석시스템 구축에 관한 연구)

  • Kim In-Tae;Heo Jaeseok;Song Hee-Oeul;Ko Jae-Wook;Kim In-Won
    • Journal of the Korean Institute of Gas
    • /
    • v.2 no.1
    • /
    • pp.90-98
    • /
    • 1998
  • In order to establish detailed plans for fire protection and reduce the possible fire accidents in the future, collection of domestic and foreign fire accident cases and fundamental analysis are very important. In this study the classification model for fire accidents was developed and the direction to a new model was suggested by comparison ours with the accidents classification model of NFPA of United States of America and Japan. A new developed PC-based database program for fire accidents (FADBS) was used to analyse fire accidents easily and efficiently.

  • PDF

Effective Evaluation of Quality of Protection(QoP) in Wireless Network Environments (무선 네트워크 환경에서의 효과적인 Quality of Protection(QoP) 평가)

  • Kim, Hyeon-Seung;Lim, Sun-Hee;Yun, Seung-Hwan;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.97-106
    • /
    • 2008
  • Quality of Protection(QoP) provides a standard that can evaluate networks offering protection. Also, QoP estimates stability of the system by quantifying intensity of the security. Security should be established based on the circumstance which applied to appropriate level, and this should chose a security policy which fit to propose of network because it is not always proportioned that between stability of security mechanism which is used at network and performance which has to be supported by system. With evolving wireless networks, a variety of security services are defined for providing secure wireless network services. In this paper, we propose a new QoP model which makes up for weak points of existing QoP model to choose an appropriate security policy for wireless network. Proposed new QoP model use objectively organized HVM by Flow-based Abnormal Traffic Detection Algorithm for constructing Utility function and relative weight for constructing Total reward function.

Evaluation of International BIM Standard Contracts to establish BIM Copyrights and Operational Protocols in Korea (국제 BIM 표준계약서 분석을 통한 국내 BIM 저작권 보호 및 운용 체계 수립에 관한 연구)

  • Koo, Bonsang;Shin, Byungjin
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.6
    • /
    • pp.24-30
    • /
    • 2016
  • Building Information Modeling, and its associated work practices, requires project participants to share not only 3D geometric data, but also information in the model that may be considered proprietary and even trade secrets. Thus protection of intellectual property, or BIM copyrights, must be in place for participants to share proprietary information among project stakeholders. Currently Korea does not have adequate copyright laws or mechanisms to provide such protection. This research examined three BIM copyright legal documents, namely U.S.' ConsensusDOCS 301, AIA Document E203/G202, and U.K.'s CIC BIM Protocol to determine how copyright protection is realized, and to formulate appropriate stipulations within the Korean construction context. The resultant requirements include stipulating ownership at to the BIM originator, adopting a license-sublicense scheme, employing a federated model, and use of a formal model delivey table to allocate responsibilities. Given Korea's adoption stage, liability should be minimal, and license revocation should be allowed if payments are not met. The three BIM legal documents focus on practical measures that allow participants to customize requirements for individual projects, and such conventions should be emulated in Korea.

A Study on the Characteristics of an Optical Sensor Linear Fire Detection System with Miniature Model Fire Experiment (축소 모형실험을 통한 광센서 선형 화재 감지 시스템의 특성에 관한 연구)

  • Kim, Dong-Eun;Kim, Si-Kuk;Lee, Young-Sin;Lee, Chun-Ha;Lim, Woo-Sup
    • Fire Science and Engineering
    • /
    • v.30 no.2
    • /
    • pp.19-26
    • /
    • 2016
  • In this study, we conducted a low temperature operating test and miniature tunnel model test to study the fire detection capability and properties of an early fire detection system using an optical sensor linear detector that can be installed in harsh environments such as tunnel or utility-pipe conduits which are becoming the major and national infrastructure facilities. The test showed that the optical sensor linear detector was the only one functioned properly among five thermal detectors installed at a low temperature of $-20^{\circ}C$ for 5 days. To study were analyzed adaptability of optical sensor linear detector in the windy tunnel, the operating properties of the optical sensor linear detector when the wind velocity was varied between 0 m/s and 1 m/s in a miniature tunnel model. The temperature change was high when the wind velocity was 0 m/s.

Distribution Business Model and Protecting Management System of Contents for IPTV (IPTV를 위한 콘텐츠의 유통 비즈니스 모델 및 보호관리)

  • Ryu, Jee-Woong;Bang, Jin-Suk;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.4
    • /
    • pp.845-850
    • /
    • 2011
  • In this paper, we proposed the digital contents distribution business model for the operation of integration between heterogeneous systems in order to use IPTV. Also, we designed and implemented the protection management system through this distribution business model. This proposed model maintains interoperability between the heterogeneous systems, creates rights protection document based on REL, and provides the new version of packaged digital contents to itself by packaging the digital contents. Overall, it ultimately offers an interoperable environment. Moreover, since we pre-defines the relations among REL data based on MPEG-21 standard, which creates the newly packaged digital contents, it is easy to edit data. We can expect to save expenses of digital contents distribution and rights protection technology. Additionally, we can further improve security by encapsulating the security technology of CAS and DRM system.

The Effect of Ambiguity Aversion on Self-Protection and Self-Insurance effort (모호성 회피성향이 손실 발생 확률 및 손실 크기를 줄이기 위한 노력에 미치는 영향)

  • Hong, Ji-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.4
    • /
    • pp.433-438
    • /
    • 2018
  • This study examined the effects of ambiguity aversion on the self-protection and self-insurance efforts using a two-period model to consider the time difference between making an effort and occurring loss, which is in contrast with the existing one-period model. The loss follows a binary distribution while the distribution is ambiguous. The distribution depends on the state variable. First, the effort of ambiguity averse individuals is not always greater than that of ambiguity neutral ones. Second, the effects of absolute ambiguity aversion (AAA), which does not appear in one-period model, were observed. Not-increasing AAA is a sufficient condition to increase the efforts of ambiguity averse individuals compared to those of ambiguity neutral ones. In addition, the change in effort also depends on the probability function of the state. Lastly, the results hold even when the individual is risk neutral or risk loving. As a result, ambiguity aversion needs to be considered independently with risk aversion.

Biometric Template Security for Personal Information Protection (개인정보 보호를 위한 바이오인식 템플릿 보안)

  • Shin, Yong-Nyuo;Lee, Yong-Jun;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.4
    • /
    • pp.437-444
    • /
    • 2008
  • This paper deals with the biometric template protection in the biometric system which has been widely used for personal authentication. First, we consider the structure of the biometric system and the function of its sub-systems and define the biometric template and identification(ID) information. And then, we describe the biometric template attack points of a biometric system and attack examples and provide their countermeasures. From this, we classify the vulnerability which can be protected by encryption and hashing techniques. For more detail investigation of these at real operating situations, we analyze them and suggest several protection methods for the typical application scheme of biometric systems such as local model, download model, attached model, and center model. Finally, we also handle the privacy problem which is most controversy issue related to the biometric systems and suggest some guidances of safeguarding procedures on establishing privacy sympathy biometric systems.

Piezoelectric impedance based damage detection in truss bridges based on time frequency ARMA model

  • Fan, Xingyu;Li, Jun;Hao, Hong
    • Smart Structures and Systems
    • /
    • v.18 no.3
    • /
    • pp.501-523
    • /
    • 2016
  • Electromechanical impedance (EMI) based structural health monitoring is performed by measuring the variation in the impedance due to the structural local damage. The impedance signals are acquired from the piezoelectric patches that are bonded on the structural surface. The impedance variation, which is directly related to the mechanical properties of the structure, indicates the presence of local structural damage. Two traditional EMI-based damage detection methods are based on calculating the difference between the measured impedance signals in the frequency domain from the baseline and the current structures. In this paper, a new structural damage detection approach by analyzing the time domain impedance responses is proposed. The measured time domain responses from the piezoelectric transducers will be used for analysis. With the use of the Time Frequency Autoregressive Moving Average (TFARMA) model, a damage index based on Singular Value Decomposition (SVD) is defined to identify the existence of the structural local damage. Experimental studies on a space steel truss bridge model in the laboratory are conducted to verify the proposed approach. Four piezoelectric transducers are attached at different locations and excited by a sweep-frequency signal. The impedance responses at different locations are analyzed with TFARMA model to investigate the effectiveness and performance of the proposed approach. The results demonstrate that the proposed approach is very sensitive and robust in detecting the bolt damage in the gusset plates of steel truss bridges.

Age-Specific Thyroid Internal Dose Estimation for Koreans

  • Kwon, Tae-Eun;Yoon, Seokwon;Ha, Wi-Ho;Chung, Yoonsun;Jin, Young Woo
    • Journal of Radiation Protection and Research
    • /
    • v.46 no.4
    • /
    • pp.170-177
    • /
    • 2021
  • Background: The International Commission on Radiological Protection is preparing to provide reference dose coefficients for environmental radioiodine intake based on newly developed age-specific biokinetic models. However, the biokinetics of iodine has been reported to be strongly dependent on the dietary intake of stable iodine; for example, the thyroidal uptake of iodine may be substantially lower in iodine-rich regions than in iodine-deficient regions. Therefore, this study attempted to establish a system of age-specific thyroid dose estimation for South Koreans, whose daily iodine intakes are significantly higher than that of the world population. Materials and Methods: Korean age-specific biokinetic parameters and thyroid masses were derived based on the previously developed Korean adult model and the Korean anatomical reference data for adults, respectively. This study complied with the principles used in the development of age-specific biokinetic models for world population and used the ratios of baseline values for each age group relative to the value for adults to derive age-specific values. Results and Discussion: Biokinetic model predictions based on the Korean age-specific parameters showed significant differences in iodine behaviors in the body compared to those predicted using the model for the world population. In particular, the Korean age-specific thyroid dose coefficients for 129I and 131I were considerably lower than those calculated for the world population (25%-76% of the values for the world population). Conclusion: These differences stress the need for Korean-specific internal dose assessments for infants and children, which can be achieved by using the data calculated in this study.

Research on a Model that reflects requests to suspend processing personal data in real time (개인정보 처리정지 요청을 실시간 반영하는 모델 연구)

  • Younhee Hong;Sang-Soo Ye
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.141-150
    • /
    • 2024
  • The importance of personal data protection is increasingly emphasized both at home and abroad, and while overseas countries are applying various policies and dynamic management technologies, there are some gaps between compliance with laws and regulations and the application of technologies in Korea, and there are few user interfaces that provide convenient ways for data subjects to stop processing personal data. This study first analyzes the need for dynamic personal information consent management technology, the current state of the industry, and the prospects for its development. Next, this study proposes a basic model for dynamic management of personal information consent that maximizes the data subject's right to personal data self-determination while strictly complying with personal data protection laws in Republic of Korea. In particular, this study analyzes the basis of domestic laws and regulations related to the suspension of personal data processing, designs a basic model of personal data consent dynamic management interface, and presents its effectiveness. Based on the results of this study, we expect that the proposed dynamic management model for personal data use consent can be used in various ways for various websites and applications in the future.

  • PDF