• Title/Summary/Keyword: Public authority

Search Result 509, Processing Time 0.022 seconds

A Study on Development of Mobile Multi-lane Speed Enforcement System With a Laser Detector (레이저 검지기를 이용한 이동식 다차로 속도위반 알고리즘 연구)

  • Yoo, Sung Jun;Park, Jin Yong
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.4
    • /
    • pp.114-121
    • /
    • 2017
  • In order to overcome the limitations of the mobile speed system for 1 lane, this study is used a multi-laser beam to develop a mobile speed measuring system, using a multi-phase beam. By using multi-laser beam, least squares algorithms and speed error processing algorithms were developed to improve speed accordancy and speed error rates compared to conventional mobile speed meters using a single laser beam. A field test showed that 80.0 percent of 3 lane and 87.0 percent of 4 lane were appropriate for the mobile speed system. With the development of the mobile speed measuring system, it is expected to dramatically reduce the accidents caused by the speed of traffic. It is also expected to effectively operate equipment and manage the cost by improving manpower and providing improved enforcement accuracy, by contributing positively to public institution and public affairs.

Public Key Infrastructure Model for Electronic Government using Bridge Certificate Authority (BCA(Bridge CA)개념을 이용한 전자정부 PKI(Public Key Infrastructure) 모델)

  • 김기수;이민구;이병만;선우종성
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1998.12a
    • /
    • pp.49-65
    • /
    • 1998
  • 전자문서, 전자결재, 행정 EDI 등과 같은 전자적 매체를 이용한 행정정보화를 실현하기 위한 전자정부 구축 노력이 추진됨에 따라 전자정부 환경에서 발생할 수 있는 각종 정보보호 요소들을 원천적으로 해결하기 위해 전자서명 등과 같은 공개키 기반의 암호 기술 적용이 필수적 요소로 여겨지고 있으나, 공개키 암호기술에 사용되는 암호화 키의 체계적인 관리를 위한 공개키 인증 체계(PKI) 구축에 대한 방안마련이 미흡한 실정이다 이에 본 논문에서는 전자정부 환경에서 공개키 기반 암호 기술의 효과적인 적용을 위한 공개키 인증 체계 모델과 관련 조직 체계 구성 방안에 대해 제안하고자 한다.

  • PDF

Design and Implementation of Web-based Electronic Bidding System using XML (웹 기반의 XML을 활용한 전자 입찰 시스템의 설계 및 구현)

  • 윤선희
    • The Journal of Information Systems
    • /
    • v.10 no.1
    • /
    • pp.127-146
    • /
    • 2001
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. Widely spread the use of the internet, there are various applications for Business to Business (B to B) or Business to Customer(B to C) model that are based on the intranet or extranet. This paper designed and implemented the Web-based Electronic Bidding System for Business to Business (B to B) model. The technical issues of electronic bidding system in the internet are involved in the connection between web client and server, electronic data interchange for the contract document, and security solution during the bidding and contracting processes. The web-based electronic bidding system in this paper is implemented using Java applet and servlet as a connection interface for web client and server, XML/EDI-based documents for a bid and a contract, and bidding server and notary server for enhancing the security using PKI(Public Key Infrastructure)-based public key cryptography, digital signature and Certification Authority(CA).

  • PDF

A Study on Special Education Facilities of the Elementary School in Seattle (미국 워싱턴주 시애틀시의 초등학교 특수교육시설에 관한 연구)

  • Kim, Jong-Young
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.17 no.3
    • /
    • pp.13-20
    • /
    • 2010
  • Seattle Public School Authority implements Inclusive Education which allows handicapped children to study in ordinary schools. This research is to analyze Inclusive Education system and find characteristics of school network and school planning. Survey was performed on 9 school districts and 54 public schools. The found results are following; 1) 54 schools adopt special education programs and legal barrier free design. All handicapped children groups are divided into level I through Ⅳ including mild level (level I,II) at all schools and multi-handicapped(severe level, level III, IV) at schools specified by school district or Seattle City. 2) Each school groups are transformed into self-contained classroom, therapy room and general room as a set in consideration of user communication and special education program. Also, existing classrooms are rearranged into small study spaces by using partition system. It allows ordinary schools to accomodate Inclusive Education through school network, classroom rearrangement and space partitioning.

A Steps of Public Relations for the Conversion of Coordinates System in National Base Map (국가기본도의 좌표계 전환을 위한 단계별 홍보방안)

  • Park, Hong-Gi
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.9 no.2 s.18
    • /
    • pp.63-71
    • /
    • 2001
  • GPS allows a user with an appropriate receiver to obtain their position anywhere on the Earth's surface. The use of GPs has highlighted the shortcomings of national reference systems, and many countries are in the process of establishing new geodetic frameworks in order to overcome these shortcomings. Korea National Geography Institute has established a new geocentric datum and presented the its time frame for implementation. In this paper, I studied the considerable matters of digital mapping authority and users for converting the geodetic datum and coordinate system and suggested the steps of public relations for GIS users.

  • PDF

A Study on the Estimation of GHG Emissions using a Real World Vehicle Driving Information (실차 운행정보를 이용한 온실가스 배출량 산정에 관한 연구)

  • Park, Geon Jin;Kim, Pil Su;Choi, Sang Jin;Han, Yong Hee;Lee, Heon Ju;Lee, Gap Sang;Jang, Young Kee
    • Journal of Climate Change Research
    • /
    • v.6 no.2
    • /
    • pp.143-158
    • /
    • 2015
  • This study developed the emission intensity estimation method of GHGs by considering the characteristics of the models and time series. The telematics device was installed on the vehicle (OBD-II) to collect information on the operation conditions from each sample vehicle of public authorities. As a result of comparing the mileage distance and fuel consumption, the matching degree is analyzed very high, showed a ${\pm}1{\sim}4%$ error for each vehicle. By comparing driving record diary of vehicles managed by public authorities, this study presents the method that can be used to verify driving information in order to derive the GHGs emission intensity.

The Changing Aspects of North Korea's Terror Crimes and Countermeasures : Focused on Power Conflict of High Ranking Officials after Kim Jong-IL Era (북한 테러범죄의 변화양상에 따른 대응방안 -김정일 정권 이후 고위층 권력 갈등을 중심으로)

  • Byoun, Chan-Ho;Kim, Eun-Jung
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.185-215
    • /
    • 2014
  • Since North Korea has used terror crime as a means of unification under communism against South Korea, South Korea has been much damaged until now. And the occurrence possibility of terror crime by North Korean authority is now higher than any other time. The North Korean terror crimes of Kim Il Sung era had been committed by the dictator's instruction with the object of securing governing fund. However, looking at the terror crimes committed for decades during Kim Jung Il authority, it is revealed that these terror crimes are expressed as a criminal behavior because of the conflict to accomplish the power and economic advantage non powerful groups target. This study focused on the power conflict in various causes of terror crimes by applying George B. Vold(1958)'s theory which explained power conflict between groups became a factor of crime, and found the aspect by ages of terror crime behavior by North Korean authority and responding plan to future North Korean terror crime. North Korean authority high-ranking officials were the Labor Party focusing on Juche Idea for decades in Kim Il Sung time. Afterwards, high-ranking officials were formed focusing on military authorities following Military First Policy at the beginning of Kim Jung Il authority, rapid power change has been done for recent 10 years. To arrange the aspect by times of terror crime following this power change, alienated party executives following the support of positive military first authority by Kim Jung Il after 1995 could not object to forcible terror crime behavior of military authority, and 1st, 2nd Yeongpyeong maritime war which happened this time was propelled by military first authority to show the power of military authority. After 2006, conservative party union enforced censorship and inspection on the trade business and foreign currency-earning of military authority while executing drastic purge. The shooting on Keumkangsan tourists that happened this time was a forcible terror crime by military authority following the pressure of conservative party. After October, 2008, first military reign union executed the launch of Gwanmyungsung No.2 long-range missile, second nuclear test, Daechung marine war, and Cheonanham attacking terror in order to highlight the importance and role of military authority. After September 2010, new reign union went through severe competition between new military authority and new mainstream and new military authority at this time executed highly professionalized terror crime such as cyber/electronic terror unlike past military authority. After July 2012, ICBM test launch, third nuclear test, cyber terror on Cheongwadae homepage of new mainstream association was the intention of Km Jung Eun to display his ability and check and adjust the power of party/military/cabinet/ public security organ, and he can attempt the unexpected terror crime in the future. North Korean terror crime has continued since 1980s when Kim Jung Il's power succession was carried out, and the power aspect by times has rapidly changed since 1994 when Kim Il Sung died and the terror crime became intense following the power combat between high-ranking officials and power conflict for right robbery. Now South Korea should install the specialized department which synthesizes and analyzes the information on North Korean high-ranking officials and reinforce the comprehensive information-collecting system through the protection and management of North Korean defectors and secret agents in order to determine the cause of North Korean terror crime and respond to it. And South Korea should participate positively in the international collaboration related to North Korean terror and make direct efforts to attract the international agreement to build the international cooperation for the response to North Korean terror crime. Also, we should try more to arrange the realistic countermeasure against North Korean cyber/electronic terror which was more diversified with the expertise terror escaping from existing forcible terror through enactment/revision of law related to cyber terror crime, organizing relevant institute and budget, training professional manpower, and technical development.

  • PDF

A New Certificate Path Processing Scheme employed the Trusted CA for improving an efficiency on the Computational Aspect (연산적 측면의 효율성을 향상시키는 신뢰 CA를 이용한 새로운 인증 경로 처리 기법)

  • 최연희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.9C
    • /
    • pp.908-922
    • /
    • 2003
  • The Public Key Infrastructure (PKI) trends to delegate the certificate path processing to the Delegated Path Discovery (DPD) Server and Delegated Path Validation (DPV) server recently. The most critical factor for the selection of the delegated server is to allow the server to be equipped with a high reliability through a low cost, and simple implementation. In this paper, we propose a new certificate path processing scheme employed the trusted CA as the DPD/DPV server by adding the capability of the Validation Authority (VA) to the trusted CA. Since our proposed scheme uses the existing trusted CA as validation server, we can achieve a high trust through a simple implementation for the processing. Besides, we propose an additional scheme for reducing an overhead on the trusted CA. it is obtained by delegating digital signature verification to CAs on the path and by skipping the repeated path processing. As the result, our proposed validation scheme can be performed efficiently with high speed and low computational overhead.

Design and Implementation of a Secure E-Document Transmission System based Certificate for CEDA (Certified E-Document Authority) (공인전자문서보관소를 위한 인증서 기반의 안전한 전자문서 전송시스템 설계 및 구현)

  • Kim, Dae-Jung;Kim, Jung-Jae;Lee, Seung-Min;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.370-378
    • /
    • 2008
  • The CEDA(Certified E-Document Authority) is a reliable third party that deposit electronic document having legal effects securely, and verify contents of document or transmission. This paper focuses on a function of secure transmission among several important functions, and implements public key encryption system for secure transmission when server and user communicate for image transmission. This paper follows a standard fundamental rule of X.509 in ITU-T, and it uses symmetric encryption algorithm to raise speed of a large data operation. A key of symmetric encryption algorithm is encrypted by private key in public key system, it protects to be modified using digital signature for data integrity. Also it uses certificates for mutual authentication.

A Study on the Continuity Essential Function of Critical Infrastructure Protection System for Public Safety (공공안전을 위한 국가기반체계 보호제도의 핵심기능연속성에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.18 no.4
    • /
    • pp.795-802
    • /
    • 2017
  • If the function of the national infrastructure is suspended due to natural disasters and social disasters, the damage of the national infrastructure can be a serious threat to the national security as well as the life, body and property damage of the people. In this paper, we examine the domestic and overseas trends of the national system protection system and examine the domestic and overseas trends of the national system protection system. The detailed function of the essential function continuity, essential function, succession order, authority delegation, continuity facility, continuity communication, We examined the specific issues related to testing, education and training, transferring control and directing authority, analyzing the system related to the national infrastructure protection plan, and examined the specific problems and suggested an effective improvement plan for the critical infrastructure protection system.