• Title/Summary/Keyword: Security Technology Policy

Search Result 700, Processing Time 0.028 seconds

Measurement of the Greenhouse Gas Emission Benefits from the Marine Bio-Energy Development Project (해양바이오에너지 개발사업의 온실가스 저감편익 추정)

  • Kim, Tae-Young;Pyo, Hee-Dong;Kim, Hye-Min;Park, Se-Hun
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.16 no.3
    • /
    • pp.217-225
    • /
    • 2013
  • It is time to develop new renewable energy that could fundamentally replace fossil fuel, which has been increasingly needed due to environmental pollution and energy security. Korean marine bio-energy development project is planned to produce 50% of total bioenergy. This study attempts to measure the greenhouse gas emission reduction benefits of marine bio-energy development project through contingent valuation method. Single bounded dichotomous choice (SBDC) is applied with spike model. The results show that the average willingness to pay are estimated to be KRW 4,190 at SBDC, per household per year. If the result has been expanded to the region which is survey conducted, KRW 50.1 billion annually. These quantitative information can be usefully utilized in the cost benefit analysis to implement project and policy-making for the industrialization of marine bio-energy development project.

The Global Distribution Direction of Defense Industry in Eastern Europe under the New Cooperation Strengthened (신 협력 강화에 따른 동유럽 방위산업의 국제유통방향)

  • Seo, Dae-Sung;Coo, Byung-Mo
    • Journal of Distribution Science
    • /
    • v.15 no.1
    • /
    • pp.83-93
    • /
    • 2017
  • Purpose - After the transition, the development of defense industry in Eastern Europe has been regressed. Recently, they have internationally recognized that new products have been exported and contributed to the Innovation-Based Manufacturing of national economy such as unmanned reconnaissance aircraft, water purification technology, and mobile chemical laboratory, etc. The military forces in Eastern Europe are re-armed by the localization of self-produced munitions in their own defense industry, and then emphasize fostering their own defense industry. Thus, if they make a collaboration with other nations as a industrial cluster, it will gain a competitive edge on the defense industry. Research design, data, and methodology - The study was designed with the data of each national defense department. The research of the subject was reviewed before and after the transition. Thousands of workers have worked in defense industries before the transition, however, the defense industry and experts left after the transition. The Hungarian defense spending on GDP also dropped sharply from 1.72% in 2000 to 0.85% in 2013. But, due to the crisis in Ukraine and the crisis of Syrian refugees, the Viségrad Group (V4) member countries have also increased their interest in a defense and industries as well as the confidence in the EU and NATO. Results - On the whole, the joint of military training and purchase of defense materials were found in order to form the EU cooperative combat troops in CEE. There are the implementation of a joint manual plan for strengthening V4 security policy and the joint military exercises for V4 every year, and the others are electronic warfare and innovation of V4 national forces. Through such a performance analysis methodology, we found that the defense industry is developed through the national cluster cooperation among CEEs and spreading global distribution. Conclusions - Eastern Europe and Balkan countries have been looking forward to cooperating with the non-EU countries such as Korea and other defense industries. There are a lot of potential development into a new civilian cooperation defense industry for global-distribution. Thus, Korea should develop electronic commercial applications, not just as a weapon exporting region.

SDR Adaptation for Multimode Maritime Wireless Communications (다중모드 해상 무선통신 지원을 위한 SDR 적용 방안)

  • Kim, Jae-Myoung;Lee, Joa-Hyoung;Shim, Woo-Seong;Lee, Sang-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.173-176
    • /
    • 2011
  • New paradigm is based on the e-navigation policy which is the harmonised collection, integration, exchange, presentation and analysis of maritime information onboard and ashore by electronic means to enhance berth to berth navigation and related services, for safety and security at sea and protection of the marine environment. One of the requirements is seamless communications between various communication systems. So we need the maritime wireless communications based on the SDR technology. In this paper we analyse characteristics and issues of maritime wireless communication technology and service framework and propose a SDR based maritime system platform which can operate in multi-mode.

  • PDF

Structures and Competitiveness of Softwood Products in Korean Import Market (우리나라 수입(輸入) 침엽수재(針葉樹材) 시장구조(市場構造) 및 수종별(樹種別) 경쟁력(競爭力))

  • Kim, Wae-Jung
    • Journal of the Korean Wood Science and Technology
    • /
    • v.19 no.4
    • /
    • pp.34-42
    • /
    • 1991
  • Protection of tropical forest affects on significant reduce of tropical hardwood supply, and softwood resources will be increasingly important for the timber security in Korea. U.S. softwood log was most favorite species for Korean softwood log importers in overall import conditions except price stablization and consistency of export policy. Reduced export volume from Pacific Northwest to Korean market has been immediately replenished by rediata pine from New Zealand and Chilean plantation. Siberian timber will hardly play major roles in Korean timber market unless budding structure. softwood plywood and softwood furniture uses are enhanced. Recent rapid rise of labor cost and reducing tariff rrate in Korea provided better opportunities for import lumber in building materials market. Dry dimension lumber was relatively profitable when processed from import U.S. soft-wood log while green lumber was favorable products processed from radiata pine log in Korean lumber market. This means U.S. softwood lumber would have better opportunity to market for '2${\times}$'4 studs when wood frame housing is introduced. On the other hand while radiata pine is competitive on temporary construction lumber such as supporter and concrete forming frame in Korea. Shortage of raw material for the new capacity of board plants in Korea will be it bottle neck. Major log export countries to Korea as U.S. New Zealand and Chile showed high trade intensity indices of composite hoard produces for Korean market. As Korea efforts to diversify import sources, and tariffs are reduced to 8% as scheduled by 1994. countries of scoring higher comparative advantages as Portugal. Brazil, Austria as well as New Zealand will have better opportunity to penetrate into promised Korean composites hoard market.

  • PDF

Design of Image Tracking System Using Location Determination Technology (위치 측위 기술을 이용한 영상 추적 시스템 설계)

  • Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.143-148
    • /
    • 2016
  • There is increasing concern about security as a need for increased safety in the information industry society. However, it does not meet the needs for safety including CCTV. Therefore, in this paper, we link the processing technology using the image information to the IPS system consisting of GPS and Beacon. It designed a conventional RFID tag attached discomfort and image tracking system is limited to complement the disadvantages identifiable area. To this end, we designed a smart device and the Internet of Things convergence system and a research to ensure the accuracy and reliability of the IPS of the access control system. Finally, by leveraging intelligent video information using a PTZ camera, and set the entrant management policies it was carried out to control the situation and control. Also, by designing the integrated video tracking system, an authentication server, visualization systems were designed to establish an efficient technique for analyzing the IPS entrant behavior patterns.

An Assessment of Records Management Practice in Selected Local Government Councils in Ogun State, Nigeria

  • Bakare, Abdullahi A.;Abioye, Abiola A.;Issa, Abdulwahab Olanrewaju
    • Journal of Information Science Theory and Practice
    • /
    • v.4 no.1
    • /
    • pp.49-64
    • /
    • 2016
  • What government does/fails to do is conveyed to the public largely by records and information of various types in the public service, without which there will be no government. When records are poorly managed, much time is involved in sorting and locating needed information from large volumes of records. The rate of records misplaced or lost from which useful information for decision making is usually obtained makes it difficult to provide concise and up-to-date records of both past and present operations, raising the challenge of effective record-keeping. Thus this study examined records management practices in selected local government councils in Ogun State, Nigeria, adopting the descriptive survey research method using questionnaires for data collection. Its population comprised 415 records of personnel in the selected councils, of which 208 were sampled using simple random technique. From the 208 copies of the questionnaire administered on the registry personnel, 150 copies were useable, with a 72.12% response rate. Descriptive statistics were used for the analysis. The results indicated a prevalence of paper as the dominant medium for recording/conveying information in the councils with most of these being either in active state, semi-active, and vital and were kept and maintained in the registry, while in-active records were kept in the records store. Storage facilities for record-keeping were insufficient. Security measures against unauthorized access to records were by restrictions and subject users to managerial clearance. The study concluded that council records were in chaos and recommended the formulation of coherent records management policy, adequate budgetary provision, and adequate finance.

The Effect of Non-regular and Female Employment Rate on Total Fertility Rate(TFR) in OECD Countries (비정규직 고용률과 여성 고용률이 출산율에 미치는 효과: OECD 국가를 중심으로)

  • Lee, Jaehee;Park, Jinbaek
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.2
    • /
    • pp.15-23
    • /
    • 2020
  • This study aimed to analyze effects of non-regular employment rate and female employment rate on fertility rate in OECD county. We adopted dynamic panel model after classifying OECD county to high and low fertility rate. The results of analysis showed that the higher non regular employment rate, the lower female employment rate, and the lower economy growth rate decrease fertility rate especially in low fertility rate country. While, only the higher house rental decrease in high fertility country. This results indicate that low fertility country including Korea should improve a labor policy such as strengthening employment security and encouraging female employment to increase fertility rate.

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

Study on Establishment of management standards of Chemistry laboratory handling harzadous substances and improvement of system (유해·위험물질 취급 화학실험실 관리 기준 정립 및 체계 개선에 관한 연구)

  • Cho, Nam-Joon;Lee, Man-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.18 no.4
    • /
    • pp.57-72
    • /
    • 2016
  • There are more than 30,000 chemical substances handled in domestic university laboratories. Among them, hazardous materials are selected and managed as designated substances by the standards of 19 Ministries and 16 Acts. However, domestic safety-related laws and regulations are used to manage industrial risk factors based on industrial activities. In case of installing a university chemical laboratory in accordance with the installation standards applicable to general workplaces. It is not suitable to use as a laboratory installation standard that can be applied to a chemical laboratory installed at a university such as a problem occurs in applying to a university using a small quantity of dangerous substances in a small amount. In order to establish the laboratory structure and facility standards that are appropriate for the laboratory characteristics and apply systematic laboratory safety, the National Security Administration shall apply the special handling standard of chemical experiment to places where handling less than 30 times the designated quantity of chemical substances for chemical experiments. On August 2, 2016, the regulations for the enforcement of the Dangerous Goods Safety Management Act and the standards for the structure and facilities of the university chemical laboratory were enacted. In this study, we investigated the domestic chemical substances laws and regulations to determine the chemical substances that are over-regulated in the relevant laws, and define them as substances against accidents. The management criteria for the substances were analyzed. The R value for the designation of the designated quantity by the concept of the space in the management standard was calculated.

A Study on Injection Attacks and Defenses on Microsoft Windows (MS Windows에서 인젝션 공격 및 방어 기법 연구)

  • Seong, HoJun;Cho, ChangYeon;Lee, HoWoong;Cho, Seong-Je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.9-23
    • /
    • 2020
  • Microsoft's Windows system is widely used as an operating system for the desktops and enterprise servers of companies or organizations, and is a major target of cyber attacks. Microsoft provides various protection technologies and strives for defending the attacks through periodic security patches, however the threats such as DLL injection and process injection still exist. In this paper, we analyze 12 types of injection techniques in Microsoft Windows, and perform injection attack experiments on four application programs. Through the results of the experiments, we identify the risk of injection techniques, and verify the effectiveness of the mitigation technology for defending injection attacks provided by Microsoft. As a result of the experiments, we have found that the current applications are vulnerable to several injection techniques. Finally, we have presented the mitigation techniques for these injection attacks and analyzed their effectiveness.