• Title/Summary/Keyword: Security technologies

Search Result 1,846, Processing Time 0.027 seconds

A Study on the Review and Countermeasure for 2010 Amended Convention of the STCW (2010년 STCW 개정협약의 주요 내용과 교육계의 대응)

  • Youn, Myung-Ou;Seong, Yu-Chang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.16 no.3
    • /
    • pp.295-300
    • /
    • 2010
  • The international convention on standards of training, certification and watch-keeping for seafarers, 1978(1978 STCW convention) has been established as a minimum standard and competence of seafarers, and contributed to reduce marine accidents caused by human errors. The convention has been partly amended several times according to environmental change of ship's operation and there were comprehensive revisions in so called 1995 amended STCW convention. In these years, ships are in tendency of increasing size and speed, and also adopted high technologies. These kinds of changes brought STW sub-committee up for discussions to modify the convention to cope with new environments from the year of 2006. As the result, major amendaments to STCW convention have been adopted at a diplomatic conference in Manila, Philippine in June 2010, thereby new global standards will be in force to train and certify seafarers to operate technologically advanced ships before long. This paper is to introduce major amendaments such as ship's security, ECDIS and leadership etc. in this Manila amendments and to clarify some articles to be adopted in programs for education and training of seafarers in Korea.

A Study on the Application of Smart Home Services to Contemporary Han-ok Housing (주거용 현대한옥의 스마트홈서비스 적용 방안 연구)

  • Jeon, Jin-Bae;Kim, Seung-Min
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.675-683
    • /
    • 2018
  • As interest in eco-friendly architecture and Korean traditional culture is increasing, interest in contemporary han-ok is steadily increasing. Recently, many people experienced the han-ok directly and indirectly with the attention of a commercial contemporary han-ok such as restaurants, coffee shops, and lodging facilities, and as a result, the house has a preference for the residence of the contemporary han-ok. Compared to modern residential houses, however, han-ok is lack the convenience of heating and cooling, energy management, security, and maintenance. For this reason, the increased interest and preference for han-ok does not lead to living in contemporary han-ok. This study was conducted in the following ways to improve inconvenience by applying smart home services to contemporary han-ok. Recent technology trends in smart home services and technologies developed and marketed to date have been identified in previous research cases and literature studies. Based on this, a list of smart home services and their application methods were derived that would relieve the inconvenience of contemporary han-ok for smart home services. We hope that this research will serve as a reference for subsequent researchers studying contemporary han-ok.

A Legal Review on Abuse Cases of Virtual Currency and Legal Responses (가상화폐의 악용사례와 법적 대응방안에 관한 고찰)

  • Hwang, Suk-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.585-594
    • /
    • 2018
  • Virtual currencies have emerged along with new technologies such as block chain, artificial intelligence (AI), and big data. This study examines the benefits of a security-enhanced block chain resulting from individual trading, decentralized from governments, as well as the problems associated with misuse of virtual currencies. Virtual currencies, due to its anonymity, is vulnerable to financial crimes, such as ransom-ware, fraud, drug trafficking, tax evasion and money laundering. Use of virtual currencies can facilitate criminals avoid detection from investigative agencies. Government regulatory policy continues to address these concerns, and the virtual currency exchange has also announced a self-regulation proposal. However, a fundamental solution remains necessary. The purpose of this paper is to investigate the problems regarding abuse of virtual currency and to identify a practical system for transactions involving virtual currencies. However, in order to promote transactions involving virtual currencies and to institutionalize a governance system, multilateral cooperation is required. Although the restricting the use of virtual currencies regarding minors and foreign trade, as well as the introduction of a real-name system are considered promising prospects, many problems remain. Virtual currency is not a simple digital item but a method of redesigning the function of money. Coordinated efforts are needed globally to be able to further activate the positive aspects concerning the use of virtual currencies.

Design of NePID using Anomaly Traffic Analysis and Fuzzy Cognitive Maps (비정상 트래픽 분석과 퍼지인식도를 이용한 NePID 설계)

  • Kim, Hyeock-Jin;Ryu, Sang-Ryul;Lee, Se-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.811-817
    • /
    • 2009
  • The rapid growth of network based IT systems has resulted in continuous research of security issues. Probe intrusion detection is an area of increasing concerns in the internet community. Recently, a number of probe intrusion detection schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of probe intrusion. They can not detect new patterns of probe intrusion. Therefore, it is necessary to develop a new Probe Intrusion Detection technology that can find new patterns of probe intrusion. In this paper, we proposed a new network based probe intrusion detector(NePID) using anomaly traffic analysis and fuzzy cognitive maps that can detect intrusion by the denial of services attack detection method utilizing the packet analyses. The probe intrusion detection using fuzzy cognitive maps capture and analyze the packet information to detect syn flooding attack. Using the result of the analysis of decision module, which adopts the fuzzy cognitive maps, the decision module measures the degree of risk of denial of service attack and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.094% and the max-average false negative rate of 2.936%. The true positive error rate of the NePID is similar to that of Bernhard's true positive error rate.

A Study on the Orbits and the Ground-based Optical Tracking of a Future Korean Navigation Satellite System (미래 한국형 위성항법시스템의 궤도와 지상기반 광학추적에 대한 연구)

  • Jo, Jung Hyun;Yim, Hong-Suh;Choi, Young-Jun;Choi, Jin
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.121-129
    • /
    • 2012
  • Any development plan of a Korean space-based navigational system has been neither designed nor introduced yet. However, the demand for the development of a domestic regional satellite navigation system can be originated from the outside of market. The growing dependency on satellite navigational systems in Korea eventually requires the retainment and the operation of a domestic navigational satellite system. There is not many choices on the orbit designs and the system design concepts of a regional augmented navigation satellite system or a regional navigation satellite system for the service on the vicinity of the Korean peninsular. Space situational awareness (SSA) has been a rising issue for both national security and more realistic space business in Korea. Also SSA related technologies in Korea is a newly inaugurated area and is necessary to generate a navigation messages and maintain a future Korean navigation satellite system. In this study, the availability of Japanese Quasi Zenith Satellite System (QZSS) expected to be deployed definitely sooner than Korean counter-part is analyzed. The availability of the similar configured system over Korea is investigated with assumed QZSS type orbit. Also, feasible configuration of orbits for domestic navigation satellite system is suggested. And the observability of a ground-based optical tracking system as a secondary tracking capability is analyzed.

Review of Laser Based Uranium Enrichment Technology for Nuclear Power Fuel Production (원전연료 생산을 위한 레이저 공정 개발동향)

  • Kim, Jae-Woo;Lee, Jae-Chul;Yang, Maeng-Ho
    • Journal of Korea Technology Innovation Society
    • /
    • v.14 no.4
    • /
    • pp.965-982
    • /
    • 2011
  • Currently, dependency of natural and energy resources on world economy may not be more serious than any before increasing the uncertainty of Korea's national economy, especially as China uses unexpectedly fast glowing portion of world resources. Due to insufficient natural resources and unmatured renewable energy system, it is very important for Korea to secure the energy sources not only for national prosperity but also security for the future. In this regard, importance and necessity of nuclear energy as a major electric power source in Korea are in need to be emphasized. Korea currently imports all the necessary enriched uranium for fabrication of nuclear fuel from abroad. Thus, it is extremely important to establish a secured supply system for enriched uranium regardless of the global political unstability as well as economic fluctuation. In order to build the nuclear fuel procurement system, it is required to analyze the global market status, current enrichment service systems, and the future technology under development. For this purpose, this study comparatively analyzes the laser based advanced technology for uranium enrichment under development in the United States, which is assumed to be 2~3 times more economically viable than currently available technologies.

  • PDF

The Use of the Movie 'The Island' for Nursing Informatics in Nursing Students (간호정보학 이해를 위한 영화 'The Island' 활용)

  • Oh, Jina;Shin, Hyewon;De Gagne, Jennie C.
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.330-341
    • /
    • 2015
  • The purpose of this study was to examine the effect of the film 'The Island' on 2nd year nursing students' nursing informatics (NI) competency. The participants were sixty-eight students in a baccalaureate nursing program of a private university, taking the course, 'Nursing & Informatics' in the 2012 fall semester. Over the 15 weeks, the film was used for five weeks as introduction to NI, peer-to-group discussions, and self-reflection on lessons learned regarding NI. A qualitative content analysis was used to explore the students' experiences and perceptions on their NI competency. As a result, students signified the NI concept as the assessment of biometrics data, promotion of optimal health with the support of various technologies, and integration of patient-centered care into routine practice. They also highlighted the importance of security and safety measures as well as high quality health technology including the ubiquitous health monitoring system. Overall, the lesson outcomes of the course were met. As a supportive, instructional strategy, the use of the movie, 'The Island', was effective for nursing students in achieving NI competencies. Further study is warranted to determine if movies can be used as a means of continuing education to improve informatics competences in healthcare professionals.

An Authentication Protocol Supporting User Device Mobility in CAS-Based IPTV Environments (CAS 시스템 기반의 IPTV 환경에서 사용자 단말 이동성 지원을 위한 인증 프로토콜)

  • Roh, Hyo-Sun;Jung, Seo-Hyun;Yi, Jeong-Hyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.302-312
    • /
    • 2010
  • Internet Protocol Television (IPTV) service is the convergence service of the telecommunication and broadcasting that provides various bidirectional multimedia contents by IPTV service subscribe's request through the high-speed internet. However, the proposed technologies current do not guarantee the security such as authentication between Set-Top-Box (STB) and the user mobile devices available IPTV service at home domain, and authentication of mobile user device at out of door. This paper proposes the authentication protocol for distributing content securely from STB to the users' mobile devices at home domain and authentication for network access and IPTV service access when the user's mobile device is moved out of the house. The proposed scheme using the proxy signature enables to distribute and protect securely the contents protected through an underlying Conditional Access System (CAS) without re-encrypting then that the existing scheme should employ. Then this protocol supports the authentication scheme to get service access authentication based on network access authentication using the signature, which the STB issued on behalf of the trust authority of IPTV service provider. Also the proposed authentication protocol reduces the total communication overhead and computation time comparing to the other authentication protocol.

A Cluster-Based Channel Assignment Algorithm for IEEE 802.11b/g Wireless Mesh Networks (IEEE 802.11b/g 무선 메쉬 네트워크를 위한 클러스터 기반 채널 할당 알고리즘)

  • Cha, Si-Ho;Ryu, Min-Woo;Cho, Kuk-Hyun;Jo, Min-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.4
    • /
    • pp.87-93
    • /
    • 2009
  • Wireless mesh networks (WMNs) are emerging technologies that provide ubiquitous environments and wireless broadband access. The aggregate capacity of WMNs can be improved by minimizing the effect of channel interference. The IEEE 802.11b/g standard which is mainly used for the network interface technology in WMNs provides 3 multiple channels. We must consider the channel scanning delay and the channel dependency problem to effectively assign channels in like these multi-channel WMNs. This paper proposes a cluster-based channel assignment (CB-CA) algorithm for multi-channel WMNs to solve such problems. The CB-CA does not perform the channel scanning and the channel switching through assigning co-channel to the inter-cluster head (CH) links. In the CB-CA, the communication between the CH and cluster member (CM) nodes uses a channel has no effect on channels being used by the inter-CH links. Therefore, the CB-CA can minimize the interference within multi-channel environments. Our simulation results show that CB-CA can improve the performance of WMNs.

Research on legal improvement measurements on drone use

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.147-153
    • /
    • 2017
  • The main subject of year 2016 Davos forum was "The 4th Industrial Revolution." Recently, interests and investment in drone market, so called industrial revolution in the sky is growing in many countries around the world. Before, drone was used for military purpose such as reconnaissance or attacking but today, it is used in various private sectors such as unmanned delivery service, agriculture, leisure activities, etc. Presently, many major countries in the world are already involved in the 'war without gunfire' to be dominant in this drone industry. Korean government also has announced an extreme relaxation of regulations for growing drone industry by opening a conference with Ministers related to economics. During the conference, business scope of drone which was limited to agriculture, photographing, and observation was expanded to all the fields except for cases hindering national safety and security. In terms of shooting purpose drone its process of receiving approval for flight and shooting is simplified to online registration. What is more, drone delivery service will be allowed in island areas such as Goheung, Yeongwol, etc from first term of year 2017. Finding the way to apply drone in criminal investigation is also speeding up. Recently, Public Safety Policy Research Center in Korean National Police University has inquired for research service and its result will be out around November. Likewise, although more and stronger foundation for supporting drone industry is made but there are still, some opinions saying that we should take a careful approach in consideration to the side effect such as abuse in crime. One may also try terror by placing a dangerous substance. If drone falls, it may hurt any civilians. Moreover, if shopping purpose drone is hacked, it may result in violation of privacy. Compared to America, Europe, and China, we are at the very beginning stage of drone industry and it is necessary to reorganize legal issues to grow this industry. This can be thought from two perspectives; first, the growth of drone industry is blocked by difficult regulations on Aviation Law and Radio Regulation Law. The second issue is the safety and privacy that are required for operating drone. For the advanced technologies to make human life more profitable, more active and proactive actions are required by criminal law side. In preparation to the second mechanical era where man and machines should go together, I hope that responsible preparation is required in all fields including the criminal law.