• Title/Summary/Keyword: Service Register

Search Result 174, Processing Time 0.022 seconds

A Study on Obligations of Contracting Parties regarding Reporting Requirements under MARPOL 73/78 (MARPOL 73/78 상 당사국의 보고의무에 대한 연구)

  • Suk, Ji-Hoon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.18 no.5
    • /
    • pp.496-504
    • /
    • 2012
  • In the field of environmental protection, close co-operation between Contracting Parties is strongly required and the reporting obligation under MARPOL 73/78 is playing an important role as a part of international co-operation for the environmental protection. In this paper, I review the meaning of reporting obligation under MARPOL 73/78 from the perspective of the international law, and investigate the status of implementation for the reporting obligation. For this purpose, I analyze status of implementation for last 10 years from 2001 to 2010 regarding reporting obligations under MARPOL 73/78 in accordance with MEPC/Circ.318. Finally, I suggest the way forward to improve Contracting Parties' compliance with reporting obligations through this analysis.

Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al.

  • Irshad, Azeem;Sher, Muhammad;Alzahrani, Bander A.;Albeshri, Aiiad;Chaudhry, Shehzad Ashraf;Kumari, Saru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.523-549
    • /
    • 2018
  • The increasing number of subscribers and demand of multiplicity of services has turned Multi-Server Authentication (MSA) into an integral part of remote authentication paradigm. MSA not only offers an efficient mode to register the users by engaging a trusted third party (Registration Centre), but also a cost-effective architecture for service procurement, onwards. Recently, Lu et al.'s scheme demonstrated that Mishra et al.'s scheme is unguarded to perfect forward secrecy compromise, server masquerading, and forgery attacks, and presented a better scheme. However, we discovered that Lu et al.'s scheme is still susceptible to malicious insider attack and non-compliant to perfect forward secrecy. This study presents a critical review on Lu et al.'s scheme and then proposes a secure multi-server authentication scheme. The security properties of contributed work are validated with automated Proverif tool and proved under formal security analysis.

A Study on Interior Space Planning of Accommodation Barge for Offshore Plant (해양플랜트 거주용 부선 실내공간계획 연구)

  • Lee, Han-Seok;Kang, Young-Hun;Doe, Geun-Young
    • Korean Institute of Interior Design Journal
    • /
    • v.20 no.4
    • /
    • pp.201-210
    • /
    • 2011
  • This study is on the space planning of accommodation area in accommodation barge, which is a kind of offshore plant supply vessel providing workers with exclusive accommodation facilities. Firstly, the space layout of accommodation area is analyzed using the general arrangement drawings of 10 actually-built accommodation barges currently in use. Secondary, the design guides and standards for living quarters of offshore plants issued from overseas classification societies such as ABS, NORSOK etc. are analyzed and based on the analysis design guidelines for accommodation area of accommodation barge are newly suggested. Thirdly, a model of accommodation area in accommodation barge is set up and space arrangements and movement lines for each deck of the accommodation area of the model are planned. Fourthly, cabins, dinning room and galley, recreation spaces, and sanitary spaces of the accommodation area of the model are planned. The results of this study may be summarized as follows. An accommodation barge has 'barge deck' for small scale work and material storage, and 'accommodation area' for the living and resting of workers. The accommodation area is made of workers accommodation sector, service sector, crew sector and business sector. The interior design guidelines for accommodation area of accommodation barge should be made soon by Korea Register of Shipping.

Implementation of IEEE 802.15.4 Channel Analyzer for Evaluating WiFi Interference (WiFi의 간섭을 평가하기 위한 IEEE 802.15.4 채널분석기의 구현)

  • Song, Myong-Lyol;Jin, Hyun-Joon
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.63 no.2
    • /
    • pp.81-88
    • /
    • 2014
  • In this paper, an implementation of concurrent backoff delay process on a single chip with IEEE 802.15.4 hardware and 8051 processor core that can be used for analyzing the interference on IEEE 802.15.4 channels due to WiFi traffics is studied. The backoff delay process of IEEE 802.15.4 CSMA-CA algorithm is explained. The characteristics of random number generator, timer, and CCA register included in the single chip are described with their control procedure in order to implement the process. A concurrent backoff delay process to evaluate multiple IEEE 802.15.4 channels is proposed, and a method to service the associated tasks at sequentially ordered backoff delay events occurring on the channels is explained. For the implementation of the concurrent backoff delay process on a single chip IEEE 802.15.4 hardware, the elements for the single channel backoff delay process and their control procedure are used to be extended to multiple channels with little modification. The medium access delay on each channel, which is available after execution of the concurrent backoff delay process, is displayed on the LCD of an IEEE 802.15.4 channel analyzer. The experimental results show that we can easily identify the interference on IEEE 802.15.4 channels caused by WiFi traffics in comparison with the way displaying measured channel powers.

Design & Realization of Realtime Auction System (실시간 경매 시스템의 설계 및 구현)

  • Lee Ki-Hwan;Lim Dong-Kyun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.228-233
    • /
    • 2005
  • Recently, there are requires for auction system by growing up internet. This paper says if the customers add wonted goods to wanted list, the system automatically announce information to the customer via Inter Web browsing, whenever the proper goods to register to the auction system by seller. The system provides registration customer information, registration goods, wanted goods. And the application program can be downloaded from the Web System. Especially, this paper provides us very convenience check up service using the mobile phone, we can check our wanted goods or auction lists without regarding to place or time, we can alse purchase the goods more rapidly and easily.

  • PDF

Building of Road Information Management System using GSIS (GSIS를 이용한 도로종합정보관리 시스템 구축)

  • 정승현;임승현;조기성
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.16 no.2
    • /
    • pp.169-176
    • /
    • 1998
  • Recently, the volume of transportatin is higher by increasing rapid development and human or material interchange among districts. So, the importance of maintenance and management on existing road is come to the fore. In this study, we'd like to build prototypic Road Information Management System to keep road scientifically and efficiently on general road. We built the database of information about a drawing and register on ex-siting road using GSIS. So, we can offer information rapidly and accurately in road maintenance and management service through the query, update and statistic analysis function on road facility as well as AM.

  • PDF

Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity

  • Lee, Jung-San;Wei, Kuo-Jui;Chen, Ying-Chin;Sun, Yun-Hsiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5616-5642
    • /
    • 2016
  • Different from traditional auctions, electronic auctions provide a platform to allow bidders and auctioneers merchandise to each other over network anytime and anywhere. Auctioneers can publish information of goods, and bidders can choose the interested targets through this bidding platform. To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret bidding price. However, we have found out that Li et al.'s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction. Thus, we propose a brand-new sealed-bid auction mechanism, in which the essentials of e-auction can be firmly preserved. In particular, each bidder only needs to register at the center once and then can join to multiple plays launched by different auctioneers. Moreover, the correctness of mutual authentication is confirmed according to the BAN logic model.

Evaluation of Corrosion Tendency for S355ML Steel with Seawater Temperature (해수 온도에 따른 S355ML 강재의 부식 경향 평가)

  • Jang, Seok Ki;Lee, Seung Jun;Park, Jae Cheul;Kim, Seong Jong
    • Corrosion Science and Technology
    • /
    • v.14 no.5
    • /
    • pp.232-238
    • /
    • 2015
  • Corrosion is of greatest concern for metallic materials exposed to corrosive seawater or aggressive marine atmospheres. Marine structures and components made of metallic materials incur an initial cost and additional large costs for corrosion control and maintenance. There have been worldwide efforts to minimize marine corrosion and extend service life of the materials. It is believed that various factors are associated with corrosion of marine grade metallic materials, particularly the temperature of the solution affecting the corrosion rate by changing dissolved oxygen solubility and concentrations of chloride. In the present study, the electrochemical characteristics of S355ML steel are investigated to identify corrosion acceleration tendencies with changes in solution temperature under marine environments. It was found that increasing seawater temperature, promoted not only activation of chloride ion transfer, but also the formation of porous $Fe(OH)_3$ or $Fe_2O_3$, leading to the acceleration of corrosion.

An Automatic Face Hiding System based on the Deep Learning Technology

  • Yoon, Hyeon-Dham;Ohm, Seong-Yong
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.289-294
    • /
    • 2019
  • As social network service platforms grow and one-person media market expands, people upload their own photos and/or videos through multiple open platforms. However, it can be illegal to upload the digital contents containing the faces of others on the public sites without their permission. Therefore, many people are spending much time and effort in editing such digital contents so that the faces of others should not be exposed to the public. In this paper, we propose an automatic face hiding system called 'autoblur', which detects all the unregistered faces and mosaic them automatically. The system has been implemented using the GitHub MIT open-source 'Face Recognition' which is based on deep learning technology. In this system, two dozens of face images of the user are taken from different angles to register his/her own face. Once the face of the user is learned and registered, the system detects all the other faces for the given photo or video and then blurs them out. Our experiments show that it produces quick and correct results for the sample photos.

Development of Smart Phone Mode Translation based on Android (안드로이드에서 스마트폰 모드 변환 애플리케이션 개발)

  • Kim, Joong Soo;Kim, Dong Hyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.5
    • /
    • pp.329-334
    • /
    • 2013
  • A positioning based service uses one's position information with GPS. This application also use the position based characters and change the smart phone to the vibration mode at the registered position. If the user register some places to be vibrated in the smart phone, the smart phone will be automatically changed to the vibration mode as the registered position is same with the position of GPS in the smart phone. If the smart phone is being leaving some distance from the position, the phone will be released from the vibration mode. Therefore, this paper propose aims for intelligent smart phone.