• 제목/요약/키워드: Violation

검색결과 858건 처리시간 0.021초

Study on the Human Error Prevention Collision Avoidance Model using Merchant Ship Collision Accident Analysis (상선 충돌사고 분석을 이용한 인적과실 예방 충돌회피모델 연구)

  • Kim, Do-Hoon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • 제28권6호
    • /
    • pp.918-927
    • /
    • 2022
  • The purpose of this study was to investigate the causes of collisions by examining 668 cases of merchant ship collision accidents that occurred during the past 12 years (2010-2021) and analyzed them statistically. Further, the analysis results were applied to propose a human error prevention collision avoidance (HEPCA) model. The statistical annual report of the Korea Maritime Safety Tribunal (KMST) and the collision investigation report were investigated to collect data on the causes of collisions of merchant ships, and frequency analysis was performed using the statistical analysis tool, SPSS Statistics. In the first-stage analysis, the causes of collisions were analyzed targeting 668 merchant ship collision accidents, and in the second-stage analysis, the identified maximum frequency cause factors were analyzed in detail. The analysis results identified that 98 % of the cause of the collision was the human error of the navigator, and the highest frequency was in the order of neglect of look-out > violation of navigation regulations > improper maneuvering. The cause of the neglect of look-out was mainly neglecting continuous monitoring after the first recognition of the target ship. The HEPCA model for human error prevention was proposed by applying the analysis results to the collision case of the investigation report. The results of this study are expected to be used as educational materials at marine navigator educational institutions and in practice for avoiding collisions caused by human errors of navigators.

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권3호
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

A Study on the Influence Factors of safety Management Activities of Safety Assistants on Dispatch Method (안전보조원의 안전관리활동이 파견법에 미치는 영향요인 연구)

  • Shin, Seung Ha;Moon, Yu Mi;Choi, Byong Jeong
    • Journal of the Society of Disaster Information
    • /
    • 제17권2호
    • /
    • pp.306-318
    • /
    • 2021
  • The dispatch law has a negative impact on safety management at construction sites as the command and command relationship to safety assistants of the original contractor are applied to the dispatch law. Purpose: The purpose is to study the importance and impact of safety management according to the dispatch law, and to propose a direction for safety management so that safety assistants can actively and proactively prevent accidents. In this study, we used AHP analysis techniques for experts to achieve the final goal and verified the suitability through logistic regression. Method: AHP analysis technique is used for experts and workers and logistic regression analysis is conducted. Result: The result of analyzing scenario data where the dispatch method can be applied showed the importance in the order of education (SkillUp education), management (work-time management) and direct instructions (feedback instruction). In logistic regression analysis, feedback is the factor that affects direct instruction, and in education management, the ratio of education management is 3.42 times lower than that of other groups when only the team leader of the company gives work instructions. Conclusion: The management of feedback and education is more important than anything else within the range in which the dispatch method is not applied, and the expansion of non-face-to-face online education is judged to avoid the violation of dispatch method because the expansion of non-face-to-face online education due to covid 19 recently has brought more various target for safety education.

Strengthening the Legal Basis for Security Rule to Protect Technology and Trade Secrets for Small Businesses (중소기업의 기술 및 영업비밀 보호에 대한 보안규정의 법적 근거 강화방안)

  • Ahn, Sang Soo;Lee, Jung hun;Son, Seung Woo
    • Korean small business review
    • /
    • 제42권1호
    • /
    • pp.57-77
    • /
    • 2020
  • In Korea, various schemes have been implemented to prevent the outflow of technology, but they do not bring practical effects. In general, we focus on follow-up measures such as strong punishment in case of violation of the law. In terms of proactive prevention, it is not shown to have any real preventive effect, even though it includes such matters as imposing security measures on companies or conducting a survey. this paper examines the need to strengthen the protection of business secrets by reviewing the employment rules between companies and workers presented in the Labor Relations Act and the Labor Standards Act as a realistic alternative. In most companies, even though the employment rule is the highest standard of private regulations, the employment rule has no matters on the prevention and protection of technology leakage. The employment rules require all employees working for companies to agree and notify in the Labor Standards Act, so it is necessary to reflect them as standards in the standard employment rules because it shows that all employees of the company can have a common sense of security and present legal compliance with security-related documents, such as security pledges and security-related guidelines and procedures.

A Study on Speed Limit Rules under Sailing Regulations - Focusing on the Perspective of VTS Control - (항법상 속력의 제한규칙에 관한 고찰 - VTS의 관제 관점에서 -)

  • Chong, Dae-Yul
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • 제28권2호
    • /
    • pp.254-261
    • /
    • 2022
  • Every vessel shall proceed at a safe speed to avoid collision. Additionally, every vessel shall comply with the speed limit rules in the territorial water and internal waters of Korea. The VTS operator shall properly control the compliance of the vessel with the safe speed and speed limit rules. Safe speed under the COLREG 1972 is not explicitly stipulated in knots. However, under the Domestic law for traffic safety-specific sea areas, etc., the speed limit is specified in knots and complied with. This speed limit rule is mainly based on the 'speed made good over the ground'; however, in some places, it is based on the 'speed making way through the water'. In this paper, I analyzed marine accidents that occurred in the past 5 years and the rate of violation of speed limits. Furthermore, I reviewed safe speed under the COLREG 1972, speed limit rules under domestic and foreign laws, and cases of non-compliance with safe speed in the judgment of the Korea Maritime Safety Tribunal. Resultantly, I suggested in this paper that the speed limit rules in the domestic law must be observed by vessels to prevent marine accidents, and the rules which are stipulated in terms of 'speed making way through the water' must be revised as 'speed made good over the ground' such that the vessels can easily comply with them and the VTS operator can control the vessel properly.

A Study on Unauthorized Anchoring of Foreign-flag Vessels in Internal Waters and Territorial Sea (외국선박의 내수 및 영해 무단정박에 관한 연구)

  • Lim, Chae-Hyun;Lee, Chang-Hee;Jeong, Dae-Deuk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • 제28권2호
    • /
    • pp.280-289
    • /
    • 2022
  • Internal Waters refer to the waters located at the landward side of a baseline and is completely under the sovereignty of a coastal state. However, the right of innocent passage of foreign-flag vessels is recognized in internal waters that are newly incorporated by establishing a straight baseline. Korea has a massive Internal Waters on its south-western coast where the straight baseline is adopted and has a wide Internal Waters that allows innocent passage. A foreign-flag vessel navigating the internal waters must be properly managed according to the interest of the coastal states such as the fishing·safety·security·environment around the Korean coast. Additionally, Territorial Sea comes under the sovereignty of a coastal state and it is a very important sea area for managing the interests of the coastal states. However, several collision accidents involving illegally anchored or drifted foreign-flag vessels have been occurring recently in the Korean Internal Waters and Territorial Sea, and such accidents are a threat to its interests. Thus, this paper analyzes the cases of collision of foreign-flag vessels that anchored or drifted without authorization, and examines domestic·international laws on the passage of foreign-flag vessel through Internal Waters and Territorial Waters. Finally, this paper suggests that unauthorized anchoring of foreign-flag vessels in Korean Internal Waters and Territorial Water violates the requirements for innocent passage and this violation is punishable according to related Acts; a desirable improvement plan for the legal system of passage through Internal Waters and Territorial Waters.

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • 제16권1호
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.

Active VM Consolidation for Cloud Data Centers under Energy Saving Approach

  • Saxena, Shailesh;Khan, Mohammad Zubair;Singh, Ravendra;Noorwali, Abdulfattah
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.345-353
    • /
    • 2021
  • Cloud computing represent a new era of computing that's forms through the combination of service-oriented architecture (SOA), Internet and grid computing with virtualization technology. Virtualization is a concept through which every cloud is enable to provide on-demand services to the users. Most IT service provider adopt cloud based services for their users to meet the high demand of computation, as it is most flexible, reliable and scalable technology. Energy based performance tradeoff become the main challenge in cloud computing, as its acceptance and popularity increases day by day. Cloud data centers required a huge amount of power supply to the virtualization of servers for maintain on- demand high computing. High power demand increase the energy cost of service providers as well as it also harm the environment through the emission of CO2. An optimization of cloud computing based on energy-performance tradeoff is required to obtain the balance between energy saving and QoS (quality of services) policies of cloud. A study about power usage of resources in cloud data centers based on workload assign to them, says that an idle server consume near about 50% of its peak utilization power [1]. Therefore, more number of underutilized servers in any cloud data center is responsible to reduce the energy performance tradeoff. To handle this issue, a lots of research proposed as energy efficient algorithms for minimize the consumption of energy and also maintain the SLA (service level agreement) at a satisfactory level. VM (virtual machine) consolidation is one such technique that ensured about the balance of energy based SLA. In the scope of this paper, we explore reinforcement with fuzzy logic (RFL) for VM consolidation to achieve energy based SLA. In this proposed RFL based active VM consolidation, the primary objective is to manage physical server (PS) nodes in order to avoid over-utilized and under-utilized, and to optimize the placement of VMs. A dynamic threshold (based on RFL) is proposed for over-utilized PS detection. For over-utilized PS, a VM selection policy based on fuzzy logic is proposed, which selects VM for migration to maintain the balance of SLA. Additionally, it incorporate VM placement policy through categorization of non-overutilized servers as- balanced, under-utilized and critical. CloudSim toolkit is used to simulate the proposed work on real-world work load traces of CoMon Project define by PlanetLab. Simulation results shows that the proposed policies is most energy efficient compared to others in terms of reduction in both electricity usage and SLA violation.

The effect of trust repair behavior on human-robot interaction (로봇의 신뢰회복 행동이 인간-로봇 상호작용에 미치는 영향)

  • Hoyoung, Maeng;Whani, Kim;Jaeun, Park;Sowon, Hahn
    • Korean Journal of Cognitive Science
    • /
    • 제33권4호
    • /
    • pp.205-228
    • /
    • 2022
  • This study aimed to confirm the effect of social and relational behavior types of robots on human cognition in human-robot interaction. In the experiment, the participants evaluated trust in robots by watching a video on the robot Nao interacting with a human, in which the robot made an error and then made an effort to restore trust. The trust recovery behavior was set as three conditions: an internal attribution in which the robot acknowledges and apologizes for an error, a condition in which the robot apologizes for an error but attributes it externally, and a non-action condition in which the robot denies the error itself and does not take any action for the error. As the result, in all three cases, the error was perceived as less serious when the robot apologized than when it did not, and the ability of the robot was also highly evaluated. These results provide evidence that human attitudes towards robots can respond sensitively depending on the robot's behavior and how they overcome errors, suggesting that human perception towards robots can change. In particular, the fact that robots are more trustworthy when they acknowledge and apologize for their own errors shows that robots can promote positive human-robot interactions through human-like social and polite behavior.

Exploring the Effectiveness of Audit Against the Improper Usage of Social Service Vouchers in South Korea (사회서비스 부적정 이용에 대한 감사 효과분석 - 사회서비스 바우처 사업을 중심으로 -)

  • Park, Chun Bok;Kim, Jong Ho;Jung, Kwangho
    • 한국정책학회보
    • /
    • 제23권3호
    • /
    • pp.161-198
    • /
    • 2014
  • The various types of improper usages in the process of delivering social services have been increasingly paid to attention in South Korea. This study, relying on empirical data about the various improper behaviors, explore whether the audit activity can reduce the degree of the improper behavior. In order to estimate the impact of the audit, we use the DID(Difference in difference) method, comparing the experimental group with the audit treatment and the control group without it. We control for size(the number of Service personnel and user), types of social service (elderly, disabled, etc.), organizational forms(profit, non-profit), region(metropolitan areas, small-medium cities, rural areas), and the number times of audit (1, 2, and 3 number). Our empirical results show that the audit decreased the ratio of payment violation by about 4.02 percent, the number of violations from providers' improper payment by approximately 5.07 and the number of violations from users' improper payment by approximately 9.59. Further research is required to explore why and how the audit can decrease the improper usage in social service with rigorous theoretical models.