• Title/Summary/Keyword: breaching

Search Result 38, Processing Time 0.029 seconds

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

Effects of Feeding Mixture of Commercial Broiler Feed with Spent Bleaching Clay from Vegetable Oil Refinery on Broiler Performance (육계사료와 식용유 정제 폐백토(Spent Bleaching Clay) 급여가 육계의 생산성에 미치는 영향)

  • Jeon H. Y.;Son J. H.;Lee K. W.;Kim S. K.;Kang H. S.;Shin T. S.;Cho B. W.
    • Korean Journal of Poultry Science
    • /
    • v.32 no.4
    • /
    • pp.255-260
    • /
    • 2005
  • This study was conducted to evaluate the feasibility of spent bleaching clay(SBC) as an energy resource for meat type chicks. A total of one hundred twenty 1-d old broiler chicks(Han-hyop, No. 3) were divided into four groups and each group was assigned to one of the following diets: 0(T1), 2.0(T2), 4.0(T3) and $6.0\%$ SBC(T4). Each treatment had 3 replications of 10 birds. Before feeding experimental diets, they were fed a commercial diet for a week Body weight gain and feed intake tended to increase in T3 and T4, respectively. Feed efficiency(feed intake/ gain) tended to decrease in T3 compared to other groups. Fatty acid composition of breast and thigh meat was not significantly affected by feeding SBC. Utilization of dry matter, energy, crude protein and crude fat was lower in T4 than in the other groups during both starter and finisher periods(p<0.05). Crude ash utilization was not significantly affected by feeding dietary SBC. These results indicate that broiler diets may be supplemented with 2 to $4\%$ SBC without adverse effect on growth.

Analysis of breaching behavior of levee according to coating thickness of new substance (신소재의 피복두께에 따른 제방의 붕괴 거동 분석)

  • Ko, Dong Woo;Kim, Sung Joong;Kang, Joon Gu
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2018.05a
    • /
    • pp.480-480
    • /
    • 2018
  • 전 세계적으로 자연 친화, 하천생태계 보전, 친수하천 등을 조성하기 위한 대대적인 하천 정비사업이 활발히 진행 중에 있다. 최근 홍수로 인한 제방 붕괴에 대응하기 위한 제방의 안정화 및 개선을 위한 방법으로 기존의 시멘트와 같은 혼합물질을 사용하지 않고 환경 친화적이고 지속 가능한 대안에 대한 수요가 증가되고 있는 추세이며 현재 노후화 된 불안정 제방에 대한 보강대책을 수립해나가는 과정으로써 친환경 신소재를 활용하여 제방을 보호하는 연구가 수행되고 있다. 제방사면에 적용되는 신소재는 바이오폴리머를 활용한 재료로써 공동연구기관 카이스트에서 개발된 환경 친화적인 물질로 미생물에 의해 유도된 고인장 및 인체 무해성 등의 특성을 갖고 있으며 경제적 타당성인 측면에서 시멘트와 비교 분석 되어야 하고 실제 현장에서의 적용 가능성, 신뢰성 및 내구성 검토 등 성능을 보장하기 위한 지속적인 연구가 필요한 상황이다. 이에 본 안동하천실험센터에서는 중규모 제방을 직접 제작하여 수리모형실험을 통한 친환경 신소재 활용 제방의 안정성 및 성능 평가를 실시하였다. 수리실험 조건은 카이스트에서 제시된 레시피를 기반으로 먼저 분말형태의 바이이폴리머를 물과 희석하여 만들어진 바이오폴리머 용액을 흙과 혼합한 뒤 제방표면에 직접 미장작업을 수행하여 실험조건에 따라 일정한 두께(1cm, 3cm, 5cm)로 피복하였다. 이후 월류 붕괴 실험이 가능한 3 - 5일 정도의 양생기간을 거쳐 실험을 진행하였다. 실험결과는 다수의 고프로(GoPro) 및 비디오 카메라 등 다양한 영상장치를 이용하여 픽셀기반의 영상분석기법을 활용한 시간 흐름에 따른 제방 사면에서의 붕괴규모를 산정하여 신소재의 피복 두께에 따른 제체의 붕괴 거동 및 안정성을 평가하였으며, 또한 제방 파괴부에서의 흐름 상황 및 유속이 붕괴 발달에 미치는 영향을 분석하기 위하여 PIV 분석을 실시하였다. 이번 연구의 최종목표는 지속적인 예비실험을 수행하여 월류 및 침투, 파이핑 등 파괴 인자 별 신소재의 성능 개선 및 개발된 새로운 공법에 대한 효과 검토를 통한 최적안을 도출함으로써 향후 실규모 실험실증을 통한 신소재 시공 및 공법에 대한 현장적용 가능성 검증을 거쳐 최종적으로 신소재 제방 공법 설계 기술, 신소재 및 공법 표준안, 제방공법 안정성 평가 가이드라인 등을 제시하고자 하며, 이러한 실험데이터를 축적함으로써 실제 제방 붕괴 시 비상대처계획 수립에 필요한 기초자료로 활용이 가능할 것으로 사료된다.

  • PDF

A Comparative Study on Requirements for the Buyer's Right to Withhold Performance for the Seller's Actual Non-Performance under the CISG and the CESL

  • Lee, Byung-Mun;Kim, Dong-Young
    • Journal of Korea Trade
    • /
    • v.24 no.8
    • /
    • pp.101-120
    • /
    • 2020
  • Purpose - The buyer's right to withhold performance is a useful and important self-help remedy to protect himself from the seller's breach of contract, and it is also the coercive means to induce the seller to perform his part of contract. However, the buyer's exercise of such a right often exposes himself to the risk of breaching the contract. This is generally due to his ignorance when he is entitled to the right and also uncertainties inherent in the law. Therefore, the purpose of this paper is to examine what the requirements should be fulfilled before the buyer exercises the right for the seller's actual breach of contract. Design/methodology - In order to achieve the purposes of the study, it executes a comparative study of the rules as to the requirements for the buyer's right to withhold performance for the seller's actual non-performance under the CISG and the CESL. It mainly focuses on performance due, the seller's non-performance, the buyer's readiness to perform and the requirement of notice. Findings - The main findings of this comparative study can be summarized as follows: Although the CISG has no expressive provision for the buyer's general right to withhold performance for the seller's actual non-performance, it may be inferred from the general principles the CISG underlies, synallagmatic nature of the contract. In addition, it can be drawn by analogy from relevant provisions of the CISG. On the other hand, the CESL expressively provides that the buyer has a general right to withhold performance where the seller fails to tender performance or perform the contract. Therefore, it seems that the position of CESL is rather easier and more apparent to allow the buyer to withhold performance for the seller's non-performance. Originality/value - Most of the existing studies on the right to withhold performance under the CISG have centered on the right to withhold performance for an anticipatory breach of contract. On the other hand, there have been few prior studies on the right to withhold performance for the actual nonperformance during a contractual period of performance. Therefore, this paper examined the requirements for the buyer's right to withhold performance under the CISG and the CESL in a comparative way for the seller's actual breach of obligation. In this conclusion, it may provide practical and legal considerations and implications for business people who are not certain about the right to withhold performance.

Effects of Citrus limon Extract on Oxidative Stress-Induced Nitric Oxide Generation and Bovine Teeth Bleaching

  • Jeong, Soon-Jeong
    • Journal of dental hygiene science
    • /
    • v.21 no.2
    • /
    • pp.96-103
    • /
    • 2021
  • Background: We aimed to investigate the effect of Citrous limon extract (CLE) on oxidative stress-induced cytotoxicity and nitric oxide (NO) generation and the tooth bleaching effect of CLE as a substitute for hydrogen peroxide (H2O2) and determine the feasibility and application of CLE as a safe and effective natural tooth bleaching agent. Methods: The protective effect of CLE on H2O2-induced cytotoxicity in Raw264.7 macrophages was investigated by the MTT assay. The inhibitory effect of CLE on the generation of H2O2-induced NO was confirmed by the NO assay, and the changes in inducible nitric oxide synthase (iNOS) protein expression were confirmed by western blotting. Stained bovine teeth were treated with/without 15% and/or 35% CLE and H2O2, 15% sodium bicarbonate (NaHCO3) for 3 hours, and were irradiated with/without bleaching light (BL) for 15 minutes. The color change of the treated bovine tooth surface was measured using a colorimeter. Results: The viability of Raw264.7 cells treated with each concentration of CLE and 500 μM H2O2 significantly increased as CLE increased, and NO generation and iNOS protein expression were significantly reduced in cells treated with 300 ㎍ CLE+/500 μM H2O2+ and 300 ㎍ CLE+/500 μM H2O2+/150 ㎍ NaHCO3+. The bleaching effect of 35% CLE+ was higher than that of 15% CLE+ and 15% NaHCO3+, and the effect was similar to that of 15% H2O2+. The 35% CLE+/15% NaHCO3+ showed the greatest bleaching effect and was higher than that of the groups irradiated with the BL. The greatest bleaching effect was observed with 35% CLE+/15% NaHCO3+, followed by 35% H2O2+/BL+. Conclusion: CLE inhibited oxidative stress-induced cytotoxicity and NO generation in Raw264.7 cells and, could replace H2O2, which causes side effects and risks in teeth breaching treatment. It showed greatest teeth bleaching effect when combined with NaHCO3. CLE is an effective and safe natural tooth bleaching substitute.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

The Violation of Medical law and liability of tort regarding National Health Insurance Service (NHIS) - Supreme Court 2013. 6. 13 Sentence 2012Da91262 Ruling, 2015. 5. 14 Sentence 2012Da72384 regarding the Judgment - (의료법 위반과 국민건강보험공단에 대한 민법상 불법행위책임 - 대법원 2013. 6. 13. 선고 2012다91262 판결, 2015. 5. 14. 선고 2012다72384 판결을 중심으로 -)

  • Lee, Dong Pil
    • The Korean Society of Law and Medicine
    • /
    • v.16 no.2
    • /
    • pp.131-157
    • /
    • 2015
  • NHIS claimed for damages to doctors that by doing the treatment breaching medical insurance criteria caused by doctors, NHIS paid for medicine cost to pharmacy; as a result, the doctors caused the tort to NHIS. Following consecutive rulings afterwards, NHIS also argued that the medicine cost violating medical law or medical treatment expense paid to medical organizations are both the tort in civil law. NHIS claimed for all the damages, and the Supreme Court confirmed this judgment. However, within our national health insurance system, the subject of insurance payment is NHIS and the subject of medical treatment expense are also NHIS since the treatment expense is also insurance payment by asking the treatment to medical organizations. Further, national health insurance law is not made to control the violation of medical treatment cases; therefore, the breach of medical law cannot be covered by illegality of tort in civil law regarding NHIS. If that is the case, in the case that if the patients are treated according to treatment criteria via the doctors delegated the doctors' permission by Health and Welfare minister, NHIS acquired the benefits to remove the duty to give treatment payment to doctors in civil law; thus, even though the doctors have breached the medical law, NHIS does not have any damages. The fact that supreme court confirmed the ruling that the treatment is the tort in civil law towards NHIS is the judgment not counting the benefits of insurance payment as the subject but only considering the fact that NHIS paid to the doctors and this ruling have gone against the principle under civil code section 750. If the doctors have breached the medical law, the case should be sanctioned by medical law not national health insurance law, and the ruling of supreme court is assumed that they have confused both with the principle of national health insurance law and civil law.

  • PDF

A Study of the Supply of Large Korean Pine Timber (국산 육송 특대재 수급 현황 분석 및 문화재 수리의 활용에 관한 연구)

  • Jung, Younghun;Yun, Hyundo
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.4
    • /
    • pp.136-149
    • /
    • 2020
  • It is generally believed that Douglas Fir timber imported from North America is used in repair work for Korean wooden heritage sites due to an insufficient supply of extra-large sized Korean pine timber. Based on this understanding in the cultural heritage repair field, Cultural Heritage Repair Business Entities ("CHRBE") prefer North American Douglas Fir timber which is more easily acquired on the market than large Korean pine timber. However, if CHRBE use large quantities of foreign-origin wood in the heritage repair field, this presents the threat of negative domestic impacts on cultural heritage such as breaching the preservation principal and ultimately weakening material authenticity. Therefore, this study aims to investigate the current supply status of large Korean pine timber through examination of existing research, interviews with experts engaged in CHRBE, and timber mills. With this information, the authors seek to identify whether the market supply of large Korean pine timber is indeed insufficient or not. In addition to this, this paper identifies the reasons why large Korean pine timber is not widely used if such timber supply is actually sufficient. In order to propose suggestions regarding the issues above, the authors study the distribution channel for large Korean pine timber and the price spectrum of this timber through examination of price information from the public agencies under the Korea Forest Service, research papers from the Cultural Heritage Administration, and estimation documents from timber mills. This paper also identifies two main opinions about why Korean timber has not been commonly used in the Korean heritage repair field. The first opinion is that the supply of large Korean pine timber really is insufficient in Korea. However, the second opinion is that it is hardly used due to inappropriateness of the government's procurement and estimation system, despite the fact that the supply of the timbers on the market is actually sufficient. Through the aforementioned research, this paper comes to the conclusion that the second opinion has strong grounds in many aspects. In terms of suggestions, alternative routes are proposed to stimulate the use of large Korean pine timber via supply by the 'Korea Foundation for Traditional Architecture and Technology' and surveys of the price spectrum of the timber, etc.