• Title/Summary/Keyword: cyber electronic

Search Result 304, Processing Time 0.025 seconds

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.

Trends and Prospects of N. Korea Military Provocations After the Sinking of ROKS Cheon-an (천안함 폭침 이후 북한의 군사도발 양상과 전망)

  • Kim, Sung-Man
    • Strategy21
    • /
    • s.34
    • /
    • pp.58-92
    • /
    • 2014
  • Even after S. Korea took 5.24 Measure(24 May 2014), N. Korea has not stopped raising provocations such as the shelling of Yeonpyeong Island, electronic and cyber attacks. To make matters worse, the communist country lunched long-range missiles(twice) and conducted 3rd nuclear test, escalating tensions which could possibly lead to an all-out war. Korean Government failed to respond properly. However, escalation into an all-out war was deterred by the CFC immediately carrying out its peacetime duty(CODA). The US made a rapid dispatch of its augmentation forces(Aircraft carrier, nuclear-powered submarine, strategic bomber, F-22) to the Korean Peninsula. In recognition of the importance of the Combined Forces Command, since May 2013 the Park Geun-Hye Administration has been pushing ahead with re-postponement of Wartime Operational Control Transfer(which initially meant the disassembling of the CFC as of 1 December 2015) More recently, there has been a series of unusual indicators from the North. Judging from its inventory of 20 nuclear weapons, 1,000 ballistic missiles and biochemical weapons, it is safe to say that N. Korea has gained at least war deterrence against S. Korea. Normally a nation with nuclear weapons shrink its size of conventional forces, but the North is pursuing the opposite, rather increasing them. In addition, there was a change of war plan by N. Korea in 2010, changing 'Conquering the Korean Peninsula' to 'Negotiation after the seizure of the Greater Seoul Metropolitan Area(GSMA)' and establishing detailed plans for wartime projects. The change reflects the chain reaction in which requests from pro-north groups within the South will lead to the proclamation of war. Kim, Jeong-Un, leader of N. Korean regime, sent threatening messages using words such as 'exercising a nuclear preemptive strike right' and 'burning of Seoul'. Nam, Jae-June, Director of National Intelligence Service, stated that Kim, Jung-Un is throwing big talks, saying communization of the entire Korean Peninsula will come within the time frame of 3 years. Kim, Gwan-Jin, Defense Minister, shared an alarming message that there is a high possibility that the North will raise local provocations or a full-fledged war whenever while putting much emphasis on defense posture. As for the response concept of the Korean Government, it has been decided that 'ROK·US Combined Local Provocation Counter-Measure' will be adopted to act against local provocations from the North. Major provocation types include ▲ violation of the Northern Limit Line(NLL) with mobilization of military ships ▲ artillery provocations on Northwestern Islands ▲ low altitude airborne intrusion ▲ rear infiltration of SOF ▲ local conflicts within the Military Demarcation Line(MDL) ▲ attacking friendly ships by submarines. Counter-measures currently established by the US involves the support from USFK and USFJ. In order to keep the sworn promise, the US is reinforcing both USFK and USFJ. An all-out war situation will be met by 'CFC OPLAN5027' and 'Tailored Expansion Deterrence Forces' with the CFC playing a central role. The US augmentation forces stands at 690,000 troops, some 160 ships, 2,000 aircraft and this comprise 50% of US total forces, which is estimated to be ninefold of Korean forces. The CFC needs to be in center in handling both local provocations and an all-out war situation. However, the combat power of S. Korean conventional forces is approximately around 80% of that of N. Korea, which has been confirmed from comments made by Kim, Gwan-Jin, Defense Minister, during an interpellation session at the National Assembly. This means that S. Korean forces are not much growing. In particular, asymmetric capabilities of the North is posing a serious threat to the South including WMD, cyber warfare forces, SOF, forces targeting 5 Northwestern Islands, sub-surface and amphibious assault forces. The presence of such threats urgently requires immediate complementary efforts. For complementary efforts, the Korean Government should consider ① reinforcement of Korean forces; putting a stoppage to shrinking military, acquisition of adequate defense budget, building a missile defense and military leadership structure validity review, ② implementation of military tasks against the North; disciplinary measures on the sinking of ROKS Cheon-an/shelling of Yeonpyeong Islands, arrangement of inter-Korean military agreements, drawing lessons from studies on the correlation between aid for N. Korea, execution of inter-Korean Summit and provocations from the North, and ③ bolstering the ROK·US alliance; disregarding wartime operational control transfer plan(disassembling of CFC) and creation of a combined division.

Effects of Third-Party Logistics Choice Factors on the Performance of Cyber Logistics (삼자물류선택요인들이 사이버물류성과에 미치는 영향에 관한 연구)

  • Park, Yeung-Kurn;Kim, Chang-Wan
    • Journal of Global Scholars of Marketing Science
    • /
    • v.8
    • /
    • pp.429-449
    • /
    • 2001
  • Objectives of this study were: First, The Purpose of this study is to develope the concept of Third-Party Logistics choice factors and to review effects of Third-Party Logistics choice Factors on the Logistics Performance. Second, to set up research model specifying relationships between Third-Party Logistics choice factors and the Logistics Performance of EC(Electronic Commerce) firms. Third, to test hypotheses derived from the research model of this study and to attempts to explain how to have the effect the Logistics Performance of EC firms. Marketing Implications of this study were: First, As a result factor analysis, Third-Party Logistics choice Factors was divided into three dimensions, credibility, the pursuit of relationship, and assets factors. Second, three factors which are credibility, the pursuit of relationship, and assets factors increase and enhance the Logistics Performance of EC firms. Limitations of this study were: First, validity and reliability of data collection methods used in this study were questionable for the lack of past researches in korea. Second, static research method was employed in this study. Generalization over different time interval was almost impossible from results of this study.

  • PDF

Estimation of Populations of Moth Using Object Segmentation and an SVM Classifier (객체 분할과 SVM 분류기를 이용한 해충 개체 수 추정)

  • Hong, Young-Ki;Kim, Tae-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.705-710
    • /
    • 2017
  • This paper proposes an estimation method of populations of Grapholita molestas using object segmentation and an SVM classifier in the moth images. Object segmentation and moth classification were performed on images of Grapholita molestas moth acquired on a pheromone trap equipped in an orchard. Object segmentation consisted of pre-processing, thresholding, morphological filtering, and object labeling process. The classification of Grapholita molestas in the moth images consisted of the training and classification of an SVM classifier and estimation of the moth populations. The object segmentation simplifies the moth classification process by segmenting the individual objects before passing an input image to the SVM classifier. The image blocks were extracted around the center point and principle axis of the segmented objects, and fed into the SVM classifier. In the experiments, the proposed method performed an estimation of the moth populations for 10 moth images and achieved an average estimation precision rate of 97%. Therefore, it showed an effective monitoring method of populations of Grapholita molestas in the orchard. In addition, the mean processing time of the proposed method and sliding window technique were 2.4 seconds and 5.7 seconds, respectively. Therefore, the proposed method has a 2.4 times faster processing time than the latter technique.

A study on the standardization for outpatient management and adminstration process of some regional hospitals (일부지역 의료기관의 외래원무관리 표준화에 관한 연구)

  • Kim, Jin-A;Lee, Moo-Sik;Hwang, Hye-Jung;Kim, Kwang-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.357-366
    • /
    • 2016
  • This study evaluated the standardization of the outpatient management process in several regions of South Korea. The hospital workers in the administration department of the different medical institutions that are registered with the Korean Hospital Association were surveyed. These institutions can be standard hospitals or hospitals greater in size. A summary of the research results are as follows. There was no significant correlation in their registration procedures in relation to the institution's founder, number of sickbeds, number of staff employed in the administration department, and average number of outpatients per day. On the other hand, the prepayment of medical fees occurred more frequently when the number of sickbeds was larger. In addition, there was no large difference in their appointment procedures in relation to those features. Nevertheless, the prepayment of medical fees accounted for 11.8 % of the entire payment in institutions with less than five hundred beds, while fifty percent of the payment was made in advance in larger institutions with five hundred or more beds. From this research, there was only a small difference among the institutions' outpatient management, but a notable difference was observed in their electronic data processing systems and facilities. Therefore, more financial support should be generated for the implementation of a more integrated process. As a follow-up study, to provide patients with quality medical services, it will be necessary to apply the standardized procedure to an actual medical institution and analyze the expected effect.

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Object Segmentation for Detection of Moths in the Pheromone Trap Images (페로몬 트랩 영상에서 해충 검출을 위한 객체 분할)

  • Kim, Tae-Woo;Cho, Tae-Kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.12
    • /
    • pp.157-163
    • /
    • 2017
  • The object segmentation approach has the merit of reducing the processing cost required to detect moths of interest, because it applies a moth detection algorithm to the segmented objects after segmenting the objects individually in the moth image. In this paper, an object segmentation method for moth detection in pheromone trap images is proposed. Our method consists of preprocessing, thresholding, morphological filtering, and object labeling processes. Thresholding in the process is a critical step significantly influencing the performance of object segmentation. The proposed method can threshold very elaborately by reflecting the local properties of the moth images. We performed thresholding using global and local versions of Ostu's method and, used the proposed method for the moth images of Carposina sasakii acquired on a pheromone trap placed in an orchard. It was demonstrated that the proposed method could reflect the properties of light and background on the moth images. Also, we performed object segmentation and moth classification for Carposina sasakii images, where the latter process used an SVM classifier with training and classification steps. In the experiments, the proposed method performed the detection of Carposina sasakii for 10 moth images and achieved an average detection rate of 95% of them. Therefore, it was shown that the proposed technique is an effective monitoring method of Carposina sasakii in an orchard.

Design of the Copyright Protection for ePub e-Book System using Certification Information (인증 정보를 이용한 전자책 ePub의 저작권 보호 시스템 설계)

  • Jang, Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2197-2204
    • /
    • 2015
  • In recent times, the high-tech society has become the most important issue by IT technology and publication network. Today such flows have also been the case in the e-book field. Today's electronic publication is changing day by day. But there are some problems according to the prevalence of e-book. E-book is similar to p-book(paper-book). There is a limit to have perfect feeling of a texture of p-book. In order to purchase an e-book, people use online. People having malicious intent could copy and distribute it illegally. It leads to cyber abuses. This paper aims at the copyright protection of e-book ePub writers. The proposed e-book copyright protection system is designed using e-book production Sigil environment and C program environment. This system uses client-server communication through e-book ePub as authentication information. It discerns whether to permit or not for a client to read the e-book using authentication information. Authentication information includes ID, password, IP address, limited time of authentication information, GUID(Globally Unique Identifier). If authentication information about e-book meets requirements, people can use it. But if not, it blocks people's approach by quitting program.

The Aspectual Theory of the Cybercharacter (사이버캐릭터의 위상론)

  • 이선교
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.182-190
    • /
    • 1999
  • There has been the rapid change of paradigm with the overflow of terms related to computers such as information, digital, cyber, virtual world and the change of time concept on the ground that it is common to change the world into virtual time. This study is about cybercharacters working in air-broadcasting with rapidly-developing internet, The cybercharacters including 3D animation developed from 2D animation are know to be manufactured with use of electronic mediun and computers and to exist in electronics. Though the emergence of the cybercharacters has a lot of gflnetic roots according to their objectives, they have in common that they are made by 3D graphics and they work in the virtual space, The great traits of the cybercharaters lie in the extension of interfacial function and ecological growth. In the cyberspace the interface, the meeting point between a computer and its users is the most important, The cybercharacters as medium providing new ruman interface become effective with growing interest in virtual reality, The cybercharacters also keep the ecological traits, They can also bring about added value with infusion of image and development of the network, These cybercharacters can also play the important parts in the continually developing cyberspace, The successful birth of the cybercharacter are based on, the technological power. assistance of fund and the ctrltural background, The information-entertainment of the cybercharacters functions well with the accompinimene of these three things, The cybercharacters can make a subject which keeps single issue as a central point of the virtual realty, The cybercharacters can also be connected with equity of "Korean knowledge information society" in the cultural rule of the internet and sociocul tural identity, identity.

  • PDF

A study on the Frequency Analysis Function of the Auricle Using A Notch Filter

  • Park, Dong-Cheol
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.241-255
    • /
    • 2021
  • The human auricle is the first part to receive sound from the outside. In this part, the frequency range of human recognizable form is divided and organized. In this study, we propose modeling by applying a single sound source to the surface of the human auricle. This means that when the sound pressure of a low frequency (low frequency) sound enters the pinna, the impedance felt at the tip of a part of the non-linear surface of the pinna is mainly due to the tensile force at the end of the part of the non-linear surface of the pinna. By expressing the situation of moving at a very small speed, the characteristic impedance of the pinna was confirmed to be negative infinity, and it was also confirmed that the speed at the tip of a part of the non-linear surface of the pinna was 0 in the anti-resonance state. It was found that the wave propagation phenomenon that determines the characteristics of the filter is determined by how large the wavelength, kL, is compared to the length of the tip of a part of the non-straight surface of the pinna. Humans first receive sounds from outside through their ears. The auricle is non-linear and has a curved shape, and it is known that it analyzes frequencies while receiving external sounds. The human ear has an audible frequency range of 20Hz - 20,000Hz. Through the study, we applied the characteristics of the notch filter to hypothesize that the human audible frequency range is separated from the auricle, and applied filter theory to analyze it, and as a result, meaningful results were obtained. The curved part and the inner part of the auricle function as a trumpet, collecting sounds, and at the same time amplifying the weak sound of a specific band. The point was found and the shape of the envelope detected in the auricle was found. Selectivity for selecting sounds coming from the outside is the formula of the pinna that implements the function of Q. The function of distinguishing human-recognizable sound from the pinna from low to high through frequency analysis is performed in the pinna, and the 2-3kHz area, where human hearing threshold is the most sensitive, is also the acoustic impedance of the most recessed area of the pinna. It can be seen that starting from.