• Title/Summary/Keyword: disclosure system

Search Result 282, Processing Time 0.026 seconds

Real-time Vehicle License Plate Recognition Method using Vehicle-loaded Camera (차량 탑재용 카메라를 이용한 실시간 차량 번호판 인식 기법)

  • Chang, Jae-Khun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.147-158
    • /
    • 2005
  • Day after day the information of vehicle under the complex traffic environments is greatly required not only for traffic flow but also for vehicle disclosure of traffic violation, Vehicle information can be obtained from a recognition of vehicle license plate, This paper proposes a new vehicle plate recognition mechanism that uses moving style vehicle-loaded camera, The method is a real-time processing system using multi-step image processing and recognition process that recognizes general vehicles and special purpose vehicles, The experimental results of real environmental image and recognition using the proposed method are shown.

  • PDF

A Study on the Improvement of REITs in Korea (부동산 투자회사(REITs)제도 개선방안에 대한 연구)

  • O Dong Il
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.6
    • /
    • pp.562-570
    • /
    • 2004
  • Since 2001, REITs are introduced in Korea as a type of general REITs and CR-REITs. But REITs are not succefully settled down in Korea. The purpose of the study is to propose the way to activate REITs in Korea. We should make up for the weak points in the current REITs system. For the success of REITs the followings are prepared.: first, REITs give a current, stable dividend income. second, disclosure obligations should be satisfied. third, securities are registered with the SEC are required to make regular SEC disclosures. fourth, REIT manager should be skilled, experienced real estate professionals. sixth, REITs must distribute more percent of its taxable income to its shareholders. seventh, Ownership interests be more flexible.

  • PDF

Study on NFC Security Technology and Vulnerability (NFC 보안 기술 및 보안 취약점에 관한 연구)

  • Kim, Mi-Sun;Kim, Hyun-Gon;Lee, Bum-Ki;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.2 no.3
    • /
    • pp.54-61
    • /
    • 2013
  • NFC is a Near Field wireless Communication technology, comes to the fore as an important technology of Mobile Payment System with supply of devices and diffusion of services. Because of the fact that the NFC retail payment services, ticketing, smart cards are able to operate in one device, it(NFC Technology) can make disclosure of personal information and security risks. Thus, the problem of security in NFC technology is essential, and the need for research on security threats are increasing. In this paper, we wil analyze for NFC's vulnerabilities and security technology.

  • PDF

Cloud Storage Security Deduplication Scheme Based on Dynamic Bloom Filter

  • Yan, Xi-ai;Shi, Wei-qi;Tian, Hua
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1265-1276
    • /
    • 2019
  • Data deduplication is a common method to improve cloud storage efficiency and save network communication bandwidth, but it also brings a series of problems such as privacy disclosure and dictionary attacks. This paper proposes a secure deduplication scheme for cloud storage based on Bloom filter, and dynamically extends the standard Bloom filter. A public dynamic Bloom filter array (PDBFA) is constructed, which improves the efficiency of ownership proof, realizes the fast detection of duplicate data blocks and reduces the false positive rate of the system. In addition, in the process of file encryption and upload, the convergent key is encrypted twice, which can effectively prevent violent dictionary attacks. The experimental results show that the PDBFA scheme has the characteristics of low computational overhead and low false positive rate.

Archival Reference Service and Freedom of Information in Korea (기록정보 서비스와 정보공개 - 이용자 중심의 서비스 논쟁을 중심으로 -)

  • Youn, Eunha
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.12 no.2
    • /
    • pp.163-179
    • /
    • 2012
  • The author discusses the nature and scope of archival reference service through the debate to user studies in the 1980s and the 1990s. Until the 1990s, archivists paid little attention to studying their user population. A new approach to archival user service led to the development of various public services of archives and resulted in active interaction with the public. Based on the discussion, the article examines the implication of archival reference service in Korean society.

"A Defeat Without Surrender": Beyond the Heteronormative Horizon in Kate Chopin's The Awakening ("항복 없는 패배": 케이트 쇼팽의 『각성』 속 이성애적 서사 너머의 (불)가능한 욕망)

  • Kim, Hyunsoo
    • American Studies
    • /
    • v.43 no.1
    • /
    • pp.1-23
    • /
    • 2020
  • This paper is an effort to critique the heteronormative interpretations of Kate Chopin's The Awakening and to examine the relationships of three women-Edna Pontellier, Adele Ratignolle, Mademoiselle Reisz-in the homosocial climate of the Grand Isle. Through the disclosure of erotic encounters between these women and their deferred gratification, Chopin reveals the social imperative which suppresses and fixates female desire on a male object choice. Chopin also sheds light upon the masculine language appropriating romance and chivalry that renders it impossible for Edna to articulate her sexuality within the matrix of the phallocentric society. The Awakening is not a conventionalized plot which ends in Edna's subordination to the patriarchal order; rather, the story demonstrates the "process" of how her sexual awakening becomes negotiated under the patriarchal system and exposes the excess of desire that fails to be subsumed under the hegemonic discourse.

Enhancing the Applicability and Improvement Direction of Integrated Environmental Permit System (통합환경허가시스템의 활용도 제고 및 개선방향)

  • Park, Jae Hong;Shin, Su Jeong;Lee, Dae Gyun
    • Journal of Korean Society on Water Environment
    • /
    • v.34 no.3
    • /
    • pp.339-345
    • /
    • 2018
  • The integrated environmental permit system is currently in operation online. It carries out various functions of postmanagement such as the submission of annual reports containing operations management data onto integrated management workplaces, the operation and management of emission facilities and prevention facilities, and the disclosure of information on the integrated permission. On the other hand, the integrated environmental permit system needs to perform various roles in order to stably manage and smoothly perform the permitting work. It is necessary to utilize this system to establish policies by using diverse operations management data onto integrated management workplaces collected in the integrated environmental permit system. This system can also play a role in improving the post-management system and user convenience after the permission review and approval processes. The integrated environmental permit system can be effectively used to set up the BAT-AEL because it collects all of the cross-media data and identifies the overall status of the workplace. In order to establish a post management system after the approval, it is necessary to provide performance management and performance evaluation functions as conditions of the permit after approval. In addition, a variety of support functions should be provided to enable the permission authority and the environmental expert examination agency to facilitate the review of permits. It will be necessary to provide an evaluation system and a proactive diagnostic function to determine whether permission conditions and permit emission standards will change in the future. Also, it is important to adopt an information exchange platform that can be used to collect the status data onto the workplaces; the platform can also be used as an information exchange site for technical working groups (TWG), and for collecting field experts' opinions.

Design and Implementation of a Smart Signage System based on the Internet of Things(IoT) for Elevators

  • Ryu, Hyunmi;Lee, Guisun;Park, Sunggon;Cho, Sungguk;Jeon, Byungkook
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.184-192
    • /
    • 2019
  • The existing digital signage systems inside the elevators are a lack of tailored contents appropriate to the space and environment inside or outside the elevators. Also, they almost impossible to flexibly respond to various contents disclosure according to the demand of the consumers or the elevator markets. Therefore we design and implement an IoT(Internet of Things)-based smart digital signage system for the safety of elevator passengers.. In order to provide IoT-based information to the smart digital signage within the elevator, we propose an IoT system as a set-top box with gyroscope sensor, acceleration sensor, RFID(Radio-Frequency Identification), fine dust sensor, etc., which processes various data collected by the sensors and provides the elevator passengers with various tailored contents such as elevator driving information, environmental information inside and outside the elevator, and disaster information in addition to simple advertisement information. The proposed IoT system is a set-top box that operates the smart digital signage and has an independent information control processor based on the IoT sensors that do not depend on the elevator control system. For the proposed smart digital signage, it supports an operating system that is independent of the elevator driving service as well as the media service. So the smart signage system has a characteristic that it does not depend on the elevator control system since it is a stand-along IoT-based information control system. With the proposed system providing intuitive content for the surge, steep descent, and radical movements of an elevator due to an emergency situation, the elevator passengers should be able to recognize the situation quickly and respond accordingly. In the near future, the proposed system will expand the market of digital signage applied in conjunction with the development of contents in the disaster, safety and environment fields, and expect expected to revitalize related industries associated with signage.

Social Network Service Users' Criteria and Strategies for Context Sharing (소셜 네트워크 서비스 사용자의 맥락정보 공유 기준과 전략)

  • Lee, Hae-In;Park, Hye-Jin;Bae, Sang-Won;Kim, Jin-Woo
    • Journal of the HCI Society of Korea
    • /
    • v.7 no.1
    • /
    • pp.11-17
    • /
    • 2012
  • A number of context information is shared through social network service(SNS). Among them, we focused on the information which is rarely shared for various reasons. The result indicated that users prefer to avoid certain types of context information because of: 1)containing socially unacceptable content, 2)laking of desire for disclosure, and 3)potential risk of privacy. Concerning privacy concern, it was found that users developed their own management strategy to control context information rather than employing existing system features. Drawing on Communication Privacy Management(CPM) theory, we analyzed findings and suggested guidelines for system design.

  • PDF

Security Improvement of ID-based Multiple Key Management Scheme for t Scalable Ad Hoc Networks

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.13-18
    • /
    • 2011
  • Security supports are a significant factor in mobile ad hoc networks. Especially in dynamic topologies, considering cluster, key management is essential to provide a secure system. Recently, Li-Liu proposed iD-based multiple key management scheme for cluster-based ad hoc networks. However, we found the security weakness of their scheme. In this paper, we analyze the security of Li-Liu's scheme and show that master secret key and fragment of the master secret key can be revealed to compromised CHs and nodes. Furthermore, we propose a solution to improve the scheme against disclosure of the share key and the master secret key even though system parameters are opened to compromised nodes and modify the Li-Liu's scheme fitted for a scalable networks. The improved IMKM scheme could be usefully applied in dynamic cluster-based MANETs such as the military battlefields, mobile marketplace and VANETs.