• Title/Summary/Keyword: hazard communication

Search Result 162, Processing Time 0.024 seconds

A Study on the Watermarketing of Keyframe-Based for copyright Protection of video (동영상의 저작권 보호를 위한 키 프레임 기반의 워터마킹에 관한 연구)

  • Kim, Dan-Hwan;Oh, Moo-Song
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.102-107
    • /
    • 2005
  • With the advancement which development and information communication of the computer is quick about lower with multimedia technical diffusion of network base the necessity the use of the digital image technique which is various regarding the protection of sharp increasing multimedia contents raised its head in the social whole. the copyright protection against a multimedia data hazard the authentication techniques it will be able to confirm the content authentication, ownership authentication, illegal copy of the image which stands is demanded. confronts to the water marking technique of existing and the researches the fact that against a picture is most. In this paper, It does not damage the video data which is a multimedia contents not to be, it inserts copyright information and it protects the right of ownership. It is with a copyright protection which leads the wavelet transform which is a watermark of frequency base from visual system viewpoint in the human being center with it proposes the watermarking technique against a forgery prevention.

Ubiquitous Environment with Private Health Insurance and the Relevance of Length of Stay (유비쿼터스 환경에서 민영의료보험 가입과 입원기간과의 관련성)

  • Jang, Dong-Ruyl;Choi, Seong-Woo;Park, Bu-Yeon;Kim, Sung-Gil
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.2
    • /
    • pp.203-209
    • /
    • 2014
  • The purpose of this study was to analysis of influence between of private health insurance and length of stay with cervical and lumbar simple sprain patients at Ubiquitous medical environment. They were diagnosed as having sprain of cervical and lumbar spine without neurological symptoms in hospitals and clinics from July 1, 2010 to February 29, 2012. This study was t-test, ANOVA and multiple regression analysis. The results were when the number of private health insurance was input as an independent variable, the subjects had one or two accidental insurances(${\beta}$=2.731, P=0.013), length of stay in beds was longer than they had no accidental insurance and when they had more than three ones(${\beta}$=4.991, P=0.000), length of stay was significantly longer. This study has a meaning in that it is domestic practical study which identified relationships between entry of private health insurance and length of stay.

The Comparative Software Development Cost Model Considering the Change in the Shape Parameter of the Erlang Distribution (어랑분포의 형상모수 변화에 따른 소프트웨어 개발 비용모형에 관한 비교 연구)

  • Yang, Tae-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.566-572
    • /
    • 2016
  • Software Reliability implemented in software development is one of the most important issues. In finite failure NHPP software reliability models for software failure analysis, the hazard function that means a failure rate may have constant independently for failure time, non-increasing or non-decreasing pattern. In this study, software development cost analysis considering the variable shape parameter of Erlang distribution as the failure life distribution in the software product testing process was studied. The software failure model was applied finite failure Non-Homogeneous Poisson Procedure and the parameters approximation using maximum likelihood estimation was accompanied. Thus, this paper was presented comparative analysis by applying a software failure time data to the software, considering the shape parameter of Erlang distribution for development cost model analysis. When compared to the cost curve in accordance with the shape parameter, the model of smaller shape can be seen that the optimal software release time delay and more cost. Through this study, it is thought that it can serve as a preliminary information which can basically help the software developers to search for development cost according to software shape parameters.

Integrated Command System for Firefight Satety in Special Disaster Area (특수재난현장 진압대원의 안전을 위한 통합 지휘시스템에 관한 연구)

  • Roh, Tae-Ho
    • Fire Science and Engineering
    • /
    • v.29 no.6
    • /
    • pp.98-108
    • /
    • 2015
  • An integrated command system is critical for the safety of firefighters and effective work in the headquarters of a special disaster areas such as natural disaster or large man-made hazard. The integrated command system requires environmental information such as temperature, humidity, and $CO_2$ levels, as well as personal physical information such as pulse and air respirator levels. An Analog to Digital Converter (ADC) chip converts sensed information into digital signals, and a Micro Controller Unit (MCU) transmits the digital signals to a transmission board using serial communication through a Serial Peripheral Interface (SPI). The digital signals are saved in a transmission board and transmitted to the integrated command system by a Radio Frequency (RF) unit. The location of fire-fighters in a building are determined using a gyro sensor and an inertial sensor. The collected information is applied to the integrated command system for firefighter safety and to ensure that they can effectively carry out their duties. Tthis study theoretically and experimentally investigated the technologies of RF transmission, indoor position, and an integrated command system that supports decision making using the transmitted information.

Measuring Technologies of Traffic Conflict Risk between Vehicles and Pedestrians (차량-보행자간의 상충위험도 측정 기술 연구)

  • Jang, Jeong-Ah;Lee, Hyeon-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.255-260
    • /
    • 2017
  • In Korea, traffic accidents between pedestrians and vehicles in 2015 account for 38.8% of all accidents. This study proposes a system design that can measure the risk of conflict between a vehicle and a pedestrian. Firstly the systemdetect and estimate the position, speed, and directional data of the vehicle and the pedestrian. And then it estimate the conflict point between a vehicle and a pedestrian. The risk of conflict is quantified by estimating the pedestrian safety margin (PSM), which is the time difference between the arrival of the pedestrian at the crossing point to the point of conflict and the vehicle approaching the point. In this system each data is acquired through an external monitoring based evaluation module and an individual wearing module. In the future, such a system can be used for decision making such as the design of road hazard improvement facilities and the designation of the elderly protection area.

Algorithm Design and Implementation for Safe Left Turn at an Intersection Based on Vehicle-to-Vehicle Communications (교차로에서의 안전 좌회전을 위한 차량간 통신 기반 알고리즘 설계 및 구현)

  • Seo, Hyun-Soo;Kim, Hyo-Un;Noh, Dong-Gyu;Lee, Sang-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.2
    • /
    • pp.165-171
    • /
    • 2013
  • WAVE(Wireless Access in Vehicular Environments) is a representative V2V communication protocol and its standards of MAC and PHY parts except for security were published. In order to control traffic flow and ensure driver's safety using V2V communication, various projects are conducting. In particular, safety application has been researched. Therefore, in this paper, we designed the safety application algorithm, which informs a driver of the dangerous status when driver tries to turn left in an intersection and we also implemented the algorithm. Proposed algorithm configures a model for a host vehicle and a vehicle coming in opposite lane and in case that there is collision hazard it provides warning message to driver by using HMI. In order to evaluate the proposed algorithm's performance, we configured the test bed using test vehicles and we tested the algorithm on proving ground with the composed test scenarios. As test results, our system showed excellent performance. If the infrastructures for V2I communications are constructed, we will optimize our system more precisely and stably.

Cooperation-Aware VANET Clouds: Providing Secure Cloud Services to Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.103-118
    • /
    • 2014
  • Over the last couple of years, traditional VANET (Vehicular Ad Hoc NETwork) evolved into VANET-based clouds. From the VANET standpoint, applications became richer by virtue of the boom in automotive telematics and infotainment technologies. Nevertheless, the research community and industries are concerned about the under-utilization of rich computation, communication, and storage resources in middle and high-end vehicles. This phenomenon became the driving force for the birth of VANET-based clouds. In this paper, we envision a novel application layer of VANET-based clouds based on the cooperation of the moving cars on the road, called CaaS (Cooperation as a Service). CaaS is divided into TIaaS (Traffic Information as a Service), WaaS (Warning as a Service), and IfaaS (Infotainment as a Service). Note, however, that this work focuses only on TIaaS and WaaS. TIaaS provides vehicular nodes, more precisely subscribers, with the fine-grained traffic information constructed by CDM (Cloud Decision Module) as a result of the cooperation of the vehicles on the roads in the form of mobility vectors. On the other hand, WaaS provides subscribers with potential warning messages in case of hazard situations on the road. Communication between the cloud infrastructure and the vehicles is done through GTs (Gateway Terminals), whereas GTs are physically realized through RSUs (Road-Side Units) and vehicles with 4G Internet access. These GTs forward the coarse-grained cooperation from vehicles to cloud and fine-grained traffic information and warnings from cloud to vehicles (subscribers) in a secure, privacy-aware fashion. In our proposed scheme, privacy is conditionally preserved wherein the location and the identity of the cooperators are preserved by leveraging the modified location-based encryption and, in case of any dispute, the node is subject to revocation. To the best of our knowledge, our proposed scheme is the first effort to offshore the extended traffic view construction function and warning messages dissemination function to the cloud.

Countermeasure of an Application Attack Scenario Using Spring Server Remote Code Execution Vulnerability (CVE-2018-1270) (스프링 서버 원격코드 실행 취약점(CVE-2018-1270)을 이용한 응용 공격 시나리오의 대응 방안)

  • Jung, Byeong-Mun;Jang, Jae-Youl;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.303-308
    • /
    • 2019
  • Spring framework is widely used as a base technology for e-government frameworks and to the extent it is a standard for web service development tools of Korean public institutions. However, recently, a remote code execution vulnerability(CVE-2018-1270) was found in an application using a spring framework. This paper proposes a method of analyzing the vulnerability experiment using a hacking scenario, Proof Of Concept(POC), in which the spring framework is a hazard to the server. We propose the patch to version 4.3.16 and version 5.0.5 or later as an ultimate response. It is also expected that the proposed experiment analysis on vulnerability of hacking scenario will be used as a data for improving performance of security programs and establishing a new authentication system.

Evaluation of Agricultural Drought Disaster Vulnerability Using Analytic Hierarchy Process (AHP) and Entropy Weighting Method (계층화분석 및 엔트로피 가중치 산정 방법에 따른 농업가뭄재해 취약성 평가)

  • Mun, Young-Sik;Nam, Won-Ho;Yang, Mi-Hye;Shin, Ji-Hyeon;Jeon, Min-Gi;Kim, Taegon;Lee, Seung-Yong;Lee, Kwang-Ya
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.63 no.3
    • /
    • pp.13-26
    • /
    • 2021
  • Recent drought events in the South Korea and the magnitude of drought losses indicate the continuing vulnerability of the agricultural drought. Various studies have been performed on drought hazard assessment at the regional scales, but until recently, drought management has been response oriented with little attention to mitigation and preparedness. A vulnerability assessment is introduced in order to preemptively respond to agricultural drought and to predict the occurrence of drought. This paper presents a method for spatial, Geographic Information Systems-based assessment of agricultural drought vulnerability in South Korea. It was hypothesized that the key 14 items that define agricultural drought vulnerability were meteorological, agricultural reservoir, social, and adaptability factors. Also, this study is to analyze agricultural drought vulnerability by comparing vulnerability assessment according to weighting method. The weight of the evaluation elements is expressed through the Analytic Hierarchy Process (AHP), which includes subjective elements such as surveys, and the Entropy method using attribute information of the evaluation items. The agricultural drought vulnerability map was created through development of a numerical weighting scheme to evaluate the drought potential of the classes within each factor. This vulnerability assessment is calculated the vulnerability index based on the weight, and analyze the vulnerable map from 2015 to 2019. The identification of agricultural drought vulnerability is an essential step in addressing the issue of drought vulnerability in the South Korea and can lead to mitigation-oriented drought management and supports government policymaking.

Evaluation of Evacuation Safety in University Libraries Based on Pathfinder

  • Zechen Zhang;Jaewook Lee;Hasung Kong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.237-246
    • /
    • 2024
  • In recent years, the frequent occurrence of fire accidents in university libraries has posed significant threats to the safety of students' lives and property, alongside negative social impacts. Accurately analyzing the factors affecting evacuation during library fires and proposing optimized measures for safe evacuation is thus crucial. This paper utilizes a specific university library as a case study, simulating fire evacuation scenarios using the Pathfinder software, to assess and validate evacuation strategies and propose relevant optimizations. Pathfinder, developed by Thunderhead Engineering in the United States, is an intuitive and straightforward personnel emergency evacuation assessment system, offering advanced visualization interfaces and 3D animation effects. This study aims to construct evacuation models and perform simulation analysis for the selected university library using Pathfinder. The library's structural layout, people flow characteristics, and the nature of fire and smoke spread are considered in the analysis. Additionally, evacuation scenarios involving different fire outbreak locations and the status of emergency exits are examined. The findings underscore the importance of effective evacuation in fire situations, highlighting how environmental conditions, individual characteristics, and behavioral patterns significantly influence evacuation efficiency. Through these investigations, the study enhances understanding and optimization of evacuation strategies in fire scenarios, thereby improving safety and efficiency. The research not only provides concrete and practical guidelines for building design, management, and emergency response planning in libraries but also offers valuable insights for the design and management of effective evacuation systems in buildings, crucial for ensuring occupant safety and minimizing loss of life in potential hazard situations