• Title/Summary/Keyword: illegal site

Search Result 62, Processing Time 0.027 seconds

A Study of Mammal and Amphibians-Reptile Species Around Shin-Po Areas, Hamkyungbuk-Do, North Korea (북한 함경북도 신포 지역 포유류 및 양서파충류 조사 연구)

  • Lee, Sang Don;Gil, Joon Woo
    • Journal of Wetlands Research
    • /
    • v.9 no.1
    • /
    • pp.13-20
    • /
    • 2007
  • Fauna of Shinpo nuclear powerplant site were surveyed during Feb 27-Mar 4, 2003 as a part of ecological environmental survey. This area is well dominated by coniferous trees (Pinus densiflora) ranging 15-50 years. In the shoreline black pine (Pinus thungergii) is the dominant species and was planted for wind protection. Around Shinpo areas inside 50 km in radius was found 33 mammal species (3 orders, 15 families), and amphibian-reptiles 6 species (2 orders, 3 families) were recorded. Natural monument in the areas were estimated 6 species of mammals and one species of reptiles. Although the habitat of Shinpo area is deteriorated due to deforestation, illegal hunting, etc. the fauna seems to be rich in species. Despite the sudden halt of KEDO project the conservation efforts and continuous monitoring are required considering a continuation of the project.

  • PDF

A Real-Time User Authenticating Method Using Behavior Pattern Through Web (웹 사용자의 실시간 사용 패턴 분석을 이용한 정상 사용자 판별 방법)

  • Jang, Jin-gu;Moon, Jong Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1493-1504
    • /
    • 2016
  • As cyber threats have been increased over the Internet, the invasions of personal information are constantly occurring. A malicious user can access the Web site as a normal user using leaked personal information and does illegal activities. This paper proposes an effective method which authenticates a genuine user with real-time. The method use the user's profile which is a record of user's behavior created by Membership Analysis(MA) and Markov Chain Model(MCM). In addition to, user's profile is augmented by a Time Weight(TW) which reflects the user's tendency. This method can detect a malicious user who camouflage normal user. Even if it is a genuine user, it can be determined as an abnomal user if the user acts beyond the record profile. The result of experiment showed a high accuracy, 96%, for the correct user.

A Study on the Marking System on Fishing Vessel (어선표식제도의 적정성에 관한 연구)

  • Lee, Jong-Gun;Kim, Hyung-Seok
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.24 no.1
    • /
    • pp.34-43
    • /
    • 2012
  • In order to establish order in fishing industry by cracking down on illegal fishing vessels effectively, it is an essential requirement to identify marking such as the name of fishing vessel and a port of register more easily. Accordingly, it is quite natural that markings on fishing vessels should be marked clearly in an appropriate size on an appropriate site in order for them to be distinguished on the air such as from planes as well as on the sea. Actually, when examining marks such as the name of a vessel which are operating in the country, marks of most fishing vessels are too small as they cannot be distinguished with the naked eye even very closely. There is no coastal fishing vessel which marks the name of fishing vessel on the upper part in order to distinguish it from planes. Fishing vessel law generally which regulates the basic laws about shipbuilding regulates marks on fishing vessel, and fisheries law only regulates sign boards of fishing vessels. Problems and improvement of the marking system on fishing vessels suggested by this paper are as follows. First, in order to contribute to establish order in fishing industry, it would be desirable to tighten standards in fisheries law besides the fishing vessel law. Second, it is difficult to distinguish marks such as the name of a vessel as relevant laws allow fishers to make such marks too small. It is necessary to set the standard for marks larger than those regulated by the international treaty. Third, the relevant laws do not regulate a letter form of marks. Therefore, it becomes a factor to make small marks hard to be distinguished more. It is necessary to decide a clear letter form. Fourth, there is insufficient detailed international standards about the marking system. It is necessary to regulate a detailed standard.

Design The User Authentication Framework Using u-health System (u-health 시스템을 이용한 사용자 인증 프레임워크 설계)

  • Choo, Yeun-Su;Jin, Byung-Wook;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.219-226
    • /
    • 2015
  • OTP(One Time Password) is for user authentication of Internet banking and users should carry their security card or OTP generator to use OTP. If they lost their security card or OTP generator, there is at risk for OTP leak. This paper suggests a new User Authentication Framework using personal health information from diverse technology of u-Health. It will cover the problem of OTP loss and illegal reproduction A User Authentication Framework is worthy of use because it uses various combinations of user's physical condition which is inconstant. This protocol is also safe from leaking information due to encryption of reliable institutes. Users don't need to bring their OTP generator or card when they use bank, shopping mall, and game site where existing OTP is used.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Classification of Service Types using Website Fingerprinting in Anonymous Encrypted Communication Networks (익명 암호통신 네트워크에서의 웹사이트 핑거프린팅을 활용한 서비스 유형 분류)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.127-132
    • /
    • 2022
  • An anonymous encrypted communication networks that make it difficult to identify the trace of a user's access by passing through several virtual computers and/or networks, such as Tor, provides user and data privacy in the process of Internet communications. However, when it comes to abuse for inappropriate purposes, such as sharing of illegal contents, arms trade, etc. through such anonymous encrypted communication networks, it is difficult to detect and take appropriate countermeasures. In this paper, by extending the website fingerprinting technique that can identify access to a specific site even in anonymous encrypted communication, a method for specifying and classifying service types of websites for not only well-known sites but also unknown sites is proposed. This approach can be used to identify hidden sites that can be used for malicious purposes.

Pretreatment and Rapid Detection Methods for Wastewater-Based Epidemiology (하수역학 구축을 위한 시료 전처리 기술과 신속검출기술)

  • Lee Jai-Yeop;Lee Bokjin;Jesmin Akter;Ahn Chang Hyuk;Kim Ilho
    • Journal of Korean Society on Water Environment
    • /
    • v.39 no.1
    • /
    • pp.102-110
    • /
    • 2023
  • Wastewater Based Epidemiology (WBE) provides useful information not only on the use of illegal drugs in the community, but also on the presence of hygiene and health products and infectious pathogens in sewage facilities. As a consequence of the SARS-CoV-19 virus epidemic in 2019, monitoring the status of the infection is of utmost importance. SARS-CoV-19 was also detected in sewage, and the number and trend of infections in the community suggest that the application of the WBE system would be useful and appropriate. This study introduces a pre-treatment concentration method including viruses in sewage samples. A total of seven methods which were subdivided into methods for adsorption-extraction, ultra-filtration, PEG precipitation, and ultra-centrifugation, and the results for analyzing the recovery rates were included. Meanwhile, it is necessary to pay attention to rapid detection technologies which analyze infectious pathogens at the site of sewage facilities. These can include ELISA, FTIR, SERS, and biosensor based on the detection principle, and the characteristics, advantages, and disadvantages of each were summarized herein. If rapid detection technologies and accurate quantitative analyses are further developed, the use of sewage mechanics in response to pandemic viruses is expected to expand further.

Development and the Long-Term Test of Anti-Adhesion Surface Coating Technology on Electric Power Distribution Equipment (배전기기 외함 부착방지 및 자기세정 코팅기술 개발 및 현장실증)

  • Shim, Myung Jin;Sohn, Song Ho;Seo, Ji Hoon;Han, Sang Chul
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.6 no.3
    • /
    • pp.285-288
    • /
    • 2020
  • The demand for coating technology on electric power equipment that has arisen from such issues regarding the attaching of illegal advertisements and posters to electric power distribution boxes such as TR, SW, etc. in down town areas seeks to produce functional coating surfaces using polymers and nano-materials that will result in improvements in self-cleaning performance and greater stability even under harsh environmental conditions. KEPCO-coatings consist of copolymerized acrylic resin and methacryl-modified reactive silicone that are able to chemically combine, which results in performance improvement without any leakage of of silicone, thus contributing to its properties of high-stability. Thus, the research team has also started long-term on-site testing on 9 electric power distribution spots around a city center in cooperation with the KEPCO Daeduck-yusung branch. The KEPCO-coating technology could advance the best coating materials and processes to meet appropriate circumstances for a variety of outdoor damage environment. It is also predicted that KEPCO could be possible to expand international electric maintenance markets and to arrange business platforms if KEPCO would achieve its original technology (IPs) by the means of upgrading in self-cleaning coating technology and obtaining long-term on-site test records from nationwide electric facilities.

A Study on Occurance Possibility of Suicide Bombing using Utilize Unmanned Aircraft in Korea (한국 내 무인항공기를 이용한 자폭테러 발생가능성에 대한 연구)

  • Oh, Seiyouen;Lee, Jaemin;Park, Namkwun
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.2
    • /
    • pp.288-293
    • /
    • 2014
  • The purpose of this study was to provide response plans against acts of suicide bomb using utilize unmanned aircrafts to prevent large losses of lives such as the terrorist attacks of September 11. As the result, First, this research suggests revising the definition and categorization of utilizing unmanned aircrafts and legislating the Anti-terrorism law. Second, it is needed to establish the proper social safety network through terrorism response management integrated system against the terror of related organization. Third, suicide bomb using utilizing unmanned aircrafts can be occurred because it is possible to make bomb and open web site for terrorism without connection with terrorist organization because of universal use of Internet. In response to this, it is needed to make a law which can block the use and open of illegal site and contents. Forth, the increasing number of foreigners and immigrants can make conflicts, and cause the foreigner's anti-korea feeling and the citizen's anti-cultural diffusion. Therefore, it is needed for the citizen to change and improve the awareness of them, and the change of social politics.

Reclaimed Products to Recycling and Energy Recovery for Sustainable Use of Closed Non Sanitary Landfills through Reclamation Works (사용종료(使用終了) 비위생매립지(非衛生埋立地)의 순환적(循環的) 사용(使用)을 위한 선별물질(選別物質)의 활용(活用) 가능성(可能性) 평가(評價))

  • Lee, Byung-Sun;Na, Kyung-Duk;Han, Sang-Kuk;Phae, Chae-Gun;Oh, Sae-Eun
    • Resources Recycling
    • /
    • v.21 no.1
    • /
    • pp.17-29
    • /
    • 2012
  • potential assessment of converting closed non sanitary landfills into sustainable landfill through the reclamation works(= landfill mining project) of illegal landfill discovered in land development site using Sustainable Landfill Reclamation system(SLR-system) was investigated. The SLR system had treatment capacity of 91.4 $m^3/hr$ (130.61 ton/hr) in condition of 28.0% of water content. Recovery ratio and purity of sorted soil were 98.9% and 99.66%, respectively. Sorted combustibles were 91.8% and 92.0%, respectively. Especially, high heating value (HHV) and low heating value(LHV) of combustibles were 4,282kcal/kg and 3,636 kcal/kg, respectively, in considering the energy content and recovery ratio of combustibles. Therefore, combustibles separated from landfill site have higher value than Fluff RDF standard value(3,500kcal/kg) of MOE. RDF can be produced with combustibles by 84.43%. Averaged size and organic foreign matter content of the sorted soil were less than 035mm and 0.31 %(VN), respectively. In addition, concentration of all contents of hazardous matters containing soils met safety standards. Therefore, it is possible to be recycled as refilling and cover materials to rebuild Sustainable landfills by 98.42%.