• Title/Summary/Keyword: industrial security

Search Result 1,713, Processing Time 0.028 seconds

Studies on Pulping of Sponge Gourd Net Fiber - Analysis of Morphology and Characteristics of Pulps - (수세미외 섬유의 펄프화에 관한 연구-섬유의 구조와 펄프화별 특징 분석-)

  • Kim, Jong-Gyu;Rho, Jae-Seong;Lee, Jong-Shin
    • Applied Chemistry for Engineering
    • /
    • v.8 no.6
    • /
    • pp.1014-1021
    • /
    • 1997
  • Studies were carried out on the preparation of several kinds of pulps from Sponge gourd fiber by KP, ASP, SP PAP, AP and addition of AQ pulping process. These unbeaten and beaten pulping fibers were observed their characteristics and fiber structure by SEM, FQA, Image analyzer and Micro projector. The results were summarized as follows; 1) The cooking condition which is the possible defibrilation of Shives are KP base($160^{\circ}C$, 2hr.), ASP base($155^{\circ}C$, 4hr.), PAP base($160^{\circ}C$, 1hr.). From the results, the kappa no. had the range of 12, 25, 10 each other. 2) The pulp yields of sponge gourd fiber obtained the range of KP 50~55%, ASP&60~70% and PAP 45~50%. SP base have the highest and contnets of KP&PAP base are much the same as woods. 3) Increasing amount of NaOH on Pulping was accelerated the defibrilation of Shives and was changed a morphology of pulping fiber quality such as fiber length, curl and kink index. 4) Addition of AQ on pulping process of sponge gourd fiber had a affect to raise the rate of delignification while protecting cellullosic components against degradation, especially defibrilation was very excellent, beated pulp much more easily and increased the fibrilation. 5) ASP system have higher bulk density, fiber bonding and protecting cellullosic components against degradation than KP or PAP. 6) The color reactions of the "C" stain solution showed blue or blue-gray with clean and transparency thin cell wall.

  • PDF

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

Social Media Analysis Based on Keyword Related to Educational Policy Using Topic Modeling (토픽모델링을 이용한 교육정책 키워드 기반 소셜미디어 분석)

  • Chung, Jin-myeong;Park, Young-ho;Kim, Woo-ju
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.53-63
    • /
    • 2018
  • The traditional mass media function of conveying information and forming public opinion has rapidly changed into an environment in which information and opinions are shared through social media with the development of ICT technology, and such social media further strengthens its influence. In other words, it has been confirmed that the influence of the public opinion through the production and sharing of public opinion on political, social and economic changes is increasing, and this change is already in use on the political campaign. In addition, efforts to grasp and reflect the opinions of the public by utilizing social media are being actively carried out not only in the political area but also in the public area. The purpose of this study is to explore the possibility of using social media based public opinion in educational policy. We collected media data, analyzed the main topic and probability of occurrence of each topic, and topic trends. As a result, we were able to catch the main interest of the public(the 'Domestic Computer Education Time' accounted for 43.99%, and 'Prime Project Selection' topics was 36.81% and 'Artificial Intelligence Program' topics was 7.94%). In addition, we could get a suggestion that flexible policies should be established according to the timing of the curriculum and the subject of the policy even if the category of the policy is same.

Democratization, Marketization and Media Union Movements in South Korea (한국의 민주화, 시장화와 언론노조운동)

  • Shin, Kwang-Yeong
    • Korean journal of communication and information
    • /
    • v.57
    • /
    • pp.69-83
    • /
    • 2012
  • This paper attempts to explore the development of the media labor movement and its tasks. Due to the unique characteristics of information delivered by media, the media labor movement under the authoritarian regime was oppressed and regulated by the government. As democratization has proceeded, the state's oppression and regulation of media has been weakened. However, media workers should wage the struggle for union recognition and independence of editorship simultaneously. Because media unions as labor market organizations also seek for job security and wage increase, we need to understand both political dimension and economic dimension of union activities in media industry. While state's control over media has been diminished in the late 1900s, competition in media industry has been intensified. As small number of media corporations monopolizes the media market, the ecology of media has been completely transformed. Unions in media industry should respond to the change of the media ecology and should build solidarity among media workers at the same time. The achievement of the public nature of media as a part of democratization and building union federation of media industry as a response to the marketization of media still remain as an epochal task for media unions. Like the case of "Hope Bus" in the strike in Hanjin Heavy Industrial Corporation, solidarity between citizens and striking workers should be strengthened.

  • PDF

A Study on Implications of the naval Strategy in West Germany and Future Direction of Korean Navy (냉전기 서독해군 전략의 시사점과 향후 대한민국 해군의 방향성에 관한 연구)

  • Shin, Hong-Jung
    • Strategy21
    • /
    • s.46
    • /
    • pp.159-204
    • /
    • 2020
  • This study is written to bring the proposal forward for the direction of south korean naval force. The political situation and the circumstance of the world, especially in the area of Pacific Ocean, are changing very rapidly. North Korea has been always the conventional existing intimidator for South Korea since the 6·25-War. Additionally, the strengthening movements of the national defense, which is easily noticed from China and Russia, is also an other part of intimidating countries against South Korea. Those three mentioned countries are continually developing the asymmetrical warfare systems, for example a strategic nuclear weapon. Since the Obama Administration, the Asia-Pacific Rebalancing-Strategy has been changed as an East Asian foreign policy. Nowadays, Trump Administration renamed the 'United States Pacific-Command' to 'United States Indo-Pacific Command'. The purpose of this is not only letting India to participate in american alliance, but also reducing an economic burden, which is often mentioned in USA. West Germany was located in the very similar geopolitical position during the Cold War just like South Korea these days. And that's why the strategy of West German Navy is worthy of notice for south korean naval force to decide its suitable strategy. Most of all, the two most important things to refer to this study are the plan to expand naval air force and the realistic political stand for us to take it. In conclusion, I laid an emphasis on maintenance of 'green-water-navy'. instead of selecting the strategy as a 'blue-water-navy'. The reason I would like to say, is that south korean navy is not available to hold the unnecessary war potential, just like Aircraft-Carrier. However, this is not meaning to let the expansion of naval force carelessly. We must search the best solution in order to maintain the firm peace within the situation. To fulfill this concept, it is mostly very important to maintain the stream of laying down a keel of destroyers, submarines and air-defense-missile, as well as the hight-tech software system, taking a survey of 4th industrial revolution. Research and development for the best solution of future aircraft by south korean navy is likewise necessary. Besides, we must also set the international diplomatic flexibly. As well as maintaining the relationship with US Forces, it is also very important to improve the relationship with other potential allied nation.

A Study of Damage Assessment Caused by Hydrogen Gas Leak in Tube Trailer Storage Facilities (수소 Tube Trailer 저장시설에서의 수소가스 누출에 따른 사고피해예측에 관한 연구)

  • Kim, Jong-Rak;Hwang, Seong-Min;Yoon, Myong-O
    • Fire Science and Engineering
    • /
    • v.25 no.6
    • /
    • pp.32-38
    • /
    • 2011
  • As the using rate of an explosive gas has been increased in the industrial site, the regional residents adjacent to the site as well as the site workers have frequently fallen into a dangerous situation. Damage caused by accident in the process using hydrogen gas is not confined only to the relevant process, but also is linked to a large scale of fire or explosion and it bring about heavy casualties. Therefore, personnel in charge should investigate the kinds and causes of the accident, forecast the scale of damage and also, shall establish and manage safety countermeasures. We, in Anti-Calamity Research Center, forecasted the scope of danger if break out a fire or/and explosion in hydrogen gas facilities of MLCC firing process. We selected piping leak accident, which is the most frequent accident case based on an actual analysis of accident data occurred. We select and apply piping leak accident which is the most frequent case based on an actual accident data as a model of damage forecasting scenario caused by accident. A jet fire breaks out if hydrogen gas leaks through pipe size of 10 mm ${\Phi}$ under pressure of 120 bar, and in case of $4kw/m^2$ of radiation level, the radiation heat can produce an effect on up to distance of maximum 12.45 meter. Herein, we are going to recommend safety security and countermeasures for improvement through forecasting of accident damages.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Financial Structure, Ownership, and Corporate Control (기업의 소유구조 및 지배력과 재무구조)

  • Rhieu, Sang-Yup;Cheong, Ki-Moon
    • Korean Business Review
    • /
    • v.11
    • /
    • pp.195-216
    • /
    • 1998
  • Ownership of an asset can be identified with the right to exercise "residual control" where the contract is silent about decision rights, or with the right to receive any "residual returns" that remain after contractual. obligations are fulfilled. Although the concept of "ownership" seems reasonably clear in many of the cases, the concepts of residual control and the residual returns that define ownership are actually quite elusive. For large corporations, there is really no single individual who owns both the residual returns and the residual control. Despite the limited qualifications, ownership is clearly. the most common and effective meas to motivate people to create, maintain, and improve the value of assets. In this paper, we try to clarify the relationships among financial structure, ownership, and corporate control with the concept of ownership defined as the residual control and the residual returns, Financial securities are not just claims to part of a firm's net income. They give the security holder certain rights. A careful matching of rights of control and returns can create incentives that increase total value of the firms. In the corporate firms, managers, lenders, and shareholders have different interests. And the financial structure affects how different those interests are and what decisions management will make. Managers are, in general, better informed than investors about the firm's prospects. The financial decisions by managers may affect investors' beliefs and, therefore, the price of shares and the value of the firm.

  • PDF

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

A Study of the Establishment of Small and Medium Sized Architectural Design Firm BIM Environment based on Virtual Desktop Infrastructure (가상 데스크톱 인프라(VDI) 기술을 활용한 중소규모 설계사의 BIM 사용자 별 데스크탑 자원 할당 전략에 관한 연구)

  • Lee, Kyuhyup;Shin, Joonghwan;Kwon, Soonwook;Park, Jaewoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.5
    • /
    • pp.78-88
    • /
    • 2016
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In design phase, especially, collaboration based on BIM system has being a key factor for successful next generation building project. Through the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. In various industrial fields, cloud computing technology is utilized as a promising solution which can reduce time and cost of hardware infrastructure. Among the cloud computing technology, VDI is receiving a great deal of attention from it market as an essential part cloud computing. VDI enables to host multiple individual virtual machines by using hypervisor. It has an advantage to easy main device management. Therefore, this study implements a step-by-step user's DaaS by analyzing the desktop resource data of the workers from Pre-design phase to Schematic design, Design develop and Construction design phase. It also develops BIM environment based on test of BIM modeler and designers in architectural design firm. The goal of the study is to enable the cloud computing BIM server. It provides cost saving, high-performance quality of working environment and cooperation's convenience and high security when doing BIM work in small and medium sized architectural design firm.