• Title/Summary/Keyword: information Protection

Search Result 4,475, Processing Time 0.044 seconds

Protection Circuits in Flat Fluorescent Lamp(FFL) Backlight Inverter (LCD 백라이트용 면광원 램프 구동용 인버터 보호회로에 관한 연구)

  • Hur, Jeong-Wook;Lim, Sung-Kyoo
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.1067-1068
    • /
    • 2008
  • An inverter for driving flat fluorescent lamp(FFL) with various protection circuits using micro controller(Micom) is proposed in this paper. The inverter will be shut down if the fault operating conditions such as open lamp, over current and over voltage are detected.

  • PDF

A study on the Design of Fall Protection system for Patient Protection (환자보호를 위한 낙상방지 시스템 설계에 관한 연구)

  • Cho, Youngseok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.17-18
    • /
    • 2018
  • 본 논문에서는 병실의 침대 위에서 움직임으로 침대 밖으로 떨어지는 것을 방지하기 위한 환자감시 시스템인 낙상 방지 시스템을 제안한다. 환자는 휴식을 취하거나 각종 처치를 위하여 침대에 머무르게 된다. 이 과정에서 대부분의 환자들은 기력이 낮아지고 자기 신체에 대한 제어 능력이 낮아져 침대의 바깥쪽으로 움직이는 경우가 종종 발생한다. 본 논문에서는 초음파를 이용한 환자까지의 거리 맵을 생성한 다음 거리 맵을 기반으로 환자의 위치를 추정하였다. 경과 측정거리는 10mm 이내로 측정이 가능하였고, 기존의 방식과 비교하여 내구성과 활용성이 우수하였다.

  • PDF

Analysts of Assumption Part of Protection Profile for Evaluation of Smart Card (스마트 카드 평가를 위한 보호프로파일의 가정요소 분석)

  • Kim, Tai-Hoon;Kim, Min-Chul;No, Byung-Gyu
    • Proceedings of the KIEE Conference
    • /
    • 2003.07d
    • /
    • pp.2744-2746
    • /
    • 2003
  • ISO/IEC 15408 requires the TOE(Target of Evaluation) Security Environment section of a Protection Profile(PP) or Security Target(ST) to contain a list of assumptions about the TOE security environment or the intended usage of the TOE. This paper presents a specific conditions should be assumed to exist in the smart card environment and the analysis of those conditions developer of smart card PP must consider.

  • PDF

A Study on the Improvement of Protection System for Public Interest Reporters

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.195-200
    • /
    • 2020
  • Korea enacted the Protection of Public Interest Reporters Act in March 2011 to protect whistleblowers from acts of infringement of public interest in the private sector. Most acts of infringement of the public interest are carried out secretly within the organization, which is known to the outside world by reports from members of the organization who are well aware of the problems within the organization. However, whistleblowers are at a disadvantage due to reporting and are reluctant to report. In addition, measures are needed to strengthen institutional mechanisms such as confidentiality, protection of personal information, responsibility, and prohibition of disadvantageous measures to effectively protect reporters due to lack of practical protective measures. Therefore, practical protection measures for whistleblowers are needed in line with the purpose of protecting whistleblowers, and measures to expand the corresponding compensation system will also be needed. Therefore, in this study, we would like to review the main contents of the current system for protecting whistleblowers in Korea and suggest reasonable improvement measures for protecting whistleblowers.

An Study on Privacy Policy Research Trend: Focused on KCI Published (개인정보보호정책에 관한 연구동향 고찰: KCI등재지를 중심으로)

  • Bok, Jun-Young
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.81-89
    • /
    • 2020
  • Since the Korean privacy policy was legalized in 2011, the related academical researches have been lasted in various fields. Upcoming so-called 3 data laws would be implemented, it is meaningful to review privacy policy studies for exploring future research direction. For this purpose, the total of 146 journals from 2011 to 2019 were reviewed by the content analysis following as research subjects, methodologies and constructions of studies. As results, the numbers of the researches have been conducted on protection policies themselves for improvement, comparing with other countries' policies and also digital finance information protection were deeply discussed. Some of technology based protection applications were experimented and suggested. The major research characteristics was mainly focused on case analysis and criminal laws and policies were developed as protection contingencies. However, most research objects were focused on the protection regulations, not deregulation, therefore, researchers in future study need to explore more digital industry-centric tasks which are practically applied in safer ways. Further, social agreement in using private information will be an essential to prevent indiscriminate use.

Overlay2 file system's Source Protection Methodology (Overlay2 파일 시스템의 소스 보호 방법에 관한 연구)

  • Han, Sung-Hwa
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1397-1402
    • /
    • 2021
  • The overlay2 file system is one of the union file systems that mounts multiple directories into one. The source directory used for this overlay2 file system mount has a characteristic that it operates independently of the write-able layer after mounting, so it is often used for container platforms for application delivery. However, the overlay2 file system has a security vulnerability that the write-able layer is also modified when file in the source directory is modified. In this study, I proposed the overlay2 file system protection technology to remove the security vulnerabilities of the overlay2 file system. As a result of empirically implementing the proposed overlay2 file system protection technology and verifying the function, the protection technology proposed in this study was verified to be effective. However, since the method proposed in this study is a passive protection method, a follow-up study is needed to automatically protect it at the operating system level.

A Study on the Operational Problems and Improvement Plan of the Domestic Violence Punishment Act through Domestic Violence Crime Information Analysis

  • Yoon, Hyun-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.227-232
    • /
    • 2021
  • The 「Act on Special Cases concerning the Punishment of Crimes of Domestic Violence」 still has various problems in the legal system and enforcement process. Contrary to the original intention of the legislation, it is operated very passively in terms of state intervention and punishment of domestic violence actors in actual operation. Even if it is treated as a home protection case, if you look at the details of the protection disposition, there is a problem that the decision on the protection disposition is biased towards a specific type of protection disposition. In order to improve this, the need for cooperation and active intervention between state agencies is required. In addition, it is necessary to establish a legal basis for a request for personal protection by recognizing the status of a victim who reported domestic violence as a crime reporter. In addition, in order to secure the effectiveness of the protective disposition, it is necessary to strengthen sanctions for non-compliance or violations of the protective disposition.

A Study on the Design of the Output ESD Protection Circuits and their Electrical Characteristics (출력단 ESD 보호회로의 설계 및 그 전기적 특성에 관한 연구)

  • 김흥식;송한정;김기홍;최민성;최승철
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.29A no.11
    • /
    • pp.97-106
    • /
    • 1992
  • In integrated circuits, protection circuits are required to protect the internal nodes from the harmful ESD(Electrostatic discharge). This paper discusses the characteristics of the circuit components in ESD protection circuitry in order to analyze the ESD phenomina, and the design methodalogy of ESD protection circuits, using test pattern with a variation of the number of diode and transistor. The test devices are fabricated using a 0.8$\mu$m CMOS process. SPICE simulation was also carried out to relate output node voltage and measured ESD voltage. With increasing number of diodes and transistors in protection circuit, the ESD voltage also increases. The ESD voltage of the bi-directional circuit for both input and output was 100-300[V], which in higher than that of only output(uni-directional) circuit. In addition, the ESD protection circuit with the diode under the pad region was useful for the reduction of chip size and parasitic resistance. In this case, ESD voltage was improved to a value about 400[V].

  • PDF

Power system protection IED design using an embedded processor (임베디드 프로세서를 이용한 계통 보호 IED 설계)

  • Yoon, Ki-Don;Son, Young-Ik;Kim, Kab-Il
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.711-713
    • /
    • 2004
  • In the past time, the protection relay did only a protection function. Currently, its upgraded device i.e. IED(Intelligent Electric Device) has been designed to protect, control, and monitor the whole power system automatically. Also the device is desired to successfully measure important elements of the power system. This paper considers design method of a digital protection IED with a function of measuring various elements and a communication function. The protection IED is composed of the specific function modules that are signal process module, communication module, input/output module and main control module. A signal process module use a DSP processor for analysis of input signal. Main control module use a embedded processor, Xscale, that has an ARM Core. The communication protocol uses IEC61850 protocol that becomes standard in the future. The protection IED is able to process mass information with high-performance processor. As each function module is designed individually, the reliability of the device can be enhanced.

  • PDF

Analysis of MSAS Correction Information and Performance in Korea (MSAS 보정정보 분석 및 국내 적용 시 성능 평가)

  • Jeong, Myeong-Sook;Kim, Jeong-Rae
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.4
    • /
    • pp.372-382
    • /
    • 2009
  • A GNSS software for processing the SBAS correction data is developed, and Japan MSAS correction data is analyzed. MSAS orbit correction data is analyzed and compared with WAAS data. MSAS ionosphere correction data is analyzed and the effect of the equatorial anomaly on the correction accuracy is discussed. Degradation due to receive delay of correction information and effect of the degradation on protection level analyzed using partial remove of MSAS correction information. Integrity and availability for precision approch using the MSAS system analyzed.