• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.032 seconds

Sizing System Development of Korean Structural Firefighting Protective Clothing (한국 소방용 방화복의 치수체계 개발)

  • Han, Sul-Ah;Nam, Yun-Ja;Choi, Young-Lim
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.5
    • /
    • pp.827-839
    • /
    • 2009
  • Sizing system of Korean structural firefighting protective clothing that is national approved should be met for specification of structural firefighting protective clothing that is identified by Ministry of Public Administration and Security(MOPAS). However if you look over the specification of sizing system, the standard is based on only 'height' and the others are indicated as the size of completed product. KS K ISO 13688 and EN 340 which is met on ISO 13688 which indicates sizing system about protective clothing has the standards of height, chest and waist circumference. Also NFPA 1971 that has standards of sizing system is based on chest circumference, cervical to wrist length, waist circumference and inseam. That is different from Korean standards. Therefore, fire fighting protective clothing standards which is based on only height should be compensated and not be relied on foreign standards like ISO. It is indispensable for developing our own sizing system of structural fire fighting protective clothing. In this studying, Korean new sizing system of structural fire fighting protective clothing was developed for providing basic information of ergonomic structural fire fighting protective clothing. The analyzed target age was between 20 and 59 years old fire fighter who extinguish the fire. And it was analyzed by 3D measurement among data of the $5^{th}$ Size Korea. On conclusion, in case of structural fire fighting protective clothing coat, physical dimension was to be chest circumference, cervical to wrist length. Three dimensions as 5cm space of circumference and four dimensions as 2.5cm space of cervical to wrist length were derived, which means that totally 12 dimensions were defined. Dimension standards of pants was based on the analysis of waist circumference and crotch height. Six dimensions as 5cm space of waist circumference and three dimensions as 5cm space of crotch height were derived, which means that totally 14 dimensions were defined.

Design and Implementation of a Manage System for CORBA-based Distrbuted Multimedia Services (CORBA 기반의 분산 멀티미디어 서비스를 위한 관리시스템의 설계와 구현)

  • Gong, Ji-Yeong;Hong, Won-Gi;Kim, Dong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.5
    • /
    • pp.564-573
    • /
    • 1999
  • Recently, as the development and use of distributed multimedia services are growing explosively in every aspects of our lives, administrators of multimedia services are very concerned with providing users with reliable and efficient services. However, the management of distributed multimedia services is a very complex and troublesome work such that a flexible but powerful management system is necessary. This paper proposes a management system for managing CORBA-based distributed multimedia services. We have developed an architecture for the management system and defined a set of management services needed to monitor and control distributed multimedia services. The architecture consists of several objects, which perform configuration management, fault management, security management and event management. A generic distributed multimedia service (DMS) MIB has been defined for the management of various multimedia services and applications. In addition, as a proof of concept, we have developed a Web-based management system for a CORBA-based distributed multimedia system called MAESTRO. The prototype management system uses OrbixWeb to interface with the management server which is implemented as a set of CORBA objects. Though our management system has been developed for distributed multimedia services, it can easily manage other CORBA-based services and applications.

Economic Values and Implications of Innovation in the Korean Quarantine System on Plant Diseases and Pests

  • Son, Minsu;Kim, Brian H.S.;Park, ChangKeun
    • Asian Journal of Innovation and Policy
    • /
    • v.10 no.1
    • /
    • pp.108-131
    • /
    • 2021
  • The increase of international trade across countries and borders results in increased risks associated with the inflow of new pests and diseases. These risks are likely to be increased more rapidly due to climate change. Some countries implement strict regulations on imports to prevent these risks and protect biosecurity, food safety, and public health. However, the problems arise when the diseases and pests are found in a country where their economic structure largely depends on agricultural exports and cause ripple effects on other industries and ecosystems. Therefore, establishing an effective quarantine system is essential to protect and recover from the damage caused by non-native diseases and pests. This study's objectives are 1) analyzing the agricultural policies relate to the quarantine system on diseases and pests in Korea, 2) evaluating the Korea plant quarantine system's value, and 3) simulating plant quarantine policy strategies. We estimated the Korean quarantine system's benefits on diseases and pests to reach these objectives. The benefits are measured with a willingness to pay from respondents surveyed by the contingent valuation method (CVM). The CVM approach directly asks people how much they would willingly pay for food security. Finally, the Korean quarantine system's values are simulated with several policy scenarios and different scales of infection at the regional level. The results of this study can deliver policy implications on the quarantine system innovation in developing countries including Asia.

Design and Implementation of a Smart Attendance Integrated Management System (스마트 출결 통합 관리 시스템 설계 및 구현)

  • Kang, Se-Hyeon;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.136-144
    • /
    • 2022
  • Due to the lack of attendance management system, the training conducted by each existing institution was handwritten at the site and managed in writing about the attendance of participants. It not only takes a lot of manpower and time to store and search, but also has a lot of difficulty in storing. In this paper, we design and implement an integrated smart attendance management system using barcodes. Through this, the attendance system of training applicants is developed, security related to attendance is strengthened, and training attendance data is computerized and collected. In addition, standards for necessary data are selected so that each institution can efficiently manage and utilize training information data. The proposed system can add various institutions in a single construction, making it easy to expand institutional management and can expect additional cost reduction effects. In addition, it is expected that the quality of education will be improved by increasing the convenience of training managers who use the management system provided and controlling/managing attendance data of users.

An Empirical Research on the AEO utilization satisfaction effect from the AEO system's government support and post management (AEO 제도의 정부지원과 사후관리가 AEO 활용 만족도에 미치는 영향에 대한 실증적 연구)

  • Kim, Chang Bong;Han, Young Tak
    • International Commerce and Information Review
    • /
    • v.17 no.2
    • /
    • pp.151-171
    • /
    • 2015
  • Recent companies have introduced AEO (Authorized Economic Operator) system for a smooth and fast customs clearance to meet the conflicting objectives of trade security and trade facilitation in international trades. The present study was to verify 150 companies that have acquired Korea's AEO certification and its impact from the government and financial support, the effects of AEO certification post management, and the AEO system's utilization satisfaction to seek ways to further activate the AEO system. The research hypothesis and model was derived on the basis of existing theory and empirical research, and obtain the following results. First, government policy supporting the AEO system after certification post management showed positive (+) effect for the AEO satisfaction. Second, AEO certification post management showed positive (+) effect for AEO satisfaction. Third, government funded factor showed negative (-) effect for AEO certification post management. The present study is differentiated from previous research information. The study evaluated the company's satisfaction with the AEO certification, and the government support has empirically evaluated the relationship between the post management and the satisfaction. Academic contribution was conducted for Korea's AEO system's post follow-up research while a practical contribution suggested the direction for our country's organization to take advantage of the AEO system.

  • PDF

A Study on the Use Activation of the Cloud Office with Focus on DeLone and McLean IS Success Model (클라우드 오피스 이용 활성화 : DeLone and McLean 정보시스템 성공모형의 적용)

  • Yoon, Seong-Jeong;Kim, Min-Yong
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.289-314
    • /
    • 2015
  • Recently, Most of the companies and government offices are under consideration about the adoption of cloud office service to actualize the smart work policies. Comparing with traditional office software, a cloud office service have the advantage of the method of payment and coming over the physical limitations. Many cloud office service users tend to adopt an official evaluated the service without doubt. However after deciding to adopt cloud office service, many users are faced with a variety of problems and difficulties practically. In this study, researchers carried out interview about those problems and difficulties after adopting a cloud office service. Consequently, there are several problems and difficulties such as compatibility, document security, document lost and maladjusted to the new graphic user interface between traditional office software and a cloud office service. A cloud office service have still several advantages not only a competitive price but also ubiquitous attributes. Thus, researchers need to study about what kinds of reason variables can solve those problems and difficulties. In existing research, DeLone & McLean have suggested information system success model. They use three independent variables which are system quality, information quality, service quality. Parameters are user satisfaction, intention to use and use. Lastly, dependent variables are net benefits. However in this study, we need to change the scope of measurement. In other words, we have to replace parameters with dependent variables. Simply, user satisfaction, intention to use and use is going to be dependent variables. There are several reasons why we need changing variables. First, we aim at giving a some suggestions to a cloud service providers which independent variables do not work to satisfy for the users. Second, we need to find out how to maximize cloud office service user's satisfaction and intention to use. Third, we should firstly know that relationship between independent variables and dependent variables. Finally, those research results give for the cloud office service provider to solve the cloud office service adopting problems and difficulties.

A Study on the Environment of USV Wireless Communication (무인선의 무선통신환경에 관한 연구)

  • Hong, Sin-Pyo;Jeong, Jong-Won;Lee, Chi-Won;Lee, Ho-Sik;Choi, Han-Woo;Park, In-Hong
    • Journal of Ocean Engineering and Technology
    • /
    • v.23 no.2
    • /
    • pp.53-57
    • /
    • 2009
  • Unmanned surface vehicles (USVs) conduct various missions while exchanging information with control centers. Maritime security, coastal surveillance, and sea surface and undersea inspections are included in the important missions of USVs. To carry out these missions, large amounts of information are required from sensors, such as cameras, radars, and sonars. High bandwidth wireless communication is necessary to send this information to the control center in real time. In general, USVs are made using small boats. The motions of small boats are easily influenced by sea waves and the magnitude of changes in the attitude is large and the period of the changes is short in comparison with large ships. Thus, the direction of an antenna beam pattern for a wireless communication system in a USV can change rapidly, and with a large magnitude. In addition, since the reflection of electromagnetic waves on the sea surface is not negligible, the effect of multipath noises on the wireless communication system must be considered carefully. There are also several other elements that negatively affect wireless communication systems in USVs. This paper presents the wireless communication environment to be considered in the design and implementation of wide bandwidth communication systems for USVs. Short test results for wireless communication on the sea are also given.

A Study on Making Map of Flood Using Digital Elevation Model (DEM) (수치표고모형 (DEM)을 이용한 침수재해 지도작성에 관한 연구)

  • Lim, Hyun Taek;Kim, Jae Hwi;Lee, Hak Beom;Park, Sung Yong;Kim, Yong Seong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.2
    • /
    • pp.81-90
    • /
    • 2017
  • Recent floodplain data are important for river master plan, storm and flood damage reduction comprehensive plan and pre-disaster impact assessment. Hazard map, base of floodplain data, is being emphasized as important method of non-structural flood prevention and consist of inundation trace map, inundation expected map and hazard information map. Inundation trace map describes distribution of area that damaged from typhoons, heavy rain and tsunamis and includes identified flood level, flood depth and flood time from flooding area. However due to lack of these data by local government, which are foundational and supposed to be well prepared nationwide, having hard time for making inundation trace map or hazard information map. To overcome this problem, time consumption and budget reduction is required through various research. From this study, DEM (Digital Elevation Model) from image material from UAVS (Unmanned Aerial Vehicle System) and numeric geographic map from National Geographic Information Institute are used for calculating flooding damaged area and compared with inundation trace map. As results, inundation trace map DEM based on image material from UAVS had better accuracy than that used DEM based on numeric geographic map. And making hazard map could be easier and more accurate by utilizing image material from UAVS than before.

An Optimum-adaptive Intrusion Detection System Using a Mobile Code (모바일 코드를 이용한 최적적응 침입탐지시스템)

  • Pang Se-chung;Kim Yang-woo;Kim Yoon-hee;Lee Phil-Woo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.45-52
    • /
    • 2005
  • A damage scale of information property has been increasing rapidly by various illegal actions of information systems, which result from dysfunction of a knowledge society. Reinforcement in criminal investigation requests of network security has accelerated research and development of Intrusion Detection Systems(IDSs), which report intrusion-detection about these illegal actions. Due to limited designs of early IDSs, it is hard for the IDSs to cope with tricks to go around IDS as well as false-positive and false-negative trials in various network environments. In this paper, we showed that this kind of problems can be solved by using a Virtual Protocol Stack(VPS) that possesses automatic learning ability through an optimum-adaptive mobile code. Therefore, the enhanced IDS adapts dynamically to various network environments in consideration of monitored and self-learned network status. Moreover, it is shown that Insertion/Evasion attacks can be actively detected. Finally, we discussed that this method can be expanded to an intrusion detection technique that possesses adaptability in the various mixed network environments.

Ransomware attack analysis and countermeasures of defensive aspects (랜섬웨어 공격분석 및 방어적 측면의 대응방안)

  • Hong, Sunghyuck;Yu, Jin-a
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.139-145
    • /
    • 2018
  • Ransomeware is a kind of malware. Computers infected with Ransomware have limited system access. It is a malicious program that must provide a money to the malicious code maker in order to release it. On May 12, 2017, with the largest Ransomware attack ever, concerns about the Internet security environment are growing. The types of Ransomware and countermeasures to prevent cyber terrorism are discussed. Ransomware, which has a strong infectious nature and has been constantly attacked in recent years, is typically in the form of Locky, Petya, Cerber, Samam, and Jigsaw. As of now, Ransomware defense is not 100% free. However, it can counter to Ransomware through automatic updates, installation of vaccines, and periodic backups. There is a need to find a multi-layered approach to minimize the risk of reaching the network and the system. Learn how to prevent Ransomware from corporate and individual users.