• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.037 seconds

Performance Evaluation Plan of Maritime VHF Digital Communications System (해상용 VHF 디지털통신 시스템의 성능평가 방안)

  • Ju, Yang-Ro;Kim, Kab-Ki;Choi, Jo-Cheon;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.7
    • /
    • pp.582-588
    • /
    • 2014
  • IMO and IALA have undertaken projects that GMDSS Modernization and E-navigation, which refer to "Future digital communications systems" for a more efficient transmission of voice and data communications in the VHF maritime mobile service. ITU has also resolved in WRC-07 Resolution 357 to study the use of spectrum-efficient technologies in order to provide for the operation of ship and port security and maritime safety systems. IALA and ITU WP5B have coordinated for the technical developments and the spectrum issues. Recommendation ITU-R M.1842-1 has approved by WP5B meeting. This revision provides a wideband data service both 50kHz and 100kHz in the VHF maritime mobile service. This paper has studied E-navigation, its needs for data exchange that includes explanations of the current methods for transmitting data by VHF that based in land mobile radio service. A further technologies trend is estimated for Recommendation ITU-R M.1842-1, that is based on the land mobile radio standards with some tailored to fit the needs of the maritime mobile service.

Outsourcing in Hospital Services: Experience of Korean Hospitals (우리나라 대형 종합병원의 아웃소싱 실태)

  • Noh, Tae-Hoon;Lee, Hae-Jong;Park, Eun-Cheol;Kang, Hye-Young
    • Korea Journal of Hospital Management
    • /
    • v.8 no.4
    • /
    • pp.59-75
    • /
    • 2003
  • This study was conducted to investigate the degree of utilization of outsourcing in large hospitals in Korea. We also investigated the outcome and the level of satisfaction for adopting outsourcing in these hospitals. Types of work areas that were currently operated by outsourcing and were planned to adopt outsourcing in the future were identified. A total of 83 hospitals were eligible for this study, which had more than 500 beds, and were identified from the 2003 National Hospital List published by the Korean Hospital Association. A self-administered Questionnaire survey was conducted between April 25th and May 20th in 2003 with a personnel being charged of arrangement of outsourcing in each hospital. Among the 58 hospitals responding the survey(response rate=69.9%), 49 hospitals(84.5%) utilized outsourcing in at least one work field in their organizations. The largest proportion of the hospitals(85.7%) using outsourcing responded that the biggest outcome after introducing outsourcing were cost reduction(49.0%), followed by improved efficiency in operating the organization or human resources(34.7%) and the improved quality of the work(6.1%). The degree of satisfaction for outsourcing among the hospital managers(3.43) was significantly higher than that among the employees(3.l4) on a S-point Likert-type scale(p<0.05). Among the 7 work areas, the hospitals used outsourcing most frequently in facility management(housekeeping, building maintenance, hospital security and parking management), followed by non-medical profit business(funeral, convenient store, and cafeteria), logistics(provision of patient meal, in-house delivery, and purchasing), and information and computing system(hospital information system, maintenance of personal computers and printers). The work areas that the hospitals planned to adopt or expand the outsourcing in the future most frequently were facility management, non-medical profit business, logistics, and information and computing systems. In conclusion, outsourcing was highly diffused in large Korean hospitals, particularly in the work field of facility management and non-medical profit business. The satisfaction for outsourcing was not high yet in Korean hospitals.

  • PDF

The Analysis of Underserved Emergency Medical Services Areas in Daejeon Metropolitan City Using a Geographic Information System (지리정보시스템을 이용한 대전광역시 응급의료 취약지 분석)

  • Hwang, Ji-Hye;Lee, Jin-Yong;Park, Seong-Woo;Lee, Dong-Woo;Lee, Bo-Woo;Na, Baeg-Ju
    • Journal of agricultural medicine and community health
    • /
    • v.37 no.2
    • /
    • pp.76-83
    • /
    • 2012
  • Objectives: The purpose of this study was to define the underserved emergency medical services (EMS) areas in Daejeon metropolitan city, as well as to identify their distinctive characteristics in public health perspectives. Methods: An underserved EMS area was operationally defined as an area in which it is difficult to arrive at an emergency medical center within 30 minutes. Using a cost-weighted distance algorithm with a geographic information system (GIS), the underserved EMS area was calculated. The characteristics of the underserved areas were analyzed by the Chi-square test. The SPSS statistical software package was used to perform the statistical analysis. All statistical tests were two-sided, and a p-value<0.05 was considered statistically significant. Results: Twelve administrative sectors ('Dong' in Korean) were included in the underserved areas, accounting for a population of approximately 8,100 citizens. The relationships between underserved EMS area and populations of agriculture, fishery, and forestry; citizens who are recipients of national basic livelihood security program; disabled; or aged 65 or older were statistically significant. Conclusion: It was found that 12 administrative sectors were included in the underserved EMS areas. Revealing underserved EMS areas using GIS analysis based on a cost-weighted distance algorithm of road data was an effective analytic method. However, as this study was confined to Daejeon City, South Korea, a nation-wide study should be performed to provide a more accurate conclusion.

The Representative Technology Field Analysis of Domestic Defense Companies in Communication-electronics based on Patent Information Data (특허 자료 정보 기반 국내 통신전자 방산업체 대표 기술 분야 분석)

  • Kim, Jang-Eun;Cho, Yu-Seup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.446-458
    • /
    • 2017
  • In order to make a decision about the acquisition of command control communication weapon systems considering the client's technology level requirements, the improvement of the domestic technology level and security of core technology, the person in charge can perform technology evaluation/analysis based on command control communication weapon system patent data. As a method of collecting such patent data, we can collect the patent data of government-designated (Defense Acquisition Program Act Article 35) companies (11 Major defense companies/9 General defense companies) through the Korea Intellectual Property Rights Information System (KIPRIS) of the Korean Intellectual Property Office (KIPO) In this way, we collected 1,526 patents and 134 International Patent Classification (IPC) types through the KIPRIS of the KIPO. Based on these data, we performed three types of analysis, General information analysis, Principal Components Analysis (PCA) and Network analysis, and extracted 27, 19 and 13 IPC types from them, respectively. Based on the above three analysis results, we confirmed 8 IPC types (F41A, F41G, G06F, G01S, H04B, H04L, H04M and H04W) as the key technologies and representative technology fields of domestic communication-electronics defense companies.

Implementation of Secure System for Blockchain-based Smart Meter Aggregation (블록체인 기반 스마트 미터 집계 보안 시스템 구축)

  • Kim, Yong-Gil;Moon, Kyung-Il
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.1-11
    • /
    • 2020
  • As an important basic building block of the smart grid environment, smart meter provides real-time electricity consumption information to the utility. However, ensuring information security and privacy in the smart meter data aggregation process is a non-trivial task. Even though the secure data aggregation for the smart meter has been a lot of attention from both academic and industry researchers in recent years, most of these studies are not secure against internal attackers or cannot provide data integrity. Besides, their computation costs are not satisfactory because the bilinear pairing operation or the hash-to-point operation is performed at the smart meter system. Recently, blockchains or distributed ledgers are an emerging technology that has drawn considerable interest from energy supply firms, startups, technology developers, financial institutions, national governments and the academic community. In particular, blockchains are identified as having the potential to bring significant benefits and innovation for the electricity consumption network. This study suggests a distributed, privacy-preserving, and simple secure smart meter data aggregation system, backed up by Blockchain technology. Smart meter data are aggregated and verified by a hierarchical Merkle tree, in which the consensus protocol is supported by the practical Byzantine fault tolerance algorithm.

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane (푸리에 영역에서의 위상 변조 Exclusive-OR 연산을 이용한 단일 경로 위상 암호화 시스템)

  • Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong;Noh, Duck-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.4
    • /
    • pp.326-333
    • /
    • 2005
  • Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.

Development of IFC Standard for Securing Interoperability of BIM Data for Port Facilities (항만 BIM 데이터의 상호운용성 확보를 위한 IFC 표준 개발)

  • Moon, Hyoun-Seok;Won, Ji-Sun;Shin, Jae-Young
    • Journal of KIBIM
    • /
    • v.10 no.1
    • /
    • pp.9-22
    • /
    • 2020
  • Recently, BIM has been extended to infrastructures such as roads and bridges, and the demand for BIM standard development for ports is increasing internationally. Due to the low level of utilization of classification system and drawing standards compared to other infrastructures, and the closed nature of national security facilities, ports have insufficient level of connection and sharing environment among external systems or users. In addition, since the standardization of data for port facilities is not made, it is still necessary to establish an independent DB for each system and to ensure interoperability of data between these systems since it does not have a shared environment among similar data. Therefore, the purpose of this study is to develop and verify IFC, the international standard for BIM, in order to cope with the BIM environment and to be commonly used in the design, construction, and maintenance of port facilities. To this end, we build a standard schema with port-specific Express Notation according to buildingSMART International's standard development methodology. First, domestic and international reference model standards were analyzed to derive components such as space and facilities of port facilities. Based on this, the components of the port facility were derived through the codification, categorization, and normalization process developed by the research team. This was extended based on the port BIM object classification system developed by the research team. Normalization results were verified by designers and associations. Then, IFC schema construction was based on Express-G data modeling based on IFC 4 * 2 Candidate, which is a bridge candidate standard based on IFC4 (ISO16739), and IFC 4 * 3 Draft, which is developed by buildingSMART International. The final schema was validated using the commercialized validation tool. In addition, in order to verify the structural verification of the port IFC schema, the transformation process was verified by converting the caisson model into a Part21 file. In the future, this result will not only be used as a delivery standard for port BIM products, but will also be applied as a linkage standard between systems and a common data format for port BIM platforms when BIM is used in the maintenance phase. In particular, it is expected to be used as a core standard for data exchange in the port maintenance stage.

Unsupervised Learning-Based Threat Detection System Using Radio Frequency Signal Characteristic Data (무선 주파수 신호 특성 데이터를 사용한 비지도 학습 기반의 위협 탐지 시스템)

  • Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.147-155
    • /
    • 2024
  • Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.

Development of Local Animal BLAST Search System Using Bioinformatics Tools (생물정보시스템을 이용한 Local Animal BLAST Search System 구축)

  • Kim, Byeong-Woo;Lee, Geun-Woo;Kim, Hyo-Seon;No, Seung-Hui;Lee, Yun-Ho;Kim, Si-Dong;Jeon, Jin-Tae;Lee, Ji-Ung;Jo, Yong-Min;Jeong, Il-Jeong;Lee, Jeong-Gyu
    • Bioinformatics and Biosystems
    • /
    • v.1 no.2
    • /
    • pp.99-102
    • /
    • 2006
  • The Basic Local Alignment Search Tool (BLAST) is one of the most established software in bioinformatics research and it compares a query sequence against the libraries of known sequences in order to investigate sequence similarity. Expressed Sequence Tags (ESTs) are single-pass sequence reads from mRNA (or cDNA) and represent the expression for a given cDNA library and the snapshot of genes expressed in a given tissue and/or at a given developmental stage. Therefore, ESTs can be very valuable information for functional genomics and bioinformatics researches. Although major bio database (DB) websites including NCBI are providing BLAST services and EST data, local DB and search system is demanding for better performance and security issue. Here we present animal EST DBs and local BLAST search system. The animal ESTs DB in NCBI Genbank were divided by animal species using the Perl script we developed. and we also built the new extended DB search systems fur the new data (Local Animal BLAST Search System: http://bioinfo.kohost.net), which was constructed on the high-capacity PC Cluster system fur the best performance. The new local DB contains 650,046 sequences for Bos taurus(cattle), 368,120 sequences for Sus scrofa (pig), 693,005 sequences for Gallus gallus (fowl), respectively.

  • PDF

A Study on the Unmanned convenience Store Operation System from the Viewpoint of Visual Merchandising (비주얼 머천다이징 관점에서의 무인 편의점 운영시스템에 관한 연구)

  • Seo, Jung-Hwa;Yang, Hoe-Chang;Park, Chul-Ju;Youn, Myoung-Kil
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.12
    • /
    • pp.45-53
    • /
    • 2018
  • Purpose - The purpose of the study was to investigate operation system of current convenience store and competing retail store and to find out development of unattended convenience store. Operators can save labor cost and solve labor seeking when opening shop under suitable environment and commerce area, and assure of employee's safety. Customers are allowed to select commodity comfortably without disclosure of face and to shorten standby time at simple store opening, buying and paying and to produce convenient living environment by financing, delivery and goods control. This study examined effect and problems of operation of existing and unattended convenience store from point of view of visual merchandising to find out model of unattended convenience store and to strengthen competitiveness of convenience store business. Research design, data, and methodology - Research procedure of accomplishment of goal of the study was: The study investigated state of distribution business, and role and definition of VMD. First, VMD played an important role of promotion and competitiveness of unattended convenience stores. Second, the author investigated research and cases of unattended convenience stores 14 months, that is to say, from August 15, 2017 to October 15, 2018. Third, the author investigated on-the-spot three of common convenience stores, three of unattended convenience stores and three of retailers one month, that is to say, June 1, 2018 to July 1, 2018. The subject was convenience stores and retailers selling similar type of products at Seoul and metropolitan area. Results - Layout, selling place, brand identity, goods assortment, authentication system, product information cognition and control, buying and payment system, security system, salesmen, promotion and other services should be improved from point of view of merchandising. Structure, furniture, lighting, voice, façade, VP, PP, IP and POP should be developed. Conclusions - Unattended convenience stores saved operating cost and lessened labor and gave visitors convenience and comfortable shopping and made use of resources effectively. Further studies with quantitative analysis shall find out strategic conditions for promotion of unattended convenience stores.