• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.034 seconds

Empirical Study on the Performance Analysis and Function of Jindo Coastal Vessel Traffic Service (진도 연안VTS의 성과 분석 및 기능에 관한 실증적 연구)

  • Jeong, Jae-Yong;Jung, Cho-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.18 no.4
    • /
    • pp.308-315
    • /
    • 2012
  • Hebei Spirit Oil Spill that happened in 2007 had prompted the need of revisiting the coastal safety. In response to this, Korea had made an effort to implement VTS in every coastline in the country. There are a lot of theoretical studies on VTS function nowadays, but coastal VTS are less frequently studied. In this paper, performance analysis results and accident prevention activities of Jindo Coastal VTS center were summarized and the Coastal VTS function are investigated. Jindo Coastal VTS covers relatively wide area and various places with various maritime traffic characteristics are the major navigation vessels, which means that it is important to control these vessels. Since the probability of accidents due to human error is relatively high in coastal area due to negligence tendency of crews during coastal area navigation, coastal VTS has to provide sufficient assistance to navigating vessels. Like most harbour VTS, Coastal VTS provides not only main information service, navigational assistance and traffic organization services but also various services related with advanced search-and-rescue assistance, marine national security, maritime crime prevention, oil spill response, traffic services for non-service vessel, and safety supervision for water leisure boats.

Overview of the KIOST-HYU Joint Experiment for Acoustic Propagation in Shallow Water Geological Environment (천해 지질환경에서의 음파전달 특성 연구를 위한 KIOST-한양대 공동실험 개요)

  • Cho, Sungho;Kang, Donhyug;Lee, Cheol-Ku;Jung, Seom-Kyu;Choi, Jee Woong;Oh, Suntaek
    • The Journal of the Acoustical Society of Korea
    • /
    • v.34 no.6
    • /
    • pp.411-422
    • /
    • 2015
  • This paper presents an overview of the geological environment investigation and underwater acoustic measurements for the purpose of "Study on the Relationship between the Geological Environment and Acoustic Propagation in Shallow Water", which are jointly carried out by KIOST (Korea Institute of Ocean Science & Technology) and Hanyang University in the western shallow water off the Taean peninsula in the Yellow Sea in April-May 2013. The experimental site was made up of various sediment types and bedforms due to the strong tidal currents and coastal geomorphological characteristics. The geological characteristics of the study area were intensively investigated using multi-beam echo sounder, sub-bottom profiler, sparker system and grab sampler. Acoustic measurements with a wide range of research topics in a frequency range of 20~16,000 Hz: 1) low frequency sound propagation, 2) mid-frequency bottom loss, 3) spatial coherence analysis of ambient noise, and 4) mid- frequency bottom backscattering were performed using low- and mid-frequency sound sources and vertical line array. This paper summarizes the topics that motivated the experiment, methodologies of the acoustic measurements, and acoustic data analysis based on the measured geological characteristics, and describes summary results of the geological, meteorological, and oceanographic conditions found during the experiments.

An Empirical Study on Improving Competitiveness of Korean Shipping Industry (한국 해운산업의 경쟁력강화 정책방안에 관한 실증연구)

  • Lee, Choong-Bae;Noh, Jin-Ho
    • Journal of Korea Port Economic Association
    • /
    • v.26 no.3
    • /
    • pp.259-278
    • /
    • 2010
  • This study analyzes the achievement of the shipping policies and the priority for the promotion of such policies, in order to consider the features of the shipping industries in Korea and other advanced shipping countries and manage the rapidly changing shipping environment actively. Based on such analysis, this study also discusses the promotional strategy to strengthen the international competitiveness of the shipping industry. Regarding the promotion of the related policies, it is necessary to establish a base for growth, strengthen a capacity of leading the market, and create an opportunity in the market. By considering such three factors, it has become known that the establishment of the market order is important for the establishment of a base for growth. It is important to consider the advancement of the shipping tax system. Also, the information-orientation and the knowledge-industrialization of the shipping industry need to be considered. In order to strengthen a capacity of leading the market, the stable security of the labor force in the shipping industry is the most important factor. Also, it is important to consider the development and the upbringing of the global mega career and the shipping business. Regarding the creation of an opportunity in the market, it is important to expand the range of the shipping exchange between South Korea and North Korea, which will influence the administrative and the operative results related with the promotion of the related policies.

Encryption Method Based on Chaos Map for Protection of Digital Video (디지털 비디오 보호를 위한 카오스 사상 기반의 암호화 방법)

  • Yun, Byung-Choon;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to the rapid development of network environment and wireless communication technology, the distribution of digital video has made easily and the importance of the protection for digital video has been increased. This paper proposes the digital video encryption system based on multiple chaos maps for MPEG-2 video encoding process. The proposed method generates secret hash key of having 128-bit characteristics from hash chain using Tent map as a basic block and generates $8{\times}8$ lattice cipher by applying this hash key to Logistic map and Henon map. The method can reduce the encryption overhead by doing selective XOR operations between $8{\times}8$ lattice cipher and some coefficient of low frequency in DCT block and it provides simple and randomness characteristic because it uses the architecture of combining chaos maps. Experimental results show that PSNR of the proposed method is less than or equal to 12 dB with respect to encrypted video, the time change ratio, compression ratio of the proposed method are 2%, 0.4%, respectively so that it provides good performance in visual security and can be applied in real time.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

A Study of Policy Direction on O2O industry developing (O2O산업 발전을 위한 정책방향 연구)

  • Kim, Hee Yeong;Song, Seongryong
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.13-25
    • /
    • 2017
  • The purpose of this study is to suggest the direction of O2O industry policy for solving the conflict problems with the traditional industry stakeholder and for enhancing the regulations as new industry development is inevitable. We make use of TAIDA that is one of scenario methods to accomplish the purpose and suggest the direction of policy. First, it is needed to prepare directly by government the environment that new business models are able to emerge easily with various consulting services and information supports like public system servers and IT infra, it is practical support policy. Second, positive legal application for new business and making the law for new business are needed in legal issues situation as soon as possible. Third, the conflicts with old and new industry would be managed to the direction of "predictable" progressively. Incongruity among laws, safety and security problems, and the conflict of stakeholder are urgent. Because of the limit in this study, it is expected that O2O industry is categorized in detail aligned to the characteristics and that new policies along to the separate industry areas are developed by the following study.

A Policy-driven RFID Data Management Event Definition Language (정책기반 RFID 데이터 관리 이벤트 정의 언어)

  • Song, Ji-Hye;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.55-70
    • /
    • 2011
  • In this paper, we propose a policy-driven RFID data management event definition language, which is possibly applicable as a partial standard for SSI (Software System Infrastructure) Part 4 (Application Interface, 24791-4) defined by ISO/IEC JTC 1/SC 31/WG 4 (RFID for Item Management). The SSI's RFID application interface part is originally defined for providing a unified interface of the RFID middleware functionality―data management, device management, device interface and security functions. However, the current specifications are too circumstantial to be understood by the application developers who used to lack the professional and technological backgrounds of the RFID middleware functionality. As an impeccable solution, we use the concept of event-constraint policy that is not only representing semantic contents of RFID domains but also providing transparencies with higher level abstractions to RFID applications, and that is able to provide a means of specifying event-constraints for filtering a huge number of raw data caught from the associated RF readers. Conclusively, we try to embody the proposed concept by newly defining an XML-based RFID event policy definition language, which is abbreviated to rXPDL. Additionally, we expect that the specification of rXPDL proposed in the paper becomes a technological basis for the domestic as well as the international standards that are able to be extensively applied to RFID and ubiquitous sensor networks.

A Technique to Specify and Generate .NET Components in MDA/PSM for Pervasive Service (MDA/PSM상에서 퍼베이시브 서비스를 지원하는 닷넷 컴포넌트의 명세 및 생성 기법)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.635-645
    • /
    • 2007
  • Component technology has been widely accepted as an effective way for building software systems with reusable components, and Microsoft (MS) .NET is one of the recent representative component technologies. Model Driven Architecture (MDA) is a new development paradigm which generates software by transforming design models automatically and incrementally. Transformation of structural models in MDA has been successfully applied. However, transformation of dynamic models and pervasive services, such as transaction service, security service, synchronization service and object pooling are largely remains as an area for further research. The recent enterprise system has multi tier distributed architecture, and the functionality of early mentioned pervasive services is essential for this architecture. .NET platform can implement Component Object Model+ (COM+) component for supporting pervasive services by specify Attribute code. In this paper, we specify the functionalities of the COM+ component offering pervasive services, and then those functionalities are defined by UML profile. By using the profile, the Platform Specific Model (PSM) for .NET/C# is specified, and .NET components are automatically generated through our tool. The development productivity, extensibility, portability, and maintenance of software can be dramatically improved by using of the proposed methods.

A Study on Converting the Data of Probability of Hit(Ph) for OneSAF Model (OneSAF 모델을 위한 명중률 데이터 변환 방법)

  • Kim, Gun In;Kang, Tae Ho;Seo, Woo Duck;Pyun, Jae Jung
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.83-91
    • /
    • 2020
  • To use the OneSAF model for the analysis of Defence M&S, the most critical factor is the acquisition of input data. The model user is hard to determine the input data such as the probability of hit(Ph) and the probability of kill(Pk). These data can be obtained directly by live fire during the development test and the operational test. Therefore, this needs more time and resources to get the Ph and Pk. In this paper, we reviewed possible ways to obtain the Ph and Pk. We introduced several data producing methodologies. In particular, the error budget method was presented to convert the Ph(%) data of AWAM model to the error(mil) data of OneSAF model. Also, the conversion method which can get the adjusted results from the JMEM is introduced. The probability of a hit was calculated based on the error budget method in order to prove the usefulness of the given method. More accurate data were obtained when the error budget method and the projected area from the published photo were used simultaneously. The importance of the Ph calculation was demonstrated by sensitivity analysis of the Ph on combat effectiveness. This paper emphasizes the importance of determining the Ph data and improving the reliability of the M&S system though steady collection and analysis of the Ph data.

Evaluation and Implications of the German Riester Pension Scheme (독일 리스터연금제도의 평가와 시사점)

  • Kim, Won Sub
    • 한국사회정책
    • /
    • v.25 no.3
    • /
    • pp.279-303
    • /
    • 2018
  • Since the introduction of the Riester Pension Scheme, the controversy has continued in the policy studies and the political debates. This study evaluates the achievements and limitations of the German Riester pension scheme and tries to derive policy implications for South Korea. As a result of the analysis, the most worthwhile achievement of the Riester Pension is to strengthen the role of the private pension schemes. Unlike other private pension schemes, it included a large part of lower income households. It also opened a new perspective of utilizing private pension schemes to accomplish the goals of the family policy. Despite these attainments, it does not reach the promised coverage rate. It also was revealed that the higher income households have concluded more Riester Pension Contracts than the targeted lower-income households. Due to high administration fee and incomplete information problems, benefit levels are supposed to be much lower than expected. It concludes, above all, despite some achievements, the Riester Pension Scheme will not fill completely the gap of old age income security caused by the reduction of the public pension system. The German case provides fruitful lessons for Korea. The introduction of a subsidized personal pension scheme in South Korea can be realized only when some prerequisites would be satisfied such as the consolidation and maturing of public pension schemes and the strengthening of the transparency in the private pension market.