• Title/Summary/Keyword: protect the environment

Search Result 1,251, Processing Time 0.039 seconds

Simulating Pedestrian Evacuation Using Geographic Information Technologies

  • Jingjing, Shi;Hui, Lin
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.414-416
    • /
    • 2003
  • Pedestrian assemblage is now a normal phenomenon in modern cities. To maintain an unblocked traffic situation, protect the pedestrians' safety and make preparedness for any emergencies is an important task for police department. Modeling pedestrian dynamics and simulating evacuation process can provide useful information for make accurate decisions. In this paper, by virtue of geographic information technologies, the authors proposed a conceptual framework to simulate pedestrian dynamics and evacuation in an open urban environment.

  • PDF

Managing Groundwater Resources in New Zealand to Account for Environmental Change

  • Davidson, Peter William
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.40-45
    • /
    • 2007
  • Water regulators in New Zealand have recognised the need to adapt water allocation regimes and water permit conditions to reflect the likelihood of lower catchment yield on the east coast from 2030 due to climate change. Water management mechanisms to protect the environment and maintain the reliability of other water users are currently being applied or assessed in Marlborough province. These include seasonal water quota based on spring aquifer status, linking water use to environmental triggers to avoid seawater intrusion or spring depletion; and redefining water permit entitlements to account for recharge variability.

  • PDF

ENFORCING RIGHTS OVER DIGITAL ASSETS

  • Chan Leng Sun
    • Journal of Arbitration Studies
    • /
    • v.33 no.3
    • /
    • pp.69-93
    • /
    • 2023
  • For many people, the digital domain is becoming as important as the real world. The virtual environment is no longer just a place for entertainment and leisure. Blockchain transactions are serious business. Digital assets are seen as investments, with as much real value as physical assets. Does the law protect rights in digital assets, such as cryptocurrencies and NFTs? This article discusses recent case law that expands the common law concept of property to digital assets.

Study on Intrusion Detection System under Cloud Computing Environment (클라우드 컴퓨팅 환경을 위한 침입탐지시스템 특징 분석)

  • Yang, Hwan-Seok;Lee, Byoung-Cheon;Yoo, Seung-Jea
    • Convergence Security Journal
    • /
    • v.12 no.3
    • /
    • pp.59-65
    • /
    • 2012
  • Clouding computing which is developing newly as IT and network technology develops become changed to internet and service environment of company. Especially, it can lend IT resource at low costs and no need to build up infra. Clouding computing environment become popular more and more because various computing environment using virtualization is provided. The attack threat range also becomes wider in proportion to broaden various connection ways and service supply range at these clouding computing. Therefore, intrusion detection system which can protect resource from various attack having malignant attempts is necessary. In this study, we analyzed about characteristic of intrusion detection system at cloud computing environment having big damage than other computing environment when intrusion happen by sharing of resource and virtualization.

The System of Sewage and Domestic Wastewater Treatment Plants in Tan-Sui River Basin

  • Ko, Chun-Han
    • Proceedings of the Korean Environmental Health Society Conference
    • /
    • 2002.04a
    • /
    • pp.26.2-39
    • /
    • 2002
  • Tan-Sui River Basin covers Taipei metropolitan area of 2,726 square kilometers with more than six million residents. Since 1988, Taiwan government started to plan and construct an integrated sewerage system, consisted by both separated and concentrated trunk sewers, wastewater treatment plants and ocean outfalls. This presentation will introduce the master plan and major facilities of Tan-Sui River Basin sewerage system. Other measures to protect general water quality and the environment of adjacent river basin area of Tan-Sui River and her tributaries by Taiwan EPA will be presented as well.

  • PDF

A Concept and Operational Assumptions of OS Security Enhancement System (운영체제보안시스템의 개념 및 운영 가정사항)

  • Tai-hoon Kim;Sang-ho Kim;Jae-sung Kim
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.119-125
    • /
    • 2003
  • Trusted operating systems (OS) provide the basic security mechanisms and services that allow a computer system to protect, distinguish, and separate classified data. This paper proposes a new concept of operating system security enhancement system which uses loadabel security kernel module (LSKM) or dynamic link library(DLL) and specific conditions for operational environment should be assumed.

  • PDF

A Study on the Security Technology of Real-time Biometric Data in IoT Environment

  • Shin, Yoon-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.1
    • /
    • pp.85-90
    • /
    • 2016
  • In this paper, the biometric data is transmitted in real time from the IoT environment is runoff, forgery, alteration, prevention of the factors that can be generated from a denial-of-service in advance, and the security strategy for the biometric data to protect the biometric data secure from security threats offer. The convenience of living in our surroundings to life with the development of ubiquitous computing and smart devices are available in real-time. And is also increasing interest in the IOT. IOT environment is giving the convenience of life. However, security threats to privacy also are exposed for 24 hours. This paper examines the security threats to biological data to be transmitted in real time from IOT environment. The technology for such security requirements and security technology according to the analysis of the threat. And with respect to the biometric data transmitted in real time on the IoT environment proposes a security strategy to ensure the stability against security threats and described with respect to its efficiency.

Residents' use and awareness for green open space in the deprived area - focusing on the old downtown area of Jeonju-si - (쇠퇴지역 거주민의 공원녹지 환경 이용과 의식 - 전주시 구도심 지역을 중심으로 -)

  • Gu, Na-Eun;Lee, Yeun-Sook
    • KIEAE Journal
    • /
    • v.12 no.1
    • /
    • pp.45-53
    • /
    • 2012
  • Our society confronts a new social demand to protect the environmental equity of the people, and the green open space that is a representative public property which takes a very important role for the residents in less privileged urbane area in terms of providing amenity without requiring individual expenses additionally. This study aims to identify the current status and problems based on the environmental experiences of the actual residents, excluding the simple physical status, in relation with supplying public property of green open space, and the study put focus on the old downtown area of Jeonju-si which is a test-bed of urbane regeneration planned by the government. Residents in less privileged area evaluate the importance of green environment of park very highly as a factor to enhance their quality of life, but as they do not have well-established environmental infrastructure to back up their needs practically, they face difficulties to use such environment and show low level of satisfaction. In particular, as such characteristics appear remarkably among the least privileged urbane people in the less privileged urbane area, their dependence and expectation upon the environment of green open space is very apparent and, therefore, it is urgently needed to improve their environment for public green park area for the less privileged urbane people.

A Study on the Patient Privacy Protection of Medical Information For Internet (인터넷 환경에서의 의료정보화와 환자개인정보보호 방안)

  • Ji, Hye-Jung;Shin, Seung-Jung;Kim, Jung-Ihl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.235-241
    • /
    • 2008
  • Please Interests in the medical service are increasing in internet environment as life quality of the people improves because of development in information and medical technology. The medical information in today's modern internet environment can violate privacy of the patients. Many medical institutions in Korea are very passive in the privacy protection of patients in the internet environment. The law, standard scheme and systematic guidance to prevent drain of medical information are not developed. This study examines cases of infringement pattern on information of each patient in the internet environment. This study will also try to find a solution to protect the personal information of patients in the internet environment in the measures of law system, technique and management.

  • PDF

A Case Study on the Application of intelligent Skin Technology Introduced in Environment-Friendly Housing (환경 친화형 주거 건축에 도입된 인텔리전트 외피 기술의 적용에 관한 사례 조사 연구)

  • Seo, Won-Duck
    • Journal of the Korean housing association
    • /
    • v.18 no.3
    • /
    • pp.1-8
    • /
    • 2007
  • Since the Intelligent Building was first introduced in early 1980s, It has been studied and designed by related technical experts as it was called by the name of intelligent Building, High-tech Intelligence Building, High-capacity Building, Intellectual Building, etc. Despite the need for new concept as the relation between global environment and architecture has become an issue on a full scale since 1990s and with the development of high technology, former concept is maintained without modification or complement. Especially, attempt to combine industrial technology with architecture is essential to Intelligent Building, therefore frequent opportunity of self-innovation according to the development of technology is necessary. Due to the rarity of the high-technology and its high cost, it was adopted to large-scale construction, however, nowadays, almost all kinds of buildings are getting designed with intelligent-technology. Therefore we can expect that this trend will be accelerated by evolution of technology and will position as a major stream of future architecture along with environment-friendly architecture. Through this process, we should fully be aware of the importance of the several intelligent skin technology to protect global environment and to set future direction in architecture.