• Title/Summary/Keyword: security information

Search Result 17,850, Processing Time 0.041 seconds

Relationship between Prevalence of Musculoskeletal Symptoms and Occupational and Personal Factors among Street Cleaners (일부 거리환경미화원의 근골격계 증상 유병률과 직업적 및 개인적 요인의 관련성)

  • Jung, Suk-Chul;Lee, Kyung-Sun;Jung, Myung-Chul;Lee, In-Seok;JungChoi, Kyung-Hee;Bahk, Jin-Wook;Kim, Hyun-Joo
    • Journal of the Korean Society of Safety
    • /
    • v.25 no.6
    • /
    • pp.169-179
    • /
    • 2010
  • The aim of this study was to investigate occupational and individual risk factors and working conditions in relation to musculoskeletal symptoms in street cleaners. Investigation was conducted through a survey of 395 male street cleaners employed by the government office in Seoul, Gyeonggi and Chung-Nam from July to August of 2009. The control group was comprised of 143 male drivers and security guards. Risk factors for musculoskeletal symptoms in street cleaners were investigated by multiple logistic regression analysis and also evaluated ergonomic risk factors by assessing working conditions of 4 street cleaners. As a result of symptom questionnaires, all of the prevalent rates of musculoskeletal symptoms in street cleaners had significantly higher results than those of the control group(p<0.05). On binary logistic regression analysis of musculoskeletal symptoms, street cleaners showed significant higher odds ratio as 18.84(95%CI: 6.56-54.12) in the arm/elbow, 10.49(95%CI: 4.29-25.65) in the hand/wrist compared to the control group. Both absence of rest breaks and exposure to ergonomic risk factors showed to be important internal risk factors of musculoskeletal symptoms among street cleaners. The exposure levels of QEC(Quick exposures checklist) in street cleaners were revealed to be higher on the shoulder/arm, wrist/hand, and neck than back, or from stress. The findings appear to show that street cleaners were high-risk group of work-related musculoskeletal disorders. Therefore street cleaners require a holistic interventional strategy, including adequate arrangement of rest breaks, improvement of working tools and control of individual risk factors such as obesity and smoking.

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

Site Monitoring of Crews and Passengers on Board by the BLE and PLM Combination (BLE와 PLM 조합의 승선자 위치 모니터링)

  • Kwon, Hyuk-Joo;Yang, Hyun-Suk;Lee, Sung-Geun
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.4
    • /
    • pp.463-467
    • /
    • 2015
  • When unforeseen accidents occur in a ship, it is important to save passengers safely and remove them from the accident area quickly. To solve such a situation, site information of passengers on board always must be identified. This paper implemented a site monitoring of crews and passengers based on the BLE and PLM combination, to prepare for unexpected accidents of the ships. This system was composed of BLE tag for crews, passengers and each room, PLM networks, data server, and monitoring PC. In this system, site information derived from the tag attached to the bodies and cabins of crews and passengers are transmitted through a power line network, and monitored on the screen of a monitoring PC. The proposed system guides them into the only authorized area considering the ship security and passengers' safety, and even has a special alarm call to warn them after entering an unauthorized area. This system enables the BLE-embedded tag battery to use for a long time because the BLE consumes low electric power, and can gain an economic advantage.

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane (푸리에 영역에서의 위상 변조 Exclusive-OR 연산을 이용한 단일 경로 위상 암호화 시스템)

  • Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong;Noh, Duck-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.4
    • /
    • pp.326-333
    • /
    • 2005
  • Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.

Illegal Issuing Practices of Switched Bill of Lading and Precautions against their Potential Risks (스위치선하증권의 불법적 발행 관행에 따른 위험과 그 대책)

  • Park, Sae-Woon
    • International Commerce and Information Review
    • /
    • v.14 no.2
    • /
    • pp.389-409
    • /
    • 2012
  • The Switched Bill of Lading(SBL) has been in frequent use in recent years as intermediary trade increases with the growing number of companies' overseas subsidiaries. Its frequent use, though, has brought about disputes regarding its illegal issue. Although there are several legal cases regarding this, studies on this issue are hard to find. Therefore, this study tries to provide countermeasures and precautions against unlawful issues of SBL through examining the legal cases resulting from illegal issuing practices of SBL. When the Switched Bill of Lading is issued, the shipper, consignee, port of loading and unloading, and shipping date of the original bill of lading are usually changed. Statements which may put the shipper at a disadvantageous position may also be deleted and/or the bill of lading may be either divided or integrated when it is issued. However, if the carrier issues the SBL 1)without withdrawing original BL, 2)indicating the shipping date, port of loading and port of discharge falsely, or 3)deleting the statements which may give him disadvantages, it may be regarded as an illegal issue. These unlawful issues of SBL may pose a huge threat to the shipper, banks and the parties relating to the trade. That is, the shipper may take a substantial loss when the goods can be delivered to a third party by SBL without his collecting the proceeds. The issuing bank and the negotiating bank may also have their security rights to the goods hampered by the illegal and improper issue of SBL. In most cases, the carrier has no choice but to issue the SBL without collecting the original BL for fear of hurting the relationship with the intermediary traders. This practice of issuing more than two sets of BL may pose a potential risk to the carrier.

  • PDF

A Comparative Assessment Between ACSS of Canada and FedACH of America as a Electronic Payment System (전자결제시스템으로서 캐나다의 ACSS와 미국의 FedACH의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.18 no.1
    • /
    • pp.55-78
    • /
    • 2016
  • This paper discusses on Electronic Payment System between U.S.A. and Canada. In particular, I focused on ACSS compare with FedACH(Fed Automated Clearing House) to advance a research effects. Because both of them is a low-value, high-volume retail payment system which their countries represent. The ACSS(Automated Clearing Settlement System) is the system through which the vast majority of CPA payment items are cleared, through various payment streams. In 2014, ACSS system cleared approximately 6.8billion payments worth a total value of $ 44.9 trillion. While, The FedACH Network are the center of America Commerce, moving more than $40 trillion each year. That's made up of almost 23 billion electronic financial transaction, including direct deposit via ACH, social security and government benefits, electronic bill payments such as utility and mortgage payments. Thus in this article, first of all, I considered features of payment system and the types of payment items between ACSS and FedAch. Second, I analyzed the status of central bank and legal background. Third, I focused on the operational policy and risk aversion policy. Lastly, I suggested that their payment and banking system have to assume, with good reason, more efficiently accurately and securely operation to protect their customer from credit risk and financial fraud.

  • PDF

A Watermarking Scheme Based on k-means++ for Design Drawings (k-means++ 기반의 설계도면 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.57-70
    • /
    • 2009
  • A CAD design drawing based on vector data that is very important art work in industrial fields has been considered to content that the copyright protection is urgently needed. This paper presents a watermarking scheme based on k-means++ for CAD design drawing. One CAD design drawing consists of several layers and each layer consists of various geometric objects such as LINE, POLYLINE, CIRCLE, ARC, 3DFACE and POLYGON. POLYLINE with LINE, 3DFACE and ARC that are fundamental objects make up the majority in CAD design drawing. Therefore, the proposed scheme selects the target object with high distribution among POLYLINE, 3DFACE and ARC objects in CAD design drawing and then selects layers that include the most target object. Then we cluster the target objects in the selected layers by using k-means++ and embed the watermark into the geometric distribution of each group. The geometric distribution is the normalized length distribution in POLYLINE object, the normalized area distribution in 3DFACE object and the angle distribution in ARC object. Experimental results verified that the proposed scheme has the robustness against file format converting, layer attack as well as various geometric editing provided in CAD editing tools.

A Study on the Employment Status and Treatment of Temporary Librarians in the School Libraries (학교도서관 비정규직 사서의 고용실태와 처우개선 방안에 관한 연구)

  • Ryu, Jae hee;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.3
    • /
    • pp.101-128
    • /
    • 2015
  • The purpose of this study was to investigate the temporary librarians' employment status that have been placed in over 80% of the school libraries and deduce the issues of their job status for proposing some solutions to improve their job performance. To achieve the above research purposed in this study, the related literature was reviewed and analyzed and an interview was conducted with the librarians in the Chungbuk province and a survey was distributed in the same province. As a result, first, a high correlation was found between the total satisfaction and the factors as follows; 'working satisfaction', 'employment conditions', 'working environment', 'interpersonal relations' etc. In the difference verification based on the satisfaction in accordance with the employment status, a difference of satisfaction was found between the pre and post analyses of the unlimited contractions. Second, the most overall review of the temporary librarians' job performances in relation to the 'reading and lending performances was conducted, regardless of the librarian certification. Third, the temporary librarians working at the school libraries responded that 'the manpower developer' was the most difficult consideration in relation to their employment statuses. And, asked about the solutions for the improvement of their job conditions, most of the librarians wanted their job security.