• Title/Summary/Keyword: security key

Search Result 3,318, Processing Time 0.03 seconds

The Representative Technology Field Analysis of Domestic Defense Companies in Communication-electronics based on Patent Information Data (특허 자료 정보 기반 국내 통신전자 방산업체 대표 기술 분야 분석)

  • Kim, Jang-Eun;Cho, Yu-Seup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.446-458
    • /
    • 2017
  • In order to make a decision about the acquisition of command control communication weapon systems considering the client's technology level requirements, the improvement of the domestic technology level and security of core technology, the person in charge can perform technology evaluation/analysis based on command control communication weapon system patent data. As a method of collecting such patent data, we can collect the patent data of government-designated (Defense Acquisition Program Act Article 35) companies (11 Major defense companies/9 General defense companies) through the Korea Intellectual Property Rights Information System (KIPRIS) of the Korean Intellectual Property Office (KIPO) In this way, we collected 1,526 patents and 134 International Patent Classification (IPC) types through the KIPRIS of the KIPO. Based on these data, we performed three types of analysis, General information analysis, Principal Components Analysis (PCA) and Network analysis, and extracted 27, 19 and 13 IPC types from them, respectively. Based on the above three analysis results, we confirmed 8 IPC types (F41A, F41G, G06F, G01S, H04B, H04L, H04M and H04W) as the key technologies and representative technology fields of domestic communication-electronics defense companies.

Leased Line Traffic Prediction Using a Recurrent Deep Neural Network Model (순환 심층 신경망 모델을 이용한 전용회선 트래픽 예측)

  • Lee, In-Gyu;Song, Mi-Hwa
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.10
    • /
    • pp.391-398
    • /
    • 2021
  • Since the leased line is a structure that exclusively uses two connected areas for data transmission, a stable quality level and security are ensured, and despite the rapid increase in the number of switched lines, it is a line method that is continuously used a lot in companies. However, because the cost is relatively high, one of the important roles of the network operator in the enterprise is to maintain the optimal state by properly arranging and utilizing the resources of the network leased line. In other words, in order to properly support business service requirements, it is essential to properly manage bandwidth resources of leased lines from the viewpoint of data transmission, and properly predicting and managing leased line usage becomes a key factor. Therefore, in this study, various prediction models were applied and performance was evaluated based on the actual usage rate data of leased lines used in corporate networks. In general, the performance of each prediction was measured and compared by applying the smoothing model and ARIMA model, which are widely used as statistical methods, and the representative models of deep learning based on artificial neural networks, which are being studied a lot these days. In addition, based on the experimental results, we proposed the items to be considered in order for each model to achieve good performance for prediction from the viewpoint of effective operation of leased line resources.

Overview of Legal Measures for Managing Workplace COVID-19 Infection Risk in Several Asia-Pacific Countries

  • Derek, Miller;Tsai, Feng-Jen;Kim, Jiwon;Tejamaya, Mila;Putri, Vilandi;Muto, Go;Reginald, Alex;Phanprasit, Wantanee;Granadillos, Nelia;Farid, Marina Bt Zainal;Capule, Carmela Q.;Lin, Yu-Wen;Park, Jihoon;Chen, Ruey-Yu;Lee, Kyong Hui;Park, Jeongim;Hashimoto, Haruo;Yoon, Chungsik;Padungtod, Chantana;Park, Dong-Uk
    • Safety and Health at Work
    • /
    • v.12 no.4
    • /
    • pp.530-535
    • /
    • 2021
  • Background: Despite the lack of official COVID-19 statistics, various workplaces and occupations have been at the center of COVID-19 outbreaks. We aimed to compare legal measures and governance established for managing COVID-19 infection risks at workplaces in nine Asia and Pacific countries and to recommend key administrative measures. Methods: We collected information on legal measures and governance from both general citizens and workers regarding infection risks such as COVID-19 from industrial hygiene professionals in nine countries (Indonesia, India, Japan, Malaysia, New Zealand, Republic of the Philippines, Republic of Korea, Taiwan, and Thailand) using a structured questionnaire. Results: A governmental body overseeing public health and welfare was in charge of containing the spread and occurrence of infectious diseases under an infectious disease control and prevention act or another special act, although the name of the pertinent organizations and legislation vary among countries. Unlike in the case of other traditional hazards, there have been no specific articles or clauses describing the means of mitigating virus risk in the workplace that are legally required of employers, making it difficult to define the responsibilities of the employer. Each country maintains own legal systems regarding access to the duration, administration, and financing of paid sick leave. Many workers may not have access to paid sick leave even if it is legally guaranteed.

Digital Revolution and Welfare State Reforms: Revisiting Social Investment and Social Protection (기술혁명과 미래 복지국가 개혁의 논점: 다시 사회투자와 사회보호로)

  • Choi, Young Jun;Choi, Jung Eun;Ryu, Jung Min
    • 한국사회정책
    • /
    • v.25 no.1
    • /
    • pp.3-43
    • /
    • 2018
  • The digital revolution has brought about both positive expectations and negative concerns. Many experts predict that the current technological revolution, so-called "Fourth Industrial Revolution", which is expected to increase productivity in a disruptive way, has significant implications on employment and the labor market. In subsequence, the possible demise of the traditional employment system could markedly undermine the comtemporary welfare state. As a result, basic income has emerged as an alternative. However, little welfare state research has conducted the systematic review on the impact of the present technological revolution on employment and welfare states. In this paper, we will start to review the gist of the digital revolution and critically review recent studies on its effects on employment and welfare states together with actual case studies. In particular, we will investigate the experiences of platform economies of Uber and Amazon Mechanical Turk, and the German experience from 'Work 4.0'. Finally, we will discuss key issues of future welfare state reforms. This research argues that the effects of the technological revolution on employment and welfare state policies would be enormous, but they will be most likely to be mediated by domestic political and policy institutions. It emphasizes the importance of high-quality social investment that would enable individuals to flexibly adapt technological changes and support creative human capital resource. But, high-quality social investment could not be sustained without the decent social protection system that universally provides security to people.

What Makes Sick Workers Go To Work? A Study of Occupational Environment and Presenteeism (무엇이 아픈 노동자들을 출근하도록 만드는가? 직업환경과 프리젠티즘(presenteeism)에 대한 연구)

  • Shin, Heeju
    • Korean Journal of Labor Studies
    • /
    • v.24 no.3
    • /
    • pp.35-71
    • /
    • 2018
  • The purpose of this study is to examine which job-related factors are associated with presenteeism, which is defined as attending work while ill. Although presenteeism is a relatively new concept in academic research, it should be regarded as an important social issue in that presenteeism threatens employees' job prospects and quality of life as well as it causes loss of work productivity. I analyzed a cross-sectional survey of 24,571 wage workers over 15 from the fourth wave of the Korean Working Conditions Survey in 2014. Five logistic regression models were analyzed on experience of presenteeism, and work hours and private life, occupational environment, job insecurity, rewards and welfare were assessed as key predictors of presenteeism. I found that 1) work hours with bad fit with private life, 2) high level of work time-pressure, and low job satisfaction 3) job insecurity, and 4) low benefits are associated with experience of presenteeism. The findings are fairly consistent with the theory of job-person mismatch, which explains that workers tend to preserve their personal resources by going to work while ill (presenteeism) when job demands or work conditions do not match with their level of personal expectation and, thus, workers are afraid of loss of personal resources. Presenteeism influences worker's long-term health and quality of life negatively as well as causes serious social costs. Therefore, we need organizational efforts to prevent the negative effects of presenteeism on society as well as workers.

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.

Housing Choice Determinants of the Youth and Newlyweds Households: A Case Study of Incheon (청년·신혼부부의 주거선택요인에 관한 연구: 인천시를 중심으로)

  • Key, Yunhwan
    • Land and Housing Review
    • /
    • v.13 no.4
    • /
    • pp.13-26
    • /
    • 2022
  • This study analyzes housing choice determinants of the youth and newlyweds households by using housing survey data in Incheon. A multinomial logit model is employed for analysis with the following variables: housing characteristics, housing market characteristics, and residential and neighborhood environment characteristics. The findings from the analysis are as follows. First, for the continued residence of the youth, the important factors were the relief assistance of housing maintenance costs. For the newlyweds, the important factors were the quality improvement of residential environments to ensure residential stability. Second, the housing choice factors to attract the youth were residential support for rent, maintenance costs, and relocation, and the improvements of residential environments such as security, noise levels, and medical facilities. For the newlyweds, the important factors were housing loan assistance for a home purchase or a cheonsei deposit and residential quality improvements for air pollution and parking facilities. Third, the youth were likely to move out due to high rental costs, and the newlyweds were likely to move out for the purchase of a new apartment or higher-quality housing.

A Study on the Risk Analysis and Fail-safe Verification of Autonomous Vehicles Using V2X Based on Intersection Scenarios (교차로 시나리오 기반 V2X를 활용한 자율주행차량의 위험성 분석 및 고장안전성 검증 연구)

  • Baek, Yunseok;Shin, Seong-Geun;Park, Jong-ki;Lee, Hyuck-Kee;Eom, Sung-wook;Cho, Seong-woo;Shin, Jae-kon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.6
    • /
    • pp.299-312
    • /
    • 2021
  • Autonomous vehicles using V2X can drive safely information on areas outside the sensor coverage of autonomous vehicles conventional autonomous vehicles. As V2X technology has emerged as a key component of autonomous vehicles, research on V2X security is actively underway research on risk analysis due to failure of V2X communication is insufficient. In this paper, the service scenario and function of autonomous driving system V2X were derived by presenting the intersection scenario of the autonomous vehicle, the malfunction was defined by analyzing the hazard of V2X. he ISO26262 Part3 process was used to analyze the risk of malfunction of autonomous vehicle V2X. In addition, a fault injection scenario was presented to verify the fail-safe of the simulation-based intersection scenario.

Research on the Necessity of Building the Second Space Rocket Launching Sites for Breakthrough Development of R.O.K National Space Power (도약적 국가 우주력 발전을 선도할 제2 우주센터 구축 필요성 연구)

  • Park, Ki-tae
    • Journal of Space Technology and Applications
    • /
    • v.2 no.2
    • /
    • pp.146-168
    • /
    • 2022
  • Witnessing current military conflicts in South China Sea and Eastern Europe, most defense analysts evaluate one of the most serious security threat toward the US is coming from the superpower competitions with Russia and China. The main means for such super power hegemonic competitions is military power and space power is a key enabler to maximize the efficiency and effectiveness of military employment. Reflecting above circumstances, the space hegemonic competition between the Unites States and China is spreading into all aspects of national powers. Under such an environment, R.O.K needs to significantly develop national space power to preserve life and assets of people in space. On the other hand, the R.O.K has a lot of limitations in launching space assets into orbits by land-based space rockets due to its geographic locations. The limitation of rocket launching direction, the failure to secure a significant area enough to secure safety and the limitation to secure open area enough to build associated facilities are among them. On this paper, I will suggest the need to build the 2nd space rocket launching site after analyzing a lot of short-falls the current 'Naro' space center face, compared to those of advanced space powers around the world.

Effect of supplementation and withdrawal of selenium-enriched kale sprouts on productivity and egg selenium concentration of laying hens

  • Anut Chantiratikul;Pinyada Thongpitak;Orawan Arunsangseesod;Eakapol Wangkahart;Kwanyuen Leamsamrong;Worapol Aengwanich;Juan Boo Liang;Wu Xin;Piyanete Chantiratikul
    • Animal Bioscience
    • /
    • v.36 no.3
    • /
    • pp.484-491
    • /
    • 2023
  • Objective: The aim of this trial was to investigate the effect of supplementation and withdrawal of selenium-enriched kale sprouts (SeKS) on productivity and egg Se concentration of laying hens. Selenium from commercial Se-enriched yeast (SeY) was used as a comparative Se source. Methods: One-hundred and eighty 61-week-old laying hens were randomly divided into 5 treatment groups with 4 replicates (9 hens each) in a 2×2+1 Augmented Factorial Experiment in a completely randomized design. The experimental diets were basal diet, basal diet supplemented with 0.2 and 0.4 mg Se/kg from SeKS and SeY, respectively. The 8-week feeding trial was divided into 2 periods, namely the Se supplemental period (week 1 to 4) and the Se withdrawal period (week 5 to 8). Results: Productive performance, egg quality and egg Se concentration of laying hens were not affected by sources of Se (SeKS and SeY) during both, the Se supplemental and withdrawal periods. Egg production and egg Se concentration increased (p<0.05) with increasing levels of Se supplementation. The egg Se concentration increased and reached a peak 1 week after Se supplementation. However, concentration of Se in eggs of hens fed Se from both sources decreased rapidly from the second week of the Se withdrawal period to reach the same egg Se concentration of hens fed the basal diet by the fourth week of the Se withdrawal period. Conclusion: The efficacy of Se from SeKS on productivity and egg Se concentration in laying hens was comparable to commercial SeY. Thus, SeKS can provide an alternate organic Se source for production of Se-enriched eggs.