• Title/Summary/Keyword: 안전문제해결능력

Search Result 93, Processing Time 0.023 seconds

Effects of Company Trust and FLSE's Trust on Loyalty in Airline Industry (항공사 신뢰와 서비스제공자 신뢰 및 충성도의 영향관계 연구)

  • Ko, Seon-Hee;Kim, Hyun-Jee
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.9
    • /
    • pp.468-478
    • /
    • 2012
  • It is essential to have a trust with customer, especially in the airline context which provide the best service and movement to particular destinations. However, previous researches were performed only within restricted variables regarding this topic. Thus the purpose of this research was to investigate the relationship among trust's antecedents, trust and loyalty. A convenience sample of 298 travelers from airline customers was surveyed and 286 usable questionnaires were analyzed. According to the literature review, trust's antecedents were divided into the following variables: 'competence', 'benevolence' and 'problem solving ability'. Trust objects were divided into 'company trust' and 'front line service employee(FLSE) trust' accordingly. The findings of the study are as follows. First, company trust's antecedents which are 'competence', 'benevolence' and 'problem solving ability' yielded positive effects on company trust. Specifically, 'competence' has the strongest influence among variables. Second, as far as FLSE trust's antecedents are concerned, only 'competence' and 'problem solving ability' have positive effects on FLSE trust. Third, both company trust and FLSE trust influenced each other. Lastly, both company trust and FLSE trust have positive effects on loyalty.

Air-traffic dispatching scheduling in terminal airspace (공항접근영역 항공교통 Dispatching 스케줄링 연구)

  • Jeong, Sun-Jo;Cho, Doo-Hyun;Choi, Han-Lim
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.11
    • /
    • pp.973-980
    • /
    • 2016
  • An air traffic management (ATM) has been studied in a variety of fields to utilize an air traffic capacity efficiently and solve a congested air traffic situation due to an increment of an air traffic demand. In this paper, an air traffic management, which is related with controlling and determining the sequencing of an aircraft approaching to an airport, in terminal control area is studied. This paper focuses on scheduling algorithms with a given problem for the air traffic management with operational constraints, such as a space separation, an overtaking on the same air-route, and a route merge point (a scheduling point). For a real-time calculation, the presented algorithms focus on dispatching heuristic rules which are able to assign tasks in a fast time period with an adequate performance, which can be demonstrated as a proper and realistic scheduling algorithm. A simulation result is presented to illustrate the validity and applicability of the proposed algorithm. Each scheduling rule is analyzed on the same static and dynamic air traffic flow scenario with the ATM Monte-Carlo simulation.

A Lightweight RFID Authentication Protocol using Key Exchange (키 교환을 이용한 경량화된 RFID 인증 프로토콜)

  • Lee Chang-bo;Chang Hojin;Kim Jungjae;Jun Moonseog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.49-51
    • /
    • 2005
  • 유비쿼터스 사회를 만들기 위한 핵심 기술인 RFID는 시간과 공간을 초월하여 우리에게 정보를 제공해 줄 것으로 기대되고 있지만, RFID 시스템이 가지고 있는 특성으로 인하여 프라이버시를 침해할 수 있다는 심각한 문제를 안고 있다 이를 해결하기 위한 방법으로 다양한 연구가 진행되어 왔지만 기존의 연구들은 보안상 문제점과 태그 및 백 엔드 데이터베이스의 과도한 처리능력을 요구하고 있다. 그러나 본 논문에서 제안하는 프로토콜은 해쉬함수와 XOR연산, 키 교환을 이용하여 스푸핑이나, 재전송 공격으로부터 안전 하면서도, 백 엔드 데이터베이스 안에서의 비교연산 횟수를 줄일 수 있는 경량화된 프로토콜을 제안한다.

  • PDF

A Randomized Path-Hash Node Authentication Protocol based on Trust Relationship in Wireless Sensor Networks (무선 센서 네트워크 상에서 신뢰기반 Randomized Path-Hash노드 인증 프로토콜)

  • Kim Jin-Hwan;Park Seon-Ho;Jung Sung-Min;Eom Jung-Ho;Chung Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2006.05a
    • /
    • pp.849-852
    • /
    • 2006
  • 본 논문은 무선 센서 네트워크 라우팅 프로토콜에서 일어날 수 있는 보안 위협 요소들에 대해 알아보고 상호인증에 관한 문제를 해결할 수 있는 Randomized Path-Hash 노드 인증 프로토콜(RPHAP)을 제안한다. 이 프로토콜은 노드 간 상호인증을 제공하며 센서 추적에 대한 안전성까지 제공한다. 또한 간단한 연산 능력의 Hash를 이용하기 때문에 전력 소모에 대한 오버헤드가 적어 모든 센서 네트워크의 프로토콜에서 활용이 가능한 장점을 갖는다.

  • PDF

Secure Membership Protocol for ZigBee Network (ZigBee 네트워크에서의 안전한 멤버쉽 프로토콜)

  • Kim, Bong-Hwan;Park, Chang-Seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.405-416
    • /
    • 2013
  • ZigBee is a wireless sensor network protocol recognized as a next-generation standard infrastructure for WBAN and Smart Grid. Security plays an important role in several ZigBee applications. Especially, strict membership control should be enforced when the membership is changed during the join and leave operations in ZigBee. In this paper, we investigate the security weakness of the current leave operation in ZigBee and propose a new security scheme to address it as well as its security and performance analysis.

Design of A RFID Mutual Authentication Protocol using Key Exchange (키 교환을 이용한 RFID 상호인증 프로토콜의 설계)

  • Lee, Chang-Bo;Kim, Tae-Eun;Ju, So-Jin;Jeon, Mun-Seok
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.05a
    • /
    • pp.373-376
    • /
    • 2006
  • 유비쿼터스 사회를 만들기 위한 핵심 기술인 RFID는 시간과 공간을 초월하여 우리에게 정보를 제공해 줄 것으로 기대되고 있지만, RFID 시스템이 가지고 있는 특성으로 인하여 프라이버시를 침해할 수 있다는 심각한 문제를 안고 있다. 이를 해결하기 위한 방법으로 다양한 연구가 진행되어 왔지만 기존의 연구들은 보안상 문제점과 태그 및 백 엔드 데이터베이스의 과도한 처리능력을 요구하고 있다. 그러나 본 논문에서 제안하는 프로토콜은 해쉬함수와 XOR연산, 키 교환을 이용하여 스푸핑이나, 재전송 공격으로부터 안전 하면서도, 백 엔드 데이터베이스 안에서의 비교연산 횟수를 줄일 수 있는 경량화된 프로토콜을 제안한다.

  • PDF

Design of an Educational Symbolic Coding Application for Drone Education (드론 교육 적용이 가능한 교육용 심볼릭 코딩 어플리케이션 설계)

  • Ok-Kyoon Ha;Ju-hyeon Lee;Dong-myung Kim;Byeong-chan Choi;Hyeong-guk Jo;Min-jae Kang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.375-376
    • /
    • 2023
  • 정보기술의 발전으로 인해 코딩 교육의 중요성이 부각되고 있다. 코딩 교육과 다양한 분야와 융합된 교육 모델이 제시되고 있으며 그 중 드론을 활용한 코딩 교육 방법이 일부 존재하지만 오락성이 강조되거나 드론 조종에 초점을 두고 있어 코딩 역량 향상에는 한계가 있다. 본 논문에서는 학습자의 안전성을 보장하고 코딩 역량 향상을 위해 드론 교육에 적용 가능한 교육용 심볼릭 코딩 어플리케이션을 제시한다. 제시하는 어플리케이션은 사용자가 SW 설계 수준의 순서도 기반 심볼릭 코딩을 학습하고 코딩 결과를 드론 시뮬레이션 또는 실제 드론에 적용하여 확인할 수 있는 기능을 제공한다. 이를 통해 학습자들에게 실제적인 코딩 경험을 제공하고 창의적인 문제 해결 능력과 창의성 향상을 기대할 수 있다.

  • PDF

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.

Improving Scalability using Parallelism in RFID Privacy Protection (RFID 프라이버시 보호에서 병행성을 이용한 확장성 개선)

  • Shin Myeong-Sook;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1428-1434
    • /
    • 2006
  • In this paper, we propose the scheme solving privacy infringement in RFID systems with improving the scalability of back-end server. With RFID/USN becoming important subject, many approaches have been proposed and applied. However, limits of RFID, low computation power and storage, make the protection of privacy difficult. The Hash Chain scheme has been known as one guaranteeing forward security, confidentiality and indistinguishability. In spite of that, it is a problem that requires much of computation to identify tags in Back-End server. In this paper, we introduce an efficient key search method, the Hellman Method, to reduce computing complexity in Back-End server. Hellman Method algorism progresses pre-computation and (re)search. In this paper, after applying Hellman Method to Hash chain theory, We compared Preservation and key reference to analyze and apply to parallel With guaranteeing requistes of security for existing privacy protecting Comparing key reference reduced computation time of server to reduce computation complex from O(m) to $O(\frac{m{^2/3}}{w})$ than the existing form.

Recharge Potential Assessment of Artificial Recharge System for Agricultural Drought Adaptation (농업가뭄대응을 위한 인공함양 시스템의 함양능력 평가)

  • Lee, Jae Young;Kim, Gyoo Bum
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.1
    • /
    • pp.61-72
    • /
    • 2021
  • There is an increasing need for water supply plan using sustainable groundwater to resolve water shortage problem caused by drought due to climate change and artificial aquifer recharge has recently emerged as an alternative. This study deals with recharge potential assessment for artificial recharge system and quantitative assessment for securing stable water and efficient agricultural water supply adapt to drought finding optimal operating condition by numerical modeling to reflect recharge scenarios considering climate condition, target water intake, injection rate, and injection duration. In order to assess recharge potential of injection well, numerical simulation was performed to predict groundwater level changes in injection and observation well respect to injection scenarios (Case 1~4) for a given total injection rate (10,000 m3). The results indicate that groundwater levels for each case are maintained for 25~42 days and optimal injection rate is 50 m3/day for Case 3 resulted in groundwater level rise less than 1 m below surface. The results also show that influential area of groundwater level rise due to injection was estimated at 113.5 m and groundwater storage and elapsed time were respectively increased by 6 times and 4 times after installation of low permeable barrier. The proposed assessment method can be contributed to sustainable agricultural water supply and stable water security for drought adaptation.