• Title/Summary/Keyword: 안전한 활용

Search Result 8,302, Processing Time 0.038 seconds

Preliminary Researches for the Deployment of New AIS-ASM Services (AIS-ASM 기반 신규 서비스 도입을 위한 선행 연구)

  • Kim, Geonung;Park, Gyei-Kark
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1515-1521
    • /
    • 2013
  • AIS is a core service in the maritime safety domain. AIS Message type #6 and #8(for binary date) can be used for carrying any kind of MSI(Maritime Safety Information). The MSC(Maritime Safety Committee) approved SN/Circ. 289 on Guidance on the use of AIS Application-Specific Messages in 2010. The MSI that carried by AIS-ASM can support to reduce the maritime accidents. Since a new AIS-ASM service places an additional load on the VDL(VHF Data Link), there should be a deployment process for new AIS-ASM services. In this paper we analyze the AIS-ASM services and survey the extended functions and systems for each AIS-ASM service. We also present the survey of the statistical analysis of local AIS messages. and suggest preliminary research topics for the deployment of new AIS-ASM services. VDL monitoring system, system for detection and removal of malfunctioning AIS equipments, and value analysis process of the MSI services are required.

Proposal and Implementation of Security Keypad with Dual Touch (이중 터치를 이용한 보안 키패드 제안 및 구현)

  • Song, Jinseok;Jung, Myung-Woo;Choi, Jung-In;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.73-80
    • /
    • 2018
  • Due to the popularity of smartphones and the simplification of financial services, the number of mobile financial services is increasing. However, the security keypads developed for existing financial services are susceptible to probability analysis attacks and have security vulnerabilities. In this paper, we propose and implement a security keypad based on dual touch. Prior to the proposal, we examined the existing types of security keypads used in the mobile banking and mobile payment systems of Korean mobile financial businesses and analyzed the vulnerabilities. In addition, we compared the security of the proposed dual touch keypad as well as existing keypads using the authentication framework and the existing keypad attack types (Brute Force Attack, Smudge Attack, Key Logging Attack, and Shoulder Surfing Attack, Joseph Bonneau). Based on the results, we can confirm that the proposed security keypad with dual touch presented in this paper shows a high level of security. The security keypad with dual touch can provide more secure financial services, and it can be applied to other mobile services to enhance their security.

Prediction of the Blade Flapping Angle for Korean Utility Helicopter by Applying Indirect Method (간접기법을 이용한 한국형 기동헬기 블레이드 플래핑 각도 예측)

  • Kim, Young-Jin;Lee, Sang-Gi;Lee, Seung-Jae;Chang, In-ki;Shim, Dai-Sung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.10
    • /
    • pp.888-895
    • /
    • 2015
  • This paper shows an approximate equation which calculates a flapping angle of blade for verification of KUH safety area. The flapping behavior of blade must be reviewed in an aspect of safety because of a collision possibility with airframe. However, it is difficult to measure an exact flapping angle during flight. A prediction equation of a coning angle is derived from aeromechanics and that of a dynamic flapping angle is derived from analysis results in development phase, respectively. Following, the equations are verified by comparison the flapping angle through an aircraft simulation test to a calculation. Finally, the safety area, which was established in development phase, is verified by calculating a flapping angle during the flight which is required by the terms of safety based on AC29 and FAR29.

Development of ePosition Application Technology Based on ENC Data (전자해도 데이터 기반 ePosition 연계기술개발)

  • Seo, Ki-Yeol;Kim, Kyung-Hun;Lee, Sang-Zee;Oh, Se-Woong;Park, Jong-Min;Suh, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1305-1310
    • /
    • 2007
  • ePosition is a technology that can provide the spacial position of the earth to the information of ePosition ID through the Internet. It is serving the information of land location based on the Internet using the ePosition technology now, but it needs the service technique which can supply the marine data and the information of maritime position. Moreover, to support the information service of marine position, it needs the ENC linked technique based on S-57 that is an IHO transfer standard for digital hydrographic data. In this paper, therefore, it develops a linkage method for applying and utilizing the ePosition technology to ENC data, and supplements the base technology for applying it to marine related fields. As study method, firstly, this paper analyses ENC data model and structure, and converses for processing ENC file to ePosition data. Lastly, it derives the interconnection method with ePosition database and shows the ePosition service application based on the linked data and its validity.

A Study on the Improvement of Legal System for Drought Disaster of Rural Region (농촌지역의 가뭄재해 법제 개선방안에 관한 연구)

  • Lee, Young Kune;Park, Mi Ri
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.129-129
    • /
    • 2016
  • 기후변화의 영향으로 인한 자연재해의 대규모화에 따라 가뭄재해가 농촌지역에 중대한 피해를 끼칠 수 있는 여지가 확대되고 있다. 그러나 4대강 살리기 사업으로 인하여 대하천의 정비가 강화되었지만 농촌지역 주변의 중소하천은 여전히 기후변화에 취약한 현실이다. 농촌지역의 가뭄재해에 대하여 국가 및 지방자치단체, 공공기관이 효과적으로 대처하기 위해서는 농촌의 특성을 충분히 고려한 대응책을 마련하는 것이 중요하며, 이에 본 연구에서는 "자연재해대책법 시행규칙" 및 "재난 및 안전관리 기본법 시행령", 그리고 "농어업재해대책법 시행규칙"에 있어서 가뭄관련 조항의 개정을 제안하였다. "자연재해대책법" 제2장(자연재해의 예방 및 대비)에서는 풍수해(제2절), 설해(제4절) 에 이어 가뭄에 대한 예방 및 대비를 규정(제5절 29조-33조)하고 있다. 제29조는 가뭄방재를 위하여 필요한 조사 및 연구를 수행하여야 함을 규정하고 있는데, 여기서 '필요한' 조사 및 연구는 시행령 혹은 시행규칙 등을 통해 명확히 할 필요가 있으며, 제30조는 가뭄재해 극복을 위해 제한 급수 및 제한 발전 등의 조치를 취할 수 있다고 규정하고 있으나, 조치를 취함으로써 발생하는 손해 배상 규정의 삽입이 필요하다. "재난 및 안전관리 기본법" 제8조(다른 법률과의 관계 등) 2호에서 제3조1호 가목의 규정에 해당하는 재난(가뭄 포함)의 예방 복구 등에 관해서는 '자연재해대책법'이 정한 바에 따르도록 규정하고 있기는 하지만, 자연재해로 인한 재난에 대해서는 소극적 규정으로 판단된다. 그리고, 제4장(재난의 예방)에 있어서 재난은 제3조1호의 가목(자연현상으로 발생하는 재해), 나목(사회적 재해), 다목(국가기반체계와 관련된 재해) 각각의 경우에 따른 예방대책의 수립이 필요하다. 각 조항의 개정은 농촌지역 가뭄재해에 대한 정책활용을 염두에 두고 개정안을 제시하지만, 법령 자체의 목적 및 타법과의 정합성 등 대한민국 법체제의 통일성 및 안정성을 최대한 반영하였다. 해당 조항의 개정으로 농촌 및 농업지역의 특성을 반영한 다양한 가뭄대응 정책의 활용을 도모하고 가뭄재해로부터 안전한 영농환경이 구축될 수 있을 것이 기대된다.

  • PDF

Worker Symptom-based Chemical Substance Estimation System Design Using Knowledge Base (지식베이스를 이용한 작업자 증상 기반 화학물질 추정 시스템 설계)

  • Ju, Yongtaek;Lee, Donghoon;Shin, Eunji;Yoo, Sangwoo;Shin, Dongil
    • Journal of the Korean Institute of Gas
    • /
    • v.25 no.3
    • /
    • pp.9-15
    • /
    • 2021
  • In this paper, a study on the construction of a knowledge base based on natural language processing and the design of a chemical substance estimation system for the development of a knowledge service for a real-time sensor information fusion detection system and symptoms of contact with chemical substances in industrial sites. The information on 499 chemical substances contact symptoms from the Wireless Information System for Emergency Responders(WISER) program provided by the National Institutes of Health(NIH) in the United States was used as a reference. AllegroGraph 7.0.1 was used, input triples are Cas No., Synonyms, Symptom, SMILES, InChl, and Formula. As a result of establishing the knowledge base, it was confirmed that 39 symptoms based on ammonia (CAS No: 7664-41-7) were the same as those of the WISER program. Through this, a method of establishing was proposed knowledge base for the symptom extraction process of the chemical substance estimation system.

Analysis of Homomorphic Authenticated Encryption (Encrypt with Authenticate Construction) (결합 준동형 인증 암호의 안전성 분석)

  • Kim, Jinsu
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.33-44
    • /
    • 2021
  • Data outsourcing utilizing the Cloud faces a problem of the third-party exposure, modulation, and reliability for the provided computational delegation results. In order to solve those problematic security issues, homomorphic encryption(HE) which executes calculation and analysis on encrypted data becomes popular. By extension, a new type of HE with a authentication functionality, homomorphic authenticated encryption(HAE) is suggested. However, a research on the HAE is on the initial stage. Furthermore, based on a message authenticated scheme with HE, the method and analysis to design is still absent. This paper aims to analyze an HAE, with a generic combination of a message authenticated scheme and a HE, known as "Encrypt with Authentication". Following a series of analysis, we show that by adopting a unforgeable message authenticated scheme, the generically constructed HAE demonstrated an unforgeability as well. Though, a strong unforgeability is not the case. This paper concludes that although indistinguishable HE can be applied to design the HAE, a security issue on the possibility of indistinguishability is still not satisfied.

A Development of Traffic Safety Education Application Using Mixed Reality (혼합현실을 활용한 교통 안전교육 애플리케이션 개발)

  • Kim, Kang-Ho;Rhee, Dae-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1602-1608
    • /
    • 2019
  • In this study, we developed a "Zetton Children's Traffic Safety Education" application using mixed reality to help children experience a variety of traffic situations indirectly and to help them defend themselves from accidents. We analyze the types of high mortality child traffic accidents to set learning goal. And we developed the experience-oriented contents that players could acquire signal systems and traffic information naturally and funny in the course of playing scenarios according to designed various traffic situations. In order to verify the educational effectiveness of the developed application, children were given traffic safety education through after-school education activities. The result shows that the frequency of right answers to questions related to traffic safety awareness and learning objectives is increased.

A Secure License Sharing Scheme for Domain DRM System Against Replay Attack (재생 공격에 안전한 Domain DRM 시스템을 위한 License 공유 방식)

  • Choi, Dong-Hyun;Lee, Yun-Ho;Kang, Ho-Gab;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.97-101
    • /
    • 2007
  • The purpose of DRM is to protect the copyrights of content providers and to enable only designated users to access digital contents. From the consumers' point of view, they have a tendency to go against complex and confusing limitations. Moreover, consumers' rights of use of the content obtained legally were frequently harmed by arbitrary limitations. The concept of Authorized Domain (AD) was presented to remove such problems. However, the previous work on authorized domain has two problems. The first is that it requires a rather expensive revocation mechanism for withdraw process. The second is that the modules still can play contents which are previously obtained even though they are currently out of the authorized domain. On the contrary, our scheme presents the content from being played by modules which are out of the domain for better security. Furthermore our scheme does not need to maintain a revocation list and prevent replay attack.

Dataset Construction and Model Learning for Manufacturing Worker Safety Management (제조업 근로자 안전관리를 위한 데이터셋 구축과 모델 학습)

  • Lee, Taejun;Kim, Yunjeong;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.7
    • /
    • pp.890-895
    • /
    • 2021
  • Recently, the "Act of Serious Disasters, etc" was enacted and institutional and social interest in safety accidents is increasing. In this paper, we analyze statistical data published by government agency on safety accidents that occur in manufacturing sites, and compare various object detection models based on deep learning to build a model to determine dangerous situations to reduce the occurrence of safety accidents. The data-set was directly constructed by collecting images from CCTVs at the manufacturing site, and the YOLO-v4, SSD, CenterNet models were used as training data and evaluation data for learning. As a result, the YOLO-v4 model obtained a value of 81% of mAP. It is meaningful to select a class in an industrial field and directly build a dataset to learn a model, and it is thought that it can be used as an initial research data for a system that determines a risk situation and infers it.