• Title/Summary/Keyword: 자기-감시

Search Result 109, Processing Time 0.025 seconds

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

The Findings and Significances of Brain SPECT in Acute Mealses Encephalitis (급성 홍역 뇌증 환아들의 뇌 SPECT 소견과 유용성)

  • Kim, Jung Chul;Choung, Ju Mi;Eun, So Hee;Lee, Dae-Yeol;Kim, Jung Soo
    • Clinical and Experimental Pediatrics
    • /
    • v.45 no.11
    • /
    • pp.1373-1380
    • /
    • 2002
  • Purpose : Acute measles encephalitis(ME) is characterized by an abrupt onset of fever and obtundation, frequently accompanied by seizures and multifocal neurological signs. The aim of this study was to clarify the clinical manifestation, progression and the brain SPECT patterns in patients with acute ME. Methods : This study included 11 children with acute ME admitted to Chonbuk National University Hospital. Ten patients received a first dose of measles vaccine, one patient did not receive a first dose, and no patients received a second dose. ME was diagnosed based on characteristic clinical pictures, measles antibodies by ELISA and abnormal CSF findings. Brain MRI and brain SPECT were performed in 11 patients with acute ME. Results : There were four males and seven females whose ages at onset ranged between 18 months and 14 years(mean : 10.5 years). The main clinical neurologic pictures were loss of consciousness( 10) and seizure(five). The titer of IgG and IgM antimeasles antibodies in serum were positive in 10 patients. In CSF, nine patients had IgG antibodies and one patient had IgM antibodies. The concentration of protein(mean : $124{\pm}60mg/dL$) and WBC counts(mean : $158{\pm}157/{\mu}L$) in CSF were elevated in all patients. In electroencephalographic examination, nine patients showed increased slow waves. Seven of 11 patients(63.6%) revealed high signal intensity on the brain MRI. In contrast, all patients showed hypoperfusion in brain SPECT examination. According to brain SPECT, the perfusion deficits were frequently observed in the frontal lobe(nine), temporal (nine), parietal(eight) and thalamus(eight). Conclusion : Brain SPECT is more sensitive than MRI for the evaluation of brain damage in early stages of acute ME.

Improvement of Fetal Heart Rate Extraction from Doppler Ultrasound Signal (도플러 초음파 신호에서의 태아 심박 검출 개선)

  • Kwon, Ja Young;Lee, Yu Bin;Cho, Ju Hyun;Lee, Yoo Jin;Choi, Young Deuk;Nam, Ki Chang
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.328-334
    • /
    • 2012
  • Continuous fetal heart beat monitoring has assisted clinicians in assuring fetal well-being during antepartum and intrapartum. Fetal heart rate (FHR) is an important parameter of fetal health during pregnancy. The Doppler ultrasound is one of very useful methods that can non-invasively measure FHR. Although it has been commonly used in clinic, inaccurate heart rate reading has not been completely resolved.. The objective of this study is to improve detection algorithm of FHR from Doppler ultrasound signal with simple method. We modified autocorrelation function to enhance signal periodicity and adopted adaptive window size and shifted for data segment to be analysed. The proposed method was applied to real measured data, and it was verified that beat-to-beat FHR estimation result was comparable with the reference fetal ECG data. This simple and effective method is expected to be implemented in the embedded system.

A Study on the Career Mobility of Reporters at Local Newspapers (지역신문 기자들의 경력 이동 연구)

  • Lim, Yeon Hee
    • Korean journal of communication and information
    • /
    • v.78
    • /
    • pp.177-205
    • /
    • 2016
  • This study set out to investigate the reality of local press and changes to the occupational identity of reporters through the job mobility of reporters at local newspapers. The study examined what reasons the reporters had when they retired from one of three paper newspapers in Daejeon, where they moved to, and how their career mobility was. Some of them remained in the field of journalism including paper newspapers of the same kind and Internet newspapers, and others moved to various areas including politics, administration, academy, economy, and culture and art. The biggest number of them said they left their old paper newspapers because of poor wages and welfare benefits and absence of future visions. Their decision of leaving their old paper newspapers was also influenced by restructuring, restrictions to coverage and reporting, and great workload. Before the IMF foreign currency crisis in 1997, the press labor market was a typical internal labor market with the practitioners joining a newspaper in open recruitment and climbing up the promotion ladder from a common reporter through Deputy Head and Head of a department to Director of a bureau. The emergence of new media and the financial difficulties of newspaper corporations were currently making the internal labor market worse. Reporters made active use of social capital such as regionalism, alumni ties, and news beats rather than changing jobs by increasing their professionalism through self-development, thus causing side effects including the weakened supervision and criticism functions of local newspapers and damaging their occupational identity as reporters.

  • PDF

A Study on the Problems in the Use of CCTV by the Police and Some Proposals (경찰CCTV 운용상의 문제점과 개선방안)

  • Lee, Sang-Won;Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.215-242
    • /
    • 2005
  • As CCTV can be an effective tool to prevent or suppress crime at low cost, they have been widesoread in developed countries. In spite of their effectiveness, they infringe some constitutional rights such as the right to privacy, the right of likeness and the right to control over personal information. The police and ward offices install CCTV in public areas to prevent crimes without a legal basis or standard. When information obtained in such a way is used as investigation data for the police or as an evidence in a court, it can cause serious trouble. To solve this problem, legal restriction on the installation of CCTV as should be clearer. Since current laws on public agencies' protection of personal information are too general, they are not effective enough to protect personal information. Therefore, Personal Information Protection Organic Act should be enacted to make a legal basis for protecting comprehensive personal information. It should be obvious who installs CCTVs, who pay for the cost and how they are managed. Before installation, the police and ward offices should obtain residents' consent through a public hearing or voting (on the range and purpose of installation), or conduct an impact assessment. During installation, CCTVs should be limited to prevent or suppress crimes, keep public order and void dangers. In case of making a sign of installation, it must specify its rights. After installation(operation/management phase), they should abide by principles of information protection and try not to infringe constitutional right. In the cognitive aspect, the police should constitutional rights must be secured although it is important to carry out their missions. The police should serve citizens and change to the police of communities. Citizens should understand that constitutional right can be infringed if public order is not maintained. When citizens cooperate with the police, they fear of crimes will decrease.

  • PDF

Detection of Forest Ecosystem Disturbance Using Satellite Images and ISODATA (위성영상과 자기조직화 분류기법을 이용한 산림생태계교란 탐지: 우박 피해지와 매미나방 피해지의 사례연구)

  • Kim, Daesun;Kim, Eun-Sook;Lim, Jong-Hwan;Lee, Yangwon
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_1
    • /
    • pp.835-846
    • /
    • 2020
  • Recent severe climate changes and extreme weather events have caused the uncommon types of forest ecosystem disturbances such as hails and gypsy moths. This paper describes the analysis of the forest ecosystem disturbances using ISODATA (Iterative Self-organizing Data Analysis Technique Algorithm) with the RapidEye and Sentinel-2 images, regarding the cases of the hail damages in Hwasun in 2017 and the gypsy moth damages in the Chiak Mountain in 2020. In the case of hail damages, the comparison of the June image of this study and the July field survey of the previous study showed that the damage severity increased from June to July as the drought overlapped after the trees were injured by the hails. In the case of gypsy moths, significant leaf damages were found from the image of June, and the damages were mainly distributed at the low-altitude slope near Wonju City. We made sure that satellite remote sensing is a very effective method to detect various and unusual forest ecosystem disturbances caused by climate change. Also, it is expected that the Korean Medium Satellite for Agriculture and Forestry scheduled to launch in 2024 can be actively utilized to monitor such forest ecosystem disturbances.

Self-disclosure and Privacy in the Age of Web 2.0 A Case Study (웹 2.0 시대의 프라이버시 청년 UCC 이용자들의 인식과 실천을 중심으로)

  • Lee, Dong-Hoo
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.556-589
    • /
    • 2009
  • With the advent of the so-called Web 2.0 age, the interconnections of various contents on the web, as well as the user-participatory services from blogs, web-based communities, picture sharing sites, and social networking sites, to the sites for collective knowledge productions, have been further vitalized. As the User Generated Contents(UGCs) are flourishing on the web, they have channeled users' desires for self-expression and social acknowledgement, and yet have created the new kinds of invasion of privacy. This study attempts to look at how the networked individuals' everyday perceptions of privacy have been reconstructed in the age of Web 2.0. By investigating how users have used the UGCs for their sociality on the web and how they have set the boundaries of the private and the public in these public or semi-public disclosures of self-expressions, it has traced the changing perceptions of privacy in everyday communication practices. For this study, it has interviewed Korean youngsters in their 10s and 20s who have grown up with the Internet and have received self-expressions and social communication on the web as everyday activities. Based on their interviews, it inquires into the concurrent notion of privacy and discuss its cultural implications.

  • PDF

Exploration on Risk and Protective Factors of Adolescent Runaway (청소년 가출의 위험요인과 보호요인 탐색)

  • Sang-chul Han
    • Korean Journal of Culture and Social Issue
    • /
    • v.14 no.1_spc
    • /
    • pp.273-298
    • /
    • 2008
  • The purpose of this study is to explore a risk and a protective factors of adolescent runaway based on the previous researches. Runaway of adolescents is increasing, and it is longer and more habit gradually than past. The prevailance methods of runaway is no longer effects on the decrease of adolescent runaway. Now there is to accept adolescent runaway, and has to support the difficult life conditions and the emotional distress of adolescent post-runaway. This means that must be identify and treatment the protective factors having an buffering effect as well as the risk factors influencing on runaway. Although the worse factors related family are the highest risk factors of runaway, others factors including negative peer relation, a academic stress also an have significant influence on runaway. And the protective factors mediating the negative influence of risk factors are an monitoring and controlling of parent as authoritative rearing attitude, a social support, a positive coping strategies, a self-esteem, and a conventional peer group. Protective factors prevent from runaway behavior, as well as improve a resilience of adolescents in the poor environment. The tasks of follow study are to investigate empirically the mediating effects of the protective factors on the problem behavior of post-runaway and resilience of runaway adolescents based on the systematic research design.

  • PDF

The Design and Application of Vibrator Type(AM) Combination Apparatus for Improving Police Equipment for Fugitive Prevention (도주방지용 경찰장구의 기능개선을 위한 진동자 방식(AM) 결속장치 설계 및 응용)

  • Choi, Ki-Nam;Lee, Seon-Jeh
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.13-24
    • /
    • 2011
  • Policemen judge the situations rationally and use their equipment such as handcuffs and rope within the purview, finding them needed to arrest criminals in the act who commit crimes which conforms to death penalty, life imprisonment or long imprisonment for over 3 years in accordance with Clause 10-2, Article 1 of the Police Mandate Law and prevent fleeing from them, defend their and others' lives and bodies, or if there are probable causes to be recognized that using equipment is necessary to restrain the interference with government officials in the execution of their duties. However, as the cases which the criminals run away in handcuffs or with both hands tied occur, it results in the waste of police force, distrust and enormous trouble in the pursuit of their duties. Therefore, if the way to perceive fleeing of criminals who have already worn the police equipment by some simple assistive devices without developing other new equipment, it will be very effective for police duties. This study is about the combination apparatus for fugitive prevention attached to the existing handcuffs and rope whose alert sounds let the staffs working inside the office perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. The combination apparatus for fugitive prevention which the study introduces contains the connecting parts which connect a flexible tube(cognition tags inside of the tube) of connector equipped with the police equipment with the ends of the tube and the part where these two meet and which connect them inside of the tube. The connecting parts are easy to be attached to the police equipment such as handcuffs and rope, but hard to be dismantled by the people tied up with the equipment. It enables watchers to perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. Plus, if it is combined together with the portable receiver, it can be installed on the patrol cars and easily adopted to supervise illegally accessing of evidences. It is also avaliable to be adjunctively utilized for the handcuffs provided and the cost is so reasonable. Owing to its snap-on way to the cuffs, it can clear up any invasion of privacy and it can not be used as a self-injury tool because of the soft tube. Using AM Tag minimizes the lack of malfunction.