• Title/Summary/Keyword: AIS management

Search Result 134, Processing Time 0.022 seconds

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.

Design and Construction of Information System on consolidation Financial statements According to K-IFRS - Focusing on local financial institution - (국제회계기준에 따른 연결재무제표시스템 설계 및 구축 방안 - 국내 금융기관을 중심으로 -)

  • Park, Sung-Jong;Han, Kyung-Il
    • Journal of Digital Convergence
    • /
    • v.9 no.2
    • /
    • pp.33-40
    • /
    • 2011
  • It is very difficult to predict what effects the introduction of IFRS(International and Financial Reporting Standars) has on the existing system. Only the cautious and careful adoption of new system will minimize the confusion. The purpose of this paper is to propose appropriate design and construction of IS on financial statement according to the introduction of IFRS(International Financial Reporting Standard) in order to minimize the confusion. In order to meet that purpose, suggestions on five areas in consolidation financial statement are proposed. Those five aspects are as follows: Area of SPE Consolidation, Area of internal transaction setoff, Area of unrealized gain or loss setoff, Area of eliminate the investment account against the stockholder's equity, Making Consolidation footnote and Consolidation CoA as other area.

Analysis on the Navigational Dangerous Elements in Southwestern Coastal Area of Korea (서남해 연안해역의 항행 위해요소에 관한 분석)

  • Baek, Won-Sun;Gim, Ok-Sok;Jeong, Jae-Yong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.14 no.3
    • /
    • pp.219-225
    • /
    • 2008
  • Since July 2006, marine traffic safety management system have been enforced to support the vessels transiting across the coastal area and the vessels coming in and out of ports in southwestern coastal area where heavy traffic density and marine casualties occurred frequently. The marine traffic volume for the marine traffic environmental assessment was measured by the information from RADAR and AIS system in the area. The distributions of marine casualties were analyzed in the main routes and traffic separation schemes during the last five years and the navigational dangerous elements were investigated with the influence of natural environment, the distribution of fisheries and survey questionnaire. Marine accidents of merchant ships have a tendency to decrease gradually but in case of fishing boats, the rate of marine accidents have a contrary results in this area during the last five years. The dangerous elements on navigation appeared to be the dense force from June to August, fisheries activities and the vessels which not follow the compulsory watch on VHF-band radio communication equipments.

  • PDF

Examining the Generative Artificial Intelligence Landscape: Current Status and Policy Strategies

  • Hyoung-Goo Kang;Ahram Moon;Seongmin Jeon
    • Asia pacific journal of information systems
    • /
    • v.34 no.1
    • /
    • pp.150-190
    • /
    • 2024
  • This article proposes a framework to elucidate the structural dynamics of the generative AI ecosystem. It also outlines the practical application of this proposed framework through illustrative policies, with a specific emphasis on the development of the Korean generative AI ecosystem and its implications of platform strategies at AI platform-squared. We propose a comprehensive classification scheme within generative AI ecosystems, including app builders, technology partners, app stores, foundational AI models operating as operating systems, cloud services, and chip manufacturers. The market competitiveness for both app builders and technology partners will be highly contingent on their ability to effectively navigate the customer decision journey (CDJ) while offering localized services that fill the gaps left by foundational models. The strategically important platform of platforms in the generative AI ecosystem (i.e., AI platform-squared) is constituted by app stores, foundational AIs as operating systems, and cloud services. A few companies, primarily in the U.S. and China, are projected to dominate this AI platform squared, and consequently, they are likely to become the primary targets of non-market strategies by diverse governments and communities. Korea still has chances in AI platform-squared, but the window of opportunities is narrowing. A cautious approach is necessary when considering potential regulations for domestic large AI models and platforms. Hastily importing foreign regulatory frameworks and non-market strategies, such as those from Europe, could overlook the essential hierarchical structure that our framework underscores. Our study suggests a clear strategic pathway for Korea to emerge as a generative AI powerhouse. As one of the few countries boasting significant companies within the foundational AI models (which need to collaborate with each other) and chip manufacturing sectors, it is vital for Korea to leverage its unique position and strategically penetrate the platform-squared segment-app stores, operating systems, and cloud services. Given the potential network effects and winner-takes-all dynamics in AI platform-squared, this endeavor is of immediate urgency. To facilitate this transition, it is recommended that the government implement promotional policies that strategically nurture these AI platform-squared, rather than restrict them through regulations and stakeholder pressures.

Identifying Research Issues for ICT-Enabled Bright Society Initiative: A Delphi Study of Korean Academics (Bright ICT 지향을 위한 경영정보학 연구 동향: 연구자 그룹을 통한 델파이 분석)

  • Hyunjeong Kang
    • Information Systems Review
    • /
    • v.18 no.4
    • /
    • pp.107-119
    • /
    • 2016
  • The arrival of the Smart Age has allowed the mature development of information and communication technology (ICT), which increasingly affects our societies and daily lives. Aligned with the contextual background, the Association of Information Systems, which comprised MIS professors, selected ICT-enabled Bright Society Initiative as a future agenda in December 2014. This study employs the Delphi method, which involves the three steps of brainstorming, clustering, and ranking, to deliver the main purposes of the research: finding the agenda items to examine the Bright ICT Initiative, ranking these items strategically, and discussing the subprograms. The research findings discover 11 major issues, and the importance of each issue is ranked by analyzing the survey. Furthermore, how the levels of the importance of each issue that affects individuals, corporations, and societies/nations differ according to age and gender is studied.

Characteristics of Ship's Traffic Route in Yeosu·Gwangyang Port (여수·광양항 출입항로 통항 특성)

  • KIM, Dae-Jin
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.2
    • /
    • pp.539-549
    • /
    • 2016
  • This study analyzed ship's passing characteristics in relation with incoming and outgoing routes in Yeosu Gwangyang Port, and examined the risk factors and measures for safety management of marine traffic. The number of passing ships in Yeosu Gwangyang Port was about 60,000 ships annually based on 2014, and the tonnage rose 73% from 447,000 thousand tons in 2005 to 770,000 thousand tons in 2014. Actually, the number of large passing ships was revealed to enormously increase. As a result of marine traffic survey in Yeosu Gwangyang Port for three days in August 2015, daily average passing ships were 408 ships, and 77% of the total passing ships passed between 04:00 and 20:00. The chemical ships and general cargo ships took up the most at 58% of the total incoming and outgoing ships, followed by other work ships at 21%, tankers at 8%, fishing vessels at 7.5% and container ships at 5.5%. Concerning the size of passing ships, ships less than 1,000 tons accounted for 58.6% of the total passing ships. Ships of 1,000-5,000 tons were 20.1%, and those of 5,000-10,000 tons were 6.8%, and more than 10,000 tons were 14.4%. Especially, ships of 500 tons and less using mainly coastal passing routes took up 49% of the total passing ships. As for ship's passage ratio by route, Nakpo sea area where many routes meet accounted for 27.2%, specified area 49%, costal route 8%, specified area's incoming and outgoing sea area around Daedo 4.5%, and Dolsan coastal ara and Kumhodo sea area 8.5%. The number of ships standing by for anchoring in the six designated anchorages was 230 for three days. The standby rate for anchoring was 25% based on the specified area passing ships. In Nakpo sea area, where many routes meet, parallel passing and cross passing between ships occurred the most frequently. In the specified area, many cases, in which incoming and outgoing cargo ships at the starting and ending parts and incoming and outgoing work ships and fishing vessels at the coastal routes cross, took place. Consequently, the following measures are urgently needed: active passing management in the Nakpo sea area, where passing routes are complex, specified areas and costal traffic routes, the elimination of rocks in the route close to Myodo, an effort to improve routes including shallow depth area dredging, and rational safety management for small work ships frequently incoming and outgoing the passing routes of large ships, and fishing vessels operated in the sea areas around those passing routes.

Evaluation of the Utilization Potential of High-Resolution Optical Satellite Images in Port Ship Management: A Case Study on Berth Utilization in Busan New Port (고해상도 광학 위성영상의 항만선박관리 활용 가능성 평가: 부산 신항의 선석 활용을 대상으로)

  • Hyunsoo Kim ;Soyeong Jang ;Tae-Ho Kim
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.5_4
    • /
    • pp.1173-1183
    • /
    • 2023
  • Over the past 20 years, Korea's overall import and export cargo volume has increased at an average annual rate of approximately 5.3%. About 99% of the cargo is still being transported by sea. Due to recent increases in maritime cargo volume, congestion in maritime logistics has become challenging due to factors such as the COVID-19 pandemic and conflicts. Continuous monitoring of ports has become crucial. Various ground observation systems and Automatic Identification System (AIS) data have been utilized for monitoring ports and conducting numerous preliminary studies for the efficient operation of container terminals and cargo volume prediction. However, small and developing countries' ports face difficulties in monitoring due to environmental issues and aging infrastructure compared to large ports. Recently, with the increasing utility of artificial satellites, preliminary studies have been conducted using satellite imagery for continuous maritime cargo data collection and establishing ocean monitoring systems in vast and hard-to-reach areas. This study aims to visually detect ships docked at berths in the Busan New Port using high-resolution satellite imagery and quantitatively evaluate berth utilization rates. By utilizing high-resolution satellite imagery from Compact Advanced Satellite 500-1 (CAS500-1), Korea Multi-Purpose satellite-3 (KOMPSAT-3), PlanetScope, and Sentinel-2A, ships docked within the port berths were visually detected. The berth utilization rate was calculated using the total number of ships that could be docked at the berths. The results showed variations in berth utilization rates on June 2, 2022, with values of 0.67, 0.7, and 0.59, indicating fluctuations based on the time of satellite image capture. On June 3, 2022, the value remained at 0.7, signifying a consistent berth utilization rate despite changes in ship types. A higher berth utilization rate indicates active operations at the berth. This information can assist in basic planning for new ship operation schedules, as congested berths can lead to longer waiting times for ships in anchorages, potentially resulting in increased freight rates. The duration of operations at berths can vary from several hours to several days. The results of calculating changes in ships at berths based on differences in satellite image capture times, even with a time difference of 4 minutes and 49 seconds, demonstrated variations in ship presence. With short observation intervals and the utilization of high-resolution satellite imagery, continuous monitoring within ports can be achieved. Additionally, utilizing satellite imagery to monitor changes in ships at berths in minute increments could prove useful for small and developing country ports where harbor management is not well-established, offering valuable insights and solutions.

Comparative analysis of craniofacial asymmetry in subjects with and without symptoms of temporomandibular joint disorders: a cross-sectional study

  • Anita Pradhan;Preeti Bhattacharya;Shivani Singh;Anil Kumar Chandna;Ankur Gupta;Ravi Bhandari
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.49 no.3
    • /
    • pp.125-134
    • /
    • 2023
  • Objectives: The aim of the study was to quantify and compare craniofacial asymmetry in subjects with and without symptoms of temporomandibular joint disorders (TMDs). Materials and Methods: A total of 126 adult subjects were categorized into two groups (63 with a TMDs and 63 without a TMDs), based on detection of symptoms using the Temporomandibular Joint Disorder-Diagnostic Index (TMD-DI) questionnaire. Posteroanterior cephalograms of each subject were traced manually and 17 linear and angular measurements were analyzed. Craniofacial asymmetry was quantified by calculating the asymmetry index (AI) of bilateral parameters for both groups. Results: Intra- and intergroup comparisons were analyzed using independent t-test and Mann-Whitney U test, respectively, with a P<0.05 considered statistically significant. An AI for each linear and angular bilateral parameter was calculated; higher asymmetry was found in TMD-positive patients compared with TMD-negative patients. An intergroup comparison of AIs found highly significant differences for the parameters of antegonial notch to horizontal plane distance, jugular point to horizontal plane distance, antegonial notch to menton distance, antegonial notch to vertical plane distance, condylion to vertical plane distance, and angle formed by vertical plane, O point and antegonial notch. Significant deviation of the menton distance from the facial midline was also evident. Conclusion: Greater facial asymmetry was seen in the TMD-positive group compared with the TMD-negative group. The mandibular region was characterized by asymmetries of greater magnitude compared with the maxilla. Patients with facial asymmetry often require management of temporomandibular joint (TMJ) pathology to achieve a stable, functional, and esthetic result. Ignoring the TMJ during treatment or failing to provide proper management of the TMJ and performing only orthognathic surgery may result in worsening of TMJ-associated symptoms (jaw dysfunction and pain) and re-occurrence of asymmetry and malocclusion. Assessments of facial asymmetry should take into account TMJ disorders to improve diagnostic accuracy and treatment outcomes.

The Clinical Usefulness of Halo Sign on CT Image of Trauma Patients (외상환자의 전산화 단층촬영소견에서 나타난 달무리 소견의 임상적 유용성)

  • Lee, Seung Yong;Sohn, You Dong;Ahn, Hee Cheol;Kang, Gu Hyun;Choi, Jung Tae;Ahn, Moo Eob;Seo, Jeong Youl
    • Journal of Trauma and Injury
    • /
    • v.20 no.2
    • /
    • pp.144-148
    • /
    • 2007
  • Purpose: The management of hemorrhagic shock is critical for trauma patients. To assess hemorrhagic shock, the clinician commonly uses a change in positional blood pressure, the shock index, an estimate of the diameter of inferior vena cava based on sonography, and an evaluation of hypoperfusion complex shown on a CT scan. To add the finding for the hypoperfusion complex, the 'halo sign' was introduced recently. To our knowledge, this 'halo sign' has not been evaluated for its clinical usefulness, so we designed this study to evaluate its usefulness and to find the useful CT signs for hypoperfusion complex. Methods: The study was done from January 2007 to May 2007. All medical records and CT images of 124 patients with trauma were reviewed, of which 103 patients were included. Exclusion criteria was as follows: 1) age < 15 year old and 2) head trauma score of AIS ${\geq}$ 5. Results: The value of kappa, to assess the inter-observer agreement, was 0.51 (p < 0.001). The variables of the halo-sign-positive group were statistically different from those of the halo-sign-negative group. The rate of transfusion for the halo-sign-positive group was about 10 times higher than that of the halo-sign-negative group and the rate of mortality was about 6 times higher. Conclusion: In the setting of trauma, early abdominal CT can show diffuse abnormalities due to hypoperfusion complex. Recognition of these signs is important in order to prevent an unwanted outcome in hemorrhagic shock. We conclude that the halo sign is a useful one for hypoperfusion complex and that it is useful for assessing the degree of hemorrhagic shock.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.