• Title/Summary/Keyword: Access site

Search Result 595, Processing Time 0.024 seconds

Assessment of Universal Design for Seoullo 7017 in Seoul, Korea - Using a New Seven Universal Design Principles -

  • Yoo, Jieun;Kim, Jin-Oh
    • Journal of recreation and landscape
    • /
    • v.12 no.4
    • /
    • pp.35-44
    • /
    • 2018
  • The purpose of this research is to evaluate Seoullo 7017 based on Universal Design (UD) principles and guidelines. To derive UD principles applicable to the site context, we used the 2017 Seoul Universal Design Guideline and assessment index provided by the Universal Design Research Center and established 11 evaluation criteria. With respect to research methods, a literature review and on-site field survey were applied, through which we derived UD principles and evaluation criteria to identify UD problems. The 11 evaluation criteria consist of pedestrian space, facilities, access, main entrance, parking lots, trails, restrooms, convenience facilities, information facilities, rest areas, and playgrounds, and these were associated with UD principles for evaluation. As a result, the main entrance had the highest UD score, while parking lots had the lowest in terms of equity, safety, simplicity, and accessibility. Restrooms received a lower UD score because of poor conditions of security and alert systems. Rest areas were found to be uncomfortable for disabled people. With respect to the internal trails, we found the lack of braille block and irregular placement of planting pots made blind people uncomfortable when walking. In terms of UD principles, flexibility received the highest score, followed by amenity, equity, simplicity, tolerance, accessibility, and safety. Flexibility received the highest score, owing to the provision of proper information about convenience facilities and trails, while safety received the lowest, based on poor access to parking lots, inadequate paving materials and colors, and a lack of 24-hour security systems. We hope this research contributes to improving the universal design, so that people are not discriminated against in the use of the park in terms of age, sex, or physical disability. We expect the study to help facilitate empirical studies to verify UD principles and provide improved quality of UD for Seoullo 7017.

A Study on the Development Site Security for Embedded Software (임베디드 소프트웨어 개발현장보안에 관한 연구)

  • Yeo, Sang-Soo;Kim, Tai-Hoon;Cho, Sung-Eon;Kouich, Sakurai
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.259-265
    • /
    • 2007
  • Systematic components for implementing ubiquitous computing, for example, electronic devices, electric home appliances, and controllers, etc, are consist of not only circuits but also softwares expected to do some special system-controlling functions, and these softwares used to be called like as embedded software. Because embedded software is a core component controlling systems, the codes or control flows should be protected from being opened to the public or modified. Embedded software security can be divided into 2 parts: first is the unauthorized access to development site and embedded software, second is the unauthorized disclosure or modification. And this research is related to the first aspect of them.This paper proposes some security check requirements related to embedded software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827. By applying this research, we expect to protect unauthorized modification of embedded software indirectly.

  • PDF

A Analysis for Calibration Site Selection of SAR Satellite (SAR 위성 검보정 사이트 선택을 위한 분석)

  • Keum, Jung-Hoon;Ra, Sung-Woong
    • Journal of Astronomy and Space Sciences
    • /
    • v.26 no.4
    • /
    • pp.659-666
    • /
    • 2009
  • CALVAL (Calibration & Validation) shall consider payloads characteristics because satellites have one and/or several payloads in order to perform their various missions. SAR satellite, one of various satellite, shall need to use special ground targets, which can reflect the radar signal to the satellite, because it can see objects with reflected radar signal. Therefore, the special ground targets, which are called generally reflector(corner reflector is the one of them) shall be installed and constructed on the ground path. The satellite must access the targets on that path. To accomplish successful calibration, the CALVAL site including corner reflectors will be surveyed and analyzed using various environment characteristics. In this paper, CALVAL site including point targets(corner reflector) for absolute radiometric calibration except one including distributed targets for relative radiometric calibration has been deeply considered.

Attacks and Defenses for Vulnerability of Cross Site Scripting (크로스 사이트 스크립팅(XSS) 취약점에 대한 공격과 방어)

  • Choi, Eun-Jung;Jung, Whi-Chan;Kim, Seung-Yeop
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.177-183
    • /
    • 2015
  • Cross Site Scripting enables hackers to steal other user's information (such as cookie, session etc.) or to do abnormal functions automatically using vulnerability of web application. This attack patterns of Cross Site Scripting(XSS) can be divided into two types. One is Reflect XSS which can be executed in one request for HTTP and its reply, and the other is Stored XSS which attacks those many victim users whoever access to the page which accepted the payload transmitted. To correspond to these XSS attacks, some measures have been suggested. They are data validation for user input, output validation during HTML encoding procedures, and removal of possible risk injection point to prevent from trying to insert malicious code into web application. In this paper, the methods and procedures for these two types are explained and a penetration testing is done. With these suggestions, the attack by XSS could be understood and prepared by its countermeasures.

Construction of web-based nutrition education contents and searching engine for usage of healthy menu of children

  • Hong, Soon-Myung;Lee, Tae-Kyong;Chung, Hea-Jung;Park, Hye-Kyung;Lee, Eun-Ju;Nam, Hye-Seon;Jung, Soon-Im;Cho, Jee-Ye;Lee, Jin-Hee;Kim, Gon;Kim, Min-Chan
    • Nutrition Research and Practice
    • /
    • v.2 no.2
    • /
    • pp.114-120
    • /
    • 2008
  • A diet habit, which is developed in childhood, lasts for a life time. In this sense, nutrition education and early exposure to healthy menus in childhood is important. Children these days have easy access to the internet. Thus, a web-based nutrition education program for children is an effective tool for nutrition education of children. This site provides the material of the nutrition education for children with characters which are personified nutrients. The 151 menus are stored in the site together with video script of the cooking process. The menus are classified by the criteria based on age, menu type and the ethnic origin of the menu. The site provides a search function. There are three kinds of search conditions which are key words, menu type and "between" expression of nutrients such as calorie and other nutrients. The site is developed with the operating system Windows 2003 Server, the web server ZEUS 5, development language JSP, and database management system Oracle 10 g.

A Study on Web Vulnerability Assessment and Prioritization of Measures by Vulnerabilities (웹 취약점 점검 및 취약점별 조치 우선 순위 산정에 관한 연구)

  • Seong, JongHyuk;Lee, HooKi;Ko, InJe;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.37-44
    • /
    • 2018
  • Today we live in a flood of web sites and access numerous websites through the Internet to obtain various information. However, unless the security of the Web site is secured, Web site security can not be secured from various malicious attacks. Hacking attacks, which exploit Web site security vulnerabilities for various reasons, such as financial and political purposes, are increasing. Various attack techniques such as SQL-injection, Cross-Site Scripting(XSS), and Drive-By-Download are being used, and the technology is also evolving. In order to defend against these various hacking attacks, it is necessary to remove the vulnerabilities from the development stage of the website, but it is not possible due to various problems such as time and cost. In order to compensate for this, it is important to identify vulnerabilities in Web sites through web vulnerability checking and take action. In this paper, we investigate web vulnerabilities and diagnostic techniques and try to understand the priorities of vulnerabilities in the development stage according to the actual status of each case through cases of actual web vulnerability diagnosis.

  • PDF

An Access Control Model for Privacy Protection using Purpose Classification (사용목적 분류를 통한 프라이버시 보호를 위한 접근제어 모델)

  • Na Seok-Hyun;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.39-52
    • /
    • 2006
  • Recently purpose is used by an crucial part to security management when collecting data about privacy. The W3C(World Wide Web Consortium) describes a standard spec to control personal data that is provided by data providers who visit the web site. But they don't say anymore about security management about personal data in transit after data collection. Recently several researches, such as Hippocratic Databases, Purpose Based Access Control and Hippocratic in Databases, are dealing with security management using purpose concept and access control mechanism after data collection a W3C's standard spec about data collection mechanism but they couldn't suggest an efficient mechanism for privacy protection about personal data because they couldn't represent purpose expression and management of purposes sufficiently. In this paper we suggest a mechanism to improve the purpose expression. And then we suggest an accesscontrol mechanism that is under least privilege principle using the purpose classification for privacy protection. We classify purpose into Along purpose structure, Inheritance purpose structure and Stream purpose structure. We suggest different mechanisms to deal with then We use the role hierarchy structure of RBAC(Role-Based Access Control) for flexibility about access control and suggest mechanisms that provide the least privilege for processing the task in case that is satisfying using several features of purpose to get least privilege of a task that is a nit of business process.

Development and Application of SITES (부지환경종합관리시스템 개발과 적용)

  • Park, Joo-Wan;Yoon, Jeong-Hyoun;Kim, Chank-Lak;Cho, Sung-Il
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.6 no.3
    • /
    • pp.205-215
    • /
    • 2008
  • SITES(Site Information and Total Environmental Data Management System) has been developed for the purpose of systematically managing site characteristics and environmental data produced during the pre-operational, operational, and post-closure phases of a radioactive waste disposal facility. SITES is an integration system, which consists of 4 modules, to be available for maintenance of site characteristics data, for safety assessment, and for site/environment monitoring; site environmental data management module(SECURE), integrated safety assessment module(SAINT), site/environment monitoring module(SUDAL) and geological information module for geological data management(SITES-GIS). Each module has its database with the functions of browsing, storing, and reporting data and information. Data from SECURE and SUDAL are interconnected to be utilized as inputs to SAINT. SAINT has the functions that multi-user can access simultaneously via client-server system, and the safety assessment results can be managed with its embedded Quality Assurance feature. Comparison between assessment results and environmental monitoring data can be made and visualized in SUDAL and SITES-GIS. Also, SUDAL is designed that the periodic monitoring data and information could be opened to the public via internet homepage. SITES has applied to the Wolsong low- and intermediate-level radioactive waste disposal center in Korea, and is expected to enhance the function of site/environment monitoring in other nuclear-related facilities and also in industrial facilities handling hazardous materials.

  • PDF

Harmful Image Detection Method Using Skin and Non-Skin Features (피부 특징과 비 피부 특징을 이용한 유해 이미지 탐지 방법)

  • Jun, Jae-Hyun;Jung, Min-Suk;Jang, Yong-Suk;Ahn, Cheol-Woong;Kim, Sung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.55-61
    • /
    • 2015
  • Today, IT technology provide convenience to many people. Smartphone era is opened, and market environment is changing rapidly. Pornography market is active by using smartphone use free internet. Many people access mobile harmful site of USA and Japan. App store of the apple has been cut off the porn service, but access block to mobile Web page is an impossible situation. In this paper, we proposed the harmful image detection method of using skin and non skin features to detect harmful image. Our proposed method can provide enough performance than previous method.

A study on the commercialization cause of 2nd class residential area in urban center (도시거점내 제2종 일반주거지역 상업화 확산과 원인 분석)

  • Yoon, Yong-Suk;Yang, Woo-Hyun
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2011.04a
    • /
    • pp.147-152
    • /
    • 2011
  • The purpose of this study is to find out the commercialization cause of 2nd class residential area in urban center as basic research to protect urban residential area against the pressure of commercialization. Through the research that are based on literature, field survey and urban planning map, it analysed the commercialization cause of selected two sites under similar urban condition ; to be a nearby subway station and to be a famous commercial street in site, etc. The consequences of this study are summarized as follows ; First the distance between subway station and residential block and residential commercialization are in inverse proportion each other. Second, the corner lot of a block and the access street directly connected collector street are very important factors to spread commercialization to residential area. Finally, nevertheless first and second results, there is square zone which is very high rate of commercialization within one regardless the distance between subway and residential block. the maximum range of square zone is assumed about 250 meter based on case study.

  • PDF