• Title/Summary/Keyword: Active Protection

Search Result 596, Processing Time 0.024 seconds

Governance Strategies for Trade in Financial Services in Korea (금융서비스의 무역거버넌스 전략)

  • Park, Moon-Suh
    • International Commerce and Information Review
    • /
    • v.11 no.4
    • /
    • pp.229-259
    • /
    • 2009
  • Financial service in economy is same with neural net or vein net of human body. Moreover, every economic entity which has experienced global financial crisis in 2008 is realizing more importance and power of financial service, and is recognizing financial service as a part of new engine of growth for economic development. As global linkages relating financial service in the industry are deepened, we can expect that the economic interests between countries are more conflicted. Because financial service is regarded as critical factors in order to ensure future competitive advantage, more active change of financial service paradigm in Korea is required. The purpose of this paper is to analyze the paradigm of financial service in global business aspect, to prepare the global governance strategies about financial service, and to bring up some ideas for Korea's economic development after global financial crisis by intensifying the competitiveness of financial services. It is suggested that Korea should prepare the "Master Law for Financial Service" (provisional name) in advance as governance strategy for financial service. And not only establishing the financial risks prevention system and consumer's protection agency, but financial competitiveness strengthening actions will have to be included in governance strategy of financial service in Korea.

  • PDF

Closely Spaced Target Detection using Intensity Sorting-based Context Awareness

  • Kim, Sungho;Won, Jin-Ju
    • Journal of Electrical Engineering and Technology
    • /
    • v.11 no.6
    • /
    • pp.1839-1845
    • /
    • 2016
  • Detecting remote targets is important to active protection system (APS) or infrared search and track (IRST) applications. In normal situation, the well-known constant false alarm rate (CFAR) detector works properly. However, decoys in APS or closely spaced targets in IRST degrade the detection capability by increasing background noise level in the CFAR detector. This paper presents a context aware CFAR detector by the intensity sorting and selection of background region to reduce the effect of neighboring targets that lead to incorrect estimation of background statistics. The existence of neighboring targets can be recognized by intensity sorting where neighboring targets usually show highest ranks. The proposed background statistics (mean, standard deviation) estimation method from median local pixels can be aware of the background context and reduce the effects of the neighboring targets, which increase the signal-to-clutter ratio. The experimental results on the synthetic APS sequence, real adjacent target sequence, and remote pedestrian sequence validated that the proposed method produced an enhanced detection rate with the same false alarm rate compared with the hysteresis-CFAR (H-CFAR) detection.

Enzymatic Characteristics of steroid $\Delta^1$-dehydrogenase from Arthrobacter simplex

  • Lee, Mi-Kyung;Bae, Moo
    • Journal of Microbiology and Biotechnology
    • /
    • v.4 no.2
    • /
    • pp.119-125
    • /
    • 1994
  • Steroid $\Delta^1$-dehydrogenase purified from hydrocortisone-induced cells of Arthrobacter simplex converted various 3-ketosteroids into their corresponding $\Delta^1$-dehydrogenated products. The transformation efficiencies depend upon the chemical structure of the steroids, especially length of the side chain at 17 position and hydroxyl groups at 11 and 17 positions. The Km values for androstenedione, the most favorable substrate examined, and hydrocortisone were 74 ${\mu}M$ and 294 ${\mu}M$, respectively. The optimum temperature and pH of the enzyme reaction were 35$^{\circ}C$ and pH 9, respectively, and the enzyme was relatively stable at the range from 20 to 35$^{\circ}C$ and from pH 5 to 10 after one hour of incubation. The enzyme activity was markedly inhibited in the presence of $Cu^{2+},\;Fe^{3+},\;Hg^{2+},\;Mo^{6+}$ ions, and somewhat inhibited by $Zn^{2+}$ and $Fe^{2+}$. $\alpha,\alpha'$-Dipyridyl that inhibits 9$\alpha$-hydroxylase and accumulates 1,4-androstadiene-3,17-dione from sterols revealed no inhibitory effect on this enzyme. EGTA showed inhibitory effect. $\beta$-Estradiol competitively inhibited the enzyme activity. Chemical modifications of the enzyme were attempted with several reagents. p-Hydroxymer-curibenzoate showed inhibition of the enzyme activity and protection of the substrate. This suggests that cysteine residue may be involved in the active site of the enzyme.

  • PDF

Configurations of AC and DC-type Quality Control Center for a New Distribution System FRIENDS

  • Hayashi Yusuke;Saisyo Masaki;Ise Toshifumi;Tsuji Kiichiro
    • Proceedings of the KIPE Conference
    • /
    • 2001.10a
    • /
    • pp.497-501
    • /
    • 2001
  • Unbundled power quality service is paid much attention under the circumstances of deregulation and diversification of needs of customers for quality and price of electric power. Moreover, distributed generators (DGs) such as photovoltaic generations and wind turbines will be introduced to distribution system more and more, and reverse flow of active power has possibility to cause new problems in the distribution system such as voltage rise of distribution line and protection problem. Flexible, Reliable and Intelligent Electrical eNergy Delivery System, which is called FRIENDS, has been proposed as one of promising distribution system for such requirements, and intensive studies are under way. One of features of the system is introducing Quality Control Center (QCC) into the system for unbundled power quality service and easy installation of DGs. Two types of QCCs for such purposes are proposed, and simulation results are shown in this paper.

  • PDF

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.1 no.1
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF

Current Practices of the Ceasing Medical Treatment for Euthanasia and its Solutions (연명치료 중단의 현황과 대책 - 안락사, 보라매병원 사건을 중심으로 -)

  • Jung, Hyo-Sung
    • The Korean Society of Law and Medicine
    • /
    • v.9 no.1
    • /
    • pp.461-503
    • /
    • 2008
  • The right to live is the most valuable benefit and protection of the law. And Medical science is the study considering value of life as the top priority. As modern medical science has progressed and expanding lifespan skills have developed, the number of symptom, called a human vegetable, has been also increased. As a result, people concerns whether euthanasia should be permitted. (1) Active euthanasia is prohibited and a doctor who conduct it is punished. (2) Indirect euthanasia can be permitted unless it is against a patient's intention. (3) Permission of passive euthanasia depends on intention of a patient. In other words, when a patient accepts, a doctor respects the right of self determination of patient and irreversible situation such as brain death happens, treatment stop is permitted. Even a patient who is in the last stage of cancer has a right to die in the dignity and elegance. Solutions for ceasing medical treatment are as follows; First, establishment of 'Bioethics Committee'. Second, setting procedures to empower a court a right to decide whether medical treatment is ceased. Third, setting procedure a government to assist treatment fees. In this paper, direction for social agreement of legal policy regarding the ceasing treatment is provided.

  • PDF

A Study on the Subject Selection of VE Using Decision Weights Techniques (VE 대상선정을 위한 평가항목의 가중치 결정방법에 관한 연구)

  • Ryu Hyung-Han;Bae Soo-Yong;Hwang Jae-Woo;Yun Dong-Jin;Lee Sang-Beom
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2005.05a
    • /
    • pp.149-155
    • /
    • 2005
  • Was used at step space-time mainly after VE technique sponsors in domestic in the 1960s but have been expanded to design step recently. Possibility of value elevation or cost reduction must choose member that is effectively for active and effective application of VE technique. In this study, when enforce design VE examining for weight decision corrosion protection been using in weight grant composition estimation technique, target choice process wishes to suggest formality and method that can be achieved effectively. Main conclusion of this study sorts valuation items step by step for weight appropriation of valuation basis and give point on article of high position point after expert which employer is included estimates article by low rank step and this presented high position method that do union itembyitemandestablishesbyitemweight. Did these techniques for giving weights so that importance for weight appropriation developed estimation program, and data save of target estimation standard and target estimation standard is possible using straight sit.

  • PDF

Prospects for Immunological Intervention for Coccidiosis (닭 콕시듐병의 면역학적 접근에 대한 전망)

  • Lillehoj, H.S.
    • Korean Journal of Poultry Science
    • /
    • v.19 no.3
    • /
    • pp.161-176
    • /
    • 1992
  • Coccidiosis is caused by Eimeria infecting primarily the intestine of the susceptible host, thereby seriously impairing the growth and feed utilization of livestock and poultry. The genus Eimeria contains a number of obligate intracellular protozoan parasites with a complicated life-cycle involving both asexual and sexual stages of development. The desire to develop a vaccine against Eimeria has Promoted active research to elucidate the mechanisms of protective immunity and identification of candidate vaccine antigens. Protozoa are unique in their modes of transmission and nature of disease manifestations, the significance of which should be considered in the development of a control strategy. An intricate and complex interplay of different cell populations and cytokines is involved not only in the pathogenesis of coccidiosis but also in the development of protective immunity Thus, comprehensive understanding of the events leading to protection following Eimeria infection will be crucial for the development of an effective vaccine.

  • PDF

Security Container CRYPTEX Model for Copyright Management of Software Source Code (소프트웨어 소스코드의 저작권 관리를 위한 보안 컨테이너 크립텍스 모델)

  • Cha, Byung-Rae
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.451-463
    • /
    • 2008
  • There are management and security of software source code equivalent to 10 assembly lines of important infrastructure in the early stage of information society directly. A support technology and framework to protect software source code are so poor state In this paper, the proposed model that is support protection and access control between software source code as object and subject that is not authenticated safely was named CRYPTEX model. And we propose active business model to provide delegate, mobile, and security/access control function for passive software source code in document state using CRYPTEX.

  • PDF

Efficient Implementation of Pseudorandom Functions for the e-seal Protection Protocol (E-seal 보안 프로토콜을 위한 Pseudorandom Function의 효율적인 구현)

  • Min Jung-Ki;Kang Seok-Hun;Chung Sang-Hwa;Kim Dong-Kyue
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.715-718
    • /
    • 2006
  • e-seal은 RFID 기술을 사용하여 원격에서 자동으로 봉인상태를 확인할 수 있는 컨테이너 봉인 장치를 말한다. RFID의 특징상 반도체 칩에 기록된 정보를 제 삼자가 쉽게 판독 및 변조할 수 있다는 취약점이 있는 실정이다. ISO에서는 RFID의 취약점을 보안하기 위한 표준작업(ISO 18185)을 진행 중이다. 이 중, ISO 18185-4는 e-seal에 저장되는 자료나 리더와의 RF통신에서 데이터 보호를 위한 표준이며, 관련된 연구로는 Active-RFID 인증 프로토콜과 ISO 18185-4를 위한 보고서로 제출된 보안 프로토콜 등이 있다. 제안된 e-seal 보안 프로토콜을 적용하기 위해서는 e-seal과 리더 간의 데이터를 암/복호화 키를 Pseudorandom Function(PRF)을 이용하여 마스터 키로부터 MTK(Mutual Transient Key)를 유도하고, MTK를 암/복호화 키로 사용해야 할 필요가 있다. 본 논문에서는 현재 보안 프로토콜에서 사용되고 있는 PRF에 대해 살펴보고, e-seal 환경에서 PRF를 소프트웨어로 구현하였다. 구현 결과 해시 함수를 기반으로 하는 PFR보다 암호화 알고리즘 AES를 기반으로 하는 PRF이 더 좋은 성능을 보였으며, 블록 암호화 알고리즘인 AES-128을 어셈블리어로 구현함으로써 PRF를 최적화하였다.

  • PDF