• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.023 seconds

A Fundamental Study on Damage Assessment of the 30-Inch Gas Pipeline (30인치 가스 파이프라인 손상평가에 관한 기초 연구)

  • Mutiara Setyaning Dwityas;Chunsik Shim;Kangho Kim;Deokyeon Lee;Daseul Jeong;Youngpyo Kim;Yun-Chan Jang;Byeonghwa Kim;Sungguk Wi
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.61 no.5
    • /
    • pp.378-388
    • /
    • 2024
  • Oil and gas contribute significantly to achieving the growing demand for energy, which is rising in parallel with population growth. The pipeline system is the main transport system used in the distribution of oil and gas because the pipeline system is considered the most effective and efficient system. The distribution system for gas and oil must guarantee security and safety. Analyzing the pipeline is necessary to ensure distribution security and safety. In this study, a finite element analysis of the gas pipeline specimen was conducted. This analysis is carried out in two stages, first structural analysis and continued with damage analysis, where the damage used is a dent. In the dent analysis, environmental conditions are applied, namely non-pressure, pressure, and full pressure. Then assessed all the results of the analysis of each stage, the assessment was carried out by verifying the results of the analysis with the applicable standard rules. So that the characteristics of the pipeline can be recognized and work accidents caused by operating pipeline failure can be avoided.

Scale and Scope Economies and Prospect for the Korea's Banking Industry (우리나라 은행산업(銀行産業)의 효율성분석(效率性分析)과 제도개선방안(制度改善方案))

  • Jwa, Sung-hee
    • KDI Journal of Economic Policy
    • /
    • v.14 no.2
    • /
    • pp.109-153
    • /
    • 1992
  • This paper estimates a translog cost function for the Korea's banking industry and derives various implications on the prospect for the Korean banking structure in the future based on the estimated efficiency indicators for the banking sector. The Korean banking industry is permitted to operate trust business to the full extent and the security business to a limited extent, while it is formally subjected to the strict, specialized banking system. Security underwriting and investment businesses are allowed in a very limited extent only for stocks and bonds of maturity longer than three year and only up to 100 percent of the bank paid-in capital. Until the end of 1991, the ceiling was only up to 25 percent of the total balance of the demand deposits. However, they are prohibited from the security brokerage business. While the in-house integration of security businesses with the traditional business of deposit and commercial lending is restrictively regulated as such, Korean banks can enter the security business by establishing subsidiaries in the industry. This paper, therefore, estimates the efficiency indicators as well as the cost functions, identifying the in-house integrated trust business and security investment business as important banking activities, for various cases where both the production and the intermediation function approaches in modelling the financial intermediaries are separately applied, and the banking businesses of deposit, lending and security investment as one group and the trust businesses as another group are separately and integrally analyzed. The estimation results of the efficiency indicators for various cases are summarized in Table 1 and Table 2. First, security businesses exhibit economies of scale but also economies of scope with traditional banking activities, which implies that in-house integration of the banking and security businesses may not be a nonoptimal banking structure. Therefore, this result further implies that the transformation of Korea's banking system from the current, specialized system to the universal banking system will not impede the improvement of the banking industry's efficiency. Second, the lending businesses turn out to be subjected to diseconomies of scale, while exhibiting unclear evidence for economies of scope. In sum, it implies potential efficiency gain of the continued in-house integration of the lending activity. Third, the continued integration of the trust businesses seems to contribute to improving the efficiency of the banking businesses, since the trust businesses exhibit economies of scope. Fourth, deposit services and fee-based activities, such as foreign exchange and credit card businesses, exhibit economies of scale but constant returns to scope, which implies, the possibility of separating those businesses from other banking and trust activities. The recent trend of the credit card business being operated separately from other banking activities by an independent identity in Korea as well as in the global banking market seems to be consistent with this finding. Then, how can the possibility of separating deposit services from the remaining activities be interpreted? If one insists a strict definition of commercial banking that is confined to deposit and commercial lending activities, separating the deposit service will suggest a resolution or a disappearance of banking, itself. Recently, however, there has been a suggestion that separating banks' deposit and lending activities by allowing a depository institution which specialize in deposit taking and investing deposit fund only in the safest securities such as government securities to administer the deposit activity will alleviate the risk of a bank run. This method, in turn, will help improve the safety of the payment system (Robert E. Litan, What should Banks Do? Washington, D.C., The Brookings Institution, 1987). In this context, the possibility of separating the deposit activity will imply that a new type of depository institution will arise naturally without contradicting the efficiency of the banking businesses, as the size of the banking market grows in the future. Moreover, it is also interesting to see additional evidences confirming this statement that deposit taking and security business are cost complementarity but deposit taking and lending businesses are cost substitute (see Table 2 for cost complementarity relationship in Korea's banking industry). Finally, it has been observed that the Korea's banking industry is lacking in the characteristics of natural monopoly. Therefore, it may not be optimal to encourage the merger and acquisition in the banking industry only for the purpose of improving the efficiency.

  • PDF

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

A Case Study of Profit Optimization System Integration with Enhanced Security (관리보안이 강화된 수익성 최적화 시스템구축 사례연구)

  • Kim, Hyoung-Tae;Yoon, Ki-Chang;Yu, Seung-Hun
    • Journal of Distribution Science
    • /
    • v.13 no.11
    • /
    • pp.123-130
    • /
    • 2015
  • Purpose - Due to highly elevated levels of competition, many companies today have to face the problem of decreasing profits even when their actual sales volume is increasing. This is a common phenomenon that is seen occurring among companies that focus heavily on quantitative growth rather than qualitative growth. These two aspects of growth should be well balanced for a company to create a sustainable business model. For supply chain management (SCM) planners, the optimized, quantified flow of resources used to be of major interest for decades. However, this trend is rapidly changing so that managers can put the appropriate balance between sales volume and sales quality, which can be evaluated from the profit margin. Profit optimization is a methodology for companies to use to achieve solutions focused more on profitability than sales volume. In this study, we attempt to provide executional insight for companies considering implementation of the profit optimization system to enhance their business profitability. Research design, data, and methodology - In this study, we present a comprehensive explanation of the subject of profit optimization, including the fundamental concepts, the most common profit optimization logic algorithm -linear programming -the business functional scope of the profit optimization system, major key success factors for implementing the profit optimization system at a business organization, and weekly level detailed business processes to actively manage effective system performance in achieving the goals of the system. Additionally, for the purpose of providing more realistic and practical information, we carefully investigate a profit optimization system implementation case study project fulfilled for company S. The project duration was about eight months, with four full-time system development consultants deployed for the period. To guarantee the project's success, the organization adopted a proven system implementation methodology, supply chain management (SCM) six-sigma. SCM six-sigma was originally developed by a group of talented consultants within Samsung SDS through focused efforts and investment in synthesizing SCM and six-sigma to improve and innovate their SCM operations across the entire Samsung Organization. Results - Profit optimization can enable a company to create sales and production plans focused on more profitable products and customers, resulting in sustainable growth. In this study, we explain the concept of profit optimization and prerequisites for successful implementation of the system. Furthermore, the efficient way of system security administration, one of the hottest topics today, is also addressed. Conclusion - This case study can benefit numerous companies that are eagerly searching for ways to break-through current profitability levels. We cannot guarantee that the decision to deploy the profit optimization system will bring success, but we can guarantee that with the help of our study, companies trying to implement profit optimization systems can minimize various possible risks across various system implementation phases. The actual system implementation case of the profit optimization project at company S introduced here can provide valuable lessons for both business organizations and research communities.

Optical security system using multi-phase separation and phase-wrapping method (다중 위상 분할과 위상 랩핑 방법을 이용한 광 암호화 시스템)

  • Shin Chang Mok;Kim Soo Joong;Seo Dong Hoan
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.6 s.336
    • /
    • pp.31-38
    • /
    • 2005
  • In this paper, we proposed an optical security system based on a gray-image exclusive-OR encryption using multi-phase separation and phase-wrapping method. For encryption, a gray image is sliced into binary images, which have the same pixel value, and these images are encrypted by modified XOR rules with binary random images. The XORed images and the binary images respectively combined and converted into full phase images, called an encrypted image and a key image. For decryption, when the encrypted image and key image are used as inputs on optical elements, Practically due to limited controllability of phase range in optical elements, the original gray image cannot be efficiently reconstructed by these optical elements. Therefore, by decreasing the phase ranges of the encrypted image and key image using a phase-wrapping method and separating these images into low-level phase images using multi-phase separation, the gray image can be reconstructed by optical elements which have limited control range. The decrytion process is simply implemented by interfering a multiplication result of encrypted image and key image with reference light. The validity of proposed scheme is verified and the effects, which are caused by phase limitation in decryption process, is analyzed by using computer simulations.

A Critical Evaluation on the Pension Privatization Reform in Chile (칠레 연금민영화 개혁에 대한 평가)

  • Cho, Young-Hoon
    • Korean Journal of Social Welfare
    • /
    • v.50
    • /
    • pp.87-108
    • /
    • 2002
  • According to Neo-liberalism, the privatization of social security systems is pivotal for a country's economic growth and the wellbeing of its people, because such systems hinder the full operation of the market, eventually leading the national economy to collapse. The Chilean case of pension privatization is often cited as a good evidence for the Neo-liberal argument. Neo-liberalists say that Chile has experienced a rapid economic growth and retirees have enjoyed a much more pension payment since the national pension system was successfully privatized in 1981. The primary purpose of this article is to provide a critical review on the results of the Chilean pension privatization reform implemented in 1981. This study is intended to give an objective understanding of the reform because the existing evaluations, particularly those from the neo-liberalism, over-emphasize the bright sides of the reform. for this purpose, this article will pay a particular attention to the change in the level of pension payment after the reform. The conclusion of this study is that, contrary to the argument of Neo-liberalism, the pension reform has lowered the level of pension payment and, compared to the old public pension, has made the lives of ordinary retirees less secure. Reorganization of the social security system is more desirable than privatization as a remedy for the current problems of the welfare state.

  • PDF

A Study on Emotional Labor of Casino Employees : Security Team and also Employees who Care Customer Closer (카지노 보안 및 고객접점 의전 종사자의 감정노동에 관한 연구)

  • Heo, Tae gu
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.111-135
    • /
    • 2018
  • Domestic casino companies strongly demand their employees to provide high quality customer services for improving customer's satisfaction and to minimize customer's complain to achieve organizational objective. This seriously influences the job stress, job satisfaction and turnover of employees. However, ongoing management is necessary for job satisfaction and turnover intention of employees because which are related to organizational effectiveness and factors able to maximize the profit. In this study, we examined the influence and causal relationship of job stress from emotional labor of employees on job satisfaction and turnover intention of employees. As a result, job stress had a full mediating effect in the relationship between emotional labor, job satisfaction and turnover intention. It was confirmed that emotional labor of casino employees could cause job stress and further influence job satisfaction and turnover intention. In order to reduce job stress and improve job satisfaction, we propose the improvement of overall human management structure and company environment of casino companies. Emotional education such as emotional regulation ability, empathy, and interpersonal skills should be strengthened to reduce job stress from emotional labor, and the self-esteem program will be helpful to casino employees to maintain the emotional positiveness and maximize their working abilities.

Evaluation and Forecast of North Korea's Nuclear Policy through Libya Model (리비아 모델을 통한 북한의 핵 정책 평가와 전망)

  • Han, Seung Jo;Shin, Jin
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.113-122
    • /
    • 2018
  • The issue of security on the Korean peninsula is facing the greatest upheaval in 2018 with the inter-Korean summit and the US-North Korea summit. North Korea has pursued the parallel policy developing military and economic at the same time. However, North Korea is changing its route to give up nuclear weapons and focus on the economy through summit talks. Since the change in North Korea is similar to that of Libya in the past, it is necessary to analyze why North Korea is trying to abandon its nuclear program and how the process is flowing compared to the case of Libya. The Libya model was constructed and analyzed in terms of international and domestic perpectives and recognition of the situation by leadership. North Korea's nuclear policy was evaluated based on the Libya model. The nuclear development of Libya and North Korea has caused diplomatic and economic pressures from the international community and ultimately led to instability of the regime. Two countries have tried to abandon nuclear program in order to solve the instability of the regime, also gain the economic reward insead. Libya took economic benefits and secured some of the stability of the regime, but the regime collapsed under the wave of democracy due to the influx of foreign capital and ideas. North Korea will seek diplomatic and economic gains with the example of Libya, but will try to limit as much as possible the culture of democracy and the full opening that can be incidental.

  • PDF

Performance Evaluation of Octonion Space-Time Coded Physical Layer Security in MIMO Systems (MIMO 시스템에서 옥토니언 시공간 부호를 이용한 물리계층 보안에 대한 성능 분석)

  • Young Ju Kim;BeomGeun Kwak;Seulmin Lim;Cheon Deok Jin
    • Journal of Broadcast Engineering
    • /
    • v.28 no.1
    • /
    • pp.145-148
    • /
    • 2023
  • Open-loop Octonion space-time block code for 4 transmit antenna system is considered and random phases are applied to 4 transmit antennas for physical layer security. When an illegal hacker estimates the random phases of 1 through 4 transmit antennas with maximum likelihood (ML), this letter analyzes the bit error rate (BER) performances versus signal-to-noise ratio (SNR). And the Octonion code in the literature[1] does not have full orthogonality so, this letter employs the perfect orthogonal Octonion code. When the hacker knows that the random phases are 2-PSK constellations and he should estimate all the 4 random phases, the hacking is impossible until 100dB. When the hacker possibly know that some of the random phases, bit error rate goes down to 10-3 so, the transmit message could be hacked.

Visible Light Communication Method for Personalized and Localized Building Energy Management

  • Jeong, Jin-Doo;Lim, Sang-Kyu;Han, Jinsoo;Park, Wan-Ki;Lee, Il-Woo;Chong, Jong-Wha
    • ETRI Journal
    • /
    • v.38 no.4
    • /
    • pp.735-745
    • /
    • 2016
  • The Paris agreement at the 21st Conference of the Parties (COP21) emphasizes the reduction of greenhouse gas emissions and increase in energy consumption in all areas. Thus, an important aspect is energy saving in buildings where the lighting is a major component of the electrical energy consumption. This paper proposes a building energy management system employing visible light communication (VLC) based on LED lighting. The proposed management system has key characteristics including personalization and localization by utilizing such VLC advantages as secure communication through light and location-information transmission. Considering the efficient implementation of an energy-consumption adjustment using LED luminaires, this paper adopts variable pulse position modulation (VPPM) as a VLC modulation scheme with simple controllability of the dimming level that is capable of providing a full dimming range. This paper analyzes the VPPM performances according to variable dimming for several schemes, and proposes a VPPM demodulation architecture based on dimming-factor acquisition, which can obtain an improved performance compared to a 2PPM-based scheme. In addition, the effect of a dimming-factor acquisition error is analyzed, and a frame format for minimizing this error effect is proposed.