• Title/Summary/Keyword: ITS 장비

Search Result 1,251, Processing Time 0.026 seconds

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Adoption and Efficacy of ISO 15189 in Medical Laboratories for Diagnostic and Research (메디컬시험기관에서 ISO 15189 도입의 필요성과 시행의 효용성)

  • Yang, Man-Gil;Lee, Won Ho;Jun, Jin Hyun
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.48 no.2
    • /
    • pp.158-167
    • /
    • 2016
  • The requirements for medical laboratories ISO 15189 is examined in organization and a quality management system, stressing the importance of evidence, document control, and control of records and clinical material. Medical services are provided from the areas of resource management, and pre-examination, examination and post-examination processes. The main goal of ISO 15189 accreditation is to improve the quality of laboratory services provided for patients and clinical users not only through compliance with consensually developed and harmonized requirements but also by adopting the philosophy of continual improvement using the Plan-Do-Check-Act cycle. Laboratory quality should be evaluated and improved in all steps of the testing process as the state-of-the art indicates that the pre- and post-analytical phases are more vulnerable to errors than the intra-analytical phase. The Korea Laboratory Accreditation Scheme (KOLAS), a national accreditation body, provides medical laboratory accreditations for appropriate approaches to evaluating the competence of a medical laboratory in providing effective services to its customers and clinical users. Adoption of ISO 15189 in 2010s as a government policy has been delayed, and only 5 laboratories have been accredited to date in Korea. The medical laboratories should seek the adoption of ISO 15189 with a positive attitude for quality improvement and strengthening of international competitiveness.

The Effectiveness of CT and MRI Contrast Agent for SUV in 18F-FDG PET/CT Scanning (18F-FDG PET/CT 검사에서 정량분석에 관한 CT와 MRI 조영제의 효과)

  • Cha, Sangyoung;Cho, Yonggwi;Lee, Yongki;Song, Jongnam;Choi, Namgil
    • Journal of the Korean Society of Radiology
    • /
    • v.10 no.4
    • /
    • pp.255-261
    • /
    • 2016
  • In this study, among various factors having influence on SUV, we intended to compare and analyze the change of SUV using CT(4 type) and MRI(3 type) contrast agents which are commercialized now. We used Discovery 690 PET/CT(GE) and NEMA NU2 - 1994 PET phantom as experimental equipment. We have conducted a study as follows; first, we filled distilled water to phantom about two-thirds and injected radioisotope(18F-FDG 37 MBq), contrast agent. Second, we mixed CT contrast agent with distilled water and MRI contrast agent with that water separately. And then, we stirred the fluid and filled distilled water fully not to make air bubble. In emission scan, we had 15minutes scanning time after 40 minutes mixing contrast agent with distilled water. In transmission scan, we used CT scanning and its measurement conditions were tube voltage 120 kVp, tube current 40 mA, rotation time 0.5 sec, slice thickness 3.27 mm, DFOV 30 cm. Analyzing results, we set up some ROIs in 10th, 15th, 20th, 25th, 30th slice and measured SUVmean, SUVmax. Consequently, all images mixed 3 types of MRI contrast agent with distilled water have high SUVmean as compared with pure FDG image but there was no statistical significance. In SUVmax, they have high score and there was statistical significance. And other 4 images mixed 4 types of CT contrast agent with distilled water have significance in both SUVmean and SUVmax. Attenuation correction in PET/CT has been executed through various methods to make high quality image. But we figured out that using CT and MRI contrast agents before PET/CT scanning could make distortion of image and decrease diagnostic value. In that reason, we have to sort out the priority of examination in hospital not to disturb other examination's results. Through this process, we will be able to give superior medical service to our customers.

Effect of the Dose Reduction Applied Low Dose for PET/CT According to CT Attenuation Correction Method (PET/CT 저선량 적용 시 CT 감쇠보정법에 따른 피폭선량 저감효과)

  • Jung, Seung Woo;Kim, Hong Kyun;Kwon, Jae Beom;Park, Sung Wook;Kim, Myeong Jun;Sin, Yeong Man;Kim, Yeong Heon
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.18 no.1
    • /
    • pp.127-133
    • /
    • 2014
  • Purpose: Low dose of PET/CT is important because of Patient's X-ray exposure. The aim of this study was to evaluate the effectiveness of low-dose PET/ CT image through the CTAC and QAC of patient study and phantom study. Materials and Methods: We used the discovery 710 PET/CT (GE). We used the NEMA IEC body phantom for evaluating the PET data corrected by ultra-low dose CT attenuation correction method and NU2-94 phantom for uniformity. After injection of 70.78 MBq and 22.2 MBq of 18 F-FDG were done to each of phantom, PET/CT scans were obtained. PET data were reconstructed by using of CTAC of which dose was for the diagnosis CT and Q. AC of which was only for attenuation correction. Quantitative analysis was performed by use of horizontal profile and vertical profile. Reference data which were corrected by CTAC were compared to PET data which was corrected by the ultra-low dose. The relative error was assessed. Patients with over weighted and normal weight also underwent a PET/CT scans according to low dose protocol and standard dose protocol. Relative error and signal to noise ratio of SUV were analyzed. Results: In the results of phantom test, phantom PET data were corrected by CTAC and Q.AC and they were compared each other. The relative error of Q.AC profile was been calculated, and it was shown in graph. In patient studies, PET data for overweight patient and normal weight patient were reconstructed by CTAC and Q.AC under routine dose and ultra-low dose. When routine dose was used, the relative error was small. When high dose was used, the result of overweight patient was effectively corrected by Q.AC. Conclusion: In phantom study, CTAC method with 80 kVp and 10 mA was resulted in bead hardening artifact. PET data corrected by ultra- low dose CTAC was not quantified, but those by the same dose were quantified properly. In patients' cases, PET data of over weighted patient could be quantified by Q.AC method. Its relative difference was not significant. Q.AC method was proper attenuation correction method when ultra-low dose was used. As a result, it is expected that Q.AC is a good method in order to reduce patient's exposure dose.

  • PDF

Quality Control of Agro-meteorological Data Measured at Suwon Weather Station of Korea Meteorological Administration (기상청 수원기상대 농업기상 관측요소의 품질관리)

  • Oh, Gyu-Lim;Lee, Seung-Jae;Choi, Byoung-Choel;Kim, Joon;Kim, Kyu-Rang;Choi, Sung-Won;Lee, Byong-Lyol
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.17 no.1
    • /
    • pp.25-34
    • /
    • 2015
  • In this research, we applied a procedure of quality control (QC) to the agro-meteorological data measured at the Suwon weather station of Korea Meteorological Administration (KMA). The QC was conducted through six steps based on the KMA Real-time Quality control system for Meteorological Observation Data (RQMOD) and four steps based on the International Soil Moisture Network (ISMN) QC modules. In addition, we set up our own empirical method to remove erroneous data which could not be filtered by the RQMOD and ISMN methods. After all these QC procedures, a well-refined agro-meteorological dataset was complied at both air and soil temperatures. Our research suggests that soil moisture requires more detailed and reliable grounds to remove doubtful data, especially in winter with its abnormal variations. The raw data and the data after QC are now available at the NCAM website (http://ncam.kr/page/req/agri_weather.php).

Estimating Precise Spatio-Temporal Distribution of Weather Condition Using Semi-Variogram in Small Scale Recreation Forest (Semi-Variogram을 이용한 소규모 자연휴양림 내기상조건의 정밀 시공간 분포 추정)

  • LIM, Chul-Hee;RYU, Dong-Hoon;SONG, Chol-Ho;ZHU, Yong-Yan;LEE, Woo-Kyun;KIM, Min-Seon
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.3
    • /
    • pp.63-75
    • /
    • 2015
  • As forest therapy is getting more attention than ever, it is important to organize time for activity and location based on spatio-temporal distribution of weather condition in forest. This study aimed to analyze precise spatio-temporal distribution of weather condition by installing long-term weather monitoring device in Yonghyun national natural recreation forest and using acquired weather data in order to support forest recreation and therapy activity. First, we statistically compared 4 models of semi-variogram and the results were all similar. We selected and analyzed the circular model for this study because it was presumed to be the best model for this case. We derived 128 results from the circular model and through semi-variogram, we identified seasonal and temporal distributions of temperature and humidity. Then, we used boxplot, made of partial sill level, to identify significant differences in seasonal and temporal distributions. As a result, in spring and early morning, both temperature and humidity showed equalized result. On the other hand, in summer and early afternoon, both temperature and humidity showed uneven result. In spring and early morning, changes in weather condition are shown little from spatial shifting, it is ideal to perform recreational activities and forest therapy but in summer and early afternoon, it is unadvisable to do so as the changes in weather condition could be harmful unless any other means of preparations are made. This study proposes its significance by analyzing seasonal micro-weather of single recreation forest and presenting seasonal and temporal outcomes.

Effective Geophysical Methods in Detecting Subsurface Caves: On the Case of Manjang Cave, Cheju Island (지하 동굴 탐지에 효율적인 지구물리탐사기법 연구: 제주도 만장굴을 대상으로)

  • Kwon, Byung-Doo;Lee, Heui-Soon;Lee, Gyu-Ho;Rim, Hyoung-Rea;Oh, Seok-Hoon
    • Journal of the Korean earth science society
    • /
    • v.21 no.4
    • /
    • pp.408-422
    • /
    • 2000
  • Multiple geophysical methods were applied over the Manjang cave area in Cheju Island to compare and contrast the effectiveness of each method for exploration of underground cavities. The used methods are gravity, magnetic, electrical resistivity and GPR(Ground Pentrating Radar) survey, of which instruments are portable and operations are relatively economical. We have chosen seven survey lines and applied appropriate multiple surveys depending on the field conditions. In the case of magnetic method. two-dimensional grid-type surveys were carried out to cover the survey area. The geophysical survey results reveal the characteristic responses of each method relatively well. Among the applied methods, the electric resistivity methods appeared to be the most effective ones in detecting the Manjang Cave and surrounding miscellaneous cavities. Especially, on the inverted resistivity section obtained from the dipole-dipole array data, the two-dimensional distribution of high resistivity cavities are revealed well. The gravity and magnetic data are contaminated easily by various noises and do not show the definitive responses enough to locate and delineate the Manjang cave. But they provide useful information in verifying the dipole-dipole resistivity survey results. The grid-type 2-D magnetic survey data show the trend of cave development well, and it may be used as a reconnaissance regional survey for determining survey lines for further detailed explorations. The GPR data show very sensitive response to the various shallow volcanic structures such as thin spaces between lava flows and small cavities, so we cannot identify the response of the main cave. Although each geophysical method provides its own useful information, the integrated interpretation of multiple survey data is most effective for investigation of the underground caves.

  • PDF

COMPARATIVE STUDY ON THE EARLY DETECTION OF ENAMEL LESIONS USING DIFOTI AND LASER FLUORESCENCE (Digital Imaging Fiber-Optic Trans-Illumination과 Laser Fluorescence를 이용한 법랑질 우식증의 조기 진단에 관한 비교 연구)

  • Maeng, Myoung-Ho;Kim, Seung-Oh;Kim, Jong-Soo
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.33 no.2
    • /
    • pp.207-220
    • /
    • 2006
  • The newly developed equipments for the early detection of carious lesion are LFD (laser fluorescence device), Ultrasonic diagnostic system, CLSM(confocal laser scanning microscopy), QLF(quantitative light-induced fluorescence) and DIFOTI (digital imaging fiber-optic trans-illumination) system. In this study, DIFOTI system and LFD were used for the detection of early enamel caries. Twenty five primary teeth extracted from twenty one children at around the dentitional exchanging period were selected as samples. The results obtained from DIFOTI imaging and LFD measurement were compared with those of CLSM and comprehensive evaluations were made for the diagnostic capacity of each device. In vitro test, 40 sample teeth with their buccal & lingual surface formed by a window of $2{\times}3mm$ in diameter were immersed in artificial demineralizing solution for the period of 4, 8, 12 and 16 days. The results obtained from the experimental groups (DIFOTI, LFD) were compared to control group (CLSM) and we have reached to the following conclusions. 1. The sensitivity and specificity of DIFOTI system operated in oral environment was 88.2% and 76.9% respectively. 2. The sensitivity and specificity of LFD measured in oral environment was 76.5% and 69.2% respectively. 3, Regression analysis on the light transparent rate of DIFOTI showed its decrease according to the length of primary enamel decalcification performed in vitro(r=-0.96, p<0.05). 4. No statistically significant difference between LFT measurement and the length of in vitro decalcification was found in regression analysis (p>0.05). 5. The correlation coefficient of DIFOTI image transparent rate and the lesion depth of CLMS was -0.6988 (p<0.05), whereas no statistically significant difference was found for LFD measurement.

  • PDF

Space Development and Law in Asia (아시아의 우주개발과 우주법)

  • Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.2
    • /
    • pp.349-384
    • /
    • 2013
  • The Sputnik 1 launching in 1957 made the world recognize the necessity of international regulations on space development and activities in outer space. The United Nations established COPUOS the very next year, and adopted the mandate to examine legal issues concerning the peaceful uses of outer space. At the time, the military sector of the U.S.A. and the Soviet Union were in charge of the space development and they were not welcomed to discuss the prohibition of the military uses of outer space at the legal section in the COPUOS. Although both countries had common interests in securing the freedom of military uses in outer space. As the social and economic benefits derived from space activities have become more apparent, civil expenditures on space activities have continued to increase in several countries. Virtually all new spacefaring states explicitly place a priority on space-based applications to support social and economic development. Such space applications as satellite navigation and Earth imaging are core elements of almost every existing civil space program. Likewise, Moon exploration continues to be a priority for such established spacefaring states as China, Russia, India, and Japan. Recently, Companies that manufacture satellites and ground equipment have also seen significant growth. On 25 February 2012 China successfully launched the eleventh satellite for its indigenous global navigation and positioning satellite system, Beidou. Civil space activities began to grow in China when they were allocated to the China Great Wall Industry Corporation in 1986. China Aerospace Corporation was established in 1993, followed by the development of the China National Space Administration. In Japan civil space was initially coordinated by the National Space Activities Council formed in 1960. Most of the work was performed by the Institute of Space and Aeronautical Science of the University of Tokyo, the National Aerospace Laboratory, and, most importantly, the National Space Development Agency. In 2003 all this work was assumed by the Japanese Aerospace Exploration Agency(JAXA). Japan eases restrictions on military space development. On 20 June 2012 Japan passed the Partial Revision of the Cabinet Establishment Act, which restructured the authority to regulate Japanese space policy and budget, including the governance of the JAXA. Under this legislation, the Space Activities Commission of the Ministry of Education, Culture, Sports, Science, and Technology, which was responsible for the development of Japanese space program, will be abolished. Regulation of space policy and budget will be handed over to the Space Strategy Headquarter formed under the Prime Minister's Cabinet. Space Strategy will be supported by a Consultative Policy Commission as an academics and independent observers. By revoking Article 4 (Objectives of the Agency) of a law that previously governed JAXA and mandated the development of space programs for "peaceful purposes only," the new legislation demonstrates consistency with Article 2 of the 2008 Basic Space Law. In conformity with the principles laid down in the 1967 Outer Space Treaty JAXA is now free to pursue the non-aggressive military use of space. New legislation is the culmination of a decade-long process that sought ways to "leverage Japan's space development programs and technologies for security purposes, to bolster the nation's defenses in the face of increased tensions in East Asia." In this connection it would also be very important and necessary to create an Asian Space Agency(ASA) for strengthening cooperation within the Asian space community towards joint undertakings.

  • PDF