• Title/Summary/Keyword: Network protection

Search Result 1,089, Processing Time 0.029 seconds

Application and Policy Direction of Blockchain in Logistics and Distribution Industry (물류 및 유통산업의 블록체인 활용과 정책 방향)

  • Kim, Ki-Heung;Shim, Jae-Hyun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.77-85
    • /
    • 2018
  • Purpose - The purpose of this study is to subdivide trade transaction-centered structure in a logistics/distribution industry system to apply blockchain, to establish and resolve with which types of technology, and to provide policy direction of government institution and technology to apply blockchain in this kind of industry. Research design, data, and methodology - This study was conducted with previous researches centered on cases applied in various industry sectors on the basis of blockchain technology. Results - General fields of blockchain application include digital contents distribution, IoT platform, e-Commerce, real-estate transaction, decentralized app. development(storage), certification service, smart contract, P2P network infrastructure, publication/storage of public documents, smart voting, money exchange, payment/settlement, banking security platform, actual asset storage, stock transaction and crowd funding. Blockchain is being applied in various fields home and abroad and its application cases can be explained in the banking industry, public sector, e-Commerce, medical industry, distribution and supply chain management, copyright protection. As examined in the blockchain application cases, it is expected to establish blockchain that can secure safety through distributed ledger in trade transaction because blockchain is established and applied in various sectors of industries home and abroad. Parties concerned of trade transaction can secure visibility even in interrupted specific section when they provide it as a base for distributed ledger application in trade and establish trade transaction model by applying blockchain. In case of interrupted specific section by using distributed ledger, blockchain model of trade transaction needs to be formed to make it possible for parties concerned involved in trade transaction to secure visibility and real-time tracking. Additionally, management should be possible from the time of contract until payment, freight transfer to buyers through land, air and maritime transportation. Conclusions - In order to boost blockchain-based logistics/distribution industry, the government, institutionally, needs to back up adding legal plan of shipping, logistics and distribution, reviewing standardization of electronic switching system and coming up with blockchain-based industrial road maps. In addition, the government, technologically, has to support R&D for integration with other high technology, standardization of distribution industry's blockchain technology and manpower training to expand technology development.

A Survey on the Perception of Agricultural Food Accreditation and Traditional Food Quality Certification (농식품 인증 및 전통식품 품질인증에 관한 인식조사)

  • Huh, Jung-In;Jin, So-Yeon
    • Journal of the Korean Society of Food Culture
    • /
    • v.26 no.3
    • /
    • pp.220-229
    • /
    • 2011
  • This study attempted to understand the perception and the degree of trust that consumers had in the national agricultural food accreditation system, to inquire into and examine the consumers' perception of traditional food quality certification performed for the protection of excellent traditional food, and to propose the right direction for the policies on the traditional food quality certification system and the plans to improve consumers' perception of the system. According to the results of this survey performed in married women, based on the 'the recognition of accreditation system' and 'the recognition of certification marks' of 'the seventh national agricultural food accreditation system' presently being used by the Ministry for Food, Agriculture, Forestry and Fisheries, the household food purchasers showed high recognition for eco-friendly agricultural product accreditation, processed food KS certification, and organically processed food certification in that order. Meanwhile, it was shown that they indicated low recognition for the traditional food-related accreditation systems such as 'traditional food quality certification' and 'food grand master'. It was found that reliability of the certification mark provided by the agricultural food accreditation system gained 3.54 points (on a 5-point scale), and 68.1% of the study subjects referred to the certification marks while purchasing agricultural foods. And most of them answered to the question of 'why they referred to the certification marks' saying that it was done 'to choose safe food'. The most frequent answer to question of 'the means to recognize the traditional food quality certification system' was 'broadcasting, advertising'. 57.3% of the subjects had a previous experience of buying a product certified by the traditional food quality certification system, and 93.2% of all the subjects had the intention to buy a product certified by the traditional food quality certification system later. And most of them answered that 'strengthening government policies' would be the most ideal way to inform the public of the traditional food quality certification system. According to the results of this study, while 'relying on the traditional food quality certification system in general' was relatively high among the consumers, 'intention to buy quality certified products by visiting a distantly located store' was low; thus, from this analysis, it can be seen that there is a need for diversification of places selling these quality certified products and to establish a distribution network for these products.

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

OVERVIEW OF KSTAR INTEGRATED CONTROL SYSTEM

  • Park, Mi-Kyung;Kim, Kuk-Hee;Lee, Tae-Gu;Kim, Myung-Kyu;Hong, Jae-Sic;Baek, Sul-Hee;Lee, Sang-Il;Park, Jin-Seop;Chu, Yong;Kim, Young-Ok;Hahn, Sang-Hee;Oh, Yeong-Kook;Bak, Joo-Shik
    • Nuclear Engineering and Technology
    • /
    • v.40 no.6
    • /
    • pp.451-458
    • /
    • 2008
  • After more than 10 years construction, KSTAR (Korea Superconducting Tokamak Advanced Research) had finally completed its assembly in June 2007, and then achieved the goal of first-plasma in July 2008 through the four month's commissioning. KSTAR was constructed with fully superconducting magnets with material of $Nb_3Sn$ and NbTi, and their operation temperatures are maintained below 4.5K by the help of Helium Refrigerator System. During the first-plasma operation, plasmas of maximum current of 133kA and maximum pulse width of 865ms were obtained. The KSTAR Integrated Control System (KICS) has successfully fulfilled its missions of surveillance, device operation, machine protection interlock, and data acquisition and management. These and more were all KSTAR commissioning requirements. For reliable and safe operation of KSTAR, 17 local control systems were developed. Those systems must be integrated into the logically single control system, and operate regardless of their platforms and location installed. In order to meet these requirements, KICS was developed as a network-based distributed system and adopted a new framework, named as EPICS (Experimental Physics and Industrial Control System). Also, KICS has some features in KSTAR operation. It performs not only 24 hour continuous plant operation, but the shot-based real-time feedback control by exchanging the initiatives of operation between a central controller and a plasma control system in accordance with the operation sequence. For the diagnosis and analysis of plasma, 11 types of diagnostic system were implemented in KSTAR, and the acquired data from them were archived using MDSpius (Model Driven System), which is widely used in data management of fusion control systems. This paper will cover the design and implementation of the KSTAR integrated control system and the data management and visualization systems. Commissioning results will be introduced in brief.

Surface-modified Nanoparticle Additives for Wear Resistant Water-based Coatings for Galvanized Steel Plates

  • Becker-Willinger, Carsten;Heppe, Gisela;Opsoelder, Michael;Veith, H.C. Michael;Cho, Jae-Dong;Lee, Jae-Ryung
    • Corrosion Science and Technology
    • /
    • v.9 no.4
    • /
    • pp.147-152
    • /
    • 2010
  • Conventional paints for conversion coating applications in steel production derived mainly from water-based polymer dispersions containing several additives actually show good general performance, but suffer from poor scratch and abrasion resistance during use. The reason for this is because the relatively soft organic binder matrix dominates the mechanical surface properties. In order to maintain the high quality and decorative function of coated steel sheets, the mechanical performance of the surface needs to be improved significantly. In fact the wear resistance should be enhanced without affecting the optical appearance of the coatings by using appropriate nanoparticulate additives. In this direction, nanocomposite coating compositions (Nanomer$^{(R)}$) have been derived from water-based polymer dispersions with an increasing amount of surface-modified nanoparticles in aqueous dispersion in order to monitor the effect of degree of filling with rigid nanoparticles. The surface of nanoparticles has been modified for optimum compatibility with the polymer matrix in order to achieve homogeneous nanoparticle dispersion over the matrix. This approach has been extended in such a way that a more expanded hybrid network has been condensed on the nanoparticle surface by a hydrolytic condensation reaction in addition to the quasi-monolayer type small molecular surface modification. It was expected that this additional modification will lead to more intensive cross-linking in coating systems resulting in further improved scratch-resistance compared to simple addition of nanoparticles with quasi-monolayer surface modification. The resulting compositions have been coated on zinc-galvanized steel and cured. The wear resistance and the corrosion protection of the modified coating systems have been tested in dependence on the compositional change, the type of surface modification as well as the mixing conditions with different shear forces. It has been found out that for loading levels up to 50 wt.-% nanoparticles, the mechanical wear resistance remains almost unaffected compared to the unmodified resin. In addition, the corrosion resistance remained unaffected even after $180^{\circ}$ bending test showing that the flexibility of coating was not decreased by nanoparticle addition. Electron microscopy showed that the inorganic nanoparticles do not penetrate into the organic resin droplets during the mixing process but rather formed agglomerates outside the polymer droplet phase resulting in quite moderate cross linking while curing, because of viscosity. The proposed mechanisms of composite formation and cross linking could explain the poor effect regarding improvement of mechanical wear resistance and help to set up new synthesis strategies for improved nanocomposite morphologies, which should provide increased wear resistance.

The Kinetics of Secondary Response of Antigen-Specific $CD4^+$ T Cells Primed in vitro with Antigen (실험적으로 항원에 의하여 일차 자극된 $CD4^+$ T 세포의 이차 면역 반응의 분석)

  • Park, Seong-Ok;Han, Young-Woo;Aleyas, Abi George;George, June Abi;Yoon, Hyun-A;Eo, Seong-Kug
    • IMMUNE NETWORK
    • /
    • v.6 no.2
    • /
    • pp.93-101
    • /
    • 2006
  • Background: Memory T lymphocytes of the immune system provide long-term protection in response to bacterial or viral infections/immunization. Ag concentration has also been postulated to be important in determining whether T cell differentiation favors effector versus memory cell development. In the present study we hypothesized that naive Ag-specific $CD4^+$ T cells briefly stimulated with different Ag doses at the primary exposure could affect establishment of memory cell pool after secondary immunization. Methods: To assess this hypothesis, the response kinetics of DO11.10 TCR $CD4^+$ T cells primed with different Ag doses in vitro was measured after adoptive transfer to naive BALB/c mice. Results: Maximum expansion was shown in cells primarily stimulated with high doses of ovalbumin peptide $(OVA_{323-339})$, whereas cells in vitro stimulated with low dose were expanded slightly after in vivo secondary exposure. However, the cells primed with low $OVA_{323-339}$ peptide dose showed least contraction and established higher number of memory cells than other treated groups. When the cell division was analyzed after adoptive transfer, the high dose Ag-stimulated donor cells have undergone seven rounds of cell division at 3 days post-adoptive transfer. However, there was very few division in naive and low dose of peptide-treated group. Conclusion: These results suggest that primary stimulation with a low dose of Ag leads to better memory $CD4^+$ T cell generation after secondary immunization. Therefore, these facts imply that optimally primed $CD4^+$ T cells is necessary to support effective memory pool following administration of booster dose in prime-boost vaccination.

Characteristics of Social Security Contained in Mecius's People-Care Theory(保民論) (맹자의 보민론(保民論)이 지닌 사회보장적 성격)

  • Yoo, Jong Kook
    • Korean Journal of Social Welfare
    • /
    • v.65 no.1
    • /
    • pp.109-126
    • /
    • 2013
  • This paper aims to define Mecius's people-care theory(保民論), and aims to recognize the characteristics of social security contained in Mecius's people-care theory. Mecius considered to the public relief as King's obligation. So to speak, the King protects to the property of the people. Especially his people-care theory implicate to continuity of safety life, a relief fund on the property, protection of disaster damage. Continuity of safety life means to enabling the people procurable food, clothing and bury dead persons without difficulties. It's may be said that implicated to the theory and system of modern social-welfare. It is reason for his opinion that a state should construct in the minimum social safety network by taking responsibility for basis needs of life. He was a humanist so much. He thought about the pursuit of the human happiness and the improvement in quality of life. Therefore his idea nearly means to the social security system in a modern sense. His thought is not only an ideal background on the public assistance and a social relief security in the contemporary but also a relief activity system such as Jindaebup called historical prototype of social welfare. It is an important fact that his people-care theory implicate to social security system.

  • PDF

A Design of AES-based WiBro Security Processor (AES 기반 와이브로 보안 프로세서 설계)

  • Kim, Jong-Hwan;Shin, Kyung-Wook
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.7 s.361
    • /
    • pp.71-80
    • /
    • 2007
  • This paper describes an efficient hardware design of WiBro security processor (WBSec) supporting for the security sub-layer of WiBro wireless internet system. The WBSec processor, which is based on AES (Advanced Encryption Standard) block cipher algorithm, performs data oncryption/decryption, authentication/integrity, and key encryption/decryption for packet data protection of wireless network. It carries out the modes of ECB, CTR, CBC, CCM and key wrap/unwrap with two AES cores working in parallel. In order to achieve an area-efficient implementation, two design techniques are considered; First, round transformation block within AES core is designed using a shared structure for encryption/decryption. Secondly, SubByte/InvSubByte blocks that require the largest hardware in AES core are implemented using field transformation technique. It results that the gate count of WBSec is reduced by about 25% compared with conventional LUT (Look-Up Table)-based design. The WBSec processor designed in Verilog-HDL has about 22,350 gates, and the estimated throughput is about 16-Mbps at key wrap mode and maximum 213-Mbps at CCM mode, thus it can be used for hardware design of WiBro security system.

Developing Local Biodiversity Strategies and Action Plans (지자체 생물다양성 관리전략 구축)

  • Kim, Geunhan;Kong, Seok-Jun;Kim, Min-Kyeong;Lee, Moung-Jin;Song, Jiyoon;Jeon, Seong-Woo
    • Journal of Environmental Policy
    • /
    • v.13 no.2
    • /
    • pp.3-20
    • /
    • 2014
  • Due to habitat damage associated with climate change and human activities, biodiversity has decreased all over the world. In order to prevent further reduction in biodiversity, the international community has endeavored to establish a cooperative system, such as the Convention on Biological Diversity (CBD). Until now, most biodiversity strategic planning has been led by the national government. However, the National Biodiversity Strategy and Action Plan is conservative and its strategic plan is vague. Therefore, we propose a method for managing local biological resources called the Local Biodiversity Strategy and Action Plan. In order to provide the strategic plans and detailed plans for the Local Biodiversity Strategy and Action Plan, the report has examined several cases including Convention on Biological Diversity, Strategic Plan for Biodiversity 2011-2020, and the biodiversity strategies and action plans of the Republic of Korea and several other countries. As a result, the report demonstrates the survey and protection of bio-species, the designation and monitoring of conservation region, the management of the integrated eco-network, the establishment of biodiversity organizations and capacity building, the methods to promote networking and traditional knowledge, and the strategy for development in bioindustry. Consequently, the implementation of biodiversity management strategies by local governments will play a significant role in preserving and increasing biodiversity by realizing the goals of Strategic Plan for Biodiversity 2011-2020.

  • PDF