• Title/Summary/Keyword: Out-of-step protection

Search Result 51, Processing Time 0.026 seconds

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

One-Year Continuous Measurement of Outdoor Radon Progeny Concentration in Beijing Area

  • Zhang, Lei;Wang, Yunxiang;Guo, Qiuju
    • Journal of Radiation Protection and Research
    • /
    • v.45 no.3
    • /
    • pp.95-100
    • /
    • 2020
  • Background: Compared with reported data of radon concentration, data of radon progeny concentration is limited in general, especially in outdoor environment. Materials and Methods: To know both the level and the variation of radon progeny concentration in outdoor environment in Beijing area, one-year continuous measurement with a cycle of 60 minutes was carried out by a step-advanced filter (SAF) monitor for radon progeny measurement. The observation site was located in a park in Eastern Beijing area, and the observation period was from October 17, 2018 to September 29, 2019. Results and Discussion: The equivalent equilibrium concentration (EEC) of radon progeny varies from 0.7 to 19.1 Bq·m-3, with an annual average of 4.9 ± 2.7 Bq·m-3. A clear diurnal variation of EEC, higher in the early morning and lower in the late afternoon, is observed due to the high sensitivity of the SAF monitor. Conclusion: Vertical convection of atmospheric boundary layer is thought to be the main reason of this phenomenon. For annual variation, the lowest monthly average EEC appeared in April, while the highest appeared in November, which might attribute to the atmospheric stability in different seasons.

A study on enclosure in Daesoeng-dong Site, Kimhae (김해(金海) 대성동(大成洞) 환호유적(環濠遺蹟) 연구(硏究))

  • Jung, Eui-Do
    • Korean Journal of Heritage: History & Science
    • /
    • v.35
    • /
    • pp.28-56
    • /
    • 2002
  • There is no definite theory, which archeologists have believed to be built either for the protection or ceremonial purpose, of enclosure historical site exhibited from Bronze Age to Samhan era in Korea. The main conditions of choosing right enclosure were natural levee-backswamp-plateau, which all found in village on a hill. For this reasons Kimhae Daesoeng-dong enclosure discovered in 2001 is not an exception, and therefore this enclosure has been believed to be a beginning point of the farming society. In Korea there have been 2 types of enclosure. One is that enclosure entirely surrounds whole historic site itself and the other is that enclosure partially does. Although Kimhae Daesoeng-dong historic site has been discovered only part of it, it's not believed to have the first type-which surrounds the whole enclosure historic site In this research, 3 developing steps of enclosure historic site were defined. Enclosure surrounds only a part of the historic site is 1st step. Enclosure surrounds all around the site is 2nd step. The site discovered with big round clay pottery and developed into multiple enclosure is 3rd step. Since some researches have not been accomplished, the hypothesis above was suggested to have a better understanding of the development of enclosure historic site. The purpose of enclosure has been separately explained for the protection or for the ceremony. It is difficult to assert that excavation sites could be applied to only one of two purposes. But it is possible that both purposes of enclosure such as protection and as division from ceremonial area could be applied together. Kimhae Daesoeng-dong enclosure was shown for the purpose of division from ceremonial area. But we can not ignore that since Kimhae Daesoeng-dong enclosure exposed to the Sea and dwelling area was not shown from village hill, it would be probably for the protection. However enclosure of Gujibong village area in Daesoeng-dong had used for ceremonial purpose since the Bronze Age, even this enclosure would be possible to play an important role of being a center of legend of Gaya foundation. Many unsolved questions are still lying ahead. The enclosure was used for a short time, even if dwelling area was found in and out of enclosure, there were no differences between them, and although duplicate and triplicate enclosure were found, we could not sure which were before and after. Also we could not confirm the type of enclosure with location condition which was the flat land or the top of hill on floodplain. We should not divide the types of enclosure historic site due to differences from cross section of stratum. And I expect that we will have much data such as distribution of enclosure historic site in Yeongnam area where is concerned with origin and diffusion of Japan and China.

Protection of Cultural Heritage for the Modern Ages in Japan (일본 근대문화유산의 보호시책에 관한 연구)

  • Kim, Tai-Young;Kim, Dong-Sik
    • Journal of architectural history
    • /
    • v.9 no.2 s.23
    • /
    • pp.101-116
    • /
    • 2000
  • Many cultural heritages for the modern ages in Korea are becoming lost rapidly as a result of subsequent technological innovation and changes in industrial structures and other reasons. But they are indispensable for an understanding of history, tradition culture of Korea, and form the basis for development and advancement of future culture at the same time. Therefore, this study is aimed to review the protection of cultural heritage in Japan, establishing the protection policies in Korea. In Japan, The Advisory Committee for the Preservation and Utilization of Modern Cultural heritage was organized by The Agency for Cultural Affairs. And this classified modern cultural heritage into four fields, as like; (1)monuments, (2)buildings, (3)fine arts and historical heritage, and (4)life, culture, and technology to pursue concrete research and study. The next step is tarrying out investigations to identify these cultural heritages, which were once the backbone of Japanese modernization and are now in the process of being lost, in an effort to preserve them as cultural heritage of the Japanese modernization period. The investigation will have conducted on an about eight year scheme starting with 1996. And it's will ask all local boards of education(of the prefectures, cities, towns, and villages throughout the country) to supply all related records or documents available and to cooperate in field studies. So now, many cultural heritages for the modern ages in Japan have been designated as Important Cultural Properties, Registered Tangible Cultural Properties, Monuments, etc. And they have been prepared various tax policy(ex, reduction of the real estate tax). Also, that's examples are not only one by one but magnified with protection of large-scale construction associated with region. In addition, magnified with region's activities. In conclusion, in the process, protection has been extended to a broader variety of cultural properties and much consideration has been given to the methods of protection in Japan.

  • PDF

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

Porcine Knock-in Fibroblasts Expressing hDAF on α-1,3-Galactosyltransferase (GGTA1) Gene Locus

  • Kim, Ji-Woo;Kim, Hye-Min;Lee, Sang-Mi;Kang, Man-Jong
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.25 no.10
    • /
    • pp.1473-1480
    • /
    • 2012
  • The Galactose-${\alpha}1$,3-galactose (${\alpha}1$,3Gal) epitope is responsible for hyperacute rejection in pig-to-human xenotransplantation. Human decay-accelerating factor (hDAF) is a cell surface regulatory protein that serves as a complement inhibitor to protect self cells from complement attack. The generation of ${\alpha}1$,3-galactosyltransferase (GGTA1) knock-out pigs expressing DAF is a necessary step for their use as organ donors for humans. In this study, we established GGTA1 knock-out cell lines expressing DAF from pig ear fibroblasts for somatic cell nuclear transfer. hDAF expression was detected in hDAF knock-in heterozygous cells, but not in normal pig cells. Expression of the GGTA1 gene was lower in the knock-in heterozygous cell line compared to the normal pig cell. Knock-in heterozygous cells afforded more effective protection against cytotoxicity with human serum than with GGTA1 knock-out heterozygous and control cells. These cell lines may be used in the production of GGTA1 knock-out and DAF expression pigs for xenotransplantation.

A Prediction Model for the Radiation Safety Management Behavior of Medical Cyclotrons (의료용 Cyclotron의 방사선안전관리 행위 예측모형)

  • Jung, Ji-Hye;Han, Eun-Ok;Kim, Ssang-Tae
    • Journal of Radiation Protection and Research
    • /
    • v.33 no.2
    • /
    • pp.77-86
    • /
    • 2008
  • This study attempted to provide reference materials for improving the behavior level in radiation safety managements by drawing a prediction model that affects the radiation safety management behavior because the radiation safety management of medical Cyclotrons, which can be used to produce radioisotopes, is an important factor that protects radiation caused diseases not only for radiological operators but average users. In addition, this study obtained follows results through the investigation applied from January 2 to January 30, 2008 for the radiation safety managers employed in 24 authorized organizations, which have already installed Cyclotrons, through applying a specific form of questionnaire in which the validity was guaranteed by reference study, site investigation, and focus discussion by related experts. The radiation safety management were configured as seven steps: Step 1 is a production preparation step, Step 2 is an RI production step, Step 3 is a synthesis step, Step 4 is a distribution step, Step 5 is a quality control step, Step 6 is a carriage container packing step, and Step 7 is a transportation step. it was recognized that the distribution step was the most exposed as 15 subjects (62.5%), the items of 'the sanction and permission related works' and 'the guarantee of installation facilities and production equipments' were the most difficult as 9 subjects (37.5%), and In the trouble steps in such exposure, the item of 'the synthesis and distribution' steps were 4 times, respectively (30.8%). In the score of the behavior level in radiation safety managements, the minimum and maximum scores were 2.42 and 4.00, respectively, and the average score was $3.46{\pm}0.47$ out of 4. Prosperity and well-being programs in the behavior and job in radiation safety managements (r=0.529) represented a significant correlation statistically. In the drawing of a prediction model based on the factors that affected the behavior in radiation safety managements, general characteristics, organization characteristics, and selfefficacy didn't show a significant path statistically in which the prosperity and well-being programs in job characteristics affected the behavior in radiation safety managements. Therefore, it is necessary to establish a strategy that improves the level of prosperity and well-being levels in job characteristics in order to increase the behavior in radiation safety managements. Thus, this study provides basic materials for the radiation safety management of Cyclotron through the full-scale investigation that is first applied in Korea.

Basic Research on Revetments Development of Erosion Protection for Coastline Creation of Hydrophilic Environment by Field Observation (현장관측에 의한 친환경 해안조성을 위한 침식방지 호안공 개발에 관한 기초적 연구)

  • Lee, Jong-Seok;Han, Jae-Myung
    • Journal of Korea Water Resources Association
    • /
    • v.41 no.10
    • /
    • pp.983-993
    • /
    • 2008
  • In recent times, sea level increasing caused by abnormal weather and global warming, sea-sand dredging and complex development causes various kind of erosion damages onto the coastal area in the world. The various types of erosion control and protection methods are applied but there are no signs of fruitful effectiveness. The PC concrete protection block for shore protection structure is practically installed in globally but most of structures in the present day became villainous because of bad accessability. In this study, hydrophilic revetments for control and protection of coastline erosion will be developed in order to make up for a faculty of the shore erosion protection block with better accessibility and excellent protection ability. Experimental measurements were researched to insure for the capacity and facility on reflection coefficient, overtopping volume, and overtopping height characteristics of newly developed shore erosion protection block in model tests. As the result, hydraulic model tests show much excellent than the general step block. Field tests were carried out also to verify through vegetative test on an affinity and construction work test of control-protection on coastline erosion with actual utilization. In the latter case, deposition of sand accumulation occurred in fairly short time at the established reaches and then we can be confirmed to utilize for newly developed block as the revetments for control and protection of coastline erosion.

Considering the Multi-Purpose Display Designed for Aircraft Lightning Protection (낙뢰보호를 고려한 항공기용 다목적 디스플레이 설계)

  • Cheon, Young-Ho;Lee, Seoung-Pil;Park, Jun-Hyeon
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.445-454
    • /
    • 2014
  • In this paper, we introduce measures designed content for RTCA DO-160 F, Section 22 tests performed to verify the effects of indirect lightning and testing process of the test was carried out in the multi-purpose display certification process. This is referred to as indirect effects of lightning capability of an aircraft having electrical electronic equipment failure or damage to bring lightning induced voltages. In order to protect the avionics from lightning indirect effects of these aircraft are analyzing the effects of lightning strikes on aircraft and aircraft systems and interior design needs protection against the threat on their part. In this paper, we introduce RTCA DO-160 F, component selection process according to Section 22 category selection method and the selected level for determining the level of such measures for protection against lightning of multipurpose display for this aircraft. It also introduces the actual test process to confirm that the designed effectiveness of the selected part. We expect a good example of the lightning planned for future development of measures designed avionics through each step of the process introduced this.

Privacy Protection and RFID(Radio Frequency IDentification) (RFID와 프라이버시 보호)

  • Lee, Cheol-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.443-446
    • /
    • 2006
  • RFID is the core of realizing ubiquitous environment. This is expected to improve economical effect through related industry revitalization, make-work, and so on, in the future, and to be linked to social see-through enhancement via national life change. However unchecked RFID use lets retailers collect unprecedented huge information and they link it to customer information database, so the voice of worry to bring about a result of trampling down consumer privacy doesn't make a negligible situation. Although RFID system is spreaded out socially, the servicing of law and system is not accomplished to protect individuals from personal information violation threat. At the same time, in ubiquitous computing environment, to protect individual information efficiently, from the step of planning and deciding this technology system, constitutional law, norm, the basic legal rights of the people, and so forth is to be considered. The objective of the research is to persent the privacy protection from the viewpoints of law on RFID.

  • PDF