• Title/Summary/Keyword: Protect And Utilize

Search Result 74, Processing Time 0.025 seconds

Anonymity Personal Information Secure Method in Big Data environment (빅데이터 환경에서 개인정보 익명화를 통한 보호 방안)

  • Hong, Sunghyuck;Park, Sang-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.179-185
    • /
    • 2018
  • Big Data is strictly positioning one of method to deal with problems faced with mankind, not an icon of revolution in future anymore. Application of Big Data and protection of personal information have contradictoriness. When we weight more to usage of Big Data, someone's privacy is necessarily invaded. otherwise, we care more about keeping safe of individual information, only low-level of research using Big Data can be used to accomplish public purpose. In this study, we propose a method to anonymize Big Data collected in order to investigate the problems of personal information infringement and utilize Big Data and protect personal. This will solve the problem of personal information infringement as well as utilizing Big Data.

Environments in the East Asia and the way to Utilize Submarines for ROKN: Focused the issue on both American Strategy against China and Japanese Arms Race (동아시아 정세와 한국해군의 잠수함 운용방안 - 미국의 대중(對中) 전략과 일본의 전력 증강을 중심으로 -)

  • Heo, Song
    • Strategy21
    • /
    • s.42
    • /
    • pp.318-346
    • /
    • 2017
  • Currently, security environmental instability is getting worse than ever in the East Asia including to Republic of Korea(ROK). Unlike several conventional issues such as maritime dispute -sometimes with islands- and competitions for getting natural resources, contemporary security dilemma issues followed by arms races among states deepens the power gap between strong and weak state within the region. It is notable that the arms races is the East Asia are mainly focused on naval power. As navy is the very possible force that influences neighboring states, submarine power is usually valued for its nature of stealth, mobile and aggression. Moreover, the submarine power is believed to be one of the highest valued weapon system since it shows actual effectiveness for influencing the other states while avoiding direct military conflicts compared to surface power. As a result, all states within the region are accelerating for getting such power these days. Japan, Most of all, is one of the leading state that aims to ensure self-survival and enlarge military influences under the US-Japan alliance by decisively supporting its power to the American containment strategy against China. In this regard, such movement surely sill influence on ROK both directly and indirectly as we sue the common field, the sea. Though, it has lots of restrictions for us to confront them with military forces as such confrontations within US-led alliances is not desirable upon considering current China and nK threats. As a result, ROK needs to limit the realm of alliance within the region while maintaining ROK-US alliance for getting national interests with both legal and justice superiority against Japan. This paper, as a result, is focused on suggesting the way to utilize submarines as a mean of naval power for both current security environments and the rising maritime threats in the East Asia. I concluded to participate ROK submarines in US-led military strategy against China by dispatching them into the East-China Sea and the North-East area of the Korean peninsula to protect both national interests and justice at the same tome. It should be one of the preemptive measure for confronting with neighboring states by utilizing strategic benefits of submarines while strengthening ROK-US alliances upon participating American Containment Strategy against China.

A Review of the Legal Nature that Users of the Virtual Currency Exchange Obtain and the Compensation Responsibility for the Damages Caused By Internet Problems or Network Errors (가상통화거래소 이용자가 가지는 법적 성격과 전산장애로 인한 손해배상 책임 연구)

  • Choi, JangWon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.287-294
    • /
    • 2018
  • This thesis covers legal aspects of the crypto-currency exchange and the legal rights of crypto-currencies holders. Unlike financial markets in which central authorities or intermediaries determine the validity of transactions and manage records, crypto-currency markets utilize a decentralization system based on block chain technology. Such distinct characteristics distinguish crypto-currency from currency, notes, or financial instruments. Therefore, we need to check closely the legal principles that are applicable to crypto-currency. Crypto-currency users possess rights indirectly through the crypto-currency exchange. However, we should look at whether crypto-currency can be an object of ownership. This research found that legal protection for crypto-currency exchanges are limited. Domestic laws have many shortcomings to protect users' rights. This study found that users who incurred damages due to internet computation errors at exchanges require a protective system like stock markets. Therefore, studies on the legal controls and system regulations are required to protect users' rights. Also, crypto-currency information exchanges keep inside and protections for users' private information need to be further examined.

Characteristic Analysis of Lithium-ion Battery and Lead-acid Battery using Battery Simulator (배터리 시뮬레이터를 이용한 리튬이온 배터리와 납축전지 특성분석)

  • Yongho Yoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.127-132
    • /
    • 2024
  • Recently, secondary batteries, commonly known as rechargeable batteries, find widespread applications across various industries. Particularly valued for their compact and lightweight characteristics, they play a crucial role in diverse portable electronic devices such as smartphones, laptops, and tablets, offering high energy density and efficient charge-discharge capabilities. Moreover, they serve as vital components in electric vehicles and contribute significantly to the field of renewable energy as part of Energy Storage Systems(ESS). However, despite advancements in this technology, issues such as reduced lifespan, cracking, damage, and even the risk of fire can arise due to excessive charging and discharging of secondary batteries. To address these challenges, Battery Management System(BMS) are employed to protect against overcharging and improve overall performance. Nevertheless, understanding the protective range settings of BMS using lithium-ion batteries, the most commonly used secondary batteries, and lead-acid batteries can be challenging. Therefore, this paper aims to utilize a battery charge-discharge tester and simulator to investigate the charging and discharging characteristics of lithium-ion batteries and lead-acid batteries, addressing the associated challenges of reduced lifespan, cracking, damage, and fire hazards in secondary batteries.

A Study of Improving Plan of Security Guard's Sixth Sense Utilization (경호원의 제육감(第六感)활용 향상방안에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.305-319
    • /
    • 2008
  • There are always possibilities for conflicts among individuals, between individuals and groups, and among groups because of the complex and diverse nature of contemporary society. Some form of bodyguard is required to protect oneself from this constant possibility of conflicts and thus the concept of security was developed to meet the needs of one's safety. Furthermore, the increase in the number of crime and intellectual crimes now threatens not only the people with power, fortune, reputation but also all citizens. Meeting the need for safety became a challenging task for the world and a security-related industry as well as security-related careers were born. Therefore, schools and security institutions must provide education and training to nurture morality and stable psychological condition for their students/trainees. In order to offer them such working and educational environments, utilizing the sixth-sense the five senses is recommended and it is called security psychology training. This study identifies the psychology, the five senses, and the sixth sense of bodyguards while on duty and explores the training and education contents to utilize the sixth sense.

  • PDF

A Study on the Protection and Utilization of Personal Information for the Operation of Artificial Intelligence and Big Data in the Fourth Industrial Revolution (4차 산업혁명기 인공지능과 빅데이터 운용을 위한 개인정보 보호와 이용에 관한 연구)

  • Choi, Won Sang;Lee, Jong Yong;Shin, Jin
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.63-73
    • /
    • 2019
  • In the 4th Industrial Revolution, information is collected and analyzed from people and objects through the rapid development of ICT. It is possible to create value. However, there are many legal and institutional restrictions on the collection of information aimed at people.Therefore, in-depth research on the protection and use of personal information in the rapidly changing cyber security environment is needed. The purpose of this study is to protect and utilize personal information for the operation of AI (Artificial Intelligence) and big data during the 4th Industrial Revolution. It is to seek a paradigm shift. The organization of the research for this is: Chapter 1 examines the meaning of personal information during the 4th Industrial Revolution, Chapter 2 presents the framework for the review and analysis of prior research. In Chapter 3, after analyzing policies for the protection and utilization of personal information in major countries, Chapter 4 looks at the paradigm shift in personal information protection during the 4th Industrial Revolution and how to respond. Chapter 5 made some policy suggestions for the protection and utilization of personal information.

Optimization of Cooperative Sensing in Interference-Aware Cognitive Radio Networks over Imperfect Reporting Channel

  • Kan, Changju;Wu, Qihui;Song, Fei;Ding, Guoru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1208-1222
    • /
    • 2014
  • Due to the low utilization and scarcity of frequency spectrum in current spectrum allocation methodology, cognitive radio networks (CRNs) have been proposed as a promising method to solve the problem, of which spectrum sensing is an important technology to utilize the precious spectrum resources. In order to protect the primary user from being interfered, most of the related works focus only on the restriction of the missed detection probability, which may causes over-protection of the primary user. Thus the interference probability is defined and the interference-aware sensing model is introduced in this paper. The interference-aware sensing model takes the spatial conditions into consideration, and can further improve the network performance with good spectrum reuse opportunity. Meanwhile, as so many fading factors affect the spectrum channel, errors are inevitably exist in the reporting channel in cooperative sensing, which is improper to be ignored. Motivated by the above, in this paper, we study the throughput tradeoff for interference-aware cognitive radio networks over imperfect reporting channel. For the cooperative spectrum sensing, the K-out-of-N fusion rule is used. By jointly optimizing the sensing time and the parameter K value, the maximum throughput can be achieved. Theoretical analysis is given to prove the feasibility of the optimization and computer simulations also shows that the maximum throughput can be achieved when the sensing time and the parameter of K value are both optimized.

A Study on the Physicochemical Characteristics and Formation Age of Coastal Sand Dunes in the Okjukdong and Dajindong, Daecheong Island (대청도 옥죽동·대진동 사구의 물리·화학적 특성 및 퇴적시기 고찰)

  • Shin, Won Jeong;Kim, Jong Wook;Kim, Jong Yeon
    • Journal of The Geomorphological Association of Korea
    • /
    • v.25 no.2
    • /
    • pp.63-80
    • /
    • 2018
  • The purpose of this study was to investigate the physicochemical characteristics and formation age of sand dunes in the Okjukdong and Dajindong, Daecheong Island. As a result, most of the sand deposited in Okjukdong were composed of medium sized sand with moderately well sorted. The $SiO_2$ and $Al_2O_3$ accounted for a very high proportion of these deposits. There were some differences in characteristics between the sands in the dune and beach, whereas similar characteristics were observed among the materials (OJ-B, OJ-C and OJ-D) in the dune. In case of Dajindong, heterogeneous geochemical characteristics were found in the lower point. It was estimated that this was due to the influence of Daejin-dong black beach. Age dating results showed that uncovered dunes in Okjukdong were deposited $0.44{\pm}0.02$ ~ $0.50{\pm}0.02ka$, and sand depositsin Dajindong were formed $0.16{\pm}0.01$ ~ $0.18{\pm}0.01ka$. In both Okjukdong and Dajindong, sand deposits estimated to be formed 70 years ago, therefore it can be estimated that sand movement was active throughout the area from about hundred years ago. In this study area, the growth of sand dunes has been active in recent several decades or hundred years. It seems that there were different regions where deposits predominated over time. The source of dune sand was also different from time to time. Since the windbreak forest was established, the natural growth of sand dunes was limited, and sand nourishment was carried out by period. Therefore, in order to protect and continuously utilize coastalsand dunesin Daecheong Island, it is necessary to prepare conservation plan.

Cysteine improves boar sperm quality via glutathione biosynthesis during the liquid storage

  • Zhu, Zhendong;Zeng, Yao;Zeng, Wenxian
    • Animal Bioscience
    • /
    • v.35 no.2
    • /
    • pp.166-176
    • /
    • 2022
  • Objective: Sperm is particularly susceptible to reactive oxygen species (ROS) stress. Glutathione (GSH) is an endogenous antioxidant that regulates sperm redox homeostasis. However, it is not clear whether boar sperm could utilize cysteine for synthesis GSH to protect sperm quality from ROS damage. Therefore, the present study was undertaken to elucidate the mechanism of how cysteine is involved in protecting boar sperm quality during liquid storage. Methods: Sperm motility, membrane integrity, lipid peroxidation, 4-hydroxyIlonenal (4-HNE) modifications, mitochondrial membrane potential, as well as the levels of ROS, GSH, and, ATP were evaluated. Moreover, the enzymes (GCLC: glutamate cysteine ligase; GSS: glutathione synthetase) that are involved in glutathione synthesis from cysteine precursor were detected by western blotting. Results: Compared to the control, addition of 1.25 mM cysteine to the liquid storage significantly increased boar sperm progressive motility, straight-line velocity, curvilinear velocity, beat-cross frequency, membrane integrity, mitochondrial membrane potential, ATP level, acrosome integrity, activities of superoxide dismutase and catalase, and GSH level, while reducing the ROS level, lipid peroxidation and 4-HNE modifications. It was also observed that the GCLC and GSS were expressed in boar sperm. Interestingly, when we used menadione to induce sperm with ROS stress, the menadione associated damages were observed to be reduced by the cysteine supplementation. Moreover, compared to the cysteine treatment, the γ-glutamylcysteine synthetase (γ-GCS) activity, GSH level, mitochondrial membrane potential, ATP level, membrane integrity and progressive motility in boar sperm were decreased by supplementing with an inhibitor of GSH synthesis, buthionine sulfoximine. Conclusion: These data suggest that boar sperm could biosynthesize the GSH from cysteine in vitro. Therefore, during storage, addition of cysteine improves boar sperm quality via enhancing the GSH synthesis to resist ROS stress.

A Framework of Service Level Agreement for Activating Cloud Services (클라우드서비스 활성화를 위한 서비스수준협약(SLA) 프레임워크)

  • Seo, Kwang-Kyu
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.173-186
    • /
    • 2018
  • While cloud services are expanding, many users are having difficulty in adopting cloud services. This is because there is no information as to which cloud services can be trusted by users. loud service level agreement (Cloud SLA) is an agreement between cloud service providers and cloud service consumers using qualitative and quantitative indicators including quality and performance, etc. of cloud services. In this study, we propose a framework for cloud SLA that can be applied to the domestic cloud industry to improve service levels for cloud service providers and to protect users and also derive the detailed components of cloud SLA applicable to the domestic cloud industry using the proposed framework. Through this result, it is expected that the government will utilize the policy to enhance the reliability between cloud service providers and users under "the Act on the Development of Cloud Computing and Protection of Users", and eventually to activate cloud services by improving the quality and performance level of domestic cloud services and building a user trust.