• Title/Summary/Keyword: Protection time

Search Result 2,887, Processing Time 0.029 seconds

MPEG-21 Terminal (MPEG-21 터미널)

  • 손유미;박성준;김문철;김종남;박근수
    • Journal of Broadcast Engineering
    • /
    • v.8 no.4
    • /
    • pp.410-426
    • /
    • 2003
  • MPEG-21 defines a digital item as an atomic unit lot creation, delivery and consumption in order to provide an integrated multimedia framework in networked environments. It is expected that MPEG-21 standardization makes it Possible for users to universally access user's preferred contents in their own way they want. In order to achieve this goal, MPEG-21 has standardized the specifications for the Digital Item Declaration (DID). Digital Identification (DII), Rights Expression Language (REL), Right Data Dictionary (RDD) and Digital Item Adaptation (DIA), and is standardizing the specifications for the Digital Item Processing (DIP), Persistent Association Technology (PAT) and Intellectual Property Management and Protection (IPMP) tot transparent and secured usage of multimedia. In this paper, we design an MPEG-21 terminal architecture based one the MPEG-21 standard with DID, DIA and DIP, and implement with the MPEG-21 terminal. We make a video summarization service scenario in order to validate ow proposed MPEG-21 terminal for the feasibility to of DID, DIA and DIP. Then we present a series of experimental results that digital items are processed as a specific form after adaptation fit for the characteristics of MPEG-21 terminal and are consumed with interoperability based on a PC and a PDA platform. It is believed that this paper has n important significance in the sense that we, for the first time, implement an MPEG-21 terminal which allows for a video summarization service application in an interoperable way for digital item adaptation and processing nth experimental results.

Determination of Design Basis for a Storage System for Spent Fuel in Korea (국내 사용후핵연료 저장시스템의 설계기준 설정 인자 고찰)

  • Yoon, Jeong-Hyoun;Lee, Eun-Yong;Woo, Sang-In;Kim, Tae-Man
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.9 no.2
    • /
    • pp.113-119
    • /
    • 2011
  • Safe operation and maintenance of engineered dry storage systems for spent fuel from nuclear power plants basically depends on adequately adopted design requirements. The most important design target of the system are those which provide the necessary assurances that spent fuel can be received, handled, stored and retrieved without undue risk to health and safety of workers and the public. To achieve these objectives, the design of the system incorporates features to remove spent fuel residual heat, to provide for radiation protection, and to maintain containment over the lifespan of the system as specified in the design specifications. The features also provide for all possible anticipated operational occurrences and design basis events in accordance with the design basis as guided by the designated regulations. The general performance requirements of a projected storage system are introduced in this paper. The storage system is designed to store fuel assemblies in associated with designated regulatory requirements. Small increases/decreases in maximum burnup can be adjusted with cooling time. These variations are compensated for by a corresponding small site-specific increase/decrease in the design basis-cooling period, as long as the maximum heat load and radioactivity of loaded fuel assemblies are met. Generic design basis events considered for the storage system are summarized. Shielding and radiological requirements along with mechanical and structural are derived in this study.

A Study on the Preparation of Powder Coatings Containing Halogen-Free Flame Retardant and Fire Safety (Halogen-Free 난연제를 포함하는 파우더 코팅소재 제조 및 화재안전성 연구)

  • Lee, Soon-Hong;Chung, Hwa-Young;Kim, Dae-In;Noh, Tae-Joon
    • Journal of the Korean Society of Safety
    • /
    • v.26 no.4
    • /
    • pp.47-58
    • /
    • 2011
  • Halogen free intumescent flame retardants(IFRS), such as the mixture of melamine phosphate(MP) and char forming agents(pentaerythritol(PER), di-pentaerythritol(DiPER), tris(2-hydroxyethyl) isocyanurate(THEIC)), were prepared and characterized. Polypropylene(PP)/$IFR_S$ composites were also prepared in the presence of ethylene diamine phosphate(EDAP) as a synergist and used into flame retardant PP powder coatings. Thermoplastic PP powder coatings at 20 wt% flame retardant loading were manufactured by extruded and then mechanical cryogenic crushed to bring them in fine powder form. These intumescent flame retardant powder coatings($IFRPC_S$) were applied on mild steel surface for the purpose of protection and decorative. It is a process in which a $IFRPC_S$ particles coming in contact with the preheated mild steel surface melt and form a thin coating layer. The obtained MP flame retardant was analyzed by utilizing FTIR, solid-state $^{31}P$ NMR, ICP, EA and PSA. The mechanical properties as tensile strength, melt flow index(MFI) and the thermal property as TGA/DTA and the fire safety characteristics as limiting oxygen index(LOI), UL94 test, SEM were used to investigate the effect of $IFRPC_S$. The experimental results show that the presence of $IFR_S$ considerably enhanced the fire retardant performances as evidenced by the increase of LOI values 17.3 vol% and 32.6 vol% for original PP and $IFRPC_S$-3(PP/MP-DiPER/EDAP), respectively, and a reduction in total flaming combustion time(under 15 sec) in UL94 test of $IFRPC_S$. The prepared $IFRPC_S$-3 have good comprehensive properties with fire retardancy 3.2 mm UL94 V-0 level, LOI value 32.6%, tensile strength $247.3kg/cm^2$, surface roughness Ra $0.78{\mu}m$, showing a better application prospect. Through $IFRPC_S$-2(PP/MP-PER/EDAP) and $IFRPC_S$-3 a better flame retardancy than that of the $IFRPC_S$-1(PP/MP/EDAP) was investigated which was responsible for the formed more dense and compact char layer, improved synergy effect of MP and PER/DiPER.

A Query Result Integrity Assurance Scheme Using an Order-preserving Encryption Scheme in the Database Outsourcing Environment (데이터베이스 아웃소싱 환경에서 순서 보존 암호화 기법을 이용한 질의 결과 무결성 검증 기법)

  • Jang, Miyoung;Chang, Jae Woo
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Recently, research on database encryption for data protection and query result authentication methods has been performed more actively in the database outsourcing environment. Existing database encryption schemes are vulnerable to order matching and counting attack of intruders who have background knowledge of the original database domain. Existing query result integrity auditing methods suffer from the transmission overhead of verification object. To resolve these problems, we propose a group-order preserving encryption index and a query result authentication method based on the encryption index. Our group-order preserving encryption index groups the original data for data encryption and support query processing without data decryption. We generate group ids by using the Hilbert-curve so that we can protect the group information while processing a query. Finally, our periodic function based data grouping and query result authentication scheme can reduce the data size of the query result verification. Through performance evaluation, we show that our method achieves better performance than an existing bucket-based verification scheme, it is 1.6 times faster in terms of query processing time and produces verification data that is 20 times smaller.

An Efficient Secure Routing Protocol Based on Token Escrow Tree for Wireless Ad Hoc Networks (무선 애드 혹 네트워크에서 보안성을 고려한 Token Escrow 트리 기반의 효율적인 라우팅 프로토콜)

  • Lee, Jae Sik;Kim, Sung Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.4
    • /
    • pp.155-162
    • /
    • 2013
  • Routing protocol in ad hoc mobile networking has been an active research area in recent years. However, the environments of ad hoc network tend to have vulnerable points from attacks, because ad hoc mobile network is a kind of wireless network without centralized authentication or fixed network infrastructure such as base stations. Also, existing routing protocols that are effective in a wired network become inapplicable in ad hoc mobile networks. To address these issues, several secure routing protocols have been proposed: SAODV and SRPTES. Even though our protocols are intensified security of networks than existing protocols, they can not deal fluidly with frequent changing of wireless environment. Moreover, demerits in energy efficiency are detected because they concentrated only safety routing. In this paper, we propose an energy efficient secure routing protocol for various ad hoc mobile environment. First of all, we provide that the nodes distribute security information to reliable nodes for secure routing. The nodes constitute tree-structured with around nodes for token escrow, this action will protect invasion of malicious node through hiding security information. Next, we propose multi-path routing based security level for protection from dropping attack of malicious node, then networks will prevent data from unexpected packet loss. As a result, this algorithm enhances packet delivery ratio in network environment which has some malicious nodes, and a life time of entire network is extended through consuming energy evenly.

A Study on Interdependence of Private Security and Techniques of CPTED (민간경비와 환경설계를 통한 범죄예방(CPTED) 기법의 상호의존성에 관한 연구)

  • Lee, Jung-Duk;Lim, You-Seok
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.223-249
    • /
    • 2011
  • In modern society, citizens' quality of life aspects of safety and crime prevention activities are actively considering the incidence of crime prevention in advance. It also can be quite important elicit the interest of who community members through effective crime prevention strategies. For crime prevention policies and techniques over time as more scientific and advanced methods are made. Today, A typical crime prevention strategies is private security zones and Crime Prevention Through Environmental Design (CPTED) is a corresponding to the new strategy. CPTED is a diversification can be called a crime prevention approach that emphasizes the principle of natural surveillance, access control, territoriality, activity support, maintenance and management. The defensible space of the space area related to crime prevention setting the activities of private security and CPTED determine. Also, the reality of crime prevention and protection should be considered space. The emphasis on proactive prevention of crime in modern society for the prevention of crime how to approach differing perspectives and disparate aspects of private security and CPTED. Technical and professional areas that overlap to some extent in a homogeneous aspect. Ultimately, CPTED is a crime prevention through space and environmental approach for crime. In addition, Ultimate goal of convergence, crime prevention, with the same or higher is required to study for the area after looking for the characteristics and limitations of private security and CPTED.

  • PDF

The Legal Issues of Private Investigation Service in WTO/FTA System : Study of South Korea (WTO/ FTA 체제에서 민간조사업의 법적문제)

  • Ko, Ji-Hoon;Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.161-195
    • /
    • 2011
  • As crimes have increased to an extent that the police cannot cope with, there have been continuous discussions for the introduction of Private Investigation (hereafter PI) in Korea. However, attempts to legislate for the introduction of PI have failed every time PI bills for the introduction of PI were proposed. This was fundamentally because arguments both for and against the introduction of PI were sharply divided depending on the priorities. However, regardless of those clash of views, an apparent need for the legislation of PI service has arisen. As Korea opens its service market to other countries through GATS and FTAs, currently existing domestic PI law has been found to be inconsistent with international agreements such as GATS and KOREA-US(KORUS) FTA. This paper found that the Act on Usage and Protection of Credit Information which regulates PI service is inconsistent with the Article 12.4(a)(i) and (iii) of KORUS FTA and the Article 7.11 and the Article 7.13 of KOREA-EU FTA. If Korea does not modify the existing laws and establish new laws in relation to PI, such inconsistencies could lead to international trade disputes which could amount to billions of dollars. In this regard, the passage of the PI bill is necessary.

  • PDF

A Study on the Improvement Measures for Training of Special Security Guard (특수경비원 교육훈련의 개선방안에 관한 연구)

  • Choi, Eun-Ha;Yoo, Young-Jae;Lee, Sang-Bin
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.357-371
    • /
    • 2008
  • Currently, the security operations in nation's key foundations in Korea are performed by private police and special security guard in accordance with the Private Police Act and Security Business Act, respectively. In 1960s, The Korean Government introduced the private police system in terms of the national security issues, but it was just a hurriedly-set plan on the basis of Japanese Sunsa system as by that time there was no such system revitalized. However, the special security guards could offer wider range of security services including those of the private police with the enactment and revision of the Security Business Act 1976 and April 2001, respectively. Moreover, the expectations and interests rose over the special security guards in nation's key foundations after 9.11Terror Event in the U. S. 2001. However, as we investigated the current education/training system for the special security guard, we found that such education/training which is not activating the specialty of special security guard will not respond to the social demands. Special security guard owns its own characteristics other than those of general security guard as they are in service in nation's key foundations. Thus, the effcient management and training for the special security guard is the most important matter for the safety and security of nation's key foundations. Therefore, the well-educated special security guard through the reorganized and specialized education/training for the protection of nation's key foundations is expected to offer qualitatively improved security services.

  • PDF

Myocardial Injury Following Aortic Valve Replacement for Severe Aortic Stenosis: Risk Factor of Postoperative Myocardial Injury and Its Impact on Long-Term Outcomes

  • Lee, Chee-Hoon;Ju, Min Ho;Kim, Joon Bum;Chung, Cheol Hyun;Jung, Sung Ho;Choo, Suk Jung;Lee, Jae Won
    • Journal of Chest Surgery
    • /
    • v.47 no.3
    • /
    • pp.233-239
    • /
    • 2014
  • Background: As hypertrophied myocardium predisposes the patient to decreased tolerance to ischemia and increased reperfusion injury, myocardial protection is of utmost importance in patients undergoing aortic valve replacement (AVR) for severe aortic valve stenosis (AS). Methods: Consecutive 314 patients (mean age, $62.5{\pm}10.8$ years; 143 females) with severe AS undergoing isolated AVR were included. Postoperative myocardial injury (PMI) was defined as 1) maximum postoperative creatinine kinase isoenzyme MB or troponin-I levels ${\geq}10$ times of reference, 2) postoperative low cardiac output syndrome or episodes of ventricular arrhythmia, or 3) left ventricular ejection fraction of less than 55% and decrease in left ventricle (LV) ejection fraction of more than 20% of the baseline value. Results: There were 90 patients (28.7%) who developed PMI. There were five cases of early death (1.6%), all of whom had PMI. On multivariable analysis, the use of histidine-tryptophan-ketoglutarate (HTK) solution instead of blood cardioplegia (odds ratio [OR], 3.06; 95% confidence interval [CI], 1.63 to 5.77; p=0.001), greater LV mass (OR, 1.04; 95% CI, 1.01 to 1.07; p=0.007), and increased cardiac ischemic time (OR, 1.13; 95% CI, 1.05 to 1.22; p<0.001) were independent predictors for PMI. Patients who had PMI showed significantly inferior long-term survival than those without PMI (p=0.049). Conclusion: PMI occurred in a considerable proportion of patients undergoing AVR for severe AS and was associated with poor long-term survival. HTK cardioplegia, higher LV mass, and longer cardiac ischemic duration were suggested as predictors of myocardial injury.

Comparison of the Characteristics of Seed Germination and the First Stage of Growth in Cynanchum wilfordii (Maxim.) by Different Light Conditions (광조건별 백수오의 종자 발아 특성 및 초기생육 비교)

  • Yoo, Ji Hye;Seong, Eun Soo;Lee, Jae Geun;Kim, Chul Joong;Choi, Jae Hoo;Lee, Gi Hye;Hwang, In Seong;Hwang, Eun Bee;Lim, Jung Dae;Ahn, Young Sup;Park, Chung Berm;Yu, Chang Yeon
    • Korean Journal of Medicinal Crop Science
    • /
    • v.21 no.5
    • /
    • pp.329-333
    • /
    • 2013
  • This study was carried out to compare the characteristics of seed germination and the first stage of growth in Cynanchum wilfordii (Maxim.) by different light conditions such ass fluorescent light, dark and light emitting diode (LED). There was not much difference from the germination rate of C. wilfordii (Maxim.) in different light conditions for 10 days. The highest of germination rate occurred over 91.11 percentage by LED red condition at $26^{\circ}C$. Also mean germination velocity and promptness index were represented the highest results of 2.3 ea/day and 52.67 under red light, respectively. But mean germination time under both LED red and blue light was represented low data that it takes over three days for germinating of seed. Even though handling both LED red and blue lights, the germination uniformity was not constant. These results may help our understanding of variations in germination characteristics for C. wilfordii (Maxim.) seeds treated under different light conditions.