• Title/Summary/Keyword: Security Factor

Search Result 1,100, Processing Time 0.03 seconds

A Study on the Third Party Logistics Service Enforcement of Inland Container Depot at Busan area (부산지역 ICD의 TPL(Third Party Logistics) 서비스의 기능 강화에 관한 연구)

  • Choi, Young-Bong;Lee, Chun-Su
    • Journal of Korea Port Economic Association
    • /
    • v.25 no.3
    • /
    • pp.165-182
    • /
    • 2009
  • The purpose of this paper is to study on the third party logistics service enforcement of inland container depot at Pusan area. The main results of this paper are as follows: First, the inland container depot related to location selecting factor researches analyzed and korean TPL market reviewed. Second, the TPL service function reinforcement method and investments are mentioned. In detail the 9 factors are as follows: competitive high position and improvements of harbor back complex, ICD goods enterprise investment strategies, the harbor back which is inexpensive only the rent, taxes benefit and incentive, site security and base facility expansion, the goods service provision which is flexible, connection plan construction of goods enterprise, the incentive strategic establishment which is discriminated, the marketing activity which is long-term. and lastly the ICD and TPL Policy are needed that government and logistic enterprise's cooperation gains competitive advantage.

  • PDF

A Study on Converting the Data of Probability of Hit(Ph) for OneSAF Model (OneSAF 모델을 위한 명중률 데이터 변환 방법)

  • Kim, Gun In;Kang, Tae Ho;Seo, Woo Duck;Pyun, Jae Jung
    • Journal of the Korea Society for Simulation
    • /
    • v.29 no.3
    • /
    • pp.83-91
    • /
    • 2020
  • To use the OneSAF model for the analysis of Defence M&S, the most critical factor is the acquisition of input data. The model user is hard to determine the input data such as the probability of hit(Ph) and the probability of kill(Pk). These data can be obtained directly by live fire during the development test and the operational test. Therefore, this needs more time and resources to get the Ph and Pk. In this paper, we reviewed possible ways to obtain the Ph and Pk. We introduced several data producing methodologies. In particular, the error budget method was presented to convert the Ph(%) data of AWAM model to the error(mil) data of OneSAF model. Also, the conversion method which can get the adjusted results from the JMEM is introduced. The probability of a hit was calculated based on the error budget method in order to prove the usefulness of the given method. More accurate data were obtained when the error budget method and the projected area from the published photo were used simultaneously. The importance of the Ph calculation was demonstrated by sensitivity analysis of the Ph on combat effectiveness. This paper emphasizes the importance of determining the Ph data and improving the reliability of the M&S system though steady collection and analysis of the Ph data.

Influencing Factors to Enrollment in Private Health Insurance and Medical Use by Life Cycle : Analysis of 2016-2019 Korea Welfare Panel (생애주기별 민간의료보험 가입 영향 요인 및 의료이용 행태 : 2016~2019년 한국복지패널자료를 사용하여)

  • Kim, Ji-On
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.194-204
    • /
    • 2021
  • This study was conducted to find out the status and factors of private health insurance subscriptions by life cycle and to identify differences in medical usage behavior by life cycle. Using the SPSS 26 program as the 12th-15th (2016-2019) data of the Korea Welfare Panel, the difference subscriptions was identified as Chi-square by demo social and health characteristics of 58,223 people, and the factors affecting subscription were analyzed by polynomial logistic analysis and average analysis was performed for medical use behavior. As a result of the analysis, the biggest factor in purchasing private health insurance was household income, private health insurance coverage is the highest in growth period, and multiple subscriptions were made depending on household income. In youth, household income, spouse, and no disability, and middle age, household income, economic activities, spouses, and health levels were largely influential factors. The rate of private health insurance coverage in old age was the lowest, and low-income households, poor health levels, and people with disabilities were lower. The increase in medical use by private health insurance subscribers also occurred during growth and youth. It is necessary to strengthen the national health insurance coverage, and the role of private health insurance to supplement it should be established in time for the life cycle to complement each other, eliminating blind spots of medical security and maximizing people's health and well-being.

Leased Line Traffic Prediction Using a Recurrent Deep Neural Network Model (순환 심층 신경망 모델을 이용한 전용회선 트래픽 예측)

  • Lee, In-Gyu;Song, Mi-Hwa
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.10
    • /
    • pp.391-398
    • /
    • 2021
  • Since the leased line is a structure that exclusively uses two connected areas for data transmission, a stable quality level and security are ensured, and despite the rapid increase in the number of switched lines, it is a line method that is continuously used a lot in companies. However, because the cost is relatively high, one of the important roles of the network operator in the enterprise is to maintain the optimal state by properly arranging and utilizing the resources of the network leased line. In other words, in order to properly support business service requirements, it is essential to properly manage bandwidth resources of leased lines from the viewpoint of data transmission, and properly predicting and managing leased line usage becomes a key factor. Therefore, in this study, various prediction models were applied and performance was evaluated based on the actual usage rate data of leased lines used in corporate networks. In general, the performance of each prediction was measured and compared by applying the smoothing model and ARIMA model, which are widely used as statistical methods, and the representative models of deep learning based on artificial neural networks, which are being studied a lot these days. In addition, based on the experimental results, we proposed the items to be considered in order for each model to achieve good performance for prediction from the viewpoint of effective operation of leased line resources.

Effects of Social Support and Chronic Medical Conditions on Depressive Symptoms in Elderly People Living Alone in a Rural Community (농촌지역 독거노인의 사회적 지지 및 만성 의학적 질환이 우울증상에 미치는 영향)

  • Chae, Cholho;Lee, Sangsoo;Park, Chul-Soo;Kim, Bong-Jo;Lee, Cheol-Soon;Lee, So-Jin;Lee, Dongyun;Seo, Ji-Yeong;Ahn, In-Young;Choi, Jae-Won;Cha, Boseok
    • Journal of the Korean society of biological therapies in psychiatry
    • /
    • v.24 no.3
    • /
    • pp.184-193
    • /
    • 2018
  • Objectives : This study investigated the effects of social support and chronic medical conditions on depressive symptoms in elderly people living alone in a rural community. Methods : Sociodemographic information on 173 subjects aged 65 years or older who lived alone in a rural community and were recipients of National Basic Livelihood Security was collected and analyzed. All participants completed the Korean Form of the Geriatric Depression Scale and the Lubben Social Network Scale. Additionally, the current prevalence of chronic medical conditions that interfere with the activities of daily living was examined. Multiple logistic regression analysis was conducted to analyze the associations of social support and chronic medical conditions with depressive symptoms. Results : Social support(odds ratio: OR, 0.96; 95% confidence interval: 95% CI, 0.92-0.99) and chronic medical conditions(OR, 1.59; 95% CI, 1.23-2.05) were significantly associated with depressive symptoms in all subjects. When analyzed by gender, social support served as a protective factor against depressive symptoms in elderly men only(OR, 0.91; 95% CI, 0.83-0.99), and chronic medical conditions increased the risk of depressive symptoms in elderly women only(OR, 1.74; 95% CI, 1.26-2.40). Furthermore, osteoarthritis and lumbar pain were risk factors for depressive symptoms in all subjects(OR, 2.24; 95% CI, 1.10-4.56 and OR, 2.10; 95% CI, 1.08-4.12) and in elderly women(OR, 4.07; 95% CI, 1.68-9.84 and OR, 3.34; 95% CI, 1.47-7.57), respectively. Conclusion : This study indicates that improving the social support and managing the chronic medical conditions of elderly people living alone are important for the prevention of depression in this population. Additionally, the present results suggest that it is necessary to establish different depression-prevention strategies for elderly men and women living alone.

Analysis of Al-Saggaf et al's Three-factor User Authentication Scheme for TMIS

  • Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.89-96
    • /
    • 2021
  • In this paper, we analyzed that the user authentication scheme for TMIS(Telecare Medicine Information System) proposed by Al-Saggaf et al. In 2019, Al-Saggaf et al. proposed authentication scheme using biometric information, Al-Saggaf et al. claimed that their authentication scheme provides high security against various attacks along with very low computational cost. However in this paper after analyzing Al-Saggaf et al's authentication scheme, the Al-Saggaf et al's one are missing random number s from the DB to calculate the identity of the user from the server, and there is a design error in the authentication scheme due to the lack of delivery method. Al-Saggaf et al also claimed that their authentication scheme were safe against a variety of attacks, but were vulnerable to password guessing attack using login request messages and smart cards, session key exposure and insider attack. An attacker could also use a password to decrypt the stored user's biometric information by encrypting the DB with a password. Exposure of biometric information is a very serious breach of the user's privacy, which could allow an attacker to succeed in the user impersonation. Furthermore, Al-Saggaf et al's authentication schemes are vulnerable to identity guessing attack, which, unlike what they claimed, do not provide significant user anonymity in TMIS.

Philippines 2017: Warlike Powers of Security Forces and Hedging Strategies in Foreign Relation (필리핀 2017: 호전적 내치(內治)와 줄타기 외교)

  • KIM, Dong-Yeob;JUNG, Bub Mo
    • The Southeast Asian review
    • /
    • v.28 no.2
    • /
    • pp.181-212
    • /
    • 2018
  • In 2017, the government of Duterte, in the second year of the ruling, more strongly promoted peace and order policies and expressed independent diplomacy as the chairman of ASEAN. He continued to fight against drugs and tried to increase his political legitimacy through the punishment for corrupt officials. He also declared martial law in the Mindanao region because of the dissolution of the Maute group, a Muslim terrorist organization, and strengthened counterterrorism cooperation externally. In addition, as to Communist militants, he took the initial reconciliation gesture and promoted peace negotiations, however, concluded the peace tide and started the suppression operation due to a series of bloodshed. He still has a strong drive in peace and order issues, backed up by high support rate, but it is becoming a factor of anxiety as the socioeconomically underprivileged and minority groups are increasingly alienated. As the chairman of ASEAN, Duterte has a certain distance from the United States, which is a firm ally, but has turned to increase familiarity with China and Russia, which can take substantial economic benefits. Through diversifying the external economic support and increase of tax revenue, the priority task was to establish the infrastructure. Although the Philippines, which has a high economic growth rate, has a strong expectation that it can establish a solid infrastructure, tax reforms should be successfully completed in order not to repeat the previous failures, which has traditionally increased foreign debt burden by relying on external resources. It seems that it is necessary to find the meeting point of the foreign policy of Duterte and new Korean government's New Southern Policy, and to find possible economic cooperation policies to improve Philippine infrastructure.

Effect of Hypersonic Missiles on Maritime Strategy: Focus on Securing and Exploiting Sea Control (극초음속 미사일이 해양전략에 미치는 영향: 해양통제의 확보와 행사를 중심으로)

  • Cho, Seongjin
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.241-271
    • /
    • 2020
  • The military technology currently receiving the most attention is the hypersonic missile. hypersonic is faster than the speed of sound or Mach 5+. The vast majority of the ballistic missiles that it inspired achieved hypersonic speeds as they fell from the sky. Rather than speed, today's renewed attention to hypersonic weapons owes to developments that enable controlled flight. These new systems have two sub-varieties: hypersonic glide vehicles and hypersonic cruise missiles. Hypersonic weapons could challenge detection and defense due to their speed, maneuverability, and low altitude of flight. The fundamental question of this study is: 'What effect will the hypersonic missile have on the maritime strategy?' It is quite prudent to analyze and predict the impact of technology in the development stage on strategy in advance. However, strategy is essential because it affect future force construction. hypersonic missiles act as a limiting factor in securing sea control. The high speed and powerful destructive power of the hypersonic missile are not only difficult to intercept, but it also causes massive ship damage at a single shot. As a result, it is analyzed that the Securing sea control will be as difficult as the capacity of sea denial will be improved geographically and qualitatively. In addition, the concept of Fortress Fleet, which was criticized for its passive strategy in the past, could be reborn in a modern era. There are maritime power projection/defence, SLOC attack/defence in exploiting sea control. The effects of hypersonic missiles on exploiting sea control could be seen as both limiting and opportunity factors.

  • PDF

Analysis of relative importance priority based on blockchain technology characteristics using AHP technique (AHP 기법을 이용한 블록체인 기술 특성 기반 상대적 중요도 우선순위 분석)

  • Oh, Kyoung-Sang;Lee, Dong-Myung
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.239-250
    • /
    • 2021
  • When considering the introduction of a new technology, it is important to accurately grasp and selectively apply the technical characteristics related to the technology in order to fully utilize the advantages of the technology. In this study, the technical characteristics of high relative importance were analyzed in order to increase the efficiency of new application of blockchain technology by companies. The technical characteristics of the blockchain identified through previous research were reclassified from the perspective of the system hierarchy, and sub-factors of the technical characteristics were derived. In addition, a questionnaire survey on the relative importance of technical characteristics was conducted for internal experts and SI experts using the Analytical Hierarchy Process (AHP) technique. As a result of the analysis, respondents evaluated data protection as the most important factor in the threat of hacking related to security. In addition, it was different that the comparison results of the importance of the technical characteristics between the experts in the company and the SI experts and the priority of the technical characteristics between the expert groups by industry. It is expected that the results of this study will be usefully utilized when using blockchain technology in enterprises in line with the upcoming changes of the 4th industrial revolution. An empirical analysis of the internal and external factors required for adoption of blockchain technology by industry and the effect of technology introduction will be a meaningful study.

Collision Risk Assessment by using Hierarchical Clustering Method and Real-time Data (계층 클러스터링과 실시간 데이터를 이용한 충돌위험평가)

  • Vu, Dang-Thai;Jeong, Jae-Yong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.4
    • /
    • pp.483-491
    • /
    • 2021
  • The identification of regional collision risks in water areas is significant for the safety of navigation. This paper introduces a new method of collision risk assessment that incorporates a clustering method based on the distance factor - hierarchical clustering - and uses real-time data in case of several surrounding vessels, group methodology and preliminary assessment to classify vessels and evaluate the basis of collision risk evaluation (called HCAAP processing). The vessels are clustered using the hierarchical program to obtain clusters of encounter vessels and are combined with the preliminary assessment to filter relatively safe vessels. Subsequently, the distance at the closest point of approach (DCPA) and time to the closest point of approach (TCPA) between encounter vessels within each cluster are calculated to obtain the relation and comparison with the collision risk index (CRI). The mathematical relationship of CRI for each cluster of encounter vessels with DCPA and TCPA is constructed using a negative exponential function. Operators can easily evaluate the safety of all vessels navigating in the defined area using the calculated CRI. Therefore, this framework can improve the safety and security of vessel traffic transportation and reduce the loss of life and property. To illustrate the effectiveness of the framework proposed, an experimental case study was conducted within the coastal waters of Mokpo, Korea. The results demonstrated that the framework was effective and efficient in detecting and ranking collision risk indexes between encounter vessels within each cluster, which allowed an automatic risk prioritization of encounter vessels for further investigation by operators.