• Title/Summary/Keyword: Security Target

Search Result 697, Processing Time 0.023 seconds

A Scheme of Compensation System for Farmers' Accidents through the Example of Germany (독일의 사례를 통해 본 농업인재해 보장체계 구축 방안)

  • Min, Byeong-Wook;Kim, Hyo-Chel;Lee, Kyung-Suk
    • Journal of Agricultural Extension & Community Development
    • /
    • v.18 no.3
    • /
    • pp.351-384
    • /
    • 2011
  • The purpose of this study is to look at the case of the German compensation system for farmers' accidents and to build a basic scheme in our country's compensation system for farmers' accidents. When you view examples of Germany, the social insurance scheme for farmers accidents in korea should be design as an independent institution from the existing industrial accident insurance, and it comes to relationships with other social insurance system, preferably with complementary personalities. A general rule of the compensation system applies to all farmers in principle but the coverage limits part-time farmers. Financial burden consists of the mix of insurance premium and state aid. The type and level of benefits is similar to the current industrial accident insurance, which give priority to places on economic security for keeping farmworks, such as cost for using temporary farmers, rather than income loss. In terms of financial system, pay-as-you-go system would be better because of immediate payment with the introduction of the compensation system. The compensation system might be managed and administrated by the existing nationwide organization. Of course, for operating of system review and further research on the technical details such as premium issues and funding problems of government support, the exact classification of the target coverage, premiums based on estimated income for the farmers' estimation, the exact statistical data on the accumulation of agricultural disaster is needed.

An Anonymous Authentication Scheme for Health Information Push Service Based on Indoor Location in Hospital (병원 실내 위치기반 의료정보 푸쉬 서비스를 위한 익명 인증 스킴)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.410-419
    • /
    • 2012
  • This paper proposes a secure and efficient anonymous authentication scheme for health information push service based on indoor location in hospital. The proposed scheme has the following benefits: (1)It is just based on a secure one-way hash function for avoiding complex computations for both health care operations users and health care centers. (2)It does not require sensitive verification table which may cause health care centers to become an attractive target for numerous attacks(e.g., insertion attacks and stolen-verifier attacks), (3)It provides higher security level (e.g., secure mutual authentication and key establishment, confidential communication, user's privacy, simple key management, and session key independence). As result, the proposed scheme is very suitable for various location-based medical information service environments using lightweight-device(e.g., smartphone) because of very low computation overload on the part of both health care operations users and health care centers.

Cable Effect Analysis Inside an Electrically Large Structure from an External Electromagnetic Waves (전자파에 의한 대형구조물 내부 케이블 영향 해석)

  • Lee, Jae-Min;Yoon, Seong-Sik;Lee, Jae-Wook;Han, Jung-Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.2
    • /
    • pp.155-158
    • /
    • 2017
  • With the help of technical development in the electronic industries, the electronic devices employing the cutting-edged technology are spread in all the area requiring electromagnetic communications. Especially, because of the presence of electronic devices in a variety of research fields like automotive vehicle, train, and aircraft, the research area such as the malfunction and critical damage of the internal system and microwave devices due to the unexpected radiated high-powered EM effects are very important even for the possible occurrence of human damage. In this paper, the effects of electromagnetic fields into the cable connecting the electronic devices and many sensors inside the target structure is treated because of potential malfunction or hardware disorders. In addition, correlation function and transmission line theory have been employed for the analysis of the induced current on the cable inside an electrically large resonant structure.

Sizing System Development of Korean Structural Firefighting Protective Clothing (한국 소방용 방화복의 치수체계 개발)

  • Han, Sul-Ah;Nam, Yun-Ja;Choi, Young-Lim
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.5
    • /
    • pp.827-839
    • /
    • 2009
  • Sizing system of Korean structural firefighting protective clothing that is national approved should be met for specification of structural firefighting protective clothing that is identified by Ministry of Public Administration and Security(MOPAS). However if you look over the specification of sizing system, the standard is based on only 'height' and the others are indicated as the size of completed product. KS K ISO 13688 and EN 340 which is met on ISO 13688 which indicates sizing system about protective clothing has the standards of height, chest and waist circumference. Also NFPA 1971 that has standards of sizing system is based on chest circumference, cervical to wrist length, waist circumference and inseam. That is different from Korean standards. Therefore, fire fighting protective clothing standards which is based on only height should be compensated and not be relied on foreign standards like ISO. It is indispensable for developing our own sizing system of structural fire fighting protective clothing. In this studying, Korean new sizing system of structural fire fighting protective clothing was developed for providing basic information of ergonomic structural fire fighting protective clothing. The analyzed target age was between 20 and 59 years old fire fighter who extinguish the fire. And it was analyzed by 3D measurement among data of the $5^{th}$ Size Korea. On conclusion, in case of structural fire fighting protective clothing coat, physical dimension was to be chest circumference, cervical to wrist length. Three dimensions as 5cm space of circumference and four dimensions as 2.5cm space of cervical to wrist length were derived, which means that totally 12 dimensions were defined. Dimension standards of pants was based on the analysis of waist circumference and crotch height. Six dimensions as 5cm space of waist circumference and three dimensions as 5cm space of crotch height were derived, which means that totally 14 dimensions were defined.

The Flipped Classroom Design for Capability Enhancement of Big-Data Analysis (빅데이터 분석의 역량 강화를 위한 거꾸로 교실 설계 연구)

  • Jung, Byoungho;Kim, Byungcho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.127-145
    • /
    • 2017
  • The purpose of this study is to empirical case study for the instructional design of flipped classroom by job-capability advancement of IT business majors. A student of IT business school has learned a lot of management educations for four years. But, they don't recognize a connection between school education and business practice. A subject based on the humanities, and social sciences consisted of mostly the memorization. The undergraduate class lack a practice's curriculum by a creative-oriented lesson rather than memorization-oriented. In particular, An IT business is now recognized as a significance emerging IT investment, the Internet of Things, information security, big data and strategy's ERP. For these reasons, it is important for an instructional design for understanding business practices of the students. Accordingly, Flipped classroom with participatory class be needed increasingly for students' practical sense. We will propose a design method of flipped classroom for inspiring business education. In this, new instructional design overturned traditional teaching method. After the student conducts a prior learn at home, school will accomplish a problem solving through question and answer. This design effected a boredom suppress and creative enforcement of student and an intimacy increase of instructor. In addition, A participatory class and reciprocal peer tutoring will be possible by a spontaneous self-directed learning of student. We were designed course of project type based on big data theory and application to target the fourth-year course. In conclusion, the new instruction provided a help to learning synergy between student and lecturer. During the lessons, the student showed improvement of business sense and enhanced problem solving capability. The lecturer has the intimacy through communication interaction with students.

Strategies Building Knowledge_Base to Respond Effectively to Advanced Cyber Threats (고도화된 사이버 위협에 효과적으로 대응하기 위한 Knowledge_Base 구축전략)

  • Lee, Tae-Young;Park, Dong-Gue
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.357-368
    • /
    • 2013
  • Our society has evolved into a fully connected society in a mixed reality environment enabling various knowledge sharing / management / control / creation due to the expansion of broadband ICT infrastructure, smart devices, cloud services and social media services. Therefore cyber threats have increased with the convenience. The society of the future can cause more complex and subtle problems, if you do not have an effective response to cyber threats, due to fusion of logical space and physical space, organic connection of the smart object and the universalization of fully connected society. In this paper, we propose the strategy to build knowledge-base as the basis to actively respond to new cyber threats caused by future various environmental changes and the universalization of fully connected society.

Infrared Image Segmentation by Extracting and Merging Region of Interest (관심영역 추출과 통합에 의한 적외선 영상 분할)

  • Yeom, Seokwon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.6
    • /
    • pp.493-497
    • /
    • 2016
  • Infrared (IR) imaging is capable of detecting targets that are not visible at night, thus it has been widely used for the security and defense system. However, the quality of the IR image is often degraded by low resolution and noise corruption. This paper addresses target segmentation with the IR image. Multiple regions of interest (ROI) are extracted by the multi-level segmentation and targets are segmented from the individual ROI. Each level of the multi-level segmentation is composed of a k-means clustering algorithm an expectation-maximization (EM) algorithm, and a decision process. The k-means clustering algorithm initializes the parameters of the Gaussian mixture model (GMM) and the EM algorithm iteratively estimates those parameters. Each pixel is assigned to one of clusters during the decision. This paper proposes the selection and the merging of the extracted ROIs. ROI regions are selectively merged in order to include the overlapped ROI windows. In the experiments, the proposed method is tested on an IR image capturing two pedestrians at night. The performance is compared with conventional methods showing that the proposed method outperforms others.

Intrusion Situation Classification Model for Intelligent Intrusion Awareness (지능적인 침입 인지를 위한 침입 상황 분류 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.134-139
    • /
    • 2019
  • As the development of modern society progresses rapidly, the technologies of society as a whole are progressing and becoming more advanced. Especially in the field of security, more sophisticated and intelligent attacks are being created. Meanwhile, damaging situations are becoming several times larger than before Therefore, it is necessary to re-classify and enhance the existing classification system. It is required to minimize the intrusion damage by actively responding to intelligent intrusions by applying this classification scheme to currently operating intrusion detection systems. In this paper, we analyze the intrusion type caused by intelligent attack We propose a new classification scheme for intrusion situations to guarantee the service safety, reliability, and availability of the target system, We use this classification model to lay the foundations for the design and implementation of a smart intrusion cognitive system capable of early detection of intrusion, the damages caused by intrusion, and more collections active response.

Survey on Analysis and Countermeasure for Hacking Attacks to Cryptocurrency Exchange (암호화폐 거래소 해킹 공격 분석 및 해결 방안 연구: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.1-6
    • /
    • 2019
  • As the value of technical information increases, hacking attacks are trying to steal technical information through hacking. Recently, hacking of cryptocurrency exchanges is much easier to monetize than existing technical information, making it a major attack target for hackers. In the case of technical information, it is required to seize the technical information and sell it to the black market for cashing.In the case of cryptocurrency, most hacking attacks are concentrated on cryptocurrency exchanges because it is easy to cash out and not easy to track when successful hacking. Although technology cannot be hacked, cryptocurrency transactions traded on cryptocurrency exchanges are not recorded on the blockchain which is simply internal exchanges, so insiders may manipulate the quotes and leave gaps or leak out. Therefore, this research analyzes the recent hacking attacks of cryptocurrency exchanges and proposes solutions to secure cryptocurrency trading.

Countermeasure of Uumanned Aerial Vehicle (UAV) against terrorist's attacks in South Korea for the public crowded places (국내 소프트 타깃 대상 드론테러의 법제도 개선방안 연구)

  • Oh, Hangil
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.49-66
    • /
    • 2019
  • Purpose: This study aims to apply the counter terrorism policy in pertain to malicious drone abuse and the croweded public places in South Korea. And, to improve counter terrorism protection measure, this study suggests an adoptation of Anti UAV technology into counter terrorism related regulation. Method: Compared to nations' operations of counter terrorism prevention and protection activities with the South Korean gov, problems and limitations are suggested. Results: Anti UAV technology could not be applied for Multi-user facilities by any law due to the limitation, so that it is required to amend counte terrporism related policies and law. Conclusion: This study intends to identify various protection methods against UAV threats. To reduce the risk of UAV, the law of public safety and counter terrorism should be promoted and reinforced for the first.