• Title/Summary/Keyword: Security and Safety

Search Result 2,156, Processing Time 0.03 seconds

A Study on the AI Home Care Solution for the Mobile Vulnerable (이동약자를 위한 AI 홈케어 솔루션에 관한 연구)

  • ChangBae Noh;Wonshik Na
    • Journal of Industrial Convergence
    • /
    • v.21 no.4
    • /
    • pp.165-170
    • /
    • 2023
  • There are cases where the mobility impaired have difficulty moving from the moment they leave the house. If guardians also do not have time to entrust their families, who are socially disadvantaged, to a shelter, the guardian has no choice but to check directly in order to know the location of the guardian. The AI home care solution was designed to relieve the anxiety and labor of caregivers and to provide convenience for protection facility officials and users. If more facilities distribute and use services free of charge to non-profit foundations and protective facilities, the concern of guardians will be reduced, and the burden of facility officials who have to manage facility users will be reduced. In this paper, we provide emergency notification services to guardians in the event of an emergency as well as location and status alarms for guardians, which are all data related to movement, in consideration of the mobility vulnerable. Furthermore, it is necessary to provide a service function that recommends the optimal route using a navigation function to ease the convenience and burden of facility officials. It is necessary to alleviate anxiety by providing necessary information to the guardian, such as the location of the shuttle used by the mobile weak and the time of getting on and off. In addition, while providing services for free, the goal is to improve the quality of service for facility managers and the quality of service for the mobility weak.

A Disaster Victim Management System Using Geographic Information System (지리정보시스템을 활용한 재난피해자 관리시스템)

  • Hwang, Hyun-Suk;Choi, Eun-Hye;Kim, Chang-Soo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.1
    • /
    • pp.59-72
    • /
    • 2011
  • The research of psychological supporting systems as safety and welfare for disaster victims damaged psychologically as well as physically by a sudden disaster to return to effectively their social life has been carried. The domestic National Emergency Management Agency(NEMA) is operating the Disaster Victim Psychology Support Center that helps with curing damaged psychology and studies the transmission system of psychology management services, the classification of victims for disaster psychology support, and emergency consultation method to systemically support disaster psychology management. However, current psychology supporting centers provide the simple information for supporting centers such as medical and social welfare organizations. The development research of IT-based management systems to obtain needed information to construct the proposed systems curing psychological damage is still primitive step. Therefore, this paper shall propose a GIS-based integrated management system for victims and managers to effectively share related information one another and to return to victims' social life as soon as possible. Also, we implement a simple prototype system based on the Web. The proposed system supports the spatial search and statistical analysis based on map as well as keyword search, because having the location information on disaster victims, damage occurrence places, welfare and medical institutions, and psychological supporting centers. In addition, this system has the advantage reducing the frequency of disaster damage by providing aids in making efficient policy systems for the managers.

A Study of Strength Reduction Factor Preparation for Circular Concrete Columns confined by Carbon Sheet Tube (카본시트튜브로 구속된 원형 콘크리트 기둥의 강도감소계수 제안에 관한 연구)

  • Lee, Kyoung-Hun
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.20 no.6
    • /
    • pp.106-112
    • /
    • 2016
  • In this study, circular concrete column specimens confined by carbon sheet tube with different winding angles and different number of carbon sheet plies(3T, 5T and 7T) were tested to propose design equations and a strength reduction factor. Specimens were designed by 300 mm diameter and 600 mm height with $90^{\circ}{\pm}0^{\circ}$, $90^{\circ}{\pm}30^{\circ}$, $90^{\circ}{\pm}45^{\circ}$, $90^{\circ}{\pm}60^{\circ}$, $90^{\circ}{\pm}75^{\circ}$ and $90^{\circ}{\pm}90^{\circ}$ carbon fiber angles. A 10,000 kN UTM was used for compressive strength test of specimens by displacement control method with 0.01 mm/sec velocity. Estimation equations of compressive strength and ultimate strain of circular concrete column specimens confined by carbon sheet tube using a regression analysis and a strength reduction factor to apply ultimate strength design method of concrete were proposed. The strength reduction factor(${\phi}$) of circular concrete columns confined by carbon sheet tube was estimated as 0.64 by the Monte Carlo Analysis Method. Manufacture and construction process have to be perfectly managed by construction managers because the structural capacities of carbon tubes were depends on construction abilities of manufacturing operators.

A Study on Image Integrity Verification Based on RSA and Hash Function (RSA와 해시 함수 기반 이미지 무결성 검증에 관한 연구)

  • Woo, Chan-Il;Goo, Eun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.11
    • /
    • pp.878-883
    • /
    • 2020
  • Cryptographic algorithms are used to prevent the illegal manipulation of data. They are divided into public-key cryptosystems and symmetric-key cryptosystems. Public-key cryptosystems require considerable time for encryption and decryption compared to symmetric-key cryptosystem. On the other hand, key management, and delivery are easier for public-key cryptosystems than symmetric-key cryptosystems because different keys are used for encryption and decryption. Furthermore, hash functions are being used very effectively to verify the integrity of the digital content, as they always generate output with a fixed size using the data of various sizes as input. This paper proposes a method using RSA public-key cryptography and a hash function to determine if a digital image is deformed or not and to detect the manipulated location. In the proposed method, the entire image is divided into several blocks, 64×64 in size. The watermark is then allocated to each block to verify the deformation of the data. When deformation occurs, the manipulated pixel will be divided into smaller 4×4 sub-blocks, and each block will have a watermark to detect the location. The safety of the proposed method depends on the security of the cryptographic algorithm and the hash function.

A Study of Policy Direction on O2O industry developing (O2O산업 발전을 위한 정책방향 연구)

  • Kim, Hee Yeong;Song, Seongryong
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.13-25
    • /
    • 2017
  • The purpose of this study is to suggest the direction of O2O industry policy for solving the conflict problems with the traditional industry stakeholder and for enhancing the regulations as new industry development is inevitable. We make use of TAIDA that is one of scenario methods to accomplish the purpose and suggest the direction of policy. First, it is needed to prepare directly by government the environment that new business models are able to emerge easily with various consulting services and information supports like public system servers and IT infra, it is practical support policy. Second, positive legal application for new business and making the law for new business are needed in legal issues situation as soon as possible. Third, the conflicts with old and new industry would be managed to the direction of "predictable" progressively. Incongruity among laws, safety and security problems, and the conflict of stakeholder are urgent. Because of the limit in this study, it is expected that O2O industry is categorized in detail aligned to the characteristics and that new policies along to the separate industry areas are developed by the following study.

A Study on the Liability of Air Carrier for Damages of the Third Parties (지상제삼자(地上第三者)의 손해(損害)에 대한 공중운송인(空中運送人)의 책임(責任)에 관한 고찰(考察))

  • Park, Heon-Mok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.163-191
    • /
    • 1989
  • The accident of the midair collision, passengers' falling or goods' dropping occurs or supersonic aircraft make a sonic boom during their conveying passengers or goods to the destination. The accident in transmit damages the their parties on the surface or their properties. In these cases, the third parties who were harmed to their lives or properties have the right to claim damages against the air carrier who caused them. These matters have become one of the important things since aircraft conveyed passengers and goods. Therefore, it is a great concern to settle these matters by law. But the Safety of the present aircraft has been much increased and the aircraft have become larger in size. Its flight altitude became higher than before. So the relationship of the aircraft to the third parties is much different from that of the earlier aircraft. The air transport is now indispensable to our life. It is not so easy to control these matters. In the early part of 20th century, when the third parties suffered the damage, many European countries made laws on the basis of the principle of liability without fault. But each country had a variety of its own law, and different kinds of difficulties have been brought about. Accordingly, the Rome Convention on Surface Damage (1933, 1952, 1978) has been made and revised. In spite of being revised, it contains many problems, and is not carried into effect world-wide. On the other hand, there are no regulations about the compensation of the third parties damaged in Korean existing laws. In case the damage is brought about to them, it is obviously true that the settlement of the liability of compensation for damage should be made by the general principle on the tort in domestic laws. At this point, it is urgent that we make a special law though the domestic legislation as a preliminary measure before we sign the international convention to save third damaged. It is desirable that we should, for the responsibility of the air carriage for the demage of the third parties on the surface, bring in the theory of the absolute liability in view of the legislation of many conutries. As the aircraft fly in the sky, their flight always contains some danger. It is very difficult to prove the fault, and the operator should suffer the principle of liability without fault or the similiar one. In case the liability without fault will be imposed upon the operator for the damage of the third parties, it is necessary to bring in the liability protection system for the protection and up upbringing of the air carriage. The Burden of danger of the air carriage will be reduced by introducing the system. A domestic legislation measure should be necessarily taken as soon as possible as a legal security measure on these matters.

  • PDF

Estimation of Sodium Hydroxide Waste Origin-Destination Matrices for Preventing Hazardous Material Transportation Disasters

  • Kim, Geun-Young;Jung, Tae-Hwa;Kim, Sang-Won
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.9 no.1
    • /
    • pp.73-79
    • /
    • 2009
  • Hazardous materials (HazMats) are substances that are flammable, explosive, toxic, or harmful, if released into the environment. Since the transportation of HazMats increases in many developed countries, HazMat transportation has the key function in the process of HazMat usage to trace information of production, storage, shipment, usage, and waste disposal. The Korean Ministry of Environment (KMOE) and the National Emergency Management Agency (NEMA) have developed many laws, regulations, and standards for hazardous materials. However, the Korean HazMat laws, regulations, and standards do not guarantee accurate information of HazMat origin-destination (O-D) shipments, though the HazMat O-D movement is the critical information in safety and security of HazMat transportation. The objectives of this research are: (1) to investigate emerging and recurrent issues in Korean HazMat transportation, and (2) to develop the estimation method of O-D matrices for hazardous materials under limited data sets. The sodium hydroxide waste shipment among forty candidate HazMats is selected as the sample research case. The growth-factor method is applied to estimate the 2005 O-D matrix of sodium-hydroxide waste shipment. The column-and-row factoring process is used to calibrate the estimated sodium-hydroxide O-D matrix. The result shows the applicability of the O-D estimation process for hazardous materials. The Sodium Hydroxide Waste Origin-Destination Matrix is obtained to trace routes and paths of the Sodium Hydroxide transportation.

A Study on the Social Perception of Jiu-Jitsu Using Big data Analysis (빅데이터 분석을 활용한 주짓수의 사회적 인식 연구)

  • Kun-hee Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.209-217
    • /
    • 2024
  • The purpose of this study is to explore development plans by analyzing social interests and perceptions of jiu-jitsu using big data analysis. Network analysis, centrality analysis, and CONCOR analysis were conducted by collecting data for the last 10 years of major domestic portal sites. First, 'judo' was found to be the most important related word in network analysis, and 'judo' was also an important word in the analysis of dgree centrality. In the closeness centrality analysis, "defender" was the most important word, and "sports" was the most important word in betweenness centrality. Finally, as a result of CONCOR analysis, four clusters (related sports and marketing, jiu-jitsu competitions, belt test, supplies and expenses) were formed. As a conclusion of the study, first, words such as 'judo', 'exercise', 'competition', 'dobok', 'gym', and 'graduation' should be actively used to promote jiu-jitsu.As a conclusion of the study, first, words such as 'judo', 'exercise', 'contest', 'dobok', 'gym', and 'graduation' should be actively used to promote jiu-jitsu. Second, it is necessary to share information on training costs through various routes, to make awareness of the graduation process or method common, and to develop safety products and create a safe training culture. Third, it is necessary to find ways to continuously increase the influx of new trainees by attracting steady competitions.

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.

Review of Consultation Requirements Under Military Air Base Law (군용 항공기지법상의 협의제도에 대한 법적고찰)

  • Lee, Kwan-Hyoung
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.18
    • /
    • pp.385-444
    • /
    • 2003
  • Current Military Airbase Law, in an effort to promote safety of military aircraft and security of military airbase, requires an administrative agency or its empowered branch to consult with the Secretary of Defense or the commander of the airbase before they issue a certain administrative approval or decision related to the installation. Although this consultation process purports itself in simplifying what can be an protracted administrative procedure, and in unifying objectives of the military and the administrative services, such procedural requirement is vulnerable inevitability of various legal problems whenever there is a conflict of interests among civil, military, government services. Nor is there sufficient studies done by academian in the area of bureaucratic issues of administrative resolution, and certainly not in the area of the military consultation procedure. This article, with such reality in mind attempts to constructively examine 1) when a consultation application is submitted, whether the discretionary power of the commander of the affected airbase is acknowledged at the outset; 2) if the content of the consultation is deemed unlawful, whether a civilian can institute an administrative lawsuit against it; 3) problems about the subject matters of the consultation requirement within the framework of military airbase law; 4) whether the issuing administrative agency must abide by and issue approval or decision in accordance with the opinion proposed by the said commander; 5) the legal problems of the remedial measure such as an order of removal, appellate review, notion to challenge authority, and etc. in cases such as administrative agency ignoring the commanders proposal or issuing final approval or decision that is inconsistent with what was consulted and agreed upon between both parties.

  • PDF