• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.036 seconds

Worker Location Tracking System of Shipyard using Power Line Communication and Beacon (전력선 통신과 비컨을 활용한 선박 건조 현장의 작업자 위치 추적 시스템)

  • Taewoong Hwnag;Young-Doo Lee;Ki-Woong Park;In-Soo Koo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.41-49
    • /
    • 2024
  • This paper discusses the modeling and implementation of a worker location system at a shipbuilding site. The importance of worker location in an industrial environment is highlighted as a critical element in the prevention of industrial accidents. The paper presents a worker tracking system that integrates power line and beacon communication to accurately track worker position. Through experiments, the paper demonstrates how to monitor the changes in worker location based on different scenarios and how to access the status of worker location using the manager's web service. The paper can be used for the design of a system that will provide real-time location information to safety managers for the improvement of worker safety management.

CEOs with Unusual Names and R&D Intensity: Moderating Role of CEO Characteristics (흔하지 않은 이름의 최고경영자와 기업의 연구개발 투자: 최고경영자 특성의 조절 효과를 중심으로)

  • Do-Kyun Kwon;Seung-Hye Lee;Yang-Min Kim
    • Asia-Pacific Journal of Business
    • /
    • v.14 no.4
    • /
    • pp.175-189
    • /
    • 2023
  • Purpose - The purpose of this study was to examine the relationship between CEO name uncommonness and R&D intensity while focusing on CEO ownership and CEO tenure as moderators of the relationship. Design/methodology/approach - This study collected data from various American databases such as national data on given names from Social Security Administration, COMPUSTAT, and Execucomp. The sample of this study includes 2,494 (firm-year) observations from U.S. firms between 2005-2011. This study conducts Feasible Generalized Least Square (FGLS) regression analysis to test the hypotheses. Findings - First, we found CEO name uncommonness was positively related to R&D intensity. In other words, CEOs with unusual names prefer being distinctive by increasing R&D investments. Second, we examine the moderating roles of CEO characteristics (i.e., CEO ownership and tenure). The results show that CEO tenure strengthens the positive relationship between CEO name uncommonness and R&D intensity. Research implications or Originality - First, this study extends the CEO characteristics and R&D literature by investigating how CEO name uncommonness affects R&D intensity. In addition, our study also supports the intitutionalization of CEO power arguments by showing that CEOs with unusual names are more likely to pursue distinctive strategies when they have longer tenure. For practical implications, our results allow the investors to better predict corporate future R&D expenses. It suggests that ceteris paribus, CEOs with unusual names, vis-a-vis CEOs with common names, are more likely to increase R&D expenses.

Lignocellulolytic Enzymes Production by Four Wild Filamentous Fungi for Olive Stones Valorization: Comparing Three Fermentation Regimens

  • Soukaina Arif;Hasna Nait M'Barek;Boris Bekaert;Mohamed Ben Aziz;Mohammed Diouri;Geert Haesaert;Hassan Hajjaj
    • Journal of Microbiology and Biotechnology
    • /
    • v.34 no.5
    • /
    • pp.1017-1028
    • /
    • 2024
  • Lignocellulolytic enzymes play a crucial role in efficiently converting lignocellulose into valuable platform molecules in various industries. However, they are limited by their production yields, costs, and stability. Consequently, their production by producers adapted to local environments and the choice of low-cost raw materials can address these limitations. Due to the large amounts of olive stones (OS) generated in Morocco which are still undervalued, Penicillium crustosum, Fusarium nygamai, Trichoderma capillare, and Aspergillus calidoustus, are cultivated under different fermentation techniques using this by-product as a local lignocellulosic substrate. Based on a multilevel factorial design, their potential to produce lignocellulolytic enzymes during 15 days of dark incubation was evaluated. The results revealed that P. crustosum expressed a maximum total cellulase activity of 10.9 IU/ml under sequential fermentation (SF) and 3.6 IU/ml of β-glucosidase activity under submerged fermentation (SmF). F. nygamai recorded the best laccase activity of 9 IU/ml under solid-state fermentation (SSF). Unlike T. capillare, SF was the inducive culture for the former activity with 7.6 IU/ml. A. calidoustus produced, respectively, 1,009 ㎍/ml of proteins and 11.5 IU/ml of endoglucanase activity as the best results achieved. Optimum cellulase production took place after the 5th day under SF, while ligninases occurred between the 9th and the 11th days under SSF. This study reports for the first time the lignocellulolytic activities of F. nygamai and A. calidoustus. Furthermore, it underlines the potential of the four fungi as biomass decomposers for environmentally-friendly applications, emphasizing the efficiency of OS as an inducing substrate for enzyme production.

Performance Analysis of Spiral Axicon Wavefront Coding Imaging System for Laser Protection

  • Haoqi Luo;Yangliang Li;Junyu Zhang;Hao Zhang;Yunlong Wu;Qing Ye
    • Current Optics and Photonics
    • /
    • v.8 no.4
    • /
    • pp.355-365
    • /
    • 2024
  • Wavefront coding (WFC) imaging systems can redistribute the energy of an interference laser spot on an image plane sensor by wavefront phase modulation and reduce the peak intensity, realizing laser protection while maintaining imaging functionality by leveraging algorithmic post-processing. In this paper, a spiral axicon WFC imaging system is proposed, and the performance for laser protection is investigated by constructing a laser transmission model. An Airy disk on an image plane sensor is refactored into a symmetrical hollow ring by a spiral axicon phase mask, and the maximum intensity can be reduced to lower than 1% and single-pixel power to 1.2%. The spiral axicon phase mask exhibits strong robustness to the position of the interference laser source and can effectively reduce the risk of sensor damage for an almost arbitrary lase propagation distance. Moreover, we revealed that there is a sensor hazard distance for both conventional and WFC imaging systems where the maximum single-pixel power reaches a peak value under irradiation of a power-fixed laser source. Our findings can offer guidance for the anti-laser reinforcement design of photoelectric imaging systems, thereby enhancing the adaptability of imaging systems in a complex laser environment. The laser blinding-resistant imaging system has potential applications in security monitoring, autonomous driving, and intense-laser-pulse experiments.

Research on digital evidence-based countermeasure depending on the type of small and medium-sized enterprises technology leakage accident (중소기업 기술유출사고 유형에 따른 디지털증거기반 대응방안 연구)

  • Jaeyun Wang;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.67-76
    • /
    • 2024
  • Small and medium-sized enterprises play a fundamental role in the foundation of our country's industry and economy, and most technological innovations occur in small and medium-sized enterprises rather than large corporations. Technology development and innovation are the only way for small and medium-sized enterprises to survive in a fiercely competitive environment, so they focus on it, but interest and investment in technology protection tend to be stingy. As a result, industrial technology leakage accidents occur frequently, and it is difficult to meet improvement measures. When a leak occurs, digital evidence is required to prove criminal activity, but problems such as digital evidence being damaged or deleted due to management loopholes often occur. Therefore, through this study, we aim to design a digital evidence-based countermeasure depending on the type of technology leak accident. We will classify the types of technology leak incidents that actually occurred and study ways to secure digital evidence in the security environment of small and medium-sized businesses that operate internal information leak prevention solutions.

  • PDF

Suggestion of CPTED Application through Annual Crime Analysis using Big Data (빅 데이터를 활용한 연도별 범죄 분석을 통한 CPTED 활용방안 제시)

  • Seung-Yeon Hwang;Jin-Yong Moon;Jeong-Joon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.5
    • /
    • pp.211-216
    • /
    • 2024
  • Our world security is at the top of the list, and it is a safe country to be able to drink and move around freely at dawn. However, according to the data by the prosecution's office, about 2 million crimes are committed each year. Crime can be classified as a violent crime, intelligent crime, or other crime. Also age, gender and location vary by crime. Generally, crime breaks people's trust, inflicts large and small damages on society, and it is difficult to restore trust, which is crushed by crime. In the paper based on the conditions such as age, gender, place, and area, we will use Big Data to visualize the access and increase / decrease of crime occurrence according to the types of these crimes. Through this paper, we will identify the overall trend of crime and present a method of utilizing the crime prevention design (CPTED) based on the analyzed data.

Sensitivity Analysis of Excavator Activity Recognition Performance based on Surveillance Camera Locations

  • Yejin SHIN;Seungwon SEO;Choongwan KOO
    • International conference on construction engineering and project management
    • /
    • 2024.07a
    • /
    • pp.1282-1282
    • /
    • 2024
  • Given the widespread use of intelligent surveillance cameras at construction sites, recent studies have introduced vision-based deep learning approaches. These studies have focused on enhancing the performance of vision-based excavator activity recognition to automatically monitor productivity metrics such as activity time and work cycle. However, acquiring a large amount of training data, i.e., videos captured from actual construction sites, is necessary for developing a vision-based excavator activity recognition model. Yet, complexities of dynamic working environments and security concerns at construction sites pose limitations on obtaining such videos from various surveillance camera locations. Consequently, this leads to performance degradation in excavator activity recognition models, reducing the accuracy and efficiency of heavy equipment productivity analysis. To address these limitations, this study aimed to conduct sensitivity analysis of excavator activity recognition performance based on surveillance camera location, utilizing synthetic videos generated from a game-engine-based virtual environment (Unreal Engine). Various scenarios for surveillance camera placement were devised, considering horizontal distance (20m, 30m, and 50m), vertical height (3m, 6m, and 10m), and horizontal angle (0° for front view, 90° for side view, and 180° for backside view). Performance analysis employed a 3D ResNet-18 model with transfer learning, yielding approximately 90.6% accuracy. Main findings revealed that horizontal distance significantly impacted model performance. Overall accuracy decreased with increasing distance (76.8% for 20m, 60.6% for 30m, and 35.3% for 50m). Particularly, videos with a 20m horizontal distance (close distance) exhibited accuracy above 80% in most scenarios. Moreover, accuracy trends in scenarios varied with vertical height and horizontal angle. At 0° (front view), accuracy mostly decreased with increasing height, while accuracy increased at 90° (side view) with increasing height. In addition, limited feature extraction for excavator activity recognition was found at 180° (backside view) due to occlusion of the excavator's bucket and arm. Based on these results, future studies should focus on enhancing the performance of vision-based recognition models by determining optimal surveillance camera locations at construction sites, utilizing deep learning algorithms for video super resolution, and establishing large training datasets using synthetic videos generated from game-engine-based virtual environments.

Network Analysis for Crime Prevention in Public Restrooms: Weighting Factors (네트워크 모델 기반 공중화장실 범죄위험요소 가중치 산출)

  • Shin-Sook Yoon;Jeong-Hwa Song
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.5
    • /
    • pp.941-950
    • /
    • 2024
  • This study employed network analysis techniques to examine the relationships between spatiotemporal factors associated with crimes in public restrooms, drawing on diverse relevant data sources. We then evaluated the relative importance of these factors in crime occurrence. Variables related to crime incidence were identified, and their interconnectedness was assessed for network analysis, resulting in a data-driven network model with complex relational structures. The network model contributed to calculating the weight of each factor and identifying key elements. The location of public restrooms, usage time, surrounding environment, and facility conditions emerged as crucial factors in crime occurrence, with lighting quality and local security status showing high weightings. These findings can be utilized to prioritize interventions in public restroom design and management to enhance safety. The network analysis methodology demonstrated its potential in proposing crime prevention measures for public spaces, including restrooms, and contributing to the creation of safer public environments.

An Empirical Study on Perceived Value and Continuous Intention to Use of Smart Phone, and the Moderating Effect of Personal Innovativeness (스마트폰의 지각된 가치와 지속적 사용의도, 그리고 개인 혁신성의 조절효과)

  • Han, Joonhyoung;Kang, Sungbae;Moon, Taesoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.53-84
    • /
    • 2013
  • With rapid development of ICT (Information and Communications Technology), new services by the convergence of mobile network and application technology began to appear. Today, smart phone with new ICT convergence network capabilities is exceedingly popular and very useful as a new tool for the development of business opportunities. Previous studies based on Technology Acceptance Model (TAM) suggested critical factors, which should be considered for acquiring new customers and maintaining existing users in smart phone market. However, they had a limitation to focus on technology acceptance, not value based approach. Prior studies on customer's adoption of electronic utilities like smart phone product showed that the antecedents such as the perceived benefit and the perceived sacrifice could explain the causality between what is perceived and what is acquired over diverse contexts. So, this research conceptualizes perceived value as a trade-off between perceived benefit and perceived sacrifice, and we need to research the perceived value to grasp user's continuous intention to use of smart phone. The purpose of this study is to investigate the structured relationship between benefit (quality, usefulness, playfulness) and sacrifice (technicality, cost, security risk) of smart phone users, perceived value, and continuous intention to use. In addition, this study intends to analyze the differences between two subgroups of smart phone users by the degree of personal innovativeness. Personal innovativeness could help us to understand the moderating effect between how perceptions are formed and continuous intention to use smart phone. This study conducted survey through e-mail, direct mail, and interview with smart phone users. Empirical analysis based on 330 respondents was conducted in order to test the hypotheses. First, the result of hypotheses testing showed that perceived usefulness among three factors of perceived benefit has the highest positive impact on perceived value, and then followed by perceived playfulness and perceived quality. Second, the result of hypotheses testing showed that perceived cost among three factors of perceived sacrifice has significantly negative impact on perceived value, however, technicality and security risk have no significant impact on perceived value. Also, the result of hypotheses testing showed that perceived value has significant direct impact on continuous intention to use of smart phone. In this regard, marketing managers of smart phone company should pay more attention to improve task efficiency and performance of smart phone, including rate systems of smart phone. Additionally, to test the moderating effect of personal innovativeness, this research conducted multi-group analysis by the degree of personal innovativeness of smart phone users. In a group with high level of innovativeness, perceived usefulness has the highest positive influence on perceived value than other factors. Instead, the analysis for a group with low level of innovativeness showed that perceived playfulness was the highest positive factor to influence perceived value than others. This result of the group with high level of innovativeness explains that innovators and early adopters are able to cope with higher level of cost and risk, and they expect to develop more positive intentions toward higher performance through the use of an innovation. Also, hedonic behavior in the case of the group with low level of innovativeness aims to provide self-fulfilling value to the users, in contrast to utilitarian perspective, which aims to provide instrumental value to the users. However, with regard to perceived sacrifice, both groups in general showed negative impact on perceived value. Also, the group with high level of innovativeness had less overall negative impact on perceived value compared to the group with low level of innovativeness across all factors. In both group with high level of innovativeness and with low level of innovativeness, perceived cost has the highest negative influence on perceived value than other factors. Instead, the analysis for a group with high level of innovativeness showed that perceived technicality was the positive factor to influence perceived value than others. However, the analysis for a group with low level of innovativeness showed that perceived security risk was the second high negative factor to influence perceived value than others. Unlike previous studies, this study focuses on influencing factors on continuous intention to use of smart phone, rather than considering initial purchase and adoption of smart phone. First, perceived value, which was used to identify user's adoption behavior, has a mediating effect among perceived benefit, perceived sacrifice, and continuous intention to use smart phone. Second, perceived usefulness has the highest positive influence on perceived value, while perceived cost has significant negative influence on perceived value. Third, perceived value, like prior studies, has high level of positive influence on continuous intention to use smart phone. Fourth, in multi-group analysis by the degree of personal innovativeness of smart phone users, perceived usefulness, in a group with high level of innovativeness, has the highest positive influence on perceived value than other factors. Instead, perceived playfulness, in a group with low level of innovativeness, has the highest positive factor to influence perceived value than others. This result shows that early adopters intend to adopt smart phone as a tool to make their job useful, instead market followers intend to adopt smart phone as a tool to make their time enjoyable. In terms of marketing strategy for smart phone company, marketing managers should pay more attention to identify their customers' lifetime value by the phase of smart phone adoption, as well as to understand their behavior intention to accept the risk and uncertainty positively. The academic contribution of this study primarily is to employ the VAM (Value-based Adoption Model) as a conceptual foundation, compared to TAM (Technology Acceptance Model) used widely by previous studies. VAM is useful for understanding continuous intention to use smart phone in comparison with TAM as a new IT utility by individual adoption. Perceived value dominantly influences continuous intention to use smart phone. The results of this study justify our research model adoption on each antecedent of perceived value as a benefit and a sacrifice component. While TAM could be widely used in user acceptance of new technology, it has a limitation to explain the new IT adoption like smart phone, because of customer behavior intention to choose the value of the object. In terms of theoretical approach, this study provides theoretical contribution to the development, design, and marketing of smart phone. The practical contribution of this study is to suggest useful decision alternatives concerned to marketing strategy formulation for acquiring and retaining long-term customers related to smart phone business. Since potential customers are interested in both benefit and sacrifice when evaluating the value of smart phone, marketing managers in smart phone company has to put more effort into creating customer's value of low sacrifice and high benefit so that customers will continuously have higher adoption on smart phone. Especially, this study shows that innovators and early adopters with high level of innovativeness have higher adoption than market followers with low level of innovativeness, in terms of perceived usefulness and perceived cost. To formulate marketing strategy for smart phone diffusion, marketing managers have to pay more attention to identify not only their customers' benefit and sacrifice components but also their customers' lifetime value to adopt smart phone.

Design and Implementation of 3D Geospatial Open Platform Based on HTML5/WebGL Technology (HTML5/WebGL 기반 3D 공간정보 오픈플랫폼 소프트웨어 설계 및 구현)

  • Kim, Min Soo;Jang, In Sung
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.57-66
    • /
    • 2015
  • Recently, the utilization of geospatial open platforms has been constantly increased and the interest in 3D geospatial data such as terrain, building and shopping mall has been increased significantly. In particular, rather than simplified 3D geospatial data, interest in high-precision 3D geospatial data which similarly represents the real world objects has increased significantly. In order to satisfy the demand for such the high-precision 3D geospatial data, various kinds of 3D geospatial open platforms has been developed and has provided services on the web. However, most of the 3D geospatial open platforms have been used plug-in module in order to ensure a fast 3D rendering performance on the web, despite the many problems such as difficulty of the installation, no supporting of cross browser/operating system and security issues. In addition, recently, the existing 3D geospatial open platforms based on plug-in module are facing a serious problem, by declaring the NPAPI service interruption in Chrome and Firefox browsers. In this study, we presents the design and implementation of a new 3D geospatial open platform based on HTML5/WebGL technology without the use of plug-ins. Such the new 3D geospatial open platform based on HTML5/WebGL may support cross browsers such as IE, Chrome, Firefox, Safari and cross OS platforms such as Windows, Linux, Mac and mobile OS platforms.