• Title/Summary/Keyword: access restriction

Search Result 91, Processing Time 0.023 seconds

The Influence of Smartphone Use on Marine Traffic Safety (스마트폰 사용이 선박통항안전에 미치는 영향에 관한 연구)

  • Shin, Daewoon;Park, Youngsoo;Park, Jinsoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.2
    • /
    • pp.131-138
    • /
    • 2017
  • Lately, Internet-based vessels have begun to appear at sea with the development of ICT. Thereby crews have gained easy Internet access through increased smartphone portability. However, the side effects of smartphone use while on watch, have not been studied seriously despite being a reality. In this study, simulation experiments were carried out using a Ship Handling Simulator in order to distinguish the risks of using a smartphone while on watch. Proximity Evaluation, Control Evaluation, Subjective Evaluation and Situation Awareness to the dangerous situation were used to quantify risk during simulation, and analysis results were compared with cases when using and not using a smartphone. It was found that the degree of risk increased between 1.3 to 3 times given smartphone use. Consequently, this paper represents foundation for the restriction of smartphone use and proposes smartphone usage guideline for ship navigation.

EDISON Platform to Supporting Education and Integration Research in Computational Science (계산과학 시뮬레이션을 위한 웹 인터페이스 자동 생성 시스템 개발)

  • Jin, Du-Seok;Lee, Jong-Suk Ruth;Cho, Kum-Won;Jeong, Jae-You;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.799-801
    • /
    • 2011
  • Computational science is a field of study concerned with constructing mathematical models and quantitative analysis techniques and using large computing resources to solve the problems which are difficult to approach in a physical experimentally. Recently, a new web-based simulation environment for computational science is becoming more and more popular for supporting multi-user access without restriction of space or time, however, to develop web-based simulation applications, the researchers performed their works too much difficulty. In this paper, we present automated web interface generation tool that allows applied researchers to concentrate on advanced research in their scientific disciplines such as Chemistry, Physics, Structural Dynamics.

  • PDF

An Analysis of the International Transportation Route at the Sight of Wind Power Equipment Manufacturing Company (풍력발전부품 제조업체의 관점에서 본 국제 운송경로 분석)

  • Yun, Seok-Hwan;Park, Jin-Hee
    • Journal of Navigation and Port Research
    • /
    • v.39 no.4
    • /
    • pp.361-370
    • /
    • 2015
  • Wind energy began to receive attention as a new alternative fuel since 20 years ago and is growing as a booming global business model. Global wind power generation in the world has been continuously increasing for the past 10 years, accounting for over 30% of cumulative rate compared to total power generation. Global demand for wind power generation is gradually expanding due to restriction on carbon emission and environmental problems caused by increased greenhouse effect. Accordingly in this study, current transportation routes are classified into three types including access-priority route, economics-priority route, and convenience- priority route depending on distribution characteristics of wind power equipment in order to suggest transportation methods other than ships. The three types of transportation route that this study declared can make the Wind power equipment manufacturing companies can judge not only the duration of transportation but also effectiveness and economic feasibility. It means that the manufacturers can analyze and compare the effectiveness and economic feasibility, which are proceed by the shipping company and freight forwarder until now days.

Design and Evaluation of an Early Intelligent Alert Broadcasting Algorithm for VANETs (차량 네트워크를 위한 조기 지능형 경보 방송 알고리즘의 설계 및 평가)

  • Lee, Young-Ha;Kim, Sung-Tae;Kim, Guk-Boh
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.95-102
    • /
    • 2012
  • The development of applications for vehicular ad hoc networks (VANETs) has very specific and clear goals such as providing intellectual safe transport systems. An emergency warning technic for public safety is one of the applications which requires an intelligent broadcast mechanism to transmit warning messages quickly and efficiently against the time restriction. The broadcast storm problem causing several packet collisions and extra delay has to be considered to design a broadcast protocol for VANETs, when multiple nodes attempt transmission simultaneously at the access control layer. In this paper, we propose an early intelligent alert broadcasting (EI-CAST) algorithm to resolve effectively the broadcast storm problem and meet time-critical requirement. The proposed algorithm uses not only the early alert technic on the basis of time to collision (TTC) but also the intelligent broadcasting technic on the basis of fuzzy logic, and the performance of the proposed algorithm was compared and evaluated through simulation with the existing broadcasting algorithms. It was demonstrated that the proposed algorithm shows a vehicle can receive the alert message before a collision and have no packet collision when the distance of alert region is less than 4 km.

Improvement of Runtime Intrusion Prevention Evaluator (RIPE) (실행시간 침입 방지 평가 프로그램(RIPE)의 개선)

  • Lee, Hyungyu;Lee, Damho;Kim, Taehwan;Cho, Donghwang;Lee, Sanghoon;Kim, Hoonkyu;Pyo, Changwoo
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1049-1056
    • /
    • 2015
  • Runtime Intrusion Prevention Evaluator (RIPE), published in 2011, is a benchmark suite for evaluating mitigation techniques against 850 attack patterns using only buffer overflow. Since RIPE is built as a single process, defense and attack routines cannot help sharing process states and address space layouts when RIPE is tested. As a result, attack routines can access the memory space for defense routines without restriction. We separate RIPE into two independent processes of defense and attacks so that mitigations based on confidentiality such as address space layout randomization are properly evaluated. In addition, we add an execution mode to test robustness against brute force attacks. Finally, we extend RIPE by adding 38 attack forms to perform format string attacks and virtual table (vtable) hijacking attacks. The revised RIPE contributes to the diversification of attack patterns and precise evaluation of the effectiveness of mitigations.

Rethinking Social Media: The Influences of Restrictive Attributes of Audio-based Social Media on User Intention (SNS의 재발견: 오디오SNS의 제한적 속성이 사용의도에 미치는 영향)

  • Cho, Yeram;Lee, Jeha;Park, Haeun;Chung, Doohee
    • Journal of Technology Innovation
    • /
    • v.29 no.4
    • /
    • pp.125-160
    • /
    • 2021
  • Unlike existing social platforms that seek openness, an audio-based social platform is characterized by its limitations. This study uses the Value-Based Acceptance Model(VAM) to analyze the role that such limitations play in the user's acceptance of audio-based social media. In this study, restrictive properties are defined as access-limitation, communication-limitation, and content-limitation. This study aims to analyze the effect of each variable on the perceived value and usage of audio-based social media. The hypothesis test was conducted based on the survey responses total of 207 users and potential users. The results was analyzed that three limiting variables affect perceived benefit factors, usefulness and playfulness, and the user's acceptance intention. This study is significant in that it presents a model based on the VAM and provides guidance for new forms of social media growth.

Exploring parenting variables associated with sweetness preferences and sweets intake of children

  • Woo, Taejung;Lee, Kyung-Hea
    • Nutrition Research and Practice
    • /
    • v.13 no.2
    • /
    • pp.169-177
    • /
    • 2019
  • BACKGROUND/OBJECTIVES: Excessive sugar intake is one of the causes associated with obesity and several chronic diseases prevalent in the modern society. This study was undertaken to investigate the effect of parenting variables based on the theory of planned behavior, on the sweetness preferences and sweets intake of children. SUBJECTS/METHODS: Parents and their children (n = 103, aged 5-7 years) were enrolled to participate in a survey for this study, after providing the required informed consent. Parents were asked to fill out a self-administered questionnaire at their residence. The sweetness preference test for children was conducted at a kindergarten (or daycare center) by applying the one-on-one interview method. RESULTS: The children were divided into two clusters categorized by the K-mean cluster analysis: Cluster 1 had higher sweetness preference (0.42 M sugar, 35%; 0.61 M sugar, 65%); Cluster 2 exhibited lower sweetness preference (0.14 M sugar, 9.5%; 0.20 M sugar, 9.5%; 0.29 M sugar, 81%). Cluster 1 had a higher frequency of sweets intake (P < 0.01), and lower sweets restriction (P < 0.05) and nutrition quotient score (P < 0.05). Sweets intake was negatively correlated with the nutritional quotient (r = -0.204, P < 0.05). The behavioral intention of parents was higher in cluster 2 (P < 0.05), while affective attitude, feeding practice, and reward were higher in cluster 1 (P < 0.001, P < 0.05, and P < 0.01, respectively). Furthermore, behavioral intention of parents showed a negative correlation with affective attitude (r = -0.282, P < 0.01) and feeding practice (r = -0.380, P < 0.01), and a positive correlation with subjective norm (r = 0.203, P < 0.05) and parenting attitude (r = 0.433, P < 0.01). CONCLUSIONS: This study indicates that the sweetness preferences and sweets intake of children is related to the parent's affective attitude, feeding practice and reward. We suggest that to reduce the sugar consumption of children, guidelines for access to sweets and pertinent parenting practices are required.

The Task and View of National Archive System in the Fourth Industrial Revolution Era: Cloud Record Management System (4차 산업혁명 시대에서의 국가기록관리 현실과 전망: 클라우드 기록관리시스템 운영을 중심으로)

  • Nam, Kyeong-ho
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.3
    • /
    • pp.205-222
    • /
    • 2019
  • This study analyzed the problems that occurred while constructing and operating the cloud record management system at the record management workplace and suggested ways to improve the system. In the study, the cloud record management system has the following problems: first, it has not been accompanied by the change in the legislative system. Second, it has not been utilizing the benefits of cloud technology. Third, it has not been considering the changes after the system construction. Given this, the study suggested three improvement plans to solve these problems: first, in relation to the reformed legislative system, the study proposed the diversification of records management units (file-item structure) and the restriction on access to records. Second, the study suggested a system redesign by improving the current work process based on paper documents. Third, to solve records management issues, the study presented the establishment of the governance body and the proactive countermeasure of the National Archives of Korea.

An Architecture of a Dynamic Cyber Attack Tree: Attributes Approach (능동적인 사이버 공격 트리 설계: 애트리뷰트 접근)

  • Eom, Jung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.67-74
    • /
    • 2011
  • In this paper, we presented a dynamic cyber attack tree which can describe an attack scenario flexibly for an active cyber attack model could be detected complex and transformed attack method. An attack tree provides a formal and methodical route of describing the security safeguard on varying attacks against network system. The existent attack tree can describe attack scenario as using vertex, edge and composition. But an attack tree has the limitations to express complex and new attack due to the restriction of attack tree's attributes. We solved the limitations of the existent attack tree as adding an threat occurrence probability and 2 components of composition in the attributes. Firstly, we improved the flexibility to describe complex and transformed attack method, and reduced the ambiguity of attack sequence, as reinforcing composition. And we can identify the risk level of attack at each attack phase from child node to parent node as adding an threat occurrence probability.

Design and Implementation of a Stereoscopic Image Control System based on User Hand Gesture Recognition (사용자 손 제스처 인식 기반 입체 영상 제어 시스템 설계 및 구현)

  • Song, Bok Deuk;Lee, Seung-Hwan;Choi, HongKyw;Kim, Sung-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.3
    • /
    • pp.396-402
    • /
    • 2022
  • User interactions are being developed in various forms, and in particular, interactions using human gestures are being actively studied. Among them, hand gesture recognition is used as a human interface in the field of realistic media based on the 3D Hand Model. The use of interfaces based on hand gesture recognition helps users access media media more easily and conveniently. User interaction using hand gesture recognition should be able to view images by applying fast and accurate hand gesture recognition technology without restrictions on the computer environment. This paper developed a fast and accurate user hand gesture recognition algorithm using the open source media pipe framework and machine learning's k-NN (K-Nearest Neighbor). In addition, in order to minimize the restriction of the computer environment, a stereoscopic image control system based on user hand gesture recognition was designed and implemented using a web service environment capable of Internet service and a docker container, a virtual environment.