• 제목/요약/키워드: concealment

검색결과 347건 처리시간 0.03초

블록체인 기술과 빅데이터 기술을 적용한 안전 관리 시스템의 필요성 (Necessity of Safety Management System applying Big Data and Block Chain Technology)

  • 오원균;김기혁;이동훈
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2019년도 추계 학술논문 발표대회
    • /
    • pp.197-198
    • /
    • 2019
  • In this study, the study was conducted to derive the utility of the safety management system applying block chain technology and big data technology to improve the problems of construction sites where concealment and operation of safety accidents occur. If block chain technology and big data technology are applied to construction safety management, transparent data can be collected, and based on the collected data, it is possible to predict accidents that can occur at the construction site and establish countermeasures. It can also be an opportunity to strengthen the safety awareness of construction workers and managers, and can clearly identify the responsibility in the event of a safety accident. This study suggests that the application of the 4th Industrial Revolution technology could be a great opportunity to innovate the construction industry which is less than other industries.

  • PDF

Concealment of iris features based on artificial noises

  • Jiao, Wenming;Zhang, Heng;Zang, Qiyan;Xu, Weiwei;Zhang, Shuaiwei;Zhang, Jian;Li, Hongran
    • ETRI Journal
    • /
    • 제41권5호
    • /
    • pp.599-607
    • /
    • 2019
  • Although iris recognition verification is considered to be the safest method of biometric verification, studies have shown that iris features may be illegally used. To protect iris features and further improve the security of iris recognition and verification, this study applies the Gaussian and Laplacian mechanisms and to hide iris features by differentiating privacy. The efficiency of the algorithm and evaluation of the image quality by the image hashing algorithm are selected as indicators to evaluate these mechanisms. The experimental results indicate that the security of an iris image can be significantly improved using differential privacy protection.

Analysis and Detection of Malicious Data Hidden in Slack Space on OOXML-based Corrupted MS-Office Digital Files

  • Sangwon Na;Hyung-Woo Lee
    • International journal of advanced smart convergence
    • /
    • 제12권1호
    • /
    • pp.149-156
    • /
    • 2023
  • OOXML-based MS-Office digital files are extensively utilized by businesses and organizations worldwide. However, OOXML-based MS-Office digital files are vulnerable to forgery and corruption attack by including hidden suspicious information, which can lead to activating malware or shell code being hidden in the file. Such malicious code can cause a computer system to malfunction or become infected with ransomware. To prevent such attacks, it is necessary to analyze and detect the corruption of OOXML-based MS-Office files. In this paper, we examine the weaknesses of the existing OOXML-based MS-Office file structure and analyzes how concealment and forgery are performed on MS-Office digital files. As a result, we propose a system to detect hidden data effectively and proactively respond to ransomware attacks exploiting MS-Office security vulnerabilities. Proposed system is designed to provide reliable and efficient detection of hidden data in OOXML-based MS-Office files, which can help organizations protect against potential security threats.

인트라 프레임 예측모드를 이용한 효율적인 공간적 에러 은닉 (Efficient Spatial Error Concealment using Intra-frame Prediction Mode)

  • 이기형;김명훈;설상훈
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2007년도 춘계학술발표대회
    • /
    • pp.377-380
    • /
    • 2007
  • 본 논문은 에러블록에 대해 인트라 프레임 예측모드를 이용하여 효율적인 공간적 에러 은닉 방법을 제안한다. 먼저, 에러블록내 픽셀값 복원을 위한 에러블록의 에지방향 예측은 주변 블록의 변환영역 예측모드를 이용한다. 예측된 에러블록의 정확한 에지방향은 인접한 두 에지방향과 비교하여 결정한다. 에러블록의 에지방향 예측을 주변블록의 예측모드를 이용함으로써, 기존의 에지방향 계산을 단축시킴으로써 효율적인 에러 은닉을 가능하게 한다

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 1993년도 Fifth International Fuzzy Systems Association World Congress 93
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF

에지검출을 기반으로 한 새로운 에러 은닉 기법 (A New Error Concealment Based on Edge Detection)

  • 양요진;손남예;이귀상
    • 대한전자공학회논문지SP
    • /
    • 제39권6호
    • /
    • pp.623-629
    • /
    • 2002
  • 네트워크 혼잡으로 인한 패킷 손실은 인터넷 망에서는 필수 불가결이고, 압축된 비디오 비트 스트림을 인터넷 망에 전송할 경우 공-시간적 도메인상에 에러 전파을 야기하므로 화질에 심각한 화질열화를 초래한다. 본 논문에서는 수신측에서 손상된 영상 일부분을 복구하기 위하여 새로운 에러 은닉 알고리즘인 EBMA(Edge Detection on Boundary Matching Algorithm)를 제안한다. 기존 BMA는 부호화된 인접한 블록의 움직임벡터들이 상당히 높은 유사도 혹은 상관도(correlation)를 갖고 있다는 점과 손실블록과 인접블록 경계에 존재하는 화소간의 유사도를 이용하기 때문에 비교적 신뢰할 수 있지만, 손실블록과 정확히 복원된 인접블록 화소간의 방향성을 고려 하지않는 단점이 있다. 따라서 제안한 알고리즘은 에지영역을 검출하고, 검출된 에지영역에서 방향성을 조사하므로 기존 BMA 방법 보다 성능이 향상되었다. 실험결과는 제안한 알고리즘이 기존 BMA 및 MBMA 방법보다 계산 및 화질측면에서 우월하였을 뿐만 아니라, PSNR 값과 주관적인 화질상에서도 좋은 결과를 나타내었다.

소아환자를 위한 음악: 무작위 임상연구의 체계적인 문헌고찰 (Music for Pediatric Patients in Medical Settings: A Systematic Review of Randomized Controlled Trials)

  • 이진형
    • 인간행동과 음악연구
    • /
    • 제10권2호
    • /
    • pp.1-33
    • /
    • 2013
  • 본 연구는 소아환자대상 최근의 음악치료 및 음악을 사용한 임상연구들에 대한 체계적인 문헌고찰(Systematic Review)을 위해 실시되었다. 이를 위해 13개 데이터베이스를 이용하여 2000년부터 2012년 사이에 영어로 발표 된 무작위 임상 및 교차설계 연구들을 자료로 수집하였고, 최초 검색 되었던 1023개의 논문 중 선정 및 제외기준에 따라 영어문헌 15건을 선별하였다. 선별 결과 연구 대상자는 1개월에서 만 18세까지의 아동 및 청소년으로 11명에서 150명 까지 표본크기가 다양했으며 전체 연구 참여자는 987명으로 집계되었다. 선별된 연구들은 음악요법 및 음악치료 연구로 분류되어 전반적인 유형, 연구절차와 방법론, 임상접근법, 측정도구 및 연구결과에 대해 체계적으로 분석되었다. 총 7건의 음악요법과 8건의 음악치료로 분류된 연구들은 7개영역의 종속변수를 36종류의 측정도구를 사용하여 측정하였는데 음악의 임상적 사용에 있어 음악의 선택, 종류 및 임상접근방법에 큰 차이가 있음이 나타났다. 연구절차와 방법론의 분석 결과 다수의 연구들이 주요 연구절차에 대한 기술이 충분치 않고 특히 무작위배정(Randomization), 배정순서 은폐(Allocation Concealment), 이중 또는 부분은폐(double or partial blinding) 및 참여자 감소율(Attrition Rate)과 같은 방법론적 표준에 미치지 못함이 도출되었다. 전반적인 연구결과가 통계적으로 유의하거나 긍정적 결과가 보고된 바 있으나, 연구 방법론적 문제들과 임상접근법들의 이질성으로 인해 그 결과가 편향에 의해 오염되거나 신뢰성에 문제가 있음을 확인할 수 있다. 그 결과 음악이 소아 환자들의 신체 및 사회 심리적 필요를 다루는 도구로 임상적 가치가 있음을 제안할 수는 있지만 이에 대한 과학적인 근거로서는 절차와 접근법이 보다 엄격하고 균일하여 추후 재현이 가능한 연구들이 다수 요구됨을 알 수 있다.

A Revisit to the Recent Human Error Events in Nuclear Power Plants Focused to the Organizational and Safety Culture

  • Lee, Yong-Hee
    • 대한인간공학회지
    • /
    • 제32권1호
    • /
    • pp.117-124
    • /
    • 2013
  • Objective: This paper presents additional considerations related to organization and safety culture extracted from recent human error incidents in Korea, such as station blackout(i.e., SBO) in Kori#1. Background: Safety culture has been already highlighted as a major cause of human errors after 1986 Chernobyl accident. After Fukushima accident in Japan, the public acceptance for nuclear energy has taken its toll. Organizational characteristics and culture became elucidated as a major contributor again. Therefore many nuclear countries are re-evaluating their safety culture, and discussing any preparedness and its improvement. On top of that, there was an SBO in 2012 in the Kori#1. Korean public feels frustrated due to the similar human errors causing to a catastrophe like Fukushima accident. Method: This paper reassesses Japan's incidents, and revisits Korea's recent incidents. It focuses on the analysis of the hazards rather than the causes of human errors, the derivation of countermeasures, and their implementation. The preceding incidents and conclusions from Japanese experience are also re-analyzed. The Fukushima accident was an SBO due to the natural disaster such as earthquakes and a successive tsunami. Unlike the Fukushima accident, the Kori#1 incident itself was simple and restored without any loss and radioactive release. However, the fact that the incident was deliberately concealed led to massive distrust. Moreover, the continued violation of rules and organized concealment of the accident are serious signs of a new distorted type of human errors, blatantly revealing the cultural and fundamental weakness of the current organization. Result: We should learn from Japanese experiences who had taken pride in its safety technology and fairly high confidence in safety culture. Japan's first criticality accident in JCO facility splashed cold water on that confidence. It has turned out to be a typical case revealing the problems in the organization and safety culture. Since Japan has failed to gain lessons and countermeasure, the issue persists to the Fukushima incident. Conclusion: Safety culture is not a specific independent element, which makes it difficult to either evaluate it properly or establish countermeasures from the lessons. It may continue to expose similar human errors such as concealment of incident and manipulation of bad data. Application: Not only will this work establish the course of research for organization and safety culture, but this work will also contribute to the revitalization of Korea's nuclear industry from the disappointment after the export contract to UAE.

VoIP의 음성품질/대역효율 개선을 위한 음성패킷 처리 (Voice Packet Processing Scheme for Voice Quality and Bandwidth Efficiency in VoIP)

  • 김재원;손동철
    • 한국멀티미디어학회논문지
    • /
    • 제7권7호
    • /
    • pp.896-904
    • /
    • 2004
  • 본 논문에서는 10msec 프레임의 가변전송률 G.729 음성부호화기를 설계하여 VoIP에서의 대역 효율을 개선하고, 부전송률 부호화기 도입을 통한 인터넷 프로토콜에서 발생하는 패킷 손실구간의 음성 품질을 개선할 수 있는 방안을 도출하였다. 가변 전송률 음성부호화기 설계는 음성 통화중 발생하는 약 60% 정도의 묵음 구간을 활용하는 기법으로서 활성 음성구간은 8kbps로 전송하고,비 활성 음성구간은 1kbps로 전송함에 의하여 고정 전송률 방식의 음성 부호화기에 비하여 평균 패킷 전송량을 약 50% 감소시켜 대역 효율을 개선할 수 있다. 제안 방법의 성능은 동일 프레임 크기를 갖는 ITU-T G.729B방식과 감지 활성도의 변화분과 음성품질 손상 구간의 비율을 기준으로 비교 평가하였다. 그리고 인터넷 환경에서의 패킷 손실에 의한 음성 품질 저하 방지는 4kbps 부전송률 음성부호화기 도입과 오류 발생 전후의 패킷에 의한 오류은닉 방법을 활용하였으며, 성능은 재생 음성품질로서 평가하였다. 본 논문에서 설계한 가변 전송률 부호화 방식은 고정 전송률 방식에 대비하여 평균 음성 패킷의 전송량을 1/2로 감소시켜 대역효율 개선이 가능하며, 감소된 전송률을 손실 패킷구간에 활용하는 경우 8kbps 고정 전송률 방식과 동일 대역이용에서 3dB의 음성품질 개선이 가능하여 VoIP 성능 개선이 가능하리라 사료된다.

  • PDF

한의학 관련 무작위배정비교임상연구의 비뚤림 위험 평가 (The Assessment of Risk of Bias on Randomised Controlled Trials of Oriental Medicine in Korea)

  • 이윤재;장보형;고호연;현민경;박선영;이창훈;김진성;조기호
    • 대한한방부인과학회지
    • /
    • 제24권4호
    • /
    • pp.105-113
    • /
    • 2011
  • Objectives: To examine the current status of clinical research in oriental medicine, and to assess 'risk of bias'(ROB) of randomized clinical trials(RCTs) in oriental medicine in Korea. Methods: Special committee for EBM, KOMS(Korean Oriental Medicine Society) reviewed 17 journals related to oriental medicine in Korea (from the first issue to May 2010), the Cochrane Central Register of Controlled Trials (The Cochrane Library Issue 2, 2010), and PubMed (1966 to May 2010). Then we selected eligible RCTs in terms of oriental medicine, and assessed 'risk of bias'. Results: We reviewed 12,653 articles from the 17 journals, and 41 articles from CENTRAL and PubMed. After non-clinical articles were excluded, 1,004 articles were left. Among them, the number of eligible studies in terms of oriental medicine was 306. In these eligible studies, 130 were RCTs. Of RCTs, 69 were on acupuncture, 25 on herbal medicine. The proportion of 'unclear' is high in the criteria of 'Allocation concealment', 'Blinding of participants and personnel', 'Blinding of outcome assessment' and 'Other bias'. On the other hand, 'low' has high in the criteria of 'Incomplete outcome data' and 'Selective reporting'. Conclusions: Risk of bias on oriental medicine is unclear in terms of 'allocation concealment' and 'blinding'. For high-quality research in oriental medicine, further research should be needed on randomization and blinding in the RCTs.