• Title/Summary/Keyword: contents protection

Search Result 1,060, Processing Time 0.026 seconds

Ecological Risk Assessment of Chemicals Migrated from a Recycled Plastic Product

  • Roh, Ji-Yeon;Kim, Min-Hyuck;Kim, Woo Il;Kang, Young-Yeul;Shin, Sun Kyoung;Kim, Jong-Guk;Kwon, Jung-Hwan
    • Environmental Analysis Health and Toxicology
    • /
    • v.28
    • /
    • pp.13.1-13.5
    • /
    • 2013
  • Objectives: Potential environmental risks caused by chemicals that could be released from a recycled plastic product were assessed using a screening risk assessment procedure for chemicals in recycled products. Methods: Plastic slope protection blocks manufactured from recycled plastics were chosen as model recycled products. Ecological risks caused by four model chemicals - di-(2-ethylhexyl) phthalate (DEHP), diisononyl phthalate (DINP), cadmium (Cd), and lead (Pb)-were assessed. Two exposure models were built for soil below the block and a hypothetic stream receiving runoff water. Based on the predicted no-effect concentrations for the selected chemicals and exposure scenarios, the allowable leaching rates from and the allowable contents in the recycled plastic blocks were also derived. Results: Environmental risks posed by slope protection blocks were much higher in the soil compartment than in the hypothetic stream. The allowable concentrations in leachate were $1.0{\times}10^{-4}$, $1.2{\times}10^{-5}$, $9.5{\times}10^{-3}$, and $5.3{\times}10^{-3}mg/L$ for DEHP, DINP, Cd, and Pb, respectively. The allowable contents in the recycled products were $5.2{\times}10^{-3}$, $6.0{\times}10^{-4}$, $5.0{\times}10^{-1}$, and $2.7{\times}10^{-1}mg/kg$ for DEHP, DINP, Cd, and Pb, respectively. Conclusions: A systematic ecological risk assessment approach for slope protection blocks would be useful for regulatory decisions for setting the allowable emission rates of chemical contaminants, although the method needs refinement.

A Comparative Analysis on the Middle School Environmental Textbooks (중학교 "환경" 교과서 비교.분석 연구)

  • 곽홍탁;전은정
    • Hwankyungkyoyuk
    • /
    • v.14 no.2
    • /
    • pp.1-14
    • /
    • 2001
  • This study analyzed and compared the number of students activities, contents scope, and organizing system of the three textbooks(A, B, and C) which had been developed and published for the 'Environment'subject in the 7th National Curriculum. The results of this study can be summarized as follows; There were differences in the size, the total number of pages and the quality of print between two groups of 'Environment'textbooks of the 6th and the 7th national curriculum. New textbooks were found bigger than the previous ones by 125%. The total number of pages increased by the average of 16.4%. A and C textbooks were composed of three parts, seven chapters, and 17 sections, whereas B textbook consisted of ten chapters and 23 sections. All of the three textbooks appeared to put an emphasis on the chapters of 'environment protection'and 'environmental problems of the Earth ' A comparative analysis on the number of data included in the three textbooks showed that almost half of data took a form of picture, averaging 48% of the total. A had 297 pictures, and 234 pictures for B, 194 pictures for C, respectively. In terms of the number of students'activities, C was found to include the largest number of activities that is 91, comparing to text A of 85, text B of 78. The number of students'activities in every content is found'environment awaiting protection', tile 'environmental problems of the earth'and'things to be done for the protection of environment'much more than any other parts. It should be noted that this study focused ell only a set of quantitative measures so that teachers are recommended to consider detailed contents that each textbook contains as well as environmental conditions of the school region.

  • PDF

Development of Managing Security Services System Protection Profile (보안관제시스템 보호프로파일 개발)

  • Son, Seung-Wan;Kim, Kwang-Seok;Choi, Jung-Won;Lee, Gang-Soo
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.345-353
    • /
    • 2015
  • Security Management System is a system which operates in the security control center for security control. All living things across the Internet in recent years, with the rapid increase in the subscriber base has increased the need for network security dramatically depending on yirueojim through web services, thus cyber security sheriff, I have a big issue to build a security management system, each agency and perform control tasks. But the security functional requirements for security management system would not specified exactly, in developing a security management system to build and design a situation that PP's needs require a lot of trouble. In this paper, we develop a Managed Security System Protection Profile for the security functional requirements specification of the security management system.

A Study on Function Assessment of Coastal Wetlands for Ecological Network Establishment -Focused on the Westcoast of Chungnam Province - (생태네트워크 구축을 위한 해안습지 기능평가 연구 - 충남 서해안을 대상으로 -)

  • Park, Mi Ok;Park, Mi Lan;Koo, Bon Hak
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.10 no.6
    • /
    • pp.70-80
    • /
    • 2007
  • This study was surveyed from January to september, 2007 in order to evaluate the function of coastal wetland as a ecological axis in korea peninsula. Assessment was done by RAM (Rapid Assessment Method). RAM is consisted of total 8 contents and divided into high, moderate, low. The preservation grade of RAM is divided into 4 grades; absolute preservation, preservation, improvement and improvement or restoration. Throughout survey on total 14 wetlands of marine, estuary wetland and back marsh which are distributed in west coast in chung-nam province, their function was assessed. As result, total all the 14 wetlands were judged as preservation grade by assessment of 8 functional contents. The function of wetlands assessed as preservation grade showed high in water quality protection and improvement. Also, showed high in vegetation diversity, wildlife habitat and aesthetic recreation. Meanwhile, showed low in ground water recharge, Shoreline/Stream Bank Protection, Flood/Stormwater storage and Flood flow alteration. Of wetlands evaluated as preservation grade, Dae-ho, Sinduri, Bu-Nam lake, Sowhang dune and keum river estuary were assessed as absolute preservative area owing to habitation of international protection species and endangered species. These wetlands are essential to be managed continuously as a area having high ecological value. Farther, this wetlands will be done as a axis of ecological network related to land ecosystem.

A Study on Methodology for Protection of Malicious Traffic in Groupware Network System (그룹웨어시스템상의 악성트래픽 차단 네트워크구조 설계방법)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.1
    • /
    • pp.69-76
    • /
    • 2007
  • The blocking of malicious traffic in groupware network system is used to prevent the spread and distribution of malicious traffic. The method protecting from malicious traffic in groupware system is designed to handle the malicious traffic of various routes with the internal course of groupware, which leads to lighten the load of security and traffic. It was impossible to block this kind of traffic at the traditional structure. When the protection of the proposed groupware system is performed, there appears to be a great change for the rate of a load factor at the CPU of Backbone Switch which is connected to the internal gateway. The load factor of CPU, which was increased with the traffic, is now remarkably reduced after the internal gateway is set up. This is to show that a lot of malicious traffic pass through the internal network and that network environment is faced to the menace of many malicious traffics. This paper is to show the efficiency of protection of internal gateway proposed in this study, for the rate of CPU of Backbone Switch was about 17% a day, but was dropped up to the 4% after the malicious traffic was removed.

  • PDF

Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack (오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현)

  • Hyun, Jeong-Hoon;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.181-191
    • /
    • 2018
  • With the development of IT, hacking crimes are becoming intelligent and refined. In Emergency response, Big data analysis in information security is to derive problems such as abnormal behavior through collecting, storing, analyzing and visualizing whole log including normal log generated from various information protection system. By using the full log data, including data we have been overlooked, we seek to detect and respond to the abnormal signs of the cyber attack from the early stage of the cyber attack. We used open-source ELK Stack technology to analyze big data like unstructured data that occur in information protection system, terminal and server. By using this technology, we can make it possible to build an information security control system that is optimized for the business environment with its own staff and technology. It is not necessary to rely on high-cost data analysis solution, and it is possible to accumulate technologies to defend from cyber attacks by implementing protection control system directly with its own manpower.

Implementation of A Real Time Watermark Embedding System for Copyright Protection of Digital Broadcasting Contents (디지털 방송 콘텐츠 저작권 보호를 위한 실시간 워터마크 삽입 시스템 구현)

  • Jeong, Yong-Jae;Park, Sung-Mo;Kim, Jong-Nam;Moon, Kwang-Seok
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.2
    • /
    • pp.100-105
    • /
    • 2009
  • A watermarking for copyright protection of digital contents for broadcasting have to be made for a real-time system. In this paper, we propose a real-time video watermarking chip and system which is hardware based watermark embedding system of SD/HD video. Our chip is implemented by FPGA which is STRATIX device from ALTERA, and our system is implemented by GS1560A and GS1532 devices from GENNUM for HD/SD video signal processing. There was little visual artifact due to watermarking in subjective quality evaluation between the original video and the watermarked one. Embedded watermark was all extracted after a robustness test called natural video attacks such as A/D conversion and MPEG compression. Our implemented watermarking hardware system can be useful in movie production and broadcasting companies that requires real-time based copyright protection system.

  • PDF

Content Analysis of the Experience of Youth Correction Program Participation -Walking Correction Program of "Gilwi School"- (청소년 교정프로그램 참여경험에 대한 내용분석 : "길위학교" 걷기 교정프로그램)

  • Kim, Won-Se
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.326-335
    • /
    • 2019
  • This study is focusing on teenagers who are needed a correction program called "Gillwe School". This program has a companion who is called a guide and the guide leads them correction program while walking with teenagers. This report has represented 131 semantic units, 7 sub-constituencies and 4components through analysis of 46 cases of the companion participants stories since 2014 and clearly, defined as the final four regions ("Understanding of protection youth", "Positive change of companion's gaze", "Doubts the walking program", "Program's effectiveness and Companion's importance,".) Through a series of studies, I look forward to finding ways to develop programs for the protection of juvenile correctional professionals, such as trarining professional counselors for protection youth, duration and number of correction programs, and expanding the number of participants.

The Effect of Resiliency Training Program for Child Protection Agency Counselors to Prevent Secondary Traumatic Stress (아동보호전문기관 상담원을 대상으로 한 이차외상스트레스 예방을 위한 레질리언스 훈련 프로그램의 효과 연구)

  • Hyun, Jinhee;Kim, Heeguk
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.532-545
    • /
    • 2019
  • The objective of this study is to find out the effect of the secondary traumatic stress prevention program for counselors at child protection agencies. The quasi-experiment design was used for pre-test, post-test, and for follow-up test, performed 3 months after the program. Experimental group consisted of 9 counselors, while the comparison group consisted of 10 counselors. As a result, it was revealed that secondary traumatic stress prevention program was effective in decreasing the secondary traumatic stress and depression of the counselors, and also effective in increasing stress coping even though it was not statistically significant. Follow-up test did not present statistically significant changes in secondary traumatic stress, depression, and stress coping. It was found that, to achieve continued effect of the program, much longer and sustained program is required. Based on these findings, the necessity and application of the secondary traumatic stress prevention program were suggested.

High-Speed Search for Pirated Content and Research on Heavy Uploader Profiling Analysis Technology (불법복제물 고속검색 및 Heavy Uploader 프로파일링 분석기술 연구)

  • Hwang, Chan-Woong;Kim, Jin-Gang;Lee, Yong-Soo;Kim, Hyeong-Rae;Lee, Tae-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1067-1078
    • /
    • 2020
  • With the development of internet technology, a lot of content is produced, and the demand for it is increasing. Accordingly, the number of contents in circulation is increasing, while the number of distributing illegal copies that infringe on copyright is also increasing. The Korea Copyright Protection Agency operates a illegal content obstruction program based on substring matching, and it is difficult to accurately search because a large number of noises are inserted to bypass this. Recently, researches using natural language processing and AI deep learning technologies to remove noise and various blockchain technologies for copyright protection are being studied, but there are limitations. In this paper, noise is removed from data collected online, and keyword-based illegal copies are searched. In addition, the same heavy uploader is estimated through profiling analysis for heavy uploaders. In the future, it is expected that copyright damage will be minimized if the illegal copy search technology and blocking and response technology are combined based on the results of profiling analysis for heavy uploaders.