• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.039 seconds

Opportunities for Agricultural Water Management Interventions in the Krishna Western Delta - A case from Andhra Pradesh, India

  • Kumar, K. Nirmal Ravi
    • Agribusiness and Information Management
    • /
    • v.9 no.1
    • /
    • pp.7-17
    • /
    • 2017
  • Agricultural water management has gained enormous attention in the developing world to alleviate poverty, reduce hunger and conserve ecosystems in small-scale production systems of resource-poor farmers. The story of food security in the $21^{st}$ century in India is likely t o be closely linked to the story of water security. Today, the water resource is under severe threat. The past experiences in India in general and in Andhra Pradesh in particular, indicated inappropriate management of irrigation has led to severe problems like excessive water depletion, reduction in water quality, water logging, salinization, marked reduction in the annual discharge of some of the rivers, lowering of ground water tables due to pumping at unsustainable rates, intrusion of salt water in some coastal areas etc. Considering the importance of irrigation water resource efficiency, Krishna Western Delta (KWD) of Andhra Pradesh was purposively selected for this in depth study, as the farming community in this area are severely affected due to severe soil salinity and water logging problems and hence, adoption of different water saving crop production technologies deserve special mention. It is quite disappointing that, canals, tube wells and filter points and other wells could not contribute much to the irrigated area in KWD. Due to less contribution from these sources, the net area irrigated also showed declining growth at a rate of -6.15 per cent. Regarding paddy production, both SRI and semi-dry cultivation technologies involves less irrigation cost (Rs. 2475.21/ha and Rs. 3248.15/ha respectively) when compared to transplanted technology (Rs. 4321.58/ha). The share of irrigation cost in Total Operational Cost (TOC) was highest for transplanted technology of paddy (11.06%) followed by semi-dry technology (10.85%) and SRI technology (6.21%). The increased yield and declined cost of cultivation of paddy in SRI and semi-dry production technologies respectively were mainly responsible for the low cost of production of paddy in SRI (Rs. 495.22/qtl) and semi-dry (Rs. 532.81/qtl) technologies over transplanted technology (Rs. 574.93/qtl). This clearly indicates that, by less water usage, paddy returns can be boosted by adopting SRI and semi-dry production technologies. Both the system-level and field-level interventions should be addressed to solve the issues/problems of water management. The enabling environment, institutional roles and functions and management instruments are posing favourable picture for executing the water management interventions in the State of Andhra Pradesh in general and in KWD in particular. This facilitates the farming community to harvest good crop per unit of water resource used in the production programme. To achieve better results, the Farmers' Organizations, Water Users Associations, Department of Irrigation etc., will have to aim at improving productivity per unit of water drop used and this must be supported through system-wide enhancement of water delivery systems and decision support tools to assist farmers in optimizing the allocation of limited water among crops, selection of crops based on farming situations, and adoption of appropriate alternative crops in drought years.

Knowledge and Current Status about AED in the Public Facilities - Focused on the Gwangju City - (다중이용시설에서의 AED에 관한 지식 및 운영실태에 관한 연구 - 광주광역시 중심으로 -)

  • Park, Si-Goo;Park, Chang-Hyun;Chae, Min-Jung
    • The Korean Journal of Emergency Medical Services
    • /
    • v.14 no.3
    • /
    • pp.13-28
    • /
    • 2010
  • Purpose: In this study, we investigated the better application of the law which is about the AED installation and more effective ways of emergency medical care system, to understand the law and to research the current condition of public facilities which belong to local governments, and to seize the aspect of safety guards who currently work in order to provide the installation of AED in the public facilities and to provide more efficient emergency medical service with the effectuation of the immunity law of the good intention of first-aid treatment. Methods: In Gwang-ju, 234 public facilities have been identified by 31 December, 2008. With the exception of the duplication, we researched 158 facilities and received the answers from 95 of them. Results: In the research, 53% of them have had internal emergency first-aid education, and 55% of them didn't have this education and a CPR education manual, and 30% of the facilities even didn't know how to connect with the manager of the company for the first-aid department. On the other hand, most of them were highly interested in CPR and AED education on the ratio of 91% and 93%. 88% of them have been trained about first-aid, 51% of them haven't been retrained, 17% have never been trained. so, the reality of emergency system at public facilities is serious. 78% of them knew they are working at public facilities, though 49% of them didn't know about AED installation. 57% of them didn't know the fact there is the immunity law related with good intentions for first-aid treatment. 63% of the facilities have security guards, and 30% of them didn't answer the questions. Also, many of them agreed to the opinion that all employees should have first-aid training. At representative survey report of participator of public-facility, emergency treatment is 61%, 16% of patients calling. Accordingly they importantly think better doing an on-site first-aid than evacuating the patient. And the rates show that 57% of them answerers tend to call Fire-Office(119) for evacuating the patients, and 28% of them EMIC(1339) for the first-aid. Conclusions: In this study, we are suggest to improve the details of the efficient operations and management after the grasp of the uninstallation, indifference, and unreliable conditions of AED. 1) Need a publicity of AED install cognition which is an emergency medical instrument at public facilities. 2) Arrangement of safety agents at facilities and concerns about them for good management from the parties concerned. 3) Need a designation of legal details according to the decision of the AED installation and the standard of the AED installation. 4) Training about first-aid of safety guards and the persons concerned in the facilities should be practiced participation with the positive and through this, first-aid treatment could be done by anyone who knows the immunity law related to medical emergency. 5) The brochures for the potential users and the results form practicing the instructions need to be improved in many ways through recording the emergency cases that have happened.

  • PDF

A framework of management for preventing illegal distribution of pdf bookscan file (PDF 형식 북스캔 파일 불법 유통 방지를 위한 관리 프레임워크)

  • Lee, Kuk-Heon;Chung, Hyun-Ji;Ryu, Dae-Gull;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.897-907
    • /
    • 2013
  • Since various smart devices are being developed, a growing number of people are reading eBooks instead of paper books. However, people started making eBooks on their own by scanning paper books because there are not enough eBooks provided from market. The term "Bookscan" was made with this reason. The number of bookscan company is increasing because the equipment is too expensive. However, the commercial activity of bookscan company is against copyright law. Also bookscan files are in danger of being illegally distributed on web, because bookscan companies are not protecting copyright. Publication market follows the same procedure with sound market which was collapsed due to copyright problem. Therefore, the technical methods should be prepared for law system against bookscan. The previous ICOP(Illegal Copyrights Obstruction Program) system has been applied to sound and movie files, but not applied to publication. This paper suggests the framework for bookscan file management based on practical mechanism.

A Study on the Importance of the Assessment of Records Management Metadata Elements Related to the Electronic Medical Records Management System for Medical Records Managers (전자의무기록 관리시스템 관련 기록관리 메타데이터 요소들에 대한 의무기록 관리자의 중요도 평가 연구)

  • Lee, Eun-Mi;Kim, Myeong;Yim, Jin Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.3
    • /
    • pp.151-171
    • /
    • 2013
  • To comprehend the importance and necessity of record management metadata standard implemented in an electronic medical records system, a survey was undertaken to 50 medical records managers in charge of 5 major hospitals in Seoul. Analysis of the survey results was performed by averaging the responses given by those who answered the survey. SPSS was utilized for statistical analysis. Managers of medical records placed importance on metadata that are related to security of records, such as "levels of security", "types of access to medical records", "levels of authorization granted to personnel", and "users accessing medical records". It shows that these managers need the functions of privacy protection in ERMS. Metadata on "external disclosure" had the lowest level but those surveyed with more than 7 years of experience placed greater importance in this area more those surveyed with less than 7 years of experience in a hospital. This shows that managers need the functions of external disclosure to meet the needs of third partiesfor medical research and medical education.

Performance of an Authentication Proxy for Port Based Security Systems (포트레벨 보안을 위한 인증 프록시 시스템의 성능분석)

  • 이동현;이현우;정해원;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8B
    • /
    • pp.730-737
    • /
    • 2003
  • In this paper, we present an efficient authentication proxy for IEEE 802.1x systems based on the port-based access control mechanism. An IEEE 802.1x system consists of PC supplicants, a bridge with authentication client functions, and an authentication server. For the network security and user authentication purposes, a supplicant who wants to access Internet should be authorized to access the bridge port using the Extended Authentication Protocol (EAP) over LAN. The frame of EAP over LAN is then relayed to the authentication server by the bridge. After several transactions between the supplicant and the server via the bridge, the supplicant may be either authorized or not. Noting that the transactions between the relaying bridge and the server will be increased as the number of supplicants grows in public networks, we propose a scheme for reducing the transactions by employing an authentication proxy function at the bridge. The proxy is allowed to cache the supplicant's user ID and password during his first transaction with the server. For the next authentication procedure of the same supplicant, the proxy function of the bridge handles the authentication transactions using its cache on behalf of the authentication server. Since the main authentication server handles only the first authentication transaction of each supplicant, the processing load of the server can be reduced. Also, the authentication transaction delay experienced by a supplicant can be decreased compared with the conventional 802.1x system.

Fast RSA Montgomery Multiplier and Its Hardware Architecture (고속 RSA 하드웨어 곱셈 연산과 하드웨어 구조)

  • Chang, Nam-Su;Lim, Dae-Sung;Ji, Sung-Yeon;Yoon, Suk-Bong;Kim, Chang-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.11-20
    • /
    • 2007
  • A fast Montgomery multiplication occupies important to the design of RSA cryptosystem. Montgomery multiplication consists of two addition, which calculates using CSA or RBA. In terms of CSA, the multiplier is implemented using 4-2 CSA o. 5-2 CSA. In terms of RBA, the multiplier is designed based on redundant binary system. In [1], A new redundant binary adder that performs the addition between two binary signed-digit numbers and apply to Montgomery multiplier was proposed. In this paper, we reconstruct the logic structure of the RBA in [1] for reducing time and space complexity. Especially, the proposed RB multiplier has no coupler like the RBA in [1]. And the proposed RB multiplier is suited to binary exponentiation as modified input and output forms. We simulate to the proposed NRBA using gates provided from SAMSUNG STD130 $0.18{\mu}m$ 1.8V CMOS Standard Cell Library. The result is smaller by 18.5%, 6.3% and faster by 25.24%, 14% than 4-2 CSA, existing RBA, respectively. And Especially, the result is smaller by 44.3% and faster by 2.8% than the RBA in [1].

Scaling Attack Method for Misalignment Error of Camera-LiDAR Calibration Model (카메라-라이다 융합 모델의 오류 유발을 위한 스케일링 공격 방법)

  • Yi-ji Im;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1099-1110
    • /
    • 2023
  • The recognition system of autonomous driving and robot navigation performs vision work such as object recognition, tracking, and lane detection after multi-sensor fusion to improve performance. Currently, research on a deep learning model based on the fusion of a camera and a lidar sensor is being actively conducted. However, deep learning models are vulnerable to adversarial attacks through modulation of input data. Attacks on the existing multi-sensor-based autonomous driving recognition system are focused on inducing obstacle detection by lowering the confidence score of the object recognition model.However, there is a limitation that an attack is possible only in the target model. In the case of attacks on the sensor fusion stage, errors in vision work after fusion can be cascaded, and this risk needs to be considered. In addition, an attack on LIDAR's point cloud data, which is difficult to judge visually, makes it difficult to determine whether it is an attack. In this study, image scaling-based camera-lidar We propose an attack method that reduces the accuracy of LCCNet, a fusion model (camera-LiDAR calibration model). The proposed method is to perform a scaling attack on the point of the input lidar. As a result of conducting an attack performance experiment by size with a scaling algorithm, an average of more than 77% of fusion errors were caused.

Management and Control Scheme for Next Generation Packet-Optical Transport Network (차세대 패킷광 통합망 관리 및 제어기술 연구)

  • Kang, Hyun-Joong;Kim, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.35-42
    • /
    • 2012
  • Increase of data traffic and the advent of new real-time services require to change from the traditional TDM-based (Time Division Multiplexing) networks to the optical networks that soft and dynamic configuration. Voice and lease line services are main service area of the traditional TDM-based networks. This optical network became main infrastructure that offer many channel that can convey data, video, and voice. To provide high resilience against failures, Packet-optical networks must have an ability to maintain an acceptable level of service during network failures. Fast and resource optimized lightpath restoration strategies are urgent requirements for the near future Packet-optical networks with a Generalized Multi-Protocol Label Switching(GMPLS) control plane. The goal of this paper is to provide packet-optical network with a hierarchical multi-layer recovery in order to fast and coordinated restoration in packet-optical network/GMPLS, focusing on new implementation information. The proposed schemes do not need an extension of optical network signaling (routing) protocols for support.

Hacking and Countermeasure on Smart TV (스마트 TV 해킹 위협 및 대응방안 분석)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.313-317
    • /
    • 2014
  • Smart-phone, PC or tablet platforms, such as smart terminals spread to the masses trying to capitalize. Smart TV also is increasing. In Korea, market size of TV is growing fast with growth of risk of hacking. In this paper, several kinds of Smart TV hacking cases are presented with the possibility of attacks against the vulnerability analysis and countermeasures. Most of the Linux operating system is open. Thus, it is vulnerable for latest hacking techniques. Most are based on the Linux OS to enhance security mount Sand-Box. However, bypass procedure using the technique, or APT attacks can avoid San-Box technique. New hacking techniques and a variety of ways will occur in the future. Therefore, this paper will develop Smart TV, and it analysis of a security threat and establishes better prepared in the future because new hacking attacks are expected to prepare more.

Design and Implementation of Permission Delegation in Role-Based Access Control Model (권한의 위임을 위한 역할-기반 접근 제어 모델의 설계 및 구현)

  • 나상엽
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.1-10
    • /
    • 2003
  • In the distributed-computing environment, applications or users have to share resources and communicate with each other in order to perform their jobs more efficiently. In this case, it is important to keep resources and information integrity from the unexpected use by the unauthorized user. Therefore, there is a steady increase in need for a reasonable way to authentication and access control of distributed-shared resources. In RBAC, there are role hierarchies in which a higher case role can perform permissions of a lower case role. No vise versa. Actually, however, it is necessary for a lower case role to perform a higher case role's permission, which is not allowed to a lower case role basically. In this paper, we will propose a permission delegation method, which is a permission delegation server, and a permission delegation protocols with the secret key system. As the result of a permission delegation, junior roles can perform senior role's permissions or senior role itself on the exceptional condition in a dedicated interval.

  • PDF