• Title/Summary/Keyword: private technical

Search Result 299, Processing Time 0.028 seconds

Food Security Problems in North-East Asia and Cooperative Measures in the 21st Century (21세기 동북아 식량안보문제와 지역간 협력방안)

  • Kwon, Yong Dae
    • Korean Journal of Agricultural Science
    • /
    • v.27 no.2
    • /
    • pp.182-189
    • /
    • 2000
  • The issue of food security will become one of the most widely concerned area of public policy in North East Asia coming 21st century. Although those countries such as China, Japan, South and North Koreas and Mongolia places emphasis on the need to have stable and reliable capacity for food production, it will be highly possible for these regions to experience the shortage of food supply due to growing population, expanding urbanization and rapid industrialization within next decade. Since world food markets are characterized as unstable structure and dominated by large multinational firms, their reliances on importing staple food may create the aggravation of food shortage problem in emergency situations. One possible proposal for solving food security in north-east region might be movements toward multilateral food supply assurance agreements as a component of trade negotiations among these countries. As measures for cooperation for securing food supply in these regions, following principles would be suggested; 1) encouraging agricultural cooperation based on private business, 2) exchange of technical and human resources rather than material support, 3) developing mutual concern and benefits, 4) managing joint buffer stock for staple food.

  • PDF

A Study on Application of Performance Warranty Contract to Building Construction (성능보증계약제도의 건축분야 적용 방안에 관한 연구)

  • Ko, Hyun;Kim, Kyung-Hwan;Lee, Youn-Sun;Kim, Jae-Jun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.687-690
    • /
    • 2007
  • This study is a basic research on looking onto bringing performance warranty contract into the country, to consider the usage in architecture which it is usually used on road pavement in developed countries. The study will also apply performance warranty contracts on public private partnerships through examination and analysis of various matters which will lead to globalization of the korean architecture industry, the increase of quality of result, better convenience for the orderer, the decrease of cost, and the acceleration on research for technical development.

  • PDF

A Study on the Numbering Plan for National Information Infrastructure (초고속 통신망의 번호 체계에 관한 연구)

  • Hwang, Gunn;Kim, Yong-Jin;Choi, Jun-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.3
    • /
    • pp.283-293
    • /
    • 1998
  • The numbering plan, basic requirements for interworking standards, and technical standard specification for National Information Infrastructure have not been defined specifically yet. It is reviewed for the numbering plans of public/private ATM networks based on the standard specifications of W-T and ATM Forum. The specifications for numbering plan are discussed for the interworking between current various networks and National Information Infrastructure based on the related standard specification of ITU-T and ATM Forum.

  • PDF

Analysis of Chaotic True Random Number Generator Using 0.18um CMOS Process (0.18um CMOS 공정을 사용한 카오스 난수 발생기 분석)

  • Jung, Ye-Chan;Jayawickra, Chamindra;Al-Shidaifat, AlaaDdin;Lee, Song-Wook;Kahrama, Nihan;Song, Han-Jung
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.5
    • /
    • pp.635-639
    • /
    • 2021
  • As times goes by, a ton of electric devices have been developing. Nowadays, there are many personal electric goods that are connected each other and have important private information such as identification, account number, passwords, and so on. As many people own at least one electric device, security of the electric devices became significant. To prevent leakage of the information, study of Chaotic TRNG, "Chaotic True Random Number Generator", protecting the information by generating random numbers that are not able to be expected, is essential. In this paper, A chaotic TRNG is introduced is simulated. The proposed Chaotic TRNG is simulated with Virtuoso &, a circuit design program of Cadence that is a software company. For simulating the mentioned Chaotic TRNG, setting values, 0V low and 3V high on Vpulse, 1.2V on V-ref, 3.3V on VDD, and 0V on VSS, are used.

The Data Sharing Economy and Open Governance of Big Data as Public Good

  • LEE, Jung Wan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.11
    • /
    • pp.87-96
    • /
    • 2021
  • Data-driven markets depend on access to data as a resource for products and services. Since the quality of information that can be drawn from data increases with the available amount and quality of the data, businesses involved in the data economy have a great interest in accessing data from other market players and sharing data with other stakeholders. Despite the growing need for access to data and evidence of the economic and social benefits, data access and sharing remains below its potential. Individuals, businesses, and governments often face barriers to data access, which may be compounded by the reluctance to share, including within and across sectors. To address these challenges, this paper focuses on finding possible solutions for a better data-sharing economy. This paper 1) Discusses opportunities and challenges of open data and the data-sharing economy, limitations of private sector data, and issues with open government data. 2) Introduces open government data initiatives and open governance networks initiatives. 3) Suggests possible solutions, including the governance and management, the legal and policy frameworks, and the technical standards for open data with proposing an open data governance model for the data-sharing economy.

Design of Online Certificate Revocation Information Transfer using Verifier Lists (검증자목록을 이용한 실시간 인증서 폐지 정보 전송의 설계)

  • 이용준;정재동;오해석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.45-54
    • /
    • 2003
  • A public key certificate may be revoked before its validity period due to causes like the owner identification information change or the private key damage. Since a certificate has long valid time relatively, it is possible to become revoked during lifetime of certificate. The main technical issue in the public key infrastructure is how to handle the status of the certificate. We propose a simple mechanism for online certificate status validation that is suited to the financial network The characteristic of the proposed method is to broadcast certificate revocation information by using verifier list. The experimental results provide the same realtime as OCSP(Online Certificate Status Protocol). The proposed mechanism reduces the network load for certificate status validation in highly concentrated unbearable network.

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

Technical Trends of Medical AI Hubs (의료 AI 중추 기술 동향)

  • Choi, J.H.;Park, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.1
    • /
    • pp.81-88
    • /
    • 2021
  • Post COVID-19, the medical legacy system will be transformed for utilizing medical resources efficiently, minimizing medical service imbalance, activating remote medical care, and strengthening private-public medical cooperation. This can be realized by achieving an entire medical paradigm shift and not simply via the application of advanced technologies such as AI. We propose a medical system configuration named "Medical AI Hub" that can realize the shift of the existing paradigm. The development stage of this configuration is categorized into "AI Cooperation Hospital," "AI Base Hospital," and "AI Hub Hospital." In the "AI Hub Hospital" stage, the medical intelligence in charge of individual patients cooperates and communicates autonomously with various medical intelligences, thereby achieving synchronous evolution. Thus, this medical intelligence supports doctors in optimally treating patients. The core technologies required during configuration development and their current R&D trends are described in this paper. The realization of the central configuration of medical AI through the development of these core technologies will induce a paradigm shift in the new medical system by innovating all medical fields with influences at the individual, society, industry, and public levels and by making the existing medical system more efficient and intelligent.

Theoretical Basis of Studying the Educational Environment with the Application of GR-Technologies

  • Romanchenko, Inna;Vasylevska, Olena;Haltsova, Svitlana;Babicheva, Hanna;Batsula, Natalia;Kravchenko, Hanna;Lytvyn, Aelita
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.28-32
    • /
    • 2021
  • The article discusses the theoretical and methodological part that characterizes and assessment of the current state of the theory of GR-activity, disclosed the essence and content of the concept of GR-technologies, as well as their classification. The analysis of the system of additional education for children in the social structure, as well as the analysis of the current state of the education system is carried out. The formulation of tasks for the construction of an effective model for the use of GR-technologies in the process of developing the education system using GR-technologies

A Study on the Users' Response to Privacy Issues in Customized Services

  • Park, Sunwoo;Baek, Jeongyun;Yoo, Yeajoo;Kim, Dongwhan
    • Journal of Multimedia Information System
    • /
    • v.9 no.3
    • /
    • pp.201-208
    • /
    • 2022
  • Customized service is a vital and mandatory element for apps in improving their technical performance and app customer analysis. While apps require users' consent for their data extraction and usage, many of the terms and agreement forms are written intricately, making it harder for users to fully understand the whole concept of users' data collection for customized services. Ever since the Facebook-Cambridge Analytica scandal, personal data privacy has been re-examined, forcing many app companies to reinforce a reliable solution to data privacy issues. However, there has not been a secured solution, which worries many people about the future advanced issues when metaverse platforms are actively used in daily apps. The research aims to collect the reactions and behaviors of everyday app users who utilize apps with customized services to understand the nature of privacy data issues and the users' opinions about the future implementation of metaverse platforms. The method of the research was an online questionnaire that targeted university students. The study revealed many fearful and anxious reactions about personal data and further metaverse issues where most app users were uneducated about how current apps collect and utilize users' private data.