• Title/Summary/Keyword: safety code

Search Result 1,835, Processing Time 0.027 seconds

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

Evaluation and Verification of the Attenuation Rate of Lead Sheets by Tube Voltage for Reference to Radiation Shielding Facilities (방사선 방어시설 구축 시 활용 가능한 관전압별 납 시트 차폐율 성능평가 및 실측 검증)

  • Ki-Yoon Lee;Kyung-Hwan Jung;Dong-Hee Han;Jang-Oh Kim;Man-Seok Han;Jong-Won Gil;Cheol-Ha Baek
    • Journal of the Korean Society of Radiology
    • /
    • v.17 no.4
    • /
    • pp.489-495
    • /
    • 2023
  • Radiation shielding facilities are constructed in locations where diagnostic radiation generators are installed, with the aim of preventing exposure for patients and radiation workers. The purpose of this study is seek to compare and validate the trend of attenuation thickness of lead, the primary material in these radiation shielding facilities, at different maximum tube voltages by Monte Carlo simulations and measurement. We employed the Monte Carlo N-Particle 6 simulation code. Within this simulation, we set a lead shielding arrangement, where the distance between the source and the lead sheet was set at 100 cm and the field of view was set at 10 × 10 cm2. Additionally, we varied the tube voltages to encompass 80, 100, 120, and 140 kVp. We calculated energy spectra for each respective tube voltage and applied them in the simulations. Lead thicknesses corresponding to attenuation rates of 50, 70, 90, and 95% were determined for tube voltages of 80, 100, 120, and 140 kVp. For 80 kVp, the calculated thicknesses for these attenuation rates were 0.03, 0.08, 0.21, and 0.33 mm, respectively. For 100 kVp, the values were 0.05, 0.12, 0.30, and 0.50 mm. Similarly, for 120 kVp, they were 0.06, 0.14, 0.38, and 0.56 mm. Lastly, at 140 kVp, the corresponding thicknesses were 0.08, 0.16, 0.42, and 0.61 mm. Measurements were conducted to validate the calculated lead thicknesses. The radiation generator employed was the GE Healthcare Discovery XR 656, and the dosimeter used was the IBA MagicMax. The experimental results showed that at 80 kVp, the attenuation rates for different thicknesses were 43.56, 70.33, 89.85, and 93.05%, respectively. Similarly, at 100 kVp, the rates were 52.49, 72.26, 86.31, and 92.17%. For 120 kVp, the attenuation rates were 48.26, 71.18, 87.30, and 91.56%. Lastly, at 140 kVp, they were measured 50.45, 68.75, 89.95, and 91.65%. Upon comparing the simulation and experimental results, it was confirmed that the differences between the two values were within an average of approximately 3%. These research findings serve to validate the reliability of Monte Carlo simulations and could be employed as fundamental data for future radiation shielding facility construction.

A Study on the Countermeasures Taken By the Korean Healthcare and Life Sciences Industry Regarding U.S. Import Refusals: Focus on the Analysis of FDA Violation Codes (한국 바이오헬스 산업의 미국 수입거부 대응 방안 연구 : FDA 위반코드 분석을 중심으로)

  • Yu-Han Lee;Hag-Min Kim
    • Korea Trade Review
    • /
    • v.48 no.3
    • /
    • pp.131-150
    • /
    • 2023
  • The purpose of this study was to find a countermeasure to the U.S. import refusals for the Korean healthcare and life sciences industry. To this end, an analysis of trends during the pandemic was conducted using the KITA Border Rejection Database, which includes information on items and types of import refusals. The reason for rejection was also analyzed according to the FDA violation codes. The degree of countermeasure for import refusals was identified by measuring the unit rejection rate (URR). The results of the analysis showed that the major U.S. import refusals for the Korean healthcare and life sciences industry had expanded from contact lenses to COVID-19 diagnostic kits and drugs after the pandemic broke out. The major reasons for import refusals were non-compliance with the Predicate Device and Drugs Act and non-approval by the FDA for products and facilities. On the other hand, the unit rejection rate (URR) of major items in the Korean healthcare and life sciences industry was measured higher than the industry average. The results therefore showed a low level of response to U.S. import refusals. The results of the analysis of reasons for import refusals by item according to FDA violation codes were as follows. First of all, the main violation for contact lenses and COVID-19 diagnostic kits corresponded to misbranding. This was often due to the fact that Korean companies did not provide the relevant notices and information required by the FDA. Many cases also failed to demonstrate a substantial equivalency compared to predicate devices already on the market. On the other hand, applications for new unapproved drugs were not accepted as they had yet to pass relevant regulations that would prove their safety and efficacy. In conclusion, import refusals for the Korean healthcare and life sciences industry were found to be closely related to technical barriers to trade (TBT).

Studies on the Repeated Toxicity Test of Food Red No.2 for 4 Weeks Oral Administration in SD Rat (SD랫드에서 식용색소 적색2호의 4주간 경구투여에 따른 반복독성시험에 관한 연구)

  • Yoo, Jin-Gon;Jung, Ji-Youn
    • Journal of Food Hygiene and Safety
    • /
    • v.27 no.1
    • /
    • pp.42-49
    • /
    • 2012
  • This study was carried out to investigate the toxicity of food Red No.2 in the Sprague-Dawley (SD) female rat for 4 weeks. SD rats were orally administered for 28 days, with dosage of 500, 1,000, 2,000 mg/kg/day. Animals treated with food Red No.2 did not cause any death and show any clinical signs. They did not show any significant changes of body weight, feed uptake and water consumption. There were not significantly different from the control group in urinalysis, hematological, serum biochemical value and histopathological examination. In conclusion, 4 weeks of the repetitive oral medication of food Red No.2 has resulted no alteration of toxicity according to the test materials in the group of female rats with injection of 2,000 mg/kg. Therefore, food Red No.2 was not indicated to have any toxic effect in the SD rats, when it was orally administered below the dosage 2,000 mg/kg/day for 4 weeks.

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.