• Title/Summary/Keyword: 감시 코드

Search Result 99, Processing Time 0.027 seconds

Assessment of Thyroid Dose Evaluation Method by Monitoring of I-131 Concentration in Air (공기중 I-131 농도 감시에 의한 갑상선 피폭 평가법의 적용성)

  • Lee, Jong-Il;Seo, Kyung-Won
    • Journal of Radiation Protection and Research
    • /
    • v.19 no.1
    • /
    • pp.69-80
    • /
    • 1994
  • The TCMI(Three-Compartment Model for iodine) computer code has been developed, which is based on the three-compartment model and the respiratory model recommended in ICRP publication 54. This code is able to evaluate the thyroid burden, dose equivalent, committed dose equivalent and urinary excretion rate as time-dependent functions from the input data: working time and the radioiodine concentration in air. Using the TCMI code, the time-dependent thyroid burdens, the thyroid doses and the urinary excretion rates were calculated for three specific exposure patterns : acute, chronic and periodic. Applicability as an internal dose evaluation method has been assessed by comparing the results with some operational experiences. Simple equations and tables are provided to be used in the evaluation of the thyroid burden and the resulting doses for given I-131 concentration in air and the working time.

  • PDF

Development of Secure Entrance System using AOP and Design Pattern (관점지향 소프트웨어 개발 방법론과 디자인 패턴을 적용한 출입 보안 시스템 개발)

  • Kim, Tae-Ho;Cheon, Hyeon-Jae;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.943-950
    • /
    • 2010
  • A secure entrance system is complicated because it should have various functions like monitoring, logging, tracing, authentication, authorization, staff locating, managing staff enter-and-leave, and gate control. In this paper, we built and applied a secure entrance system for a domestic nuclear plant using Aspect Oriented Programming(AOP) and design pattern. Using AOP has an advantage of clearly distinguishing the role for each functional module because building a system separated independently from the system's business logic and security logic is possible. It can manage system alternation flexibility by frequent change of external environment, building a more flexible system based on increased code reuse, efficient functioning is possible which is an original advantage of AOP. Using design pattern enables to design by structuring the complicated problems that arise in general software development. Therefore, the safety of the system can also be guaranteed.

A Study on the Institutional Improvement for Establishment of Occupational Identity and Occupational Prestige of Private Security (민간경비의 직업정체성과 직업명망 확립을 위한 제도적 개선방안 연구 : 한국표준직업분류상 경비원 직업분류의 개선을 중심으로)

  • Seo, Jin Seok
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.187-203
    • /
    • 2017
  • This study focuses on analyzing the problems of the Korean standard classification of occupations(KSCO), which is a formal and institutional implementation method that affects the occupational identity and Occupational Prestige of Private Security, and suggests ways to improve it. The following should be supplemented. (1) It is necessary to unify occupations related to private security that are classified into simple labor workers. (2) Delete the Technical Security Guards(4123) and create a Security Guard(4123) instead. (3) Facility Security Guards(41230), Convoy Security Guards, Technical Security Guards(41232), Security monitoring and control personnel(41233), and Special Security Guards(National important facility security guard)(41234) will be newly established. (4) Change the name of subclassification and subclassification in simple labor worker of Major Class 9(Code 9), and adjust Security Guards(9421) to the Surveillance Personnel(9421).

An Efficient Decoy File Placement Method for Detecting Ransomware (랜섬웨어 탐지를 위한 효율적인 미끼 파일 배치 방법)

  • Lee, Jinwoo;Kim, Yongmin;Lee, Jeonghwan;Hong, Jiman
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.27-34
    • /
    • 2019
  • Ransomware is a malicious program code evolved into various forms of attack. Unlike traditional Ransomware that is being spread out using email attachments or infected websites, a new type of Ransomware, such as WannaCryptor, may corrupt files just for being connected to the Internet. Due to global Ransomware damage, there are many studies conducted to detect and defense Ransomware. However, existing research on Ransomware detection only uses Ransomware signature database or monitors specific behavior of process. Additionally, existing Ransomware detection methods hardly detect and defense a new Ransomware that behaves differently from the traditional ones. In this paper, we propose a method to detect Ransomware by arranging decoy files and analyzing the method how Ransomware accesses and operates files in the file system. Also, we conduct experiments using proposed method and provide the results of detection and defense of Ransomware in this paper.

Possibility of Information Leakage through Analysis of Chinese Antivirus Software (중국 안티바이러스 제품 분석을 통한 정보유출 가능성 연구)

  • Park, Wonhyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1369-1374
    • /
    • 2021
  • Recently, controversy has been raised over the security and safety of Chinese-made network equipment (Huawei 5G), apps (TikTok, etc.). In particular, according to the results of the Ministry of Defense investigation in 2020, malicious codes were found in CCTVs made in China that were delivered as military surveillance equipment used as a coast guard system, and specific information was remotely transmitted to a Chinese server. The safety issues of these Chinese security products can be questioned as being systematically led by the state rather than by companies or individuals. In this paper, we perform network and process level analysis of 360 Total Security(360 TS), a Chinese antivirus software. In addition, it compares and analyzes the domestic cloud-based vaccine V3 Lite product. Through this, the safety of Chinese security solutions is checked and information leakage and risks are suggested.

Study on the Real-time COVID-19 Confirmed Case Web Monitoring System (실시간 코로나19 확진자 웹 모니터링 시스템에 대한 연구)

  • You, Youngkyon;Jo, Seonguk;Ko, Dongbeom;Park, Jeongmin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.1
    • /
    • pp.171-179
    • /
    • 2022
  • This paper introduces a monitoring and tracking system for corona19 confirmed patients based on the collected data by installing a device that can manage the access list at the entrance to each building on the campus. The existing QR-based electronic access list can't measure the temperature of the person entering the building and it is inconvenient that members have to scan their QR codes with a smartphone. In addition, when the state manages information about confirmed patients and contacts on campus, it is not easy for members to quickly share and track information. These could lead to cases where a person is in close contact with an infected person developing another patient. Therefore, this paper introduces a device using face recognition library and a temperature sensor installed at the entrance of each building on the campus, enabling the administrator to monitor the access status and quickly track members of each building in real-time.

Verification of VIIRS Data using AIS data and automatic extraction of nigth lights (AIS 자료를 이용한 VIIRS 데이터의 야간 불빛 자동 추출 및 검증)

  • Suk Yoon;Hyeong-Tak Lee;Hey-Min Choi;;Jeong-Seok Lee;Hee-Jeong Han;Hyun Yang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.104-105
    • /
    • 2023
  • 해양 관측과 위성 원격탐사를 이용하여 시공간적으로 다양하게 변하는 생태 어장 환경 및 선박 관련 자료를 획득할 수 있다. 이번 연구의 주요 목적은 야간 불빛 위성 자료를 이용하여 광범위한 해역에 대한 어선의 위치 분포를 파악하는 딥러닝 기반 모델을 제안하는 것이다. 제안한 모델의 정확성을 평가하기 위해 야간 조업 어선의 위치를 포함하고 있는 AIS(Automatic Identification System) 정보와 상호 비교 평가 하였다. 이를 위해, 먼저 AIS 자료를 획득 및 분석하는 방법을 소개한다. 해양안전종합시스템(General Information Center on Maritime Safety & Security, GICOMS)으로부터 제공받은 AIS 자료는 동적정보와 정적정보로 나뉜다. 동적 정보는 일별 자료로 구분되어있으며, 이 정보에는 해상이동업무식별번호(Maritime Mobile Service Identity, MMSI), 선박의 시간, 위도, 경도, 속력(Speed over Ground, SOG), 실침로(Course over Ground, COG), 선수방향(Heading) 등이 포함되어 있다. 정적정보는 1개의 파일로 구성되어 있으며, 선박명, 선종 코드, IMO Number, 호출부호, 제원(DimA, DimB, DimC, Dim D), 홀수, 추정 톤수 등이 포함되어 있다. 이번 연구에서는 선박의 정보에서 어선의 정보를 추출하여 비교 자료로 사용하였으며, 위성 자료는 구름의 영향이 없는 깨끗한 날짜의 영상 자료를 선별하여 사용하였다. 야간 불빛 위성 자료, 구름 정보 등을 이용하여 야간 조업 어선의 불빛을 감지하는 심층신경망(Deep Neural Network; DNN) 기반 모델을 제안하였다. 본 연구의결과는 야간 어선의 분포를 감시하고 한반도 인근 어장을 보호하는데 기여할 것으로 기대된다.

  • PDF

Development of IoT Searching System Missing Children by utilizing Open Source Hardware (오픈소스 하드웨어를 이용한 IoT 미아찾기 시스템)

  • Heo, Seong-Mu;Kim, Cha-Jong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.277-280
    • /
    • 2016
  • Currently, systems for finding missing children are composed of using communication between a QR code and RFID chip, as the use of a smartphone. However, the current systems for finding missing children have limitations in that children can only be found if there are people in the surrounding area; there is an economic burden on parents required to purchase a smartphone for their children; along with difficulties in finding the missing children without the assistance of those in the surrounding area in critical situations such as a kidnapping, due to the limited duration of the battery life. In order to solve such problems, approaches need to be made from two perspectives: having someone in the surrounding area; and absence of anyone in the surrounding area. This thesis is centered on the development of a IoT (Internet of Things) system for finding missing children that combines two methods, namely, the method of finding missing children without a guardian in the surrounding area -within the limited space in which AP is installed by using a beacon and open source hardware being highlighted as the IoT technology - and the method of finding missing children with the smartphone application in which each individual becomes the Access Point (AP). The Main purpose is to provide accurate information of missing children's location for the 2situations and it is found that the accuracy of smartphones APP is 97.7% and security device AP is 91.1%.

  • PDF

Monitoring Reports about Nine High Risk Insect Pests in 2018 (2018년 고위험해충 9종에 대한 예찰조사 보고)

  • Lee, Jieun;Lee, Hyobin;Ki, Woong;Kim, Dong-Soon;Kim, Subin;Kim, Hyojoong;Park, Jong-Seok;Oh, Jaeseok;Yu, Yeonghyeok;Lee, Seunghwan;Lee, Jaeha;Jung, Chuleui;Cho, Geonho;Hong, Ki-Jeong;Lee, Wonhoon
    • Korean journal of applied entomology
    • /
    • v.58 no.3
    • /
    • pp.183-187
    • /
    • 2019
  • To establish the cooperative monitoring network which can investigate introductions or outbreaks of high risk insect pests into Korea, seven universities, Gyeongsang National University, Kunsan National University, Seoul National University, Sunchon National University, Andong National University, Jeju National University, and Chungbuk National University, carried out seven regions' monitoring about nine high risk insect pests, Aceria diospyri, Bactrocera dorsalis, Bactrocera minax, Bactrocera tsuneonis, Cydia pomonella, Lobesia botrana, Proeulia sp., Solenopsis invicta, Stephanitis takeyai, from June to October in 2018. A total of 7,560 traps/visual scouting were investigated in 315 points of 105 local sites of seven regions, resulting the nine species, A. diospyri, B. dorsalis, B. minax, B. tsuneonis, C. pomonella, L. botrana, Proeulia sp., S. invicta, and S. takeyai, were not detected. From this study, we established the nationwide monitoring system which can early detect high risk insect pests and secured a bridgehead for monitoring invasive insect pests passing the border.