• Title/Summary/Keyword: 네트워크 위험도

Search Result 705, Processing Time 0.023 seconds

Threat Situation Determination System Through AWS-Based Behavior and Object Recognition (AWS 기반 행위와 객체 인식을 통한 위협 상황 판단 시스템)

  • Ye-Young Kim;Su-Hyun Jeong;So-Hyun Park;Young-Ho Park
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.4
    • /
    • pp.189-198
    • /
    • 2023
  • As crimes frequently occur on the street, the spread of CCTV is increasing. However, due to the shortcomings of passively operated CCTV, the need for intelligent CCTV is attracting attention. Due to the heavy system of such intelligent CCTV, high-performance devices are required, which has a problem in that it is expensive to replace the general CCTV. To solve this problem, an intelligent CCTV system that recognizes low-quality images and operates even on devices with low performance is required. Therefore, this paper proposes a Saying CCTV system that can detect threats in real time by using the AWS cloud platform to lighten the system and convert images into text. Based on the data extracted using YOLO v4 and OpenPose, it is implemented to determine the risk object, threat behavior, and threat situation, and calculate the risk using machine learning. Through this, the system can be operated anytime and anywhere as long as the network is connected, and the system can be used even with devices with minimal performance for video shooting and image upload. Furthermore, it is possible to quickly prevent crime by automating meaningful statistics on crime by analyzing the video and using the data stored as text.

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.

Evaluating the economic benefit of diverse drought mitigation strategies for Korean reservoir systems based on simulated inflow sequences (유입량 모의 기법을 활용한 국내 다목적댐 가뭄 대책의 경제적 효과 평가)

  • Ji, Sukwang;Shin, Geumchae;Lee, Seungyub;Ahn, Kuk-Hyun
    • Journal of Korea Water Resources Association
    • /
    • v.56 no.8
    • /
    • pp.485-496
    • /
    • 2023
  • Recently, South Korea has been making efforts to mitigate the risk of water scarcity during droughts by utilizing various drought response measures in dam operations. While various studies have been conducted on this topic, there is currently a lack of research on the economic effects of drought response measures. In this study, we evaluated the economic effects of drought response measures on nationwide multipurpose dams by using a long-term simulated inflow model based on ARIMA and Copula and a dam operation model that reflects drought response measures. The results showed that the expected benefits per unit flow rate were highest for coordinated operation and alternative water supply measures, at KRW 1,176 and KRW 1,139, respectively, while the benefits of emergency water supply utilization and water supply adjustment were estimated at KRW 956 and KRW 875, respectively. Additionally, when we examined the changes in the economic benefits of drought response measures based on the assumption of increased drought severity in the future, the changes in the drought risk resulting from reduced inflow increased the economic benefits of all drought response measures. The economic benefits of water supply adjustment increased by 2.6% compared to the baseline, while the economic benefits of coordinated operation and alternative water supply measures increased by 11.7% compared to the baseline. This suggests that dam-network-based measures, such as coordinated operation and alternative water supply measures, are crucial as drought risk increases. This study is expected to serve as a fundamental reference for selecting and utilizing drought response measures in the future.

Design of Fire Evacuation Guidance System using USN Mesh Routing in High-Rise Buildings (초고층 건물 화재에서 USN 메쉬 라우팅을 이용한 피난유도 시스템 설계)

  • Choi, Yeon-Yi;Joe, In-Whee
    • Fire Science and Engineering
    • /
    • v.22 no.3
    • /
    • pp.278-286
    • /
    • 2008
  • When big fire in high rise building and multiplex happens, the needs for high prevention system of disaster are being increased for getting the real-time scene state, quick lifesaver, and safe life security. In this paper the proposed evacuation guidance algorithm which analyzed the feature and danger of fire in high rise buildings, gave simplicity and scalability. Our research shows as fire and disaster occur in high rise buildings we construct sensor networks and sense realtime location information on fire alive people, and the situation information for fire instructed quick and safe escaping route by using mesh routing algorithm scheme relative to exit sign.

Implementation of a Point-to-Multipoint Wireless Communication System Based on The Bluetooth (블루투스 기반 점 대 다중점 무선 통신시스템의 구현)

  • Bae, Jin-Seop;Kang, Seog-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1921-1927
    • /
    • 2009
  • In this paper, a point-to-multipoint wireless communication system based on Bluetooth specifications, which is possibly applied to very large vessels, is implemented and analyzed. Here, a communication network is composed of a slave Bluetooth module connected to the task computer and multiple master Bluetooth modules equipped with a sensor. And exploiting the point-to-multipoint data communication among the Bluetooth modules, a surveillance system that recognizes and controls a variety of emergency situations happened on a large vessel is implemented. It is, therefore, considered that the wireless communication system implemented in this paper is possibly exploited a basic technology for the digital shipbuilding of the next generation.

A Study on Development of U-Manless Overload Regulation System (U-중차량 무인과적단속시스템 구축방안에 대한 연구)

  • Jo, Byung-Wan;Kim, Do-Keun;Choi, Hae-Yun;Park, Jung-Hun;Yoon, Suk-Min
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.20 no.3
    • /
    • pp.387-392
    • /
    • 2007
  • Overloaded Vehicles are one of biggest of hazard in durability decrease of roads and bridges. Thus, regulation was put in force about overloaded vehicles to reserve this problem. However, existing system had many problems. For these reasons, this paper presents solutions of U-intelligent overload vehicles regulation system based on manless and wireless for fixing of problems of existing system and construction of u-lTS. With this in mind, we studied about composition method of system, applications of USN, design of system controller, WCDMA/HSDPA and we verified performance of WIM Sensors in this paper.

대학생의 개인적, 환경적, 교육적 특성이 창업의도에 미치는 영향 - 전공에 따른 조절효과를 중심으로 -

  • Choe, Seo-Yun;Hwang, Bo-Yun
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2017.04a
    • /
    • pp.63-63
    • /
    • 2017
  • 국내 경제상황의 어려움으로 인한 기업의 고용감소와 그에 따른 일자리 부족 때문에 청년 실업문제가 사회적 이슈로 대두되었고, 일자리에 대한 취업의 다른 대안으로 창업에 대한 관심이 고조되고 있다. 청년 일자리를 해결하기 위해서는 청년층의 중심이라 할 수 있는 대학생의 창업을 활성화할 필요가 있고, 이를 위해서는 다양한 분야를 전공하고 있는 대학생의 학문적 특성을 고려하여 대학생의 창업의도를 높이는 것이 필요하다. 해외의 경우 다양한 계층에 대한 연구를 통해 계층별 창업의도에 미치는 영향요인을 파악하고 이를 관련 정책 및 교육에 반영함으로써 창업의도를 지속적으로 향상시키고 있다. 본 논문에서는 현재 교양과목으로 이루어진 창업강좌를 수강하는 국내 대학생들이 전공에 따른 창업의지에 대한 생각을 살펴보고자 하며, 그들의 창업의지를 보다 고취시키기 위해 필요한 방안들을 도출하고자 한다. 연구방법으로 국내 창업교육을 받고 있는 대학생을 대상으로 설문조사를 진행하였고, 설문조사결과에 대한 신뢰성 및 타당성을 분석한 후 구조방정식을 통해 본 연구에서 설계한 가설을 검증하며, 가설 검증 결과를 분석하게 된다. 독립변수로는 잠재적 창업가의 특성을 파악할 수 있는 개인적 특성 요인(성취욕구, 위험감수성향, 혁신성), 환경적인식 요인(네트워크, 정부의 창업지원제도), 교육적인식 요인(창업강좌, 창업멘토링)을 선정하였고, 조절변수로서 대학생 전공(이공계와 비이공계), 그리고 종속변수로서 창업의지를 설정하여 연구모형을 구성했다. 본 연구를 통해 대학생들의 전공(이공계와 비이공계)에 따른 창업의지 확인과 함께 창업교육에 대한 교과목 설계, 목표설정, 학습 방향 및 방법들을 보완할 수 있는 기회를 얻을 수 있음을 제시하고자 한다.

  • PDF

The Time Prediction for Escape from Flood Using GIS - The Case of Chun-chon City - (GIS분석을 통한 홍수시의 대피예보를 위한 시간 예측 - 춘천시를 중심으로 -)

  • 양인태;김욱남;김재철;박재국
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.19 no.3
    • /
    • pp.211-217
    • /
    • 2001
  • Chun-chon city is the area that is estimated to be damaged by breaking of Dam by a flood among several natural disaster. If so, what is the way that minimize the damage\ulcorner There are many ones but it may be best that we take shelter from it before the breaking of Dam. Then when must we do\ulcorner By what instrument can we minimize the damage of people. And how do we compute the time\ulcorner In this study, using buffering, overlap and network, GIS ability based on ARC/INFO. I chose six routesto take shelter outside of Chun-chon city, calculated the traffic volume of each ones, and estimated the time for decentralization of risks.

  • PDF

The Design and Implementation of Intruder Access Control System by based of Ubiquitous Sensor Network (USN기반의 외부인 출입감시시스템 설계 및 구현)

  • Lee, Kyu-Su;Sim, Hyeon;Oh, Jai-Cheol
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1165-1171
    • /
    • 2012
  • Latest, it is dealt with seriously problems that an intruder kidnapping students in elementary school. Especially young students is more vulnerable in these risks. Elementary School has many limitations in controlling the intrusion of trespassers. A problem occurs that requires a lot of manpower through the deployment and management of security systems such as CCTV and control systems. In this paper, we is designed and implemented the outsider access management system using a sensor network and PZT camera called the USN's core technology to monitoring the access control for controlling the mobility of the trespassers.

Developing a Bayesian Network Model for Real-time Project Risk Management (실시간 프로젝트 위험관리를 위한 베이지안 네트워크 모형의 개발)

  • Kim, Jee-Young;Ahn, Sun-Eung
    • IE interfaces
    • /
    • v.24 no.2
    • /
    • pp.119-127
    • /
    • 2011
  • Most companies have been increasing temporary work projects to maximize the usage of their resources. They also have been developing the effective techniques for analyzing and managing the state of the projects. In order to monitor the state of a project in real-time and predict the project's future state more accurately, this paper suggests the Bayesian Network (BN) as a tool for discovering the causes of project risk and presenting the failure probability of the project. The proposed BN modeling method with consideration of the Earned Value Management (EVM) method shows how to induce the predictive and conditional probability of the risk occurrence in the future. The advantages of the suggested model are (1) that the cause of a project risk can be easily figured out via the BN, (2) that the future value of the project can be sufficiently increased by updating relevant components of the project, and (3) that more credible prediction can be made in the similar and future situation by using the data obtained in current analysis. A numerical example is also given.