• Title/Summary/Keyword: 방범

Search Result 401, Processing Time 0.027 seconds

Visualized Determination for Installation Location of Monitoring Devices using CPTED (CPTED기법을 통한 모니터링 시스템 설치위치 시각화 결정법)

  • Kim, Joohwan;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.145-150
    • /
    • 2015
  • Needs about safety of residents are important in urbanized society, elderly and small-size family. People are looking for safety information system and device of CPTED. That is, Needs and Installations of CCTV increased steadily. But, scientific analysis about validity, systematic plan and location of security CCTV is nonexistent. It is simply put these devised in more demanded areas. It has limits to look for safety of residents by increasing density of CCTVs. One of the characteristics of crime is clustering and stong interconnectivity. So, exploratory spatial data of crime is geo-coded using 2 years data and carried out cluster analysis and space statistical analysis through GIS space analysis by dividing 18 variables into social economy, urban space, crime prevention facility and crime occurrence index. The result of analysis shows cluster of 5 major crimes, theft, violence and sexual violence by Nearest Neighbor distance analysis and Ripley's K function. It also shows strong crime interconnectivity through criminal correlation analysis. In case of finding criminal cluster, you can find criminal hotspot. So, in this study I found concept of hotspot and considered technique about selection of hotspot. And then, selected hotspot about 5 major crimes, theft, violence and sexual violence through Nearest Neighbor Hierarchical Spatial Clustering.

Studies on the Production of Twins in Cattle (소의 쌍자 생산술 개발에 관한 연구)

  • Hwang Woo-Suk
    • Journal of Veterinary Clinics
    • /
    • v.7 no.2
    • /
    • pp.511-515
    • /
    • 1990
  • Induction of twinning was attempted by transfer of two whole- or demi-embryos in Holstein cows and heifers. Cows were superovulated with follicle stimulating hormone(FSH) administered twice daily in intra-muscular injection. On day of 6.5 to 7 post-estrus, embryos were collected nonsurgically, Normal morulae and early balstocysts were obtained from superovulated cows. The embryos were hisected with a micro-blade made from a razor. Twenty seven pairs of half embryos were successfully produced and 23 pairs of half embryos were transferred to recipients( Group A). Twenty cows were treated with low unit of FSH (3mg${\times}$2,2mg${\times}$2 ; Group B1, 2mg${\times}$2, 1mg${\times}$2, 1mg${\times}$2 ; Group 32) to induce double or triple ovulations. The cows of Group B1 and B2 were Inseminated artificially(A1) at following estrus. Twenty four heifers were bred by A1 and received an additional embryo into the uterine horn contralateral to the corpus luteum(CL) 6 days later(Group C). One embryo was transferred into each uterine hem of 16 heifers 6 days after estrus(Group D). Fourteen heifers were received two embryos into the uterine horn ipsilateral to the CL at day 6 of estrous cycle(Group I). Pregnancy rates at 60 days in Group A, B1, B2, C, D and E were 34.8%, 70.0%, 60.0%, 66.7%, 62.5% and 57.1%, respectively. Twinning rates were 8.7%, 20.0%, 10.0%, 16.7%, 18.7% and 21.4%, respectively. The present experiments demonstrate that FSH treatment( Group 31) and ipsilateral transfer( Group I ) of two whole-embryos are more useful methods to produce twins than the others.

  • PDF

The Comparative Analysis on Performance of the Patrol Division System (순찰지구대 운영성과에 대한 지역경찰의 인식분석)

  • Son, Neung-Su
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.285-309
    • /
    • 2007
  • This study aims to empirically analyze the police officers' recognition on performance of the patrol division system. For this purpose. Firstly, the study discusses the theoretical aspects of the patrol division system and its performance. Secondly, the analytical framework is formulated based on three levels developed for performance of the patrol division system such as efficiency of the patrol division system, partnership between police and citizen, and police officers' job satisfaction. The major findings of this study could be summarized as follows; Firstly, The level of the efficiency is below the average in all factors. Secondly, In relation to partnership between police and citizen is below the average in the level of the citizens' preference and partnership. Thirdly, the level of job satisfaction is normal. Fourthly, compared in the level of the areas, there is a difference in the recognition on four factors in efficiency and three factors in partnership. Finally, the direction of raising the level of performance of the patrol division system is explored.

  • PDF

The Search of the Crime Prevention Method through the Crime Pattern to Apartment Type (아파트의 형태에 따른 범죄유형과 범죄예방 방법 모색)

  • Choi, Hwan-Young;Chae, Jong-Min
    • Journal of forensic and investigative science
    • /
    • v.2 no.1
    • /
    • pp.23-31
    • /
    • 2007
  • Apartments are built in small countries to accommodate densely populated cities and maximize urbanization. Many apartment complexes have been built in recent reconstruction or redevelopment projects. An increase in crime has resulted due to residents living in a narrow space. Larceny is the most commonly reported crime in apartment complexes. Apartments can be classified as stairway, hallway, or plane surface. This study compares and analyzes the frequency of theft by apartment type to assist in creating a safer residential space. In America and England, scholars studied to make a safer residential space, and have applied the theory of 'the Defensible Space' and 'Crime Prevention Through Environmental Design(CPTED)' since 1970s. Korean apartment design now reflects CPTED in new apartment construction. In this study, 12 apartment complexes were selected in Changwon city to conduct analysis of theft in selected complexes. The study will cover housing invasion theft, motorcycle and car theft and snatching. The most frequency larceny is motorcycle and car theft, the second is housing invasion theft, and the least frequent is snatching. More residents' motorcycles and cars are damaged in a hallway style apartment. More frequently inhabitants have their possessions snatched on a stairway form. 1) When we build new apartment complexes, we must plan to improve territoriality and enhance a natural surveillance by reinforcing dwellers' relationship. Through planning we can prevention the larceny in apartments.

  • PDF

A Reliable Web Service Support Mechanism based on Asynchronous Architecture in BcN (광대역통합망에서의 비동기 구조를 이용한 신뢰성 있는 웹 서비스 제공방안)

  • Kim Hyoung-min;Jung Yeu-hun;Kim Hwa-sung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.773-780
    • /
    • 2005
  • Recently, the telecommunication network is in a transition toward the BcN (Broadband convergence Networks) that integrates the Internet, the telecommunication and the broadcasting. The BcN makes it possible to provide of 4he third-party application by using the Open API The Parlay X API is an example of the Open API and the Parlay X API is grafted in the Web Service and is abstracted from the Parlay API. So, the Parlay X API does not only have advantages of a Web Service, but also disadvantages of the Web Service. The main disadvantage of the Web Service is that it does not support the any QoS mechanism. In this paper, we propose the architecture that solves the reliability among the QoS issues for the Web Service. The proposed mechanism adopts the Asynchronous architecture for the reliable Web Service and improves the performance of the retransmission between the client and the server using the expected response time. We perform the performance evaluation through the simulation in older to compare with the existing mechanism. Consequently, we can confirm that the performance of the proposed mechanism performs better than the existing mechanism.

Development of CCTV Cooperation Tracking System for Real-Time Crime Monitoring (실시간 범죄 모니터링을 위한 CCTV 협업 추적시스템 개발 연구)

  • Choi, Woo-Chul;Na, Joon-Yeop
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.546-554
    • /
    • 2019
  • Typically, closed-circuit television (CCTV) monitoring is mainly used for post-processes (i.e. to provide evidence after an incident has occurred), but by using a streaming video feed, machine-based learning, and advanced image recognition techniques, current technology can be extended to respond to crimes or reports of missing persons in real time. The multi-CCTV cooperation technique developed in this study is a program model that delivers similarity information about a suspect (or moving object) extracted via CCTV at one location and sent to a monitoring agent to track the selected suspect or object when he, she, or it moves out of range to another CCTV camera. To improve the operating efficiency of local government CCTV control centers, we describe here the partial automation of a CCTV control system that currently relies upon monitoring by human agents. We envisage an integrated crime prevention service, which incorporates the cooperative CCTV network suggested in this study and that can easily be experienced by citizens in ways such as determining a precise individual location in real time and providing a crime prevention service linked to smartphones and/or crime prevention/safety information.

A Study on the Utilization of Private Security for Preventing School Violence (학교폭력 예방을 위한 민간경비의 활용방안)

  • Jung, Eui-Lom
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.387-411
    • /
    • 2014
  • School violence is now considered not only as a problem for a victim and a offender themselves, but also as a social problem that requires responsibilities of school, home, society, and even nation. Crimes and risk factors are various inside and outside of school. In terms of solving those problems, this study examines the actual condition of school violence among students. In addition, it is considered what efforts are conducted by police to establish a safe school environment and the problems that derive from it. Futhermore, this study aims to discuss the ways of using the private security with regard to dealing with school violence. In this society, the expectation of security service from the police is increased as time passed. However, police has limited resources, thus it is beyond their practice. Policing has changed from being monopolized by government to cooperating with various security agents. Community is not considered as the subject for enforcing the law anymore, but as the cooperator for effective policing. With regard to the limitation of police force, using the private security is an effective alternative. Therefore, it is required that private security should be assigned legal authority and shared information with schools in order to patrol the blind spot. Finally, school violence prevention efforts should be conducted by applying physical and electronic security.

  • PDF

A Study on Difference between Private Security and Private Investigation (민간경비업과 민간조사업의 차이점 연구)

  • Son, Dong-Woon;Jo, Sung-Gu;Kim, Dong-Je
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.295-317
    • /
    • 2014
  • In advanced country, private investigation system is made up of private security and in domestic, there is growing need constantly to introduce private investigation but it is not passed until now in assembly so a messenger office which is run illegally is growing because of demand by subdividing business areas. That is a proof that both the police and private security don't meet demand of public peace to the public. that's why the police has own businesses like a investigation, traffic, intelligence, crime prevention and private security's business areas are limited like a facilities security, escort security, protection of a person, machine security, special security as the Private Security Act. This study attempts to know structural difference between private security system and private investigation system in case private investigation system becomes one of the private security. on some question, respondents reply like that private security and private investigation is very different(71.2%), different(22.4%), average(6.3%), similar(0.0%), very similar(0.0%). the result seems like respondents recognize private security and private investigation as different businesses. In the result of non-quantity analysis, the differences seem like a business character, expense, business scope, public power, scale of organization, object of threat, legislation. In domestic, effort to legislate private investigation system has undergone difficulty since congressman Ha Soon Bong's motion in 1999 and today, congressman Yoon Jae Ok's All Amendments Private Security Act and congressman Song Young Geun's Private Inveswtigation Act are pending in assembly. This study's result is intended for examining difference in exploration between private security and private investigation and then there is going to propose to the policy in case private investigation system is passed in assembly by amending Private Security Act like congressman Yoon Jea Ok's All Amendment Private Security Act.

  • PDF

Expert System-based Context Awareness for Edge Computing in IoT Environment (IoT 환경에서 Edge Computing을 위한 전문가 시스템 기반 상황 인식)

  • Song, Junseok;Lee, Byungjun;Kim, Kyung Tae;Youn, Hee Yong
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.21-30
    • /
    • 2017
  • IoT(Internet of Things) can enable networking and computing using any devices is rapidly proliferated. In the existing IoT environment, bottlenecks and service delays can occur because it processes data and provides services to users using central processing based on Cloud. For this reason, Edge Computing processes data directly in IoT nodes and networks to provide the services to the users has attracted attention. Also, numerous researchers have been attracted to intelligent service efficiently based on Edge Computing. In this paper, expert system-based context awareness scheme for Edge Computing in IoT environment is proposed. The proposed scheme can provide customized services to the users using context awareness and process data in real-time using the expert system based on efficient cooperations of resource limited IoT nodes. The context awareness services can be modified by the users according to the usage purpose. The three service modes in the security system based on smart home are used to test the proposed scheme and the stability of the proposed scheme is proven by a comparison of the resource consumptions of the servers between the proposed scheme and the PC-based expert system.

Crime-Prevention in the Community and the Security Activity (환경설계를 통한 범죄예방과 민간경비의 역할)

  • Jang, Ye-Jin
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.301-316
    • /
    • 2008
  • The occurrence of complicating, multilateral social condition demands the strategy for facing many social state and consolidating public security against criminal loss. The lacking ability of local police for preventing crime can't satisfy the demand of security and can't get rid of fear of crime. At last, it brings a distrust of public confidence and became a factor of serious social crisis. We have problems - not only making an alternative plan for preventing crime, but also introducing CPTED(Crime Prevention Through Environmental Design) by environmental design, to expect crime prevention and to select systemic crime prevention system and the most suitable model. And we have a goal - to recognize the importance of guard activity for local crime, analyse public safety activity in community & focusing guard activity as a strategy for them, apply CPTED in police and private security company as a local crime prevention & setting effective model, and, make it as an index for preventing & dealing with intellectual, brutal crime. The rapid growth in the guarding-activity field lighten the burden of police for crime-prevention. But the misjudgement of some people blocks it to be settled institutionally. It needs to reconsider what is the effective crime-prevention method, at this point of time when the all parts of a nation changing into unlimited competitive, private self-control system.

  • PDF