• Title/Summary/Keyword: 보안산업

Search Result 1,698, Processing Time 0.023 seconds

Vertical Upward Air-Water Two-Phase Flow Regime Identification (수직상향류 공기-물 이상유동영역 판별)

  • Lee, Ba-Ro;Jang, Young-Jun;Ko, Min-Seok;Lee, Bo-An;Lee, Yeon-Gun;Kim, Sin
    • Journal of Energy Engineering
    • /
    • v.22 no.4
    • /
    • pp.362-369
    • /
    • 2013
  • Two-phase flow is frequently observed in many industries such as nuclear power plants and oil transportation. Two-phase flow regime depends on the flow rates, the fluid properties and the structure of flow channels. Since the identification of the flow regime is of great importance in the system design and the safety analysis, a number of theoretical and experimental investigations have been performed. This paper presents a basic research on the characteristics of each flow regime and transition boundary in the two-phase flows. The flow regime of the upward air-water flow in the vertical tube, 30 mm in the inner diameter, is distinguished by using the high-speed camera and the Wire-mesh sensor(WMS). The identified experimental data are compared with the flow regime maps proposed by Taitel et al, Mishima and Ishii. Even though there is slight difference in the transition boundary, the experimental data show general agreement with these flow regime maps.

Development of a Face Detection and Recognition System Using a RaspberryPi (라즈베리파이를 이용한 얼굴검출 및 인식 시스템 개발)

  • Kim, Kang-Chul;Wei, Hai-tong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.859-864
    • /
    • 2017
  • IoT is a new emerging technology to lead the $4^{th}$ industry renovation and has been widely used in industry and home to increase the quality of human being. In this paper, IoT based face detection and recognition system for a smart elevator is developed. Haar cascade classifier is used in a face detection system and a proposed PCA algorithm written in Python in the face recognition system is implemented to reduce the execution time and calculates the eigenfaces. SVM or Euclidean metric is used to recognize the faces detected in the face detection system. The proposed system runs on RaspberryPi 3. 200 sample images in ORL face database are used for training and 200 samples for testing. The simulation results show that the recognition rate is over 93% for PP+EU and over 96% for PP+SVM. The execution times of the proposed PCA and the conventional PCA are 0.11sec and 1.1sec respectively, so the proposed PCA is much faster than the conventional one. The proposed system can be suitable for an elevator monitoring system, real time home security system, etc.

Service Quality and Client's Satisfaction of Security-Guard Company (경호${\cdot}$경비업체의 서비스 품질과 고객만족)

  • Kang, Min-Wan;Chang, Ye-Jin;Lee, Young-Sun
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.1-14
    • /
    • 2005
  • The concern of personal and social security has been increased all over the world with each passing day by the international terrorism and the domestic crime of violence grew gradually in the late of 70's and the early of 80's. The Security-Guard Industry, especially, has been growing rapidly by the starting from the 911 terror in 2001, therefore there has been increasing the supply and demand of Security Service in Korea explosively by the reasons, Actually, the Facilities Security Service is increased actively more than the VIP security Service among them. So, most of the Security-Guard Companies in Korea also have treated the Facilities Security Service at present. Although the importance of quality at the Facilities Security Service, especially mechanical equipments and systems, is on the rise, actually the studies about relations with the Service Quality and the Client's Satisfaction are quite insufficient at the field of Security-Guard Science study in the actual situation. As a result, the purposes of this study are to contribute for composing the knowledge of Security-Guard Science and to offer the basic data for elevating the Service Quality and Client's Satisfaction by consulting other studies. In order to achieve the purposes of this study, we compare and analyze how the Service Quality have affect on the difference of Client's Satisfaction by the client's characteristic of sociology and demography, then we find out the effect to the Service Quality for Client's Satisfaction, finally we try to show the vision of the Security-Guard Company's future in Korea. 1. How does the Service Quality of Security-Guard Company has affect on the characteristic of sociology and demography 2. How does the characteristic of sociology and demography in Security-Guard Company has affect on the Client's Satisfaction 3. How does the Service Quality of Security-Guard Company has affect on the Client's Satisfaction.

  • PDF

Feature Extraction using Discrete Wavelet Transform and Dynamic Time-Warped Algorithms in Wireless Sensor Networks for Barbed Wire Entanglements Surveillance (철조망 감시를 위한 무선 센서 네트워크에서 이산 웨이블릿 변환과 동적 시간 정합 알고리즘을 이용한 특징 추출)

  • Lee, Tae-Young;Cha, Dae-Hyun;Hong, Jin-Keun;Han, Kun-Hui;Hwang, Chan-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.4
    • /
    • pp.1342-1347
    • /
    • 2010
  • Various researches have been studied on WSN(wireless sensor network) for barbed wire entanglements surveillance applications such as industry facilities, security area, prison, military area, airport, etc. Currently, barbed wire entanglements surveillance is formed wire sensor network environment. Traditional wire sensor network guarantee high data transmission rate. Therefore, wire sensor network use fast fourier transform of data of high transmission rate for extraction of feature parameter. However, wireless sensor network in comparison with wire sensor network has very low data transmission rate. Therefore, wireless sensor network doesn't use fast fourier transform of wire sensor network for extraction of feature parameter. In this paper, proposed method use 1 level approximation coefficient of DTW(dynamic time-warped) algorithms based on DWT(discrete wavelet transform) for extraction of detection feature parameter and classification feature parameter for barbed wire entanglements surveillance. l level approximation coefficient have time information and frequency information of signal. Therefore, Dynamic time-warped algorithms based on discrete wavelet transform improve detection and classification of target rather than using energy of signal.

Managing Mobility - Enterprise Secure Wireless Control (이동성 관리 - 기업의 안전한 무선 네트워크 제어)

  • Lee Daniel H.
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.282-290
    • /
    • 2004
  • 80년대 초반에 등장한 퍼스널 컴퓨터에서부터 90년대에 급격히 확산된 클라이언트/서버 환경에 이르기까지 분산 컴퓨팅은 관리가 어렵다고 증명되었다. IBM의 Tivoli나 HP의 OpenView 등을 포함한 거대한 엔터프라이즈 관리 시스템 산업이 이러한 표면상의 극복하기 힘든 법칙처럼 여겨지는 것이 그 증거라고 하겠다. 이 후 무선의 개념이 등장했다. NOP World Technology가 Cisco사를 위해 2001년에 시행한 조사에 의하면 최종 사용자는 무선랜을 사용함으로써 생산성이 최고 22% 향상되었고 조사대상의 63%가 일상적인 직무에서 정확도가 향상되었다. 이 모든 것은 투자대비수익(ROI) 계산상 사용자 당 $550 해당한다. 현재 이동성과 IT 관리 기능의 딜레마를 동시에 고려하며 저렴한 몇몇 솔루션들이 소개되고 있다. 본 논문에서는 분산 컴퓨팅의 다음 진화 단계인 무선 네트워킹과 관련된 문제를 해결할 수 있는 혁신적이고 전체적인 접근법을 소개한다. 본 논문에서는 무선 컴퓨팅과 보안의 본질 및 무선랜이라는 새로운 컴퓨팅 패러다임으로 인하여 파생되는 운영과 관리의 어려움을 소개한다. 이러한 환경이 정의되면 본 논문은 이해하기 쉬운 5x5 레이어 매트릭스를 바탕으로 각 레이어의 독특한 본질을 고려한 혁신적인 무선랜 관리 방법에 대해 설명한다. 마지막으로 무선 네트워킹, 컨버젼스, 궁극적으로 분산 컴퓨팅만이 가지는 문제점을 해결할 수 있는 Red-M의 백 오피스 애플리케이션에 기반한 솔루션을 소개한다. 본 논문의 목표는 Red-M의 성공에 관한 두 가지 중요한 과정을 설명하고자 함이다. 이는 안전한 무선 네트워크 제어에서 비롯되는 무선 환경이 약속하는 장점들을 고루 제공하는 것과 나쁜 의도의 사용자를 차단할 뿐 아니라 올바른 사용자와 또한 나머지 일반 사용자를 총체적으로 관리할 수 있는, 안정적이고 확장 가능하며 직관적인 시스템을 제공하는 것이다.가 생성된다. $M_{C}$에 CaC $l_2$를 첨가한 경우 $M_{C}$는 완전히 $M_{Cl}$ 로 전이를 하였다. $M_{Cl}$ 에 CaC $l_2$를 첨가하였을 경우에는 아무런 수화물의 변화는 발생하지 않았다. 따라서 CaS $O_4$.2$H_2O$를 CaC $O_3$및 CaC $l_2$와 반응시켰을 때의 AFm상의 안정성 순서는 $M_{S}$ < $M_{C}$< $M_{Cl}$ 로 된다.phy. Finally, Regional Development and Regional Environmental Problems were highly correlated with accommodators.젼 공정을 거쳐 제조된다는 점을 고려할 때 이용가능한 에너지 함량계산에 직접 활용될 수는 없을 것이다.총단백질 및 AST에서 시간경과에 따른 삼투압 조절 능력에 문제가 있는 것으로 보여진다.c}C$에서 5시간 가열조리 후 잔존율은 각각 84.7% 및 73.3%였고, 질소가스 통기하에서는 잔존율이 88.9% 및 81.8%로 더욱 안정하였다.8% 및 12.44%, 201일 이상의 경우 13.17% 및 11.30%로 201일 이상의 유기의 경우에만 대조구와 삭제 구간에 유의적인(p<0.05) 차이를 나타내었다.는 담수(淡水)에서 10%o의 해수(海水)로 이주된지 14일(日) 이후에 신장(腎臟)에서 수축된 것으로 나타났다. 30%o의 해수(海水)에 적응(適應)된 틸라피아의 평균 신사구체(腎絲球體)의 면적은 담수(淡水)에 적응된 개체의 면적보다 유의성있게 나타났다. 해수(海水)에 적응(適應)된 틸라피아의 신단위(腎

  • PDF

Study on Improvement in Operation and Management of Ultra-light flying device Civil Complaints Management System for Ultralight Aircraft (초경량비행장치의 민원처리시스템 운용 및 관리 효율성 개선을 위한 연구)

  • Seok, Geum-chan;Jang, Moon-su;Ryu, Yeon-seung
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.237-246
    • /
    • 2020
  • The background of the research is the following: As a result of ultra-light flying device industry development, the utilization of drones and their efficiency have been increasing. However, problems regarding flight permission·approval procedure have not been improved, resulting in increased number of civil complaints. Thus, the purpose of this research is to minimize such civil petition according to the required standards of the two government organizations through enhancing the procedure for managing and employing the system. The research methods entail pinpointing the problems by analysing ultra-light flying device related literature review and by holding focus-interviews with field experts, thereby verifying and providing improved solutions. Under (MLIT) Ministry of Land, Infrastructure and Transport supervision and in accordance with aviation security law, the research provides various updated functions such as improved civil petition processing system's employment and management system, flight approval, integration of names, process, format regarding aviation photographing approval, tool buttons such as the 'Main' button in the system's homepage. This research has the following expected effects : Firstly in the law and regulations section, the clear distinction in the missions and roles of each organization enhances cooperations in tackling civil petition. Secondly the integration of civil petition process reduces time and improves efficiency. And lastly, the improvement of supplementary tools for the public is expected to minimize civil petitions. Future research needs to be conducted under the supervision of the Ministry of National Defense(MND). Factors such as systematic infrastructure for flight photography approval, related unit's reorganization following the defense reform 2.0, and guaranteed conditions for field security action units need to be ameliorated.

Policy Suggestions to Improve PSS(Presidential Security Service) Education Programs for Industry-Academy-Governmental Cooperations (${\cdot}$${\cdot}$관 협력강화를 위한 대통령경호실 교육프로그램 확대 방안)

  • Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.227-243
    • /
    • 2006
  • In modern society, private securities have developed their capabilities continuously. However, despite the fact that not only security industries have been considerably expanded in quantity, but also plenty of scholars published diverse papers relating to security problems, qualitative growths of private securities have not accomplished fully. Especially, securing the President would not be guaranteed only by PSS(Presidential Security Service). In order to secure the President successfully, it is necessary for all the social parts to strive to protect the President. In this respect, improving private securities, including academic fields, might be critical so as to succeed in securing the President. Without the supports from private securities, there might be lots of security problems in national context. Therefore, this study proposes several policy suggestions for the cooperation among PSS, private security industries and academic fields: (1) Providing a lot of practical knowledge from PSS to college students, (2) Personnel exchange between academic parts and PSS to promote the efficiency of securing the President, (3) Furnishing diverse information and knowledge about security to private securities, (4) Formulating security-searching standards, (5) Expanding educational institutions under PSS.

  • PDF

A Study on Enhancing VMS Services by FM Car Radio (차량 내 FM라디오를 이용한 VMS서비스 개선 연구)

  • Park, Bum-Jin;Moon, Byeong-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.22-32
    • /
    • 2010
  • Increasingly advanced Information Technology (IT) has changed the operator so as to create more diversified and advanced traffic information demand. To deal with the changing demand in private sector, a concept of on-demand traffic information has been rapidly introduced. However VMS, a product of the first generation of ITS, which was designed to provide the unspecified individuals during driving the car with the basic level of traffic information by the public failed to actively change itself in such a changing pattern. This study was intended to describe the VMS system (tentatively, FM-VMS) which was further developed to accommodate the needs favoring the sophisticated PDA with the public role of providing the unspecified individuals with the equal information. FM-VMS introduced in this study is the device designed to transmit the voice and message to the drivers through the radio information device mounted on a car. A core technology is, unlike FM-DARC and RDS, the Water Making technology which directly inserts the digital signal into FM frequency in use. It's been currently used for broadcasting and security purpose. A detection rate as a result of testing FM-VMS system using Water Making technology was 90% or more in voice and message within 20m from test VMS. When a public-developed VMS information could be transmitted using FM frequency to the relatively vulnerable users (vulnerable to traffic information) in voice on a real-time basis to provide the regional traffic information, and furthermore, VMS message could be received through radio liquid using FM frequency only, it would obviously bring about the innovation in ITS as well as pave the way for creating the new added value down the road.

Significant Factors for Building Enterprise Mobile Cloud (기업용 모바일 클라우드 시스템 구축 시 고려 요인)

  • Lee, Jae-Jin;Oh, Jun-Seok;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.481-492
    • /
    • 2011
  • Recently, various mobile services are provided by the spread of wireless network infrastructures and smart devices. The improvement of cloud computing technologies increases the interests for enterprise mobile cloud services in various IT companies as well. By increasing the interests for enterprise mobile cloud services, it is necessary to evaluate the use of enterprise mobile cloud services. Therefore, the factors which affect the user acceptance of enterprise mobile cloud services are analyzed on the basis of Davis' technology acceptance model in this research. As analysis results, four external variables have significant effects on perceived ease of use of mobile cloud services. Also, these variables indirectly affect attitude toward using cloud services. The results show that the security is the most important factor for attitude toward using enterprise mobile cloud services. The service users also consider the interoperability as an important factor for the user acceptance of cloud services. The perceived ease of use has more contribution than the perceive usefulness on attitude toward using enterprise mobile cloud services. This research has both industrial and academic contributions because it provides the guideline to companies for introducing the enterprise mobile cloud services and apply the technology acceptance model on new IT services.

An Empirical Study on the Prediction of Future New Defense Technologies in Artificial Intelligence (인공지능 분야 국방 미래 신기술 예측에 관한 실증연구)

  • Ahn, Jin-Woo;Noh, Sang-Woo;Kim, Tae-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.458-465
    • /
    • 2020
  • Technological advances in artificial intelligence are affecting many industries, such as telecommunications, logistics, security, and healthcare, and research and development related to economic, efficiency, linkage with commercial technologies are the current focus. Predicting the changes in the future battlefield environment and ways of conducting war from a strategic point of view, as well as designing/planning the direction of military development for a leading response is not only a basic element to prepare for comprehensive future threats but also an indispensable factor that can produce an optimal effect over a limited budget/time. From this perspective, this study was conducted as part of a technology-driven plan to discover potential future technologies with high potential for use in the defense field and apply them to R&D. In this study, based on research data collected in a defense future technology investigation, the future new technology that requires further research was predicted by considering the redundancy with existing defense research projects and the feasibility of technology. In addition, an empirical study was conducted to verify the significance between the future new defense technology and the evaluation indicators in the AI field.