• Title/Summary/Keyword: 취약상황인식

Search Result 93, Processing Time 0.034 seconds

A clustering algorithm based on dynamic properties in Mobile Ad-hoc network (에드 혹 네트워크에서 노드의 동적 속성 기반 클러스터링 알고리즘 연구)

  • Oh, Young-jun;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.400-401
    • /
    • 2014
  • 본 논문에서는 이동 에드혹 네트워크(Mobile Ad hoc Network: MANET)에서의 상황인식 기반의 스케쥴링 기법인 DDV(Dynamic Direction Vector)-hop알고리즘을 제안한다. 기존 MANET에서는 노드의 이동성으로 인한 동적 네트워크 토폴리지, 네트워크 확장성 결여의 대한 취약성을 지니고 있다. 본 논문에서는 계층적 클러스터 단위의 동적인 토폴로지에서 노드가 이동하는 방향성 및 속도에 대한 노드의 이동 속성 정보를 고려하여 클러스터를 생성 및 유지하는 DDV-hop 알고리즘을 제안한다. 제안된 알고리즘은 클러스터 헤드노드를 기준으로 클러스터 멤버노드의 방향성 및 속도의 속성 정보를 비교하여 유사한 노드간 클러스터링을 구성하고, 이로부터 헤드노드를 선택하는 방법이다. 실험결과, 제안하는 알고리즘이 네트워크의 부하를 감소시키고 네트워크 토폴로지를 안정적으로 유지할 수 있음을 확인하였다.

  • PDF

A Study of Cyber Operation COP based on Multi-layered Visualization (멀티레이어드 시각화를 적용한 사이버작전 상황도 개발에 관한 연구)

  • Kwon, Koohyung;Kauh, Jang-hyuk;Kim, Sonyong;Kim, Jonghwa;Lee, Jaeyeon;Oh, Haengrok
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.143-151
    • /
    • 2020
  • The cyber battlefield called the fifth battlefield, is not based on geological information unlike the existing traditional battlefiels in the land, sea, air and space, and has a characteristics that all information has tightly coupled correlation to be anlayized. Because the cyber battlefield has created by the network connection of computers located on the physical battlefield, it is not completely seperated from the geolocational information but it has dependency on network topology and software's vulnerabilities. Therefore, the analysis for cyber battlefield should be provided in a form that can recognize information from multiple domains at a glance, rather than a single geographical or logical aspect. In this paper, we describe a study on the development of the cyber operation COP(Common Operational Picture), which is essential for command and control in the cyber warfare. In particular, we propose an architecure for cyber operation COP to intuitively display information based on visualization techniques applying the multi-layering concept from multiple domains that need to be correlated such as cyber assets, threats, and missions. With this proposed cyber operation COP with multi-layered visualization that helps to describe correlated information among cyber factors, we expect the commanders actually perfcrm cyber command and control in the very complex and unclear cyber battlefield.

Stable and Precise Multi-Lane Detection Algorithm Using Lidar in Challenging Highway Scenario (어려운 고속도로 환경에서 Lidar를 이용한 안정적이고 정확한 다중 차선 인식 알고리즘)

  • Lee, Hanseul;Seo, Seung-Woo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.12
    • /
    • pp.158-164
    • /
    • 2015
  • Lane detection is one of the key parts among autonomous vehicle technologies because lane keeping and path planning are based on lane detection. Camera is used for lane detection but there are severe limitations such as narrow field of view and effect of illumination. On the other hands, Lidar sensor has the merits of having large field of view and being little influenced by illumination because it uses intensity information. Existing researches that use methods such as Hough transform, histogram hardly handle multiple lanes in the co-occuring situation of lanes and road marking. In this paper, we propose a method based on RANSAC and regularization which provides a stable and precise detection result in the co-occuring situation of lanes and road marking in highway scenarios. This is performed by precise lane point extraction using circular model RANSAC and regularization aided least square fitting. Through quantitative evaluation, we verify that the proposed algorithm is capable of multi lane detection with high accuracy in real-time on our own acquired road data.

Improving the Protection and Security System Outside the National Assembly Building (국회 외곽 경호·경비시스템 발전방향에 관한 연구)

  • Choi, O-Ho
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.113-135
    • /
    • 2019
  • Despite being one of the most important national facilities, the National Assembly building of the Republic of Korea has become increasingly vulnerable to potential terrorist attacks, and the instances of demonstrations occurring around and banned items taken into the building are continuing to rise. In addition, promoting the idea of "open assembly" has led to increased visitors and weakened access control. Furthermore, while there is a significant symbolic value attached to attacking the National Assembly building, the level of security management is relatively very low, making it a suitable target for terrorism. In order to address such vulnerability, an appropriate access control system should be in place from the areas surrounding the building. However, the National Assembly Security Service which oversees security around the building is scheduled to disband in June 2020 following the abolition of the conscripted police force in 2023. Therefore, there needs to be an alternative option to bolster the security system outside the facility. In this research, the perceptions of 114 government officials in charge of security at the National Assembly Secretariat toward the protection and security system of the areas surrounding the National Assembly building were examined. Results showed that the respondents believed it was highly likely that risky situations could occur outside the building, and the use of advanced technologies such as intelligent video surveillance, intrusion detection system, and drones was viewed favorably. Moreover, a mid- to long-term plan of establishing a unified three-layer protection system and designating a department in charge of the security outside the building were perceived positively. Lastly, the participants supported the idea of employing private police to replace the National Assembly Security Service for the short term and introducing parliamentary police for the mid- to long-term.

A Study on Estimation of Road Vulnerability Criteria for Vehicle Overturning Hazard Impact Assessment (차량 전도 위험 영향 평가를 위한 도로 취약성 기준 산정에 관한 연구)

  • Kyung-Su Choo;Dong-Ho Kang;Byung-Sik Kim;In-Jae Song
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.2
    • /
    • pp.49-56
    • /
    • 2023
  • Impact based forecast refers to providing information on potential socioeconomic risks according to weather conditions, away from the existing weather factor-oriented forecast. Developed weather countries are investing manpower and finances in technology development to provide and spread impact information, but awareness of impact based forecasts has not spread in Korea. In addition, the focus is on disasters such as floods and typhoons, which cause a lot of damage to impact based forecasts, and research on evaluating the impact of vehicle risks due to strong winds in the transportation sector with relatively low damage is insufficient. In Korea, there are not many cases of damage to vehicle conduction caused by strong winds, but there are cases of damage and the need for research is increasing. Road vulnerability is required to evaluate the risk of vehicles caused by strong winds, and the purpose of this study was to calculate the criteria for road vulnerability. The road vulnerability evaluation was evaluated by the altitude of the road, the number of lanes, the type of road. As a result of the analysis, it was found that the vulnerable area was well reproduced. It is judged that the results of this study can be used as a criterion for preparing an objective evaluation of potential risks for vehicle drivers.

The impact of security and privacy risk on smart car safety and trust (보안과 프라이버시 위험이 스마트카 안전과 신뢰에 미치는 영향)

  • Soonbeom Kwon;Hwansoo Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.9-19
    • /
    • 2023
  • Smart cars, which incorporate information and communication technologies (ICT) to improve driving safety and convenience for drivers, have recently emerged. However, the increasing risk of automotive cybersecurity due to the vulnerability of electronic control units (ECUs) and automotive networks, which are essential for realizing the autonomous driving functions of smart cars, is a major obstacle to the widespread adoption of smart cars. Although there have been only a few real-world cases of smart car hacking, drivers' concerns about the security of smart cars can have a negative impact on their proliferation. Therefore, it is important to understand the risk factors perceived by drivers and the trust in smart cars formed through them in order to promote the future diffusion of smart cars. This study examines the risk factors that affect the formation of trust in smart cars, focusing on security and privacy, and analyzes how these factors affect safety perceptions and trust in smart cars.

Video Digital Doorlock System for Recognition and Transmission of Approaching Objects (접근객체 인식 및 전송을 위한 영상 디지털 도어락 시스템 설계)

  • Lee, Sang-Rack;Park, Jin-Tae;Woo, Byoung-Hyoun;Choi, Han-Go
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.6
    • /
    • pp.237-242
    • /
    • 2014
  • Current digital door lock systems are mainly designed for users' convenience, so they have weakness in security. Thus, this paper suggests a video digital doorlock system grouped with a relay device, a server, and a digital doorlock with a camera, sensors, and communication modules, which is detecting or recognizing objects approaching to the front of the door lock system and sending images and door-opening information to users' smart devices. Experiments showed that the suggested system has 96~98% recognition rate of approaching objects and requires 17.1~23.9 seconds for transmission on average, depending on network systems. Therefore, the system is thought to have enough capability for real time security response by monitoring the front area of the doorlock system.

Determinants of Trust in Local Governments - Focusing on Risk Perception (사회 안전인식에 따른 지방자치단체 신뢰도 영향요인 분석)

  • Lee, Yun Ju;Choi, Yeol
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.4
    • /
    • pp.591-597
    • /
    • 2022
  • As social anxiety is increasing due to the spread of the COVID-19 epidemic, the responses at the level of local governments are also changing depending on the characteristics. We analyzed the factors influencing perceptions of social safety as they relate to the trustworthiness of local governments. Based on a 2020 social survey of 16 cities, counties, and districts in Busan Metropolitan City, the effects of householder characteristics, economic characteristics, local attachment characteristics, and social safety perception characteristics on the reliability of the local government were analyzed through an ordinal logistic regression analysis. It was found that the more vulnerable the class was and the safer the region was, the higher the trust was in the basic local government. In order to respond and preemptively recover damage in natural and social disaster situations, continuous efforts are needed to strengthen the capabilities of basic local governments.

Study on the Field Perceptions on Self-Support Performance Indicators using ISA(Importance-Satisfaction Analysis): Focusing on Regional Types (ISA 기법을 활용한 자활사업 성과지표에 대한 현장 인식 연구 : 지역 유형을 중심으로)

  • Jo, Joon-Yong;Kim, Kyoung Huy
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.447-456
    • /
    • 2022
  • Korea's self-support program has constituted one of the most important workfare policy for the past 25 years. However, many pointed out the lack of field perceptions in the performance indicators of self-support program, such as overemphasis on the economic performance and uniform application regardless of regional types. This research intends to derive policy implications to improve performance indicators of self-support program by analyzing field perceptions, utilizing ISA(Importance-Satisfaction Analysis) method. Analysis on the difference between importance and satisfaction shows that the procedure was perceived more important than the consequences. It also reveals that current indicators were not satisfactory enough to reflect field practices. Finally, ISA matrix classified indicators into keep, improve, policy reconsideration area, and obvious differences were found by regional type. These findings suggest the importance of field-orientation in performance indicators, and by which, can serve as an exploratory study for the improvement of performance indicators.

A Study for the Development Direction of Building Industry in Preparation for Earthquake Disaster (지진재난 대비를 위한 건축 산업의 발전방향에 대한 고찰)

  • Han, Dong-ho;Kim, Jong Kouk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.4 no.1
    • /
    • pp.307-314
    • /
    • 2018
  • It became clear that Korean peninsula is not a safe region anymore from an earthquake disaster after Gyeongju and Pohang Earthquake in 2016-2017. Unfortunately, building industry in Korea has not been well prepared for an earthquake disaster and the following problems exist. First, the rate of buildings with proper seismic performance is relatively low. Second, the number of piloti buildings which are vulnerable to earthquake and fire disaster has increased recently. Third, the proportion of small-scale buildings excluded from the application of the building law for securing safety is too high. Fourth, widespread corruption and poor construction impede safety. Therefore, measures to prepare for earthquake disaster are as follows. First, methods of reinforcing building structures and reducing the seismic load acting on a building should be utilized in order to secure the insufficient seismic performance of buildings vulnerable to earthquakes. Second, whistleblowers should be encouraged and protected to prevent defective construction due to corruption. To this end, whistleblowers should be recognized as an effective means of protecting public interest not the traitor to the organization.