• Title/Summary/Keyword: 탐지방안

Search Result 805, Processing Time 0.024 seconds

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

A Study on Test Set to prevent illegal films searches (불법촬영물 검색 방지를 위한 시험 세트 방안 연구)

  • Yong-Nyuo Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.27-33
    • /
    • 2023
  • Countries around the world are calling for stronger law enforcement to combat the production and distribution of child sexual exploitation images, such as child grooming. Given the scale and importance of this social problem, it requires extensive cooperation between law enforcement, government, industry, and government organizations. In the wake of the Nth Room Case, there have been some amendments to the Enforcement Decree of the Telecommunications Business Act regarding additional telecommunications services provided by precautionary operators in Korea. While Naver and others in Korea use Electronics and Telecommunications Research Institute's own technology to filter illegal images, Microsoft uses its own PhotoDNA technology. Microsoft's PhotoDNA is so good at comparing and identifying illegal images that major global operators such as Twitter are using it to detect and filter images. In order to meet the Korean government's testing standards, Microsoft has conducted more than 16 performance tests on "PhotoDNA for Video 2.0A," which is being applied to the Bing service, in cooperation with the Korea Communications Commission and Telecommunications Technology Association. In this paper, we analyze the cases that did not pass the standards and derive improvement measures related to adding logos. In addition, we propose to use three video datasets for the performance test of filtering against illegal videos.

How to build an AI Safety Management Chatbot Service based on IoT Construction Health Monitoring (IoT 건축시공 건전성 모니터링 기반 AI 안전관리 챗봇서비스 구축방안)

  • Hwi Jin Kang;Sung Jo Choi;Sang Jun Han;Jae Hyun Kim;Seung Ho Lee
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.1
    • /
    • pp.106-116
    • /
    • 2024
  • Purpose: This paper conducts IoT and CCTV-based safety monitoring to analyze accidents and potential risks occurring at construction sites, and detect and analyze risks such as falls and collisions or abnormalities and to establish a system for early warning using devices like a walkie-talkie and chatbot service. Method: A safety management service model is presented through smart construction technology case studies at the construction site and review a relevant literature analysis. Result: According to 'Construction Accident Statistics,' in 2021, there were 26,888 casualties in the construction industry, accounting for 26.3% of all reported accidents. Fatalities in construction-related accidents amounted to 417 individuals, representing 50.5% of all industrial accident-related deaths. This study suggests implementing AI chatbot services for construction site safety management utilizing IoT-based health monitoring technologies in smart construction practices. Construction sites where stakeholders such as workers participate were demonstrated by implementing an artificial intelligence chatbot system by selecting major risk areas within the workplace, such as scaffolding processes, openings, and access to hazardous machinery. Conclusion: The possibility of commercialization was confirmed by receiving more than 90 points in the satisfaction survey of participating workers regarding the empirical results of the artificial intelligence chatbot service at construction sites.

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

Security Measures against Assembly and Demonstration during International Conference - the Case of the Nuclear Security Summit - (국제회의 시 집회시위에 관한 안전관리 방안 - 핵 안보정상회의 개최를 중심으로 -)

  • Lee, Sun-Ki
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.193-222
    • /
    • 2011
  • Our country successfully hosted the G20 summit in Seoul in November, 2010. Afterwards, however, the Yeonpyungdo shelling incident took place by the North, and the North Korean nuclear issue have strained interKorean relations. Our country is going to host the nuclear security summit, which is of great significance at this point of time. The nuclear security summit is to be attended by 47 countries. The participant countries of this summit is larger in number than those of the ASEM, APEC and the G20 summit that our country has ever hosted. That is a large-scale international conference that invites the UN, the IAEA and the EU, which are three major nuclear-related international organizations. A successful hosting of the nuclear security summit will serve as an opportunity to boost our country's national prestige, and is likely be beneficial to the settlement of the North Korean nuclear issue. Like other international submits in foreign countries, however, violent anti-globalization demonstrations are expected to occur when the nuclear security summit is held in April next year. The purpose of this study was to make a case analysis of demonstrations during multilateral international conferences hosted by foreign countries over ten years between 1999 and 2009, to examine the controversial points over the demonstrations, and ultimately to seek ways of ensuring safety against possible assemblies and demonstrations during the forthcoming nuclear security summit, which is scheduled to be held in April next year. The findings of the study on feasible security measures are as follows: First, information and intelligence gathering should be reinforced, and the inspection should be stepped up. Second, pacification among domestic NGOs and the supplementation of the existing legal devices are required. Third, publicity should be strengthened. Fourth, riot police officers should be selected as early as possible to bolster their education and training, and more reinforced emergency measures should be taken. It's needed to seek assistance from the military as one of emergency measures, and national defense readiness should be bolstered across the nation in collaboration with the Ministry of National Defense when the summit is near at hand. Finally, CBR countermeasures should be taken in preparation for CBR terrorism.

  • PDF

Application of satellite remote sensing-based vegetation index for evaluation of transplanted tree status (이식수목의 현황 평가를 위한 위성영상 기반 원격탐사 식생지수 적용 연구)

  • Mi Na Choi;Do-Hun Lee;Moon-Jeong Jang;Dong Ju Kim;Sun Mi Lee;Yoon Jung Moon;Yong Sung Kwon
    • Korean Journal of Environmental Biology
    • /
    • v.41 no.1
    • /
    • pp.18-30
    • /
    • 2023
  • Forest destruction is an inevitable result of the development processes. According to the environmental impact assessment, over 10% of the destroyed trees need to be recycled and transplanted to minimize the impact of forest destruction. However, the rate of successful transplantation is low, leading to a high rate of tree death. This is attributable to a lack of consideration for environmental factors when choosing a temporary site for transplantation and inadequate management. To monitor transplanted trees, a field survey is essential; however, the spatio-temporal aspect is limited. This study evaluated the applicability of remote sensing for the effective monitoring of transplanted trees. Vegetation indices based on satellite remote sensing were derived to detect time-series changes in the status of the transplanted trees at three temporary transplantation sites. The mortality rate and vitality of transplanted trees before and after the transplant have a similar tendency to the changes in the vegetation indicators. The findings of this study showed that vegetation indices increased after transplantation of trees and decreased as the death rate increased and vitality decreased over time. This study presents a method for assessing newly transplanted trees using satellite images. The approach of utilizing satellite photos and the vegetation index is expected to detect changes in trees that have been transplanted across the country and help to manage tree transplantation for the environmental impact assessment.

Operation Measures of Sea Fog Observation Network for Inshore Route Marine Traffic Safety (연안항로 해상교통안전을 위한 해무관측망 운영방안에 관한 연구)

  • Joo-Young Lee;Kuk-Jin Kim;Yeong-Tae Son
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.2
    • /
    • pp.188-196
    • /
    • 2023
  • Among marine accidents caused by bad weather, visibility restrictions caused by sea fog occurrence cause accidents such as ship strand and ship bottom damage, and at the same time involve casualties caused by accidents, which continue to occur every year. In addition, low visibility at sea is emerging as a social problem such as causing considerable inconvenience to islanders in using transportation as passenger ships are collectively delayed and controlled even if there are local differences between regions. Moreover, such measures are becoming more problematic as they cannot objectively quantify them due to regional deviations or different criteria for judging observations from person to person. Currently, the VTS of each port controls the operation of the ship if the visibility distance is less than 1km, and in this case, there is a limit to the evaluation of objective data collection to the extent that the visibility of sea fog depends on the visibility meter or visual observation. The government is building a marine weather signal sign and sea fog observation networks for sea fog detection and prediction as part of solving these obstacles to marine traffic safety, but the system for observing locally occurring sea fog is in a very insufficient practical situation. Accordingly, this paper examines domestic and foreign policy trends to solve social problems caused by low visibility at sea and provides basic data on the need for government support to ensure maritime traffic safety due to sea fog by factually investigating and analyzing social problems. Also, this aims to establish a more stable maritime traffic operation system by blocking marine safety risks that may ultimately arise from sea fog in advance.

S-FDS : a Smart Fire Detection System based on the Integration of Fuzzy Logic and Deep Learning (S-FDS : 퍼지로직과 딥러닝 통합 기반의 스마트 화재감지 시스템)

  • Jang, Jun-Yeong;Lee, Kang-Woon;Kim, Young-Jin;Kim, Won-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.4
    • /
    • pp.50-58
    • /
    • 2017
  • Recently, some methods of converging heterogeneous fire sensor data have been proposed for effective fire detection, but the rule-based methods have low adaptability and accuracy, and the fuzzy inference methods suffer from detection speed and accuracy by lack of consideration for images. In addition, a few image-based deep learning methods were researched, but it was too difficult to rapidly recognize the fire event in absence of cameras or out of scope of a camera in practical situations. In this paper, we propose a novel fire detection system combining a deep learning algorithm based on CNN and fuzzy inference engine based on heterogeneous fire sensor data including temperature, humidity, gas, and smoke density. we show it is possible for the proposed system to rapidly detect fire by utilizing images and to decide fire in a reliable way by utilizing multi-sensor data. Also, we apply distributed computing architecture to fire detection algorithm in order to avoid concentration of computing power on a server and to enhance scalability as a result. Finally, we prove the performance of the system through two experiments by means of NIST's fire dynamics simulator in both cases of an explosively spreading fire and a gradually growing fire.

A Static Analysis Technique for Android Apps Written with Xamarin (자마린으로 개발된 안드로이드 앱의 정적 분석 연구)

  • Lim, Kyeong-hwan;Kim, Gyu-sik;Shim, Jae-woo;Cho, Seong-je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.643-653
    • /
    • 2018
  • Xamarin is a representative cross-platform development framework that allows developers to write mobile apps in C# for multiple mobile platforms, such as Android, iOS, or Windows Phone. Using Xamarin, mobile app developers can reuse existing C# code and share significant code across multiple platforms, reducing development time and maintenance costs. Meanwhile, malware authors can also use Xamarin to spread malicious apps on more platforms, minimizing the time and cost of malicious app creation. In order to cope with this problem, it is necessary to analyze and detect malware written with Xamarin. However, little studies have been conducted on static analysis methods of the apps written in Xamarin. In this paper, we examine the structure of Android apps written with Xamarin and propose a static analysis technique for the apps. We also demonstrate how to statically reverse-engineer apps that have been transformed using code obfuscation. Because the Android apps written with Xamarin consists of Java bytecode, C# based DLL libraries, and C/C++ based native libraries, we have studied static reverse engineering techniques for these different types of code.

Conceptual Design of Mechanical System for Recovery of Seabed-Deposited Hazardous and Noxious Substances Based on Performance Requirements (해저침적 HNS 회수용 기계장치의 성능요건 기반 개념설계)

  • Hwang, Ho-Jin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.6
    • /
    • pp.689-697
    • /
    • 2020
  • Hazardous and noxious substances (HNS) may cause maritime incidents during marine transportation, which are liable to lead to a large amount of spillage or discharge into the sea. The damage to the marine environment caused by the HNS spill or discharge is known to be much greater than the damage caused by oil spill. Particularly dangerous is HNS, which is deposited or buried in the seabed, as it can damage the organisms that live on, in, and near the bottom of the sea, the so-called "benthos," forming the benthic ecosystem. Therefore, it is vital that the HNS deposited on the seabed be recovered. In order to do so, procedures and equipment are required for accurate detection, stabilization treatment, and recovery of HNS in subsea sediment. Thus, when developing a mechanical recovery system, the performance requirements should be selected using performance indices, and the conceptual design of the mechanical recovery system should be based on performance requirements decided upon and selected in advance. Therefore, this study was conducted to arrive at a conceptual design for a mechanical recovery system for the recovery of HNS deposited on the seabed. In the design of the system, based on the fundamental scenario, the method of suction foundation with the function of self enclosing was adopted for recovering the HNS sediment in the subsea sediment. The mechanical recovery system comprises the suction foundation, pollution prevention, a pump system, control system, monitoring device, location information device, transfer device, and tanks. This conceptual design is expected to be reflected and used in the basic design of the components and shapes of the mechanical recovery system.