• Title/Summary/Keyword: Border Security

Search Result 120, Processing Time 0.02 seconds

Efficacy analysis for the AI-based Scientific Border Security System based on Radar : focusing on the results of bad weather experiments (레이더 기반 AI 과학화 경계시스템의 효과분석 : 악천후 시 실험 결과를 중심으로)

  • Hochan Lee;Kyuyong Shin;Minam Moon;Seunghyun Gwak
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.85-94
    • /
    • 2023
  • In the face of the serious security situation with the increasing threat from North Korea, Korean Army is pursuing a reduction in troops through the performance improvement project of the GOP science-based border security system, which utilizes advanced technology. In order for the GOP science-based border security system to be an effective alternative to the decrease in military resources due to the population decline, it must guarantee a high detection and identification rate and minimize troop intervention by dramatically improving the false detection rate. Recently introduced in Korean Army, the GOP science-based border security system is known to ensure a relatively high detection and identification rate in good weather conditions, but its performance in harsh weather conditions such as rain and fog is somewhat lacking. As an alternative to overcoming this, a radar-based border security system that can detect objects even in bad weather has been proposed. This paper proves the effectiveness of the AI-based scientific border security system based on radar that is being currently tested at the 00th Division through the 2021 Rapid Acquisition Program, and suggests the direction of development for the GOP scientific border security system.

Increasing Transnational Threats and Terrorism and Establishment of Integrated Border Security Systems: Focused on U.S., Canada and Australia (초국가적 위협 및 테러리즘 증가와 통합국경안보체계 구축: 미국, 캐나다, 호주를 중심으로)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.69-78
    • /
    • 2017
  • Since the September 11, 2001, transnational crimes and terrorism have increased, the importance of border security has been emphasized and integrated CIQ capability has been required. The U.S., Canada, and Australia are consolidating CIQ to strengthen border security, focusing on strengthening travelers and goods immigration control and airports, ports and land border security. In 2003, the U.S. established the Customs and Border Protection(CBP) under the Department of Homeland Security. Canada also established the Canada Border Services Agency(CBSA) under the Public Safety Canada in 2003. The Australian Customs and Border Protection Service was integrated with the Department of Immigration and Border Protection(DIBP) and the Australian Border Force was established in 2015. However, Korea operates a distributed border management system for each CIQ task which is unable to respond to complex border threats such as illegal immigration, entry of terrorists, smuggling of drugs, and gun trade in the airports, ports and land borders. In order to solve this problem, it is possible to consider integrating sequentially the customs and quarantine services which have high similarities, and to integrate the entire CIQ tasks with the Korea Customs Service delegated to the immigration control duties in the mid to long term. There is also a plan to benchmark the CIQ single accountability agencies in the U.S., Canada, and Australia in accordance with the Korean situation and to establish a new integrated border security organization.

Information Security and Its Aapplications on the Portal of the Deanship of Library Affairs at Northern Border University

  • Al Eawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.183-188
    • /
    • 2021
  • The study aimed to assess the state of electronic security for the website of the Deanship of Library Affairs at Northern Border University, as one of the university's electronic portals, which provides distinguished knowledge services to faculty members, through the Saudi Digital Library, and the integrated automated system for libraries (Symphony) with the definition of cyber security of the university, and the most important threats The study sought to analyze the opinions of a wide sample of faculty members, towards evaluating the state of electronic security for the Deanship of Library Affairs portal, through the use of both the analytical method, as well as the survey, using the questionnaire tool, and the study sample consisted of 95 A faculty member of all academic categories and degrees, and university faculties, and the study concluded that it is necessary to work to overcome the relative slowness of the university's Internet, with the faculty members notifying the information security services through e-mail and SMS service, with the continuous updating of operating systems, Apply and use the latest anti-spyware, hacking, and antivirus software at the university, while conducting extensive research studies towards information security services, and contracting It aims to introduce information security risks, and ways to combat and overcome them, and spread the culture of information security among faculty members.

Current Problems of Criminal Law Protection of Information Relations in the Border Sphere

  • Kushnir, Iryna;Kuryliuk, Yurii;Nikiforenko, Volodymyr;Stepanova, Yuliia;Kushnir, Yaroslav
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.171-176
    • /
    • 2021
  • The article considers some issues of criminal law protection of information relations. With the emergence of new types of threats to Ukraine's national security in the field of protection and defense of the state border, the issues of development and strengthening of information protection become especially important. Proper compliance with information legislation also depends on the established responsibility for its violation, which rests on certain provisions of the Criminal Code of Ukraine. It is stated that these norms are placed in different sections and do not have a proper systematization. The article singles out the subjects of information relations in the border area, which are subject to criminal law protection: persons who are not bound by stable relations with the SBGS (who cross the state border of Ukraine, etc.); persons who are members of the SBGS (servicemen and employees); SBGS as a public authority (official and secret information, information about the activities of the agency, its officials, etc.).

A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures

  • Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.175-184
    • /
    • 2022
  • Voice over Internet Protocol (VoIP) has grown in popularity as a low-cost, flexible alternative to the classic public switched telephone network (PSTN) that offers advanced digital features. However, additional security vulnerabilities are introduced by the VoIP system's flexibility and the convergence of voice and data networks. These additional challenges add to the normal security challenges that a VoIP system's underlying IP data network infrastructure confront. As a result, the VoIP network adds to the complexity of the security assurance task faced by businesses that use this technology. It's time to start documenting the many security risks that a VoIP infrastructure can face, as well as analyzing the difficulties and solutions that could help guide future efforts in research & development. We discuss and investigate the challenges and requirements of VoIP security in this research. Following a thorough examination of security challenges, we concentrate on VoIP system threats, which are critical for present and future VoIP deployments. Then, towards the end of this paper, some future study directions are suggested. This article intends to guide future scholars and provide them with useful guidance.

Analysis of the GOP Border security systems of the ROK Army by Using ABMS and NOLH design (ABMS와 NOLH을 이용한 한국군 GOP 경계시스템에 관한 분석)

  • Oh, Kyungtack
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.25-33
    • /
    • 2014
  • In this study, the border security problem of the ROK Army is examined by applying the agent-based modeling and simulation (ABMS) concept as well as its platform, MANA. Based on the approximately optimized behavior of the infiltrator obtained using genetic algorithm (GA), we evaluate the GOP border security system which consists of human resources, surveillance, as well as command and control (C2) systems. We use four measures of effectiveness (MOEs) to evaluate its performance, and we apply a near optimal latin hypercube (NOLH) design to deal with the large number of factors of interest in our model. By using a NOLH design, our simulation runs are implemented efficiently. We hope the results of this study provide valuable data for deciding the configuration of the border security system structure and the number of soldiers assigned in the platoon.

Exploration of Border Security Systems of the ROK Army Using ABMS and GA Algorithm (ABMS와 유전학적 알고리즘을 이용한 한국군 경계시스템에 관한 연구)

  • Oh, Kyungtack;Lee, Jae-Yeong
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.2
    • /
    • pp.33-40
    • /
    • 2013
  • This paper explores a border security system based on agent-based modeling and simulation (ABMS). The ABMS software platform, map aware non-uniform automata, is used to model various scenarios and evaluate the border security system given a set of infiltrators who have evolutionary behavior governed by genetic algorithm (GA). we formulated an optimization model and approximately solved it using a GA in order to capture near optimal behavior of an infiltrating force. The results presented give two significant insights for our border security system in that optimizing the infiltrator's behavior can make a significant difference and the quantitative results regarding the infiltrator's avoidance of each asset can be viewed as capturing their relative importance.

Saudi Universities Electronic Portals: A Case Study of Northern Border University

  • Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.103-109
    • /
    • 2021
  • The study aimed to analyze the current situation of the electronic portal of the Northern Border University, in terms of content and components, the extent of quality of use, service assurance and integrity, linguistic coverage of objective content, in addition to assessing the efficiency of the Blackboard e-learning platform and measuring the degree of safety of the portal, in addition to measuring the extent of satisfaction, through a sample that included 135 faculty members, as the researcher was keen to apply the case study methodology with the use of the questionnaire as the main tool for measurement, and the study found that there is an average trend among faculty members in the degree of content for the components of the portal and electronic security While it rose to good use, and very good at using the Blackboard platform.

The New Ecosystem of Cross-border E-Commerce among Korea, China and Japan Based on Blockchain

  • Shen, Xiang-Dong;Chen, Xi;Ji, Ran;Wu, Ren-Hong
    • Journal of Korea Trade
    • /
    • v.24 no.5
    • /
    • pp.87-105
    • /
    • 2020
  • Purpose - The purpose of the study is to propose a theoretical framework of cross-border e-commerce ecosystems based on blockchain technology. The ecosystem includes five systems, namely, crossborder supply chain intelligent system, cross-border logistics system, cross-border payment system, cross-border product quality traceability system and cross-border customs supervision system. Design/methodology - This study firstly derived the main improvement factors for the new ecosystem based on blockchain through prior research and expert interviews on cross-border e-commerce. Then explored the use of virtue of decentralization, anti-counterfeiting traceability, consensus mechanism, smart contract and other means of the core technology of blockchain to overcome the bottleneck of cross-border e-commerce development among Korea, China, and Japan. Finally, proposed valuable implications in both theoretical and practical perspectives. Findings - As a result, we combined with the problems existing in cross-border e-commerce among Korea, China and Japan, this paper proposes a solution based on blockchain. On this basis, it constructs a cross-border e-commerce ecosystem among these three countries, including five systems. In addition, we discuss the main problems existing in the current blockchain, such as low transaction concurrency, security loopholes, and inconsistent standards, the corresponding countermeasures are proposed from the technical level, security level and industry standards. Originality/value - This study is the first to apply the blockchain technology to solve the cross-border e-commerce problems in Korea, China and Japan, which is of pioneering significance in both literature and practice. Block chain technology is in the ascendency. This study provides technical solutions for promoting the development of cross-border e-commerce import and export trade between Korea, China and Japan.

Establishing and Designing the Financial System for the Research Program of the Deanship of Scientific Research at Northern Border University

  • Hamad, Sofian;Al Sawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.35-40
    • /
    • 2021
  • The study aimed to realize one of the basic requirements for designing and building the integrated automated system for scientific research at Northern Border University, which includes the establishment of an automated interconnected system to manage all academic and financial operations of scientific research. From receiving the budget of the funded research courses, then the regular financial regulation of all the research team's rewards, the cost of publishing, translation and equipment, then receiving the research plans and linking them financially, preparing the total and detailed financial value for all stages, then financial disbursement operations, financial closure of research when published, and preparing financial reports The research team used the analytical approach to build the main and subsidiary requirements for designing the financial system, and the study concluded that all the elements required for the stages of financial management for scientific research at Northern Border University can be met based on sufficient by sequencing these processes and how they are sequenced as e It is designed in the research study.