• Title/Summary/Keyword: Comprehensive Security

Search Result 441, Processing Time 0.021 seconds

Object Tracking Framework of Video Surveillance System based on Non-overlapping Multi-camera (비겹침 다중 IP 카메라 기반 영상감시시스템의 객체추적 프레임워크)

  • Han, Min-Ho;Park, Su-Wan;Han, Jong-Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.141-152
    • /
    • 2011
  • Growing efforts and interests of security techniques in a diverse surveillance environment, the intelligent surveillance system, which is capable of automatically detecting and tracking target objects in multi-cameras environment, is actively developing in a security community. In this paper, we propose an effective visual surveillance system that is avaliable to track objects continuously in multiple non-overlapped cameras. The proposed object tracking scheme consists of object tracking module and tracking management module, which are based on hand-off scheme and protocol. The object tracking module, runs on IP camera, provides object tracking information generation, object tracking information distribution and similarity comparison function. On the other hand, the tracking management module, runs on video control server, provides realtime object tracking reception, object tracking information retrieval and IP camera control functions. The proposed object tracking scheme allows comprehensive framework that can be used in a diverse range of application, because it doesn't rely on the particular surveillance system or object tracking techniques.

A Study on Properties of Crude Oil Based Derivative Linked Security (유가 연계 파생결합증권의 특성에 대한 연구)

  • Sohn, Kyoung-Woo;Chung, Ji-Yeong
    • Asia-Pacific Journal of Business
    • /
    • v.11 no.3
    • /
    • pp.243-260
    • /
    • 2020
  • Purpose - This paper aims to investigate the properties of crude oil based derivative security (DLS) focusing on step-down type for comprehensive understanding of its risk. Design/methodology/approach - Kernel estimation is conducted to figure out statistical feature of the process of oil price. We simulate oil price paths based on kernel estimation results and derive probabilities of hitting the barrier and early redemption. Findings - The amount of issuance for crude oil based DLS is relatively low when base prices are below $40 while it is high when base prices are around $60 or $100, which is not consistent with kernel estimation results showing that oil futures prices tend to revert toward $46.14 and the mean-reverting speed is faster as oil price is lower. The analysis based on simulated oil price paths reveals that probability of early redemption is below 50% for DLS with high base prices and the ratio of the probability of early redemption to the probability of hitting barrier is remarkably low compared to the case for DLS with low base prices, as the chance of early redemption is deferred. Research implications or Originality - Empirical results imply that the level of the base price is a crucial factor of the risk for DLS, thus introducing a time-varying knock-in barrier, which is similar to adjust the base price, merits consideration to enhance protection for DLS investors.

Compressive behavior of concrete-filled square stainless steel tube stub columns

  • Dai, Peng;Yang, Lu;Wang, Jie;Ning, Keyang;Gang, Yi
    • Steel and Composite Structures
    • /
    • v.42 no.1
    • /
    • pp.91-106
    • /
    • 2022
  • Concrete-filled square stainless steel tubes (CFSSST), which possess relatively large flexural stiffness, high corrosion resistance and require simple joint configurations and low maintenance cost, have a great potential in constructional applications. Despite that the use of stainless steel may result in high initial cost compared to their conventional carbon steel counterparts, the whole-life cost of CFSSST is however considered to be lower, which offers a competitive choice in engineering practice. In this paper, a comprehensive experimental and numerical program on 24 CFSSST stub column specimens, including 3 austenitic and 3 duplex stainless steel square hollow section (SHS) stub columns and 9 austenitic and 9 duplex CFSSST stub columns, has been carried out. Finite element (FE) models were developed to be used in parametric analysis to investigate the influence of the tube thickness and concrete strength on the ultimate capacities more accurately. Comparisons of the experimental and numerical results with the predictions made by design guides ACI 318, ANSI/AISC 360, Eurocode 4 and GB 50936 have been performed. It was found that these design methods generally give conservative predictions to the ultimate capacities of CFSSST stub columns. Improved calculation methods, developed based on the Continuous Strength Method, have been proposed to provide more accurate estimations of the ultimate resistances of CFSSST stub columns. The suitability of these proposals has been validated by comparison with the test results, where a good agreement between the predictions and the test results have been achieved.

A Study on the Method of Creating a Safety Vulnerable Class Distribution Diagram for Non-Structural Countermeasures in the Comprehensive Natural Disaster Reduction Plan (자연재해저감종합계획 비구조적 대책의 안전취약계층도 작성방안에 관한 연구)

  • Doo Hee Kim;In Jae Song;Byung-Sik Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.1
    • /
    • pp.1-11
    • /
    • 2023
  • The comprehensive natural disaster reduction plan, the highest plan in the disaster prevention field, was implemented by local governments. second plan is currently being formulated. In order to minimize human and property damage, structural and non-structural measures for each of the nine disaster types are established and implemented for 10 years. Structural measures are based on engineering and quantitative analysis, and the criteria for setting reduction measures are clear. Non-structural measures, however, currently lack the set criteria. the basic disaster and safety management law included the safety vulnerable class in 2018. Currently, the safety vulnerable class of the detailed establishment criteria of the comprehensive natural disaster reduction plan is being established, including children, the elderly, and the disabled. However, due to the lack of data securing and database construction by local governments, it is difficult to prepare a location map for establishing reduction measures for the safety vulnerable. Therefore, in this study, OPEN API data of the safety vulnerable class were collected and statistical information and GIS of SGIS information services were used. The distribution diagram of the safety vulnerable class in Samcheok, Gangwon-do, which is a sample area, and the distribution diagram of the safety vulnerable class in units of the output area (OA) in Geundeok-myeon were prepared.

A Research on the Analyzing Biometric Aviation Security System and Proposing Global Standardization to Improve Aviation Safety (항공안전 향상을 위한 생체인식 기반 항공보안시스템 도입 및 국제표준화 활성화 연구)

  • Cho, Sung-Hwan;Yoon, Han-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.5
    • /
    • pp.637-647
    • /
    • 2020
  • Airports and civil aviation authorities have recently utilized and expanded the use of biometric technologies to respond proactively against the rapid changes in aviation terrorism due to scientific development. The Global Security Plan (GASeP) developed by the International Civil Aviation Organization (ICAO) is regarded as precondition for sustainable development of the global air transport industry. Thus GASeP has sought to improve aviation security system using biometic technologies. The purpose of this paper is to realize the equivalent access of aviation security system throughout the world with biometric technologies. First, this paper reviewed the current biometric-security system operated by the EU, USA and international society. Second, legal and institutional processes regarding personal biometric information were analyzed to suggest political implications. This paper concluded that ICAO should propose a global standardization and prepare guideline materials among its 193 member states to prevent aviation security breaches and to share related information on a real-time basis because time is required to utilize biometric technology to improve aviation safety and to develop global air transport.

Influencing Factors for Compliance Intention of Information Security Policy (정보보안 정책 준수 의도에 대한 영향요인)

  • Kim, Sang-Hoon;Park, Sun-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.33-51
    • /
    • 2011
  • This research derived the influencing factors for employees' compliance with the information security policy in organizations on the basis of Neutralization Theory, Theory of Planned Behavior and Protection Motivation Theory. To empirically analyze the research model and the hypotheses, data were collected by conducting web survey, 194 of 207 questionnaires were available. The test of causal model was conducted by PLS. Reliability, validity and model fit were found to be statistically significant. the results of hypotheses tests showed that seven ones of eight hypotheses could be accepted. The theoretical implications of this study are as follows : 1) this study is expected to play a role of baseline for future research about employee compliance with the information security policy, 2) this study attempted interdisciplinary approach through combining psychology and information system security research, and 3) it suggested concrete operational definitions of influencing factors for information security policy compliance through comprehensive theoretical review. Also, this study has some practical implications. First, it can provide the guideline to support the successful execution of the strategic establishment for implement of information system security policies in organizations. Second, it is proved that the need for conducting education and training program suppressing employees. neutralization psychology to violate information security policy should be emphasized in the organizations.

Information Security Job Skills Requirements: Text-mining to Compare Job Posting and NCS (정보보호 직무 수행을 위해 필요한 지식 및 기술: 텍스트 마이닝을 이용한 구인광고와 NCS의 비교)

  • Hyo-Jung Jun;Byeong-Jo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.3
    • /
    • pp.179-197
    • /
    • 2023
  • As a sufficient workforce supports the industry's growth, workforce training has also been carried out as part of the industry promotion policy. However, the market still has a shortage of skilled mid-level workers. The information security disclosure requires organizations to secure personnel responsible for information security work. Still, the division between information technology work and job areas is unclear, and the pay is not high for responsibility. This paper compares job keywords in advertisements for the information security workforce for 2014, 2019, and 2022. There is no difference in the keywords describing the job duties of information security personnel in the three years, such as implementation, operation, technical support, network, and security solution. To identify the actual needs of companies, we also analyzed and compared the contents of job advertisements posted on online recruitment sites with information security sector knowledge and skills defined by the National Competence Standards used for comprehensive vocational training. It was found that technical skills such as technology development, network, and operating system are preferred in the actual workplace. In contrast, managerial skills such as the legal system and certification systems are prioritized in vocational training.

Militarization of Space and Arms Control

  • Cho, Hong-Je
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.33 no.2
    • /
    • pp.443-469
    • /
    • 2018
  • In the sixty year since the first launch of Sputnik 1, it has become impossible to consider economic, political, or scientific human life in the communication field without reference to outer space. But, there is a growing groundswell of public opinion aimed at preventing arms race in space. Therefore it is necessary to establish some institution or mechanism such a code of conduct, international law. But every nation has a different posture on the grounds of national interest, or different levels of space development, the conditions required for the successful negotiation of a comprehensive treaty are not yet ripe. It is hoped that by beginning with soft measures (TCBM, Code of Conduct) for which it is easier to secure voluntary participation it may be possible to build up to a comprehensive treaty. The participation of the Space powers (US, Russia, China) in a dialogue of mutual exchange and shared information would contribute to international peace and give a long term benefit to humankind. It is also necessary to promote partnership through regional and bilateral cooperation. We should guide and shape opinion so that more nations ratify and sign existing international legal covenants in order to contribute to the efficency of Space law. International law needs to enforce PAROS and Space Security.

Community Empowerment Models of Tourism Village Based on Superior Commodities: Realizing Economic Resilience

  • Cahyono, Arie Eko;Kurniawan, Moh. Usman;Sukidin, Sukidin;Kantun, Sri
    • Journal of Distribution Science
    • /
    • v.16 no.11
    • /
    • pp.29-36
    • /
    • 2018
  • Purpose - Research on community empowerment based on superior commodities to improve the economic resilience of the tourist village of Lumajang Regency is an investigative descriptive study to obtain an overview of the problems of community economic development, especially regarding economic resilience. The output of this research activity is the formation of integrated and comprehensive strategic programs and activities in order to improve economic empowerment and food security of the community around the tourist village. Research design, data, and methodology - This research method applies several methods of analysis such as the Loqation Quotion (LQ) method, SWOT analysis, Trend analysis, and analysis of Community Economic Empowerment in the agricultural sub-sector. Results - This research has strategic values and objectives in addition to providing important information to improve food security of tourism villages in Lumajang district in particular and disadvantaged communities in Indonesia in general. Through this supportive community economic empowerment programs, Lumajang District has an agricultural area and at the same time as a nature-based tourism area that supports it. Conclusion - Village tourism community empowerment activities are taken based on existing superior commodities. The existing tourism village program in Lumajang district can be used as one of the references for the upcoming tourism village program.

A Study on the Integrated Logistic Support of Force Support System (전력지원체계의 종합군수지원 연구)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.77-85
    • /
    • 2016
  • Integrated logistics support activities is to comprehensively manage the logistic support elements in the whole pro cess, from the design, development, acquisition request from the time it takes, operating and disposal for the efficient and cost-effective logistics support equipment. In other words, maintain the performance of the weapon system, and is required to be filed from the time the economic comprehensive logistic support until discarded activities, managing all logistic support throughout the life cycle period. This study was an intensive study for a seamless integrated logistics support force support system, the result wa s determined that the insufficient number of parts to the weapons sector, presents some development direction for se amless integrated logistics support force support system and should.