• 제목/요약/키워드: Comprehensive Security

검색결과 441건 처리시간 0.024초

농촌지역 중심지 기능 및 시설에 대한 주민 인식도 조사 - 전라남도 화순군 면소재지를 중심으로 - (A study on residents' awareness of functions and facilities of the rural centers - Myeon locations in Hwasun-gun, Jeollanam-do Province-)

  • 박성진;김정규
    • 한국농촌건축학회논문집
    • /
    • 제18권2호
    • /
    • pp.19-27
    • /
    • 2016
  • This study typified the rural centers with myeon locations in Hwasun-gun which showed comprehensive and various class types through settlement class structure analysis. It is also for establishing the awareness of strengthening functions and facilities of the centers and the directions of strengthening it. Subjects of the study could be classified into three types including base type (Neungju-myeon), general type (Nam-myeon) and decline type (Dongbok-myeon) through the analysis of settlement class structure. Neungju-myeon location as the base type could function as the myeon location by itself and tended to serve education, health and welfare functions through the strengthening of central living functions. Nam-myeon location as the general type required sports facilities management based on the vicinity and accessibility to the senior's welfare functions. Dongbok-myeon location as the decline type required the accessibility to public health facilities and the security of vicinity to the facilities because of its high population of the aged.

목조 문화재 건축물의 화재 방재를 위한 조사 연구 (A Study on the Methods of Fire-Safety in Cultural Property Wooden Buildings)

  • 장형순;조원석;김흥기
    • 한국농촌건축학회논문집
    • /
    • 제10권4호
    • /
    • pp.25-32
    • /
    • 2008
  • The prevention of disasters in cultural property is very important management and historical duties. The reason can't be measured values with monetary scale of our contemporary. Therefore, this paper was considered fire-safety as one of terrible threat-disasters about the wooden buildings. This research deal with 47 cases cultural property wooden building by whole investigation(field survey and interview) in Gangnung province. The most buildings have basic fire extinguisher; ABC powder. A few buildings are rarely installed fire extinguishing equipments; outdoor fire hydrant, heat sensor, ground sprinkler, CO2-hose-reel. But these state is very insufficient for the fire-safety in cultural property wooden buildings. Specially as particular attention in province, forest fire of regional characteristic have close relation with cultural property fire. The majority of factor against forest and building fire is to provide monitoring and security system; CCTV, Fence, Sensor, Alarm and paid guard man against incendiary. Ultimately it is necessary to construct comprehensive disaster prevention system with the organic cooperation such as National Emergency Management Agency, Cultural Heritage Administration, Forest Service, local government officials and regional citizen.

  • PDF

Flexural performance of fire damaged and rehabilitated two span reinforced concrete slabs and beams

  • Yu, Jiang-Tao;Liu, Yuan;Lu, Zhou-Dao;Xiang, Kai
    • Structural Engineering and Mechanics
    • /
    • 제42권6호
    • /
    • pp.799-813
    • /
    • 2012
  • Five two-span reinforced concrete (RC) slabs and seven two-span RC beams were tested under the ISO 834 standard fire with different durations. CFRP strengthening was then applied to some of the specimens after the damaged concrete was removed from the specimens and replaced with polymer mortar. All the specimens were loaded to failure to investigate the influence of fire-damage and the effectiveness of strengthening methods. Test results indicated that the flexural capacities of specimens decrease with the fire duration increases. Moreover, fire exposure had more significant effect on the flexural rigidity than on the bearing capacity of the specimens. After rehabilitation, the bearing capacities of specimens reached or even exceeded that of the reference RC specimen, and the strengthening methods seemed to have limited effect on flexural rigidity recovery. From the analysis of moment redistribution of tested beams, elevated temperature is found having different impacts on sagging moment region and hogging moment region. The damage of RC continuous member is definitely a comprehensive response of different regions.

Facilitating the Usage of Value Management Processes by Charactering Capital Facility Projects

  • 차희성
    • 한국건설관리학회논문집
    • /
    • 제5권2호
    • /
    • pp.144-152
    • /
    • 2004
  • Defining value as a measure of how well the project value objectives are met, Value Management Process (VMP) is considered to be any management effort or process that can proactively pursue one or more project objectives (i.e., security/safety, cost effectiveness, schedule optimization, and risk containment). The collection of 44 VMPs has been established based on a rigorous effort conducted by Construction Industry Institute (CII). Because varying circumstances on each project determine the level of suitability, it is crucial to identify which VMP should be implemented on a particular project. The current VMP selection process is primarily based on human intuition. The main objective of this paper is to provide a systematic method to facilitate the usage of VMPs on a particular project. This paper identified and quantified the selection principles (i.e., targeted value objectives, timing of initiation, project characteristics, and relative impact). The data collected from industry practitioners and VMP experts characterized each VMP in terms of the magnitude of benefit. An automated selection tool by Visual Basic Application (VBA) on MS Excel TM, was developed and proved its validity. As a pioneering study, this paper provides a comprehensive and structured knowledge on the subject of VMPs. From the industry's perspective, the automated selection tool, the premier of this study, contributes the facilitation of the VMP implementations in the construction industry thereby maximizing the potential benefits to a particular project.

Unethical Network Attack Detection and Prevention using Fuzzy based Decision System in Mobile Ad-hoc Networks

  • Thanuja, R.;Umamakeswari, A.
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권5호
    • /
    • pp.2086-2098
    • /
    • 2018
  • Security plays a vital role and is the key challenge in Mobile Ad-hoc Networks (MANET). Infrastructure-less nature of MANET makes it arduous to envisage the genre of topology. Due to its inexhaustible access, information disseminated by roaming nodes to other nodes is susceptible to many hazardous attacks. Intrusion Detection and Prevention System (IDPS) is undoubtedly a defense structure to address threats in MANET. Many IDPS methods have been developed to ascertain the exceptional behavior in these networks. Key issue in such IDPS is lack of fast self-organized learning engine that facilitates comprehensive situation awareness for optimum decision making. Proposed "Intelligent Behavioral Hybridized Intrusion Detection and Prevention System (IBH_IDPS)" is built with computational intelligence to detect complex multistage attacks making the system robust and reliable. The System comprises of an Intelligent Client Agent and a Smart Server empowered with fuzzy inference rule-based service engine to ensure confidentiality and integrity of network. Distributed Intelligent Client Agents incorporated with centralized Smart Server makes it capable of analyzing and categorizing unethical incidents appropriately through unsupervised learning mechanism. Experimental analysis proves the proposed model is highly attack resistant, reliable and secure on devices and shows promising gains with assured delivery ratio, low end-to-end delay compared to existing approach.

Black Hole along with Other Attacks in MANETs: A Survey

  • Tseng, Fan-Hsun;Chiang, Hua-Pei;Chao, Han-Chieh
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.56-78
    • /
    • 2018
  • Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is changing with each passing day, a vast number of novel schemes and papers have been proposed and published in recent years. In this paper, we survey the literature on malicious attacks in MANETs published during past 5 years, especially the black hole attack. Black hole attacks are classified into non-cooperative and collaborative black hole attacks. Except black hole attacks, other attacks in MANET are also studied, e.g., wormhole and flooding attacks. In addition, we conceive the open issues and future trends of black hole detection and prevention in MANETs based on the survey results of this paper. We summarize these detection schemes with three systematic comparison tables of non-cooperative black hole, collaborative black hole and other attacks, respectively, for a comprehensive survey of attacks in MANETs.

한전계통의 송전망 고장확률 산정을 위한 상정고장 DB 관리시스텀(ezCas) 개발 (Development of Outage Data Management System to Calculate the Probability for KEPCO Transmission Systems)

  • 차승태;전동훈;김태균;전명렬;추진부;김진오;이승혁
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 하계학술대회 논문집 A
    • /
    • pp.88-90
    • /
    • 2004
  • Data are a critical utility asset. Collecting correct data on site leads to accurate information. Data, when gathered with foresight & properly formatted, are useful to both existing database and easily transferable to newer, more comprehensive historical outage data. However, when investigating data items options, the task, can be an arduous one, often requiring the efforts of entire committees. This paper firstly discusses the KEPCO's past 10 years of historical outage data which include meterological data, and also by several elements of the National Weather Service, failure rate, outage duration, and probability classification, etc. Then, these collected data are automatically stored in an Outage Data Management System (ODMS), which allows for easy access and display. ODMS has a straight-forward and easy-to-use interface. It lets you to navigate through modules very easily and allows insertion, deletion or editing of data. In particular, this will further provide the KEPCO that not only helps with probabilistic security assessment but also provides a platform for future development of Probability Estimation Program (PEP).

  • PDF

Exploring the dynamic knowledge structure of studies on the Internet of things: Keyword analysis

  • Yoon, Young Seog;Zo, Hangjung;Choi, Munkee;Lee, Donghyun;Lee, Hyun-woo
    • ETRI Journal
    • /
    • 제40권6호
    • /
    • pp.745-758
    • /
    • 2018
  • A wide range of studies in various disciplines has focused on the Internet of Things (IoT) and cyber-physical systems (CPS). However, it is necessary to summarize the current status and to establish future directions because each study has its own individual goals independent of the completion of all IoT applications. The absence of a comprehensive understanding of IoT and CPS has disrupted an efficient resource allocation. To assess changes in the knowledge structure and emerging technologies, this study explores the dynamic research trends in IoT by analyzing bibliographic data. We retrieved 54,237 keywords in 12,600 IoT studies from the Scopus database, and conducted keyword frequency, co-occurrence, and growth-rate analyses. The analysis results reveal how IoT technologies have been developed and how they are connected to each other. We also show that such technologies have diverged and converged simultaneously, and that the emerging keywords of trust, smart home, cloud, authentication, context-aware, and big data have been extracted. We also unveil that the CPS is directly involved in network, security, management, cloud, big data, system, industry, architecture, and the Internet.

Organizational Change Readiness, Service Innovation, and Corporate Image in Improving Competitiveness: A Case Study in Indonesia

  • HUTAPEA, John Gunung;NIMRAN, Umar;IQBAL, Mohammad;HIDAYAT, Kadarisman
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권3호
    • /
    • pp.683-693
    • /
    • 2021
  • Shipping has become an important sector in supporting social, economic, government, defense, security, cultural and other sectors to unite separate islands and broad seas. Thus, ports automatically become an important facility in Indonesia. The purpose of this research is to test and explain the effect of Organizational readiness for change, Service Innovation, and Corporate Image on Perceived opportunity and challenge. The research model with inferential analysis uses Structural Equation Modeling (SEM) analysis with the WarpPLS approach, expected to answer the statements of problem and be able to test the desired hypothesis. The model development in this research was based on the background, statements of problem, conceptual framework and research hypotheses. The model referred to is "Complete and Comprehensive Port." Its development was carried out through studying and synthesizing various sources. The most important source is the results of literature review in the form of theoretical developments and research results, then continued with compilation. The use of Organizational Change Readiness, Service Innovation, and Corporate Image in improving Port Competitiveness is seen as one of the novelties of this research, specifically the use of the Organizational Change Readiness variable which is often used in high-flexibility companies but now used in port companies as well.

Securing Anonymous Authenticated Announcement Protocol for Group Signature in Internet of Vehicles

  • Amir, Nur Afiqah Suzelan;Malip, Amizah;Othman, Wan Ainun Mior
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4573-4594
    • /
    • 2020
  • Announcement protocol in Internet of Vehicles (IoV) is an intelligent application to enhance public safety, alleviate traffic jams and improve transportation quality. It requires communication between vehicles, roadside units and pedestrian to disseminate safety-related messages. However, as vehicles connected to internet, it makes them accessible globally to a potential adversary. Safety-related application requires a message to be reliable, however it may intrude the privacy of a vehicle. Contrarily, if some misbehaviour emerges, the malicious vehicles must be able to traceable and revoke from the network. This is a contradiction between privacy and accountability since the privacy of a user should be preserved. For a secure communication among intelligent entities, we propose a novel announcement protocol in IoV using group signature. To the best of our knowledge, our work is the first comprehensive construction of an announcement protocol in IoV that deploys group signature. We show that our protocol efficiently solves these conflicting security requirements of message reliability, privacy and accountability using 5G communication channel. The performance analysis and simulation results signify our work achieves performance efficiency in IoV communication.