• 제목/요약/키워드: Department of Homeland Security

검색결과 24건 처리시간 0.027초

Remote Control of Autonomous Robots via Internet

  • Sugisaka, Masanori;Johari, Mohd Rizon M
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.24-27
    • /
    • 2004
  • This paper describes the method how to control an autonomous robot remotely using Internet. The autonomous robot that has an artificial brain is called "Tarou". (1) It is able to move along the line on the floor based on processing the image data obtained from two CCD cameras. (2) It is able to understand dialogs between human being and it and is able to take actions such as turn right and lefts, go forward 1m and go backward 0.5m, etc. (3) It is able to recognize patterns of objects. (4) It is able to recognize human faces. (5) It is able to communicate human being and to speak according to contents written in the program. We show the techniques to control the autonomous robot "Tarou" remotely by personal computer and/or portable Phone via Internet. The techniques developed in our research could dramatically increase their performance for..the need of artificial life robot as the next generation robot and national homeland security needs.

  • PDF

트럼프 행정부의 주요기반시설 사이버보안 정책분석에 관한 연구 (A Study on the Analysis of Trump Administration Cybersecurity Policy: Focusing on Critical Infrastructure)

  • 김근혜
    • 정보보호학회논문지
    • /
    • 제29권4호
    • /
    • pp.907-918
    • /
    • 2019
  • 본 연구는 트럼프 행정부에서 발표한 행정명령, 사이버보안 전략, 법안을 분석함으로써 트럼프 행정부 출범이후 미국의 주요기반시설에 관한 사이버보안 정책을 분석한다. 분석결과, 첫째, 백악관의 역할이 약화되고 국토안보부가 국가 사이버보안 기능을 총괄하게 되었다. 둘째, 트럼프 행정부는 주요기반시설의 정의를 확대함으로써 주요기반시설 사이버보안 분야에서 정부의 역할을 확대하였다. 셋째, 필요시 정부가 민간 주요기반시설의 운영에 관여할 수 있음을 밝히고 있다. 이러한 정책방향은 백악관의 견해보다는 국토안보부와 전문 관료들의 견해가 적극적으로 반영된 것으로 오바마 행정부의 정책을 보완 개선하는 방향으로 진행되었다. 트럼프 행정부의 사이버보안 정책을 분석한 학술연구는 많지 않다. 트럼프 행정부의 주요기반시설의 사이버보안 정책에 대한 분석결과는 한국의 사이버보안 정책에도 시사점을 제공할 수 있을 것이다.

미국의 항공보안정책 적용과 프라이버시 문제점 (Implementation of the U.S. Aviation Security Policy and Privacy Protection Problem)

  • 강자영;김장환
    • 한국항공운항학회지
    • /
    • 제13권3호
    • /
    • pp.110-116
    • /
    • 2005
  • TSA needs to be more transparent with the new passenger screening system and its functioning to build the citizen trust. The system is needed to be not only effective but supported by Congress and the general public. Until this occurs, skepticism will underlie any discussion about its effectiveness in balancing the protection from terrorism with respect to individual liberties. CAPPS II can be a viable system if it is developed appropriately. The objectives of the study are to introduce the security program in the U.S. aviation security policy and to discuss privacy problems when it applies. Korea also needs to study a harmonious plan with the basis of global approach mind in the case of considering the transferring of passenger information from other states for the purpose of security.

  • PDF

A Method for Safety of RFID Systems

  • Karygiannis, Tom;Eydt, Bernard;Barber, Greg;Bunn, Lynn;Phillips, Ted
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 한국정보컨버전스학회 2008년도 International conference on information convergence
    • /
    • pp.63-70
    • /
    • 2008
  • The authors, Tom Karygiannis of NIST, and Bernard Eydt, Greg Barber, Lynn Bunn, and Ted Phillips of Booz Allen Hamilton, wish to thank Steven Fick, Rick Korchak, Kate Remley, Jeff Guerrieri, Dylan Williams, Karen Scarfone, and Tim Grance of NIST, and Kenneth Waldrop and Beth Mallory of Booz Allen Hamilton. These individuals reviewed drafts of this document and contributed to its technical content. The authors would also like to express their thanks to several experts for their critical review and feedback on drafts of the publication. These experts include V.C. Kumar of Texas Instruments; Simson Garfinkel of the Naval Postgraduate School; Peter Sand of the Department of Homeland Security; Erika McCallister of MITRE; and several professionals supporting Automatic Identification Technology(AIT) program offices within the Department of Defense(DoD), especially Nicholas Tsougas, Fred Naigle, Vince Pontani, Jere Engelman, and Kathleen Smith. During the public comment period we received helpful comments from the following Federal Government agencies: the US Departments of Defense, Health and Human Services, Homeland Security, Labor, and State; the Office of the Director of National Intelligence; the Office of Management and Budget; and the General Services Administration. We also received several helpful contributions from commercial industry, including comments from EPCglobal, VeriSign, and Priway. Finally, the authors wish to thank the following individuals for their comments and assistance: Brian Tiplady, Daniel Bailey, Paul Dodd, Craig K. Harmon, William MacGregor, Ted Winograd, Russell Lange, Perry F. Wilson, John Pescatore, Ronald Dugger, Stephan Engberg, Morten Borup Harning, Matt Sexton, Brian Cute, Asterios Tsibertzopoulos, Mike Francis, Joshua Slob in, Jack Harris, and Judith Myerson.

  • PDF

사고대비물질 취급시설 관리방안 연구 (A Study on Improving Management of Substances Requiring Preparation for Accidents Facilities)

  • 김성범;박춘화;조문식;이진선;김정민;노혜란;석광설
    • 한국안전학회지
    • /
    • 제27권3호
    • /
    • pp.77-82
    • /
    • 2012
  • The leakage of toxic chemicals impact seriously on human being and environment, therefore during their treatment process, a proper management system is necessary to control their toxic effect. This study was designed to suggest the management regulation that supports business managers and facilities management. There are no extra regulation to control emergency accidents and terrors in chemical facilities. Developed countries like USA operate the management standards to control the toxic chemical and facilities according to their toxicity and processes. In order to solve this problem, we have analysed the advanced nations standard methods of security in chemical plants to study the new security management regulation which helps to prevent the chemical accidents. Especially, in USA, CCPS (Center for Chemical Process Safety), SVA (Security Vulnerability Assessment) and RBPSs (Risk-Based Performance Standards) of DHS (Department of Homeland Security) were invest I gated. On the basis of the results, we have suggested the application methods of the security and safety regulation in Korea.

VULNERABILITY ASSESSMENTS AND RISK MANAGEMENT FOR CRITICAL INFRASTRUCTURES FROM HOMELAND SECURITY VIEWPOINTS

  • Chun Nen Huang;Yao-Chen Kuo
    • 국제학술발표논문집
    • /
    • The 3th International Conference on Construction Engineering and Project Management
    • /
    • pp.292-301
    • /
    • 2009
  • The employment of risk management theory in Urban Disaster Management System (UDMS) has become an important trend in recent years. The viewpoint of risk management is mainly a comprehensive risk assessment of various internal and external factors, and a subsequent handling of risks. Through continuous and systematic accumulation and analysis of risk information, disaster prevention and rescue system is established. Taking risk management theory as the foundation, Organization for Economic Cooperation and Development (OECD) has developed a series of UDMS in the mega-cities all over the world. With this system as a common platform, OECD cooperates with different cities to develop disaster prevention and rescue system consisting of vulnerability assessment methods, risk assessment and countermeasures. The paper refers to the urban disaster vulnerability assessment and risk management of OECD and the mega-cities of different advanced and developed countries in the world, and then constructs a preliminarily drafted structure for the vulnerability assessment methods and risk management mechanism in the metropolitan districts of Taiwan.

  • PDF

A Semiotics Framework for Analyzing Data Provenance Research

  • Ram, Sudha;Liu, Jun
    • Journal of Computing Science and Engineering
    • /
    • 제2권3호
    • /
    • pp.221-248
    • /
    • 2008
  • Data provenance is the background knowledge that enables a piece of data to be interpreted and used correctly within context. The importance of tracking provenance is widely recognized, as witnessed by significant research in various areas including e-science, homeland security, and data warehousing and business intelligence. In order to further advance the research on data provenance, however, one must first understand the research that has been conducted to date and identify specific topics that merit further investigation. In this work, we develop a framework based on semiotics theory to assist in analyzing and comparing existing provenance research at the conceptual level. We provide a detailed review of data provenance research and compare and contrast the research based on d semiotics framework. We conclude with an identification of challenges that will drive future research in this field.

An Energy-Efficient Access Control Scheme forWireless Sensor Networks based on Elliptic Curve Cryptography

  • Le, Xuan Hung;Lee, Sung-Young;Butun, Ismail;Khalid, Murad;Sankar, Ravi;Kim, Miso Hyoung-Il;Han, Man-Hyung;Lee, Young-Koo;Lee, Hee-Jo
    • Journal of Communications and Networks
    • /
    • 제11권6호
    • /
    • pp.599-606
    • /
    • 2009
  • For many mission-critical related wireless sensor network applications such as military and homeland security, user's access restriction is necessary to be enforced by access control mechanisms for different access rights. Public key-based access control schemes are more attractive than symmetric-key based approaches due to high scalability, low memory requirement, easy key-addition/revocation for a new node, and no key predistribution requirement. Although Wang et al. recently introduced a promising access control scheme based on elliptic curve cryptography (ECC), it is still burdensome for sensors and has several security limitations (it does not provide mutual authentication and is strictly vulnerable to denial-of-service (DoS) attacks). This paper presents an energy-efficient access control scheme based on ECC to overcome these problems and more importantly to provide dominant energy-efficiency. Through analysis and simulation based evaluations, we show that the proposed scheme overcomes the security problems and has far better energy-efficiency compared to current scheme proposed byWang et al.

컨테이너 보안장치(ConTracer)를 위한 효율적인 컨테이너 도어 개폐감지 메커니즘 (Efficient container door Open/Closed detection mechanism for Container Security Device(ConTracer))

  • 문영식;이은규;신중조;손정락;최성필;김재중;최형림
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2011년도 춘계학술대회
    • /
    • pp.831-834
    • /
    • 2011
  • 본 연구에서는 컨테이너화물 안전수송에 사용되는 컨테이너 보안장치(CSD: Container Security Device)의 주요 기능인 컨테이너 도어 개폐감지를 위해 "Reed Sensor를 이용한 효율적인 도어 개폐 메커니즘"을 소개하고 이를 구현하여 실제 성능을 검증하고자 한다. "Reed Sensor를 이용한 효율적인 컨테이너 도어 개폐 감지 메커니즘"은 컨테이너 제조사 마다 각기 다른 컨테이너 문에 부착되어 미국 국토안보부에서 제시한 컨테이너 보안장치의 컨테이너 도어 열림 판단 기준을 만족 시킬 수 있도록 설계 및 구현되었다. 뿐만 아니라 제한적으로 컨테이너 도어의 열림 간격까지 확인 할 수도 있다. 본 연구에서 소개한 컨테이너 도어 개폐감지 메커니즘을 ICC사업단에서 개발한 컨테이너 보안장치인 ConTracer에 구현하여 제조사가 각각 다른 30개의 컨테이너에 장착테스트를 통해서 미국 국토안보부에서 제시한 컨테이너 문의 열림 판단 기준을 만족하는지 검증하였다.

  • PDF

해외의 스포츠시설 안전관리 네트워크 및 시스템 현황 (Safety Management Network of Sports Facilities Abroad and System Status)

  • 김일광;권혜원;최진호
    • 디지털융복합연구
    • /
    • 제14권6호
    • /
    • pp.547-562
    • /
    • 2016
  • 해외의 선진국 사례를 중심으로 스포츠시설 안전관리 네트워크 및 시스템 현황을 분석하여 한국 스포츠시설 안전관리 법적 규제를 마련하고, 안전관리 매뉴얼을 구축하는데 중요한 기초 자료를 제공하는 데 목적이 있다. 또한 스포츠시설 안전관리에 대한 정보를 토대로 각국의 스포츠시설 안전관리 시스템과 대처방안에 대한 구체적인 벤치마킹을 실시하였다. 그 결과, 미국은 국토안보부(DHS)를 필두로 국가의 안전을 위협하는 것으로부터 수호하고자 하는 포괄적인 국가 전략을 감독하고 조직화하고 있는 것으로 나타났다. 독일은 법 규정의 제도화, 스포츠시설 안전 가이드라인, 스포츠시설 안전관리전문가 육성시스템 등 미국과 호주보다 더욱 현실적이고 입체적인 대안을 마련하고 있다. 호주는 주요위험시설(MRF)의 운영자들에게 실용적인 지침을 제공하고 있으며, 특히 비상사태 운영시스템(EMS)을 통해 대규모 재난뿐만 아니라 위험 물질 등에 대한 계획과 협력을 다루고 있다.