• Title/Summary/Keyword: Environmental Security

Search Result 832, Processing Time 0.028 seconds

Study on a Forward Light Changes According to the Surface Treatment of Light Cutoff Panel (차광판 표면 처리 방법에 따른 전사광 변화에 관한 연구)

  • Gu, Jinhoi;Kwon, Myunghee;Lee, Yoon-Gyeong
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.28 no.12
    • /
    • pp.1-5
    • /
    • 2014
  • Since the "Light Pollution Prevention Act" was executed, the installation of the light cutoff panel to the security lightings which caused light trespass has been increased in the local government. The light cutoff panel is effective in reducing the light trespass in term of the cost-benefit. Because the installation of the light cutoff panel is inexpensive than the change of the security lighting. But the reflected light from the surface of the light cutoff panel has been regarded as another light pollution problem to solve. Therefore, we try to improve light cutoff panel by changing the light reflectivity characteristic of the surface of the light cutoff panel. First, we laminated the surface of light cutoff panel by black powder to reduce the light reflectivity of the light cutoff panel. After the black powder lamination, the light reflectivity on the light cutoff panel improved from 85% to 5%. And we compared reflected light caused by black powder laminated light cutoff panel with the one of no surface treatment cutoff panel. The vertical illuminance was measured at 3, 6, 9m in front of the security lighting and 3, 6, 9, 12, 15, 18m in back of the security lighting to evaluate the reflected light. And the measurement height was determined of 1.5m considering the height of the 1th floor of an apartment house. In this study, we found that the reflected light from the light cutoff panel can be reduced about 90% by the black powder lamination method. The results derived from this study will be helpful to develope the various kind of light cutoff panel which minimize the adverse effect like reflected light of light cutoff panel.

Design of a Policy-based Security Mechanism for the Secure Grid Applications (안전한 그리드 응용을 위한 정책기반의 보안 기능 설계)

  • Cho, Young-Bok;You, Mi-Kyung;Lee, Sang-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.901-908
    • /
    • 2011
  • For the available grid environmental realization, the resource supply PC must have to provide an appropriate security function of their operation environments. SKY@HOME is a kind of the grid computing environments. If this has not supervised by administrator handling smoothly, it is inherently vulnerable state to the security level of the grid environments, because the resource supply PC is not update a security function without delay. It is also have the troublesome problems which have to install of an additional security program for support the appropriate security. This paper proposes an integration security model on the policy-based that provides an update each level according to the situation of the resource supply PC for improving its problems as a security aspect of the SKY@HOME. This model analyzes the security state of the resource supply PC respectively, and then the result is available to provide an appropriate security of the resource supply PC using an integration security model. The proposed model is not need additionally to buy and install the software, because it is provided the security management server oriented service. It is also able to set up the suit security function of a characteristic of the each resource supply PC. As a result, this paper clearly show the participation of resource supply PC improved about 20%.

An Extended Benefit-Cost Analysis of Land Consolidation and On-farm Development Project -With Respect to Jigok Land Consolidation and On-farm Development Project in Seosan, Chungnam Province, Korea- (경지정리사업의 확장편익-비용분석 - 충남서산시 지곡지구를 중심으로 -)

  • Lim, Jae-Hwan;Lee, Min-Soo
    • Korean Journal of Agricultural Science
    • /
    • v.29 no.1
    • /
    • pp.66-83
    • /
    • 2002
  • The economic feasibility analysis including benefit-cost ratio and internal rate of return of a land consolidation and on-farm development project was mainly depended upon the direct benefits and costs arising during project life. Therefore the projects were neglected in allocating the government's financial funds and loans on account of the low economic rate of return of the project. Accordingly the extended benefit-cost analysis method should be introduced and adapted to cover not only the benefit s such as non-market values of environmental and food security fun ct ions of the project but also market values of the project outputs. The main purposes of this study are (1) to prepare a guide line for economic feasibility analysis based on the IBRD and ADB guidelines, (2) to estimate the benefits from productivity increase, labor saving, savings of O&M cost of farm mechanization and project facilities, savings of farmer's burden for their public health, increasing environmental and public functional value of paddy fields, improving food security condition and formation of peaceful and uncontroversial rural society by implementing the land consolidation and on-farm development, (3) to introduce the newly adapted analytical method as the extended benefit cost analysis which could make possible to be included the values of non-market goods such as the food security and the environmental public function of paddy fields. To carry out this study, the existing publications on the guidelines for economic agricultural projects were reviewed and consultation was made with a For the post evaluation study of the land consolidation and on-farm development project, field survey in Jigok and other comparative area were made to get available information. According to the project completion report, Jigok land consolidation and on-farm development project has 55ha of benefit area out of 69ha of gross area. The project was started in November 11th, 2000 and completed october 30th, 2001. The total project costs were amounted to 2,548 million won and the annual project benefits were estimated at 335million won evaluated by domestic market prices. The ERR(Economic Rate of Return) and SRR(Social Rate of Return) of the project based on the shadow pricing system were estimated at 4.4% and 16% respectively. On the other hand, the ERR and SRR based on the domestic market value system were amounted to 6.37% and 14.62%. In conclusion, Korean land consolidation and on-farm development projects have not carried out from the view point of economic rate of return under shadow pricing system but from the view point of domestic pricing system. For the future feasibility studies on land consolidation projects have to be carried out including the non-market values as environmental and food security function of the projects.

  • PDF

A Multi-Sensor Fire Detection Method based on Trend Predictive BiLSTM Networks

  • Gyu-Li Kim;Seong-Jun Ro;Kwangjae Lee
    • Journal of Sensor Science and Technology
    • /
    • v.33 no.5
    • /
    • pp.248-254
    • /
    • 2024
  • Artificial intelligence techniques have improved fire-detection methods; however, false alarms still occur. Conventional methods detect fires using current sensors, which can lead to detection errors due to temporary environmental changes or noise. Thus, fire-detection methods must include a trend analysis of past information. We propose a deep-learning-based fire detection method using multi-sensor data and Kendall's tau. The proposed system used a BiLSTM model to predict fires using pre-processed multi-sensor data and extracted trend information. Kendall's tau indicates the trend of a time-series data as a score; therefore, it is easy to obtain a target pattern. The experimental results showed that the proposed system with trend values recorded an accuracy of 99.93% for BiLSTM and GRU models in a 20-tap moving average filter and 40% fire threshold. Thus, the proposed trend approach is more accurate than that of conventional approaches.

Development of Security Functional Requirements for Secure-Introduction of Unmanned Aerial Vehicle (무인항공기의 안전한 도입을 위한 보안기능요구사항 개발)

  • Kang, Dongwoo;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.97-105
    • /
    • 2019
  • With the possibility of wireless control of the aircraft by Nicola Tesla, Unmanned Aerial Vehicle(UAV) was mainly used for military and defense purposes with the rapid development through World War I and II. As civilian applications of unmanned aerial vehicles have expanded, they have been used with various services, and attempts have been made to control various environmental changes and risk factors of unmanned aerial vehicles. However, GPS spoofing, Jamming attack and security accidents are occurring due to the communication in the unmaned aerial vehicle system or the security vulnerability of the unmanned aerial vehicle itself. In order to secure introduction of Unmanned aerial vehicle, South Korea has established Unmanned Aerial Vehicle verification system called Airworthiness Certification. However, the existing cerfication system is more focused on test flight, design and structure's safety and reliability. In this paper, we propose a unmanned aerial vehicle system model and propose security functional requirements on unmanned aerial vehicle system in the corresponding system model for secure-introduction of Unmanned Aerial Vehicle. We suggest the development direction of verification technology. From this proposal, future development directions of evaluation and verification technology of Unmanned Aerial Vehicle will be presented.

Decision Making for the Industrial Security Management Measures' Importance in Operation Level (운영 수준에서의 산업보안 관리대책 중요도 결정)

  • Chae, Jeong-Woo;Jeong, Jin-Hong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.4
    • /
    • pp.389-398
    • /
    • 2013
  • This study aims to support rational security investment decision making through prioritizing on operational level of management measures strategically, in carrying out industrial security activities. For this, AHP survey is conducted against industrial security professionals and analyzed. Thereafter, the importance and the priority of industrial security management measures are determined. As a result, in a comparison evaluation among the criteria, 'ICT service management' represents the highest weight (0.54). And the sub-criteria could be divided into three groups (Group I, II, III), depending on their importance. The sensitivity analysis results show that if the weight of the criterion, 'ICT systems/networks access control' is doubled, the sub-criteria, 'O/S access control', 'application access control', and 'wired/wireless network access control' are enter into top rank group. In case of the criterion, 'physical/environmental security' is doubled, the sub-criteria, 'protection zoning/access control' and 'disaster prevention on business equipment/counter-terrorism' are enter into the top rank group, 'securing utilities' is enter into the mid rank group.

User Sensitive Data Classification for IoT Gateway Security (사물인터넷 게이트웨이 보안을 위한 사용자 민감 데이터 분류)

  • Heo, Mhanwoo;Park, Kicheol;Hong, Jiman
    • Smart Media Journal
    • /
    • v.8 no.4
    • /
    • pp.17-24
    • /
    • 2019
  • As IoT technology is widely used in industrial environments, its environmental security issues are becoming more important. In such a context, studies utilizing hardware security functions are being actively carried out. However, previous studies did not consider the performance degradation that occurs when using hardware security functions in IoT environment. Gateway devices that are mainly used in IoT environments are often resource-limited. Utilizing hardware security in such an environment can cause serious performance degradation as the number of IoT devices connected to the gateway increases. Therefore, in this paper, we propose a data classification scheme to efficiently utilize hardware security functions in resource limited environment. We implement a platform with the proposed technique using ARM Trustzone. Performance degradation due to the hardware security functions is measured through experiments on the implemented platform and compared with the performance as of when the proposed technique is applied.

The Relationship between Security Industry, Crime Occurrence and Arrest (시큐리티산업과 범죄 발생 및 검거의 관계)

  • Joo, Il-Yeob;Cho, Kwang-Rae
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.487-505
    • /
    • 2007
  • This study is to examine relations between the number of occurrence of big five critical crimes that consist of homicide, robbery, rape, theft, violence and the number of the security companies and the security guards, and between the number of the security companies, the security guards and the number of arrests from the big five critical crimes. To achieve this objective, this research selects a subject of study, the number of the security companies and security guards, and the number of occurrences of the big five critical crimes and arrests of the big five crimes from 1990 to 2005. The selected data are then analyzed according to the variables using SPSS 12.0. Each hypothesis is verified with the level of significance ${\alpha}$=.05 using the statistical techniques such as Correlation Analysis, Regression Analysis, etc. The following is the result of the study: First, the number of occurrences of the big five critical crimes affects the number of the security companies at a significant level. Second, the number of the security companies affects the number of arrests of the big five crime at a significant level.

  • PDF

The Improvement Strategy of Spatial Information Security Management System to Promote Spatial Information Industry -Focused on Production, Management, Supply Institutions of Spatial information- (공간정보산업 활성화를 위한 공간정보 보안관리체계의 개선전략 - 공간정보의 생산·관리·보급 기관을 중심으로 -)

  • Jeong, In Hun;Park, Hong Gi;Kim, Young Dan;Choi, Yun Soo
    • Spatial Information Research
    • /
    • v.21 no.6
    • /
    • pp.33-42
    • /
    • 2013
  • In a long-term perspective of development of spatial information industry, security regulation, such as limiting public picture resolution of aerial photographs, needs a rational improvement. However, unplanned deregulation of spatial information could lead problematic results such as national security issues because its present security management system is not established in reasonable manner. The main purpose of this research is to suggest the improvement plan of spatial information security management system to meet the reducing security regulation in accordance with changes of political and economic condition including current national spatial information security polices and spatial information industry. From an analytical standpoint, we examined the overall aspects of legal, operation management, and technical system while we maintained especially integrated perspective of spatial information security management. Followed by investigation of spatial information security issues, as well as its regulation and policies in overseas, rational improvement plan of security management is proposed in the aspects of legal, operation management, and technical system. It is also suggested the three-step improvement plan of reducing regulation of security management system.

Analysis of E-Waste Disposal Trends in a Security Perspective (보안관점의 전자폐기물 처리동향 분석 연구)

  • Juno Lee;Yuna Han;Yeji Choi;Yurim Choi;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.11 no.6
    • /
    • pp.56-67
    • /
    • 2023
  • The increased demand for electronic components, spurred by the Fourth Industrial Revolution and the COVID-19 pandemic, has facilitated human life but also escalated the production of e-waste. Discussions on the impact of e-waste have primarily revolved around environmental, health, and social issues, with global legislations focusing on addressing these concerns. However, e-waste poses unique security risks, such as potential technological and personal information leaks, unlike conventional waste. Current discourse on e-waste security is notably insufficient. This study aims to empirically analyze the relatively overlooked trends in e-waste security, employing three methodologies. Firstly, it assesses the general trend in discussions on e-waste by analyzing year-wise documents and media reports. Secondly, it identifies key trends in e-waste security by examining documents on the subject. Thirdly, the study reviews national security guidelines related to e-waste disposal to assess the necessity of designing security strategies for e-waste management. This research is significant as it is one of the first in korea to address e-waste from a security perspective and offers a multi-dimensional analysis of e-waste security trends. The findings are expected to enhance domestic awareness of e-waste and its security issues, providing an opportunity for proactive response to these security risks.

  • PDF