• Title/Summary/Keyword: Harbor security

Search Result 26, Processing Time 0.023 seconds

Improvement of Port Entrance System using RFID (RFID를 활용한 항만출입체계 개선방안)

  • Choi, Hyung-Rim;Kim, Hyun-Soo;Hong, Soon-Gu;Park, Yong-Sung;Kim, Hee-Yoon;Shin, Joong-Jo;Choi, Sung-Pill;Lee, Byung-Ha;Choi, Ki-Nam;Ha, Jeong-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.709-719
    • /
    • 2010
  • As the world has had a high recognition of security since 9/11 attacks in 2001, many countries and international organizations around the world are making strenuous efforts in establishing stronger security, centering on areas with high possibility of terrorist attacks. In particular, harbor facilities where a great deal of trade take place between countries, have high possibilities of becoming the objects of terrorist attacks and also of becoming places of trading objects and illegal items which might be leveraged for terror attacks. In this study, I have explained the current status of the harbor entrance system through existing documents, interviews and field trips to harbors and have also introduced improvement measures using RFID technology from the viewpoint of BP(Business Process). I expect that this study will be used as basic materials because I have studied the number of people entering harbors and working procedures for vehicle entrance, which have not been studied so far and also laid out various factors to be considered to introduce RFID technology.

Functional Requirements for VTS Decision Support System (VTS 의사결정지원 시스템 기능 요구 사항)

  • Lee, Sang-Woo;Lee, Byung-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.07a
    • /
    • pp.338-339
    • /
    • 2015
  • VTS Decision Support System can be defined a tool which assists VTS operator for decision-making at operational, planning and management level especially for the safety and efficiency of vessel traffic. This paper presents classification of VTS Decision Support System, detailed definition of alerts, and operational and functional requirements of VTS Decision Support System.

  • PDF

A Implementation on Interface Module and Communication Protocol for Control Monitoring of the AtoN AIS (AtoN AIS 제어감시용 인터페이스 모듈과 통신프로토콜 구현)

  • Cha, Yeong-Mun;Jeong, Yeong-Cheol;Choi, Jo-Cheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6B
    • /
    • pp.683-688
    • /
    • 2011
  • Current is change to concept that management traffic of ship os magnified gradually to near shore waters from harbor. Therefore, introducing the technology of AIS in the ground station, lighthouse, bouy, sea facilities etc.. that is support equipment for safety sailing of ship and safety security of harbor and ship administration. The operation and maintenance of AIS for aids to navigation are required to efficient method. With this actuality, sea advanced nation of EU, USA, Japan that has been apply for developing AtoN AIS equipment that is connected equipment of technology standard in IALA. Because of it is expected to depend equipment in income, that is required to domestic technology of the AtoN AIS. This paper is targeted to development that is suitable automation AtoN AIS equipment in environmental peculiarity for constructor AtoN operating administration center. It has been realization send protocol for information interchange.

A Realization on Interface Module & Communications Protocol of AtoN AIS (AtoN AIS의 인터페이스 모듈 및 통신프로토콜 구현)

  • Choi, Jo-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.1103-1107
    • /
    • 2009
  • Lately, trend is change to concept that management traffic of ship is magnified gradually to near shore waters from harbor. Therefore, introducing the AtoN AIS technology that install AIS in the ground station, lighthouse, bouy, sea facilities etc.. that is support equipment for safety sailing of ship and safety security of harbor and ship administration. The operation and maintenance of AtoN AIS are required to efficient method. With this actuality, sea advanced nation They has been apply for developing AtoN AIS equipment that is connected equipment of technology standard in IALA. Because of it is expected to depend equipment in income, that is required to domestic technology of the AtoN AIS. This paper is targeted to development that is suitable automation AtoN AIS equipment in environmental peculiarity for construnstrunstrAtoN operating administration center. It has been realization the interface module for control and monitoring system and the communications protocol for information interchange.

  • PDF

Roles and strategic functions of the Jeju Naval Base (제주 해군기지의 역할과 전망)

  • Lee, Choon Kun
    • Strategy21
    • /
    • s.39
    • /
    • pp.140-162
    • /
    • 2016
  • The construction of Jeju Naval Base was finally completed and donated to the Republic of Korea Navy on February 26th this year. There is no doubt that the new base will contribute to the substantial augmentation of Korea's naval power and maritime security. However, we should note that the new naval base took a long and hard twenty-three years to be completed. In the 21st century, Korea should adopt a new strategy that can fulfill the security requirements of Korea for the new age of international relations. The 21st century is characterized by globalization, and in the world of globalization, a national boarder has become meaningless. In the late 20th century, after the Cold War, trade between countries have greatly increased and so did the importance of the seas. Having transformed from an agricultural country into a commercial country, Korea went from a continental state to a maritime state. Korea has become the 9th largest trading state, and obviously, the importance of the sea has become significant. Korea's national strategic focus needs to be on the sea for national survival. Thus, since the 1990s, the Korean Navy has planned to build the Jeju Naval Base. Jeju, due to its geopolitical characteristics, is extremely important to the 21st century Korea's economy and national security. Jeju is the starting point of the sea route that reaches out to the world, and at the same time, the ending point of the sea route that heads towards Korea. Jeju is located in the center of Northeast Asia and thus, Jeju Naval Base is extremely important for the area's security and order. Jeju Naval Base will be very useful not only for the maritime security of Korea, but also for keeping peace and order in Northeast Asia. Jeju Naval Base was the minimal effort against the six sea route security threats towards Korea. The six sea route threats are: 1) Threat from North Korea; 2) China's Threat towards Korea's sovereignty; 3) China's treat towards Korea's fishery; 4) Threat from Japan; 5) Threat towards Korea's sea routes; 6) Threat from recent phenomena of isolationism of the United States. Jeju Naval Base is built for both warships and civilian ships--such as cruise ships--to use. Just like the United States' Pearl Harbor, Jeju Naval Base will become not only the largest military base, but a beautiful tourist site.

Impact Assessment of the Damage by a Pool Fire in Yard Storage Facilities of a Container Terminal (컨테이너 터미널 옥외저장소에서의 액면화재에 대한 피해영향 평가)

  • Hwang, Man Woong;Lee, Ik Mo;Hwang, Yong Woo;Chun, Young Woo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.9 no.2
    • /
    • pp.33-42
    • /
    • 2016
  • Domestic harbor yard storage facilities are a place specifically located in a container terminal for import and export of packaged dangerous goods, and due to the recent relaxed criteria for the secured open area, concerns for the extended damage upon accidents are increasing. In this study, the impact of damages by radiant heat was analyzed through a simulation of a pool fire caused by the leakage of flammable liquids from a tank container. As a result, it was analyzed that the distance of radiant heat according to threshold damage levels was beyond the current criteria of the secured open area, and the structural damage of adjacent containers could happen within a very short time if they were exposed to the early pool fire continuously. It is considered that this study will be helpful in preparing the proper criteria for the secured open area between yard storage facilities in a container terminal.

Automatic identification of ARPA radar tracking vessels by CCTV camera system (CCTV 카메라 시스템에 의한 ARPA 레이더 추적선박의 자동식별)

  • Lee, Dae-Jae
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.45 no.3
    • /
    • pp.177-187
    • /
    • 2009
  • This paper describes a automatic video surveillance system(AVSS) with long range and 360$^{\circ}$ coverage that is automatically rotated in an elevation over azimuth mode in response to the TTM(tracked target message) signal of vessels tracked by ARPA(automatic radar plotting aids) radar. This AVSS that is a video security and tracking system supported by ARPA radar, CCTV(closed-circuit television) camera system and other sensors to automatically identify and track, detect the potential dangerous situations such as collision accidents at sea and berthing/deberthing accidents in harbor, can be used in monitoring the illegal fishing vessels in inshore and offshore fishing ground, and in more improving the security and safety of domestic fishing vessels in EEZ(exclusive economic zone) area. The movement of the target vessel chosen by the ARPA radar operator in the AVSS can be automatically tracked by a CCTV camera system interfaced to the ECDIS(electronic chart display and information system) with the special functions such as graphic presentation of CCTV image, camera position, camera azimuth and angle of view on the ENC, automatic and manual controls of pan and tilt angles for CCTV system, and the capability that can replay and record continuously all information of a selected target. The test results showed that the AVSS developed experimentally in this study can be used as an extra navigation aid for the operator on the bridge under the confusing traffic situations, to improve the detection efficiency of small targets in sea clutter, to enhance greatly an operator s ability to identify visually vessels tracked by ARPA radar and to provide a recorded history for reference or evidentiary purposes in EEZ area.

Remote Secure Entrance Control System using RFID and TCP/IP (RFID와 TCp/IP를 활용한 원격 보안 출입 제어 시스템)

  • Kim, Jeong-Sook;Kim, Cheon-Shik;Yoon, Eun-Jun;Hong, You-Sik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.6
    • /
    • pp.60-67
    • /
    • 2008
  • At present, RFID system is highly welcomed as a substitute system with its bar code recognition system and self recognition equipment. Consequently, the system has multi applications and can be complementing to its security. In particular, RFID system is significantly related with electronic transaction equipments : transportation card, ID card in check point, attendance sheet. Based upon these characteristic, the system is becoming extremely popular in the field of logistics, harbor and stock management, animal control and product circulation & distribution. In this dissertation, I would like to present a more efficient and stable remote entry control system with the network-based TCP/IP. It is a simple example of ubiquitous computing function. Above all, approved protocol system should be applied to the remote entry control function. Its efficient function with the applied approval protocol based-remote entry control system should be confirmed. Therefore, a preliminary test should be prerequisite in automatic entrance function with the embedded and TCP/IP-based RFID system.

Preliminary Results of Marine Traffic Monitoring Field Campaigns for the Jurisdictional Sea Area of South Korea: Monitoring on the Ieodo Ocean Research Station (관할해역 해상교통 모니터링을 위한 기초 연구: 이어도해양과학기지 실험 중심으로)

  • Yang, Chan-Su
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.06a
    • /
    • pp.68-69
    • /
    • 2014
  • At the present, ship traffic monitoring and management are focused on the harbor area and the specified coastal zone in South Korea. It, however, is required that the Jurisdictional Sea Area of South Korea is monitored from two viewpoints: Safety and Security. Through a safe sea line (transport route) over the world, it is possible to expand our ocean economical territory. As a first step, we have been in field campaigns for integrated ship monitoring on the Ieodo Ocean Research Station in November 2013 after the first test in Gyunggi Bay.

  • PDF

A Survey on Privacy Vulnerabilities through Logit Inversion in Distillation-based Federated Learning (증류 기반 연합 학습에서 로짓 역전을 통한 개인 정보 취약성에 관한 연구)

  • Subin Yun;Yungi Cho;Yunheung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.711-714
    • /
    • 2024
  • In the dynamic landscape of modern machine learning, Federated Learning (FL) has emerged as a compelling paradigm designed to enhance privacy by enabling participants to collaboratively train models without sharing their private data. Specifically, Distillation-based Federated Learning, like Federated Learning with Model Distillation (FedMD), Federated Gradient Encryption and Model Sharing (FedGEMS), and Differentially Secure Federated Learning (DS-FL), has arisen as a novel approach aimed at addressing Non-IID data challenges by leveraging Federated Learning. These methods refine the standard FL framework by distilling insights from public dataset predictions, securing data transmissions through gradient encryption, and applying differential privacy to mask individual contributions. Despite these innovations, our survey identifies persistent vulnerabilities, particularly concerning the susceptibility to logit inversion attacks where malicious actors could reconstruct private data from shared public predictions. This exploration reveals that even advanced Distillation-based Federated Learning systems harbor significant privacy risks, challenging the prevailing assumptions about their security and underscoring the need for continued advancements in secure Federated Learning methodologies.