• Title/Summary/Keyword: Human security

Search Result 1,193, Processing Time 0.035 seconds

Cable Effect Analysis Inside an Electrically Large Structure from an External Electromagnetic Waves (전자파에 의한 대형구조물 내부 케이블 영향 해석)

  • Lee, Jae-Min;Yoon, Seong-Sik;Lee, Jae-Wook;Han, Jung-Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.2
    • /
    • pp.155-158
    • /
    • 2017
  • With the help of technical development in the electronic industries, the electronic devices employing the cutting-edged technology are spread in all the area requiring electromagnetic communications. Especially, because of the presence of electronic devices in a variety of research fields like automotive vehicle, train, and aircraft, the research area such as the malfunction and critical damage of the internal system and microwave devices due to the unexpected radiated high-powered EM effects are very important even for the possible occurrence of human damage. In this paper, the effects of electromagnetic fields into the cable connecting the electronic devices and many sensors inside the target structure is treated because of potential malfunction or hardware disorders. In addition, correlation function and transmission line theory have been employed for the analysis of the induced current on the cable inside an electrically large resonant structure.

A Study on the Development of Building Control and management System -Focusing on the Lighting Control and Monitoring system- (빌딩 제어 및 관리 시스템 개발에 관한 연구 -조명 제어 관리 시스템 구축을 중심으로-)

  • Cho, Sung-O
    • Korean Institute of Interior Design Journal
    • /
    • v.16 no.4
    • /
    • pp.110-118
    • /
    • 2007
  • Technology has been viewed at various stages of civilization as leading to future progress. The building, its services systems and management of the work process all contribute to the well-being of people within an organization. Productivity relies on there being a general sense of high morale and satisfaction with the workplace. Now buildings are considered as providing a milieu for human creativity. Flexibility, adaptability, service integration and high standards of finishes offer an intelligence threshold. Building Automation System(BAS) - controlled lighting systems may offer incremental energy saving. Conventional Lighting control systems often control equipment in a single room or over the limited area, because they are centralized control systems, which means that all the controlled circuits must be wired to a single control panel. The computers used by these systems are typically dedicated microprocess that perform only lighting control functions. By comparison, modern Building automation systems are distributed control system, which means that their computing hardware and software are distributed as a network that microprocessor-based control modules and standard PC. PLC(Programmable Logic controller) is extensible virtually without limits, so that all the lighting in a facility can be controlled by single, unified system - the same system that also can control and monitor the building's HVAC, security, and manufacturing processed, elevators, and more. A Building automation system can control light using schedules, manual controls, occupancy sensors, and photosensors, either singly or in combination. Building Lighting control and monitoring system will be for a energy saving and efficient building management system.

A Study on Korean Seafarer's Perceptions Towards Unmanned Ships (무인화 선박에 대한 한국 선원들의 인식에 관한 연구)

  • D'agostini, Enrico;Ryoo, Dong-Keun;Jo, So-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.41 no.6
    • /
    • pp.381-388
    • /
    • 2017
  • Recently, renewed attention for technological applications within the maritime industry has taken place, particularly regarding unmanned vessels. There has been a lot of interest about the number of projects aiming at testing the operational feasibility of unmanned vessels, particularly in relation to technological, safety and security issues. Nevertheless, no studies have investigated this issue from the point of view of seafarers towards unmanned vessels; this paper aims at filling this gap. Data has been collected through a survey questionnaire. A Pearson correlational coefficient has been used to test the correlation between some of the variables. The results show that more than half of the respondents indicated that unmanned vessels do not contribute to an increase in accidents at sea. In addition, seafarers believe unmanned vessels will not be operational in the near future, with most of the respondents indicating a 10-20 year time frame. Thirdly, most of the respondents(both officers and ratings).

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

Janus - Multi Source Event Detection and Collection System for Effective Surveillance of Criminal Activity

  • Shahabi, Cyrus;Kim, Seon Ho;Nocera, Luciano;Constantinou, Giorgos;Lu, Ying;Cai, Yinghao;Medioni, Gerard;Nevatia, Ramakant;Banaei-Kashani, Farnoush
    • Journal of Information Processing Systems
    • /
    • v.10 no.1
    • /
    • pp.1-22
    • /
    • 2014
  • Recent technological advances provide the opportunity to use large amounts of multimedia data from a multitude of sensors with different modalities (e.g., video, text) for the detection and characterization of criminal activity. Their integration can compensate for sensor and modality deficiencies by using data from other available sensors and modalities. However, building such an integrated system at the scale of neighborhood and cities is challenging due to the large amount of data to be considered and the need to ensure a short response time to potential criminal activity. In this paper, we present a system that enables multi-modal data collection at scale and automates the detection of events of interest for the surveillance and reconnaissance of criminal activity. The proposed system showcases novel analytical tools that fuse multimedia data streams to automatically detect and identify specific criminal events and activities. More specifically, the system detects and analyzes series of incidents (an incident is an occurrence or artifact relevant to a criminal activity extracted from a single media stream) in the spatiotemporal domain to extract events (actual instances of criminal events) while cross-referencing multimodal media streams and incidents in time and space to provide a comprehensive view to a human operator while avoiding information overload. We present several case studies that demonstrate how the proposed system can provide law enforcement personnel with forensic and real time tools to identify and track potential criminal activity.

A Critical Reflection on Formation of Regional Identity and Construction of Public Space in Urban Development Strategy (도시발전 전략에 있어 정체성 형성과 공적 공간의 구축에 관한 비판적 성찰)

  • Choi, Byung-Doo
    • Journal of the Korean association of regional geographers
    • /
    • v.14 no.5
    • /
    • pp.604-626
    • /
    • 2008
  • In recent years, the formation of identity has drawn much attention in urban development strategy. This has a dual implication for normative rehabilitation of lost traditional identity for ontological security of human being, and for strategic improvement of newly urban images in order to gain superiority in urban competitions. This duality is reflected on the debate between postmodern theorists, such as Lacan, Foucault and Deleuze, criticizing modem identity, and Arendt and Habermas, suggesting alternative formation of identity through public space. This paper considers some implications of identity for urban development policy, while criticizing urban development strategies which justify themselves with enhancing urban identity but which distort or erode it actually. In particular, this paper argues that the perspective of postmodern theorists is suitable for criticizing pseudo-identity in reality, while critical theoriests' suggestion of formation of authentic identity through and in public space can be understood as an ethical alternative to urban development policy.

  • PDF

Sizing System Development of Korean Structural Firefighting Protective Clothing (한국 소방용 방화복의 치수체계 개발)

  • Han, Sul-Ah;Nam, Yun-Ja;Choi, Young-Lim
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.5
    • /
    • pp.827-839
    • /
    • 2009
  • Sizing system of Korean structural firefighting protective clothing that is national approved should be met for specification of structural firefighting protective clothing that is identified by Ministry of Public Administration and Security(MOPAS). However if you look over the specification of sizing system, the standard is based on only 'height' and the others are indicated as the size of completed product. KS K ISO 13688 and EN 340 which is met on ISO 13688 which indicates sizing system about protective clothing has the standards of height, chest and waist circumference. Also NFPA 1971 that has standards of sizing system is based on chest circumference, cervical to wrist length, waist circumference and inseam. That is different from Korean standards. Therefore, fire fighting protective clothing standards which is based on only height should be compensated and not be relied on foreign standards like ISO. It is indispensable for developing our own sizing system of structural fire fighting protective clothing. In this studying, Korean new sizing system of structural fire fighting protective clothing was developed for providing basic information of ergonomic structural fire fighting protective clothing. The analyzed target age was between 20 and 59 years old fire fighter who extinguish the fire. And it was analyzed by 3D measurement among data of the $5^{th}$ Size Korea. On conclusion, in case of structural fire fighting protective clothing coat, physical dimension was to be chest circumference, cervical to wrist length. Three dimensions as 5cm space of circumference and four dimensions as 2.5cm space of cervical to wrist length were derived, which means that totally 12 dimensions were defined. Dimension standards of pants was based on the analysis of waist circumference and crotch height. Six dimensions as 5cm space of waist circumference and three dimensions as 5cm space of crotch height were derived, which means that totally 14 dimensions were defined.

Convolution Neural Network based TW3 Maximum Height Prediction System (컨볼루션 신경망 기반의 TW3 최대신장예측 시스템)

  • Park, Si-hyeon;Cho, Young-bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1314-1319
    • /
    • 2018
  • The current TW3 - based maximum height prediction technique used in KMAA(Korean Medical Academy of Auxology) is manual and subjective, and it requires a lot of time and effort in the medical treatment, while the interest in the child's growth is very high. In addition, the technique of classifying images using deep learning, especially convolutional neural networks, is used in many fields at a more accurate level than the human eyes, also there is no exception in the medical field. In this paper, we introduce a TW3 algorithm using deep learning, that uses the convolutional neural network to predict the growth level of the left hand bone, to predict the maximum height of child and youth in order to increase the reliability of predictions and improve the convenience of the doctor.

A Study on Caregiver's Perception of Restraints (요양보호사의 억제대 사용에 대한 인식)

  • Kang, Hye-kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.452-458
    • /
    • 2016
  • This is a descriptive study on visiting caregivers' perception of restraint use. Data were collected from 113 caregivers working at long-term facilities using a structured questionnaire from Feb to March 2016. The caregivers' perception of restraint use was the medium score. The items they considered the most important reasons for the restraints was "Protecting an older person from falling out of bed", which was primarily intended to prevent accidents of the elderly. The score of the knowledge of restraint use was 11.23 points out of 18 and those affected were more than 50 years of age. The attitude score to the use restraints was 9.19, and caregivers thought it should be possible to refrain from using restraints. Work experience of 3 years or less were higher. The perception of using restraints is affected by the knowledge and attitudes of restraint use. This is very important for the elderly in long-term care facilities and is related to health and human rights. Therefore, it is important to provide continuous education related to the use of restraints and regulations on their management.

Modeling and Selecting Optimal Features for Machine Learning Based Detections of Android Malwares (머신러닝 기반 안드로이드 모바일 악성 앱의 최적 특징점 선정 및 모델링 방안 제안)

  • Lee, Kye Woong;Oh, Seung Taek;Yoon, Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.11
    • /
    • pp.427-432
    • /
    • 2019
  • In this paper, we propose three approaches to modeling Android malware. The first method involves human security experts for meticulously selecting feature sets. With the second approach, we choose 300 features with the highest importance among the top 99% features in terms of occurrence rate. The third approach is to combine multiple models and identify malware through weighted voting. In addition, we applied a novel method of eliminating permission information which used to be regarded as a critical factor for distinguishing malware. With our carefully generated feature sets and the weighted voting by the ensemble algorithm, we were able to reach the highest malware detection accuracy of 97.8%. We also verified that discarding the permission information lead to the improvement in terms of false positive and false negative rates.