• Title/Summary/Keyword: IT security

Search Result 11,344, Processing Time 0.047 seconds

A study on the improvement of artificial intelligence-based Parking control system to prevent vehicle access with fake license plates (위조번호판 부착 차량 출입 방지를 위한 인공지능 기반의 주차관제시스템 개선 방안)

  • Jang, Sungmin;Iee, Jeongwoo;Park, Jonghyuk
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.2
    • /
    • pp.57-74
    • /
    • 2022
  • Recently, artificial intelligence parking control systems have increased the recognition rate of vehicle license plates using deep learning, but there is a problem that they cannot determine vehicles with fake license plates. Despite these security problems, several institutions have been using the existing system so far. For example, in an experiment using a counterfeit license plate, there are cases of successful entry into major government agencies. This paper proposes an improved system over the existing artificial intelligence parking control system to prevent vehicles with such fake license plates from entering. The proposed method is to use the degree of matching of the front feature points of the vehicle as a passing criterion using the ORB algorithm that extracts information on feature points characterized by an image, just as the existing system uses the matching of vehicle license plates as a passing criterion. In addition, a procedure for checking whether a vehicle exists inside was included in the proposed system to prevent the entry of the same type of vehicle with a fake license plate. As a result of the experiment, it showed the improved performance in identifying vehicles with fake license plates compared to the existing system. These results confirmed that the methods proposed in this paper could be applied to the existing parking control system while taking the flow of the original artificial intelligence parking control system to prevent vehicles with fake license plates from entering.

A Study on Unauthorized Anchoring of Foreign-flag Vessels in Internal Waters and Territorial Sea (외국선박의 내수 및 영해 무단정박에 관한 연구)

  • Lim, Chae-Hyun;Lee, Chang-Hee;Jeong, Dae-Deuk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.2
    • /
    • pp.280-289
    • /
    • 2022
  • Internal Waters refer to the waters located at the landward side of a baseline and is completely under the sovereignty of a coastal state. However, the right of innocent passage of foreign-flag vessels is recognized in internal waters that are newly incorporated by establishing a straight baseline. Korea has a massive Internal Waters on its south-western coast where the straight baseline is adopted and has a wide Internal Waters that allows innocent passage. A foreign-flag vessel navigating the internal waters must be properly managed according to the interest of the coastal states such as the fishing·safety·security·environment around the Korean coast. Additionally, Territorial Sea comes under the sovereignty of a coastal state and it is a very important sea area for managing the interests of the coastal states. However, several collision accidents involving illegally anchored or drifted foreign-flag vessels have been occurring recently in the Korean Internal Waters and Territorial Sea, and such accidents are a threat to its interests. Thus, this paper analyzes the cases of collision of foreign-flag vessels that anchored or drifted without authorization, and examines domestic·international laws on the passage of foreign-flag vessel through Internal Waters and Territorial Waters. Finally, this paper suggests that unauthorized anchoring of foreign-flag vessels in Korean Internal Waters and Territorial Water violates the requirements for innocent passage and this violation is punishable according to related Acts; a desirable improvement plan for the legal system of passage through Internal Waters and Territorial Waters.

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.

Need to Reduce Industrial Accidents through the Introduction of an Prevailing Wage System (적정임금제 도입을 통한 산업재해 감축 필요성 고찰)

  • Choonhwan Cho;Yeoncheol Shin;Kyung-Bo Han
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.1
    • /
    • pp.1-9
    • /
    • 2023
  • In order to carry out construction work, it is urgent to introduce a proper wage system so that the cost burden of projects that have been won due to bleeding competition among original government buildings based on low-priced bids can be transferred to subcontractors. Purpose: Construction with illegal multi-level industrial structure needs to improve the wage reduction environment leading to order (100%) → original contractor (80%) → subcontractor (65%) → load contractor (65%) and aims to ensure wages for end workers. Method: Investigate the current status of labor cost appropriate payment plan in the construction industry, and investigate the case of the appropriate wage system (P.W) in the United States. In addition, the effect and direction of the appropriate wage system are presented. Result: Individual minimum wage security was also mentioned in the Constitution, and many researchers suggested that only the introduction of an appropriate wage system could solve the problem of reducing worker labor and ensure quality and safety. Conclusion: The proper wage system in the construction industry will block illegal multi-level and illegal foreign work, improve the labor environment in the construction market, create an influx of young workers, and have a significant impact on the construction industry's competitive structure, safety, and quality.

Prototype Fabrication and Performance Evaluation of Metal-oxide Nanoparticle Sensor for Detecting of Hazardous and Noxious Substances Diluted in Sea Water (해수 중 유해위험물질 검출을 위한 금속산화물 나노 입자 센서의 시작품 제작 및 성능 평가)

  • Sangsu An;Changhan Lee;Jaeha Noh;Youngji Cho;Jiho Chang;Sangtae Lee;Yongmyung Kim;Moonjin Lee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.spc
    • /
    • pp.23-29
    • /
    • 2022
  • To detect harmful chemical substances in seawater, we fabricated a prototype sensor and evaluated its performance. The prototype sensor consisted of a detector, housing, and driving circuit. We built the detector by printing an Indium-Tin-Oxide (ITO) nanoparticle film on a flexible substrate, and it had two detection parts for simultaneous detection of temperature and HNS concentration. The housing connected the detector and the driving circuit and was made of Teflon material to prevent chemical reactions that may affect sensor performance. The driving circuit supplied electric power, and display measured data using a bridge circuit and an Arduino board. We evaluated the sensor performances such as response (ΔR), the limit of detection (LOD), response time, and errors to confirm the specification.

One-health Approach in the Post-COVID-19 Era: Focusing on Animal Infection (One-health 관점에서 본 Post-COVID-19 시대의 동물 감염)

  • Hye-Jeong Jang;Sun-Nyoung Yu;O-Yu Kwon;Soon-Cheol Ahn
    • Journal of Life Science
    • /
    • v.33 no.2
    • /
    • pp.199-207
    • /
    • 2023
  • To prepare for the threat of a future epidemic in the post-COVID-19 era, research based on the one-health concept (i.e., the health of humans, animals, and the environment as "one") is essential. Cross-species infections are being identified as a result of the high infection rate and viral load of SARS-CoV-2 in humans. The possibility of transmission of SARS-CoV-2 from humans to mink has been determined. In addition, the transmission of SARS-CoV-2 from humans to cats through contact has been considered possible. The data so far show that livestock and poultry are less likely to be infected with SARS-CoV-2. However, if infections are established through a new mutation, the resulting diseases are expected to have enormous ripple effects on various fields, such as human food security, the economy, and trade. In addition, there are concerns about the endemic prospect of SARS-CoV-2 and the high accessibility of companion animals. This is because the evolution of the virus likely occurs in animal hosts. Once SARS-CoV-2 is established in other species, they might serve as intermediate hosts for the re-emergence of the virus in the human population. Thus, it is necessary to ensure a rapid response to future outbreaks by accumulating research data on the animal infection of SARS-CoV-2. These data can have implications for the development of animal models for vaccines and therapeutics against SARS-CoV-2. Therefore, in this study, epidemiological reviews were analyzed, and response strategies against SARS-CoV-2 infection in animals were presented using the One-health approach.

A Study on Restriction of Access to Medical Institutions and Discrimination on Human Rights of Persons with Disabilities Not Wearing Masks to Prevent Healthcare-Associated Infections (의료관련감염 예방을 위한 마스크 미착용 장애인의 의료기관 출입제한과 인권차별 결정에 대한 검토)

  • Moon, Sang Hyuk;Kim, Je Sun
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.1
    • /
    • pp.67-98
    • /
    • 2023
  • In the early stages of the COVID-19 pandemic, Korea took the lead in implementing "social distancing" policies more strongly than other countries. In addition to making it mandatory to wear a mask according to the policy, all patients using medical institutions are tested for COVID-19 to prevent Healthcare-Associated Infections, and only those patients who test negative have been regulated to receive face-to-face medical treatment. In this process, situations such as the disabled, who have difficulty wearing masks, were not taken into account, and emergency patients did not receive timely treatment or surgery from medical personnel. In response, the National Human Rights Commission of Korea has decided that forcing everyone to wear a mask and restricting access to medical institutions constitutes discrimination against the disabled. Therefore, the purposes this study has that, the first is to review cases of human rights discrimination against persons with disabilities due to measures to prevent the transmission of infectious diseases that did not consider the characteristics of persons with disabilities in the COVID-19 situation and issues regarding the decisions of the National Human Rights Commission of Korea, the second is to find a reasonable plan and the need for measures to prevent refusal of treatment by medical institutions for the disabled who have difficulty wearing masks.

Developing an Occupants Count Methodology in Buildings Using Virtual Lines of Interest in a Multi-Camera Network (다중 카메라 네트워크 가상의 관심선(Line of Interest)을 활용한 건물 내 재실자 인원 계수 방법론 개발)

  • Chun, Hwikyung;Park, Chanhyuk;Chi, Seokho;Roh, Myungil;Susilawati, Connie
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.5
    • /
    • pp.667-674
    • /
    • 2023
  • In the event of a disaster occurring within a building, the prompt and efficient evacuation and rescue of occupants within the building becomes the foremost priority to minimize casualties. For the purpose of such rescue operations, it is essential to ascertain the distribution of individuals within the building. Nevertheless, there is a primary dependence on accounts provided by pertinent individuals like building proprietors or security staff, alongside fundamental data encompassing floor dimensions and maximum capacity. Consequently, accurate determination of the number of occupants within the building holds paramount significance in reducing uncertainties at the site and facilitating effective rescue activities during the golden hour. This research introduces a methodology employing computer vision algorithms to count the number of occupants within distinct building locations based on images captured by installed multiple CCTV cameras. The counting methodology consists of three stages: (1) establishing virtual Lines of Interest (LOI) for each camera to construct a multi-camera network environment, (2) detecting and tracking people within the monitoring area using deep learning, and (3) aggregating counts across the multi-camera network. The proposed methodology was validated through experiments conducted in a five-story building with the average accurary of 89.9% and the average MAE of 0.178 and RMSE of 0.339, and the advantages of using multiple cameras for occupant counting were explained. This paper showed the potential of the proposed methodology for more effective and timely disaster management through common surveillance systems by providing prompt occupancy information.

Prospects of cross-strait relaions after the 20th National Congress of the Communist Party of China (중국공산당 제20차 전국대표대회 이후 양안관계 전망)

  • Wonkon Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.161-168
    • /
    • 2023
  • Recently, China-Taiwan relations are facing a crisis, and at the same time, the U.S.-China relationship and the structure of Northeast Asia are greatly shaken, so we should pay attention to changes in cross-strait relations. This study aims to predict how cross-strait relations will change after the party convention by analyzing Xi Jinping's Taiwan policy, focusing on the "Political Report" of the 20th party convention and the content analysis of leadership personnel. The results of the study are as follows. First, as the amendment to the party constitution announced after the closing of the party convention stipulates the possibility of armed invasion, Xi Jinping will implement a tough Taiwan policy emphasizing unification. Second, strategic competition with the United States will continue to intensify in the future when analyzing the contents of Chapters 2, 11, 13, and 14 of the "Political Reporting" and the personnel management of diplomatic and security leadership. As a result, cross-strait relations are expected to show instability for a considerable period of time. Third, at a time when Taiwan rejects the unification plan of "one country, two systems" and the tendency to de-Chineseize is strengthening, there is a possibility that legislation or specific enforcement ordinances will be enacted to strengthen the existing "Anti-Secession Law." Fourth, it is expected that strong and warm two-sided strategies will be used together, such as taking a strong response to external forces interfering with the Taiwan issue and Taiwan independence forces, and using incentives for the Kuomintang(KMT) and Taiwanese who are friendly to unification.

Comparison of Adversarial Example Restoration Performance of VQ-VAE Model with or without Image Segmentation (이미지 분할 여부에 따른 VQ-VAE 모델의 적대적 예제 복원 성능 비교)

  • Tae-Wook Kim;Seung-Min Hyun;Ellen J. Hong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.4
    • /
    • pp.194-199
    • /
    • 2022
  • Preprocessing for high-quality data is required for high accuracy and usability in various and complex image data-based industries. However, when a contaminated hostile example that combines noise with existing image or video data is introduced, which can pose a great risk to the company, it is necessary to restore the previous damage to ensure the company's reliability, security, and complete results. As a countermeasure for this, restoration was previously performed using Defense-GAN, but there were disadvantages such as long learning time and low quality of the restoration. In order to improve this, this paper proposes a method using adversarial examples created through FGSM according to image segmentation in addition to using the VQ-VAE model. First, the generated examples are classified as a general classifier. Next, the unsegmented data is put into the pre-trained VQ-VAE model, restored, and then classified with a classifier. Finally, the data divided into quadrants is put into the 4-split-VQ-VAE model, the reconstructed fragments are combined, and then put into the classifier. Finally, after comparing the restored results and accuracy, the performance is analyzed according to the order of combining the two models according to whether or not they are split.