• Title/Summary/Keyword: Intruder

Search Result 157, Processing Time 0.024 seconds

A Study on Establishment of Buffer Zone of Radioactive Waste Repository (방사성패기물 처분시설에서의 완충공간 설정에 대한 고찰)

  • Yoon, Jeong-Hyoun;Park, Joo-Wan;Ju, Min-Su;Kim, Chang-Lak;Park, Jin-Baek
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.6 no.1
    • /
    • pp.45-54
    • /
    • 2008
  • A new proposed repository has a final capacity of 800,000 drums radioactive waste. Most of foreign repositories have a general practice of segregating control zones which mainly contributes to classification of degree of control, whether it is called buffer zone or not. Domestic regulatory requirements of establishment of buffer zone in a repository are not much different from those of nuclear power plants for operation period, in which satisfactory design objective or performance objective is the most important factor in determination of the buffer zone. The meaning of buffer zone after closure is a minimum requested area which can prevent inadvertant intruders from leading to non-allowable exposure during institutional control period. Safety assessment with drinking well scenario giving rise to the highest probability of exposure among the intruder's actions can verify fulfillment of the buffer zone which is determined by operational safety of the repository. At present. for the repository to be constructed in a few years, the same procedure and concept as described in this paper are applied that can satisfy regulatory requirements and radiological safety as well. However, the capacity of the repository will be stepwise extended upto 800,000 drums, consequently its layout will be varied too. Timely considerations will be necessary for current boundary of the buffer zone which has been established on the basis of 100,000 drums disposal.

  • PDF

Measurements of Fast Transient Voltages due to Human Electrostatic Discharges (인체에 대전된 정전기 방전에 의해 발생한 급속과도전압의 측정)

  • 이복희;이동문;강성만;엄주홍;이태룡;이승칠
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.16 no.4
    • /
    • pp.108-116
    • /
    • 2002
  • This paper presents the measurements and evaluation of voltage waveforms due to human electrostatic discharge(ESD). The principle of operation and design rule of a new device for measuring the ESD fast transient voltages with very fast rise time were described. Peak values and rise time of ESD voltages derived from a charged human body under a variety of experimental conditions were examined. The frequency bandwidth of the proposed voltage measuring system ranges from DC to 400[㎒]. The ESD voltage waveform is nearly equal to the ESD current waveform and the peak amplitude of ESD current waveform is roughly proportional to the ESD voltage in each experimental conditions. A rapid approach results in a discharge voltage with a faster initial rise time than for a slow approach. The voltages caused by direct finger ESDs have an initial slope with a relatively long, 10∼30[ns] rise time, but the amplitude is small. On the other hand, the voltages caused by direct hand/metal ESDs have a steep initial s1ope with 1 ∼3[ns] rise time, but an initial spike is very big. As a consequence, it was found that the ESD voltage and current waveforms strongly depend on the approach speed and material of intruder. These measurement results would be useful to design the ESD protective devices.

The Model of Network Packet Analysis based on Big Data (빅 데이터 기반의 네트워크 패킷 분석 모델)

  • Choi, Bomin;Kong, Jong-Hwan;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.5
    • /
    • pp.392-399
    • /
    • 2013
  • Due to the development of IT technology and the information age, a dependency of the network over the most of our lives have grown to a greater extent. Although it provides us to get various useful information and service, it also has negative effectiveness that can provide network intruder with vulnerable roots. In other words, we need to urgently cope with theses serious security problem causing service disableness or system connected to network obstacle with exploiting various packet information. Many experts in a field of security are making an effort to develop the various security solutions to respond against these threats, but existing solutions have a lot of problems such as lack of storage capacity and performance degradation along with the massive increase of packet data volume. Therefore we propose the packet analysis model to apply issuing Big Data technology in the field of security. That is, we used NoSQL which is technology of massive data storage to collect the packet data growing massive and implemented the packet analysis model based on K-means clustering using MapReudce which is distributed programming framework, and then we have shown its high performance by experimenting.

Supplementation of the Indoor Location Tracking Techniques Based-on Load-Cells Mechanism (로드셀 기반의 실내 위치추적 보완 기법)

  • YI, Nam-Su;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.1-8
    • /
    • 2016
  • Current indoor intrusion detection and location tracking methods have the weakness in seamless operations in tracking the objective because the object must possess a communicating device and the limitation of the single cell size (approximate $100cm{\times}100cm$) exits. Also, the utilization of CCTV technologies show the shortcomings in tracking when the object disappear the area where the CCTV is not installed or illumination is not enough for capturing the scene (e.g. where the context-awarded system is not installed or low illumination presents). Therefore, in this paper we present an improved in-door tracking system based on sensor networks. Such system is built on a simulated scenario and enables us to detect and extend the area of surveillance as well as actively responding the emergency situation. Through simulated studies, we have demonstrated that the proposed system is capable of supplementing the shortcomings of signal cutting, and of estimating the location of the moving object. We expect the study will improve the better analysis of the intruder behavior, the more effective prevention and flexible response to various emergency situations.

Burglary Prevention Effect of Target Hardening through Certified Security Products by WDQ Analysis (WDQ분석을 통한 타겟하드닝 CPTED의 침입범죄 예방효과 검증: 안산시 사례 중심으로)

  • Park, Hyeonho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.9-30
    • /
    • 2018
  • Crime prevention strategies are introduced to reduce the loss caused by crimes, and Target hardening against domestic burglary attacks is broadly accepted as one of such physical security strategies. In terms of business and home security, target hardening is one of the suite of protective measures that are included in crime prevention through environmental design(CPTED). This can include ensuring all doors and windows are sourced and fitted in such a way that they can resist forcible and surreptitious from the attack of intruder. Target hardening with certified security doors, security windows and secure locks are revealed to be much more effective to deter burglary attacks than other security devices, such as CCTV, lightings and alarms which have largely psychological and indirect impact. A pilot program of target hardening utilizing certified security window and locks was carried out in Ansan city, South Korea in 2016. This study is based on the quasi-experimental design of this program for a residential area. The researchers tried to verify the crime displacement effect of the target hardening program and the diffusion effects of crime prevention benefits by analysing the crime statistics. The evaluation utilized WDQ(Weighted Displacement Quotient) technique to analyze whether the crime displacement occurred, compared the crime statistics of the experimental area with that of buffer zone and controlled areas. The result showed that the target hardening program was significantly effective in crime prevention. The number of burglary in the experimental site with target hardening intervention reduced by 100%, although the areas without the intervention showed reduction in the burglary. The crime displacement was not found at all, and the number of burlary at the buffer zone also reduced significantly.

Research on Pilot Decision Model for the Fast-Time Simulation of UAS Operation (무인항공기 운항의 배속 시뮬레이션을 위한 조종사 의사결정 모델 연구)

  • Park, Seung-Hyun;Lee, Hyeonwoong;Lee, Hak-Tae
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.1
    • /
    • pp.1-7
    • /
    • 2021
  • Detect and avoid (DAA) system, which is essential for the operation of UAS, detects intruding aircraft and offers the ranges of turn and climb/descent maneuver that are required to avoid the intruder. This paper uses detect and avoid alerting logic for unmanned systems (DAIDALUS) developed at NASA as a DAA algorithm. Since DAIDALUS offers ranges of avoidance maneuvers, the actual avoidance maneuver must be decided by the UAS pilot as well as the timing and method of returning to the original route. It can be readily used in real-time human-in-the-loop (HiTL) simulations where a human pilot is making the decision, but a pilot decision model is required in fast-time simulations that proceed without human pilot intervention. This paper proposes a pilot decision model that maneuvers the aircraft based on the DAIDALUS avoidance maneuver range. A series of tests were conducted using test vectors from radio technical commission for aeronautics (RTCA) minimum operational performance standards (MOPS). The alert levels differed by the types of encounters, but loss of well clear (LoWC) was avoided. This model will be useful in fast-time simulation of high-volume traffic involving UAS.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF