• Title/Summary/Keyword: Physical Security System

Search Result 455, Processing Time 0.038 seconds

Design of Data Exchange Technique for Power Facilities Monitoring using Augmented Reality (증강현실을 이용한 전력 설비 모니터링 시스템의 데이터 교환 기법 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.16-22
    • /
    • 2020
  • Since it is difficult for individual power producers and non-professionals who lack basic knowledge to control, manage, and operate facilities through EMS (Energy Management System), augmented reality and virtual reality monitoring systems are applied. However, in the existing systems, data access efficiency is inferior due to the process of analyzing column values for analog signal values collected from sensors and converting data after combining the columns. In addition, high-speed operation processing is difficult due to a large number of indexes for accommodating access patterns for various analog signal waveforms. Therefore, in this paper, a bitmap generator is inserted into a non-tree structure to convert the data collected from power facilities into physical property information, and the converted information is encrypted with a common key, so that the resources for the resources shared between each device are We propose a method of exchanging data for an augmented reality-based power system that is controlled by measurement.

Biometric and Identity Reference Protection (개인식별정보와 바이오인식정보의 보호기법)

  • Shin, Yang-Nyuo;Kwan, Man-Jun;Lee, Yong-Jun;Park, Jin-Il;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.2
    • /
    • pp.160-167
    • /
    • 2009
  • This paper describes how to protect the personal information of a biometric reference provider wherein biometric reference and personally identifiable information are bounded in a biometric system. To overcome the shortcomings of the simple personal authentication method using a password, such as identify theft, a biometric system that utilizes physical and behavioral characteristics of each person is usually adopted. In the biometric system, the biometric information itself is personal information, and it can be used as an unique identifier that can identify a particular individual when combining with the other information. As a result, secure protection methods are required for generating, storing, and transmitting biometric information. Considering these issues, this paper proposes a method for ensuring confidentiality and integrity in storing and transferring personally identifiable information that is used in conjunction with biometric information, by extending the related X9.84 standard. This paper also outlines the usefulness of the proposition by defining a standard format represented by ASN.1, and implementing it.

Survey of Seafloor at Chagwi-do of Jeju Island to Select 60-m-class Sea Test Bed of Wave Energy Converter (60m급 파력발전 실해역 시험장 선정을 위한 제주도 차귀도 해역의 해저 지층 탐사)

  • Kim, Hansoo;Kim, Jeongrok;Cho, Il-Hyoung;Paeng, Dong-Guk;Choi, Jong-Su
    • Journal of Ocean Engineering and Technology
    • /
    • v.31 no.4
    • /
    • pp.308-314
    • /
    • 2017
  • The purpose of this study was to investigate the sea floor using a seismic profiler in the northern part of Chagwi-do of Jeju Island in order to select the optimal location for the 60-m-class berth of a sea test bed for wave energy converters and provide basic environmental data for designing a suction anchor. The echo types of the seismic profiles were classified based on the study of Kim et al. (2016a), and the location for installing the suction anchor was selected based on a sediment thickness of more than 10 m. The physical properties of the surface sediments were determined by analyzing the sediment samples obtained from 16 grab sample points. Based on the investigation and analysis, we proposed a survey area in the North-Eastern sea as an optimum location for the 60-m-class berth where the suction anchor could be installed.

Internet of Things (IoT) Based Modeling for Dynamic Security in Nuclear Systems with Data Mining Strategy (데이터 마이닝 전략을 사용하여 원자력 시스템의 동적 보안을 위한 사물 인터넷 (IoT) 기반 모델링)

  • Jang, Kyung Bae;Baek, Chang Hyun;Kim, Jong Min;Baek, Hyung Ho;Woo, Tae Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.1
    • /
    • pp.9-19
    • /
    • 2021
  • The data mining design incorporated with big data based cloud computing system is investigated for the nuclear terrorism prevention where the conventional physical protection system (PPS) is modified. The networking of terror related bodies is modeled by simulation study for nuclear forensic incidents. It is needed for the government to detect the terrorism and any attempts to attack to innocent people without illegal tapping. Although the mathematical algorithm of the study can't give the exact result of the terror incident, the potential possibility could be obtained by the simulations. The result shows the shape oscillation by time. In addition, the integration of the frequency of each value can show the degree of the transitions of the results. The value increases to -2.61741 in 63.125th hour. So, the terror possibility is highest in later time.

A Study on the Introduction Direction of Private Investigation Law (민간조사업법의 도입방향에 관한 연구)

  • Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.255-276
    • /
    • 2008
  • The important items, which should be considered in Private Investigation Law, can include subjects, licenses, the scope of business, qualifying examinations, and supervisory and penal provisions. The subjects of Private Investigation Law should be permitted to be both natural persons and juridical persons in terms of providing various services, but should be permitted to be juridical persons and should be administered on a license system, even in order to ensure public interests. Concretely, the introduction scope of Private Investigation Law can be regulated to include the followings: that is, investigating the whereabouts identification of runaways and missing children, investigating the personal identification, habit, way of action, motivation, whereabouts identification, real child confirmation, association, transaction, reputation, and personality of specific persons or specific groups, investigating the whereabouts identification of missing persons, owners of government-vested properties or renounced properties, investigating the whereabouts of lost properties or stolen properties, investigating the causes of fire, character defamation, slander, damage, accident, physical disability, infringement on real estate or movable property, and investigating all sorts of accidents including traffic accidents, insurance accidents, and medical malpractices. In the qualifying examination, examinees' age should be restricted to be over age 25. The person, who is exempted from its primary examination, should be restricted to be the person, who has the career of over 20 years in related fields, in consideration of its equity with other certificates of qualification. In the supervisory institution, as the policy institution is the supervisory institution in many countries including France (the police) and Japan (public security committee), so the National Policy Agency should be the supervisory institution in consideration of management aspects. In the penal regulations, especially, we should clarify the management of personal information (personal information protection, personal information management), and so should prevent the infringement of people's basic rights, and then should ensure the public interest.

  • PDF

Nuclear Terrorism and Global Initiative to Combat Nuclear Terrorism(GICNT): Threats, Responses and Implications for Korea (핵테러리즘과 세계핵테러방지구상(GICNT): 위협, 대응 및 한국에 대한 함의)

  • Yoon, Tae-Young
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.29-58
    • /
    • 2011
  • Since 11 September 2001, warnings of risk in the nexus of terrorism and nuclear weapons and materials which poses one of the gravest threats to the international community have continued. The purpose of this study is to analyze the aim, principles, characteristics, activities, impediments to progress and developmental recommendation of the Global Initiative to Combat Nuclear Terrorism(GICNT). In addition, it suggests implications of the GICNT for the ROK policy. International community will need a comprehensive strategy with four key elements to accomplish the GICNT: (1) securing and reducing nuclear stockpiles around the world, (2) countering terrorist nuclear plots, (3) preventing and deterring state transfers of nuclear weapons or materials to terrorists, (4) interdicting nuclear smuggling. Moreover, other steps should be taken to build the needed sense of urgency, including: (1) analysis and assessment through joint threat briefing for real nuclear threat possibility, (2) nuclear terrorism exercises, (3) fast-paced nuclear security reviews, (4) realistic testing of nuclear security performance to defeat insider or outsider threats, (5) preparing shared database of threats and incidents. As for the ROK, main concerns are transfer of North Korea's nuclear weapons, materials and technology to international terror groups and attacks on nuclear facilities and uses of nuclear devices. As the 5th nuclear country, the ROK has strengthened systems of physical protection and nuclear counterterrorism based on the international conventions. In order to comprehensive and effective prevention of nuclear terrorism, the ROK has to strengthen nuclear detection instruments and mobile radiation monitoring system in airports, ports, road networks, and national critical infrastructures. Furthermore, it has to draw up effective crisis management manual and prepare nuclear counterterrorism exercises and operational postures. The fundamental key to the prevention, detection and response to nuclear terrorism which leads to catastrophic impacts is to establish not only domestic law, institution and systems, but also strengthen international cooperation.

  • PDF

Evaluation of Access Control Function of the Standard Records Management System (표준기록관리시스템 기능 평가 접근관리 기능을 중심으로)

  • Park, Min-Yung
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.3-35
    • /
    • 2013
  • The physical access or control of records with material entities is relatively easy. However, in the case of electronic records, due to its heightened applicative aspect that allows anyone with the authority to have access over the data, it requires an appropriate standard and stability to ensure the authenticity and integrity of electronic records. This study performed functional evaluation by extracting the minimum critical items from the national functional requirements documents and standards to explore the access control function that play an important role for the standard records management system to maintain quality requirements of electronic records. Based on this checklist, it evaluates whether the standard records management system properly carries out the access control function and investigates the current condition of application to practical records management work. Records managers generally do not use access control function, which may be because they do not feel the necessity, since the application of records management system is not yet actively promoted. In order for the standard records management system to be developed to become a more active system, it requires system improvement as well as considerations for below factors: First, although the necessity of establishing access control conditions is already recognized, it requires a clear stipulation of the regulation. Second, measures must be taken to implement access control in the records management system through document security solution. Third, it requires self-reflection of records manager, who utilizes the records management system. Instead of placing all responsibility on the National Archives, which established the system, professionals must further develop the system through continuous evaluation and improvement. Finally, a general discussion is required to publicize the issue of functional improvement of records management system. Although there is a bulletin board already created for this purpose, its users are extremely limited and it only deals with current problems. A space in online as well as in offline is required to solve the fundamental problems and exchange opinions.

Evaluation of Water Productivity of Thailand and Improvement Measure Proposals

  • Suthidhummajit, Chokchai;Koontanakulvong, Sucharit
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.176-176
    • /
    • 2019
  • Thailand had issued a national strategic development master plan with issues related to water resources and water security in the entire water management. Water resources are an important factor of living and development of the country's socio-economy to be stable, prosperous and sustainable. Therefore, water management in both multidimensional and multi-sectoral systems is important and will supports socio-economic and environmental development. The direction of national development in accordance with the national strategic framework for 20 years that requires the country to level up security level in terms of water, energy and food. To response to the proposed goals, there is a subplan to increase water productivity of the entire water system for economical development use by evaluating use value and to create more value added from water use to meet international standard level. This study aims to evaluate the water productivity of Thailand in each basin and all sectors such as agricultural sector, service and industrial sectors by using the water use data from water account analysis and GDP data from NESDB during the past 10 years (1996-2015). The comparison of water productivity with other countries will also be conducted and in addition, the measures to improve water productivity in next 20 years will be explored to response to the National Strategic Master Plan goals. Water productivity is defined as output per unit of water depleted. The simplest way to compare water productivity across different enterprises is in monetary terms. World Bank presents water productivity as an indication of the efficiency by which each country uses its water resources. There are two data sets used for water productivity analyses, i.e., the first is water use data at end users and the second is Gross Domestic Product. The water use at end users are estimated by water account method based on the System of Environmental-Economic Accounting for Water (SEEA-Water) concept of United Nations. The water account shows the analyses of the water balance between the use and supply of each water resource in physical terms. The water supply and use linkage in the water account analyses separated into each phases, i.e., water sources, water managers, water service providers, water user at end user under water regulators of all kinds of water use activities such as household, industrial, agricultural, tourism, hydropower, and ecological conservation uses. The Gross Domestic Product (GDP), a well- known measuring method of the national economic growth is not actually a comprehensive approach to describe all aspects of national economic status, since GDP does not take into account the costs of the negative impacts to natural resources that result from the overexploitation of development projects, however, at present, integrating the environment with the economy of a country to measure its economic growth with GDP is acceptable worldwide. The study results will show the water use at each basin, use types at end users, water productivity in each sector from 1996-2015 compared with other countries, Besides the productivity improvement measures will be explored and proposed for the National Strategic Master Plan.

  • PDF

Innovative Technology of Teaching Moodle in Higher Pedagogical Education: from Theory to Pactice

  • Iryna, Rodionova;Serhii, Petrenko;Nataliia, Hoha;Kushevska, Natalia;Tetiana, Siroshtan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.153-162
    • /
    • 2022
  • Relevance. Innovative activities in education should be aimed at ensuring the comprehensive development of the individual and professional development of students. The main idea of modular technology is that the student should learn by himself, and the teacher manages his learning activities. The advantage of modular technology is the ability of the teacher to design the study of the material in the most interesting and accessible forms for this part of the study group and at the same time achieve the best learning results. Innovative Moodle technology. it is gaining popularity every day, significantly expanding the space of teaching and learning, allowing students to study inter-faculty university programs in depth. The purpose of this study is to assess the quality of implementation of the e-learning system Moodle. The study was conducted at the South Ukrainian National Pedagogical University named after K. D. Ushinsky in order to identify barriers to the effective implementation of innovative distance learning technologies Moodle and introduce a new model that will have a positive impact on the development of e-learning. Methodology. The paper used a combination of theoretical and empirical research methods. These include: scientific analysis of sources on this issue, which allowed us to formulate the initial provisions of the study; analysis of the results of students 'educational activities; pedagogical experiment; questionnaires; monitoring of students' activities in practical classes. Results. This article evaluates the implementation of the principles of distance learning in the process of teaching and learning at the University in terms of quality. The experiment involved 1,250 students studying at the South Ukrainian National Pedagogical University named after K. D. Ushinsky. The survey helped to identify the main barriers to the effective implementation of modern distance learning technologies in the educational process of the University: the lack of readiness of teachers and parents, the lack of necessary skills in applying computer systems of online learning, the inability to interact with the teaching staff and teachers, the lack of a sufficient number of academic consultants online. In addition, internal problems are investigated: limited resources, unevenly distributed marketing advantages, inappropriate administrative structure, and lack of innovative physical capabilities. The article allows us to solve these problems by gradually implementing a distance learning model that is suitable for any university, regardless of its specialization. The Moodle-based e-learning system proposed in this paper was designed to eliminate the identified barriers. Models for implementing distance learning in the learning process were built according to the CAPDM methodology, which helps universities and other educational service providers develop and manage world-class online distance learning programs. Prospects for further research focus on evaluating students' knowledge and abilities over the next six months after the introduction of the proposed Moodle-based program.

A Study on the Use Activation of the Cloud Office with Focus on DeLone and McLean IS Success Model (클라우드 오피스 이용 활성화 : DeLone and McLean 정보시스템 성공모형의 적용)

  • Yoon, Seong-Jeong;Kim, Min-Yong
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.289-314
    • /
    • 2015
  • Recently, Most of the companies and government offices are under consideration about the adoption of cloud office service to actualize the smart work policies. Comparing with traditional office software, a cloud office service have the advantage of the method of payment and coming over the physical limitations. Many cloud office service users tend to adopt an official evaluated the service without doubt. However after deciding to adopt cloud office service, many users are faced with a variety of problems and difficulties practically. In this study, researchers carried out interview about those problems and difficulties after adopting a cloud office service. Consequently, there are several problems and difficulties such as compatibility, document security, document lost and maladjusted to the new graphic user interface between traditional office software and a cloud office service. A cloud office service have still several advantages not only a competitive price but also ubiquitous attributes. Thus, researchers need to study about what kinds of reason variables can solve those problems and difficulties. In existing research, DeLone & McLean have suggested information system success model. They use three independent variables which are system quality, information quality, service quality. Parameters are user satisfaction, intention to use and use. Lastly, dependent variables are net benefits. However in this study, we need to change the scope of measurement. In other words, we have to replace parameters with dependent variables. Simply, user satisfaction, intention to use and use is going to be dependent variables. There are several reasons why we need changing variables. First, we aim at giving a some suggestions to a cloud service providers which independent variables do not work to satisfy for the users. Second, we need to find out how to maximize cloud office service user's satisfaction and intention to use. Third, we should firstly know that relationship between independent variables and dependent variables. Finally, those research results give for the cloud office service provider to solve the cloud office service adopting problems and difficulties.