• Title/Summary/Keyword: Port Security

Search Result 312, Processing Time 0.023 seconds

An Integrated Approach for Korea's e-Navigation Development Project to Playing the Global Lead in Maritime Safety Logistics of IMO's Next Generation (한국의 이네비게이션개발사업이 IMO차세대 해사안전보안물류상 세계 주역을 맡기 위한 통합적 접근)

  • Gim, Jin-Goo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.58-58
    • /
    • 2016
  • This study aims to enhance Korea's competitiveness by taking the lead in the international standardization and relevant global market. This is to be achieved by performing the role of First Mover through the resolute investment from Fast Follower that is servile to the decision of the organization in the e-Navigation strategy that has been promoted by the IMO. The study methodology is an integrated approach. It is established by modelling LSCM G2B2C2 Platform in maritime safety/security logistics and applied to the enhancement of maritime safety/security in global LSCM. This paper externally contributes to the reduction of world maritime accidents and exalt the national prestige; internally, the enhancement of the national competitiveness through the improvement of shipping port logistics and others. These eventually contribute to Korea's economic development that is combined by both theory and practice and of practical use of the integrated approach.

  • PDF

Composing Recommended Route through Machine Learning of Navigational Data (항적 데이터 학습을 통한 추천 항로 구성에 관한 연구)

  • Kim, Joo-Sung;Jeong, Jung Sik;Lee, Seong-Yong;Lee, Eun-seok
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.285-286
    • /
    • 2016
  • We aim to propose the prediction modeling method of ship's position with extracting ship's trajectory model through pattern recognition based on the data that are being collected in VTS centers at real time. Support Vector Machine algorithm was used for data modeling. The optimal parameters are calculated with k-fold cross validation and grid search. We expect that the proposed modeling method could support VTS operators' decision making in case of complex encountering traffic situations.

  • PDF

An Analysis on Structure of Risk Factor for Maritime Terror using FSM and AHP (해상테러 위험요소의 구조와 우선순위 분석)

  • Jang Woon-Jae;Yang Won-Jae;Keum Jong-Soo
    • Journal of Navigation and Port Research
    • /
    • v.29 no.6 s.102
    • /
    • pp.487-493
    • /
    • 2005
  • Since the destruction of World Trade Center the attention of the United States and the wider international community has focussed upon the need to strengthen security and prevent terrorism This paper suggests an analysis prior to risk factor and structure for anti-terrorism in the korean maritime society. For this, in this paper, maritime terror risk factor was extracted by type and case of terror using brainstorming method. Also, risk factor is structured by FSM method and analyzed for ranking of each risk factor by AHP. At the result, the evaluation of risk factor is especially over maximum factor for related external impact.

Analysis of Radar Performance Requirements for VTS System Based on IALA Guidelines (IALA 가이드라인에 기반한 VTS 시스템을 위한 레이더 성능 요구사항 분석)

  • Kim, Byung-Doo;Lee, Byung-Gil
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.10a
    • /
    • pp.27-29
    • /
    • 2015
  • Based on IALA guidelines, the fundamental requirements of radar system for vessel traffic services are analyzed in this paper. target separation, target position accuracy, target track accuracy of X-band radar and recommended test conditions are analyzed. Also, in order to check if it satisfies the requirement of target position accuracy from IALA guideline, the test is carried out through processing of radar raw image acquired at VTS center.

  • PDF

Optimal route generation method for ships using reinforcement learning (강화학습을 이용한 선박의 최적항로 생성기법)

  • Min-Kyu Kim;Jong-Hwa Kim;Ik-Soon Choi;Hyeong-Tak Lee;Hyun Yang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.06a
    • /
    • pp.167-168
    • /
    • 2022
  • 선박을 운항함에 있어 최적항로를 결정하는 것은 항해시간과 연료 소모를 줄이는 중요한 요인 중의 하나이다. 기존에는 항로를 결정하기 위해 항해사의 전문적인 지식이 요구되지만 이러한 방법은 최적의 항로라고 판단하기 어렵다. 따라서 연료비 절감과 선박의 안전을 고려한 최적의 항로를 생성할 필요가 있다. 연료 소모량 혹은 항해시간을 최소화하기 위해서 에이스타 알고리즘, Dijkstra 알고리즘을 적용한 연구가 있다. 하지만 이러한 연구들은 최단거리만 구할 뿐 선박의 안전, 해상상태 등을 고려하지 못한다. 이를 보완하기 위해 본 연구에서는 강화학습 알고리즘을 적용하고자한다. 강화학습 알고리즘은 앞으로 누적 될 보상을 최대화 하는 행동으로 정책을 찾는 방법으로, 본 연구에서는 강화학습 알고리즘의 하나인 Q-learning을 사용하여 선박의 안전을 고려한 최적의 항로를 생성하는 기법을 제안 하고자 한다.

  • PDF

Device Alive Check Algorithm using TCP Session under CCTV Network based on NAT (TCP 세션을 활용한 사설망 구간 CCTV 단말의 생사판별 알고리즘)

  • Shin, HaeJoon;Chung, YounKy
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.5
    • /
    • pp.631-640
    • /
    • 2015
  • Recently CCTV system is installed widely purpose to enhanced physical security, gathering criminal evidence and management of facilities. In spite of supporting strong management function, CCTV system has weak security function. Therefore high security management function is required. Generally it's not easy to control the devices under NAT using a NMS(Network Management System). So we design and implement alive check algorithm of CCTV devices under NAT using DVRNS address resolution and TCP session check. We evaluated and analyzed of developed system on real environment which includes about 100 DVRs under NAT. As a result of test, it showed that device alive check and DVRNS address resolution were well performed without any error.

Analysis On Security and Dependability for IED System in SAS (변전소 IED의 보안과 신뢰성에 관한 고찰)

  • Guan, Qiang;Han, Seung-Soo;Lee, Seung-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2006.11a
    • /
    • pp.21-23
    • /
    • 2006
  • As a general rule for evaluating dependability of a system, reliability is commonly considered which barely rays attention to the system behavior, however the estimation is based on the assumption of a fault-frost system, which may be impracticable and inaccurate especially for complicated system. This paper introduces a security and dependability integrated approach to analyze the availability of a fault-active system both from dependability and security points of view. Two fault modes involved are discussed about the impairment to the system reliance. The approach can be well applied to estimate and quantify the attribute of system robustness with the help of Markov chain process, which is good at solving status related problem. The comparison result between dual system and IEC61850-based almighty backup system is shown to sup-port the suggested approach.

  • PDF

A Study on the Demand of Civil Maritime Guarder in Ports (항만 해양경비지도사 수요 예측에 관한 연구)

  • Jin, Sung-Yong;Park, Sung-Yong;Ju, Jong-Kwang;Lee, Eun-Bang
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2008.05a
    • /
    • pp.19-24
    • /
    • 2008
  • The civil maritime guarder's roles, functions and domains are set and analyzed in order to provide the tailored security services at sea. In addition, the domain and the demand prediction of civil guarder in ports is estimated to evaluate the validity of civil maritime security system.

  • PDF

Implementation and Design of Port Scan Detecting System Detecting Abnormal Connection Attempts (비정상 연결시도를 탐지한 포트 스캔 탐지 시스템의 설계 및 구현)

  • Ra, Yong-Hwan;Cheon, Eun-Hong
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.63-75
    • /
    • 2007
  • Most of computer systems to be connected to network have been exposed to some network attacks and became to targets of system attack. System managers have established the IDS to prevent the system attacks over network. The previous IDS have decided intrusions detecting the requested connection packets more than critical values in order to detect attacks. This techniques have False Positive possibilities and have difficulties to detect the slow scan increasing the time between sending scan probes and the coordinated scan originating from multiple hosts. We propose the port scan detection rules detecting the RST/ACK flag packets to request some abnormal connections and design the data structures capturing some of packets. This proposed system is decreased a False Positive possibility and can detect the slow scan, because a few data can be maintained for long times. This system can also detect the coordinated scan effectively detecting the RST/ACK flag packets to be occurred the target system.

  • PDF

A Study on the Decision-Making Model of Manpower Utilization of Container Terminals (컨테이너터미널 인력운영 변화모형에 관한 연구)

  • Sim Min-Seop;Kim Joo-Hye
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.4
    • /
    • pp.67-82
    • /
    • 2023
  • This study clarified a complicated cause-and-effect relationship about the manpower utilization of container terminals. This paper conducted confirmatory factor analysis and structural equation modeling using 5 factors: technology development, safety and security change, external environment, terminal operation, and organizational culture that have been derived in the first study(2021). The results imply that technology development and external environment have a direct effect while terminal operation and safety and security change have indirect effect on a manpower utilization of container terminals. Based on these results, this paper may provide various policy implications for port operators, developers, and managers.