• Title/Summary/Keyword: Port Security

Search Result 312, Processing Time 0.029 seconds

Ship safety system using Digital-HF (Digital-HF를 이용한 선박 안전 시스템)

  • Choi, Sung-Cheol;So, Ji-Eun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.25-28
    • /
    • 2019
  • Along with the development of information and communication technology, maritime communication systems also have been actively studied for navigation and communication equipment aiming at safety, efficiency, accuracy and security. However, for fishing ship over 100km far from the coast, it is difficult to manage such as location and status of ship. Therefore, in this study, for the safety of the long distance ship through Digital-HF communication system, we use method to choose the optimum frequency and it enables to check the position of ship.

  • PDF

Optimal Route Planning for Maritime Autonomous Surface Ships Using a Nonlinear Model Predictive Control

  • Daejeong Kim;Zhang Ming;Jeongbin Yim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.2
    • /
    • pp.66-74
    • /
    • 2023
  • With the increase of interest in developing Maritime Autonomous Surface Ships (MASS), an optimal ship route planning is gradually gaining popularity as one of the important subsystems for autonomy of modern marine vessels. In the present paper, an optimal ship route planning model for MASS is proposed using a nonlinear MPC approach together with a nonlinear MMG model. Results drawn from this study demonstrated that the optimization problem for the ship route was successfully solved with satisfaction of the nonlinear dynamics of the ship and all constraints for the state and manipulated variables using the nonlinear MPC approach. Given that a route generation system capable of accounting for nonlinear dynamics of the ship and equality/inequality constraints is essential for achieving fully autonomous navigation at sea, it is expected that this paper will contribute to the field of autonomous vehicles by demonstrating the performance of the proposed optimal ship route planning model.

Analysis of Berthing Velocity of Ship and Application to Safe Pilotage (선박접안속도 분석과 안전도선에의 활용)

  • Ik-Soon Cho;Eun-Ji Kang
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2022.11a
    • /
    • pp.149-150
    • /
    • 2022
  • External forces acting on the mooring facilities include wave, wind, current, and ship's kinetic energy. In particular, the ship's kinetic energy is changing as the ship become larger, and larger carrying capacity. It was intended to analyze the berthing velocity measurement data at on tanker terminals equipped with a DAS (Docking Aid System) through statistical means and algorithms and use it as basic data for safer and more efficient pier design and pilotage.

  • PDF

Integrated Ship Cybersecurity Management as a Part of Maritime Safety and Security System

  • Melnyk, Oleksiy;Onyshchenko, Svitlana;Pavlova, Nataliia;Kravchenko, Oleksandra;Borovyk, Svitlana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.135-140
    • /
    • 2022
  • Scientific and technological progress is also fundamental to the evolving merchant shipping industry, both in terms of the size and speed of modern ships and in the level of their technical capabilities. While the freight performance of ships is growing, the number of crew on board is steadily decreasing, as more work processes are being automated through the implementation of information technologies, including ship management systems. Although there have been repeated appeals from international maritime organizations to focus on building effective maritime security defenses against cyber attacks, the problems have remained unresolved. Owners of shipping companies do not disclose information about cyberattack attempts or incidents against them due to fear of commercial losses or consequences, such as loss of image, customer and insurance claims, and investigations by independent international organizations and government agencies. Issues of cybersecurity of control systems in the world today have gained importance, due to the fact that existing threats concern not only the security of technical means and devices, but also issues of environmental safety and safety of life at sea. The article examines the implementation of cyber risk management in the shipping industry, providing recommendations for the safe ship operation and its systems in order to improve vulnerability to external threats related to cyberattacks, and to ensure the safety and security of such a technical object as a seagoing ship.

A Study on the Advance Transportation System for Inter Terminal Transshipment: Focused on the Busan New Port (타부두 환적화물에 적합한 운송수단에 관한 연구;부산항 신항을 중심으로)

  • Jo, Mi-Ji;Lee, Seung-Pil;Kim, Hwan-Seong
    • Journal of Navigation and Port Research
    • /
    • v.44 no.4
    • /
    • pp.298-304
    • /
    • 2020
  • The purpose of this study was to identify evaluation factors and analyze the relative importance among factors to select a suitable transportation method for transferring the increasing amount of transshipment at multiple terminals at the Busan new port. To accomplish this, the evaluation factors were selected through a literature survey and brainstorming of a group of experts associated with the port operation, and were classified into five major factors and 15 middle factors. The evaluation factors classified hierarchically were surveyed relative to workers in organizations such as shipping companies, port corporations, container terminals, and related ministries. The importance of each factor was calculated using the hierarchical analysis process (AHP). As a result of the importance analysis, priority was assigned in order of safety, productivity, investment efficiency, operational efficiency, and policy conformity. Through this, it was necessary to select a suitable transportation method for the transshipment cargo in terminals while focusing on the cargo and terminal security and preventing accidents. As a result of calculating from six ITT transportation candidates, the priority was determined in order of monorail, Autocon, and so on as ITT transportation suitable for the Busan new port..

Design and Implementation of User authentication and Roaming Schemes in public WLAN environments (WLAN 서비스에서 사용자 인증과 로밍방식의 설계)

  • Kim, Dong-Ok;Kang, Dong-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.208-210
    • /
    • 2009
  • Currently, Wireless LAN(WLAN) service is widely deployed to provide high speed wireless Internet access through the mobile stations such as notebook and PDA. To provide enhanced security and user access control in the public WLAN area, WLAN access points should have the capability of IEEE 802.1x-based user authentication and authorization functionality. In this paper, we provide a brief understanding of IEEE 802.1x standards and related protocols like EAPOL(Extended Authentication Protocol Over LAN), EAP, RADIUS and describe how the IEEE 802.1x is designed and implemented in our embedded linux-based WLAN AP which is named i-WiNG. (Intelligent Wireless Internet Gateway). For the network security and user authenti -cation purposes, a supplicant who wants to access Internet should be authorized to access the AP port using the EAPOL.

  • PDF

Hybrid Neural Networks for Intrusion Detection System

  • Jirapummin, Chaivat;Kanthamanon, Prasert
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.928-931
    • /
    • 2002
  • Network based intrusion detection system is a computer network security tool. In this paper, we present an intrusion detection system based on Self-Organizing Maps (SOM) and Resilient Propagation Neural Network (RPROP) for visualizing and classifying intrusion and normal patterns. We introduce a cluster matching equation for finding principal associated components in component planes. We apply data from The Third International Knowledge Discovery and Data Mining Tools Competition (KDD cup'99) for training and testing our prototype. From our experimental results with different network data, our scheme archives more than 90 percent detection rate, and less than 5 percent false alarm rate in one SYN flooding and two port scanning attack types.

  • PDF

Detecting Doors Edges in Diverse Environments for Visually Disabled People

  • Habib, Mohamed Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.9-15
    • /
    • 2021
  • It is a challenge for visually impaired people to access unfamiliar environments independently, hence the quality of life is reduced, and safety of life is compromised. An accurate and reliable door detection system comprising of way finding and indoor navigation can be beneficial for a large number of autonomous and mobile applications for visually impaired people. This paper illustrates an image-based door detection scheme for visually impaired people using stable features (edges and corners) including color averaging and image resizing. Simulation results show that the proposed scheme shows a significant improvement when compared with existing scheme.

Microwave Network Study by Bond Graph Approach. Application to Tow-Port Network Filter

  • Jmal, Sabri;Taghouti, Hichem;Mami, Abdelkader
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.121-128
    • /
    • 2022
  • There are much processing techniques of microwave circuits, whose dimensions are small compared to the wavelength, but the disadvantage is that they cannot be directly applied to circuits working at high and/or low frequencies. In this article, we will consider the bond graph approach as a tool for analyzing and understanding the behavior of microwave circuits, and to show how basic circuit and network concepts can be extended to handle many microwaves analysis and design problems of practical interest. This behavior revealed in the scattering matrix filter, and which will be operated from its reduced bond graph model. So, we propose in this paper, a new application of bond graph approach jointly with the scattering bond graph for a high frequency study.

Remote Reading of Surgical Monitor's Physiological Readings: An Image Processing Approach

  • Weerathunga, Haritha;Vidanage, Kaneeka
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.308-314
    • /
    • 2022
  • As a result of the global effect of infectious diseases like COVID-19, remote patient monitoring has become a vital need. Surgical ICU monitors are attached around the clock for patients in critical care. Most ICU monitor systems, on the other hand, lack an output port for transferring data to an auxiliary device for post-processing. Similarly, strapping a slew of wearables to a patient for remote monitoring creates a great deal of discomfort and limits the patient's mobility. Hence, an unique remote monitoring technique for the ICU monitor's physiologically vital readings has been presented, recognizing this need as a research gap. This mechanism has been put to the test in a variety of modes, yielding an overall accuracy of close to 90%.