• Title/Summary/Keyword: Port-security

Search Result 306, Processing Time 0.024 seconds

Multi-Objective Onboard Measurement from the Viewpoint of Safety and Efficiency (안전성 및 효율성 관점에서의 다목적 실선 실험)

  • Sang-Won Lee;Kenji Sasa;Ik-Soon Cho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.116-118
    • /
    • 2023
  • In recent years, the need for economical and sustainable ship routing has emerged due to the enforced regulations on environmental issues. Despite the development of weather forecasting technology, maritime accidents by rough waves have continued to occur due to incorrect weather forecasts. In this study, onboard measurements are conducted to observe the acutal situation on merchant ships in operation encountering rough waves. The types of measured data include information related to navigation (Ship's position, speed, bearing, rudder angle) and engine (engine revolutions, power, shaft thrust, fuel consumption), weather conditions (wind, waves), and ship motions (roll, pitch, and yaw). These ship experiments was conducted to 28,000 DWT bulk carrier, 63,000 DWT bulk carrier, 20,000 TEU container ship, and 12,000 TEU container ship. The actual ship experiment of each ship is intended to acquire various types of data and utilize them for multi-objective studies related to ship operation. Additionally, in order to confirm the sea conditions, the directional wave spectrum was reproduced using a wave simulation model. Through data collection from ship experiments and wave simulations, various studies could be proceeding such as the measurement for accurate wave information by marine radar and analysis for cargo collapse accidents. In addition, it is expected to be utilized in various themes from the perspective of safety and efficiency in ship operation.

  • PDF

Identifying Analog Gauge Needle Objects Based on Image Processing for a Remote Survey of Maritime Autonomous Surface Ships (자율운항선박의 원격검사를 위한 영상처리 기반의 아날로그 게이지 지시바늘 객체의 식별)

  • Hyun-Woo Lee;Jeong-Bin Yim
    • Journal of Navigation and Port Research
    • /
    • v.47 no.6
    • /
    • pp.410-418
    • /
    • 2023
  • Recently, advancements and commercialization in the field of maritime autonomous surface ships (MASS) has rapidly progressed. Concurrently, studies are also underway to develop methods for automatically surveying the condition of various on-board equipment remotely to ensure the navigational safety of MASS. One key issue that has gained prominence is the method to obtain values from analog gauges installed in various equipment through image processing. This approach has the advantage of enabling the non-contact detection of gauge values without modifying or changing already installed or planned equipment, eliminating the need for type approval changes from shipping classifications. The objective of this study was to identify a dynamically changing indicator needle within noisy images of analog gauges. The needle object must be identified because its position significantly affects the accurate reading of gauge values. An analog pressure gauge attached to an emergency fire pump model was used for image capture to identify the needle object. The acquired images were pre-processed through Gaussian filtering, thresholding, and morphological operations. The needle object was then identified through Hough Transform. The experimental results confirmed that the center and object of the indicator needle could be identified in images of noisy analog gauges. The findings suggest that the image processing method applied in this study can be utilized for shape identification in analog gauges installed on ships. This study is expected to be applicable as an image processing method for the automatic remote survey of MASS.

Implementation of a Network Simulator for Cyber Attacks and Detections based on SSFNet (SSFNet 기반 사이버 공격 및 탐지를 위한 네트워크 시뮬레이터의 구현)

  • Shim, Jae-Hong;Jung, Hong-Ki;Lee, Cheol-Won;Choi, Kyung-Hee;Park, Seung-Kyu;Jung, Gi-Hyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.4
    • /
    • pp.457-467
    • /
    • 2002
  • In order to simulate cyber attacks and predict network behavior by attacks, we should represent attributes of network components in the simulation model, and should express characteristics of systems that carry out various cyber attacks and defend from these attacks. To simulate how network load may change under the cyber attacks, we extended SSF[9, 10] that is process-based event-oriented simulation system. We added a firewall class and a packet manipulator into the SSFNet that is a component of SSF. The firewall class, which is related to the security, is to simulate cyber attacks, and the packet manipulator is a set of functions to write attack programs for the simulation. The extended SSFNet enables to simulate a network with the security systems and provides advantages that make easy to port already exsiting attack programs and apply them to the simulation evironment. We made a vitual network model to verify operations of the added classes, and simulated a smurf attack that is a representative denial of sevive attack, and observed the network behavior under the smurf attack. The results showed that the firewall class and packet manipulator developed in this paper worked normaly.

Implications of China's Maritime Power and BRI : Future China- ROK Strategic Cooperative Partnership Relations (중국의 해양강국 및 일대일로 구상과 미래 한·중 협력 전망)

  • Yoon, Sukjoon
    • Strategy21
    • /
    • s.37
    • /
    • pp.104-143
    • /
    • 2015
  • China's new grand strategy, the "One Belt, One Road Initiative" (also Belt Road Initiative, or BRI) has two primary components: Chinese President Xi Jinping announced the "Silk Road Economic Belt" in September 2013 during a visit to Kazakhstan, and the "21st Century Maritime Silk Route Economic Belt" in a speech to the Indonesian parliament the following month. The BRI is intended to supply China with energy and new markets, and also to integrate the countries of Central Asia, the Association of Southeast Asia Nations (ASEAN), and the Indian Ocean Region - though not Northeast Asia - into the "Chinese Dream". The project will be supported by the Asian Infrastructure Investment Bank (AIIB), due to open in 2016 with 57 founding members from all around the world, and China has already promised US$ 50 billion in seed funding. China's vision includes networks of energy pipelines, railways, sea port facilities and logistics hubs; these will have obvious commercial benefits, but also huge geopolitical significance. China seems to have two distinct aims: externally, to restore its historical sphere of influence; and internally, to cope with income inequalities by creating middle-class jobs through enhanced trade and the broader development of its economy. In South Korea, opinion on the BRI is sharply polarized. Economic and industrial interests, including Korea Railroad Corporation (KORAIL), support South Korean involvement in the BRI and closer economic interactions with China. They see how the BRI fits nicely with President Park Geun-hye's Eurasia Initiative, and anticipate significant commercial benefits for South Korea from better connections to energy-rich Russia and the consumer markets of Europe and Central Asia. They welcome the prospect of reduced trade barriers between China and South Korea, and of improved transport infrastructure, and perceive the political risks as manageable. But some ardently pro-US pundits worry that the political risks of the BRI are too high. They cast doubt on the feasibility of implementing the BRI, and warn that although it has been portrayed primarily in economic terms, it actually reveals a crucial Chinese geopolitical strategy. They are fearful of China's growing regional dominance, and worried that the BRI is ultimately a means to supplant the prevailing US-led regional security structure and restore the Middle Kingdom order, with China as the only power that matters in the region. According to this view, once China has complete control of the regional logistics hubs and sea ports, this will severely limit the autonomy of China's neighbors, including South Korea, who will have to toe the Chinese line, both economically and politically, or risk their own peace and prosperity.

Assessment of Wave Change considering the Impact of Climate Change (기후변화 영향을 고려한 파랑 변화 평가)

  • Chang Kyum Kim;Ho Jin Lee;Sung Duk Kim;Byung Cheol Oh;Ji Eun Choi
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.4
    • /
    • pp.19-31
    • /
    • 2023
  • According to the climate change scenarios, the intensity of typhoons, a major factor in Korea's natural disaster, is expected to increase. The increase in typhoon intensity leads to a rise in wave heights, which is likely to cause large-scale disasters in coastal regions with high populations and building density for dwelling, industry, and tourism. This study, therefore, analyzed observation data of the Donghae ocean data buoy and conducted a numerical model simulation for wave estimations for the typhoon MAYSAK (202009) period, which showed the maximum significant wave height. The boundary conditions for wave simulations were a JMA-MSM wind field and a wind field applying the typhoon central pressure reduction rate in the SSP5-8.5 climate change scenario. As a result of the wave simulations, the wave height in front of the breakwater at Sokcho port was increased by 15.27% from 4.06 m to 4.68 m in the SSP5-8.5 scenario. Furthermore, the return period at the location of 147-2 grid point of deep-sea design wave was calculated to increase at least twice, it is necessary to improve the deep-sea design wave of return period of 50-year, which is prescriptively applied when designing coastal structures.

Implementation of LabVIEW based Testbed for MHA FTSR (LabVIEW 기반의 MHA 명령방식 비행종단수신기 점검장비 구현)

  • Kim, Myung-Hwan;Hwang, Soo-Sul;Lim, You-Cheol;Ma, Keun-Su
    • Aerospace Engineering and Technology
    • /
    • v.13 no.1
    • /
    • pp.55-62
    • /
    • 2014
  • FTSR(Flight Termination System Receiver) is a device that receives a ground command signal to abort a flight mission when abnormal conditions occur in the space launch vehicle. The secure tone command message shall consist of a series of 11 character tone pattern. Each character consists of the sum of two tones which taken from a set of 7 tones defined by IRIG(Inter-Range Instrumentation Group) in the audio frequency range. The MHA(Modified High alphabet) command adds a security feature to the secure tone command by using the predefined difference code. In order to check the function and performance of MHA FTSR, which is under development, for KSLV-II, the testbed should have functions of RF signal generation, receiver's output port monitoring, RS-422 communication and test data management. In this paper, we first briefly introduce MHA command and FTSR interface, and then show the LavVIEW based testbed include its H/W configuration, S/W implementation and test results.

Main Revisions and Some Recommendations of the Incoterms(R) 2010 (인코텀즈 2010의 주요 개정내용과 적용상의 유의점)

  • Choi, Myung-Kook
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.49
    • /
    • pp.3-41
    • /
    • 2011
  • In this article, the author have studied on main revisions and some recommendations of the Incoterms(R) 2010. Main revisions are as belows. 1. Two new Incoterms rules -DAT and DAP- have replaced the Incoterms 2000 rules DAF, DES, DEQ and DDU. 2. New classification of the Incoterms(R) 2010 are adopted. First class is Rules for any mode or modes of transport(EXW, FCA, CPT, CIP, DAT, DAP and DDP belong to this class.) and second class is rules for sea and inland waterway transport(FAS, FOB, CFR and CIF belong to this class.). 3. Incoterms(R) 2010 rules formally recognizes that they are available for application to both international and domestic sale contracts. 4. The Guidance Notes and Introduction are not part of the actual Incoterms(R) 2010 rules. 5. Under the FOB, CFR and CIF, all mention of the ship's rail as the point of delivery has been omitted in preference for the goods being delivered when they are "on board" the vessel. 6. Incoterms(R) 2010 rules include the obligation to 'procure goods shipped' as an alternative to the obligation to ship goods in the relevant Incoterms rules. 7. Incoterms(R) 2010 rules give electronic means of communication the same effect as paper communication. 8. Incoterms(R) 2010 rules have allocated obligations between the buyer and seller to obtain or to render assistance in obtaining security-related clearances. such as chain-of custody information. Some recommendations are as belows. 1. The parties must incorporate the Incoterms(R) 2010 rules into their contract of sale. 2. The parties must choose the appropriate Incoterms(R) 2010 rules. 3. Specify the place or port as precisely as possible in their contract of sale. 4. Remember that Incoterms(R) 2010 rules do not give the parties a complete contract of sale. 5. Incoterms(R) 2010 rules do not prohibit alteration of Incoterms rule, but there are dangers in so doings. In order to avoid any unwelcome surprises, the parties would need to make the intended effect of such alterations extremely clear in their contract.

  • PDF

A Cluster Group Head Selection using Trajectory Clustering Technique (궤적 클러스터링 기법을 이용한 클러스터 그룹 헤드 선정)

  • Kim, Jin-Su;Shin, Seung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.12
    • /
    • pp.5865-5872
    • /
    • 2011
  • Multi-hop communication in clustering system is the technique that forms the cluster to aggregate the sensing data and transmit them to base station through midway cluster head. Cluster head around base station send more packet than that of far from base station. Because of this hot spot problem occurs and cluster head around base station increases energy consumption. In this paper, I propose a cluster group head selection using trajectory clustering technique(CHST). CHST select cluster head and group head using trajectory clustering technique and fitness function and it increases the energy efficiency. Hot spot problem can be solved by selection of cluster group with multi layer and balanced energy consumption using it's fitness function. I also show that proposed CHST is better than previous clustering method at the point of network energy efficiency.

An Energy Consumption Model using Hierarchical Unequal Clustering Method (계층적 불균형 클러스터링 기법을 이용한 에너지 소비 모델)

  • Kim, Jin-Su;Shin, Seung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2815-2822
    • /
    • 2011
  • Clustering method in wireless sensor networks is the technique that forms the cluster to aggregate the data and transmit them at the same time that they can use the energy efficiently. In this paper, I propose the hierarchical unequal clustering method using cluster group model. This divides the entire network into two layers. The data aggregated from layer 2 consisted of cluster group is sent to layer 1, after re-aggregation the total data is sent to base station. This method decreases whole energy consumption by using cluster group model with multi-hop communication architecture. Hot spot problem can be solved by establishing unequal cluster. I also show that proposed hierarchical unequal clustering method is better than previous clustering method at the point of network energy efficiency.

Design of Encryption/Decryption Core for Block Cipher Camellia (Camellia 블록 암호의 암·복호화기 코어 설계)

  • Sonh, Seungil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.4
    • /
    • pp.786-792
    • /
    • 2016
  • Camellia was jointly developed by Nippon Telegraph and Telephone Corporation and Mitsubishi Electric Corporation in 2000. Camellia specifies the 128-bit message block size and 128-, 192-, and 256-bit key sizes. In this paper, a modified round operation block which unifies a register setting for key schedule and a conventional round operation block is proposed. 16 ROMs needed for key generation and round operation are implemented using only 4 dual-port ROMs. Due to the use of a message buffer, encryption/decryption can be executed without a waiting time immediately after KA and KB are calculated. The suggested block cipher Camellia algorithm is designed using Verilog-HDL, implemented on Virtex4 device and operates at 184.898MHz. The designed cryptographic core has a maximum throughput of 1.183Gbps in 128-bit key mode and that of 876.5Mbps in 192 and 256-bit key modes. The cryptographic core of this paper is applicable to security module of the areas such as smart card, internet banking, e-commerce and satellite broadcasting.