• Title/Summary/Keyword: Secure Area

Search Result 952, Processing Time 0.026 seconds

A Study on Railway Vehicles Fire Detection using HMI Touch Screen (HMI 터치스크린을 이용한 철도차량용 복합화재수신기 개발 연구)

  • Park, In-Deok;Kim, Chang
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.30 no.1
    • /
    • pp.38-43
    • /
    • 2016
  • Recent social needs for promoting traffic safety increased and the demand social security in economic, increasing the demand for environmentally friendly rail transport. In particular, when train express such as to secure reliability KTX(Korea Train eXpress) from potential disaster(fire) in the train operation caused by the train express running has been very important. Railroad fire extinguishing system is operated to fire exploding before reaching the flashing point more important than early to quickly detect because of CAN(Controller Area Network) communication to fire suppression and fire receiver, interface, fire fighting equipment from HMI((Human Machine Interface) and fire high-performance to research and development for intelligent composite fire receiver is required.

Biometrics-based Key Generation Research: Accomplishments and Challenges

  • Ha, Lam Tran;Choi, Deokjai
    • Smart Media Journal
    • /
    • v.6 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • The security and privacy issues derived from unsecurely storing biometrics templates in biometric authentication/ recognition systems have opened a new research area about how to secure the stored biometric templates. Biometrics-based key generation is the newest approach that provides not only a mechanism to protect stored biometric templates in authentication/ recognition systems, but also a method to integrate biometric systems with cryptosystems. Therefore, this approach has attracted much attention from researchers worldwide. A review of current research state to summarize the achievements and remaining works is necessary for further works. In this study, we first outlined the requirements and the primary challenges when implementing these systems. We then summarize the proposed techniques and achievements in representative studies on biometrics-based key generation. From that, we give a discussion about the accomplishments and remaining works with the corresponding challenges in order to provide a direction for further researches in this area.

Evaluation of Fire Safety for Road Tunnels in Port Area based on Fire Safety Guidelines (도로터널 화재안전기준 기반 항만 지역 도로터널 화재 안전성 분석)

  • Ha, Yejin;Jeon, Joonho
    • Journal of Institute of Convergence Technology
    • /
    • v.11 no.1
    • /
    • pp.25-28
    • /
    • 2021
  • Recently, the fire safety of road tunnels has been important issues in South Korea. However, proper fire safety regulations has not made for road tunnels. Due to geographical challenges in South Korea, road tunnels should be constructed to secure stable traffic flows. In the Guidelines for Installing and Managing Disaster Prevention Facilities of Road Tunnels (NFSC 603), main target vehicles are passenger cars. This guidelines cannot support big fires from larger vehicles such as cargo, oil trucks. In this study, fire safety for a road tunnel in port area was analyzed with fire dynamics theory under cargo truck fire scenario. Sujunsan road tunnel in Busan city was chosen as a target tunnel, which links between Busan port and highways to increase cargo shipping. The results show the limitations of present guidelines (NFSC 603) for road tunnel from large fire situations.

Development and Verification of UAV-UGV Hybrid Robot System (드론-지상 하이브리드 로봇 시스템 개발 및 검증)

  • Jongwoon Woo;Jihoon Kim;Changhyun Sung;Byeongwoo Kim
    • The Journal of Korea Robotics Society
    • /
    • v.18 no.3
    • /
    • pp.233-240
    • /
    • 2023
  • In this paper, we proposed a hybrid type robot that simultaneously surveillance and reconnaissance on the ground and in the air. It was possible to expand the surveillance and reconnaissance range by expanding the surveillance and reconnaissance area of the ground robot and quickly moving to the hidden area through the drone. First, ground robots go to mission areas through drones and perform surveillance and reconnaissance missions for urban warfare or mountainous areas. Second, drones move ground robots quickly. It transmits surveillance and reconnaissance images of ground robots to the control system and performs reconnaissance missions at the same time. Finally, in order to secure the interoperability of these hybrid robots, basic performance and environmental performance were verified. The evaluation method was tested and verified based on the KS standards.

Obstacle-avoidance Algorithm using Reference Joint-Velocity for Redundant Robot Manipulator with Fruit-Harvesting Applications

  • Y.S. Ryuh;Ryu, K.H.
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 1996.06c
    • /
    • pp.638-647
    • /
    • 1996
  • Robot manipulators for harvesting fruits must be controlled to track the desired path of end-effector to avoid obstacles under the consideration of collision free area and safety path. This paper presents a robot path control algorithm to secure a collision free area with the recognition of work environments. The flexible space, which does not damage fruits or branches of tree due to their flexibility and physical properties , extends the workspace. Now the task is to control robot path in the extended workspace with the consideration of collision avoidance and velocity limitation at the time of collision concurrently. The feasibility and effectiveness of the new algorithm for redundant manipulators were tested through simulations of a redundant manipulator for different joint velocities.

  • PDF

Quantum Computing Policy and Technology Trends and Implications (양자컴퓨터 정책 및 기술 동향과 시사점)

  • J.H. Chung
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.1
    • /
    • pp.1-8
    • /
    • 2023
  • In this research, policies, and technology trends associated with quantum computers were examined, and through this, implications for domestic methods were derived. It is not a guarantee that developing quantum computing technology suited for domestic use would be successful to emulate the success stories of technology-leading nations. Technology leaders like the United States, China, and Europe are putting together strategic technology blocks to compete for technological hegemony. Adapting to and exploiting this trend will help us develop future technologies and secure market competitiveness. The dominant technology in the area of quantum computing has not yet been established. In the future, there will be fair competition in every specific technology area. At this point, it may be claimed that making audacious decisions will still lead to technological superiority.

강원산간지방 도로확장 대절토부 사면 안정 처리에 관한 연구

  • 이승호;황영철;송요원;정응환;지영환;노흥제
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2003.03a
    • /
    • pp.529-536
    • /
    • 2003
  • In domestic case occurrence of cut slopes according to construction and expansion of road is necessary more than 70% of country has been consisted of mountain area. In the case of Kang-won Do, there are much mountains locals in road wiping away a disgrace and expanded and slant is connoting collapse danger of incision side by each kind calamity being urgent. When route alteration enforces disadvantageous road extension, stability examination and processing way about large slope happened are serious. During road extension work in the Kang-won DO secure stability for falling rock of road slope and failure that happen and established suitable reinforcement and countermeasure in reply in necessity. The Slope is divided rock slope and soil slope, and then in order to analysis soil slope apply LEM theory. And rock slope examined stability about stereographic projection and wedge failure. Is going to utilize in reinforcement and failure prevention if it is efficient cutting as reinterpreting stability and secure stability and wish to consider effective and robust processing plan of great principle earth and sand side, and present countermeasure inside with these data hereafter applying suitable reinforcement countermeasure about unstable section.

  • PDF

A Study on Region-based Secure Multicast in Mobile Ad-hoc Network (Mobile Ad-hoc Network에서 영역기반 보안 멀티캐스트 기법 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.75-85
    • /
    • 2016
  • MANET is a network composed only mobile network having limited resources and has dynamic topology characteristics. Therefore, every mobile node acts as a route and delivers data by using multi-hop method. In particular, group communication such as multicast is desperately needed because of characteristics such as battery life of limited wireless bandwidth and mobile nodes. However, the multicast technique can have different efficient of data transmission according to configuring method of a virtual topology by the movement of the nodes and the performance of a multicast can be significantly degraded. In this paper, the region based security multicast technique is proposed in order to increase the efficiency of data transmission by maintaining an optimal path and enhance the security features in data transmission. The group management node that manages the state information of the member nodes after the whole network is separated to area for efficient management of multicast member nodes is used. Member node encrypts using member key for secure data transmission and the security features are strengthened by sending the data after encrypted using group key in group management node. The superiority of the proposed technique in this paper was confirmed through experiments.

Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network

  • Zhou, Jingxian;Wang, Zengqi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1773-1795
    • /
    • 2020
  • Unmanned aerial vehicles (UAVs) network are a very vibrant research area nowadays. They have many military and civil applications. Limited bandwidth, the high mobility and secure communication of micro UAVs represent their three main problems. In this paper, we try to address these problems by means of secure clustering, and a security clustering algorithm based on integrated trust value for UAVs network is proposed. First, an improved the k-means++ algorithm is presented to determine the optimal number of clusters by the network bandwidth parameter, which ensures the optimal use of network bandwidth. Second, we considered variables representing the link expiration time to improve node clustering, and used the integrated trust value to rapidly detect malicious nodes and establish a head list. Node clustering reduce impact of high mobility and head list enhance the security of clustering algorithm. Finally, combined the remaining energy ratio, relative mobility, and the relative degrees of the nodes to select the best cluster head. The results of a simulation showed that the proposed clustering algorithm incurred a smaller computational load and higher network security.

A Study on SafeNavigation Management of an Aqua-bus In the Channel between Wolmi-do and Yungjong-do (월미도와 영종도 수로간 아쿠아버스 통항안전관리에 관한 연구)

  • Kim Se-won;Lee Eun-bang;Lee Yun-sok
    • Journal of Navigation and Port Research
    • /
    • v.29 no.3 s.99
    • /
    • pp.181-187
    • /
    • 2005
  • In order to reduce the management risks of and secure traffic safety of Aqua-bus which will be operated at the channel of Wolmi do and Yungjong-do for the first time in Korea, we investigate maritime traffic and natural environment around the channel, and analyze the factors of risk involved in her operation. We also propose the countermeasure to secure the safety of navigation in her service including precautionary area, exclusive terminal, operation management, and etc.