• Title/Summary/Keyword: Secure area

Search Result 940, Processing Time 0.036 seconds

Selection method of public transportation vulnerable area using GIS buffering analysis (GIS Buffering기법을 이용한 대중교통취약지구 선정방법)

  • Kim, Yeon-Woong;Chang, Sung-Bong;Jang, Gwang-Woo;Park, Min-Kyu
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.1739-1742
    • /
    • 2011
  • Public transportation network in our country is concentrated and advanced focusing on urban area in order to secure economic feasibility. As a result, as dependence on private vehicles is relatively getting higher in public transportation vulnerable area, traffic problem occurs since the average running speed in urban area is 22.5km/h. This paper has an objective to suggest an improvement plan by selecting public transportation vulnerable area, and defining according to urban structure, formation and function, and understand traffic characteristics and draw problems. As a method selecting public transportation vulnerable area, an area with high division rate of vehicle was selected as a primary proposed site by calculating division rate of means of public transportation according to area. Final proposed site was selected by using GIS Buffering technique aiming at selected proposed site, and selecting non-benefit area 500m outside, which is the road limit distance from each subway and bus station. Lastly, the degree of improvement effect was studied by constructing imaginary public transportation network aiming at final proposed site and comparing to the amount of change in division rate of means of transportation.

  • PDF

The Study on the Spatial Characteristics of the Newly-built Hanok in Seoul by Planar Configuration according to Area (서울시 신축한옥의 면적별 평면구성에 따른 공간적 특징에 관한 연구)

  • Chung, Joon-Soo;Yang, Seung-Jung;Kim, Soo-Am
    • Journal of the Korean housing association
    • /
    • v.24 no.6
    • /
    • pp.61-68
    • /
    • 2013
  • According to the relation of the attribution of residents, we analyzed the spatial characteristics of newly-built Hanok in Bukchon focused on a spatial area-ratio, the number of rooms, L/D/K configuration. The results are as follows: 1) Have increased the number of residents, the family members are also increased. In this study, the major formed case is 3 residents and two-generation family. 2) In the most cases, R area-ratio is the highest, next to L/D/K integrated area-ratio. While the examples that the L/D/K integrated area-ratio is lower than R area-ratio, or is also higher than R area-ratio are appeared. These examples can present that it has a tendency to secure the necessary room depending on the attribution of residents. 3) L/D/K is classified into four types of connection. And the characteristics depending on the number of rooms are as follows. L+DK is the most common type, next to LDK>LD+K>L+D+K. And L+DK is widely distributed in each sized area. And particularly, it is appeared mostly in 3R.

A basic study on Improvement for Biotops Area Ratio through the Post Evaluation Plan for Outdoor Space of Apartment Housings (공동주택의 외부공간 시공 후 평가를 통한 생태면적률 개선 방안도출을 위한 기초 연구 - 현장시공시 생태면적률 공간유형 반영을 중심으로 -)

  • Jang, Dae-hee;Kim, Hyeon-soo;Kang, Byoung Keun
    • KIEAE Journal
    • /
    • v.10 no.6
    • /
    • pp.91-96
    • /
    • 2010
  • The problem of urban climate change and destruction of wildlife habitats space which is becoming more serious day by day, has to do with the impervious area(surface area) in urban space. The destruction of natural ground and indiscreet soil covering due to compact development is causing urban desertification in urban residential areas. With biotops area ratio being variously used and extended as a pre planning index, this study aims to analyze the elements of biotop area ratio that need to be supplemented in order to emerge as a realistic planning index for post evaluation measure and not act only as a examining tool in the planning stage. In particular, this study aims to examine the possibility of biotops area ratio to be used as a system to evaluate the outer space of apartment housings, in which biotops area ratio is most actively used, as a tool to secure ecological soundness of the development area after construction is finished.

A Study on Next-Generation Data Protection Based on Non File System for Spreading Smart Factory (스마트팩토리 확산을 위한 비파일시스템(None File System) 기반의 차세대 데이터보호에 관한 연구)

  • Kim, Seungyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.176-183
    • /
    • 2021
  • Purpose: The introduction of smart factories that reflect the 4th industrial revolution technologies such as AI, IoT, and VR, has been actively promoted in Korea. However, in order to solve various problems arising from existing file-based operating systems, this research will focus on identifying and verifying non-file system-based data protection technology. Method: The research will measure security storage that cannot be identified or controlled by the operating system. How to activate secure storage based on the input of digital key values. Establish a control unit that provides input and output information based on BIOS activation. Observe non-file-type structure so that mapping behavior using second meta-data can be performed according to the activation of the secure storage. Result: First, the creation of non-file system-based secure storage's data input/output were found to match the hash function value of the sample data with the hash function value of the normal storage and data. Second, the data protection performance experiments in secure storage were compared to the hash function value of the original file with the hash function value of the secure storage after ransomware activity to verify data protection performance against malicious ransomware. Conclusion: Smart factory technology is a nationally promoted technology that is being introduced to the public and this research implemented and experimented on a new concept of data protection technology to protect crucial data within the information system. In order to protect sensitive data, implementation of non-file-type secure storage technology that is non-dependent on file system is highly recommended. This research has proven the security and safety of such technology and verified its purpose.

A Secure Social Networking Site based on OAuth Implementation

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.308-315
    • /
    • 2016
  • With the advancement in the area of cloud storage services as well as a tremendous growth of social networking sites, permission for one web service to act on the behalf of another has become increasingly vital as social Internet services such as blogs, photo sharing, and social networks. With this increased cross-site media sharing, there is a upscale of security implications and hence the need to formulate security protocols and considerations. Recently, OAuth, a new protocol for establishing identity management standards across services, is provided as an alternative way to share the user names and passwords, and expose personal information to attacks against on-line data and identities. Moreover, OwnCloud provides an enterprise file synchronizing and sharing that is hosted on user's data center, on user's servers, using user's storage. We propose a secure Social Networking Site (SSN) access based on OAuth implementation by combining two novel concepts of OAuth and OwnCloud. Security analysis and performance evaluation are given to validate the proposed scheme.

Compressed Sensing-Based Multi-Layer Data Communication in Smart Grid Systems

  • Islam, Md. Tahidul;Koo, Insoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2213-2231
    • /
    • 2013
  • Compressed sensing is a novel technology used in the field of wireless communication and sensor networks for channel estimation, signal detection, data gathering, network monitoring, and other applications. It plays a significant role in highly secure, real-time, well organized, and cost-effective data communication in smart-grid (SG) systems, which consist of multi-tier network standards that make it challenging to synchronize in power management communication. In this paper, we present a multi-layer communication model for SG systems and propose compressed-sensing based data transmission at every layer of the SG system to improve data transmission performance. Our approach is to utilize the compressed-sensing procedure at every layer in a controlled manner. Simulation results demonstrate that the proposed monitoring devices need less transmission power than conventional systems. Additionally, secure, reliable, and real-time data transmission is possible with the compressed-sensing technique.

Determining(Estimating) Ratios for Enhancing Publicness Through Analysis of Changes in Land Prices Influenced by Upzoning - A Case of Operating Instructions of District Unit Planning in Busan - (종상향 용도지역의 지가 변화 분석을 통한 공공성 확보 비율 산정 - 부산광역시 지구단위계획 운영지침을 대상으로 -)

  • KIM, Heung-Kwan;YEO, Sung-Jun;KANG, Gi-Cheol
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.4
    • /
    • pp.157-168
    • /
    • 2016
  • Change of Zoning Regulations in district unit plans calls for improving development benefits through upzoning rather than harmonious worldwide development. The purpose of this study is to examine the floor area ratio incentive system according to un-zoning in district units plan, and to suggest criteria to secure publicness. In order to derive methods to secure district unit plan publicness in Busan Metropolitan City, the ratio of securing public facilities through upzoning was examined. A comparative analysis of land price rate in the entire city versus the use district suggests that it is possible to secure 10 to 15% of public facilities. In this study, 10% of the project site was applied to secure public facilities, and it produced upgraded publicness.

Efficient Access Control Labeling for Secure Query Processing on Dynamic XML Data Streams (동적 XML 데이타 스트링의 안전한 질의 처리를 위한 효율적인 접근제어 레이블링)

  • An, Dong-Chan;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.36 no.3
    • /
    • pp.180-188
    • /
    • 2009
  • Recently, the needs for an efficient and secure access control method of dynamic XML data in a ubiquitous data streams environment have become an active research area. In this paper, we proposed an improved role-based prime number labeling scheme for an efficient and secure access control labeling method in dynamic XML data streams. And we point out the limitations of existing access control and labeling schemes for XML data assuming that documents are frequently updated. The improved labeling method where labels are encoded ancestor-descendant and sibling relationships between nodes but need not to be regenerated when the document is updated. Our improved role-based prime number labeling scheme supports an infinite number of updates and guarantees the arbitrary nodes insertion at arbitrary position of the XML tree without label collisions. Also we implemented an efficient access control using a role-based prime number labeling. Finally, we have shown that our approach is an efficient and secure through experiments.

Decentralized Group Key Management for Untrusted Dynamic Networks (신뢰할 수 없는 동적 네트워크 환경을 위한 비중앙화 그룹키 관리 기법)

  • Hur, Jun-Beom;Yoon, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.4
    • /
    • pp.263-274
    • /
    • 2009
  • Decentralized group key management mechanisms offer beneficial solutions to enhance the scalability and reliability of a secure multicast framework by confining the impact of a membership change in a local area. However, many of the previous decentralized solutions reveal the plaintext to the intermediate relaying proxies, or require the key distribution center to coordinate secure group communications between subgroups. In this study, we propose a decentralized group key management scheme that features a mechanism allowing a service provider to deliver the group key to valid members in a distributed manner using the proxy cryptography. In the proposed scheme, the key distribution center is eliminated while data confidentiality of the transmitted message is provided during the message delivery process. The proposed scheme can support a secure group communication in dynamic network environments where there is no trusted central controller for the whole network and the network topology changes frequently.

A Study of Comparison of outflow characteristics of pollutants by rainfall event of forest area near Juam lake basin (주암호 유역의 강우사상에 따른 오염물질의 유출특성)

  • Kim, Nam-Joung;Shin, Dae-Yewn
    • Journal of environmental and Sanitary engineering
    • /
    • v.22 no.4
    • /
    • pp.87-104
    • /
    • 2007
  • The objective of this study is to estimate the load of pollutants caused from the forest area among non-point pollutants within the Juam lake. The surveyed forest area was classified into broad-leaved, conifer, mixed and herbage area by forest tree type. Water quality and flux were investigated under rainfall and non-rainfall, respectively. Then, pollutant loading was evaluated by using the values of unit pollutant loading factor of each point and area of forest zone. Water quality analysis results of runoff by forest tree types were as follows. - Annual BOD, $COD_{Mn}\;and\;COD_{Cr}$ concentration of runoff in conifer area was high, and particle and biological recalcitrant compounds were flowed highly. - SS, T-N and T-P concentration was high in runoff from broad-leaved area, and biological degradable compounds was flowed. - Water quality of water from valley was maintained good under non-rainfall and could be utilized as fresh drinking water. Through water quality standard investigation, a countermeasure establishment was necessary to secure a good quality of drinking water - BOD, $COD_{Mn},\;and\;COD_{Cr}$ concentration of Bo-sung river was higher 1.5 times than other 2 streams, and because of high T-N, and T-P concentration in Songgwang stream, the management for this was necessary.