• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.028 seconds

정보보호기술(ITU-T SG17 중심) 국제표준화 동향

  • O, Heung-Ryong;Kim, Yeong-Hwa;Yeom, Heung-Yeol
    • Information and Communications Magazine
    • /
    • v.31 no.5
    • /
    • pp.34-38
    • /
    • 2014
  • 정보보호 분야 국제표준화는 정보통신 관점에서 ITU-T SG17, 원천기술 관점에서 ISO/IEC JTC1/SC27, 인터넷 서비스 보안 관점에서 IETF Security Area에서 국제표준을 개발하고 있다. 또한, 아시아 지역 협력을 위해 ASTAP, RAISE Forum, CJK Security WG 등의 협의체를 구성하여 국제표준화기구에 대한 아시아 공동 대응체계를 구축해서 활동하고 있다. 본고에서는 2014년 1월, ITU-T SG17 국제회의 주요 결과와 향후 추진전망에 대해 알아본다.

A Tabu Search Method for K-anonymity in database privacy protection

  • Run, Cui;Kim, Hyoung-Joong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.990-992
    • /
    • 2011
  • In this paper, we introduce a new Tabu method to get K-anonymity character in database information privacy protection. We use the conception of lattice to form the solution space for K-anonymity Character and search the solution area in this solution space to achieve the best or best approach modification solution for the information in the database. We then compared the Tabu method with other traditional heuristic method and our method show a better solution in most of the cases.

People Tracking Method with Distributed Laser Scanner and Its Application to Entrance Monitoring System (분산배치된 레이저 스캐너를 이용한 사람추적방법 및 출입감시시스템에의 응용)

  • Lee, Jae-Hoon;Kim, Yong-Shik;Kim, Bong-Keun;Ohba, Kohtaro;Kawata, Hirohiko;Ohya, Akihisa;Yuta, Shin'ich
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.2
    • /
    • pp.130-138
    • /
    • 2009
  • Recently, people tracking technology is being required to various area including security application. This paper suggests a method to track people with multiple laser scanners to detect the waist part of human. Multi-target model and Kalman filter based estimation are employed to track the human movement. The proposed method is applied to a novel system to monitor the entrance area and to filter out the trespasser to pass through the door without identification. Experiments for various cases are performed to verify the usefulness of the developed system.

  • PDF

An Encryption Key Distribution System in LAN Environment Using Time Quantum (Time Quantum을 이용한 LAN에서의 암호화 키이 분배방식)

  • 류황빈;이재광
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.6
    • /
    • pp.629-639
    • /
    • 1992
  • This paper examines the security vulnerability, demanded service, layering consideration for local area networks(LANs), and proposes a new key distribution system suitable to local area networks. the new key distribution system Is applicable to time quantum in encrytion key and then the time used arid the quantity of encryption message using the encryption key are limited. A system suggested in this paper can achive some higher concurrency of key and authentication of the opposite party. Even through a encryption key expose by reason of wiretapping of a frame unit, It has achived some more security and safety, because the contens of all traffic messages are not known.

  • PDF

A Study on Damage Effect from Major Accident of LPG Charging Facility - A case study of an LPG Charging and Automotive Outlet - (LPG 충전소 중대사고의 피해효과에 관한 연구 - 부천 LPG충전소 사고 사례를 중심으로 -)

  • Roh, Sam-Kew;Kim, Tae-Hwan;Ham, Eun-Gu;Hong, Chang-Moon
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.83-98
    • /
    • 1999
  • The LPG station's explosion at Bucheon city was a major accident which with rare frequency of occurrence but large damage effect. Therefore, to prevent similar accident in the future from LPG chargings stations which located at inner urban area, it needs to identify the damage effects of such facilities by comparing theoretically quantities risks-PHAST. The BLEVE effects from the accident showed similar level in case of heat flux, however, the over pressure level reflected at reduced distance. The structure damage to the nearby area showed comparatively large reduction of concrete strength and shape changes through by heat effect while the overpressure effect was small.

  • PDF

Real-time Surveillance System for Security of Important Area (중요지역 보안을 위한 실시간 감시 시스템)

  • Ahn, Sung-Jin;Lee, Kwan-Hee;Kim, Nam-Hyung;Kwon, Goo-Rak;Ko, Sung-Jea
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.297-298
    • /
    • 2006
  • In this paper, we propose a real-time surveillance system for security of important area such as military bases, prisons, and strategic infra structures. The proposed system recognizes the movement of objects in dark environments. First, the Multi-scale retinex (MSR) is processed to enhance the contrast of image captured in dark environments. Then, the enhanced input image is subtracted with the background image. Finally, each bounding box enclosing each objects are tracked. The center point of each bounding box obtained by the proposed algorithm provides more accurate tracking information. Experimental results show that the proposed system provides good performance even though an object moves very fast and the background is quite dark.

  • PDF

Application of the IoT Concept in the Field of Medical Devices: Development of a Prototype of a Mechanotherapeutic Simulator and Software for Its Control

  • Lasek, Mikhail Petrovich;Karmanov, Vladislav Nikolaevich;Makarov, Roman Vladimirovich;Makarov, Pavel Andreevich;Gryaznov, Dmitriy Yurievich;Ustyugov, Vladimir Aleksandrovich
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.63-66
    • /
    • 2022
  • The article discusses the application of the IoT concept in the sensitive field of medical devices on the example of a developed prototype of a mechanotherapeutic simulator. Mechanotherapy is a complex of therapeutic, preventive, and restorative exercises conducted using simulators, specially designed for developing movements in individual joints. Mechanotherapy is used for the early and painless restoration of joint mobility, to prevent complications associated with prolonged immobilization of the injured area of extremities. Using the mechanotherapy simulator allows developing the joint painlessly, which accelerates the metabolism in the injured area, and soft tissues are restored to normal. The article provides information about the electronic components that ensure the wireless operation of the device and describes in detail the applied software as well as the client application for a mobile device.

Optimal WAMS Configuration in Nordic Power System

  • Mohamed A.M. Hassan;Omar H. Abdalla;Hady H. Fayek;Aisha H.A. Hashim;Siti Fauziah Toha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.130-138
    • /
    • 2023
  • The Smart grids are considered as multi-disciplinary power systems where the communication networks are highly employed. This paper presents optimal wide area measurement system (WAMS) configuration in Nordic power system. The transition from SCADA to WAMS becomes now trend in all power systems to ensure higher reliability and data visibility. The optimization applied in this research considered the geographical regions of the Nordic power system. The research considered all the devices of WAMS namely phasor measurement units (PMUs), phasor data concentrators (PDCs) and communication links. The study also presents two scenarios for optimal WAMS namely base case and N-1 contingency as different operating conditions. The result of this research presents technical and financial results for WAMS configuration in a real power system. The optimization results are performed using MATLAB 2017a software application.

Food Security in Households of People Living With Human Immunodeficiency Virus/Acquired Immunodeficiency Syndrome: A Cross-sectional Study in a Subdivision of Darjeeling District, West Bengal

  • Dasgupta, Pallabi;Bhattacherjee, Sharmistha;Das, Dilip Kumar
    • Journal of Preventive Medicine and Public Health
    • /
    • v.49 no.4
    • /
    • pp.240-248
    • /
    • 2016
  • Objectives: Human immunodeficiency virus (HIV)/acquired immunodeficiency syndrome (AIDS) adversely impacts food security in households of people living with HIV/AIDS (PLWHA). Little research has focused on food insecurity among PLWHA in India. The purpose of this study was to identify the prevalence of and factors relating to food security in households of PLWHA in the Siliguri subdivision of Darjeeling, West Bengal, India. Methods: A cross-sectional community-based study was carried out among 173 PLWHA residing in Siliguri and registered at the Anti-retroviral Therapy Centre of North Bengal Medical College & Hospital. Data was collected at the household level with interviews of PLWHA using a food security survey instrument. We analyzed the associations using logistic regression. Results: The prevalence of household food security among the participants was 50.9% (88/173). Five years or more of schooling, higher socioeconomic class and males were found to be significantly associated with a higher likelihood of food security. A later stage of the disease and the presence of other family members with HIV/AIDS were significantly associated with a lower likelihood of food security. The major coping strategies to deal with food insecurity in the acute phase HIV infection included borrowing money (56.1%), followed by spousal support, loans from microfinance institutions, banks, or money lenders, borrowing food, or selling agricultural products. Conclusions: The present study revealed that only about half of households with PLWHA were food secure. Prior interventions relating to periods of food and economic crisis as well as strategies for sustaining food security and economic status are needed in this area.

A Study on Perceptions on Supply Chain Security Orientation (공급사슬 보안지향성의 인식에 관한 연구)

  • Park, Hong-Gyu;Chung, Jae-Wan
    • International Commerce and Information Review
    • /
    • v.15 no.2
    • /
    • pp.83-106
    • /
    • 2013
  • The purpose of this paper is to investigate the perceptions that ports and port users in the supply chain have on the variables of Supply Chain Security Orientation construct. This paper also aims to provide directions and insights to the perceptional issues on supply chain security that have emerged as an independent area of research within SCM and logistics. Starting from the explanation on Supply Chain Security Orientation research model, this paper mainly explored and analyzed the different perceptions of variables in the research model between port group and port user group. Primarily, it explores the descriptive statistics from the questionnaire, and does not analyze the causal relationships of proposed research model. It aims to serve as a guide to the supply chain security managers who are interested in policy issues related to security measures to better performance of the organization.

  • PDF