• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.032 seconds

A Study on the Classification and Causative Factor of Vacant Houses - Focused on the Incheon Metropolitan City - (빈집발생의 유형과 발생에 영향을 미치는 요인에 관한 연구 - 인천광역시 사례를 중심으로 -)

  • Lim, Chang-Il;Na, In-Su
    • Journal of KIBIM
    • /
    • v.10 no.1
    • /
    • pp.23-29
    • /
    • 2020
  • The vacant houses commonly observed in urban aging are considered to be representative signs of urban decline. Vacant houses are themselves vulnerable to security, and in particular, they are exposed to disasters due to poor management, which can accelerate the decline of the area. This study is to classify the area and analyze the causes and characteristics of the occurrence of vacant houses by type based on the data through the survey on the vacant houses in Incheon. This research analyze vacant house data survey so to characterized and categorized types of vacant houses. The criteria of vacant houses analysis are population density, population growth, aging extent. In conclusion there are four types of region in Incheon area according to housing types, hazard classes, building age and building areas. Type A is inner city, type B is mixed, type C is expandable and type D is unsular types.

Multiple ASR for efficient defense against brute force attacks (무차별 공격에 효과적인 다중 Address Space Randomization 방어 기법)

  • Park, Soo-Hyun;Kim, Sun-Il
    • The KIPS Transactions:PartC
    • /
    • v.18C no.2
    • /
    • pp.89-96
    • /
    • 2011
  • ASR is an excellent program security technique that protects various data memory areas without run-time overhead. ASR hides the addresses of variables from attackers by reordering variables within a data memory area; however, it can be broken by brute force attacks because of a limited data memory space. In this paper, we propose Multiple ASR to overcome the limitation of previous ASR approaches. Multiple ASR separates a data memory area into original and duplicated areas, and compares variables in each memory area to detect an attack. In original and duplicated data memory areas variables are arranged in the opposite order. This makes it impossible to overwrite the same variables in the different data areas in a single attack. Although programs with Multiple ASR show a relatively high run-time overhead due to duplicated execution, programs with many I/O operations such as web servers, a favorite attack target, show 40~50% overhead. In this paper we develop and test a tool that transforms a program into one with Multiple ASR applied.

The Set of Performance Evaluation Index of Remodeling in Rural Housing for Residential Environments Improvement (주거환경개선을 위한 농촌주택 리모델링 성능평가지표 설정에 관한 연구)

  • Kim, Hye-Lan;Lim, Chang-Su;Kim, Eun-Ja;Hong, Kwang-Woo;Moon, Ho-Gyeong
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.1
    • /
    • pp.1-12
    • /
    • 2014
  • Living environments in rural area have become deteriorated rapidly. Increase of aging population, decline in agricultural income, polarization of wealth in rural community due to rural returners have caused severe decline and imbalance of living environments in rural area. Responding to this circumstances, governments currently develop projects for improving living environments focusing on individual housing which were excluded from governmental supports because those had been regarded as private property. Nevertheless, there are still some gaps and problems in evaluating the quality of living environment and suggesting effective solutions. It would be because standards and guidelines of the projects have been based on urban housing system. In order to support the implementation of the projects, this research has developed an index for evaluating and monitoring the quality of living environments in rural area. By applying Delphi method, the index has been created in four categories of 'security', 'convenience', 'comfortability', and 'durability' 'Security' consists of structural safety, crime, disaster, accident prevention. 'Convenience' includes three divisions of living, traffic, farm working. 'Comfortability' is divided into sanitation, indoor environments, and aesthetic appreciation. Lastly, 'durability' has four divisions of energy conservation, environmental friendliness, efficiency, and economics. Each sub-division also has different items from three to twelves. In the case of an index for performance evaluation, items have been derived from energy conservation(6-items), and environmental friendliness(7-items). Items developed as an index for evaluating rural living environments in this research might be good background information for remodeling project in rural housing development.

Investigations into a Multipurpose Dam in Tasman District-New Zealand

  • Thomas, Joseph Theodore
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2008.05a
    • /
    • pp.40-48
    • /
    • 2008
  • The Waimea Basin is located on the northern tip of the South Island of New Zealand. It is a highly productive area with intense water use with multi-stakeholder interest in water. Irrigation from the underground aquifers here makes up the largest portion of used water; however the same aquifers are also the key urban and industrial sources of water. The Waimea/Wairoa Rivers are the main sources of recharge to the underlying aquifers and also feed the costal springs that highly valued by the community and iwi. Due to the location of the main rivers and springs close to the urban centre the water resource system here has high community and aesthetic values. Recent enhanced hydrological modelling work has shown the water resources in this area to be over allocated by 22% for a 1:10 year drought security for maintaining a minimalistic flow of 250 l/s in the lower Waimea River. The current irrigated land area is about 3700 hectares with an additional potential for irrigation of 1500 hectares. Further pressures are also coming on-line with significant population growth in the region. Recent droughts have resulted in significant water use cutbacks and the threat of seawater intrusion in the coastal margins. The Waimea Water Augmentation Committee (WWAC) initiated a three year stage 1 feasibility study in 2004/2005 into the viability of water storage in the upper parts of the catchment for enhancing water availability and its security of supply for consumptive, environmental, community and aesthetic benefits downstream. The project also sought to future proof water supply needs for the Waimea Plains and the surrounding areas for a 50 - 100 year planning horizon. The broad range stage 1 investigation programme has identified the Upper Lee Catchment as being suitable for a storage structure to provide the needs identified and also a possibility for some small scale hydro electricity generation as well. The stage 2 detailed feasibility investigations that are underway now (2007/2008), and to be completed in two years is to provide all details for progressing with the next stage of obtaining necessary permits for construction and commissioning a suitable dam.

  • PDF

Model Verification Algorithm for ATM Security System (ATM 보안 시스템을 위한 모델 인증 알고리즘)

  • Jeong, Heon;Lim, Chun-Hwan;Pyeon, Suk-Bum
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.72-78
    • /
    • 2000
  • In this study, we propose a model verification algorithm based on DCT and neural network for ATM security system. We construct database about facial images after capturing thirty persons facial images in the same lumination and distance. To simulate model verification, we capture four learning images and test images per a man. After detecting edge in facial images, we detect a characteristic area of square shape using edge distribution in facial images. Characteristic area contains eye bows, eyes, nose, mouth and cheek. We extract characteristic vectors to calculate diagonally coefficients sum after obtaining DCT coefficients about characteristic area. Characteristic vectors is normalized between +1 and -1, and then used for input vectors of neural networks. Not considering passwords, simulations results showed 100% verification rate when facial images were learned and 92% verification rate when facial images weren't learned. But considering passwords, the proposed algorithm showed 100% verification rate in case of two simulations.

  • PDF

A study on prioritizing the application areas for business development of IoT(Internet of Things) (사물 인터넷의 사업화 영역에 대한 우선순위 선정에 관한 연구)

  • Moon, Tae Hee;Kim, Taehoon;Ahn, Hyunchul
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.183-195
    • /
    • 2014
  • This study aims at identifying and prioritizing the application areas for business development of IoT(Internet of Things). In specific, we collected the opinions of the experts on IoT in Korea through the survey based on pairwise comparison, and then we analyzed them using AHP(analytic hierarchy process). As a result, we found that 'Public Safety & Security', 'Automotive & Transportation', and 'Utility & Energy' are the most promising area in realizing IoT-related businesses. Also, we found that the experts had different views according to the positions of their industry in IoT value chain. The analysis showed that the device industry prioritizes 'Public Safety & Security', whereas the network industry does 'Automotive & Transportation'. The experts from the service industry were found to regard 'Utility and Energy' as the most promising commercialization area of IoT.

An Anti-Forensic Technique for Hiding Data in NTFS Index Record with a Unicode Transformation (유니코드 변환이 적용된 NTFS 인덱스 레코드에 데이터를 숨기기 위한 안티포렌식 기법)

  • Cho, Gyu-Sang
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.75-84
    • /
    • 2015
  • In an "NTFS Index Record Data Hiding" method messages are hidden by using file names. Windows NTFS file naming convention has some forbidden ASCII characters for a file name. When inputting Hangul with the Roman alphabet, if the forbidden characters for the file name and binary data are used, the codes are convert to a designated unicode point to avoid a file creation error due to unsuitable characters. In this paper, the problem of a file creation error due to non-admittable characters for the file name is fixed, which is used in the index record data hiding method. Using Hangul with Roman alphabet the characters cause a file creation error are converted to an arbitrary unicode point except Hangul and Roman alphabet area. When it comes to binary data, all 256 codes are converted to designated unicode area except an extended unicode(surrogate pairs) and ASCII code area. The results of the two cases, i.e. the Hangul with Roman alphabet case and the binary case, show the applicability of the proposed method.

High-speed Design of 8-bit Architecture of AES Encryption (AES 암호 알고리즘을 위한 고속 8-비트 구조 설계)

  • Lee, Je-Hoon;Lim, Duk-Gyu
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.15-22
    • /
    • 2017
  • This paper presents new 8-bit implementation of AES. Most typical 8-bit AES designs are to reduce the circuit area by sacrificing its throughput. The presented AES architecture employs two separated S-box to perform round operation and key generation in parallel. From the simulation results of the proposed AES-128, the maximum critical path delay is 13.0ns. It can be operated in 77MHz and the throughput is 15.2 Mbps. Consequently, the throughput of the proposed AES has 1.54 times higher throughput than the other counterpart although the area increasement is limited in 1.17 times. The proposed AES design enables very low-area design without sacrificing its performance. Thereby, it can be suitable for the various IoT applications that need high speed communication.

Hydraulic Characteristic Analysis for Prevention of River Disaster at Estuary in the Eastern Coast of Korea (동해안 하천 하구부의 하천재해 방지를 위한 수리특성 분석)

  • Choi, Jong-Ho;Jun, Kye-Won;Yoon, Yong-Ho
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.2
    • /
    • pp.83-89
    • /
    • 2018
  • The significant sedimentation at the estuary in the eastern coast of Korea frequently causes river mouth occlusion where disconnection between the river and sea is observed. River mouth occlusion causing watershed retention raises the environmental risk of the area as it impairs water quality and threatens the area's safety in the event of floods. This study proposes a plan to maintain stability of river channel and flow of flood discharge at the estuary with loss of its function for disaster prevention. To this end, the study tries to change the location and width of stream path, focusing on the center line of stream near the sand bar of river mouth. This allows to identify a shape of stream path that leads the most stable flow. To review the result, this study uses the SRH-2D, a model for two-dimensional hydraulic analysis, and conduct numeric simulation. The simulation result showed that the most effective plan for maintaining the stable flow of running water without having the area sensitive to changes in hydraulic characteristics is to lower the overall river bed height of the sand bar near the center line of stream to a equal level.

A Design of the High-Speed Cipher VLSI Using IDEA Algorithm (IDEA 알고리즘을 이용한 고속 암호 VLSI 설계)

  • 이행우;최광진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.64-72
    • /
    • 2001
  • This paper is on a design of the high-speed cipher IC using IDEA algorithm. The chip is consists of six functional blocks. The principal blocks are encryption and decryption key generator, input data circuit, encryption processor, output data circuit, operation mode controller. In subkey generator, the design goal is rather decrease of its area than increase of its computation speed. On the other hand, the design of encryption processor is focused on rather increase of its computation speed than decrease of its area. Therefore, the pipeline architecture for repeated processing and the modular multiplier for improving computation speed are adopted. Specially, there are used the carry select adder and modified Booth algorithm to increase its computation speed at modular multiplier. To input the data by 8-bit, 16-bit, 32-bit according to the operation mode, it is designed so that buffer shifts by 8-bit, 16-bit, 32-bit. As a result of simulation by 0.25 $\mu\textrm{m}$ process, this IC has achieved the throughput of 1Gbps in addition to its small area, and used 12,000gates in implementing the algorithm.