• Title/Summary/Keyword: Security Area

Search Result 1,688, Processing Time 0.027 seconds

A Study on the Service Area Planning of Elderly Care Facilities (노인요양시설 서비스 공간 계획에 관한 연구)

  • Choi, Jong-In;Lee, Nak-Woon
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.14 no.4
    • /
    • pp.11-20
    • /
    • 2008
  • The demand of the care facilities for the elderly will be increased, because of the social changes which desire well organized medical treatment service. However, they have been illogically administrating such as preparing service at living space because of lacking places which provide living service. So the side of administration, it is necessary to have a security and improvement in that kind of needed place. The studies of elderly care facilities have been placing too much emphasis on the living space of the residential facilities and their welfare facilities compare with the service providing place which is ignored just as a part of the living space. This study focus on a situation of elderly care facilities and analyze a service space using in facilities, so it can be applied to service place plan for the future.

  • PDF

A Design of Security Mechanism to control LR-WPAN in WLAN (LR-WPAN을 제어하기 위한 WLAN에서의 보안 매커니즘 설계)

  • Lee, Jae-Won;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.178-180
    • /
    • 2005
  • 저렴한 비용, 매우 작은 파워 소비라 낮은 데이터 전송속도를 지원 하는 IEEE 802.15.4 LR-WPAN(Wireless Personal Area Network) 기술은 앞으로 다가올 유비쿼터스 시대의 핵심이라고 할 수 있다. 도래할 유비쿼터스 시대에는 댁내에 LR-WPAN 기술을 적용한 다양한 상품이 보급될 것이다. 그러나 LR-WPAN은 매우 낮은 전력 소비를 위해 네트워크 기능을 최소화 하였기 때문에 응용에 있어 LAN 또는 WLAN(Wireless Local Area Network)등 기존 네트워크와의 통신 및 보안이 아직 고려되지 않아 보완이 필요하다. 본 논문에서는 WLAN의 Station이 LR-WPAN을 보안적으로 안전하게 제어할 수 있도록 AP(Acess Point)와 WLAN의 Station 그리고 LR-WPAN의 PAN Coodinator 간의 새로운 Message와 Function를 정의하고, 다른 두 네트워크간의 효율적이고 보안이 유지되는 프레임 프로세싱 매커니즘을 제안한다.

  • PDF

A Study on Railway Vehicles Fire Detection using HMI Touch Screen (HMI 터치스크린을 이용한 철도차량용 복합화재수신기 개발 연구)

  • Park, In-Deok;Kim, Chang
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.30 no.1
    • /
    • pp.38-43
    • /
    • 2016
  • Recent social needs for promoting traffic safety increased and the demand social security in economic, increasing the demand for environmentally friendly rail transport. In particular, when train express such as to secure reliability KTX(Korea Train eXpress) from potential disaster(fire) in the train operation caused by the train express running has been very important. Railroad fire extinguishing system is operated to fire exploding before reaching the flashing point more important than early to quickly detect because of CAN(Controller Area Network) communication to fire suppression and fire receiver, interface, fire fighting equipment from HMI((Human Machine Interface) and fire high-performance to research and development for intelligent composite fire receiver is required.

Design and Implementation of Role-Based Access Control Package for Java Applications (자바 애플리케이션을 위한 역할기반 접근제어 패키지의 설계 및 구현)

  • Oh, Se-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.6
    • /
    • pp.1134-1141
    • /
    • 2006
  • Java is platform-independent and supports uniform solutions from mobile area (J2ME) to enterprise area (J2EE), so Java is a good development tool for the environment of heterogeneous machines and distributed applications. Java applications need access control module as a Java package. In this paper, we design and implement it. Therefore Java developers can reduce development time, and system managers easily do access control work. Proposed module is based on Role-Based Access Control (RBAC) model and includes a Java package and administration tool.

  • PDF

Educational Development Plan for the Future Popultion Growth (장기인구성장에 따른 교육개발)

  • 박덕규
    • Korea journal of population studies
    • /
    • v.8 no.1
    • /
    • pp.20-46
    • /
    • 1985
  • The increase of the population has an effect on the increase of students. The high birthrate, which means the extension of enrollments in the future, requires preparation of enough facilities and equipment for education. However, the educational conditions of Korea are not yet developed, and in such a situation the increase of enrollments makes the improvement of educational conditions difficult. Besides, the influx of students into the large cities has made complex educational problems such as a decrease of students in the rural area and a change for the worse of the educational conditions in the urban area. For the development of education in such a situation, an emphasis should be put not only on security of a stable educational finance but also on activation of family planning project and curb of population influx into large cities in the realm of population policy. In addition, population education for the youth should be strengthened in order that they can have sound view of family life, married life, children, and sex moral. For the way the young married live has relationship with the number and quality of children in the future of our nation.

  • PDF

Biometrics-based Key Generation Research: Accomplishments and Challenges

  • Ha, Lam Tran;Choi, Deokjai
    • Smart Media Journal
    • /
    • v.6 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • The security and privacy issues derived from unsecurely storing biometrics templates in biometric authentication/ recognition systems have opened a new research area about how to secure the stored biometric templates. Biometrics-based key generation is the newest approach that provides not only a mechanism to protect stored biometric templates in authentication/ recognition systems, but also a method to integrate biometric systems with cryptosystems. Therefore, this approach has attracted much attention from researchers worldwide. A review of current research state to summarize the achievements and remaining works is necessary for further works. In this study, we first outlined the requirements and the primary challenges when implementing these systems. We then summarize the proposed techniques and achievements in representative studies on biometrics-based key generation. From that, we give a discussion about the accomplishments and remaining works with the corresponding challenges in order to provide a direction for further researches in this area.

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

A Study on Pedestrians Tracking using Low Altitude UAV (저고도 무인항공기를 이용한 보행자 추적에 관한 연구)

  • Seo, Chang Jin
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.67 no.4
    • /
    • pp.227-232
    • /
    • 2018
  • In this paper, we propose a faster object detection and tracking method using Deep Learning, UAV(unmanned aerial vehicle), Kalman filter and YOLO(You Only Look Once)v3 algorithms. The performance of the object tracking system is decided by the performance and the accuracy of object detecting and tracking algorithms. So we applied to the YOLOv3 algorithm which is the best detection algorithm now at our proposed detecting system and also used the Kalman Filter algorithm that uses a variable detection area as the tracking system. In the experiment result, we could find the proposed system is an excellent result more than a fixed area detection system.

Roles and strategic functions of the Jeju Naval Base (제주 해군기지의 역할과 전망)

  • Lee, Choon Kun
    • Strategy21
    • /
    • s.39
    • /
    • pp.140-162
    • /
    • 2016
  • The construction of Jeju Naval Base was finally completed and donated to the Republic of Korea Navy on February 26th this year. There is no doubt that the new base will contribute to the substantial augmentation of Korea's naval power and maritime security. However, we should note that the new naval base took a long and hard twenty-three years to be completed. In the 21st century, Korea should adopt a new strategy that can fulfill the security requirements of Korea for the new age of international relations. The 21st century is characterized by globalization, and in the world of globalization, a national boarder has become meaningless. In the late 20th century, after the Cold War, trade between countries have greatly increased and so did the importance of the seas. Having transformed from an agricultural country into a commercial country, Korea went from a continental state to a maritime state. Korea has become the 9th largest trading state, and obviously, the importance of the sea has become significant. Korea's national strategic focus needs to be on the sea for national survival. Thus, since the 1990s, the Korean Navy has planned to build the Jeju Naval Base. Jeju, due to its geopolitical characteristics, is extremely important to the 21st century Korea's economy and national security. Jeju is the starting point of the sea route that reaches out to the world, and at the same time, the ending point of the sea route that heads towards Korea. Jeju is located in the center of Northeast Asia and thus, Jeju Naval Base is extremely important for the area's security and order. Jeju Naval Base will be very useful not only for the maritime security of Korea, but also for keeping peace and order in Northeast Asia. Jeju Naval Base was the minimal effort against the six sea route security threats towards Korea. The six sea route threats are: 1) Threat from North Korea; 2) China's Threat towards Korea's sovereignty; 3) China's treat towards Korea's fishery; 4) Threat from Japan; 5) Threat towards Korea's sea routes; 6) Threat from recent phenomena of isolationism of the United States. Jeju Naval Base is built for both warships and civilian ships--such as cruise ships--to use. Just like the United States' Pearl Harbor, Jeju Naval Base will become not only the largest military base, but a beautiful tourist site.

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.