• Title/Summary/Keyword: Security Evaluation System

Search Result 672, Processing Time 0.032 seconds

Face Recognition Evaluation of an Illumination Property of Subspace Based Feature Extractor (부분공간 기반 특징 추출기의 조명 변인에 대한 얼굴인식 성능 분석)

  • Kim, Kwang-Soo;Boo, Deok-Hee;Ahn, Jung-Ho;Kwak, Soo-Yeong;Byun, Hye-Ran
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.681-687
    • /
    • 2007
  • Face recognition technique is very popular for a personal information security and user identification in recent years. However, the face recognition system is very hard to be implemented due to the difficulty where change in illumination, pose and facial expression. In this paper, we consider that an illumination change causing the variety of face appearance, virtual image data is generated and added to the D-LDA which was selected as the most suitable feature extractor. A less sensitive recognition system in illumination is represented in this paper. This way that consider nature of several illumination directions generate the virtual training image data that considered an illumination effect of the directions and the change of illumination density. As result of experiences, D-LDA has a less sensitive property in an illumination through ORL, Yale University and Pohang University face database.

Optical Encryption of Binary Information using 2-step Phase-shifting Digital Holography (2-단계 위상 천이 디지털 홀로그래피를 이용한 이진 정보 광 암호화 기법)

  • Byun, Hyun-Joong;Gil, Sang-Keun
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.5
    • /
    • pp.401-411
    • /
    • 2006
  • We propose an optical encryption/decryption technique for a security system based on 2-step phase-shifting digital holography. Phase-shilling digital holography is used for recording phase and amplitude information on a CCD device. 2-step phase-shifting is implemented by moving the PZT mirror with phase step of 0 or ${\pi}/2$. The binary data and the key are expressed with random code and random phase patterns. The digital hologram is a Fourier transform hologram and is recorded on CCD with 256 gray level quantization. We remove the DC term of the digital hologram fur data reconstruction, which is essential to reconstruct the original binary input data/image. The error evaluation fer the decrypted binary data is analyzed. One of errors is a quantization error in detecting the hologram intensity on CCD, and the other is generated from decrypting the data with the incorrect key. The technique using 2-step phase-shifting holography is more efficient than a 4-step method because 2-step phase-shifting holography system uses less data than the 4-step method for data storage or transmission. The simulation shows that the proposed technique gives good results fur the optical encryption of binary information.

A Study on the Characteristics of Underwater Explosion for the Development of a Non-Explosive Test System (무폭약 시험 장치 개발을 위한 수중폭발 특성에 대한 연구)

  • Lee, Hansol;Park, Kyudong;Na, Yangsub;Lee, Seunggyu;Pack, Kyunghoon;Chung, Hyun
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.57 no.6
    • /
    • pp.322-330
    • /
    • 2020
  • This study deals with underwater explosion (UNDEX) characteristics of various non-explosive underwater shock sources for the development of non-explosive underwater shock testing devices. UNDEX can neutralize ships' structure and the equipment onboard causing serious damage to combat and survivability. The shock proof performance of naval ships has been for a long time studied through simulations, but full-scale Live Fire Test and Evaluation (LFT&E) using real explosives have been limited due to the high risk and cost. For this reason, many researches have been tried to develop full scale ship shock tests without using actual explosives. In this study, experiments were conducted to find the characteristics of the underwater shock waves from actual explosive and non-explosive shock sources such as the airbag inflators and Vaporizing Foil Actuator (VFA). In order to derive the empirical equation for the maximum pressure value of the underwater shock wave generated by the non-explosive impact source, repeated experiments were conducted according to the number and distance. In addition, a Shock Response Spectrum (SRS) technique, which is a frequency-based function, was used to compare the response of floating bodies generated by underwater shock waves from each explosion source. In order to compare the magnitude of the underwater shock waves generated by each explosion source, Keel Shock Factor (KSF), which is a measure for estimating the amount of shock experienced by a naval ship from an underwater explosionan, was used.

A Study on Improving Plan of the Evaluating System for Efficient Defense M&S Accreditation Work (효율적인 국방M&S 인정업무 수행을 위한 평가시스템 발전방안 연구)

  • Han, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.42-48
    • /
    • 2021
  • Recently, the defense industry has been improving high technology by developing convergence technology through the 4th industrial revolution. On the other hand, it is very difficult to guarantee the performance of high-tech weapon systems because the test for weapon systems has many risks and cannot perform in an actual operating environment. Therefore, M&S resources are needed to make sound weapon systems, but many people demand reliable M&S resources. Owing to the continuous demand and execution of the VV&A work, related rules have developed significantly, but tools and techniques for performing the work have not been developed. Hence, there are inefficient parts in the performance of work due to the absence of a systematic system. Accordingly, many risks may cause various safety accidents, such as security. This paper suggests a direction for the development of VV&A work procedures by improving efficiency and reducing risk.

Evaluation of SPACE Code Prediction Capability for CEDM Nozzle Break Experiment with Safety Injection Failure (안전주입 실패를 동반한 제어봉구동장치 관통부 파단 사고 실험 기반 국내 안전해석코드 SPACE 예측 능력 평가)

  • Nam, Kyung Ho
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.5
    • /
    • pp.80-88
    • /
    • 2022
  • The Korean nuclear industry had developed the SPACE (Safety and Performance Analysis Code for nuclear power plants) code, which adopts a two-fluid, three-field model that is comprised of gas, continuous liquid and droplet fields and has the capability to simulate three-dimensional models. According to the revised law by the Nuclear Safety and Security Commission (NSSC) in Korea, the multiple failure accidents that must be considered for the accident management plan of a nuclear power plant was determined based on the lessons learned from the Fukushima accident. Generally, to improve the reliability of the calculation results of a safety analysis code, verification is required for the separate and integral effect experiments. Therefore, the goal of this work is to verify the calculation capability of the SPACE code for multiple failure accidents. For this purpose, an experiment was conducted to simulate a Control Element Drive Mechanism (CEDM) break with a safety injection failure using the ATLAS test facility, which is operated by Korea Atomic Energy Research Institute (KAERI). This experiment focused on the comparison between the experiment results and code calculation results to verify the performance of the SPACE code. The results of the overall system transient response using the SPACE code showed similar trends with the experimental results for parameters such as the system pressure, mass flow rate, and collapsed water level in component. In conclusion, it can be concluded that the SPACE code has sufficient capability to simulate a CEDM break with a safety injection failure accident.

A Comparative Study of Korean Home Economic Curriculum and American Practical Problem Focused Family & Consumer Sciences Curricula (우리나라 가정과 교육과정과 미국의 실천적 문제 중심 교육과정과의 비교고찰)

  • Kim, Hyun-Sook;Yoo, Tae-Myung
    • Journal of Korean Home Economics Education Association
    • /
    • v.19 no.4
    • /
    • pp.91-117
    • /
    • 2007
  • This study was to compare the contents and practical problems addressed, the process of teaching-learning method, and evaluation method of Korean Home Economics curriculum and of the Oregon and Ohio's Practical Problem Focused Family & Consumer Sciences Curricula. The results are as follows. First, contents of Korean curriculum are organized by major sub-concepts of Home Economics academic discipline whereas curricular of both Oregon and Ohio states are organized by practical problems. Oregon uses the practical problems which integrate multi-subjects and Ohio uses ones which are good for the contents of the module by integrating concerns or interests which are lower or detailed level (related interests). Since it differentiates interest and module and used them based on the basic concept of Family and Consumer Science, Ohio's approach could be easier for Korean teachers and students to adopt. Second, the teaching-learning process in Korean home economics classroom is mostly teacher-centered which hinders students to develop higher order thinking skills. It is recommended to use student-centered learning activities. State of Oregon and Ohio's teaching-learning process brings up the ability of problem-solving by letting students clearly analyze practical problems proposed, solve problems by themselves through group discussions and various activities, and apply what they learn to other problems. Third, Korean evaluation system is heavily rely on summative evaluation such as written tests. It is highly recommended to facilitate various performance assessment tools. Since state of Oregon and Ohio both use practical problems, they evaluate students mainly based on their activity rather than written tests. The tools for evaluation include project documents, reports of learning activity, self-evaluation, evaluation of discussion activity, peer evaluation in a group for each students for their performance, assessment about module, and written tests as well.

  • PDF

An Evaluation of the Private Security Industry Regulations in Queensland : A Critique (호주 민간시큐리티 산업의 비판적 고찰 : 퀸즐랜드주를 중심으로)

  • Kim, Dae-Woon;Jung, Yook-Sang
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.7-35
    • /
    • 2015
  • The objective of this article is to inform and document the contemporary development of the private security industry in Queensland Australia, a premier holiday destination that provide entertainment for the larger region. The purpose of this review is to examine the comtemporary development of mandated licensing regimes regulating the industry, and the necessary reform agenda. The overall aim is threefold: first, to chart the main outcomes of the two-wave of reforms since the mid-'90s; second, to examine the effectiveness of changes in modes of regulation; and third, to identify the criteria that can be considered a best practice based on Button(2012) and Prenzler and Sarre's(2014) criteria. The survey of the Queensland regulatory regime has demonstrated that, despite the federal-guided reforms, there remain key areas where further initiatives remain pending, markedly case-by-case utilisation of more proactive strategies such as on-site alcohol/drug testing, psychological evaluations, and checks on close associates; lack of binding training arrangement for technical services providers; and targeted auditing of licensed premises and the vicinity of venues by the Office of Fair Trading, a licensing authority. The study has highlighted the need for more determined responses and active engagements in these priority areas. This study of the development of the licensing regimes in Queensland Australia provides useful insights for other jurisdictions including South Korea on how to better manage licensing system, including the measures required to assure an adequate level of professional competence in the industry. It should be noted that implementing a consistency in delivery mode and assessment in training was the strategic imperative for the Australian authority to intervene in the industry as part of stimulating police-private partnerships. Of particular note, competency elements have conventionally been given a low priority in South Korea, as exemplified through the lack of government-sponsored certificate; this is an area South Korean policymakers must assume an active role in implementing accredited scheme, via consulting transnational templates, including Australian qualifications framework.

  • PDF

Basic Research for Preparation of a Disabled-Inclusive Public Disaster Management System (장애포괄적 재난관리체계 마련을 위한 기초 연구)

  • Kim, Soungwan;Roh, Sungmin
    • 재활복지
    • /
    • v.20 no.1
    • /
    • pp.1-22
    • /
    • 2016
  • This research aimed to examine the problems in a current national emergency management system that does not consider the disabled in the face of manmade catastrophes and natural disasters, and to conduct an expert opinion survey to explore the direction of disabled-inclusive public disaster management system. As a result of the analysis, the respondents of the survey revealed a need for a designated government department for disaster management systems for the disabled and the experts preferred the Ministry of Public Safety and Security (50%) than the Ministry of Health and Welfare (37.5%). However, 12.5% of the surveyed experts perceived cooperation between the two Ministries, rather than selecting a certain ministry, as necessary to establish a disaster management system for the disabled. Additionally, the experts recognized the response period (43.8%) of the disaster management life cycle to be the most important phase. Thus, at the disaster response period, the experts suggested utilizing an emergency alarm system to effectively rescue the disabled in the face of disaster. Based on this discussion, the paper explores ways to establish a disabled-inclusive public disaster management system.

The Evaluation of Effectiveness on RFID system based Logistics process (RFID 시스템 기반 물류프로세스 유효성 평가)

  • Choi, Yong-Jung;Han, Dae-Hee;Jeong, Hae-June;Han, Woo-Chul;Kim, Hyun-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.111-120
    • /
    • 2010
  • Looking at the application examples related to RFID systems around the world, it is easy to find that RFID systems are introduced in various industries, such as retail and consumer goods sectors, financial and security sectors, automotive and transport sector, leisure and sports sector, logistics, and health-related fields. This is because they can get their operational efficiency and competitiveness by means of product's visibility and transparency of information through RFID systems. However, it is required that evaluation of effectiveness on introducing RFID systems should be performed to strengthen construction willingness of RFID systems before actual introduction of the RFID systems in the process. This activity affects to introduction of RFID systems in industry-wide and then, will be able to create a synergy effect such as national industrial competitiveness improvement. The purpose of this study is to offer rational method on effectiveness analysis before and after RFID based process. Accordingly, the proposed Choquet fuzzy integral-based model will be allowed rational analysis by integrating quantitative and qualitative analysis. Through the effectiveness analysis of C company's RFID based process using the proposed evaluation model, we could identify that RFID-based logistics process was more effective than existing process.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.