• Title/Summary/Keyword: Security Event

Search Result 398, Processing Time 0.026 seconds

Analysis of the Effect of Objective Functions on Hydrologic Model Calibration and Simulation (목적함수에 따른 매개변수 추정 및 수문모형 정확도 비교·분석)

  • Lee, Gi Ha;Yeon, Min Ho;Kim, Young Hun;Jung, Sung Ho
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.1
    • /
    • pp.1-12
    • /
    • 2022
  • An automatic optimization technique is used to estimate the optimal parameters of the hydrologic model, and different hydrologic response results can be provided depending on objective functions. In this study, the parameters of the event-based rainfall-runoff model were estimated using various objective functions, the reproducibility of the hydrograph according to the objective functions was evaluated, and appropriate objective functions were proposed. As the rainfall-runoff model, the storage function model(SFM), which is a lumped hydrologic model used for runoff simulation in the current Korean flood forecasting system, was selected. In order to evaluate the reproducibility of the hydrograph for each objective function, 9 rainfall events were selected for the Cheoncheon basin, which is the upstream basin of Yongdam Dam, and widely-used 7 objective functions were selected for parameter estimation of the SFM for each rainfall event. Then, the reproducibility of the simulated hydrograph using the optimal parameter sets based on the different objective functions was analyzed. As a result, RMSE, NSE, and RSR, which include the error square term in the objective function, showed the highest accuracy for all rainfall events except for Event 7. In addition, in the case of PBIAS and VE, which include an error term compared to the observed flow, it also showed relatively stable reproducibility of the hydrograph. However, in the case of MIA, which adjusts parameters sensitive to high flow and low flow simultaneously, the hydrograph reproducibility performance was found to be very low.

For Making an Efficient Disaster Emergency Communication System for Public Safety in South Korea (국민안전 확보를 위한 긴급통신망시스템 통합구축 방안)

  • Choi, Kwan;Kim, Min-Ji
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.169-198
    • /
    • 2015
  • The purpose of present study is to provide an efficient 'Disaster Emergency Communication System' (below DECS) to deal with serious disaster situations in national levels. Currently, DECSs such as the VHF, UHF, and TRS are worked to control some disaster situations in the world. However, new system such as for sending the correct image and big data is more likely to need than current the DECSs in the comtemporary societies. Several serious disaster events such as the Sam-Poong Department Store Collapse, Daegu Subway Fire, and Sewol Submerge event, nevertheless, there was not the DECS based on the field in South Korea. In July 2014, finally, South Korean government started to provide a PS-LTE system which is the new and one system with fire fighting, police, army, railway. however, there are no many academic studies for DECSs to deal with disaster situations in South Korea. The present research highlights to explore an efficient DECS of Korean styles to fix some national security and public safety. The paper provides three key findings: first is how to make a unified Korean DECS based on PS-LTE. Second is how to make sure the frequency of 700MHz levels to communicate in the shady areas. Three is what kinds of communication facility is adequate for fixing PS-LTE DECS.

  • PDF

LxBSM: Loadable Kernel Module for the Creation of C2 Level Audit Data based on Linux (LxBSM: C2 수준의 감사 자료 생성을 위한 리눅스 기반 동적 커널 모듈)

  • 전상훈;최재영;김세환;심원태
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.10 no.2
    • /
    • pp.146-155
    • /
    • 2004
  • Currently most of commercial operating systems contain a high-level audit feature to increase their own security level. Linux does not fall behind the other commercial operating systems in performance and stability, but Linux does not have a good audit feature. Linux is required to support a higher security feature than C2 level of the TCSEC in order to be used as a server operating system, which requires the kernel-level audit feature that provides the system call auditing feature and audit event. In this paper, we present LxBSM, which is a kernel module to provide the kernel-level audit features. The audit record format of LxBSM is compatible with that of Sunshield BSM. The LxBSM is implemented as a loadable kernel module, so it has the enhanced usability. It provides the rich audit records including the user-level audit events such as login/logout. It supports both the pipe and file interface for increasing the connectivity between LxBSM and intrusion detection systems (IDS). The performance of LxBSM is compared and evaluated with that of Linux kernel without the audit features. The response time was increased when the system calls were called to create the audit data, such as fork, execve, open, and close. However any other performance degradation was not observed.

Hybrid PKI Public Certificate Security Method Based on Device ID (디바이스 ID 기반의 하이브리드 PKI 공인 인증 보안 기법)

  • Son, Young-Hwan;Choi, Woon-Soo;Kim, Ki-Hyun;Choi, Han-Na;Lee, Dae-Yoon;Oh, Chung-Shick;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.113-124
    • /
    • 2010
  • In this study, the hybrid authorization quotation technique is based on the device ID for the integrity of the source region guarantee of user certificate, in order to improve the convenience and security for user in the hybrid PKI certificate Mechanism for authentication. The feature of the model in which it is presented from this paper is 5. First, because the user can select the policy himself in which it matches with each authentication situation and security level, the convenience can be improved. Second, the integrity of the source region of the user certificate can be guaranteed through the comparison of the DLDI Key, that is the hash-value of the device ID. Third, the security can be improved by continuously changing an encoding, and the value of the key in which it decodes through the EOTP Key. Fourth, the index value is added to a certificate, and the storage of a certificate is possible at the Multi-Device. Fifth, since the addi the inan aratus for the integrity of the source region guarantee of a certificate is not needed, the authentication process time can be reduced and the computational load of the certificate server can be reduced also.

A Study on the Concept of Operations and Improvement of the Design Methodology for the Physical Protection System of the National Infrastructure - Focused on Nuclear Power Plants - (국가기반시설 물리적 방호체계 운영개념 및 설계방법 개선방안 연구: 원자력발전소를 중심으로)

  • Na, Seog-Jong;Sung, Ha-Yan;Choi, Sun-Hee
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.9-38
    • /
    • 2019
  • As the scales & density of the Korean national infrastructures have been increased, they will be identified as rich and attractive potential targets for intensified North Korea's attack in the rear region and terrorism attack. In addition, due to changes in security environment such as drone threats and lack of security forces under the 52-hour workweek law, I think that it is the proper time point to reevaluate the effectiveness and appropriateness of the current physical protection system and its shift to a new system. In this study, the direction and improvement of the perimeter physical protection systems of the national infrastructures are to be studied from the viewpoints of its concepts of operations and design methodology, focusing on the nuclear power plant. The reason why we focus on nuclear power plants is because they cause wide-range and long-term damages caused by radioactive materials disperal and pollution, along with short-term damage caused by the interruption of electricity generation in the event of damage to nuclear power plants. With the aim of extracting improvement directions, as we will comprehensively review domestic research trends and domestic·overseas related laws, and consider Korea's specificity, we try to reframe the concept of operation - systematization, mobilization and flexibility -, and establish criteria on system change. In order to improve the technical performance of the new perimeter physical protection system, we study on high-fidelity·multi-methodology based integrated design methodology, breaking from individual silo-type design methods, and I suggest improvement of government procurement, its expansion to export business and other national infrastructure.

Human Security Dimension Israel-Hamas War and Security Policy Implications (인간안보 차원 이스라엘-하마스 전쟁과 안보정책적 함의)

  • Il Soo Bae;Hee Tae Jeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.17-22
    • /
    • 2024
  • The war that broke out on October 7, 2023 is prolonging and expanding into the Middle East. Although the damage from war is increasing, humanitarian aid to the Gaza Strip has been halted due to UNRWA's deviant actions. Powerful countries have suspended support, and the UN is appealing for support for the Gaza Strip. All damage is borne by civilians in the Gaza Strip, especially women, children, and the elderly. Israel has selected an evacuation zone and evacuation route in the Gaza Strip and established a humanitarian aid route in the border area. However, Hamas's resistance in underground tunnels, using civilian-dense areas and civilian facilities such as hospitals and schools as shields, further amplified civilian casualties. This Israel-Hamas war requires the international community to approach it from a human security perspective. We must strengthen the UN's functions and roles to ensure that humanitarian supplies reach the field and humanitarian intervention forces ensure human dignity and basic rights. We must restore the credibility of the UN's role through the Israel-Hamas war. In addition, Korea should urge the introduction of humanitarian aid and goods, and provide humanitarian goods such as daily necessities and medicine. We must also prepare for deployment as a member of the UN peacekeeping force in the future. These activities will help Korea develop into a model country that fulfills its role as a 'global pivotal nation' and will have a virtuous cycle of international support in the event of a future crisis on the Korean Peninsula.

A Study of Simulation Method for Evaluation of Civil Military Operations Performance Level (민군작전 수행수준평가 모의방안 연구)

  • Song, In-Hoy
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.2
    • /
    • pp.13-20
    • /
    • 2016
  • In times of current warfare, importance of civil military operations(CMO) is more on the rise because the military winning does not couple the political winning immediately. For this reason, CMO Model Development Program has been commenced by ROK JCS since FY 2014. As CMO is non-kinetic operations which is focused on civilians, it depends on the commander's decision that reflects the results of the evaluation of the CMO performance level. The evaluation of CMO performance level is a very important factor of this model. So, I decided my subject a study of simulation method for evaluation of CMO Performance level. It is affected in CMO performance level by the occurrence of some event, and the achievement results of CMO for the response action on such event is evaluated by the 5 factors(administration level, security level, infrastructure level, humanitarian support level, friendship level) on the evaluation of CMO performance level. Even more it is affected in achievement of new CMO and new event by evaluation results. In this study, I provided a methodology of how apply the evaluation results and how simulate the achievement results of CMO performance with the 5 factors on the evaluation of CMO Performance level. Also this study is expected that it will be highly contributed to training and exercise in CMO branch in ROK JCS, when CMO Model Development Program is done as a new model applied such evaluation factors matching military environment in the Korean Peninsular, and applied this simulation method for evaluation of CMO Performance level.

HSE System Safety Management Using Wearable Based on Accident Scenario of High Place Work (고소작업 사고 시나리오 기반 웨어러블 응용 HSE 시스템 안전관리 방안)

  • Cho, Yun-Jeong;Im, Ki-Chang;Lim, Dong-Sun;Park, Jeong-Ho;Kim, Jong-Myon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.417-425
    • /
    • 2018
  • This paper proposes a safety management method that extracts ETA (event tree analysis) based scenario and combines ICT technology to reduce serious disasters occurring workplace for shipbuilding and offshore plant. The statistics of Safety and Health Agency and (previous)Ministry of Public Safety and Security show that the most frequent accident among the serious disasters related to shipbuilding and offshore plant is falling. The main cause of accidents is absence of a safety belt and safety belt ring. To solve these problems, we create ETA based scenarios to derive results based on safety considerations. Based on these results, we propose a solution by applying ICT technology for accident prevention. Deriving ETA based scenarios and ICT technology, the proposed solutions include a system for detecting the wearing of safety belts and safety helmets, a system for detecting whether or not the safety belts are connected, and a hook system for measuring safety distances. These safety related systems can reduce the probability of death of workers. By preventing accidents using the proposed method, we can reduce serious disasters in shipbuilding and offshore plant and establish systematic safety management.

A Study on the Maritime Law According to the Occurrence of Marine Accidents of MASS(Maritime Autonomous Surface Ship) (자율운항선박의 해양사고 발생에 따른 해상법적 고찰)

  • Lee, Young-Ju
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.37-56
    • /
    • 2023
  • Recently, with the rapid development of ICT(Information and Communication Technology) and AI(Artificial Intelligence) technology industries, the emergence of MASS(Maritime Autonomous Surface Ship), which were thought only in the distant future, is approaching a reality. Along with the development of these amazing technologies, changes in the private law sector, such as liability, compensation for damages, and maritime insurance, as well as in the public law sector, such as maritime safety, marine environment protection, and maintenance of maritime order, have become necessary in the field of maritime law. In particular, with the advent of a new type of ship called MASS that does not have a crew on board, the kind and type of liability, compensation for damages, and insurance contracts in the event of a marine accident will also change. In this paper, the general theory about concept, classification, effectiveness and future of MASS and the general theory about concept and various obligations and responsibilities under the maritime law for discussion of MASS are reviewed. Next, in addition, regarding the problems that may occur in the event of a marine accident from MASS, the status as a ship, the legal relationship of the chartering contract, obligation to exercise due diligence in making the vessel seaworthiness, subject of responsibility, and liability for damages and immunity are reviewed from the perspective of maritime law. In addition, in the degree four of MASS, the necessities of further research to clarify the attributable subjects and standards of responsibility in the event of a marine accident, as well as the necessities of institutional improvement such as technology development, enactment and amendment of law and funding are presented.

  • PDF

Convertible Bond Issue Announcements and Stock Price Changes: Focusing on Domestic and Offshore CB Issues (전환사채 발행공시와 주식가격 변화: 국내외 전환사채 발행을 중심으로)

  • Lee, Hyun-Chul
    • International Area Studies Review
    • /
    • v.15 no.1
    • /
    • pp.87-106
    • /
    • 2011
  • Using an event study, this paper investigates stock price reactions on Korean listed firms' convertible bond (CB) issue announcements over the sample period of January 2000 to November 2007. This study finds that on the Korean Security market, the CB issue announcements are associated with an increase in shareholder wealth on the announcement date. An information leakage by insider traders is also observable at preannouncement dates. Unlike the prior studies that indicate a prevailing negative effect on the announcements, this paper shows that domestic CB issue announcements as well as offshore ones yield a positive impact on the stock prices. This presents that in terms of stock price reactions to the CB issue announcements, the two CB issue markets show the positively same effects on shareholder wealth for the post-2000 period. For its drivers, this paper suggests that on the Korean market, firm size have negative relationship with the increase in the wealth incurred by the announcements. By contrast, an issue to maturity, a growth opportunity, and a relative issue size make a positive impact on it.