• Title/Summary/Keyword: Security Inspection

Search Result 223, Processing Time 0.029 seconds

A Method for Generating Floor Response Spectra for Seismic Design for Non-Structural Components (비구조요소의 내진 설계를 위한 층응답스펙트럼 생성 기법)

  • Chang, Sung-Jin;Park, Dong-Uk;Kim, Jae-Bong
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.23 no.1
    • /
    • pp.154-162
    • /
    • 2019
  • Large scale damage has been globally increased due to natural disasters such as earthquake. Although a variety of studies secured seismic performance of buildings, casualties and economic loss have occurred because of poor security of seismic performance in non-structural components. Structure's location on which non-structural components are installed and characteristics of vibration occurring on each position of structures are varied, so a response spectrum is required for each position of structures. In addition, a response spectrum occurring in a structure is different, depending on the form of it and positions on which it is installed. Therefore, selection of a response spectrum is important, so a definite method for calculating the response spectrum which acts on non-structural components is necessary. A method for choosing a response spectrum is suggested in this paper, and a structural analysis was conducted with the suggested method, by selecting a ground response spectrum and a structural system, which may occur in Korea. Moreover, it helps create a response spectrum necessary for a seismic test of non-structural components, by suggesting the method for deduction it, with a simple formula.

Development of X-Ray Array Detector Signal Processing System (X-Ray 어레이 검출 모듈 신호처리 시스템 개발)

  • Lim, Ik-Chan;Park, Jong-Won;Kim, Young-Kil;Sung, So-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1298-1304
    • /
    • 2019
  • Since the 9·11 terror attack in 2001, the Maritime Logistics Security System has been strengthened and required X-ray image for every imported cargos from manufacturing countries to United States. For scanning cargos, the container inspection systems use high energy X-rays for examination of contents of a container to check the nuclear, explosive, dangerous and illegal materials. Nowadays, the X-ray cargo scanners are established and used by global technologies for inspection of suspected cargos in the customs agency but these technologies have not been localized and developed sufficiently. In this paper, we propose the X-ray array detector system which is a core component of the container scanning system. For implementation of X-ray array detector, the analog and digital signal processing units are fabricated with integrated hardware, FPGA logics and GUI software for real-time X-ray images. The implemented system is superior in terms of resolution and power consumption compared to the existing products currently used in ports.

Modeling of Collection Process for Real-time Forensic Data (포렌식 데이터의 실시간 수집 절차 모델링)

  • Kim, Tae-Hoon;Park, Nam-Kyu;Choi, Han-Na;Lee, Dae-Yoon;Ahn, Jong-Deuk;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.139-145
    • /
    • 2009
  • This study proposes a model of collection process for real-time forensic data, in which the manager was to respond to infringement incidents in terms of system operation and inspection and to collect, analyze and restore forensic data immediately after an incident took place. The suggested model was modeled in seven processes according to functional elements. Unlike the old and managerial forensic processes, the model allowed the manager to react to infringement incidents in the aspects of system operation and inspection and to follow the processes of collecting, analyzing, and restoring forensic data in case of an incident. There also was a feedback process designed towards the step of gathering forensic data through the stages of systematizing reaction strategies in order that he or she be able to bring about comprehensive and structural responses to an incident like the former processes in which it is difficult to bring about instant responses.

The Study about Problem in the course of Education of Special Guard (특수경비원 교육훈련실태 및 발전방안에 관한 연구)

  • Kang, Gil-Hoon
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.291-326
    • /
    • 2003
  • The first, Improvement of education training condition Education training is influenced by facilities, environment around. according to questionnaire, it is very poor, we should set up a training institute as soon as possible. The second, Improvement of education training contents In working as special guard, they do not feel the need of curriculums like bayonet fencing, criminal law, and so on. accordingly we should adjust the contents of educaton training. The third, Improvement of education training course People were satisfied with the contents of lectures and educator more than half to some degree, but there was a question of time, communication, contents. we should try to remedy things like this. The fourth, Adjustment of education training time The 60% people of all were not satisfied with the time of education training about new duty. we need to intensify and oversee a duty training and the restructure of training time. The fifth, Fairness of valuation reward and punishment in education training The 80% people of all had the bad feeling against reward and punishment, so we tried to let fairness of valuation, reward and punishment completed by educational institution. The sixth, Establishment of the institution for special guard special guard have to be raised by special institution, but lacking of educational program, educational facility, educational Environment, university took the place of government as institution in raising special guard, education still leave much to be desired. so to develop the industry of a civil security, government or a guard association will set up the school of training, education, system about civil security as a whole. The seventh, Improvement of education training form People have to be taught for 80 hours in education training. according to questionnaire, over 75%people wanted to lodge at education accommodation, so in doing education training, we need to improve a system and form. The eighth, Operation of education training suitable for a characteristic in jobs In the education of 80 hours, common courses will need to be carried out together, depending on class, the object of national facility, inspection and practice will need to be done. maybe this can be the improvement of growing up education training. In the result of the study, we need to build up the satisfaction of education training through a lot of opinion like program, system, circumstances. Keep in mind that the paper was a few of problems because of the limit of the survey of 132 peoples, accordingly we try to collect a survey related with this around country. especially this will need to be asked for harmony between the law and the background of system. in the future, to develop the special guard service, increase the demand of this service, have to raised the expert and the special guard service has to enlarge.

  • PDF

Detection and Blocking Techniques of Security Vulnerability in Android Intents (안드로이드 인텐트의 보안 취약성 탐지 및 차단 기법)

  • Yoon, Chang-Pyo;Moon, Seok-jae;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.666-668
    • /
    • 2013
  • Recently, the kind and number of malicious code, which operates in Operation System of smart devices, are rapidly increasing along with the fast supplement of smart devices. Especially, smart devices based on Android OS have high potential of danger to expose to malicious code as it has an easy access to system authority. When using intent, the global message system provided from Android, inter approach between applications is available, and possible to access to created data by the device. Intent provides convenience to application development in the aspect of reusability of component however, it could be appointed as a risk element in security-wise. Therefore, if intent is used in malicious purpose, it is easy to lead the condition where is weak on security. That is, it is possible to control as accessing to resources which application is carrying to operate by receiving intents as making smart device uncontrollable or consuming system resources. Especially, in case of system authority is achieved, the risks such as smart device control or personal information exposure become bigger when misusing broadcast intent through malicious code. This paper proposes a corresponding method of security vulnerability of Android intent that monitors the appearance of intent with intent pattern inspection, detects and blocks unidentified pattern intent.

  • PDF

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.

Construction of Truss Bridge Database for 3-D Shape and Structural Analysis Information by using ISO10303 Application Protocols (ISO10303 응용프로토콜을 이용한 트러스교의 3차원 형상 및 해석정보 데이터베이스 구축)

  • Lim, Seung-Wan;Kim, Bong-Geun;Kim, Hyo-Jin;Lee, Sang-Ho
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.1
    • /
    • pp.81-89
    • /
    • 2009
  • A web-based information management system to share engineering data of truss bridge is developed through construction of standardized database of truss bridge. 3D shape information is stored in database according to AP 203 of STEP, and 3D visualization on the web is implemented by using the web 3D technology that helps users to understand geometrical shape of structures, directly. AP209 is used to store structural analysis information such as finite elements, material properties, and analysis result into relational database. Based on the developed database, a prototype of integrated information management system for truss bridge is developed, and it provides additional information such as specifications and inspection information related with shape object to end users.

  • PDF

Evaluation of Aggregates Properties Depending on Producing Sectors and Regions in Korea (전국 골재산지 권역별 콘크리트용 골재의 물성 평가)

  • Han, Min-Cheol;Lee, Jun-Seok
    • Journal of the Korea Institute of Building Construction
    • /
    • v.17 no.6
    • /
    • pp.499-506
    • /
    • 2017
  • This study is to present empirical data about the needs for quality security of aggregate by randomly selecting aggregate from 4 major locations including A, B, C, D province in Korea, by investigating its quality status in terms of physical properties and particle distribution based on Korean industrial standards(KS). The test results indicated that wide variance in quality, and some of aggregate samples were far below the standard, still many of them are not satisfying KS standards. In addition, the current aggregate manufacturing process that does not include inspection of particle size distribution by sieving and fineness modulus, can induce a possibility of non-KS aggregate's distribution; this provide that the current status of aggregate quality security of Korea is seriously threatened. Thus, it is important to secure each aggregate's quality level under KS standards.

A Study on Some Major Clauses of a Payment Guarantee in International Transactions (국제거래에서 대금지급보증서(payment guarantee)의 주요 조항에 대한 연구)

  • Kim, Sang Man
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.58
    • /
    • pp.179-213
    • /
    • 2013
  • While a performance type guarantee is required as a security for non-performance risk by a seller, a payment guarantee is used as a security for non-payment risk by a buyer(or a borrower in a loan agreement). A payment guarantee is a type of independent bank guarantee, bank guarantee, bond, demand guarantee, or standby letter of credit. A guarantor accepts a credit risk of a principal which is normally a buyer in a contract for sale of goods. A payment guarantee is independent of the underlying relationship between the applicant and the beneficiary. The guarantor is only empowered to examine the beneficiary's demand and determine the payment on its face to the terms of the guarantee. A payment guarantee is thus different from a suretyship. The principle of independence carries a significant advantages for a guarantor as well as for a beneficiary. While a documentary credit requires B/L, commercial invoice, packing list, inspection certificate, etc., a typical payment guarantee does not require any evidence for a seller's performance of the underlying contract other than written demand. In this respect payment guarnatee can be a more secured facility than a documentary credit. A payment guarantee normally comes into force from the issuing date and shall remain in effect until all sums guaranteed shall be paid in full by a buyer(or a borrower) or by a guarantor. Although a guarantor shall pay a demand made in accordance with the terms and conditions of the payment guarantee, a payment demand may be denied when it is determined to be abusive or unfair.

  • PDF

An Efficient Update Algorithm for Packet Classification With TCAM (TCAM을 이용한 패킷 분류를 위한 효율적인 갱신 알고리즘)

  • Jeong Haejin;Song Ilseop;Lee Yookyoung;Kwon Taeckgeun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2A
    • /
    • pp.79-85
    • /
    • 2006
  • Generally, it is essential that high-speed routers, switches, and network security appliances should have an efficient packet classification scheme in order to achieve the high-speed packet forwarding capability. For the multi-gigabit packet-processing network equipment the high-speed content search hardware such as TCAM and search engine is recently used to support the content-based packet inspection. During the packet classification process, hundreds and thousands of rules are applied to provide the network security policies regarding traffic screening, traffic monitoring, and traffic shaping. In addition, these rules could be dynamically changed during operations of systems if anomaly traffic patterns would vary. Particularly, in the high-speed network, an efficient algorithm that updates and reorganizes the packet classification rules is critical so as not to degrade the performance of the network device. In this paper, we have proposed an efficient update algorithm using a partial-ordering that can relocate the dynamically changing rules at the TCAM. Experimental results should that our algorithm does not need to relocate existing rules feature until 70$\%$ of TCAM utilization.