• 제목/요약/키워드: Security Integration

검색결과 447건 처리시간 0.207초

Ways of Integration of Media and Educational Space: Problems and Solutions

  • Bordeniuk, Serhii;Nebera, Pavlo;Priadko, Oleksandr;Timlin, Eduard;Khymych, Anatolii
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.61-64
    • /
    • 2021
  • The work is devoted to the problem of modernization of the higher education system of Ukraine through the integration of higher education institutions into the European Higher Education Area. Based on the analysis of statistical data, a conclusion was made about the collapse of the higher education system of Ukraine due to a number of problems, which negatively affects the formation of human capital. The importance of international cooperation with the EU in the field of education for the modernization of higher education is substantiated. The institutional principles of formation are investigated, the main priorities of its development at the present stage are determined. The legal bases of European integration of higher education in Ukraine are analyzed. An analysis of the development of international cooperation of Ukrainian universities and their participation in European educational programs. There is a positive tendency to increase the activity of Ukrainian universities in international cooperation, which increases their position in international rankings. Weaknesses of integration processes are revealed and directions of improvement of higher education are offered.

A Security Metrics Taxonomization Model for Software-Intensive Systems

  • Savola, Reijo M.
    • Journal of Information Processing Systems
    • /
    • 제5권4호
    • /
    • pp.197-206
    • /
    • 2009
  • We introduce a novel high-level security metrics objective taxonomization model for software- intensive systems. The model systematizes and organizes security metrics development activities. It focuses on the security level and security performance of technical systems while taking into account the alignment of metrics objectives with different business and other management goals. The model emphasizes the roles of security-enforcing mechanisms, the overall security quality of the system under investigation, and secure system lifecycle, project and business management. Security correctness, effectiveness and efficiency are seen as the fundamental measurement objectives, determining the directions for more detailed security metrics development. Integration of the proposed model with riskdriven security metrics development approaches is also discussed.

A Study on Guarding Security Portion in Protecting Operation and Application of Electronic Security (경호업무의 경비영역과 기계경비의 적용 방안)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • 제4호
    • /
    • pp.319-341
    • /
    • 2001
  • Most of protecting security activity is carried out by manpower partly by security equipment. The protecting security market and the area of protecting security activity is increasing in spite of change of economic and social environment situation. For more effective protecting security activity, the coordination of electronic equipment and manpower is required. So some application method is suggested throughout the thesis, which is especially focused on new approaching method. The integration of intrusion detecting system, C.C.TV system and Access control system is introduced for general application in chapter III, and some application systems are proposed for protecting security activity in chapter IV. But the security equipment is only aid for manpower, so manpower and equipment should be coordinated well.

  • PDF

A Method on the Implementation of Intelligent Security Service Application based on Spatial Information (공간정보기반 지능형 방범서비스 어플리케이션 개발)

  • Choi, Woo Chul;Na, Joon Yeop
    • Spatial Information Research
    • /
    • 제23권6호
    • /
    • pp.89-98
    • /
    • 2015
  • In this study, The criteria for assessing the security-related functions and services using spatial information is deduced, and orders of priority a priority for the applicable alternatives of functions/services of intelligent security service application based on spatial information are suggested by calculating relative importance. Also this study suggested connection plan about service implementation of national security services by government ministry & local government. And, the intelligent security app service model which has possible substantiation and commercialization is proposed. This study performed the AHP as the final assessment criterions by 3 item in 1st class and 12 item in 2nd class. And, tried to implementation methods of the intelligent security service application(ex. control of emergency and the crime opportunity, real-time location tracking of protector, the device for missing child & dementia patient, user participation & provision of information).

Impacts of Wind Power Integration on Generation Dispatch in Power Systems

  • Lyu, Jae-Kun;Heo, Jae-Haeng;Kim, Mun-Kyeom;Park, Jong-Keun
    • Journal of Electrical Engineering and Technology
    • /
    • 제8권3호
    • /
    • pp.453-463
    • /
    • 2013
  • The probabilistic nature of renewable energy, especially wind energy, increases the needs for new forms of planning and operating with electrical power. This paper presents a novel approach for determining the short-term generation schedule for optimal operations of wind energy-integrated power systems. The proposed probabilistic security-constrained optimal power flow (P-SCOPF) considers dispatch, network, and security constraints in pre- and post-contingency states. The method considers two sources of uncertainty: power demand and wind speed. The power demand is assumed to follow a normal distribution, while the correlated wind speed is modeled by the Weibull distribution. A Monte Carlo simulation is used to choose input variables of power demand and wind speed from their probability distribution functions. Then, P-SCOPF can be applied to the input variables. This approach was tested on a modified IEEE 30-bus system with two wind farms. The results show that the proposed approach provides information on power system economics, security, and environmental parameters to enable better decision-making by system operators.

Taking over process of the East Germany People's Police by the West Germany (동서독 경찰통합 과정에서의 동독 인민경찰의 흡수.활용)

  • Hwang, Mungyu;Park, HyungSik
    • Convergence Security Journal
    • /
    • 제13권5호
    • /
    • pp.157-165
    • /
    • 2013
  • This study examines how East German police was absorbed into the Unified Germany Police. The experience of Germany suggests a few implications and preview points when the two Koreas unify how North Korean police to absorb and utilize, which is the purpose of this study. According to a study, in a unified transition in North Korea, 110,000 police forces is needed in order to cope with an outbreak of rioting and public disorder in North Korea. It is never easy, in an imminent unification, to secure a large number of police forces in a short time. We cannot help making the best use of North Korean police. At this point, the German case would be nice for us to see the implications presented. Because West German police led the integration of East Germany in the People's Police, and reemployed them under certain conditions. As a result, by taking over the People's Police of North Korea without friction with the security of the high security demand required by the unification process in the future, it is necessary to achieve seamless integration of the North-South police.

Integration of Secure Distributed Object-Oriented Database Schemas (보안 분산 객체지향 데이타베이스 스키마의 통합)

  • Park, U-Geun;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • 제2권5호
    • /
    • pp.645-654
    • /
    • 1995
  • A distributed DBMS integrates local schemas that are independently designed, maintained, and managed by different users at each site providing a global virtual schema. This global schema supports users at a specific site to transparently utilize local database at different sites. The security features of the local schema should also not be changed in the global schema integrating security features of each local schema. Researches on the integration of security features into local schema in distributed DBMS environment, however, are very rate. This pater using the multilevel secure object-oriented database model(as the model for the definition of a local schema in distributed environment) which is an extension of the object-oriented models. It also suggests eight integration methods that can maintain the security features of local schemas. The eight methods are classified by the object classes and by relationships among them.

  • PDF

Self-Driving and Safety Security Response : Convergence Strategies in the Semiconductor and Electronic Vehicle Industries

  • Dae-Sung Seo
    • International journal of advanced smart convergence
    • /
    • 제13권2호
    • /
    • pp.25-34
    • /
    • 2024
  • The paper investigates how the semiconductor and electric vehicle industries are addressing safety and security concerns in the era of autonomous driving, emphasizing the prioritization of safety over security for market competitiveness. Collaboration between these sectors is deemed essential for maintaining competitiveness and value. The research suggests solutions such as advanced autonomous driving technologies and enhanced battery safety measures, with the integration of AI chips playing a pivotal role. However, challenges persist, including the limitations of big data and potential errors in semiconductor-related issues. Legacy automotive manufacturers are transitioning towards software-driven cars, leveraging artificial intelligence to mitigate risks associated with safety and security. Conflicting safety expectations and security concerns can lead to accidents, underscoring the continuous need for safety improvements. We analyzed the expansion of electric vehicles as a means to enhance safety within a framework of converging security concerns, with AI chips being instrumental in this process. Ultimately, the paper advocates for informed safety and security decisions to drive technological advancements in electric vehicles, ensuring significant strides in safety innovation.

Creation of Integrated of Industrial Security with the use of Modern Information Technology

  • Sattarov, Sh.B.;Adilov, F.T.;Ivanyan, A.I.
    • Journal of Multimedia Information System
    • /
    • 제2권3호
    • /
    • pp.281-286
    • /
    • 2015
  • This article considers Honeywell solutions in the branch of integration of subsystems of industrial safety and security for industrial enterprises with the creation of a unified Human-machine interface for centralized management and control of safety at the plant.

The Global Trends in the Private Security Industry and the Strategies for the South Korean Private Security Industry : Focusing on the U. S. Security Industry (해외 시큐리티 산업의 동향과 한국의 대응전략 : 미국 사례를 중심으로)

  • Lee, Chang-Moo
    • Korean Security Journal
    • /
    • 제12호
    • /
    • pp.271-289
    • /
    • 2006
  • Private security industry in South Korea has rapidly been growing in recent years. However, such a rapid growth is being criticized for its focus on external results, which has produced a number of problems. The continued growth of private security industry can be only based upon substantive and qualitative development. In this aspect, it is necessary to consider the global trends of the private security industry, particularly the recent trends of the U. S. security industry which has led the global security industry. This is because the recent trends of the U. S. private security industry would guide the future direction of the private security industry in South Korea. The U. S. private security industry has been replacing the role of law enforcement agencies including the police, from crime prevention to investigation and disaster management, not to mention asset protection and loss prevention. The recent trends of the U. S. security industry appears to be summarized by such characteristics as variety, specialty, and integration, which might account for the structural problem of the private security industry in South Korea. In short, the substantive and qualitative development of the private security industry in South Korea should be accomplished by strengthening its specialty and integration, and also widening its variety.

  • PDF