• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.028 seconds

Laser Radar-Based Railroad Crossing Detection Device Developed for Crossing Security Device Integration (건널목 보안장치 통합화를 위한 레이저레이더기반 철도 건널목 지장물 검지장치 개발)

  • Baek, Jong-Hyen;Kim, Gon-Yop;Song, Yong-Soo;Oh, Seh-Chan;Kim, Yong-Kyu;Chae, Eun-Kyung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.5
    • /
    • pp.471-478
    • /
    • 2013
  • In this paper, we have designed and implemented an obstacle detecting device based laser radar. It is an alternative to solve through problem analysis of that are currently operated safety equipment and status research of domestic railway crossing. It is target to improve the safety and reliability of the rail traffic through effective obstacle detection at crossing account for a large proportion of train accidents. suggest a system to overcome the problems caused by aging and limitation of existing safety equipment. Design a crossing obstacle detection device that utilizes laser radar scanner, proved this through performance evaluation and testing of the prototype.

On Study for the CIM By DAS(DATA Acquisition System) (CIM구축을 위한 생산현장의 정보화 사례연구)

  • Lee, Jong-Hyung;Lee, Youn-Heui
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.8 no.2
    • /
    • pp.69-76
    • /
    • 2005
  • This study for Customer Satisfaction(Customer Focus) by Profit security' in the field Process improvement activity and man-power upgrade by DAS(DATA Acquisition System) in the Plant that is fusion Off Line and On Line(IT), Especially the basic of the most foundation in the beginning Step of Toyota system is 3-jeong(a standard instrument; right volume, right box, right position), 5S(Seiri, Seiton, Seisoh, Seiketsu, Sitsuke ; KAISEN, KANBNA System(for Logistic), Further more KPC has established the digital environment such as CIM ; Computer Integrated Manufacturing), IMS ; Intelligent Manufacturing System ERP ; Enterprise Resource Planning, DAS; Data Acquisition System, Autonomous QC & SPC etc,.) in order to realize the intelligent informatization, which is core base for obtaining the competitive power and for responding to the various 21C management environment in flexibility. In this digital management environment, continuously and powerfully they would advance for becoming the best of the world. For strategic changes to take place in industry 3 key important factors need to be included ; Integration of tasks function and process, Decentralization of information, Responsibility, Finally simplification of products and product structures.

  • PDF

Policy Formulation of Health Insurance and Its Problems in Korea (의료보장정책의 형성과 문제점)

  • 이규식
    • Health Policy and Management
    • /
    • v.10 no.1
    • /
    • pp.57-94
    • /
    • 2000
  • Korea's social health insurance system was introduced in 1977, which has made a universal coverage possibly by July 1989. Korean government had pursued a single objective for the last decade to put the whole population under the coverage of medical security, and the objective was achieved within 12 years. The rapid accomplishment is primarily due to such factors as limited benefits, high copayment rate, low contributions as well as rapid economic growth. There are several sources of pressure for the implementation of social health insurance such as health professional group, labor unions, politicians, international organizations etc.. However it is important to look at the feasibility of social health insurance. Among other things, it is necessary to identify the administrative infrastructure of insurance system and to assess income for source of fund. As many developed countries, Korea began to apply health insurance to the employees of the large firms, and the expansion based on employment status. Thus the several funds system was inevitable according to the gradual expansion strategy. However many persons had criticized several funds system in respect with equity and efficiency aspects. In the short history of the Korean health insurance, whether one fund or sever or funds had been the most controversial issue. In Febrary 1999, the National Assembly passed the act of one fund system. From July 2000 separate funds will be unifed under new health insurance scheme. In this study we will analyze the policy making process on implementation, expansion and integration of health insurance system of Korea. And also analyse problems related to policy making.

  • PDF

Conceptual Design of Intelligent Building Automation System Using Computer-Aided Systems Engineering Approach (시스템공학 접근법을 이용한 지능형 건물 자동화 시스템의 개념설계)

  • 유일상;박영원
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.3 no.2
    • /
    • pp.166-178
    • /
    • 2000
  • As the 21st century signifies an information-oriented society, the computer integration takes place in all walks of human presence. Needs for computer and network-integrated automation present new challenges in military as well as commercial facility systems engineering. Since the first intelligent building appeared in USA in 1984, it gradually became an essential capability for the building industry requirement these days. Intelligent Building System(IBS) is evolving to be very complex because there are many subsystems such as telecommunication(TC), office automation(OA), building automation(BA), security, construction environments, etc. During the planing phase of IBS development, therefore, a disciplined systems engineering must be performed to analyze stake- holder's requirements to build an optimized system while minimizing trial-and-error expenses and risks. This paper presents a conceptual design of BAS applying systems engineering methods. The contribution of this study includes the development of IBS subsystem specification for building automation subsystem, which is a part of IBS, using the methodology of requirement analysis, functional analysis, synthesis, and verification. A computer-aided systems engineering s/w, RDD-100, was used to improve the system design efficiency and to promote the product design knowledge management for reuse in later design programs.

  • PDF

A Countermeasure against Brute-force Attack using Digital Holography and DES Algorithm (디지털 홀로그래피와 DES 알고리즘을 이용한 전수키 공격 대응 기법)

  • Noh, Chang-Oh;Moon, In-Kyu;Cho, Beom-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.5
    • /
    • pp.73-78
    • /
    • 2011
  • The DES encryption algorithm employed in information security has a strong avalanche effect, and the processing speed to encrypt is also fast. However, due to the H/W advances, the secret key length of DES having 56bits is not enough so that it is easily exposed to brute force attack. In this paper, we present a new method to significantly increase the secret key length in the DES by integration of digital holography and DES algorithm. In addition, we evaluate the encryption performance of the proposed method by measuring the avalanche effect and verify the possibility of it.

Integrated Management Systems - Theoretical and Practical Implications

  • Eriksson, Henrik;Hansson, Jonas
    • International Journal of Quality Innovation
    • /
    • v.7 no.2
    • /
    • pp.69-82
    • /
    • 2006
  • Organisations worldwide strive to develop their management systems for business functions, ranging from quality and environment to safety, information security and social responsibility. During the latest decade a considerable amount of these efforts has been concentrated on introducing and applying standards such as the ISO 9001 and ISO 14001. The need for Integrated Management Systems (IMS) often arises as a result of decisions to implement Environmental Management System (EMS) and/or an occupational health and safety management system in addition to a Quality Management System (QMS). At the end of 2003, approximately 3200 organisations in Sweden had an ISO 9001 certificate, and approximately 3400 organisations had a certificate based on an EMS. Dealing with separate management systems and ensuring that they align with the organisation's strategies and goals, has proved difficult. Owing to the large number of organisations certified according to multiple types of systems, an increasing number of organisations are establishing IMS. There are examples of companies, which chose to integrate EMS and QMS into a co-ordinated implementation approach, and although sparse, the research within this area indicates potential benefits of using an integrated approach. This paper presents both a theoretical and an empirical investigation with the aim to elucidate problems related to the integration of management systems. Furthermore, the paper will present recommendations for succeeding in such integrations and, hence, contributing to an increased understanding on how IMSs should be designed and implemented.

A new perspective towards the development of robust data-driven intrusion detection for industrial control systems

  • Ayodeji, Abiodun;Liu, Yong-kuo;Chao, Nan;Yang, Li-qun
    • Nuclear Engineering and Technology
    • /
    • v.52 no.12
    • /
    • pp.2687-2698
    • /
    • 2020
  • Most of the machine learning-based intrusion detection tools developed for Industrial Control Systems (ICS) are trained on network packet captures, and they rely on monitoring network layer traffic alone for intrusion detection. This approach produces weak intrusion detection systems, as ICS cyber-attacks have a real and significant impact on the process variables. A limited number of researchers consider integrating process measurements. However, in complex systems, process variable changes could result from different combinations of abnormal occurrences. This paper examines recent advances in intrusion detection algorithms, their limitations, challenges and the status of their application in critical infrastructures. We also introduce the discussion on the similarities and conflicts observed in the development of machine learning tools and techniques for fault diagnosis and cybersecurity in the protection of complex systems and the need to establish a clear difference between them. As a case study, we discuss special characteristics in nuclear power control systems and the factors that constraint the direct integration of security algorithms. Moreover, we discuss data reliability issues and present references and direct URL to recent open-source data repositories to aid researchers in developing data-driven ICS intrusion detection systems.

An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

  • Niu, Shufen;Fang, Lizhi;Song, Mi;Yu, Fei;Han, Song
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3365-3383
    • /
    • 2021
  • The rapid growth of data has successfully promoted the development of modern information and communication technologies, which are used to process data generated by public urban departments and citizens in modern cities. In specific application areas where the ciphertext of messages generated by different users' needs to be transmitted, the concept of broadcast encryption is important. It can not only improve the transmission efficiency but also reduce the cost. However, the existing schemes cannot entirely ensure the privacy of receivers and dynamically adjust the user authorization. To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid solutions. Moreover, we constructed a security model to ensure wireless data transmission under cloud computing and internet of things integrated devices. The achieved results reveal that the proposed scheme is semantically secure in the random oracle model. The performance of the proposed scheme is evaluated through theoretical analysis and numerical experiments.

Study on gamma radiation attenuation and non-ionizing shielding effectiveness of niobium-reinforced novel polymer composite

  • Akman, Ferdi.;Ogul, H.;Ozkan, I.;Kacal, M.R.;Agar, O.;Polat, H.;Dilsiz, K.
    • Nuclear Engineering and Technology
    • /
    • v.54 no.1
    • /
    • pp.283-292
    • /
    • 2022
  • Advanced radiation applications have been widely used and extended to many fields. As a result of this fact, choosing an appropriate shielding material based on the radiation application has become vital. In this regard, the integration of elements into polymer composites has been investigated and contributed to the quantity and quality of radiation shielding materials. This study reports photon attenuation parameters and electromagnetic shielding effectiveness of a novel polymer composite prepared with a matrix reinforced with three different proportions (5, 10, and 15 wt%) of niobium content. Addition of Nb dopant improves both photon attenuation and electromagnetic shielding effectiveness for the investigated composites. Therefore, Nb(15%) polymer composite with highest concentration has been found to be the best absorber for ionizing and non-ionizing radiations. Consequently, the performed analyzes provide evidences that the prepared Nb-reinforced polymer composite could be effectively used as photon radiation attenuator and electromagnetic shielding material.

The Europeanization of Bulgarian Nationalism: The Impact of Bulgaria's European Union Accession on Bulgarian-Macedonian Relations

  • Benedict E., DeDominicis
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.39-66
    • /
    • 2022
  • Modern Bulgarian nationalists aspired towards incorporating the self-identified Bulgarian lands into the Bulgarian state. The Treaty of San Stefano ending the Russo-Turkish War of 1877-78 tantalizingly achieved these so-called national ideals. Great Power diplomacy quickly diminished Bulgaria's borders and international legal status with the 1878 Treaty of Berlin, exacerbating nationalist grievances. Bulgaria would expand vast resources to restore the San Stefano borders until Balkan Communist authoritarian regimes eventually suppressed the Macedonian issue as a foreign policy subject. Sofia's policy towards its neighbor has been overdetermined by the efforts of successive Bulgarian governments to institutionalize post-communist Bulgaria's own national identity. Bulgaria's integration into so-called Euro-Atlantic structures, i.e., NATO and the EU, had been the primary strategic objective of the Bulgarian authorities since the end of the Zhivkov regime. North Atlantic community security policy aims in response to the earliest post-Cold War foreign policy crises in the Western Balkans framed the parameters of Bulgarian diplomacy. The stabilization of FYROM in 2001, followed by Bulgaria's 2007 EU accession, led to Bulgarian nationalist values become more salient in Bulgarian politics and foreign policy. Sofia-Skopje relations are a test case for the effects of Europeanization on interdependent Balkan ethno-sectarian nationalisms and state territorial institutional development.