• Title/Summary/Keyword: Security Measure

Search Result 575, Processing Time 0.029 seconds

Development of a Simplified Vulnerability Analysis Program for Naval Vessel (함정 간이 취약성 해석 프로그램 개발에 대한 연구)

  • Shin, Yun-Ho;Kwon, Jeong-Il;Chung, Jung-Hoon
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.50 no.6
    • /
    • pp.383-389
    • /
    • 2013
  • Analysis and review of survivability is one of the most important aspects when naval vessels are designed. Because aiming points of threat towards the naval vessels in the battle field could not be estimated exactly, probabilistic and statistic approach is frequently introduced to evaluate and enhance the vessel survivability. Some commercial survivability analysis programs are used to perform the analysis for enhancement of susceptibility, vulnerability and recoverability but, they are usually classified and impossible to be exported to other countries because of their national security. In this paper, a simplified vulnerability analysis program is developed to evaluate the vulnerability of the warship in aspects of structure, redundancy and its mission capability at the conceptual design stage. To verify the developed program, the analysis results were compared with those of the commercial program MOTISS(Measure of Total Integrated System Survivability).

Age Effects of Social Capital on the Economic Well-Being in Korea (중년기 및 노년기 사회자본의 경제적 복지 효과 비교)

  • Seo, Jiwon
    • Journal of the Korean Home Economics Association
    • /
    • v.51 no.2
    • /
    • pp.207-218
    • /
    • 2013
  • Social capital theory provides a framework for analyzing the economic well-being. The purpose of this study is to analyze the age effect of social capital by comparing middle aged and the elderly, as well as to investigate the independent effects of social capital on their subjective economic well-being, respectively. The two concepts of "trust" and "social network" were used to measure the level of social capital. Comparisons between the age groups were made regarding the relationships between social capital and economic well-being of four age groups, including younger middle-aged, older middle-aged, younger elderly, and older elderly. Data from the $2^{nd}$ wave of the Korean Longitudinal Study of Ageing (KLoSA) were used. The final sample for this analysis is 8,406 respondents aged 45~84. The major findings are as follows. First, the level of social capital, trust and social network, is statistically different by age groups. Second, the model fits in the case of model including social capital variables are all larger than their counterparts in the four age groups. Third, social capital is "resource" that can contribute to increasing the subjective economic well-being. Based on the empirical results, implications for welfare policies related with issues of social security for the elderly in Korea are provided.

A Study on Secure Routing using Secure Zone and Nodes Authentication in Wireless Ad Hoc Network (Wireless Ad Hoc Network에서 보안 영역과 노드 인증을 이용한 보안 라우팅 기법에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.161-169
    • /
    • 2014
  • Wireless Ad Hoc Network is suitable for emergency situations such as and emergency, disaster recovery and war. That is, it has a characteristic that can build a network and use without help of any infrastructure. However, this characteristic is providing a cause of many security threats. In particular, routing attack is not applied the existing routing methods as it is and it is difficult to determine accurately whether nodes that participate in routing is malicious or not. The appropriate measure for this is necessary. In this paper, we propose a secure routing technique through a zone architecture-based node authentication in order to provide efficient routing between nodes. ZH node is elected for trust evaluation of the member nodes within each zone. The elected ZH node issues a certification of the member nodes and stores the information in ZMTT. The routing involvement of malicious nodes is blocked by limiting the transfer of data in the nodes which are not issued the certification. The superior performance of the proposed technique is confirmed through experiments.

The Effects of Service Factors of Electronic Catalogue Systems on User Satisfaction (전자카탈로그 시스템의 서비스 요인이 사용자만족에 미치는 영향)

  • Ko, Il-Sang;Choi, Su-Jeong;Kim, Jeong-Hee
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.3
    • /
    • pp.107-131
    • /
    • 2007
  • Due to an increase of the importance of E-catalogue on electronic commerce, E-catalogue systems have been prevailing for their production and efficient management around Web environment. In this study, we categorize service factors off-catalogue systems into three aspects contents-providing, user participation, and system management, and we measure their impacts on user satisfaction. The results of the study show that richness, design, trust, interaction, function of transaction management, system extensibility, system stability, and security have been found out to be significant factors to affect user satisfaction.

  • PDF

m-Gov Strategy and Policy Challenges with ICT Ecosystem Changes (ICT 생태계 변화에 따른 m-Gov의 전략수립과 정책과제)

  • Choung, Young-Chul;Bae, Yong-Guen
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.7
    • /
    • pp.1531-1537
    • /
    • 2013
  • In its change in ICT Ecosystem, electronic government changes to its wireless m-Gov from existing PC-based e-Gov. Thus, in order to realize the smart government, m-Gov needs to be vitalized and the strategies for this realization are required. Also, some countermeasures for those strategies and political instructions which the electric government should follows are needed. Above two are the ultimate purpose in pursuing administrative ideals because the realization of m-Gov innovates the government and betters quality of national life off. Therefore, this paper, to realize the smart government, provides some strategies for vitalization of m-Gov's electric government services, their countermeasures, and political instructions for Smart m-Gov.

A Study of TRM and ATC Determination for Electricity Market Restructuring (전력산업 구조개편에 대비한 적정 TRM 및 ATC 결정에 관한 연구)

  • 이효상;최진규;신동준;김진오
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.53 no.3
    • /
    • pp.129-134
    • /
    • 2004
  • The Available Transfer Capability (ATC) is defined as the measure of the transfer capability remaining in the physical transmission network for further commercial activity above already committed uses. The ATC determination s related with Total Transfer Capability (TTC) and two reliability margins-Transmission Reliability Capability (TRM) and Capacity Benefit Margin(CBM) The TRM is the component of ATC that accounts for uncertainties and safety margins. Also the TRM is the amount of transmission capability necessary to ensure that the interconnected network is secure under a reasonable range of uncertainties in system conditions. The CBM is the translation of generator capacity reserve margin determined by the Load Serving Entities. This paper describes a method for determining the TTC and TRM to calculate the ATC in the Bulk power system (HL II). TTC and TRM are calculated using Power Transfer Distribution Factor (PTDF). PTDF is implemented to find generation quantifies without violating system security and to identify the most limiting facilities in determining the network’s TTC. Reactive power is also considered to more accurate TTC calculation. TRM is calculated by alternative cases. CBM is calculated by LOLE. This paper compares ATC and TRM using suggested PTDF with using CPF. The method is illustrated using the IEEE 24 bus RTS (MRTS) in case study.

A Consecutive Motion and Situation Recognition Mechanism to Detect a Vulnerable Condition Based on Android Smartphone

  • Choi, Hoan-Suk;Lee, Gyu Myoung;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • v.16 no.3
    • /
    • pp.1-17
    • /
    • 2020
  • Human motion recognition is essential for user-centric services such as surveillance-based security, elderly condition monitoring, exercise tracking, daily calories expend analysis, etc. It is typically based on the movement data analysis such as the acceleration and angular velocity of a target user. The existing motion recognition studies are only intended to measure the basic information (e.g., user's stride, number of steps, speed) or to recognize single motion (e.g., sitting, running, walking). Thus, a new mechanism is required to identify the transition of single motions for assessing a user's consecutive motion more accurately as well as recognizing the user's body and surrounding situations arising from the motion. Thus, in this paper, we collect the human movement data through Android smartphones in real time for five targeting single motions and propose a mechanism to recognize a consecutive motion including transitions among various motions and an occurred situation, with the state transition model to check if a vulnerable (life-threatening) condition, especially for the elderly, has occurred or not. Through implementation and experiments, we demonstrate that the proposed mechanism recognizes a consecutive motion and a user's situation accurately and quickly. As a result of the recognition experiment about mix sequence likened to daily motion, the proposed adoptive weighting method showed 4% (Holding time=15 sec), 88% (30 sec), 6.5% (60 sec) improvements compared to static method.

A Study of the Boring Bar Vibration Measurement using Optical Fiber Sensor (보링바 고유진동 계측을 위한 광섬유 진동센서 연구)

  • Song, Doo-Sang;Hong, Jun-Hee;Jeong, Hwang-Young;Kang, Dae-Hwa;Kim, Byung-In
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.26 no.4
    • /
    • pp.107-113
    • /
    • 2009
  • In this paper, we studied of measurement the vibration of natural frequency using optical fiber sensor. The boring bar for measurement of vibration in use optical fiber sensor has the advantage of direct measure for the frequency than accelerometer. Because it deal with output value on electrical signal of optical fiber in physical disturbance when it measures the frequency of vibration. The optical fiber sensor measured the vibration of boring bar by the gap in sensing jig while optical fiber just kept contact with boring bar. A prototype system was composed of jig part with gap and optical system part. In this paper, we found out the possibility to measurement of vibration by the gap in use optical fiber.

Research on the Security of Infrastructures Using fiber Optic ROTDR Sensor (광섬유 ROTDR센서를 이용한 사회기반시설물의 보안에 관한 연구)

  • Park, Hyung-Jun;Koh, Kwang-Nak;Kwon, Il-Bum
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.23 no.2
    • /
    • pp.140-147
    • /
    • 2003
  • A detection technique is studied to determine the location and the weight of an intruder into infrastructure using fiber optic ROTDR (Rayleigh optical time domain reflectometry) sensor. Fiber optic sensing plates buried in sand are prepared to measure the intruder effects. The signal of ROTDR was analyzed to confirm the detection performance. The constructed ROTDR system could be used up to 12km at the pulse width of 30ns. The location error was less than 3m and the weight could be detected into three levels of grade, such as 20kgf, 40kgf and 60kgf.

A Leverage Strategy of the US-Korea Cost Sharing Program Based on Systems Thinking (시스템 사고를 이용한 주한미군 방위비 분담 정책 레버리지 전략)

  • Lee, Jung-Hwan;Cho, Yong-Gun;Moon, Seong-Am;Seo, Hyeok
    • Korean System Dynamics Review
    • /
    • v.11 no.3
    • /
    • pp.33-59
    • /
    • 2010
  • South Korea has the defense burdensharing agreement with the United States in reference to the U.S. troops stationed in Korea since 1991, based on Special Measure Agreement(SMA). Due to the growth of Korea's economic power and the U.S. provision of the security environment on Korean penninsula, the U.S. government steadily demanded the rise of contributions to common defense from South Korea and South Korea accepted most of the U.S. requests without proper principles of negotiation concerning the cost sharing. This paper analyzes the systems of the Korea-U.S. cost sharing program through a systems thinking, that yields desirable results with a little effort. The three policy leverages are: 1) the development of negotiation principles; 2) the policy making closely linked with National Defense Reform Basic Plan; 3) the policy making with responsibility burdensharing than cost burdensharing. This paper findings will contribute to the developing the Korea-U.S. cost sharing program by providing policy-makers and policy-practitioners with systematic understanding and insight into the dynamics of the program. Also, this will enable the program to execute more effectively with a concrete formula.

  • PDF