• Title/Summary/Keyword: Security Monitoring and Control

Search Result 272, Processing Time 0.038 seconds

A Realization on Interface Module & Communications Protocol of AtoN AIS (AtoN AIS의 인터페이스 모듈 및 통신프로토콜 구현)

  • Choi, Jo-Cheon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.1103-1107
    • /
    • 2009
  • Lately, trend is change to concept that management traffic of ship is magnified gradually to near shore waters from harbor. Therefore, introducing the AtoN AIS technology that install AIS in the ground station, lighthouse, bouy, sea facilities etc.. that is support equipment for safety sailing of ship and safety security of harbor and ship administration. The operation and maintenance of AtoN AIS are required to efficient method. With this actuality, sea advanced nation They has been apply for developing AtoN AIS equipment that is connected equipment of technology standard in IALA. Because of it is expected to depend equipment in income, that is required to domestic technology of the AtoN AIS. This paper is targeted to development that is suitable automation AtoN AIS equipment in environmental peculiarity for construnstrunstrAtoN operating administration center. It has been realization the interface module for control and monitoring system and the communications protocol for information interchange.

  • PDF

Development of Secure Entrance System using AOP and Design Pattern (관점지향 소프트웨어 개발 방법론과 디자인 패턴을 적용한 출입 보안 시스템 개발)

  • Kim, Tae-Ho;Cheon, Hyeon-Jae;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.943-950
    • /
    • 2010
  • A secure entrance system is complicated because it should have various functions like monitoring, logging, tracing, authentication, authorization, staff locating, managing staff enter-and-leave, and gate control. In this paper, we built and applied a secure entrance system for a domestic nuclear plant using Aspect Oriented Programming(AOP) and design pattern. Using AOP has an advantage of clearly distinguishing the role for each functional module because building a system separated independently from the system's business logic and security logic is possible. It can manage system alternation flexibility by frequent change of external environment, building a more flexible system based on increased code reuse, efficient functioning is possible which is an original advantage of AOP. Using design pattern enables to design by structuring the complicated problems that arise in general software development. Therefore, the safety of the system can also be guaranteed.

Research on Safety Design of Residence Based on CPTED Strategy -focused on Gamcheon cultural village in Busan, Korea as an example- (CPTED 전략에 근거한 주거지역의 안전디자인에 관한 연구 -한국 부산 감천문화마을 사례를 중심으로-)

  • Zhang, Ning;Cho, Joung-Hyung
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.8
    • /
    • pp.93-104
    • /
    • 2021
  • In the process of the sustainable development of the world economy, the change and construction of urban living environment has always been the focus of people's attention. Therefore, the purpose of this study is to find out the potential safety hazards in residential areas, and put forward feasible improvement plans under the framework of CPTED theory.One is to collect the necessary literature. Secondly, according to the field investigation and questionnaire survey, sorting out the existing security risks. Finally, this paper puts forward the corresponding improvement and suggestion to this research. The conclusion is as follows: First, based on the six principles of CPTED theory, problems existing in Gamcheon Cultural Village, which is subject to research, were investigated. Second, six of the most serious safety issues (safety handle, landscaping, entrance control, signs, empty space, monitoring) were objectively analyzed, and designs were presented in terms of increasing safety stairs, installing automatic entrances, open access view, unifying signs, and building leisure areas.

Study about the role of the Prevention of School Safety Keeper System (학교안전지킴이의 학교폭력예방에 대한 제도적 고찰 - 전문성과 제약성을 중심으로 -)

  • Gong, Bae Wan
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.3-13
    • /
    • 2013
  • School violence that have occurred recently, showing a tendency to collectivization and diverse types of violence, as well as the quality and increase the damage levels. School violence in the home, school, and social factors, but is caused by the lack of awareness about the violence and the reporting of consciousness due to poor acts of violence indirectly assisted. The only place violence has caused the school to establish the legal and institutional arrangements in order to minimize school violence have no choice but to limit its effectiveness is negligible. The problem of school violence in connection with the problem of juvenile crime prevention and control, and punishment should be made of the complex and layered. Operation and School police system, School safety keeper system, school sheriff system since 2005, each municipality in order to minimize school violence, but have no practical help to limit the visible and symbolic effects. Nonexistent professional staff of the institution or school safety monitors emphasis on monitoring the physical state of the system in the form of 'guards' departure inherently have limitations. Also, to prevent criminal acts or violence in the state is not given special privileges and the appropriate role for the school keeper is a problem with the system. Report no other role can not be expected. Should therefore be preceded by a systematic improvement and training of experts in order to prevent school violence, and home and school, in terms of social support and measures.

A study on the Improvement Method of the Report and Reward System on an Illegal Behavior of the Emergency Exit (비상구 불법행위 신고포상제도의 개선방안에 관한 연구)

  • Kim, Myeong Sik;Lee, Tae Shik;Cho, Won Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.5 no.2
    • /
    • pp.49-59
    • /
    • 2012
  • The safety management of the emergency exit, by directly related to the $civil^{\circ}$Øs dead in the fire situation, have limited by which the fire station take the on-side and control-centered way of business processing, it is expect to the effects in which the citizen have to concern and to take part. From 2010 years in the back-ground, it is operated nationally the report and reward system on an illegal behavior of the emergency exit, it is happened to the unfit operating situation in the mission and direction of the system up which the exit paparazzi act with intent to receive the reward payments. The study suggests solution through analyzing the illegal emergency exit operation result of sixteen counties and the Seoul metropolitan from year 2010 to 2011. Firstly, the report destination is adjusted to the multiple use establishments and the large-scale multiple use facilities over the limit level is limited under five times the report events of the same people in the minor endorsement. And the fine incomes should be invested to the disaster prevention acting related with the exit. Secondly, for upgrade of the report accuracy, a reporter is received the possible information for the confirmation of an illegal act, has become to lead the pre-monitoring act which the reporter is can to take the safety education and to guide the information about season and vulnerable business location. Finally, considering the support way about the encounter facility, the fire officer is not happen to occur the repetitive report in the same place, is related to the volunteer service system the report acts, consider as the volunteer service time, and must support them to act as the disaster prevention volunteer.

Detecting Stress Based Social Network Interactions Using Machine Learning Techniques

  • S.Rajasekhar;K.Ishthaq Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.101-106
    • /
    • 2023
  • In this busy world actually stress is continuously grow up in research and monitoring social websites. The social interaction is a process by which people act and react in relation with each other like play, fight, dance we can find social interactions. In this we find social structure means maintain the relationships among peoples and group of peoples. Its a limit and depends on its behavior. Because relationships established on expectations of every one involve depending on social network. There is lot of difference between emotional pain and physical pain. When you feel stress on physical body we all feel with tensions, stress on physical consequences, physical effects on our health. When we work on social network websites, developments or any research related information retrieving etc. our brain is going into stress. Actually by social network interactions like watching movies, online shopping, online marketing, online business here we observe sentiment analysis of movie reviews and feedback of customers either positive/negative. In movies there we can observe peoples reaction with each other it depends on actions in film like fights, dances, dialogues, content. Here we can analysis of stress on brain different actions of movie reviews. All these movie review analysis and stress on brain can calculated by machine learning techniques. Actually in target oriented business, the persons who are working in marketing always their brain in stress condition their emotional conditions are different at different times. In this paper how does brain deal with stress management. In software industries when developers are work at home, connected with clients in online work they gone under stress. And their emotional levels and stress levels always changes regarding work communication. In this paper we represent emotional intelligence with stress based analysis using machine learning techniques in social networks. It is ability of the person to be aware on your own emotions or feeling as well as feelings or emotions of the others use this awareness to manage self and your relationships. social interactions is not only about you its about every one can interacting and their expectations too. It about maintaining performance. Performance is sociological understanding how people can interact and a key to know analysis of social interactions. It is always to maintain successful interactions and inline expectations. That is to satisfy the audience. So people careful to control all of these and maintain impression management.

A Study on the Legislation for the Commercial and Civil Unmanned Aircraft System Operation (국내 상업용 민간 무인항공기 운용을 위한 법제화 고찰)

  • Kim, Jong-Bok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.1
    • /
    • pp.3-54
    • /
    • 2013
  • Nowadays, major advanced countries in aviation technology are putting their effort to develop commercial and civil Unmanned Aircraft System(UAS) due to its highly promising market demand in the future. The market scale of commercial and civil UAS is expected to increase up to approximately 8.8 billon U.S. dollars by the year 2020. The usage of commercial and civil UAS covers various areas such as remote sensing, relaying communications, pollution monitoring, fire detection, aerial reconnaissance and photography, coastline monitoring, traffic monitoring and control, disaster control, search and rescue, etc. With the introduction of UAS, changes need to be made on current Air Traffic Management Systems which are focused mainly manned aircrafts to support the operation of UAS. Accordingly, the legislation for the UAS operation should be followed. Currently, ICAO's Unmanned Aircraft System Study Group(UASSG) is leading the standardization process of legislation for UAS operation internationally. However, some advanced countries such as United States, United Kingdom, Australia have adopted its own legislation. Among these countries, United States is most forth going with President Obama signing a bill to integrate UAS into U.S. national airspace by 2015. In case of Korea, legislation for the unmanned aircraft system is just in the beginning stage. There are no regulations regarding the operation of unmanned aircraft in Korea's domestic aviation law except some clauses regarding definition and permission of the unmanned aircraft flight. However, the unmanned aircrafts are currently being used in military and under development for commercial use. In addition, the Ministry of Land, Infrastructure and Transport has a ambitious plan to develop commercial and civil UAS as Korea's most competitive area in aircraft production and export. Thus, Korea is in need of the legislation for the UAS operation domestically. In this regards, I personally think that Korea's domestic legislation for UAS operation will be enacted focusing on following 12 areas : (1)use of airspace, (2)licenses of personnel, (3)certification of airworthiness, (4)definition, (5)classification, (6)equipments and documents, (7)communication, (8)rules of air, (9)training, (10)security, (11)insurance, (12)others. Im parallel with enacting domestic legislation, korea should contribute to the development of international standards for UAS operation by actively participating ICAO's UASSG.

  • PDF

Cloud Computing Strategy Recommendations for Korean Public Organizations: Based on U.S. Federal Institutions' Cloud Computing Adoption Status and SDLC Initiative (한국의 공공기관 클라우드 컴퓨팅 도입 활성화 전략: 미국 연방 공공기관 클라우드 컴퓨팅 도입현황 시사점 및 시스템 개발 수명주기(SDLC) 프로세스 전략을 중심으로)

  • Kang, Sang-Baek Chris
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.103-126
    • /
    • 2015
  • Compared to other countries, cloud computing in Korea is not popular especially in the government sector. One of the reasons for the current not-fully-blossomed situation is partly by early investment in huge government datacenters under Korea's e-government initiative; let alone, there was no strong control tower as well as no enforcing law and ordinances for driving such cloud computing initiative. However, in 2015 March 'Cloud Computing and Privacy Security Act' (hereinafter, Cloud Act) had been passed in the Parliament and from September 2015 Cloud Act was deployed in Korea. In U.S., FedRAMP (Federal Risk Assessment and Management Program) along with Obama Adminstration's 'Cloud First' strategy for U.S. federal institutions is the key momentum for federal cloud computing adoption. In 2015 January, U.S. Congressional Research Service (CRS) has published an extensive monitoring report for cloud computing in U.S. federal institutions. The CRS report which monitored U.S. government cloud computing implementation is indeed a good guideline for Korean government cloud computing services. For this reason, the purpose of the study is to (1) identify important aspects of the enacted Korean Cloud Act, (2) describe recent U.S. federal government cloud computing status, (3) suggest strategy and key strategy factors for facilitating cloud adoption in public organizations reflecting SDLC strategy, wherein.

A Study on Practice of Protective Actions for Medical Information - A comparison between hospital administrators and occupational therapists - (의료정보 보호행동 실천에 관한 연구 - 병원행정관리자와 작업치료사를 비교 -)

  • Kweon, Eun-Ha
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.12
    • /
    • pp.1959-1970
    • /
    • 2013
  • Attempts were made in this paper to compare the practice of protective actions for information of patients' medical treatment between hospital administrators who do not make direct contact with patients and occupational therapists who usually do. The comparison between jobs in charge showed that occupational therapists did not practice much protective actions for information of patients' medical treatment ($3.52{\pm}.809$) compared to hospital administrators ($3.92{\pm}.724$), even though the former had received regular education about protection, management and supervision of patients' medical information more often ($3.17{\pm}1.129$) than the latter ($3.16{\pm}1.037$). In spite of the fact that occupational therapists were exposed frequently to the danger of revealing medical information in the process of their job performance through talks and communications with patients, they displayed relatively little concern for and awareness of keeping information of medical treatment from being leaked by them. It is thus suggested to promote awareness of medical staff to protect medical information by means of flexible educational system for each occupational group, periodical monitoring, continuing public relation, training and quality control for protection of medical information, as well as routine self-examination of such practice.

Estimation of Uranium Particle Concentration in the Korean Peninsula Caused by North Korea's Uranium Enrichment Facility (북한 우라늄 농축시설로 인한 한반도에서의 공기중 우라늄 입자 농도 예측)

  • Kwak, Sung-Woo;Kang, Han-Byeol;Shin, Jung-Ki;Lee, Junghyun
    • Journal of Radiation Protection and Research
    • /
    • v.39 no.3
    • /
    • pp.127-133
    • /
    • 2014
  • North Korea's uranium enrichment facility is a matter of international concern. It is of particular alarming to South Korea with regard to the security and safety of the country. This situation requires continuous monitoring of the DPRK and emergency preparedness on the part of the ROK. To assess the detectability of an undeclared uranium enrichment plant in North Korea, uranium concentrations in the air at both a short and a long distance from the enrichment facility were estimated. $UF_6$ source terms were determined by using existing information on North Korean facility and data from the operation experience of enrichment plants from other countries. Using the calculated source terms, two atmospheric dispersion models (Gaussian Plume Model and HYSPLIT models) and meteorological data were used to estimate the uranium particle concentrations from the Yongbyon enrichment facility. A maximum uranium concentration and its location are dependent upon the meteorological conditions and the height of the UF6 release point. This study showed that the maximum uranium concentration around the enrichment facility was about $1.0{\times}10^{-7}g{\cdot}m^{-3}$. The location of the maximum concentration was within about 0.4 km of the facility. It has been assumed that the uranium sample of about a few micrograms (${\mu}g$) could be obtained; and that few micrograms of uranium can be easily measured with current measurement instruments. On the contrary, a uranium concentration at a distance of more than 100 kilometers from the enrichment facility was estimated to be about $1.0{\times}10^{-13}{\sim}1.0{\times}10^{-15}g{\cdot}m^{-3}$, which is less than back-ground level. Therefore, based on the results of our paper, an air sample taken within the vicinity of the Yongbyon enrichment facility could be used to determine as to whether or not North Korea is carrying out an undeclared nuclear program. However, the air samples taken at a longer distance of a few hundred kilometers would prove difficult in detecting a clandestine nuclear activities.