• 제목/요약/키워드: Security Planning

검색결과 463건 처리시간 0.026초

전력 계통 계획, 운용을 위한 통합 시스템에서 데이타베이스 활용 및 구축 방안에 관한 연구 (A Study on the Application and Construction Scheme of Database for the Power System Planning and Operation of Integrate System)

  • 류은숙;이규철;김건중;함완균;권태원
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1992년도 하계학술대회 논문집 A
    • /
    • pp.85-88
    • /
    • 1992
  • This paper describes the need of the Database which is designed built with data lot a highly Integrated system for power system planning and operation. The study also, deals plans for and designs of thr highly integrated systems in order to optimize coordination of security and economy of power system planning and operations, as well as to improve the efficiency of data handling

  • PDF

실내 환경에서의 경비로봇용 주행시스템 (A Navigation System for a Patrol Robot in Indoor Environments)

  • 최병욱;이영민;박정호;신동관
    • 로봇학회논문지
    • /
    • 제1권2호
    • /
    • pp.117-124
    • /
    • 2006
  • In this paper, we develope the navigation system for patrol robots in indoor environment. The proposed system consists of PDA map modelling, a localization algorithm based on a global position sensor and an automatic charging station. For the practical use in security system, the PDA is used to build object map on the given indoor map. And the builded map is downloaded to the mobile robot and used in path planning. The global path planning is performed with a localization sensor and the downloaded map. As a main controller, we use PXA270 based hardware platform in which embedded linux 2.6 is developed. Data handling for various sensors and the localization algorithm are performed in the linux platform. Also, we implemented a local path planning algorithm for object avoidance with ultra sonar sensors. Finally, for the automatic charging, we use an infrared ray system and develop a docking algorithm. The navigation system is experimented with the two-wheeled mobile robot using North-Star localization system.

  • PDF

감시경계 로봇의 그래픽 사용자 인터페이스 설계 (A Graphical User Interface Design for Surveillance and Security Robot)

  • 최덕규;이춘우;이춘주
    • 로봇학회논문지
    • /
    • 제10권1호
    • /
    • pp.24-32
    • /
    • 2015
  • This paper introduces a graphical user interface design that is aimed to apply to the surveillance and security robot, which is the pilot program for the army unmanned light combat vehicle. It is essential to consider the activities of robot users under the changing security environment in order to design the efficient graphical user interface between user and robot to accomplish the designated mission. The proposed design approach firstly identifies the user activities to accomplish the mission in the standardized scenarios of military surveillance and security operation and then develops the hierarchy of the interface elements that are required to execute the tasks in the surveillance and security scenarios. The developed graphical user interface includes input control component, navigation component, information display component, and accordion and verified by the potential users from the various skilled levels with the military background. The assessment said that the newly developed user interface includes all the critical elements to execute the mission and is simpler and more intuitive compared to the legacy interface design that was more focused on the technical and functional information and informative to the system developing engineers rather than field users.

의료개혁 논의의 비교분석 (A Critical Analysis of the Perspectives on Health Care Reform in Korea)

  • 조병희
    • 보건교육건강증진학회지
    • /
    • 제15권2호
    • /
    • pp.217-233
    • /
    • 1998
  • This paper analyzed four different perspectives on health care reform in Korea in terms of the basic values, formulated problems and reform plans, implementation methods, and supporting groups. The medical security plan was insisted by social security specialists and social activists focusing on the integration of medical insurance coops in order to enhancing equity and right of the people. However, its perspective was limited to promoting security instead of reforming health care system. The government proposed the health care reform plans in 1994 and in 1997, focusing on promoting efficiency by remedying many problems in health care delivery system. However, its implementation was not successful due to the lack of organizational and financial supporters. Recently, two opposite proposals were issued. The market reform plan paid attention to revitalizing the market function to promoting efficiency by allowing hospitals to treat private patients instead of applying the medical insurance regulation. The government reform plan focused on intensifying governmental planning and intervention in the health care sector in order to removing inefficiency and promoting equity with the supports of social activists and labor unions. Finally, this paper proposed an alternative plan to promote harmonious social relationship between actors in the health care system.

  • PDF

SC-OPF의 민감도 계수를 이용한 발전기 기동.정지계획 (The Unit Commitment Using the Sensitivity Factor of Security Constrained Optimal Power Flow)

  • 김광모;정구형;한석만;김발호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 제37회 하계학술대회 논문집 A
    • /
    • pp.416-417
    • /
    • 2006
  • The recent movement to deregulated and competitive electricity market requires new concepts against existing central dispatch in the system operation and planning. As power systems tend to be operated more closely to their ultimate ratings, the role of SCOPF(Security Constrained Optimal Power Flow) is changed. This paper deals with the proper Unit Commitment condition changed according to the conditions or configuration of power system. This goal of is paper is to obtain proper security and Optimal UC condition through the efficient usage of the sensitivity Factor against critical contingencies. The proposed mechanism has been tested on a sample system and results show more secure conditions against critical contingencies.

  • PDF

Designing Flexible Packets for Multi-Satellite Data Transmission in a Physical Network Separation Environment

  • Baek, Hyun Chul;Lee, Sang Jeong
    • 항공우주시스템공학회지
    • /
    • 제14권6호
    • /
    • pp.26-35
    • /
    • 2020
  • The national satellite operation network, which supports multiple satellites, was designated as a Critical Information Infrastructure (CII) in 2017. The network was designed independently from the control network and the information network to enhance physical security. Planning is underway to establish a bidirectional data interface between networks. The data transmission system allows data flow only to the physical layer and the data link layer; hence, only one file can be transferred at any one time. This means that when large amounts of data are being transmitted, no other data can be sent simultaneously in urgent situations. Thus, this paper discusses the design of flexible packets for the transmission of data between networks in an environment where physical security has been enhanced through network separation and based on this, presents a method for transmitting data effectively.

제4차 산업혁명과 전자정부 보안연구 -지능형 정부의 빅데이터 사이버보안기술 측면에서- (A Study on the 4th Industrial Revolution and E-Government Security Strategy -In Terms of the Cyber Security Technology of Intelligent Government-)

  • 이상윤;윤홍주
    • 한국전자통신학회논문지
    • /
    • 제14권2호
    • /
    • pp.369-376
    • /
    • 2019
  • 본고에서는 제4차 산업혁명시대의 새로운 사이버보안 인텔리전스 서비스에 대응하는 지능형 정부 연구측면에서 바람직한 미래형 전자정부의 새로운 모습을 찾았다. 특히 제4차 산업혁명시대의 주요 특징인 중앙화 및 지능화의 측면에서 빅데이터 사이버보안기술에 주목하여 미래형 전자정부의 전략방안에 대해 고찰하였다. 연구결과 빅데이터를 활용한 보안분석기술이 적용되는 보다 고도화된 상관관계 분석을 통한 기존의 한계를 뛰어넘는 시스템 마련을 제시하였다. 제4차 산업혁명시대에 적합한 보안 정보 및 이벤트 관리 시스템 구축 측면에서 IT 시스템에서 발생하는 로그정보를 빅데이터 분석 기술을 적용해 보안 위협 여부를 선제적으로 탐지하는 인공지능과 같은 지능형의 고도화된 SIEM(Security Information & Event Management) 시스템 마련을 제안하였다. 제안된 시스템이 구현되면 제4차 산업혁명시대의 전자정부 보안에 있어 중앙화 및 집중화된 빅데이터 대상 확대, 증가된 데이터에 따른 처리속도 및 탐지 후의 대응까지 보다 지능화된 차원에서 선제적으로 기능할 수 있다.

연속성관리 구축 프레임워크 모색에 관한 연구 (A Study on Continuity Management framework to build)

  • 고재철;나성진;정종수
    • 한국방재안전학회논문집
    • /
    • 제9권1호
    • /
    • pp.1-7
    • /
    • 2016
  • 현재 연속성관리체계로 가장 널리 사용되고 있는 BCM(Business Continuity Management) 또는 BCP(Business Continuity Planning)을 기반으로 한 금융분야의 모범규준 및 구축사례는 많이 있었으나, 민간의 시설관리 분야 및 공공기관의 국가기반 체계에 실질적으로 적용 가능한 표준화된 연속성관리체계 구축 프레임워크에 대한 연구는 미미한 실정이다. 따라서 본 연구에서는 국내외 연속성관리 프레임워크의 비교와 시설관리 분야의 특성을 고려한 연속성관리 구성요소의 검토를 통해 민간 시설관리 분야 및 공공기관에 적합한 시설관리 분야의 연속성관리체계 구축 프레임워크를 모색하는 연구를 하고자 한다.

회계정보시스템의 활용수준과 정보화경영체제의 수준과의 관계 (The relations of the pratical level of AIS and level of IMS)

  • 김경일
    • 한국컴퓨터정보학회논문지
    • /
    • 제12권5호
    • /
    • pp.253-261
    • /
    • 2007
  • 국내인증규격으로는 유일한 정보화관련인증규격인 정보화경영체제의 실효성을 검증하고자 정보화경영체제의 규격에 따라 정보시스템을 도입한 중소기업이 운영하고 있는 기간업무시스템의 핵심기능인 회계정보시스템의 활용정도와 정보화경영체제의 수준과의 관계를 파악함으로서 논리적 경영시스템인 정보화경영체제가 지향하는 '사용자로 하여금 정보시스템을 적극적이고 효율적으로 사용하게 하는가'하는 정도와 정보화경영체제의 구성항목별로 회계정보시스템의 활용도에 영향을 미치는 정도는 어떻게 차이가 나타나는가를 연구함으로써 중소기업이 정보시스템을 도입하는 과정에서 중점적으로 관리하여야 할 항목들을 제시하였다.

  • PDF

Application of Reinforcement Learning in Detecting Fraudulent Insurance Claims

  • Choi, Jung-Moon;Kim, Ji-Hyeok;Kim, Sung-Jun
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.125-131
    • /
    • 2021
  • Detecting fraudulent insurance claims is difficult due to small and unbalanced data. Some research has been carried out to better cope with various types of fraudulent claims. Nowadays, technology for detecting fraudulent insurance claims has been increasingly utilized in insurance and technology fields, thanks to the use of artificial intelligence (AI) methods in addition to traditional statistical detection and rule-based methods. This study obtained meaningful results for a fraudulent insurance claim detection model based on machine learning (ML) and deep learning (DL) technologies, using fraudulent insurance claim data from previous research. In our search for a method to enhance the detection of fraudulent insurance claims, we investigated the reinforcement learning (RL) method. We examined how we could apply the RL method to the detection of fraudulent insurance claims. There are limited previous cases of applying the RL method. Thus, we first had to define the RL essential elements based on previous research on detecting anomalies. We applied the deep Q-network (DQN) and double deep Q-network (DDQN) in the learning fraudulent insurance claim detection model. By doing so, we confirmed that our model demonstrated better performance than previous machine learning models.