• Title/Summary/Keyword: Security Screening

Search Result 91, Processing Time 0.022 seconds

A Study on the Profiling System in the Aviation Security (항공보안에서의 프로파일링 연구)

  • Hwang, Ho-Won;Lee, Kyu-Hang
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.2
    • /
    • pp.155-175
    • /
    • 2007
  • As intellectual terror threats increase, we feel the limit in coping with those threats and the things we do are placing traditional X-ray machines & ETD and increasing aviation security staffs. In fact, even if air transportation system is the fast and most efficient transportation methods, it is true that there are many inconveniences to endure due to terror threats. In the name of security, even if we make a lot of efforts and time to screen both good-natured passengers, baggage, cargo and suspicious passengers, it is impossible to screen perfectly and it is not an efficient methods. Therefore, we introduce profiling system that reduce the effort to screen good-natured passengers but focus on screening dangerous passengers and baggages. Profiling system strengthens aviation security, using the concept "Selection & Concentration". Israel started to introduce manual profiling system in aviation security, which is interviewing suspicious passengers and it has been used in crime investigation since 1960. And it has been upgraded and diversified to CAPPS(Computer Assisted Passenger Screening Program) and SPOT(Screening Passenger by Observation). So, this theses is to study on the concept & kind of profiling and profiling methods adopted in airlines. Also it presents the method of introduction of profiling system in Korea and the necessity of making law on it.

  • PDF

A Study of Contingency Screening Method Considering Voltage Security (전압안전도를 고려한 상정사고 스크린닝에 관한 연구)

  • 송길영;김영한;최상규
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.39 no.2
    • /
    • pp.133-141
    • /
    • 1990
  • In the operation of an electric power system, the voltage security of the system has acquired more significant importance after the occurrence of large system black-outs caused by voltage collapse several times. This paper describes a fast contingency screening method concerning voltage security. The method defines a voltage-sensitive buses where significant voltage changes would occur as a result of the contingency to reduce the number of bus voltages to be solved for continngency screening. This method is based on the observation that it is not necessary to solve the entire network in most contingency cases because boltage changes actually occur around the contingency. The P-Q decoupled linearized model and the fast error correction method are also adopted in the method to define voltage-sensitive buses and to calculate voltage magnitude on the selected voltage-sensitive buses fastly and reliably. The method suggested in this papaer has been tested in IEEE 30-bus model system and KEPCO 130-bus actual system and its effectiveness for practical use has also been confirmed.

  • PDF

A Study of Contingency Screening Method for Voltage Security Analysis. (전압안전도해석을 위한 상정사고스크린닝에 관한 연구)

  • Song, Kil-Yeong;Kim, Yeong-Han;Choi, Sang-Geu
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.879-882
    • /
    • 1988
  • This paper describes a fast security analysis techique for voltage security assessment. The new method identifies the location of buses with potential voltage problems and thereby defines a voltage-sensitive subnetwork for contingency screening. The efficieny of this method is derived from the use of a voltage subnetwork to drastically reduce the number of bus voltages to be solved; and subsequently from the use of compensation techniques and sparse-vectors methods for screening. Results demonstrating the effectiveness of the method on the IEEE-14 bus model system are presented.

  • PDF

Notification App for Infectious Disease Test Reservation (감염병 검사 예약을 위한 알림 앱)

  • Je-Seong, Hwangbo;Kang-Yoo, Seo;Seung-Soo, Shin
    • Advanced Industrial SCIence
    • /
    • v.1 no.2
    • /
    • pp.30-36
    • /
    • 2022
  • Even in 2022, when medical science is highly developed, pandemic infectious diseases continue to occur. COVID-19, which occurred in 2019, is highly contagious and has caused many infections. In Korea, temporary screening clinics, such as screening clinics and respiratory clinics, have been added to prevent the spread of COVID-19, but there are problems such as a bottleneck due to the large number of people who want to take the test, and this creates a bottleneck. In order to solve the problem, this study aims to identify people who want to be tested for COVID-19 in a screening clinic in real time. It uses a real-time database to link with screening clinics and provides users with the real-time status of each screening clinic. Using the app, users can check the status of screening clinics in real time and can select a clinic smoothly.

Development of On-line Dynamic Security Assessment System (온라인 동적 안전도평가 시스템의 개발)

  • Nam, H.K.;Song, S.G.;Shim, K.S.;Moon, C.J.
    • Proceedings of the KIEE Conference
    • /
    • 2001.11b
    • /
    • pp.73-76
    • /
    • 2001
  • This paper presents a new systematic contingency selection, screening and ranking method for on-line transient security assessment. Transient stability of a particular generator is influenced most by fault near it. Fault at the transmission lines adjacent to the generators are selected as contingency. Two screening methods are developed using the sensitivity of modal synchronizing torque coefficient and computing an approximate critical clearing time(CCT) without time simulation. The first method, which considers only synchronizing power, may mislead in some cases since it does not consider the acceleration power. The approximate CCT method, which consider both the acceleration and deceleration power, worked well. Finally the Single Machine Equivalent(SIME) method is implemented using IPLAN of PSS/E for detailed stability analysis.

  • PDF

A Study for Limitations and Improvement of Information Security Management System (정보보호 관리의 한계점과 개선방안에 관한 연구)

  • Lee, Sujin;Choi, Sang-Yong;Kim, JaeKyoung;Oh, ChungShick;Seo, Changho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.563-570
    • /
    • 2014
  • As information security is becoming more important today, efforts in managing information security more efficiently is becoming greater. Each department such as Ministry of Security and Public Administration, Ministry of Science, Ministry of Education, National Intelligence Service, etc. is established screening criteria for information security and conducted the evaluation. Various information security certification and evaluation for public institutions effectively help to improve the level of information security. However, there are limitations of efficient security management because the examination to be performed frequently by each department. In this paper, we analyze screening criteria of the information security management that is being conducted in the public institutions. We also present limitations of information security management and the direction of improving the limitations.

Security Constrained Optimal Power Flow by Hybrid Algorithms (하이브리드 알고리즘을 응용하여 안전도제약을 만족시키는 최적전력조류)

  • Kim, Gyu-Ho;Lee, Sang-Bong;Lee, Jae-Gyu;Yu, Seok-Gu
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.49 no.6
    • /
    • pp.305-311
    • /
    • 2000
  • This paper presents a hybrid algorithm for solving optimal power flow(OPF) in order to enhance a systems capability to cope with outages, which is based on combined application of evolutionary computation and local search method. The efficient algorithm combining main advantages of two methods is as follows : Firstly, evolutionary computation is used to perform global exploitation among a population. This gives a good initial point of conventional method. Then, local methods are used to perform local exploitation. The hybrid approach often outperforms either method operating alone and reduces the total computation time. The objective function of the security constrained OPF is the minimization of generation fuel costs and real power losses. The resulting optimal operating point has to be feasible after outages such as any single line outage(respect of voltage magnitude, reactive power generation and power flow limits). In OPF considering security, the outages are selected by contingency ranking method(contingency screening model). The OPF considering security, the outages are selected by contingency ranking method(contingency screening model). The method proposed is applied to IEEE 30 buses system to show its effectiveness.

  • PDF

Cervical Cancer Screening Factors in Women With Disabilities Using Big Data Analysis -Focused on National Cancer Screening Subjects- (빅데이터 분석을 이용한 여성 장애인의 자궁경부암 수검 요인 -국가암 검진 대상자 중심-)

  • Jong-bae Park;Young-bok Cho;Min-Hee Park
    • Journal of Practical Engineering Education
    • /
    • v.15 no.2
    • /
    • pp.495-502
    • /
    • 2023
  • Despite the fact that Korea has supported national cancer screening worldwide for a long time, the cancer screening screening rate is low compared to other health screenings and infant screening. In particular, women with disabilities show a lower screening rate for cervical cancer screening compared to women without disabilities. Therefore, from 2011 to 2019, this study investigated the trends in cervical cancer screening rates of women with disabilities and non-disabled women aged 30 and older, and analyzed the factors affecting cervical cancer screening of women with disabilities at the individual and regional level through the cervical cancer screening rates among regions. The purpose of this study is to identify the factors that affect regional variation by dividing into regions. From 2011~2019, the cervical cancer screening rate of people with disabilities was the highest in Daejeon and the lowest in Sejong and Jeju, and the gap in cervical cancer screening rate of people with disabilities by region was analyzed to be up to 13.1%.

The impact of modern airport security protocols on patients with total shoulder replacements

  • Michael D. Scheidt;Neal Sethi;Matthew Ballard;Michael Wesolowski;Dane Salazar;Nickolas Garbis
    • Clinics in Shoulder and Elbow
    • /
    • v.26 no.4
    • /
    • pp.416-422
    • /
    • 2023
  • Background: Advancements in airport screening measures in response to 9/11 have resulted in increased false alarm rates for patients with orthopedic and metal implants. With the implementation of millimeter-wave scanning technology, it is important to assess the changes in airport screening experiences of patients who underwent total shoulder arthroplasty (TSA). Methods: Here, 197 patients with prior anatomic and reverse TSA completed between 2013 and 2020 responded to a questionnaire regarding their experiences with airport travel screening after their operation. Of these patients, 86 (44%) stated that they had traveled by plane, while 111 (56%) had not. The questionnaire addressed several measures including the number of domestic and international flights following the operation, number of false alarm screenings by the millimeter-wave scanner, patient body habitus, and presence of additional metal implants. Results: A total of 53 patients (62%) responded "yes" to false screening alarms due to shoulder arthroplasty. The odds of a false screening alarm for patients with other metal implants was 5.87 times that of a false screening alarm for patients with no other metal implants (P<0.1). Of a reported 662 flights, 303 (45.8%) resulted in false screening alarms. Greater body mass index was not significantly lower in patients who experienced false screening alarms (P=0.30). Conclusions: Patients with anatomic and reverse TSA trigger false alarms with millimeter-wave scanners during airport screening at rates consistent with prior reports following 9/11. Patient education on the possibility of false alarms during airport screening is important until improvements in implant identification are made. Level of evidence: IV.