• Title/Summary/Keyword: Security Zone

Search Result 221, Processing Time 0.032 seconds

The Factors Considered for Disaster Prevention in Surface Investigation of Rock Slope (암반사면 표면조사시 재해 예방을 위한 고려요인)

  • Le, Seok-Jin;Jun, Sung-Yong;Lee, Joo-Ho;Choi, Seong-Rok
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.2
    • /
    • pp.75-83
    • /
    • 2009
  • When the exposed surface of rock slopes investigated, various factors have not been considered. The factors required to be considered include the vlume swelling of rock caused by stress release at the fault zone, unexposed discontinuities in the earth and so on. Also, rock slope failure occurs sometimes due to these factors. In this paper, we intend to help engineers to judge about the stability of similar new cutting-slopes or the maintenance of already cut-slope, so that they can consider these factors.

  • PDF

A study on an Infrastructure for Virus Protection (바이러스 차단 인프라 구조에 관한 연구)

  • Noh, Si-Choon;Kim, Su-Hee;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.53-62
    • /
    • 2005
  • Virus protection infrastructure managementis network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Improved virus protection infrastructure filters unnecessary mail at the gateway stage to reduce the load on server. As a result, numberof transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

Comparison on Patterns of Conflicts in the South China Sea and the East China Sea through Analysis on Mechanism of Chinese Gray Zone Strategy (중국의 회색지대전략 메커니즘 분석을 통한 남중국해 및 동중국해 분쟁 양상 비교: 시계열 데이터에 근거한 경험적 연구를 중심으로)

  • Cho, Yongsu
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.273-310
    • /
    • 2020
  • This study aims at empirically analyzing the overall mechanism of the "Gray Zone Strategy", which has begun to be used as one of Chinese major maritime security strategies in maritime conflicts surrounding the South China Sea and East China Sea since early 2010, and comparing the resulting conflict patterns in those reg ions. To this end, I made the following two hypotheses about Chinese gray zone strategy. The hypotheses that I have argued in this study are the first, "The marine gray zone strategy used by China shows different structures of implementation in the South China Sea and the East China Sea, which are major conflict areas.", the second, "Therefore, the patterns of disputes in the South China Sea and the East China Sea also show a difference." In order to examine this, I will classify Chinese gray zone strategy mechanisms multi-dimensionally in large order, 1) conflict trends and frequency of strategy execution, 2) types and strengths of strategy, 3) actors of strategy execution, and 4) response methods of counterparts. So, I tried to collect data related to this based on quantitative modeling to test these. After that, about 10 years of data pertaining to this topic were processed, and a research model was designed with a new categorization and operational definition of gray zone strategies. Based on this, I was able to successfully test all the hypotheses by successfully comparing the comprehensive mechanisms of the gray zone strategy used by China and the conflict patterns between the South China Sea and the East China Sea. In the conclusion, the verified results were rementioned with emphasizing the need to overcome the security vulnerabilities in East Asia that could be caused by China's marine gray zone strategy. This study, which has never been attempted so far, is of great significance in that it clarified the intrinsic structure in which China's gray zone strategy was implemented using empirical case studies, and the correlation between this and maritime conflict patterns was investigated.

  • PDF

Image-based Intelligent Surveillance System Using Unmanned Aircraft (무인비행체를 이용한 영상 기반 지능형 순찰 시스템)

  • Kim, Do Hyun;Kim, Jung Eun;Song, Ji Hag;Shin, Yong Jun;Hwang, Sung Soo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.3
    • /
    • pp.437-445
    • /
    • 2017
  • Necessity of security reinforcement has been increased these days. As a result, surveillance systems using CCTV and the patrol system by person have been applied to security zone. However, CCTV has a blind spot and CCTV itself cannot handle emergency situation. Patrol system by person is economically expensive. To overcome these disadvantages, this paper presents an image-based surveillance system using unmanned aircraft. As a default, unmanned aircraft traces lines installed on ground which represents path for patrolling. If the aircraft detects objects, then it keeps a constant distance between object without missing the object in the image. Simulation results show that the proposed system can be operated even with unmanned aircraft with low specification.

Implementation of ATmega128 based Short Message Transmission Protocol IMCP (ATmega128 기반 단문 메시지 전송 프로토콜 IMCP 구현)

  • Kim, Jeom Go
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.3-11
    • /
    • 2020
  • The social networking service (SNS) is free, but the data usage fee paid to the telecommunications company and the member's information must be provided directly or indirectly. In addition, while SNS' specifications for transmitting and receiving devices such as smart-phones and PCs are increasing day by day, using universal transmission protocols in special environments such as contaminated areas or semiconductor manufacturing plants where work instructions are mainly made using short messages is not easy. It is not free and has a problem of weak security. This paper verified the practicality through the operation test by implementing IMCP, a low-power, low-cost message transmission protocol that aims to be wearable in special environments such as risk, pollution, and clean zone based on ATmega128.

Ubiquitous Home Security Robot System based on Sensor Network (센서 네트워크 기반의 홈 보안로봇 시스템 구현)

  • Kim, Yoon-Gu;Lee, Ki-Dong
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.1
    • /
    • pp.71-79
    • /
    • 2007
  • We propose and develop Home Security robot system based on Sensor Network (HSSN) configured by sensor nodes including radio frequency (RF), ultrasonic, temperature, light and sound sensors. Our system can acknowledge security alarm events that are acquired by sensor nodes and relayed in the hop-by-hop transmission way. There are sensor network, Home Security Mobile Robot (HSMR) and Home Server(HS) in this system. In the experimental results of this system, we presented that our system has more enhanced performance of response to emergency context and more speedy and accurate path planning to target position for arriving an alarm zone with obstacle avoidance and acquiring the context-aware information.

  • PDF

Burglary Prevention Effect of Target Hardening through Certified Security Products by WDQ Analysis (WDQ분석을 통한 타겟하드닝 CPTED의 침입범죄 예방효과 검증: 안산시 사례 중심으로)

  • Park, Hyeonho;Kim, Kang-Il;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.56
    • /
    • pp.9-30
    • /
    • 2018
  • Crime prevention strategies are introduced to reduce the loss caused by crimes, and Target hardening against domestic burglary attacks is broadly accepted as one of such physical security strategies. In terms of business and home security, target hardening is one of the suite of protective measures that are included in crime prevention through environmental design(CPTED). This can include ensuring all doors and windows are sourced and fitted in such a way that they can resist forcible and surreptitious from the attack of intruder. Target hardening with certified security doors, security windows and secure locks are revealed to be much more effective to deter burglary attacks than other security devices, such as CCTV, lightings and alarms which have largely psychological and indirect impact. A pilot program of target hardening utilizing certified security window and locks was carried out in Ansan city, South Korea in 2016. This study is based on the quasi-experimental design of this program for a residential area. The researchers tried to verify the crime displacement effect of the target hardening program and the diffusion effects of crime prevention benefits by analysing the crime statistics. The evaluation utilized WDQ(Weighted Displacement Quotient) technique to analyze whether the crime displacement occurred, compared the crime statistics of the experimental area with that of buffer zone and controlled areas. The result showed that the target hardening program was significantly effective in crime prevention. The number of burglary in the experimental site with target hardening intervention reduced by 100%, although the areas without the intervention showed reduction in the burglary. The crime displacement was not found at all, and the number of burlary at the buffer zone also reduced significantly.

3D Vision-based Security Monitoring for Railroad Stations

  • Park, Young-Tae;Lee, Dae-Ho
    • Journal of the Optical Society of Korea
    • /
    • v.14 no.4
    • /
    • pp.451-457
    • /
    • 2010
  • Increasing demands on the safety of public train services have led to the development of various types of security monitoring systems. Most of the surveillance systems are focused on the estimation of crowd level in the platform, thereby yielding too many false alarms. In this paper, we present a novel security monitoring system to detect critically dangerous situations such as when a passenger falls from the station platform, or when a passenger walks on the rail tracks. The method is composed of two stages of detecting dangerous situations. Objects falling over to the dangerous zone are detected by motion tracking. 3D depth information retrieved by the stereo vision is used to confirm fallen events. Experimental results show that virtually no error of either false positive or false negative is found while providing highly reliable detection performance. Since stereo matching is performed on a local image only when potentially dangerous situations are found; real-time operation is feasible without using dedicated hardware.

China's Assertive Diplomacy and East Asian Security (중국의 공세적 대외행태와 동아시아 안보)

  • Han, Seok-Hee
    • Strategy21
    • /
    • s.33
    • /
    • pp.37-64
    • /
    • 2014
  • The year 2010 has been regarded as a year of China's assertive diplomacy. A series of China's behavior--including China's critical reaction to the U.S. for its sales of weapons to Taiwan, the Dalai Lama's visit to President Obama, China's arbitrary designation of 'core interests' over the South China Sea, China's inordinate reactions to the sinking of the Cheonan and Yeonpyeong bombardment, and China's activities in the Senkaku/Diaoyu island areas--has served as the witnesses to China's assertive diplomacy in 2010. The major causes of China's assertive diplomacy can be summed up by three factors: potential power transition from U.S. to China; emerging China's nationalism; and the recession of the Tao Guang Yang Hui as a diplomatic principle. But a majority of Western sinologists claim that China's assertive diplomacy is defensive in terms of its character. China's neighboring states, however, perceive its assertive diplomacy as diplomatic threat. Due to these states' geographical proximity and capability gaps with China, these neighbors experience difficulties in coping with China's behavior. In particular, China's coercive economic diplomacy, in which China tends to manipulate the neighbors' economic dependency on China for its diplomatic leverage, is a case in point for China's assertive diplomacy. China's assertiveness seems to be continued even after the inauguration of Xi Jinping government. Although the Xi government's diplomatic rhetorics in "New Type of Great Power Relationship" and the "Convention for Neighboring States Policy" sound friendly and cooperative, its subsequent behavior, like unilateral announcement of Chinese Air Defense Identification Zone (CADIZ), does not conform with its rhetoric. Overall, China's assertiveness has been consolidated as a fashion of its diplomacy, and it is likely to continue in its relations with neighbors. As a neighboring state, the ROK should approach to it with more balanced attitude. In addition, it needs to find out a new diplomatic leverage to deal with China in accordance with its security environment, in which China plays a growing role.