• Title/Summary/Keyword: Security Zone

Search Result 221, Processing Time 0.023 seconds

Reparation for Victims of the International Civil Aviation Arising from Armed Conflict Zones

  • Huaping, QIN
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.30 no.1
    • /
    • pp.245-271
    • /
    • 2015
  • The downing of the MH17 reminds the world that the international civil aviation is not as safety and security as people expected. Such tragedy is partly due to the risk and danger of the armed conflict zones, but is more attributed to the ignorance to the international law by the responsible parties concerned. International laws applicable to the armed conflict zones shall be strictly followed, and the reparation shall be provided to the victims, otherwise such disaster could not be avoided in the future.

A study on a Preventive measure of traffic congestion in building security system (빌딩 출입 보안 시스템의 정보폭주 방지방법에 관한 연구)

  • 서창옥;김계국
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.71-77
    • /
    • 2004
  • In general, security server controls information of people who usually come to building. In order to exit and entrance, while they bring Identification card into contact with card reader, server admits them into building after asks whether their informations are or not in database. However if many People want to exit and entrance in all direction. it may give rise to a serious traffic congestion. Therefore the delay is due to server's overload. In this paper, we suggested IZA(Identification Zone Algorithm) in order to prevent of traffic congestion.

  • PDF

Study of Influence Factors for Prediction of Ground Subsidence Risk

  • Park, Jin Young;Jang, Eugene;Ihm, Myeong Hyeok
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.29-34
    • /
    • 2017
  • This Analyzed case study of measuring displacement, implemented laboratory investigation, and in-situ testing in order to interpret ground subsidence risk rating by excavation work. Since geological features of each country are different, it is necessary to objectify or classify quantitatively ground subsidence risk evaluation in accordance with Korean ground character. Induced main factor that could be evaluated and used to predicted ground subsidence risk through literature investigation and analysis study on research trend related to the ground subsidence. Major factors of ground subsidence might be classified by geological features as overburden, boundary surface of ground, soil, rock and water. These factors affect each other differently in accordance with type of ground that's classified soil, rock, or complex. Then rock could be classified including limestone element or not, also in case of the latter it might be classified whether brittle shear zone or not.

Authentication Template Protection Using Function Encryption (함수암호를 이용한 인증정보 Template 보호 기술)

  • Park, Dong Hee;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1319-1326
    • /
    • 2019
  • Recently, biometrics and location information are being used for authentication in many devices. However, these information are stored as plaintext in safe device or, stored as ciphertext in authentication server it is used for authentication in plaintext by decrypting. Therefore, the leakage of authentication information as well as hacking can cause fatal privacy problems. In this paper, we propose a technique that can be authenticated without exposing authentication information to ciphertext using function encryption.

A Design of Location Tracking Service System based on MMDBMS (MMDBMS에 기반한 위치 추적 서비스 시스템의 설계)

  • Lee, Soon-Mi
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.403-405
    • /
    • 2010
  • 위치 추적 서비스와 같은 LBS 서비스는 신속하게 변화하는 수많은 양의 공간 및 이동 객체를 관리 및 실시간으로 처리해야 하므로 고성능의 DBMS가 필요하다. 본 논문에서는 실시간 처리와 고성능 처리를 향상시키기 위한 메인 메모리 기반의 이동체 DBMS를 사용한 위치 추적 서비스 시스템을 제안하였다.

  • PDF

A Survey of Trusted Execution Environment Security

  • Yoon, Hyundo;Hur, Junbeom
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.168-169
    • /
    • 2019
  • Trusted Execution Environment(TEE), such as Intel SGX, AMD Secure Processor and ARM TrustZone, has recently been a rising issue. Trusted Execution Environment provides a secure and independent code execution, hardware-based, environment for untrusted OS. In this paper, we show that Trusted Execution Environment's research trends on its vulnerability and attack models. We classify the previous attack models, and summarize mitigations for each TEE environment.

A Study on the Patterns of New Terrorism through the Comparative Analysis with Conventional Terrorism (고전적 테러리즘과의 비교 분석을 통한 뉴 테러리즘 양상에 대한 연구)

  • Song, Jae-Hyeong
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.113-154
    • /
    • 2003
  • We can feel the fear through the reports of outbreaking centers of terror. Also, we noticed through "the 9.11 terror" that there exists no safety zone from terrorism. However, we should question ourselves whether we are relaxing attention or ceasing anxiety too much in the perimeter, as in the peninsula of Korea. Through "the 9.11 terror", the vulnerability of the United State's homeland security has been exposed, giving a serious damage to the national pride. President Bush started the war against terror to strengthen global joints of anti-terrorism, identify terrorists and contribute to the global peace, adopting offensive realism including preemptive attack concept which means to remove the threat preemptively. In today's reality of international politics, where the inhuman, indiscriminate, and anti-civilizational international terror became greater, extending to the stage of war, the international societies' agony and focus lies on how to banish it. The 9.11 terrorism, which is a new form of terrorism, is being distinguished from conventional terrorism into new terrorism. New terrorism is a new form of terrorism meaning that you do not know the enemy, the goal does not exist and they conscientiously use the weapons of mass destruction. This paper is a work meant to help understanding new terrorism, the new form, by a comparative analysis with the conventional terrorism. Therefore the origin, concept and general characteristics new terrorism is picked out and the representative forms of it, which are suicide bombing, cyber, biochemical and nuclear terrorism, are analyzed in detail in theoretical manner.

  • PDF

A Study on the Recognition of Face Based on CNN Algorithms (CNN 알고리즘을 기반한 얼굴인식에 관한 연구)

  • Son, Da-Yeon;Lee, Kwang-Keun
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • Recently, technologies are being developed to recognize and authenticate users using bioinformatics to solve information security issues. Biometric information includes face, fingerprint, iris, voice, and vein. Among them, face recognition technology occupies a large part. Face recognition technology is applied in various fields. For example, it can be used for identity verification, such as a personal identification card, passport, credit card, security system, and personnel data. In addition, it can be used for security, including crime suspect search, unsafe zone monitoring, vehicle tracking crime.In this thesis, we conducted a study to recognize faces by detecting the areas of the face through a computer webcam. The purpose of this study was to contribute to the improvement in the accuracy of Recognition of Face Based on CNN Algorithms. For this purpose, We used data files provided by github to build a face recognition model. We also created data using CNN algorithms, which are widely used for image recognition. Various photos were learned by CNN algorithm. The study found that the accuracy of face recognition based on CNN algorithms was 77%. Based on the results of the study, We carried out recognition of the face according to the distance. Research findings may be useful if face recognition is required in a variety of situations. Research based on this study is also expected to improve the accuracy of face recognition.

An Analysis of Effects of Travel Speed Using the Safety Facilities in the School Zones (어린이 보호구역내 교통안전시설이 구간통행속도에 미치는 효과 분석)

  • Lee, Ho-Won;Joo, Doo-Hwan;Hyun, Cheol-Seung;Kim, Dong-Hyo;Park, Boo-Hee;Lee, Choul-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.3
    • /
    • pp.124-132
    • /
    • 2012
  • There is high probability of children's traffic accidents. Because their physical, mental attribute are weak. Major part of the accidents happen during walking. Above all, jaywalking is the biggest traffic accident reason. Many traffic accidents take place on the road to school or near the home area. So Ministry of Public Administration and Security legislated children safeguard zone since 1995. But a study are inadequate the safety facilities on the effectiveness verification in the school zone. Therefore, this study aims to analyze the effectiveness of safety facilities. The vehicle speed is a direct correlation traffic accident. So in this study, the MOE(Measure of Effectiveness) is average travel speed in the school zone. The results shows that hump, rised pedestrian crossing has an effect.

A Preliminary Study on UAV Photogrammetry for the Hyanho Coast Near the Military Reservation Zone, Eastern Coast of Korea (동해안 군사시설보호구역 주변 향호 연안역을 대상으로 무인항공사진측량에 관한 예비 연구)

  • Kim, Baeck-Oon;Yun, Kong-Hyun;Chang, Tae-Soo;Bahk, Jang-Jun;Kim, Seong-Pil
    • Ocean and Polar Research
    • /
    • v.39 no.2
    • /
    • pp.159-168
    • /
    • 2017
  • To evaluate the accuracy of UAV photogrammetry for Hyangho coast, eastern coast of Korea, we conducted a field experiment wherein UAV photogrammetry test was repeated three times. Since the Haygho coast is located within a military reservation zone, it was necessary to obtain permission to gain access to the beach and to have sensitive aerial photographs showing military facilities inspected and cropped. The standard deviation of the UAV shooting position between the three tests was less than 1 m, but repeatability of footprint on the ground was low due to wind-driven variability of the UAV pose. Self-calibrating bundle adjustment(SCBA) of implementing non-metric camera calibration was failed in one test. In two tests, the vertical error was twice as large as the pixel size except for those areas that were subject to security inspection and cropping. Given the problems that can arise with regard to the repeatability of the shooting area as well as the possibility of failure with regard to SCBA, we strongly recommend that UAV photogrammetry in coastal areas needs to be repeated at least twice.