• Title/Summary/Keyword: Security light

Search Result 381, Processing Time 0.026 seconds

The Study of domestic application for the Guideline of Model Outdoor Lighting Ordinance (MLO 옥외조명 설치지침의 국내 적용성 연구)

  • Jung, Jong-Hwan;Lee, Kyumok;Gu, Jinhoi
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.26 no.11
    • /
    • pp.20-29
    • /
    • 2012
  • The outdoor lighting is provided for a variety of purposes, for work or recreation, for safety or security, for amenity and for advertising or display. But the effects of lighting on the natural environment can be difficult to quantify. At present, in many countries, various policies to manage the light trespass from outdoor light have been planned. For example, Model Lighting Ordinance(MLO) will allow communities to drastically reduce light pollution and glare and lower excessive light levels. The recommended practices of the IES can be met using readily available, reasonably priced lighting equipment. So, it this paper, we analyze the effect of road lighting on light trespass using by RELUX program. And then we consider the possibility of practical application of BUG rating in Korea.

Improvement of PWM Driving Control Characteristics for Low Power LED Security Light (저전력형 LED 보안등의 PWM형 구동제어 특성 개선)

  • Park, Hyung-Jun;Kim, Nag-Cheol;Kim, In-Su
    • Journal of IKEEE
    • /
    • v.21 no.4
    • /
    • pp.368-374
    • /
    • 2017
  • In this Paper, we developed a low power type LED security light using LED lighting that substitutes a 220[V] commercial power source for a solar cell module instead of a halogen or a sodium lamp. in addition, a PWM type drive control circuit is designed to minimize the heat generation problem and the drive current of the LED drive controller. in developed system, The light efficiency measurement value is 93.6[lm/W], and a high precision temperature sensor is used inside the controller to control the heat generation of the LED lamp. In order to eliminate the high heat generated from the LED lamp, it is designed to disperse quickly into the atmosphere through the metal insertion type heat sink. The heat control range of LED lighting was $50-55[^{\circ}C]$. The luminous flux and the lighting speed of the LED security lamp were 0.5[s], and the beam diffusion angle of the LED lamp was about $110[^{\circ}C]$ by the light distribution curve based on the height of 6[m].

Knowing the Level of Information Security Awareness in the Usage of Social Media Among Female Secondary School Students in Eastern Makkah Al-Mukarramah- Saudi Arabia

  • Gharieb, Magdah Ezat
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.360-368
    • /
    • 2021
  • This study aims at knowing both the level of information security awareness in the use of social media among female secondary school students in Makkah Al-Mukarramah, and the procedures that students follow when exposed to hacking or other security problems. The study relied on the descriptive survey approach. The results showed a high percentage of social media use among the study sample, and the most used applications by the students are snapchat and Instagram applications successively. In fact, 48% of the study sample have awareness of information security, the majority of the students memorize the password in the devices, most of them do not change them, and they have knowledge of fake gates and social engineering. However, their knowledge of electronic hacking is weak, and students do not share passwords with anyone at a rate of 67%. At the same time, they do not update passwords. Moreover, most of the procedures followed by students when exposed to theft and hacking is to change the e-mail data and the password, and the results varied apart from that, which reflects the weak awareness of the students and the weakness of procedures related to information security. The study recommends the necessity to raise awareness and education of the importance of information security and safety, especially in light of what the world faces from data electronic attacks and hackings of electronic applications.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

A Research on Mobile Malware Model propagated Update Attacks (변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구)

  • Ju, Seunghwan;Seo, Heesuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.47-54
    • /
    • 2015
  • The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

A Risk Management Model for Efficient Domestic Information Technology Security (효율적 국내 정보기술 보안을 위한 위험관리 모형)

  • Ahn, Choon-soo;Cho, Sung-Ku
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.28 no.1
    • /
    • pp.44-56
    • /
    • 2002
  • For the risk analysis and risk assessment techniques to be effectively applied to the field of information technology (IT) security, it is necessary that the required activities and specific techniques to be applied and their order of applications are to be determined through a proper risk management model. If the adopted risk management model does not match with the characteristics of host organization, an inefficient management of security would be resulted. In this paper, a risk management model which can be well adapted to Korean domestic IT environments is proposed for an efficient security management of IT. The structure and flow of the existing IT-related risk management models are compared and analysed, and their common and/or strong characteristics are extracted and incorporated in the proposed model in the light of typical threat types observed in Korean IT environments.

Ubiquitous Home Security Robot System based on Sensor Network (센서 네트워크 기반의 홈 보안로봇 시스템 구현)

  • Kim, Yoon-Gu;Lee, Ki-Dong
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.1
    • /
    • pp.71-79
    • /
    • 2007
  • We propose and develop Home Security robot system based on Sensor Network (HSSN) configured by sensor nodes including radio frequency (RF), ultrasonic, temperature, light and sound sensors. Our system can acknowledge security alarm events that are acquired by sensor nodes and relayed in the hop-by-hop transmission way. There are sensor network, Home Security Mobile Robot (HSMR) and Home Server(HS) in this system. In the experimental results of this system, we presented that our system has more enhanced performance of response to emergency context and more speedy and accurate path planning to target position for arriving an alarm zone with obstacle avoidance and acquiring the context-aware information.

  • PDF

The Development of PV-Batttery Driven LED Security Lighting (태양광 배터리 하이브리드 시스템 기반 LED 보안등 개발)

  • Go, Seok-Il;Ahn, Seon-Ju;Park, Byeong-Ha;Choi, Joon-Ho
    • 한국태양에너지학회:학술대회논문집
    • /
    • 2012.03a
    • /
    • pp.433-438
    • /
    • 2012
  • LED is expected as an environmentally friendly next generation light source with its good reliability and long lifetime. In this paper, we propose the PV-Battery Driven LED Security Lighting using the LabVIEW program. The remote monitoring is a program for monitoring the voltage and current that made from PV-Battery Driven LED security lighting in remote area. The main subject of this paper is about making the more useful monitoring program to get and save the data from LED Security Lighting. We develop a prototype of the proposed system.

  • PDF

Information Security Policy in Ubiquitous-Ecological City (u-Eco City에서의 정보보호 정책)

  • Jang, Hee-Seon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.43-48
    • /
    • 2012
  • In this paper, the requirements for information security are presented in the ubiquitous ecological(u-Eco) city. The various definition of ubiquitous city is analyzed first, the concept of the u-Eco City, services and major projects are then presented. The framework of the integrated operating center for u-Eco city is proposed, the privacy, data security and network facility protection in the center are analyzed. Unlike to previously proposed security algorithms, the light-weight encoding algorithms(such as block/stream encoding, pseudo-random generator, hash function, and public key encoding) in the u-Eco city center are required to communicate the information in the ubiquitous sensor network. Furthermore, the principal policies guaranteeing the secrecy and authentication for the private information are also presented.

Measures against Security Safety and Hallucinogenic Drug Crimes (환각성 약물범죄와 경호안전상의 대응방안)

  • Jeon, Kyung-Soo
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.211-226
    • /
    • 1999
  • Troublesome problems are being caused by hallucinogenic drugs which come not only from illegal narcotics but also from unprohibited general drug-kinds such as cough-remedy agents of textromerupan, namely, Lamina, Rubi-king and the likes. Abuse and misuse of narcotics permeated into and threatens mental health of socially-known peoples, actor, actress, talents and businessmen as well. This study especially dealt with problems related with Mesampetamin, Rurajaepam, Texstrometropan and Karisofrodol which affects mental behaviour, and considered counter-measures through analysis and developed appropriate system of goods circulation for guidance to be complied by the medicine professionalists. The guidance sought here is recommended to the government ministries for further enforcement of crack-down of the drug crimes. Arquesa in method is recommend as a method of identifying behaviors and facial expressions of abusers and misusers of narcotics at the spot in place. This study is directed to curtailing hallucinogenic drugs use for absolute preventive security by detecting out black dealers of narcotics supplying to the abusers and misusers. There is a need of special education program to cut off the flow of narcotics or drugs crimes into official security force as well as private security personnel. This study introduced a priority and emphasis of real augmentation to theory and practice of the modern scientific security which can protect the mental health of the guarded persons as well especially in the light of security safety curriculum at the school.

  • PDF