• Title/Summary/Keyword: Security limits

Search Result 162, Processing Time 0.028 seconds

HYPERSTABILITY OF A SUM FORM FUNCTIONAL EQUATION RELATED DISTANCE MEASURES

  • Lee, Young Whan
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.33 no.1
    • /
    • pp.147-156
    • /
    • 2020
  • The functional equation related to a distance measure f(pr, qs) + f(ps, qr) = M(r, s)f(p, q) + M(p, q)f(r, s) can be generalized a sum form functional equation as follows $${\frac{1}{n}}{\sum\limits_{i=0}^{n-1}}f(P{\cdot}{\sigma}_i(Q))=M(Q)f(P)+M(P)f(Q)$$ where f, g is information measures, P and Q are the set of n-array discrete measure, and σi is a permutation for each i = 0, 1, ⋯, n-1. In this paper, we obtain the hyperstability of the above type functional equation.

Identification and SWOT analysis of ecological and security issues of battery electric vehicles

  • Sanjeev Kumar;Amit Pal
    • Advances in Energy Research
    • /
    • v.8 no.3
    • /
    • pp.165-174
    • /
    • 2022
  • Environmental sustainability is critical; else, the whole planet would face climatic disasters in the near future. A transportation system based on electric vehicles is assumed to be capable of providing long-term mobility. However, despite several attempts by national and international authorities, a great aim could not be met in India or the rest of the globe. Existing electric cars have a number of limits and obstacles. This report highlighted significant environmental and safety-related constraints that contribute to the low adoption rate of BEVs in India. A SWOT analysis was also carried out to identify the important elements influencing the future of BEV penetration in India.

The limits in legislating and the methods for improving the current 'National Guidelines on Anti-Terror Activities' (현행 '국가대테러활동지침'의 문제점과 입법적 개선방안에 관한 연구)

  • Kim, Soon-Seok;Shin, Jae-Chul
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.95-117
    • /
    • 2009
  • Ever since the 9/11 terror attack, all the world has perceived the need and taken actions to make an anti-terror law, however The Republic of Korea has not yet come up with any relevant output. Currently, the Korean government apportions duties to each related government agency and sets up systems for cooperation among them to make preparations against and cope with terror threats, according to The National Guidelines on Anti-Terror Activities (the presidential directive number 47 given on January 21, 1982). However, the directive has many limits and shortcomings in coping with national emergencies. In this situation, this research aims to compare the national anti-terror laws of others countries with Korea's, in order to understand the problems in Korea, i.e., that The National Guidelines on Anti-Terror Activities, which are the only anti-terror regulations in Korea do not clearly describe the concept and range of a terror, that national anti-terror meetings and the anti-terror standing committee have problems with their operation, that the Terrorism Information Integration Center has also its own problems, and that Korea lacks in preparatory actions against terror crimes and there are still problems about investigations into terror incidents. In order to solve these problems for the future, the present author suggests that the purpose of the law on The National Guidelines on Anti-Terror Activities shall be re-established so as to meet the current anti-terror conditions of Korea, the concept of a terror and anti-terror activities shall be clarified, anti-terror organizations shall be unified, the chair of the anti-terror standing committee shall be appointed legally and automatically according to the relevant rule and be given more rights so as to have free access to private information for anti-terror activities and terror-related information, and systems shall be supplemented for reporting terror-involved persons and funds.

  • PDF

Analysis and countermeasure of causes of inducing violence of private security companies on the actual sites of administrative execution by proxy (행정대집행 현장에서 민간경비업체의 폭력 유발 원인 분석과 대책)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.119-141
    • /
    • 2009
  • Administrative execution by proxy is one of forced executions of administration and is also called as "enforced execution by proxy" in which administration institutions or the third party executes by proxy on behalf of parties who did not execute obligations under administration law and files claims to compensate expenses required in the proxy execution. Despite the actual site of administrative execution by law, social problems are generated because various violence and behaviors of infringement of human rights between executer and obligator are rampant and thus causing human damages since forced execution by physical force is carried out and cases of police indictments and petition to human rights committee are gradually increasing. Majority of people mobilized in this actual site of violence are supplied by private security companies which provide service contract and mobilization of people without qualification of guards or security service and irrational execution by proxy and violent actions by so-called service hooligans connected to violence organizations are now becoming social issues. In these actual sites of violence, structurally very complicated problems such as economic rights, right of residence, struggle for living, and intervention by outsiders are contained. This thesis has analyzed causes of outbreaks of violence and discussed about improvement countermeasure by paying attention to mobilization of people by private security companies. As the result, through revision and improvement of laws and systems, execution institution and policemen must be present at actual sites of execution by proxy to control physical execution of private security companies to be carried out legally and when violent collisions are occurring, it shall be stipulated that police should immediately intervene. Practices of execution by proxy of execution administration institutions shall be avoided and causes of occurrences of violence shall be eliminated by discrete decisions of execution by proxy, elimination of service contract conditions focused on accomplishments, and stipulation of responsibility of execution institutions when problems occur. Practices of solving petitions through collective actions of obligators shall be eliminated and strict enforcement of laws such as disturbance of official execution or compensation claims for expenses of execution by proxy must be carried out and intervention by the third parties must be intercepted. Mobilization of manpower by security companies shall be limited to people with prior registration who have acquired and finished qualification and education by security business law and before putting them on actual sites, it shall be obliged that execution plan with clear written records of working location, mission, and work rules must be submitted in advance to police station in charge and also they must be controlled to follow laws and statutes such as uniform and equipments. In addition, personal criminal responsibility for violent actions must be clearly stipulated and advanced securing soundness of security companies such as limits of service contracts with records of accidents is required. Order placement behaviors of special organizations under the pretext of rehabilitation business must be eradicated and companies with capability and strong intention of observation of laws must be able to receive orders by intercepting chains of contracts and sub-contracts. Issues of improvement countermeasure of social problem, living, and compensation including rights of residence and environment are excluded from the discussion.

  • PDF

A Study on the Relationship between Industrial Espionage, Self-Control, and Organizational Commitment (산업기술유출과 자기통제력, 조직애착도의 관계에 관한 연구)

  • Hwang, Hyun-Dong;Lee, Chang-Moo
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.119-137
    • /
    • 2016
  • In a recent period, it becomes more and more important to keep the cutting-edge industrial technology secured. This is because competitive technology appears to be a cornerstone of national power. Although the industrial espionage must be an illegal behavior or a kind of white-collar crime, there has been few researches on industrial espionage from a criminological perspective. This study investigates the relationship between industrial espionage, self-control, and organizational commitment. The hypotheses of this study were found to be statistically significant. The hypothesis 1 that the high self-control reduces the possibility of industrial espionage was accepted, and the hypothesis 2 that the high organizational commitment reduces the possibility of industrial espionage was also accepted. This results showed that self-control and organizational commitment were the key factors to prevent industrial espionage, which eventually reinforces industrial security. This study used a convenient sampling, which might be the limits of this study. By using a convenient sampling, the result of the study could not depend on representative sample. Nonetheless, this study was trying to explore the relationship between industrial espionage, self-control, and organizational commitment which was not researched yet. The purpose of this study is to contribute to find out the criminological causes of industrial espionage and eventually to prevent it.

  • PDF

The Examination and Development Plan of Maritime Policing Act ("해양경비법" 검토와 발전방안)

  • Roh, Ho-Rae
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.95-122
    • /
    • 2012
  • The ocean in the 21st century is getting emphasized as a treasury of natural resources and a growth engine for the nation. And nations around the world have entered into the hyper-competition to take the initiative for those marine resources. Under the situation, the Korea Coast Guard is devoting itself with full force to protecting maritime sovereignty, ensuring maritime safety and security and preserving the marine environment. Purpose of this study is to analyze Maritime Policing Act of 2012 and their problems and to suggest improvement measures. Objectives of Maritime Policing Act of 2012 is national Defence, policing for maritime security, protection of marine natural resources and marine facility in territorial waters and exclusive economic zone(EEZ) of Korea. Limits of Maritime Policing Act of 2012 are as follows. First, As organization related rules in Maritime Policing Act of 2012 are not enough, Maritime police agency Act should be revised and enacted in order to cope with future administrative demands and legal ground. Second, Article 22 penal regulation is more severe than regulations of another Act. Third, Article 14 should be made improvement for pre-prevention through the pre-report and the establishment of prohibition boundary in maritime demonstration.

  • PDF

Mutual Authentication between the mobile node in Ad-hoc Network (Ad-hoc 망에서 이동 노드 간 상호 인증)

  • Choi, Woo-Jin;Seok, Gyeong-Hyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.10
    • /
    • pp.1087-1092
    • /
    • 2015
  • It was diversified demand for a wireless network to the rapid growth of the Internet, the time and space that are not in the new level of Internet technology, limits the Ad-hoc networks are needed. Ad-hoc networks do not communicate with the central station, each of the mobile nodes included in the network communicate with each other by the relay role. In recent years, the Ad-hoc wireless networks in a variety of routing protocols and network security, research is actively underway for the authentication method, but the security of wireless Internet and Ad-hoc networks, certification is incomplete situation. This paper considers the authentication and key agreement technique applicability of the USIM card using the DSR routing protocol of the Java Card and Ad-hoc networks, we propose a secure authentication mechanism between the mobile node.

Technique for Indentifying Cyber Crime Using Clue (수사단서를 이용한 동일 사이버범죄 판단기법)

  • Kim, Ju Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.767-780
    • /
    • 2015
  • In recent years, as smart phone penetration rate is growing explosively, new forms of cyber crime data is poured out beyond the limits of management system for cyber crime investigation. These new forms of data are collected and stored in police station but, some of data are not systematically managed. As a result, investigators sometimes miss the hidden data which can be critical for a case. Crime data is usually generated by computer which produces complex and huge data and records many logs automatically, so it is necessary to simplify a collected data and cluster by crime pattern. In this paper, we categorize all kinds of cyber crime and simplify crime database and extract critical clues relative to other cases. Through data mining and network-visualization, we found there is correlation between clues of a case. From this result, we conclude cyber crime data mining helps crime prevention, early blocking and increasing the efficiency of the investigation.

Improving Scalability using Parallelism in RFID Privacy Protection (RFID 프라이버시 보호에서 병행성을 이용한 확장성 개선)

  • Shin Myeong-Sook;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1428-1434
    • /
    • 2006
  • In this paper, we propose the scheme solving privacy infringement in RFID systems with improving the scalability of back-end server. With RFID/USN becoming important subject, many approaches have been proposed and applied. However, limits of RFID, low computation power and storage, make the protection of privacy difficult. The Hash Chain scheme has been known as one guaranteeing forward security, confidentiality and indistinguishability. In spite of that, it is a problem that requires much of computation to identify tags in Back-End server. In this paper, we introduce an efficient key search method, the Hellman Method, to reduce computing complexity in Back-End server. Hellman Method algorism progresses pre-computation and (re)search. In this paper, after applying Hellman Method to Hash chain theory, We compared Preservation and key reference to analyze and apply to parallel With guaranteeing requistes of security for existing privacy protecting Comparing key reference reduced computation time of server to reduce computation complex from O(m) to $O(\frac{m{^2/3}}{w})$ than the existing form.

A DDMPF(Distributed Data Management Protocol using FAT) Design of Self-organized Storage for Negotiation among a Client and Servers based on Clouding (클라우딩 기반에서 클라이언트와 서버간 협상을 위한 자가 조직 저장매체의 DDMPF(Distributed Data Management Protocol using FAT) 설계)

  • Lee, Byung-Kwan;Jeong, Eun-Hee;Yang, Seung-Hae
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1048-1058
    • /
    • 2012
  • This paper proposes the DDMPF(Distributed Data Management Protocol using FAT) which prevents data loss and keeps the security of self-organized storages by comprising a client, a storage server, and a verification server in clouding environment. The DDMPF builds a self-organized storage server, solves data loss by decentralizing the partitioned data in it in contrast to the centralized problem and the data loss caused by the storage server problems of existing clouding storages, and improves the efficiency of distributed data management with FAT(File Allocation Table). And, the DDMPF improves the reliability of data by a verification server's verifying the data integrity of a storage server, and strengthens the security in double encryption with a client's private key and the system's master key using EC-DH algorithm. Additionally, the DDMPF limits the number of verification servers and detects the flooding attack by setting the TS(Time Stamp) for a verification request message and the replay attack by using the nonce value generated newly, whenever the verification is requested.