• Title/Summary/Keyword: Security reinforcement

Search Result 171, Processing Time 0.027 seconds

A self-driving Robot for target place using reinforcement learning (목적지로 자율 주행 가능한 강화 학습 로봇)

  • Im, Kyeong-Uk;Son, Ji-Seon;Choi, Hyeon-Dong;Weon, Ill-yong
    • Annual Conference of KIPS
    • /
    • 2021.11a
    • /
    • pp.745-748
    • /
    • 2021
  • 가상 환경의 시뮬레이션을 이용해 지능형 로봇에 강화 학습 기법을 적용하는 접근법은 실제 세계의 로봇들의 학습에 유용하다. 우리는 이러한 방법을 적용해서 장애물을 회피하고, 로봇이 특정 목표물을 인식하면 목표물로 자율적으로 이동하는 알고리즘을 개발하였다. 제안된 방법의 유용성 검증은 구현과 실험으로 확인하였다.

The Effect of Health Care Expenditure on Income Inequality (의료비 지출이 소득불평등에 미치는 영향)

  • Song, Eun-Cheol;Kim, Chang-Yup;Shin, Young-Jeon
    • Health Policy and Management
    • /
    • v.20 no.3
    • /
    • pp.36-57
    • /
    • 2010
  • The degree of income inequality deepened by health care expenditure was useful in assessing the health security level. This exploratory study was conducted to provide a basic evidence to prove the necessity of reinforcement the benefit coverage of South Korea's health security systems. Data from the Household Income and Expenditure Survey of Korea and Luxembourg Income Study were used. Income inequality indices before and after deduction of health care expenditure were computed, and the degree of the increase in the indices was compared among 13 countries. The degree of decrease against the effect of income inequality reduction policies by health care expenditure was determined. The relationships between the national characteristics and the increase in income inequality were examined. In South Korea, all income inequality indices increased after deducting health care expenditure, but the difference was not high compared to the mean of 13 countries. However, the degree of decrease against the effect of income inequality reduction policies by health care expenditure was high, compared to the mean of 13 countries. The proportion of public sector spending on health care proved to be statistically significant with the increase of income inequality indices (p<0.05). In the context of the continuous increase in health care expenditure, if benefit coverage of health security systems is not reinforced, income inequality will all the more increase due to health care expenditure. In the establishment of the policies for reinforcement of the benefit coverage, income inequality after deduction of health care expenditure should be continuously monitored.

A Study on a Countermeasure Program using the Martial Arts for a Security Guard Caused by an Accidental Situation (우발상황시 경호무도 대응방안)

  • Park, Jun-Seok;Kang, Young-Gil
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.327-340
    • /
    • 2003
  • As a countermeasure under accidental occurrence situation, First, as application form of martial arts, A security guard foster ability that can protect a target person of guard and own body under accidental occurrence situation through incessant martial arts practice. To achieve this purpose, incessant training mental power and physical strength reinforcement should be kept on to prevent, therefore make a safety control function for such as weapon, small arms, explosive, vehicles terror etc. happened under accidental occurrence situation. Second, according to the contents of training based on the classification category of martial arts for security guard under accidental situation, a security guard must keep safety distance necessarily lest a target person of gurad should be attacked by attacker, therefore, intercept an attack opportunity if a safety distance between a target person of guard and attacker is not kept. Third, It is to practice confrontation techniques based on the type of attack. A security guard must develp situation disposal ability that can cope properly with the attack using empty hands, murderous weapon, small arms, explosive by case or individual or mass of threat that impose danger and injury in a target person's body of guard.

  • PDF

Enhancing VANET Security: Efficient Communication and Wormhole Attack Detection using VDTN Protocol and TD3 Algorithm

  • Vamshi Krishna. K;Ganesh Reddy K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.233-262
    • /
    • 2024
  • Due to the rapid evolution of vehicular ad hoc networks (VANETs), effective communication and security are now essential components in providing secure and reliable vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. However, due to their dynamic nature and potential threats, VANETs need to have strong security mechanisms. This paper presents a novel approach to improve VANET security by combining the Vehicular Delay-Tolerant Network (VDTN) protocol with the Deep Reinforcement Learning (DRL) technique known as the Twin Delayed Deep Deterministic Policy Gradient (TD3) algorithm. A store-carry-forward method is used by the VDTN protocol to resolve the problems caused by inconsistent connectivity and disturbances in VANETs. The TD3 algorithm is employed for capturing and detecting Worm Hole Attack (WHA) behaviors in VANETs, thereby enhancing security measures. By combining these components, it is possible to create trustworthy and effective communication channels as well as successfully detect and stop rushing attacks inside the VANET. Extensive evaluations and simulations demonstrate the effectiveness of the proposed approach, enhancing both security and communication efficiency.

A Study on procedure of Criminal Cases related to the Security (안보형사법제도의 바람직한 개선방향 제시 - 안보사례분석을 중심으로 -)

  • Joo, Seong-Bhin
    • Korean Security Journal
    • /
    • no.43
    • /
    • pp.231-257
    • /
    • 2015
  • Today, the international community make every effort to suppress security crimes, to provide numerous institutional strategies and to prevent security crimes such as the terrorism and spy. Particularly, developed countries in the field of security are strengthening related legislation under new-security conditions. Things work a little differently about security crimes because the nation's benefit and protection of the law is the basis of individual benefit and protection of the law under investigation procedure of the security crimes. Therefore they have policy that permits major investigative agency under the arrest and detention procedure(e.g. security and communication monitoring ${\ldots}$). Criminal procedure's improvement and reinforcement are very important for events related security. But, The investigation procedure between criminal offense and security crimes makes no odds in the Korea. Continuance of such a national mood will accuse of not responding appropriately in preparation for new-security conditions recently. To revise with international best security legislation, We should institute a proper registration system in Korea's situation. This study have been discussing how to improve related legislation under new-security conditions through the cases analysis of the arrest and detention procedure in Korea.

  • PDF

An Analysis of Cyber Attacks and Response Cases Related to COVID-19 (코로나19 관련 사이버 공격 및 대응현황 분석)

  • Lee, Yongpil;Lee, Dong-Geun
    • Journal of Information Technology Services
    • /
    • v.20 no.5
    • /
    • pp.119-136
    • /
    • 2021
  • Since the global spread of COVID-19, social distancing and untact service implementation have spread rapidly. With the transition to a non-face-to-face environment such as telework and remote classes, cyber security threats have increased, and a lot of cyber compromises have also occurred. In this study, cyber-attacks and response cases related to COVID-19 are summarized in four aspects: cyber fraud, cyber-attacks on companies related to COVID-19 and healthcare sector, cyber-attacks on untact services such as telework, and preparation of untact services security for post-covid 19. After the outbreak of the COVID-19 pandemic, related events such as vaccination information and payment of national disaster aid continued to be used as bait for smishing and phishing. In the aspect of cyber-attacks on companies related to COVID-19 and healthcare sector, we can see that the damage was rapidly increasing as state-supported hackers attack those companies to obtain research results related to the COVID-19, and hackers chose medical institutions as targets with an efficient ransomware attack approach by changing 'spray and pray' strategy to 'big-game hunting'. Companies using untact services such as telework are experiencing cyber breaches due to insufficient security settings, non-installation of security patches, and vulnerabilities in systems constituting untact services such as VPN. In response to these cyber incidents, as a case of cyber fraud countermeasures, security notices to preventing cyber fraud damage to the public was announced, and security guidelines and ransomware countermeasures were provided to organizations related to COVID-19 and medical institutions. In addition, for companies that use and provide untact services, security vulnerability finding and system development environment security inspection service were provided by Government funding programs. We also looked at the differences in the role of the government and the target of security notices between domestic and overseas response cases. Lastly, considering the development of untact services by industry in preparation for post-COVID-19, supply chain security, cloud security, development security, and IoT security were suggested as common security reinforcement measures.

The Limited Investigation of the Cyber-police and the Reinforcement of its Investigative Ability (사이버경찰의 수사한계와 수사력 강화방안)

  • Choi, Eung-Ryul;Hwang, Young-Gu
    • Korean Security Journal
    • /
    • no.8
    • /
    • pp.379-407
    • /
    • 2004
  • The cyber-crime is one of the results occurring from the increased dependency toward information-telecommunication devices. Currently, the Korean National Police Agency and many other related law enforcement agencies have made efforts to respond against the cyber-crimes. However, the number of cyber-crime is increasing steadily. The worse problem is that the arresting rate for the cyber-crime has been decreased than before. The reasons of decreasing arresting rate come from many different kinds of cyber-crime methods with the developed computer and network technology, Also, the easy concealment of the cyber-crime by the violater and the difficulty of specification against the data objected to search and seizure make the crackdown difficult. The other difficulties come from the lack of professionally trained investigators, the lack of high-technological investigation devices, and the failure of the technology development for the search and seizure of evidences because of the budget deficit. That is to say, these phenomenon show the comprehensive problem of the cyber-police system. Accordingly, to respond against newly changed cyber-crime activities and to investigate effectively, the cyber-police has to take consideration into the professional reorganization of the cyber-police, the development of the investigation technology, and the adjustment of current cyber-crime laws. Most importantly, the cyber-police needs the high-technological investigation devices, the development of the investigation methods, and the training for the professional human resources with the enough budget support.J

  • PDF

A Study on the Disaster Management System (재난관리제체(災難管理體制) 에 관한 연구(硏究) -인위재난관리(人爲災難管理)를 중심(中心)으로-)

  • Chong, Chin-Whan
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.321-350
    • /
    • 1997
  • This thesis is an attempt to find out ways and means needed to improve the disaster management system in Korea(Chap. Ⅰ). For this purpose, I have first reviewed various crisis management systems of foreign countries such as the United States, England and Japan(Chap. Ⅱ), and also reviewed that of our own country(Chap. Ⅲ). All of us knows that our disaster management system has been reestablished through the enactment of the Disaster Management Act of 1995 and the full revision of Natural Harzards Management Act of 1995 after a series of catastrophic man-made disasters since 1993. I took a general survey of the contents and characteristics of the newly made Disaster Management Act(Chap. Ⅳ), and Finally, as a conclusion of this research(Chap. V), I indicated a few disputed points on the Disaster Management Act and suggested several alternatives to improve our crisis management system. The alternatives suggested are as follows (1) Reinforcement of prevention-centered policy and expansion of investment (2) Specialization of the crisis management man-power and securing the rescue equipment (3) Arrangement of the various lessons on crisis and reinforcement of educational training against the disasters (4) Building the cooperative systems between the civil organizations (5) An opinion towards the issues on the unifying the law systems and reorganizaing the new independent institution for the crisis management

  • PDF

Development of Automated Optimum Design Program Considering the Design Details (세부설계사항을 고려한 자동최적설계 프로그램 개발)

  • Chang, Chun Ho
    • Journal of Korean Society of societal Security
    • /
    • v.4 no.1
    • /
    • pp.49-55
    • /
    • 2011
  • The primary objective of this paper is to develop optimal algorithms of reinforced concrete frame structural systems by the limit state design(CP 1110) and to look into the possibility of detailed design of these structural systems. The structural formulation is derived on the finite element method. The objective of optimization of a reinforced structure for a specified geometry is mainly to determine the optimum cross-sectional dimensions of concrete and the area of the various sizes of the reinforcement required for each member. In addition to the detail s such as the amount of web reinforcement, cutoff points of longitudinal reinforcedments etc. are also considered as design variables. In this study, the method of "Generalized Reduced Gradient, Rounding and with Neighborhood search" and "the Sequential Linear Programming" are employed as an analytical method of nonlinear optimization.

  • PDF

Private security development plan through security guard crime statistics analysis

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.283-288
    • /
    • 2021
  • The purpose of this paper is to provide basic data for related studies by comparing and analyzing crimes committed by security guards through criminal statistical analysis, and to contribute to the sound development of the private security industry by strengthening the professional ethics of security guards and reducing guard crimes. The purpose. As a results of a comparative analysis of the number of crimes by security guards and the crime rate are as follows. Although the total number of crimes committed in Korea and the number of crimes committed by security guards decreased every year, the crime rate of security guards was higher than the average crime rate. felonious crimes, violent crimes, customs crimes, and special economic crimes were consistently high. As a countermeasure against the results, first, interest in security guard crimes as perpetrators rather than as victims, second, reinforcement of professional ethics education through new training and job training, third, academic development and systematic It appeared as a specification of the definition and current status of security guards for the study.