• 제목/요약/키워드: Space Security

검색결과 973건 처리시간 0.033초

Media Technologies In The Educational Space: The Formation Of Intellectual Independence

  • Parshukova, Lesia;Loboda, Olga;Maha, Petro;Solomenko, Lina;Svanidze, Lia;Levytskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.323-327
    • /
    • 2021
  • The article examines the process of professional training in educational institutions, media technologies and methods of media communication in the educational space of the institution, characterizes the place of media technologies in the educational space in the context of the term "educational space" itself, systematizes the methods of media communications in education. The peculiarities of media education as a set of means and methods of teaching young people adequate media perception are pointed out.

The Concept of the Formation of the Teacher's Innovative Competence in the Space of Lifelong Education

  • Boiko, Olha;Oborska, Svitlana;Kyrylenko, Kateryna;Cherevko, Svitlana;Lebid, Olha;Kulko, Viktoriia
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.59-64
    • /
    • 2021
  • The article proposes the process of formation of the teacher's innovative competence in the space of lifelong education the foundations of the formation of the teacher's innovative competence in the space of continuous education. The concept of the formation of the teacher's innovative competence in the space of lifelong education is proposed; it includes initial ideas, goals, objectives, patterns, principles, stages, content and technologies implementation of this process.

COLORNET: Importance of Color Spaces in Content based Image Retrieval

  • Judy Gateri;Richard Rimiru;Micheal Kimwele
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.33-40
    • /
    • 2023
  • The mainstay of current image recovery frameworks is Content-Based Image Retrieval (CBIR). The most distinctive retrieval method involves the submission of an image query, after which the system extracts visual characteristics such as shape, color, and texture from the images. Most of the techniques use RGB color space to extract and classify images as it is the default color space of the images when those techniques fail to change the color space of the images. To determine the most effective color space for retrieving images, this research discusses the transformation of RGB to different color spaces, feature extraction, and usage of Convolutional Neural Networks for retrieval.

전력 IT Cyber Security 연구 동향 (Study Tendency of Cyber Security in Power IT Area)

  • 김학만;박재세;김상남
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 제39회 하계학술대회
    • /
    • pp.205-206
    • /
    • 2008
  • Electrical Power System is very important infrastructure in the country. The functions of control, monitoring and so on in the electrical power system are implemented by information technologies(IT) through cyber space. Recently, many activities for enhancing cyber security in the world. In this paper, we introduce the study tendency of cyber security in power IT areas.

  • PDF

Influence of Electrical Aging on Space Charge Dynamics of Oil-Impregnated Paper Insulation under AC-DC Combined Voltages

  • Wang, Yan;Li, Jian;Wu, Sicheng;Sun, Peng
    • Journal of Electrical Engineering and Technology
    • /
    • 제8권6호
    • /
    • pp.1512-1519
    • /
    • 2013
  • Oil-impregnated paper is a major type of insulation used in oil-filled converter transformers for both traditional and new energy systems. This paper presents and analyzes the results of the experiment conducted on the electrical aging of oil-impregnated paper under AC-DC combined voltages using the pulsed electro-acoustic (PEA) technique. The formation and dynamics of space charge affected the performance of insulation material. The electrical aged oil-paper insulation was obtained through electrical aged experiments under the voltages. Based on the PEA technique, measurements were carried out when the oil-paper insulation system was subjected to different stressing and aging times. The space charge dynamics in the bulk of the oil-paper insulation system with different aging times were measured and analyzed. Characteristic parameters such as the total charge injection amount, the total charges of fast moving and slow moving, and the distortion factor of electric field were calculated and discussed. Results show that the longer electrical aging time, the more charges trapped in the bulk of aging sample. It leads to larger distortion factor of electric field in the bulk of aging samples and accelerate degradation of oil-paper insulation under AC-DC combined voltages.

사회안전관리에 대한 전문인력 양성실태와 발전방안 (Fact and plan on specialist training for social security)

  • 공배완;김창호
    • 시큐리티연구
    • /
    • 제5호
    • /
    • pp.5-18
    • /
    • 2002
  • The private security has been one of the fastest growing parts of the law enforcement industry, confronted with mutual coincidence or complementarity. Therefore, the primary factor in order to straighten it up should be bringing op a person, because he or she arranges the private security, based on the society in the end. In addition, it is suggested that further study of technical learning and its practice should be arranged. Because the education for agents undertaking the social security is comprehensive in space and limited in time, it may accompany hardship in arranging its content and curriculum Although this article leaves much to be desired, it has been analyzed end observed if a greater emphasis is placed on ample human resources supply for increased demand on social security in private law enforcement industry through institutional education system. A scientific advancement is expected to be attained in the majors related to the private security, with validity that the continuous studies should be implemented, and a social role of colleges as a specialized institute should be erected.

  • PDF

사회 신뢰수준에 따른 기업의 보안통제 수준 비교 (Comparison of Corporate Security Control Level with Social Trust Index)

  • 나후성;이경호
    • 정보보호학회논문지
    • /
    • 제27권3호
    • /
    • pp.673-685
    • /
    • 2017
  • 사회적으로 형성되어 있는 신뢰수준은 국가 간 상이하고 이러한 신뢰수준에 따라 보안통제가 이뤄져야 기업에서는 합리적인 보안통제를 수행할 수 있다. 이에 한국과 미국의 신뢰수준을 Diamond Model을 사용하여 비교하고, 해당 국가 기업의 보안통제 현황을 조사하여 사회의 신뢰수준이 기업 보안통제 수준에 영향을 미치는지 연구하고자 한다. 또한 AHP(Analytic Hierarchy Process)를 사용하여 상이한 국가의 보안통제 수준을 비교할 수 있는 통제항목과 공식을 제시하고 검증한다.

가청 주파수대 음장 변화 측정 기반 침입 감지 기술 (Intrusion detection based on the sound field variation of audible frequency band)

  • 이성규;박강호;양우석;김종대;김대성;김기현;왕세명
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 2010년도 추계학술대회 논문집
    • /
    • pp.187-192
    • /
    • 2010
  • In this paper, intrusion detection technique based on the sound field variation of audio frequency in the security space is proposed. The sound field formed by sound source can be detected with the microphone when the obstacle or intruder is positioned. The sound field variation due to the intruder is based on the interference of audio wave. With the help of numerical simulation of sound field formations, the increase or decrease of sound pressure level is analyzed not only the obstacle, but also the intruder. Even the microphone is positioned behind the source, sound pressure level can be increase or decrease due to the interference. Frequency response test is performed with Gaussian white noise signal to get the whole frequency response from 0 to half of sampling frequency. There are three security cases. Case 1 is the situation of empty space with and without intruder, case 2 is the situation of blocking obstacle with and without intruder, and case 3 is the situation of side blocking obstacle with and without intruder. At each case, the frequency response is obtained first at the security space without intruder, and second with intruder. From the experiment, intruder size of $50cm{\times}50cm$ can be successfully detected with the proposed technique. Moreover, the case 2 or case 3 bring about bigger sound field variation. It means that the proposed technique have the potential of more credible security sensing in real situation.

  • PDF