• Title/Summary/Keyword: Space Security

Search Result 978, Processing Time 0.025 seconds

Study on Establishment of management standards of Chemistry laboratory handling harzadous substances and improvement of system (유해·위험물질 취급 화학실험실 관리 기준 정립 및 체계 개선에 관한 연구)

  • Cho, Nam-Joon;Lee, Man-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.18 no.4
    • /
    • pp.57-72
    • /
    • 2016
  • There are more than 30,000 chemical substances handled in domestic university laboratories. Among them, hazardous materials are selected and managed as designated substances by the standards of 19 Ministries and 16 Acts. However, domestic safety-related laws and regulations are used to manage industrial risk factors based on industrial activities. In case of installing a university chemical laboratory in accordance with the installation standards applicable to general workplaces. It is not suitable to use as a laboratory installation standard that can be applied to a chemical laboratory installed at a university such as a problem occurs in applying to a university using a small quantity of dangerous substances in a small amount. In order to establish the laboratory structure and facility standards that are appropriate for the laboratory characteristics and apply systematic laboratory safety, the National Security Administration shall apply the special handling standard of chemical experiment to places where handling less than 30 times the designated quantity of chemical substances for chemical experiments. On August 2, 2016, the regulations for the enforcement of the Dangerous Goods Safety Management Act and the standards for the structure and facilities of the university chemical laboratory were enacted. In this study, we investigated the domestic chemical substances laws and regulations to determine the chemical substances that are over-regulated in the relevant laws, and define them as substances against accidents. The management criteria for the substances were analyzed. The R value for the designation of the designated quantity by the concept of the space in the management standard was calculated.

Efficient Parking Management through The Investigation of Car License Plate Using Camera (카메라를 이용한 차량 번호판 조사를 통한 효율적 주차 관리)

  • Lee, Kang-Ho;Shin, Seong-Yoon;Choi, Byeong-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.145-151
    • /
    • 2013
  • This research is to suggest a method for investigating car number plates among the information managed in parking facilities. The investigation of car number plate is generally used to know how long vehicles are parked. Also, it can provide the information about the parking turnover rate and the mean parking duration of parked vehicles. This research performs the investigation using cameras at a distance of time. That is, the given distance of time from cameras is assigned to each parked vehicle, and then it can find the mean parking time of parked vehicles. Also, it can check the parking turnover rate of parked vehicles at a space unit of parking lot in an hour. The information such as the mean parked duration and the parking turnover rate of parked vehicles taken from this method is helpful to find and understand the inefficient use of parking facilities. With this suggested method, this research attempted to check the mean parking duration and the parking turnover rate of parked vehicles.

Case Analysis for Introduction of Machine Learning Technology to the Mining Industry (머신러닝 기술의 광업 분야 도입을 위한 활용사례 분석)

  • Lee, Chaeyoung;Kim, Sung-Min;Choi, Yosoon
    • Tunnel and Underground Space
    • /
    • v.29 no.1
    • /
    • pp.1-11
    • /
    • 2019
  • This study investigated use cases of machine learning technology in domestic medical, manufacturing, finance, automobile, urban sectors and those in overseas mining industry. Through a literature survey, it was found that the machine learning technology has been widely utilized for developing medical image information system, real-time monitoring and fault diagnosis system, security level of information system, autonomous vehicle and integrated city management system. Until now, the use cases have not found in the domestic mining industry, however, several overseas projects have found that introduce the machine learning technology to the mining industry for improving the productivity and safety of mineral exploration or mine development. In the future, the introduction of the machine learning technology to the mining industry is expected to spread gradually.

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF

The Contents of SatDSiG and Its Implications for Korea (독일 위성자료보안법의 내용 및 시사점)

  • JUNG, Yungjin
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.2
    • /
    • pp.60-65
    • /
    • 2019
  • TerraSAR-X, launched in June 2007, and TanDEM-X, June 2010, are remote-sensing satellites with 1M resolution that are capable of observing the ground even during the nighttime and poor weather conditions. The two satellites had been developed under a public-private partnership between the German Aerospace Centre and Airbus in the interest of the commercial marketing for German satellite data. However, the data of high-grade earth remote-sensing system, such as those of the satellites, has been produced by a military satellite and thus used under limited circumstances in Germany. Therefore, a legislation to commercialize the German satellite data and to protect its national security is needed. For this, SatDSiG was enacted in December 2007. Thus this article will contain the main contents of SatDSiG and its implication for Korea, which stared to export data of Kompsat 3, 3A and 5 in 2018.

Medical Image Encryption based on C-MLCA and 1D CAT (C-MLCA와 1차원 CAT를 이용한 의료 영상 암호화)

  • Jeong, Hyun-Soo;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.439-446
    • /
    • 2019
  • In this paper, we propose a encryption method using C-MLCA and 1D CAT to secure medical image for efficiently. First, we generate a state transition matrix using a Wolfram rule and create a sequence of maximum length. By operating the complemented vector, it converts an existing sequence to a more complex sequence. Then, we multiply the two sequences by rows and columns to generate C-MLCA basis images of the original image size and go through a XOR operation. Finally, we will get the encrypted image to operate the 1D CAT basis function created by setting the gateway values and the image which is calculated by transform coefficients. By comparing the encrypted image with the original image, we evaluate to analyze the histogram and PSNR. Also, by analyzing NPCR and key space, we confirmed that the proposed encryption method has a high level of stability and security.

The 'Existential Authenticity' and the Re-recognition of Tourist Attraction: The Cultural Practices of Residential Tourists in Bali ('실존적 고유성'과 관광매력물의 재인식: 발리 지역 거주관광객의 문화적 실천)

  • JEONG, Jeong Hun
    • The Southeast Asian review
    • /
    • v.27 no.3
    • /
    • pp.49-91
    • /
    • 2017
  • This study analyzes the social and cultural development process of tourism development in Banjar Nyuh-Kuning, a rural village in Bali, and the cultural practices of residential tourist in this area. The role of Banjar in the development of cultural tourism, especially the process of re-recognition of traditional discourse, became the main impetus for the prosperity of the village. For this purpose, the demands of residential tourists in the village and the role of local residents in their response is discussed. Residential tourist and village community experience the process of acculturation under one space, which provides an opportunity for each group to newly recognize tradition. In the end, the residential tourist in the villages provide an opportunity to reexamine tourism practices the stemmed from the concept of existing objectivism and constructivism authenticity. The perception of the authenticity of residential tourists a part of the ontological awareness resulting from everyday satisfactions and security in the course of experiencing tourism. The process of the development of Nyuh-Kuning village as a tourist attraction may be understood from the viewpoint of as a type of existential authenticity that the residential tourists acquire as they practice village traditions.

Application of Discrete Wavelet Transforms to Identify Unknown Attacks in Anomaly Detection Analysis (이상 탐지 분석에서 알려지지 않는 공격을 식별하기 위한 이산 웨이블릿 변환 적용 연구)

  • Kim, Dong-Wook;Shin, Gun-Yoon;Yun, Ji-Young;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.3
    • /
    • pp.45-52
    • /
    • 2021
  • Although many studies have been conducted to identify unknown attacks in cyber security intrusion detection systems, studies based on outliers are attracting attention. Accordingly, we identify outliers by defining categories for unknown attacks. The unknown attacks were investigated in two categories: first, there are factors that generate variant attacks, and second, studies that classify them into new types. We have conducted outlier studies that can identify similar data, such as variants, in the category of studies that generate variant attacks. The big problem of identifying anomalies in the intrusion detection system is that normal and aggressive behavior share the same space. For this, we applied a technique that can be divided into clear types for normal and attack by discrete wavelet transformation and detected anomalies. As a result, we confirmed that the outliers can be identified through One-Class SVM in the data reconstructed by discrete wavelet transform.

Verification Control Algorithm of Data Integrity Verification in Remote Data sharing

  • Xu, Guangwei;Li, Shan;Lai, Miaolin;Gan, Yanglan;Feng, Xiangyang;Huang, Qiubo;Li, Li;Li, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.565-586
    • /
    • 2022
  • Cloud storage's elastic expansibility not only provides flexible services for data owners to store their data remotely, but also reduces storage operation and management costs of their data sharing. The data outsourced remotely in the storage space of cloud service provider also brings data security concerns about data integrity. Data integrity verification has become an important technology for detecting the integrity of remote shared data. However, users without data access rights to verify the data integrity will cause unnecessary overhead to data owner and cloud service provider. Especially malicious users who constantly launch data integrity verification will greatly waste service resources. Since data owner is a consumer purchasing cloud services, he needs to bear both the cost of data storage and that of data verification. This paper proposes a verification control algorithm in data integrity verification for remotely outsourced data. It designs an attribute-based encryption verification control algorithm for multiple verifiers. Moreover, data owner and cloud service provider construct a common access structure together and generate a verification sentinel to verify the authority of verifiers according to the access structure. Finally, since cloud service provider cannot know the access structure and the sentry generation operation, it can only authenticate verifiers with satisfying access policy to verify the data integrity for the corresponding outsourced data. Theoretical analysis and experimental results show that the proposed algorithm achieves fine-grained access control to multiple verifiers for the data integrity verification.

The Study on the Development and Utilization Plan for Closed Private Universities - Based on the case of A University - (지방사립대학의 폐교에 따른 발전 방안과 활용방안에 관한 연구 - A 대학교의 중심으로 -)

  • Song, Hwa-Yeong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Industrial Convergence
    • /
    • v.20 no.4
    • /
    • pp.7-14
    • /
    • 2022
  • The decrease in the school-age population caused the closure of private universities, but the guidelines at closed private universities are ambiguous, causing confusion. Therefore, this study intends to suggest a plan to utilize the closed school university. The government aims to increase the possibility of selling closed schools by preventing alley slums through the recovery of alley commercial districts and local communities. The data were collected through a Google survey from September 30 to October 8, 2021 and an on-site interview conducted on October 2, 2021. A total of 84 nearby citizens of the closed school university were surveyed, and on-site interviews were conducted with a total of five people. The collected data suggested the direction of utilization plan for closed school building. This study will present a model for the use of closed school property in the future and contribute to the establishment of urban regeneration policies.