• Title/Summary/Keyword: System Protect

Search Result 2,524, Processing Time 0.028 seconds

Oil Spill Response System using Server-client GIS

  • Kim, Hye-Jin;Lee, Moon-Jin;Oh, Se-Woong
    • Journal of Navigation and Port Research
    • /
    • v.35 no.9
    • /
    • pp.735-740
    • /
    • 2011
  • It is necessary to develop the one stop system in order to protect our marine environment rapidly from oil spill accident. The purpose of this study is to develop real time database for oil spill prediction modeling and implement real time prediction modelling with ESI and server-client GIS based user interface. The existing oil spill prediction model cannot provide one stop information system for public and government who should protect sea from oil spill accident. The development of multi user based information system permits integrated handling of real time meteorological data from external ftp. A server-client GIS based model is integrated on the basis of real time database and ESI map to provide the result of the oil spill prediction model. End users can access through the client interface and request analysis such as oil spill prediction and GIS functions on the network as their own purpose.

A Study on Activation of Long - life Housing (장수명 주택의 활성화 방안에 관한 연구)

  • Lee, Hyun-Soo;Lim, Sooyoung
    • KIEAE Journal
    • /
    • v.13 no.4
    • /
    • pp.95-102
    • /
    • 2013
  • In modern society, it is necessary to develop sustainable housing to protect environment. There should be a study on long life housing that satisfies living condition which residents require. Long life housing research is already activating in many developed countries. Although activation of long life housing is urgent, domestically, immaturity of technology development and law and system are barrier to progression of long life housing. Increase of early construction expenses is also problematic in activation of long life housing. The purpose of this research is to clarify a necessity of long life housing, to provide high quality of sustainable residence and to protect environment. This research also suggests a need of change from previous housing to long life housing. Moreover, it will look at related law and system of domestic long life housing and compare it to international law and system. From this comparison, it will point out a need of improvement and suggest appropriate long life housing system.

The Current VIP Guard System and Its Development (요인의 안전을 위한 경호조직 분석 및 발전 방안)

  • 오세용;김창은
    • Journal of the Korea Safety Management & Science
    • /
    • v.5 no.3
    • /
    • pp.81-98
    • /
    • 2003
  • In modern society, there are diverse sorts of VIPs including a king and individuals. Some like a king or president are in need of professional secret services, and others become VIPs by being guarded by a bodyguard company at their own request. The former is called a public guard, and the latter is a private one. In the field of the public guard, the nation should be furnished with a guard system in consideration of political circumstances to protect VIPs. That is, the parliamentary cabinet system and presidential system call for a different guard system, and the guard system's professional features vary to some degree with political situations and cultural climate. If the ultimate goal of guard is to protect the chief of the democratic and open state in a most efficient and safe manner, it's mandatorily necessary to set up a professional and specialized guard organization to provide democratic and efficient secret services. It's desired that the domestic presidential guard division should be staffed with not only expert guards but other personnels dispatched from the military and police. In the police, guard mission is splitted among various guard and security agencies, including the National Police Agency's public security bureau or the Seoul Metropolitan Police Agency's public security division, 101 security unit, mobile police and 22 special guard division. As a chain of command is separated and it's difficult to manage such organizations effectively, the National Police Agency should be exclusively in charge of VIP guard and security. In the area of private guard, the private police system has shared national security task as a middle organization between the private police and private guard. But now its intent has gradually weakened, and its mission should be redefined. In addition, the way people look at private guard should change, and they should be well informed that it could serve to prevent possible crimes, protect them against crimes and get rid of their inconveniences. To make a good impression on people, the guard associations and businesses should put their efforts into reinforcing publicity activities, and the government, academic circles and press should team up with them as well.

Analysis of Recloser-Fuse Coordination in Distribution System with SFCL (배전계통에 초전도 전류계한기 적용 시 Recloser-Fuse 협조 분석)

  • Kim, Myoung-Hoo;Kim, Jin-Seok;You, Il-Kyoung;Moon, Jong-Fil;Lim, Sung-Hun;Kim, Jae-Chul;Ahn, Jae-Min
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2009.05a
    • /
    • pp.432-435
    • /
    • 2009
  • This paper shows us the basic protective devices to protect against fault current such as recloser and fuse. Also recloser has been coordinated with fuse in distribution system to protect against fault current efficiently. However, in distribution system with SFCL, recloser-fuse coordination could be different to now and fault current couldn't be clear, if occurred. Therefore, this paper analysed recloser-fuse coordination in distribution system with SFCL using PSCAD/EMTDC

  • PDF

Research on Improvement of Power Control System of Cold & Hot Water Purifier (냉온정수기의 전원 제어 시스템 개선에 관한 연구)

  • Lee, Ki-Yeon;Choi, Chung-Seog;Kim, Dong-Ook;Kim, Hyang-Kon;Kim, Dong-Woo
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.56 no.1
    • /
    • pp.45-50
    • /
    • 2007
  • In this paper, this paper discusses how to improve the power control system of cold and hot water purifiers, in particular, system protecting device against abnormal voltage. The existing power supply control system came with a protecting device composed of varistor device only for impulse-type surges. Even though the existing system senses surge other than impulse-type, the system can not be protected. Accordingly, a new type of power control system was designed to protect the system from surge and ultimately prevent electricity accidents. The power control system suggested in this paper will be designed to protect the system by sensing input voltage and discontinuing power supply by means of SSR if voltage exceeding set value is sensed. To test the designed system, surge was imposed on the existing system and processes of system failure were experimented before safety of the designed power control system was simulated via P-spice program developed by Orcad in order to examine safety and reliability of the system.

A Study On Enterprise Password Management Recommendations (대규모 조직에서의 패스워드 관리에 관한 권고 고찰)

  • Park, Jin-Sub
    • Journal of National Security and Military Science
    • /
    • s.8
    • /
    • pp.421-465
    • /
    • 2010
  • Passwords are used in many ways to protect data, systems, and networks. Passwords are also used to protect files and other stored information. In addition, passwords are often used in less visible ways for authentication. In this article, We provides recommendations for password management, which is the process of defining, implementing, and maintaining password policies throughout an enterprise. Effective password management reduces the risk of compromise of password-based authentication systems. Organizations need to protect the confidentiality, integrity, and availability of passwords so that all authorized users - and no unauthorized users - can use passwords successfully as needed. Integrity and availability should be ensured by typical data security controls, such as using access control lists to prevent attackers from overwriting passwords and having secured backups of password files. Ensuring the confidentiality of passwords is considerably more challenging and involves a number of security controls along with decisions involving the characteristics of the passwords themselves.

  • PDF

Smart Home Environment for the Protection of Multimedia Digital Contents (멀티미디어 콘텐츠 보호를 위한 스마트 홈 환경)

  • Choi, Kee-Hyun;Jang, Kyung-Soo;Shin, Ho-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.189-196
    • /
    • 2011
  • As internet is getting advanced day by day, digital contents have been developed in various areas as killer content in the IT industry. It needs to develop lots of complicated digital content protect systems due to the enhancement and variety of user's multimedia devices. Although there are lots of protect systems based on DRM(Digital Rights Management) technology, it is difficult to provide secure protection because of the problems resulting from analog hole problem, inefficiency of key sharing and various independent protect technologies. Thus, in this paper, we propose a novel authentication and protect system based on RFID(Radio Frequency Identification) technology to solve the problems and show possibility of free content duplication and efficient contents management in smart home environments.

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

Applying Cybersecurity and Anti-Tamper Methods for Secure Operating of Unmanned Weapon Systems (무인화 무기체계의 안정적인 운용을 위한 Cybersecurity 및 Anti-Tamper의 적용)

  • Lee, Min Woo
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.16 no.1
    • /
    • pp.36-42
    • /
    • 2020
  • Due to the population of the Republic of Korea is getting less, the shortage of available troops has become a big issue. In response to this, the need for Unmanned weapon systems is rising. To operate an Unmanned weapon system near borderlines or low altitude, it is necessary to protect not only the system itself but also operational information communicated between the Unmanned system and control station, so that they should be safe using Cybersecurity measures. Besides, it is critical to protect a few core technologies applied to Unmanned weapon systems throughout the Anti-Tamper measures. As the precedent studies only focus partially, Cybersecurity or Anti-Tamper, it is acknowledged that comprehensive studies are needed to be conducted. This study is to incorporate both concepts into Korea's defense acquisition process. Specifically, we will outline the concepts and needs of Cybersecurity and Anti-Tamper, and briefly present ways to apply them simultaneously.

Study on Real-time Cooperation Protect System Against Hacking Attacks of WiBro Service

  • Park, Dea-Woo
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.4
    • /
    • pp.353-357
    • /
    • 2011
  • U.S. Obama government is submit a motion to consider cyber attacks on State as a war. 7.7DDoS attack in Korea in 2009 and 3.4 DDoS attacks 2011, the country can be considered about cyber attacks. China hackers access a third country, bypassing South Korea IP by hacking the e-commerce sites with fake account, that incident was damaging finance. In this paper, for WiBro service, DDoS attacks, hackers, security incidents and vulnerabilities to the analysis. From hacker's attack, WiBro service's prognostic relevance by analyzing symptoms and attacks, in real time, Divide Red, Orange, Yellow, Green belonging to the risk rating. For hackers to create a blacklist, to defend against attacks in real-time air-conditioning system is the study of security. WiBro networks for incident tracking and detection after the packets through the national incident response should contribute to the development of technology.