• Title/Summary/Keyword: civil security

Search Result 519, Processing Time 0.023 seconds

Conveyance Verification through Analysis of River Vegetation and Soil Impact using Sentinel-2 (Sentinel-2를 활용한 하천의 식생 및 토양 영향 분석을 통한 통수능 검정)

  • Bang, Young Jun;Choi, Byeong Jun;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.4
    • /
    • pp.37-45
    • /
    • 2021
  • Flooding damage may occur due to an unexpected increase in rainfall in summer. Previously, the roughness coefficient, which is a major factor of conveyance, was calculated through on-site measurement, but in case of on-site measurement, there are many limits in accurately grasping changes in vegetation. In this study, the vegetation index (NDVI) was calculated using the Sentinel-2 optical images, and the modified roughness coefficient was calculated through the density and distribution area of the vegetation. Then the calculated roughness coefficient was applied to HEC-RAS 1D model and verified by comparing the results with the water level at the water level station directly downstream of the Soyang River dam. As a result, the error rate of the water level decreased about 14% compared to applying the previous roughness coefficient. Through this, it is expected that it will be possible to refine the flood level of rivers in consideration of seasonal flood characteristics and to efficiently maintain rivers in specific sections.

Environmental and Socioeconomic Determinants of Grain Virtual Water Trade: An Empirical Analysis using Decomposition and Decoupling Model

  • Golden Odey;Bashir Adelodun;Seulgi Lee;Kyung Sook Choi
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.394-394
    • /
    • 2023
  • The world's sustainable growth is being severely hampered by the inefficient use of water resources. Despite the widely acknowledged importance of trade in global and regional water and food security, societal reliance on local production as well as international trade remains inadequately assessed. Therefore, using South Korea as a case study, this study fills in this research gap by applying the virtual water concept, the logarithmic mean divisia index (LMDI) method, and the Tapio decoupling model. The virtual water concept was used to estimate South Korea's net virtual water trade for major grain crops from 1992 to 2017. Then, the LMDI method was utilized to assess the driving factors causing changes in net virtual water trade. Lastly, the Tapio decoupling model was used to investigate the decoupling relationships between economic growth and the driving factors of net virtual water trade. Results showed that South Korea remains a net importer of virtual water flows with respect to grain crops, with an average import of 16,559.24 million m3 over the study period. In addition, the change in net virtual water trade could be attributed to water intensity effect, product structure effect, economic effect, and population effect. However, water intensity and economic effects were the major decisive factors for decrease and increase in net virtual water trade respectively, while the population and product structure effects had minor positive influences on the net virtual water trade. Furthermore, water intensity and economic growth showed a strong decoupling in most periods, while the decoupling state between product structure and economic growth was observed as expansive negative decoupling. Likewise, population size and economic growth showed a weak decoupling in most periods. The results reveal South Korea's status as it concerns the virtual water trade of grain crops, thus providing valuable insights into the sustainability of trade activities for the management of local water resources.

  • PDF

Cable-supported Bridge Safety Inspection Blind Spot Elimination Technology using Drones (드론을 활용한 케이블지지교량 안전점검 사각지대 해소 기술)

  • Sungjin Lee;Bongchul Joo;Jungho Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.31-38
    • /
    • 2022
  • In the case of special bridges whose superstructure is supported by cables, there are many blind spots that are difficult to access without special equipment and personnel. As a result, there are difficulties in the safety inspection of special bridges. The purpose of this study is to review the inspection blind spots of cable-supported bridges such as cable-stayed bridges and suspension bridges, and to study ways to eliminate blind spots using drones. To this end, the cables, stiffened girder, and pylons of the cable-stayed bridge located in the sea were inspected using drones. Through this study, it was confirmed that external safety inspection of special bridges that are difficult for inspectors to access is possible using drones. In particular, drone inspection to check the external condition and damage of the pylon, which is a blind spot for inspection of special bridges, is a very effective safety inspection method.

A Study on the Surface Damage Detection Method of the Main Tower of a Special Bridge Using Drones and A.I. (드론과 A.I.를 이용한 특수교 주탑부 표면 손상 탐지 방법 연구)

  • Sungjin Lee;Bongchul Joo;Jungho Kim;Taehee Lee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.4
    • /
    • pp.129-136
    • /
    • 2023
  • A special offshore bridge with a high pylon has special structural features.Special offshore bridges have inspection blind spots that are difficult to visually inspect. To solve this problem, safety inspection methods using drones are being studied. In this study, image data of the pylon of a special offshore bridge was acquired using a drone. In addition, an artificial intelligence algorithm was developed to detect damage to the pylon surface. The AI algorithm utilized a deep learning network with different structures. The algorithm applied the stacking ensemble learning method to build a model that formed the ensemble and collect the results.

Evaluation of input-output energy use in strawberry production in single-span double-layered greenhouses with different thermal-curtain positions

  • Timothy Denen Akpenpuun;Wook-Ho Na;Qazeem Opeyemi Ogunlowo;Anis Rabiu;Misbaudeen Aderemi Adesanya;Prabhat Dutta;Ezatullah Zakir;Hyeon-Tae Kim;Hyun-Woo Lee
    • Korean Journal of Agricultural Science
    • /
    • v.50 no.3
    • /
    • pp.395-406
    • /
    • 2023
  • The large amount of energy required for successful crop production is the main challenge in greenhouse cropping systems. As a response to this challenge a comprehensive evaluation of greenhouse energy consumption was carried out in two structurally similar single-span greenhouses with different thermal curtain positions, with particular attention to energy productivity, specific energy, net energy, and energy ratio. The greenhouses are used for strawberry production. In the R-greenhouse (RGH), the thermal curtain hanged directly at the roof ridge, whereas in the Q-greenhouse (QGH), the thermal curtain was placed 5° from an imaginary vertical axis, from the middle of the roof ridge downwards to the north side of the greenhouse roof. The relevant data were recorded using standard methods. The results indicated that the energy expended in the RGH and QGH systems was 2,186.48 and 2,189.26 MJ/m2, respectively. Electricity and nitrogen fertilizer contributed the highest energy input in both greenhouses and in all seasons. The output energy was 3.12 and 3.82 MJ/m2, respectively, in RGH and QGH in season I and 4.40 and 4.87 MJ/m2 in season II. In terms of energy expended, there was no significant difference between the two greenhouses, nor between the two seasons. These results indicate that greenhouses of the size used in this investigation are not viable in terms of energy productivity, energy-use efficiency, and subsequent economic performance. However, further studies should be conducted to scale-up the information obtained from this investigation.

Problems of Applying Information Technologies in Public Governance

  • Goshovska, Valentyna;Danylenko, Lydiia;Hachkov, Andrii;Paladiiichuk, Sergii;Dzeha, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.71-78
    • /
    • 2021
  • The relevance of research provides the necessity to identify the basic problems in the public governance sphere and information technology relations, forasmuch as understanding such interconnections can indicate the consequences of the development and spreading information technologies. The purpose of the research is to outline the issues of applying information technologies in public governance sphere. 500 civil servants took part in the survey (Ukraine). A two-stage study was conducted in order to obtain practical results of the research. The first stage involved collecting and analyzing the responses of civil servants on the Mentimeter online platform. In the second stage, the administrator used the SWOT-analysis system. The tendencies in using information technologies have been determined as follows: the institutional support development; creation of analytical portals for ensuring public control; level of accountability, transparency, activity of civil servants; implementation of e-government projects; changing the philosophy of electronic services development. Considering the threats and risks to the public governance system in the context of applying information technologies, the following aspects generated by societal requirements have been identified, namely: creation of the digital bureaucracy system; preservation of information and digital inequality; insufficient level of knowledge and skills in the field of digital technologies, reducing the publicity of the state and municipal governance system. Weaknesses of modern public governance in the context of IT implementation have been highlighted, namely: "digitization for digitalization"; lack of necessary legal regulation; inefficiency of electronic document management (issues caused by the imperfection of the interface of reporting interactive forms, frequent changes in the composition of indicators in reporting forms, the desire of higher authorities to solve the problem of their introduction); lack of data analysis infrastructure (due to imperfections in the organization of interaction between departments and poor capacity of information resources; lack of analytical databases), lack of necessary digital competencies for civil servants. Based on the results of SWOT-analysis, the strengths have been identified as follows: (possibility of continuous communication; constant self-learning); weaknesses (age restrictions for civil servants; insufficient acquisition of knowledge); threats (system errors in the provision of services through automation); opportunities for the introduction of IT in the public governance system (broad global trends; facilitation of the document management system). The practical significance of the research lies in providing recommendations for eliminating the problems of IT implementation in the public governance sphere outlined by civil servants..

A Study of Improvement Direction of Inspection Diagnosis Report and Bridge Maintenance Detailed Guidelines (교량 점검진단 보고서 및 유지관리 세부지침 개선 방향 연구)

  • Han-Min Cho;Ki-Tae Park;Dong Woo Seo;Kyu San Jung;Jae Hwan Kim;Jin-Hyuk Lee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.21-30
    • /
    • 2022
  • After the collapse of the Seongsu Bridge in 1994, the 「Special Act on the Safety Control and Maintenance of Establishments」 was enacted in Korea, and many efforts have been made in the field of safety inspection and maintenance of facilities. Among these facilities, a total of 33,165 bridges, which account for the largest share next to buildings, are currently in use, and 28,150 bridges of type 2 and 3 account for about 85% of the total. However, compared to the relatively more important type 1 bridges, type 2 and 3 bridges, which occupy most of the bridges, have insufficient maintenance status regarding inspection and diagnosis. This reason appears in the subjective judgment and records of the inspection performer when performing inspection and diagnosis of bridges, and in the inspection and diagnosis report form that has not been systematically established. Therefore, in this study, we intend to derive an improvement (draft) of the inspection and diagnosis report that can be systematically and continuously utilized by correcting and supplementing the problems of the existing inspection and diagnosis report.

An Escrow-Free Two-party Identity-based Key Agreement Protocol without Using Pairings for Distinct PKGs

  • Vallent, Thokozani Felix;Yoon, Eun-Jun;Kim, Hyunsung
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.2 no.3
    • /
    • pp.168-175
    • /
    • 2013
  • Key escrow is a default property that is inherent in identity-based cryptography, where a curious private key generator (PKG) can derive a secret value shared by communicating entities in its domain. Therefore, a dishonest PKG can encrypt and decrypt ciphers or can carry out any attack on the communicating parties. Of course, the escrow property is not completely unwanted but is acceptable in other particular applications. On the other hand, in more civil applications, this key escrow property is undesirable and needs to be removed to provide maximum communication privacy. Therefore, this paper presents an escrow-free identity-based key agreement protocol that is also applicable even in a distinct PKG condition that does not use pairings. The proposed protocol has comparable computational and communicational performance to many other protocols with similar security attributes, of which their security is based on costly bilinear pairings. The protocol's notion was inspired by McCullagh et al. and Chen-Kudla, in regard to escrow-free and multi-PKG key agreement ideas. In particular, the scheme captures perfect forward secrecy and key compromise impersonation resilience, which were lacking in McCullagh et al.'s study, as well as all other desirable security attributes, such as known key secrecy, unknown key-share resilience and no-key control. The merit in the proposed protocol is the achievement of all required security requirements with a relatively lower computational overhead than many other protocols because it precludes pairings.

  • PDF

Crime prevention role and limitations of private security organizations (민간방범기구의 범죄예방 역할과 한계)

  • Gong, Bae-Wan
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.33-41
    • /
    • 2012
  • Important crime prevention is emphasized. Depending on the type of criminal act itself, but with many material and human damage because it is a threat to the safety of civil life. The traditional police power of the police in patrolling the derailment by the diversification of the crime, globalization, organizing, specialization, and ferocious anger by far exceeds the capabilities of the police crime prevention are occurring. Civilian police crime prevention organizations in the area of the region as a base for complementary activities, and even if the purpose of commercial availability, but many organizations is the autonomous and spontaneous personality voluntary work civic life is to serve as the safety fence. But that suits the role of these organizations and social support and lack of institutional support and practical and effective crime prevention activities has not been effective. Law reform and the role of the Organization for the maintenance of redundancy, or a series of systematic effort to equip networks and take advantage of the functional and has been factory.

The effect of divalent and trivalent cations on aggregation and surface hydrophobicity of selected microorganism

  • Alias, M. Anwar;Muda, Khalida;Affam, Augustine Chioma;Aris, Azmi;Hashim, Normala
    • Environmental Engineering Research
    • /
    • v.22 no.1
    • /
    • pp.61-74
    • /
    • 2017
  • This study investigated the effect of various cations ($Ca^{2+}$, $Mg^{2+}$, $Al^{3+}$, $Mn^{2+}$, $Zn^{2+}$) on the autoaggregation (AAg) and surface hydrophobicity (SHb) of three different bacteria (Brevibacillus panacihumi strain (ZB1), Lysinibacillus fusiformis strain (ZB2) and Enterococcus faecalis strain (ZL)) using a 2-level factorial design. The AAg ratio was measured from the changes in the absorbance of the media. Results show that ZB2 had maximum AAg for the three bacteria investigated. A microscopic clustering of cells was observed when $Ca^{2+}$ was added to ZB2. The AAg was in the range of 62%, 58% and 34% for ZB2, ZB1 and ZL, respectively and correlated to the SHb. The aggregation and SHb of the microbial cells increased with increasing ionic strength due to the repulsive steric or overlap forces between the polymer covered surfaces. $Ca^{2+}$ demonstrated a more significant effect on aggregation and SHb of microbial cells due to an attractive binding force.