• Title/Summary/Keyword: collective security system

Search Result 26, Processing Time 0.027 seconds

The Novel Configuration of Integrated Network for Building Energy System (빌딩 에너지시스템 통합네트워크 구축에 관한 연구)

  • Hong, Won-Pyo
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2008.10a
    • /
    • pp.229-234
    • /
    • 2008
  • The new millennium has started with several innovations driven by fast evolution of the technologies in energy sector. A strong impulse towards the diffusion of new economical efficient technologies regulatory incentives related to energy production from renewable source and a small scale building trigeneration and to promotion of more sustainable environmental-friendly generation solutions, the evolution of electricity markets, more and more binding local emission constraints, and the need for improving the security of supply to reduce the energy system vulnerability. The 24 percentage energy quantify of total energy consumption consumes in commercial buildings and residential houses and the 30% portion of total $CO_2$ emissions covers also in the commercial buildings and residential houses sector. To cope with efficiently this energy sinuation in building sector, Building microgrid or building tooling, heating & power(BCHP) system has been interested in recent day due to meeting thermal and electric energy requirements efficiently and with appropriate energy quality. A multi agent system is a collective of intelligent agents that communicate with each other and work cooperatively to achieve common goals. Also, it is to medicate and coordinate communication between Control Areas and Security Coordinators for teal-time control of the BCHP system and the power pid. In this new circumstance, it is very important to integrate the power and energy delivery system and the information system(communication, networks, and intelligent equipment) that controls it. Therefore, development of smart control modules with open communication protocol and seamlessly interchange the data and information between control network and data network including extranet and intranet give a great meanings. We designed and developed the TCP/IP-CAN IED agent modules and ModBus./LonTalk/(TCP/IP) IED agent ones to configure the multi-agent system based smart energy network of commercial buildings and also intelligent algorithms for inverter fault diagnostics which ran be operated in control level or agent level network.

  • PDF

Innovative Technologies in Higher School Practice

  • Popovych, Oksana;Makhynia, Nataliia;Pavlyuk, Bohdan;Vytrykhovska, Oksana;Miroshnichenko, Valentina;Veremijenko, Vadym;Horvat, Marianna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.248-254
    • /
    • 2022
  • Educational innovations are first created, improved or applied educational, didactic, educative, and managerial systems and their components that significantly improve the results of educational activities. The development of pedagogical technology in the global educational space is conventionally divided into three stages. The role of innovative technologies in Higher School practice is substantiated. Factors of effectiveness of the educational process are highlighted. Technology is defined as a phenomenon and its importance is emphasized, it is indicated that it is a component of human history, a form of expression of intelligence focused on solving important problems of being, a synthesis of the mind and human abilities. The most frequently used technologies in practice are classified. Among the priority educational innovations in higher education institutions, the following are highlighted. Introduction of modular training and a rating system for knowledge control (credit-modular system) into the educational process; distance learning system; computerization of libraries using electronic catalog programs and the creation of a fund of electronic educational and methodological materials; electronic system for managing the activities of an educational institution and the educational process. In the educational process, various innovative pedagogical methods are successfully used, the basis of which is interactivity and maximum proximity to the real professional activity of the future specialist. There are simulation technologies (game and discussion forms of organization); technology "case method" (maximum proximity to reality); video training methodology (maximum proximity to reality); computer modeling; interactive technologies; technologies of collective and group training; situational modeling technologies; technologies for working out discussion issues; project technology; Information Technologies; technologies of differentiated training; text-centric training technology and others.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

Modelling Civic Problem-Solving in Smart City Using Knowledge-Based Crowdsourcing

  • Syed M. Ali Kamal;Nadeem Kafi;Fahad Samad;Hassan Jamil Syed;Muhammad Nauman Durrani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.146-158
    • /
    • 2023
  • Smart City is gaining attention with the advancement of Information and Communication Technology (ICT). ICT provides the basis for smart city foundation; enables us to interconnect all the actors of a smart city by supporting the provision of seamless ubiquitous services and Internet of Things. On the other hand, Crowdsourcing has the ability to enable citizens to participate in social and economic development of the city and share their contribution and knowledge while increasing their socio-economic welfare. This paper proposed a hybrid model which is a compound of human computation, machine computation and citizen crowds. This proposed hybrid model uses knowledge-based crowdsourcing that captures collaborative and collective intelligence from the citizen crowds to form democratic knowledge space, which provision solutions in areas of civic innovations. This paper also proposed knowledge-based crowdsourcing framework which manages knowledge activities in the form of human computation tasks and eliminates the complexity of human computation task creation, execution, refinement, quality control and manage knowledge space. The knowledge activities in the form of human computation tasks provide support to existing crowdsourcing system to align their task execution order optimally.

A Study on the German Mandatory Prescription System : Implications for the Korean System (독일 의약분업제도 운영에 관한 연구 : 한국 의약분업제도에의 함의)

  • Lee, Jun-Young
    • Korean Journal of Social Welfare
    • /
    • v.46
    • /
    • pp.349-376
    • /
    • 2001
  • The objectives of this study is to examine the German mandatory prescription system in terms of the applicability and restriction of the pharmaceutical policy in order to obtain some useful implications for solving the problems in Korean prescription system. Recently, in Germany, an issue about the security of the prescription, the price control of the pharmaceuticals and the containment of the increasing prescription expenditure has been intensively discussed. Similar problems are also occurred in Korea. So, the policy measurements of Germany could be used in Korea. But it could not easy to introduce the German policy measurements in Korea because of the social-institutional differences between the two countries, which are following; (1) Korea has a short experience with the mandatory prescription system, (2) the German concept of the management differs from that of the Korea, (3) the subscribers and the patients are excluded from the decision making process, (4) the medical service providers often resist against reform plans. For the stable development of the Korean prescription system the principle of self-government, the collective bargaining concept for cost containment, and social consensus about optimal expenditure of the pharmaceuticals are expected to be needed.

  • PDF

Information Technologies in the Formation of Environmental Consciousness in Future Professionals

  • Tomchuk, Mykhailo;Khrolenko, Maryna;Volokhata, Kateryna;Bakka, Yuliia;Ieresko, Oleg;Kambalova, Yanina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.331-339
    • /
    • 2022
  • The global process of transition from industrial to information society, as well as socio-economic changes taking place in Ukraine, require significant changes in many areas of state activity. It is especially connected with the reforms in the sphere of education. Today, national programs provide for the development of education on the basis of new progressive concepts, the introduction of the educational process of new pedagogical technologies and scientific achievements, the creation of a new system of information education, entrance of Ukaine into the transcontinental computer information system. Information technologies are qualitatively changing the key resources of development: this is no longer a space with fixed production, but primarily mobile finance and intelligence. They have a direct impact on the formation of personal growth, professional content and self-organization, emotional and psychological maturity and consciousness, and so on. One of the main factors in ensuring the stability and social education of the country's citizens is the culture of security, the formation and development of which is an urgent problem today. Comprehensive and systematic development of security culture will significantly increase the readiness of the population, the level of environmental, labor and patriotic education, reduce human losses, material damage from emergencies. Ecological education can be carried out more successfully only gradually and in accordance with the socio-psychological periods of one's development: kindergarten - school - college - university. The creation of such a system of environmental education should be enshrined as the basis of state environmental policy as a constitutional norm with the usage of information technology. Graduates of universities, who are the future of our country, after mastering the skills of basic environmental education must have a high level of environmental culture, which is, in turn, part of general human culture, and investigate environmental issues from the standpoint of their profession. It is known that with the help of environmental education the collective intelligence of society is formed, which can predict human activities and processes occurring in nature, and in some way to help with the elimination of crises. It is through environmental education that another system of human values is being formed, which places great emphasis on intangible wealth and solidarity, and great responsibility of humanity for the ecological state of the native country; provides a higher standard of living as a result of sustainable development, through the introduction of information technology in this system. To improve the quality of life, we need better knowledge, which must be implemented through information technology at the international level.

Open Policy Agent based Multilateral Microservice Access Control Policy (개방형 정책 에이전트 기반 다자간 마이크로서비스 접근제어 정책)

  • Gu Min Kim;Song Heon Jeong;Kyung Baek Kim
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.60-71
    • /
    • 2023
  • A microservice architecture that accommodates the heterogeneity of various development environments and enables flexible maintenance can secure business agility to manage services in line with rapidly changing requirements. Due to the nature of MSA, where communication between microservices within a service is frequent, the boundary security that has been used in the past is not sufficient in terms of security, and a Zerotrust system is required. In addition, as the size of microservices increases, definition of access control policies according to the API format of each service is required, and difficulties in policy management increase, such as unnecessary governance overhead in the process of redistributing services. In this paper, we propose a microservice architecture that centrally manages policies by separating access control decision and enforcement with a general-purpose policy engine called OPA (Open Policy Agent) for collective and flexible policy management in Zerotrust security-applied environments.

A Study on development of personal protection service (신변보호업무 발전방안에 관한 연구)

  • Ha, Jung-Hoon
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.199-223
    • /
    • 2015
  • The purpose of this study is to find the development of the personal protection business plan based on the problem that guards are now aware of personal protection service. In order to achieve the objectives of this study, we analyzed the data after expert survey and interview conducted by seven experts engaged in personal protection services more than 15 years. The guard who perform personal protection service proposed a development plan of personal protection services as follows. First, the current education system for new employees' training is required to improve the educational program of 40 hours in subjects related to personal protection duties by reorganization Second, the personal protection service training for guards also appropriate to switch to 8-hour training program for three months through an educational organization controlled by country. Third, the personal protection guards should be proceeding the practical programs required in the field and quality education in the different section by competent and professional instructors. Fourth, it should be revised Regulating that on the site of collective civil petition including in Events related to events across the board in the security services law. Fifth, there needs to be a change of recognition between police and private security firms, and to be set up the organization for supervision of management by police and private security firms jointly. Sixth, there needs to be organized a subcommittee which is consisting of experts in each task on Korea Security Association, and founded Korea Personal Protection Association for development associated with the personal protection service and to protect the rights of personal protection guards.

  • PDF

The Business Model of IoT Information Sharing Open Market for Promoting IoT Service (IoT 서비스 활성화를 위한 IoT 정보공유 오픈 마켓 비즈니스 모델)

  • Kim, Woo Sung
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.195-209
    • /
    • 2016
  • IoT (Internet of Things) is a collective term referring to application services that provide information through sensors/devices connected to the internet. The real world application of IoT is expanding fast along with growing number of sensors/devices. However, since IoT application relies on vertical combination of sensors/devices networks, information sharing within IoT services remains unresolved challenge. Consequently, IoT sensors/devices demand high construction and maintenance costs, rendering the creation of new IoT services potentially expensive. One solution is to launch an IoT open market for information sharing similar to that of App Store for smart-phones. Doing so will efficiently allow novel IoT services to emerge across various industries, because developers can purchase licenses to access IoT resources directly via an open market. Sharing IoT resource information through an open market will create an echo-system conducive for easy utilization of resources and communication between IoT service providers, resource owners, and developers. This paper proposes the new business model of IoT open market for information sharing, and the requirements for ensuring security and standardization of open markets.

An Analysis of Iran's Maritime Strategy from a Structural Perspective on Middle East International Relations: Focusing on Defensive Realism (중동 국제관계에 대한 구조적 관점에서의 이란 해양전략에 대한 분석: 방어적 현실주의 관점을 중심으로)

  • Oh, Dongkeon
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.93-117
    • /
    • 2020
  • Four cargo ships were ambushed by bombs in 2019 while navigating in the Strait of Hormuz. It was not clear who attacked those ships, however, many nations including the United States argued that it was Iran due to several reasons. The United States established the maritime collective defense system named International Maritime Security Construct (IMSC) in order to protect the maritime security in the Strait of Hormuz, without disclosure against whom it is aimed. Persian, who uses the Persian language unlike other countries in the Middle East, is the major ethnic group in Iran, and most of them believe Shi'ah Islam while most of the Arabs in the Gulf countries adhere to Sunni Islam. It seems that historic and religious motives caused the bipolar system in the Middle East, however, it is plausible to analyze the system of international affairs in the Middle East via defensive or structural realism. Iran has attempted to maintain its hegemony in the region by supporting Shi'ah muslims in the neighboring countries as well as in the world by using military and economic means. In this context, Iran's maritime strategy is to maintain its maritime hegemony on the Persian Gulf via countering threats and cooperating with friendly navies by using the Islamic Republic of Iran Navy(IRIN) and the Islamic Revolutionary Guard Corps Navy(IRGCN). IRIN acts like other navies in the world: protecting national interest at sea, expending its operational areas to the outer seas, and enhancing cooperation with other navies. Meanwhile, IRGCN plays a role as an asymmetric force at sea. It is composed of small and fast asymmetric assets, which can ambush ships fast and furious. Considering the poor study for Iran's maritime strategy in Korea, analyzing the strategy is meaningful for the Republic of Korea Navy, which has operated the Cheonghae Unit for more than ten years since it has extended its operational area over the Strait of Hormuz. In order not to be drawn into the conflict in the Strait, research on the maritime strategy of Iran and other countries in the Middle East should be started.

  • PDF