• Title/Summary/Keyword: information Protection

Search Result 4,475, Processing Time 0.031 seconds

Abolition of restrictions and research on precondition for nominating drone photographing free area (규제혁파, 드론 촬영 자유구역 지정을 위한 선결조건 연구)

  • Seok, Geum-Chan;Park, Gye-Soo;Nam, Soung-Ho;Kim, Young-Ki
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.209-217
    • /
    • 2020
  • The background of the research is the following. With the prosperity of drone industry, the government has been actively promoting measures to nominate 'drone photographing free areas'. However, existing laws, and procedures are rather unclear with related environmental factors in discordance with one another. Hence, voices in need for establishing a clear precondition for nominating drone photography free area have been rising. The purpose of the research is to provide measures for the preconditions to establish photography free areas for convenient drone photographing. The research utilizes literary methods, conducting focus group interviews to coordinate with specialists who can participate and discuss so that they can provide improvement measures. The research renders improvement measures in different sectors including 2x items in aviation security law, 8x items in free area nomination and procedure, 4x items in infrastructure establishment and information management area. The expected effects are the following: by attaching drone photography with aviation security law, nominating photography free area can be linked up with the Ministry of Land Infrastructure and Technology. Secondly, by enlarging photography restricted area to upper mid-air, a three dimensional drone security will be possible. Thirdly, by providing a 'Yongin area standard model', free area nomination will become more easy. Future research will focus on enhancing aviation security law regarding drone photographing. In addition, the promotion to nominate free areas for 33x responsible areas in accordance with the National Intelligence service will be required.

A Study of a Heat Flux Mapping Procedure to Overcome the Limitation of Heat Flux Gauges in Fire Tests (화재실험시 열유속 센서 사용의 단점을 보완한 Heat Flux Mapping Procedure에 관한 연구)

  • Choi, Keum-Ran
    • Journal of the Korean Society of Safety
    • /
    • v.20 no.4 s.72
    • /
    • pp.171-179
    • /
    • 2005
  • It is essential to understand the role of wall lining materials when they are exposed to a fire from an ignition source. Full-scale test methods permit an assessment of the performance of a wall lining material. Fire growth models have been developed due to the costly expense associated with full-scale testing. The models require heat flux maps from the ignition burner flame as input data. Work to date was impeded by a lack of detailed spatial characterization of the heat flux maps due to the use of limited instrumentation. To increase the power of fire modeling, accurate and detailed heat flux maps from the ignition burner are essential. High level spatial resolution for surface temperature can be provided from an infrared camera. The objective of this study was to develop a heat flux mapping procedure for a room test burner flame to a wall configuration with surface temperature information taken from an infrared camera. A prototype experiment was performed using the ISO 9705 test burner to demonstrate the developed heat flux mapping procedure. The results of the experiment allow the heat flux and spatial resolutions of the method to be determined and compared to the methods currently available.

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.

A Study on the Examination of Cultural Character of Korean Train Interior -with Emphasis on Leading Design Guidelines based on Cultural Theory- (한국 철도차량 객실공간의 문화적 특성 규명에 관한 연구 -문화이론에 근거한 디자인 가이드라인 도출을 중심으로-)

  • 이소라;이병종;김명석
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.431-440
    • /
    • 2004
  • Environment has formed characters of one society and the society has formed its characteristic cultural behaviors. Oppositely cultural behaviors make the characteristic products like environment and space products. It gives the idea that we can create cultural space by examining cultural characteristics. This research bases on the 5 cultural dimensions of Geert Hofstede to inspect cultural quality of Korea and the 10 cultural factors of Edward. T. Hall in order not to omit some part of cultural characters. From April 2004, KTX which is originated from TGV of France began toroll in Korea. It is interesting that the same interior of train is used by two different cultures. The method to find out the special quality of transportation culture of Korea passed 5 steps like following; 1) making a questionnaire to understand general concepts 2) observation to make dear what are the special behaviors in the interior of train 3) comparison valuation with marking sheet of the interiors of KTX and HSR in order to find out which space Korean people prefer 4) comparison of behaviors in the interior of KTX and TGV 5) Interviewing and surveying the opinions of passengers of KTX. With these methods it would be possible to seek out the characters, preferencesand needs for the interior space of train. There were remarkable things like following 1) importance of privacy from the other's eyes 2) seriousness of individual seat because of the short term transportation 3) necessity of continuous information because of 'Uncertainty Avoidance Culture' 4) absence of moving 5) requirement of bright and comfortable interior like one's inner room 6) preference to take a seat as a group with their friends or family due to 'Collective Culture' 7) self-defense and self-protection of one's baggage because of 'Uncertainty Avoidance Culture'. With these discoveries this research suggests guidelines to design interior of train of Korea.

  • PDF

Study on Local Wireless Network Data Structure for Sludge Multimeter (슬러지 멀티미터를 위한 근거리무선네트워크 데이터구조 설계 연구)

  • Jung, Soonho;Kim, Younggi;Lee, Sijin;Lee, Sunghwa;Park, Taejun;Byun, Doogyoon;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.2
    • /
    • pp.96-100
    • /
    • 2014
  • Recently, the management system of wastewater treatment facility has magnified due to the stringent regulations for the protection of the environment, and a sewage treatment plant efficiency and research of the car development are activated in large facilities or industrial park. however, the existing sewerage disposal system and specific water quality monitoring network reliability for real-time transmission of this building is insufficient. In this paper, we proposed a local wireless network design for sludge multi meter data collection and control for measuring the concentration of the sludge efficiently. Also, the collected data over the local wireless network to transmitted to the central monitoring system and accumulate the data in real time to calculate statistics is possible to monitor the status of the sewage treatment facilities. The proposed system uses a short-range wireless networks of IEEE 802.15.4 and configures an IEEE 802.11 network which can monitor real-time status in central system. Also, we install a sludge multimeter and communication network in sewage treatment facilities and confirm the usefulness of the proposed technique by demonstrating its effectiveness.

Hippocratic XML Databases: A Model and Access Control Mechanism (히포크라테스 XML 데이터베이스: 모델 및 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.31 no.6
    • /
    • pp.684-698
    • /
    • 2004
  • The Hippocratic database model recently proposed by Agrawal et al. incorporates privacy protection capabilities into relational databases. Since the Hippocratic database is based on the relational database, it needs extensions to be adapted for XML databases. In this paper, we propose the Hippocratic XML database model, an extension of the Hippocratic database model for XML databases and present an efficient access control mechanism under this model. In contrast to relational data, XML data have tree-like hierarchies. Thus, in order to manage these hierarchies of XML data, we extend and formally define such concepts presented in the Hippocratic database model as privacy preferences, privacy policies, privacy authorizations, and usage purposes of data records. Next, we present a new mechanism, which we call the authorization index, that is used in the access control mechanism. This authorization index, which is Implemented using a multi-dimensional index, allows us to efficiently search authorizations implied by the authorization granted on the nearest ancestor using the nearest neighbor search technique. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 13.6 times over the top-down access control strategy and by up to 20.3 times over the bottom-up access control strategy The major contributions of our paper are 1) extending the Hippocratic database model into the Hippocratic XML database model and 2) proposing an efficient across control mechanism that uses the authorization index and nearest neighbor search technique under this model.

The Legal Issues of Private Investigation Service in WTO/FTA System : Study of South Korea (WTO/ FTA 체제에서 민간조사업의 법적문제)

  • Ko, Ji-Hoon;Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.161-195
    • /
    • 2011
  • As crimes have increased to an extent that the police cannot cope with, there have been continuous discussions for the introduction of Private Investigation (hereafter PI) in Korea. However, attempts to legislate for the introduction of PI have failed every time PI bills for the introduction of PI were proposed. This was fundamentally because arguments both for and against the introduction of PI were sharply divided depending on the priorities. However, regardless of those clash of views, an apparent need for the legislation of PI service has arisen. As Korea opens its service market to other countries through GATS and FTAs, currently existing domestic PI law has been found to be inconsistent with international agreements such as GATS and KOREA-US(KORUS) FTA. This paper found that the Act on Usage and Protection of Credit Information which regulates PI service is inconsistent with the Article 12.4(a)(i) and (iii) of KORUS FTA and the Article 7.11 and the Article 7.13 of KOREA-EU FTA. If Korea does not modify the existing laws and establish new laws in relation to PI, such inconsistencies could lead to international trade disputes which could amount to billions of dollars. In this regard, the passage of the PI bill is necessary.

  • PDF

In about Solution for Improvement in the Private Security Sector research (민간경비 구성요인에 따른 개선방안에 관한 연구)

  • Lee, Young-Oh
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.265-282
    • /
    • 2008
  • This research aims to provide a solution for the improvement of private security according to the change in criminal environment. The main cause of crime can be found in the anti-functional dimensions including value set disorder, social phenomenon variation, information-based, globalization and urbanization. In this environment, the private security sector has dramatically increased in a quantitative viewpoint, but it is insufficient in a qualitative viewpoint. This paper recognized this problem and demonstrates a solution for improvement through classifying elements of private security into relevant legislation, education institutions, security companies and security associations. The analysis result is a follows: First, motivation and satisfaction rate of escort and security related major has shown to be high. However, respondents evaluated the guard educational institution negatively. Second, the motivation of entering into the private security sector for internal staffs has shown to be positive and sound. However, the job satisfaction rate has shown to be low due to excessive competition, negative perception of occupation and low earning. Third, respondents gave an average mark to the Security Association's management and operation. In addition, the mutual-aid project received the same mark. Negative feedbacks were given to the protection of member's interest and to association operation and policy, while positive feedbacks were given to the degree of member's cooperation towards association policies.

  • PDF

Termite Resistance of The Less Known Tropical Woods Species Grown in West Java, Indonesia

  • Febrianto, Fauzi;Pranata, Andi Zaim;Septiana, Dea;Arinana, Arinana;Gumilang, Adiyantara;Hidayat, Wahyu;Jang, Jae-Hyuk;Lee, Seung-Hwan;Hwang, Won-Joung;Kim, Nam-Hun
    • Journal of the Korean Wood Science and Technology
    • /
    • v.43 no.2
    • /
    • pp.248-257
    • /
    • 2015
  • This research focused on the natural durability of twenty one lesser known tropical wood species planted in West Java, Indonesia against subterranean termite (Coptotermes curvignathus). It was observed that both heartwood and sapwood of Kiara payung (Filicium decipiens); heartwoods of Nangka (Arthocarpus heterophyllus), Mahoni (Swietenia macrophylla) and Simpur (Dillenia grandifolia); and sapwood of Bungur (Lagerstroemia speciosa) were rated as resistant (natural durability class II) according to Indonesian standard SNI 01.7207.2006 (BSN 2006). Both heartwood and sapwood of Salam (Syzigium polyanthum), Pasang (Lithocarpus sundaicus), Bisbul (Diospyros discolor), Rukam (Flacourtia rukam) and Trembesi (Samanea saman); heartwood of Puspa (Schima walichii), Bungur, Tanjung (Mimusops elangi) and Angsana (Pterocarpus indicus) were rated as moderately resistant (natural durability class III). Both heartwood and sapwood of Sungkai (Peronema canescens), Pine (Pinus merkusii), Mangium (Acacia mangium) and Afrika (Maesopsis eminii); sapwoods of Mahoni, Puspa and Tanjung were rated as poorly resistant (natural durability class IV). Both heartwood and sapwood of Agathis (Agathis dammara), Durian (Durio zibethinus), Ki sampang (Evodia latifolia) and Jabon (Anthocephalus cadamba); sapwoods of Nangka and Angsana were rated as very poorly resistant (natural durability class V). This reserach showed that woods with lower resistance against C. curvignathus attack (natural durability class IV and V) tend to have lower termite mortality values compared to woods with higher resistance against C. curvignathus attack (natural durability class II and III). Results of the study will provide some valuable information on termite resistance of twenty one lesser known tropical wood species planted in Indonesia.

Recovery Pattern and Seasonal Dynamics of Kelp Species, Ecklonia cava Population Formed Following the Large-scale Disturbance (대규모 교란현상 후 형성된 대형갈조류 감태(Ecklonia cava) 개체군의 계절적 변동 및 회복 양상)

  • KIM, SANGIL;KANG, YUN HEE;KIM, TAE-HOON;PARK, SANG RUL
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.21 no.3
    • /
    • pp.103-111
    • /
    • 2016
  • Seasonal dynamics of kelp forest-forming algae, Ecklonia cava population formed following the large-scale disturbance by Typhoon 'Bolaven' in August 2012 were investigated in Jeju Island, Korea. Morphological characteristics, recruits density, mortality rate, total density and biomass were monitored bimonthly from June 2013 to June 2015. Total and longest blade lengths, and individual weight of E. cava showed distinct seasonal trends. Stipe length increased from winter to spring, but did not show increase or reduced from summer to autumn. This indicates that morphological characteristics of E. cava are mainly affected by the change of blades. The optimal temperature for E. cava growth was about $15-18^{\circ}C$ during winter to spring while the growths were inhibited at the water temperature above $20^{\circ}C$ during summer. E. cava exhibited very low recruitment during spring-summer. However, high recruitment was observed on April 2015 when canopy cover was very low due to low density. This indicates that recruitment of E. cava was controlled not by seasonal effects but by physical factors such as canopy and space. The mortality rate of juvenile plants was highest due to their unstable settlement. By June 2015, 34 months after the disturbances, E. cava was almost recovered to the pre-disturbance population size structure. These results suggest that recovery of kelp forest following the large-scale disturbance requires a considerable period of time (more than three years). This study should provide valuable ecological information on management, restoration and protection of kelp species.