• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.033 seconds

Application of Police Video Equipment for Fighting Crime and Legal Trends (범죄 대응을 위한 경찰 영상장비의 활용과 법 동향)

  • Lee, Hoon;Lee, Won-Sang
    • Informatization Policy
    • /
    • v.25 no.2
    • /
    • pp.3-19
    • /
    • 2018
  • With the introduction of video cameras into law enforcement, a great deal of police organizations have adopted the technology in their routine crime prevention activities. The up-to-date systems of ambient surveillance energized by CCTV, police wearable cameras, drones, and thermal imaging devices enable the police to thoroughly monitor public spaces as well as to rigorously arrest on-scene criminals. These efforts to improve the level of surveillance are often met with public resistance raising concerns over citizens' rights to privacy. Recent studies on the use of police video equipment have constantly raised the issues related to the lack of applicable legal provisions, risk of personal information and privacy infringement as well as security vulnerabilities. In this regard, the present study attempted to review the public surveillance methods currently used by law enforcement agencies worldwide within the context of public safety and individual rights to privacy. Furthermore, the present study also discussed the legal boundaries of police use of video equipment to address public concerns over privacy issues.

SWOT Analysis for Small and Medium Enterprise in Smart Factory introduction (중소기업의 스마트 공장 도입을 위한 SWOT 분석)

  • Lee, Hyeon Ho;Leem, Choon Seong
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.1-14
    • /
    • 2018
  • The 4th Industrial Revolution has been rapidly changing the environment of all industries and the new technologies as included in the 4th Industrial Revolution has taken the lead in this change. Domestic SME need to change according to the 4th Industrial Revolution. Specially, it is necessary to introduce smart factories to the SME. Thus, this study suggests strategies for successful introduction of smart factories to SME through SWOT analysis about the situation of the SME. As strategies for utilizing its strengths, first, it is an activation through superior competitiveness. Second, the utilization of excellent technology and information is considered. Third, it is suggested to utilize global network-based environment. The strategies for making up for weakness are provided as follows. First, it is suggested to raise awareness of information security. Second, it is considered to establish technical standardization for the construction of evaluation system. Third, the promotion of manpower to secure professional manpower is suggested. The implication of this study is that it suggests the necessity of smart factory to understand and prepare for effective strategies for SME and various external strategies for the fourth industrial revolution.

Cable Effect Analysis Inside an Electrically Large Structure from an External Electromagnetic Waves (전자파에 의한 대형구조물 내부 케이블 영향 해석)

  • Lee, Jae-Min;Yoon, Seong-Sik;Lee, Jae-Wook;Han, Jung-Hoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.2
    • /
    • pp.155-158
    • /
    • 2017
  • With the help of technical development in the electronic industries, the electronic devices employing the cutting-edged technology are spread in all the area requiring electromagnetic communications. Especially, because of the presence of electronic devices in a variety of research fields like automotive vehicle, train, and aircraft, the research area such as the malfunction and critical damage of the internal system and microwave devices due to the unexpected radiated high-powered EM effects are very important even for the possible occurrence of human damage. In this paper, the effects of electromagnetic fields into the cable connecting the electronic devices and many sensors inside the target structure is treated because of potential malfunction or hardware disorders. In addition, correlation function and transmission line theory have been employed for the analysis of the induced current on the cable inside an electrically large resonant structure.

MDS code Creation Confirmation Algorithms in Permutation Layer of a Block Cipher (블록 암호에서 교환 계층의 MDS 코드 생성 확인 알고리즘)

  • 박창수;조경연
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1462-1470
    • /
    • 2003
  • According to the necessity about information security as well as the advance of IT system and the spread of the Internet, a variety of cryptography algorithms are being developed and put to practical use. In addition the technique about cryptography attack also is advanced, and the algorithms which are strong against its attack are being studied. If the linear transformation matrix in the block cipher algorithm such as Substitution Permutation Networks(SPN) produces the Maximum Distance Separable(MDS) code, it has strong characteristics against the differential attack and linear attack. In this paper, we propose a new algorithm which cm estimate that the linear transformation matrix produces the MDS code. The elements of input code of linear transformation matrix over GF$({2_n})$ can be interpreted as variables. One of variables is transformed as an algebraic formula with the other variables, with applying the formula to the matrix the variables are eliminated one by one. If the number of variables is 1 and the all of coefficient of variable is non zero, then the linear transformation matrix produces the MDS code. The proposed algorithm reduces the calculation time greatly by diminishing the number of multiply and reciprocal operation compared with the conventional algorithm which is designed to know whether the every square submatrix is nonsingular.

Central American Region Maritime Organization and their Role in the occurrence of maritime casualties

  • Rojas Oscar Porras;Imazu Hayama;Fujisaka Takahiko
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2006.10a
    • /
    • pp.166-175
    • /
    • 2006
  • Since many years ago and in spite of the existence of national regulations and international conventions ratified by the countries that are conformed the Central American Region (CAR), the seagoing maritime sector of this Region, has developed its activity without any type of safety measures. Therefore, a large number of people are known to die, disappear and suffer from serious injuries each year. These maritime casualties devastate the families affected by these events, and severely impact the local social and economic well-being. While all these accidents occurred in this Region, non government or any other official records are available recording these casualties Due to the lack of any historical written reports about maritime casualties occurred in this Region, the compilation of this type of accidents information and data was carried out directly by the researchers in the field. Also, all the information about the CAR Maritime Organization Components was too compiled by the authors from the respective National Maritimes Authorities. From the compiled information was elaborated the CAR maritime casualties data base and from the analysis of the above data base were determined the main causes of the maritime accidents occurred in the CAR. The lack of safety measures onboard and the ignorance of the presence and influence of atmospheric phenomena were among main factors that had been caused the maritime casualties in this Region. By other hand, from the analysis of the CAR maritime organization components, the existence of one level of organization very similar among them was determinate. The objective of this research was to analyze the role of the CAR maritime organization in the prevention of the occurrence of maritime casualties. The results of this study provides general understanding of the causes of this type of accidents in the CAR and basis for support in improving safety navigation system and measures so that the number of fatalities and maritime accidents may be reduced in the future.

  • PDF

Analysis of Linear Span of Non-linear Binary Sequences with Decimation d=2m-2(2m+3) (데시메이션이 d=2m-2(2m+3)인 비선형 이진수열의 선형스팬 분석)

  • Yim, Ji-Mi;Cho, Sung-Jin;Kim, Han-Doo;Kim, Seok-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.609-616
    • /
    • 2014
  • Large linear span makes difficult to predict, so this study is important to the security and code system. It has been studied about the non-linear binary sequences having low correlation values and large linear span. In this paper we analyze the linear span of $S^r_a(t)=Tr^m_1\{[Tr^n_m(a{\alpha}^t+{\alpha}^{dt})]^r\}$ ($a{\in}GF(2^m)$, $0{\leq}t{\leq}2^m-2$) where n=2m and $d=2^{m-2}(2^m+3)$.

A SES Alarmed Link Encryption Synchronization Method for High-speed Video Data Encryption (고속 영상데이터 암호화에 적합한 SES Alarmed 링크 암호동기 방식)

  • Kim, HyeongRag;Lee, HoonJae;Kwon, DaeHoon;Pak, UiYoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2891-2898
    • /
    • 2013
  • CCSDS Standard is widely used in international space telecommunication area. In this standard, Encryption is realized using a unique hierarchical encryption protocol and satisfied security requirements of communication channels. For synchronization, encryption sync is attached in the beginning of encrypted data. But exceptional case(timing jittering, abnormal system shutdown, etc.) is occurred, receiving equipment cannot decrypt received data. In this paper, we propose a SES Alarmed link encryption synchronization method for sending warning signal to the transmitter when some problems have been occurred during the transmission and we also suggest optimum conditions for SES Alarm signal through performance analysis.

Convolution Neural Network based TW3 Maximum Height Prediction System (컨볼루션 신경망 기반의 TW3 최대신장예측 시스템)

  • Park, Si-hyeon;Cho, Young-bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1314-1319
    • /
    • 2018
  • The current TW3 - based maximum height prediction technique used in KMAA(Korean Medical Academy of Auxology) is manual and subjective, and it requires a lot of time and effort in the medical treatment, while the interest in the child's growth is very high. In addition, the technique of classifying images using deep learning, especially convolutional neural networks, is used in many fields at a more accurate level than the human eyes, also there is no exception in the medical field. In this paper, we introduce a TW3 algorithm using deep learning, that uses the convolutional neural network to predict the growth level of the left hand bone, to predict the maximum height of child and youth in order to increase the reliability of predictions and improve the convenience of the doctor.

Building GIS Application Model in Support of Tsunami Relief Effort (쓰나미 재난 대응을 위한 GIS 응용모델 구축에 관한 연구)

  • Liyanage, Asha Nilani;Lee, Heewon;Lee, Seok-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1489-1494
    • /
    • 2013
  • Tsunami happens rarely enough to allow a false sense of security, but when they do occur, there may be just minutes or hours for people to reach a safe location. Natural disasters like tsunami are inevitable and it is almost impossible to fully recoup damages caused by the disasters. However, it is possible to minimize the potential risk by developing early warning strategies. GIS modelling with its geoprocessing and analysis capability can play a crucial role in efficient mitigation and management of disaster. This study aims at developing integrated spatial information system processing model supporting tsunami evacuation action planning using geo-information technology such as GIS. The integration process classified into four phases. And in each phase, required input data and GIS processes are decided. The main effort in minimizing casualties in tsunami disaster is to evacuate people from the hazard area before tsunami strikes by means of either horizontal or vertical evacuation. The study provides essential spatial information for local decision making related with people's evacuation in tsunami-prone areas based on a modeling approach transferable to other coastal areas.

Current Status for Generation, Treatment and Recycling of Waste Resources in the Domestic Industry and Improvement Measures of Resource Efficiency (국내(國內) 산업(産業) 폐자원(廢資源)의 발생(發生)·처리(處理)·재자원화(再資源化) 현황(現況) 및 자원효율성(資源效率性) 향상(向上) 방안(方案))

  • Kang, Hong-Yoon;Lee, Il-Seuk;Kim, Kyung-Hwan
    • Resources Recycling
    • /
    • v.22 no.3
    • /
    • pp.3-17
    • /
    • 2013
  • Recently, the importance of efficient resource management has been highlighted due to the uncertainty of its security. Korea has thus made an effort to improve the resource productivity in various fields such as the increase of recycling rate and the establishment of methodical resource management system. It is still necessary to draw the innovative improvement measure of national resource efficiency. This study derives major issues of recycling potential in the domestic industry by analyzing the current status of generation, treatment and recycling of industrial wastes in Korea. Futhermore, main tasks for promoting the improvement of national resource efficiency through the recycling of industrial wastes in Korea have been proposed based on the results of this study with the comparison of Japan's situation.