• Title/Summary/Keyword: public security environment

Search Result 419, Processing Time 0.025 seconds

Baggage Recognition in Occluded Environment using Boosting Technique

  • Khanam, Tahmina;Deb, Kaushik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5436-5458
    • /
    • 2017
  • Automatic Video Surveillance System (AVSS) has become important to computer vision researchers as crime has increased in the twenty-first century. As a new branch of AVSS, baggage detection has a wide area of security applications. Some of them are, detecting baggage in baggage restricted super shop, detecting unclaimed baggage in public space etc. However, in this paper, a detection & classification framework of baggage is proposed. Initially, background subtraction is performed instead of sliding window approach to speed up the system and HSI model is used to deal with different illumination conditions. Then, a model is introduced to overcome shadow effect. Then, occlusion of objects is detected using proposed mirroring algorithm to track individual objects. Extraction of rotational signal descriptor (SP-RSD-HOG) with support plane from Region of Interest (ROI) add rotation invariance nature in HOG. Finally, dynamic human body parameter setting approach enables the system to detect & classify single or multiple pieces of carried baggage even if some portions of human are absent. In baggage detection, a strong classifier is generated by boosting similarity measure based multi layer Support Vector Machine (SVM)s into HOG based SVM. This boosting technique has been used to deal with various texture patterns of baggage. Experimental results have discovered the system satisfactorily accurate and faster comparative to other alternatives.

Enhanced Operator Authentication Method in SCADA Control Network (SCADA제어망에서 강화된 운용자 인증 방안)

  • Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.416-424
    • /
    • 2019
  • The authentication technologies used to access computers in both IT and operational technology (OT) network areas include ID/PW, public certificate, and OTP. These authentication technologies can be seen as reflecting the nature of the business-driven IT network. The same authentication technologies is used in SCADA control networks where the operational technology is centered. However, these authentication technologies do not reflect the characteristics of the OT control network environment, which requires strict control. In this paper, we proposed a new enhanced user authentication method suitable for the OT SCADA control network centered on control information processing, utilizing the physical terminal address and operator location information characteristics of the operator's mobile terminal and control network.

Does Earnings Quality Affect Companies' Performance? New Evidence from the Jordanian Market

  • SALEH, Isam;ABU AFIFA, Malik;ALSUFY, Fares
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.33-43
    • /
    • 2020
  • This study aims to investigate the importance of earnings quality as a determinant of companies' performance. It provides some empirical evidences from an emerging market, specifically from the Jordanian market. This study developed an econometric model for the effect of earnings quality on the companies' performance using empirical evidence. The study employs a panel data analysis method by using a sample of all Jordanian industrial public shareholding companies listed on Amman Stock Exchange (ASE) during 2010-2018. The results reveal that Return on Assets (ROA), Return on Equity (ROE), and Earnings Per Share (EPS) as proxies of company's performance are affected by the earnings quality. This provides the importance of positive earnings quality that eventually influences the companies' performance. The results of this study suggest that the higher control level on the managers' behavior and its outcome will have an effect on earnings quality, and thus the company's performance increases. As well as, high relevance of accounting information will improve earnings quality, and thus earnings quality with the interaction factors of the company's environment work on improving performance. As a conclusion, this study can work as a reference to assist standard setters, security analysts, regulators and other accounting-information users in appraising relation between the earnings quality and companies' performance.

Group Key Agreement Protocols for Combined Wired/Wireless Networks (유무선 통합 네트워크 환경에 적합한 그룹 키 동의 프로토콜)

  • Nam Junghyun;Kim Seungjoo;Won Dongho;Jang Chungryong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.607-615
    • /
    • 2005
  • Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely establish a common secret key. Over the years, a number of solutions to this problem have been proposed with varying degrees of complexity. However, there seems to have been no previous systematic look at the growing problem of key agreement over combined wired/wireless networks, consisting of both high-performance computing machines and low-power mobile devices. In this paper we present an efficient group key agreement scheme well suited for this networking environment. Our scheme meets efficiency, scalability, and all the desired security requirements.

Scrambling Technology in MPEG Video Environment (MPEG비디오 부호화기 내의 scrambling 기술)

  • Kwon, Goo-Rak;Youn, Joo-Sang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1279-1284
    • /
    • 2009
  • With the advance of multimedia technology, multimedia sharing among multiple devices has become the main issue. This allows users to expect the peer-to-peer distribution of unprotected and protected contents over public network. Inevitably, this situation has caused an incredible piracy activity and Web sites have begun to provide copyrighted A/V data for free. In order to, protect the contents from illegal attacks and distribution, digital right management (DRM) is required. In this paper, we present the minimal cost scrambling scheme for securing the copyrighted multimedia using the data encryption standard (DES) encryption technique. Experimental results indicate that the proposed scrambling techniques achieve a very good compromise between several desirable properties such as speed, security, and file size.

Conservation and Utilization of Insect Pollinators for Promotion of Agricultural Production in Bangladesh

  • Amin, Md. Ruhul;Hossain, Md. Shamim;Suh, Sang Jae;Kwon, Yong Jung
    • Current Research on Agriculture and Life Sciences
    • /
    • v.32 no.4
    • /
    • pp.171-174
    • /
    • 2014
  • Agriculture in Bangladesh is slowly transforming to the production of high-value fruit and vegetable crops to satisfy the nutrient requirements of their large size population, and this transformation is creating new challenges as regards improving and maintaining the productivity and crop quality. The country has a declining trend of insect pollinators due to habitat loss, land use changes, monoculture-dominated agriculture, and the excessive and indiscriminate use of pesticides. Such pollinator deficiencies can cause reduced yields, thereby threatening the subsistence of marginal farmers. In Bangladesh, growers enjoy free pollination services from the naturally occurring insect populations. While honeybees pollinate mustard, onions, and melons, many other hymenopterans, coleopterans, hemipterans, dipterans, and thysanopterans also visit the crop fields, making these insects significant for the food security, environment, and economy of the nation. Therefore, attention should be given to public policy, research, and human resource development that promotes knowledge and appreciation of the conservation and utilization of insect pollinators.

A Multi-Scale Parallel Convolutional Neural Network Based Intelligent Human Identification Using Face Information

  • Li, Chen;Liang, Mengti;Song, Wei;Xiao, Ke
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1494-1507
    • /
    • 2018
  • Intelligent human identification using face information has been the research hotspot ranging from Internet of Things (IoT) application, intelligent self-service bank, intelligent surveillance to public safety and intelligent access control. Since 2D face images are usually captured from a long distance in an unconstrained environment, to fully exploit this advantage and make human recognition appropriate for wider intelligent applications with higher security and convenience, the key difficulties here include gray scale change caused by illumination variance, occlusion caused by glasses, hair or scarf, self-occlusion and deformation caused by pose or expression variation. To conquer these, many solutions have been proposed. However, most of them only improve recognition performance under one influence factor, which still cannot meet the real face recognition scenario. In this paper we propose a multi-scale parallel convolutional neural network architecture to extract deep robust facial features with high discriminative ability. Abundant experiments are conducted on CMU-PIE, extended FERET and AR database. And the experiment results show that the proposed algorithm exhibits excellent discriminative ability compared with other existing algorithms.

Study on the adoption of vocational aptitude test in the fire service (소방공무원의 직업 적성도 도입에 관한 연구)

  • Park, Kyong-Jin;Lee, Bong-Woo;Lee, Guen-Cull;Nam, Ki-Hun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.2
    • /
    • pp.155-161
    • /
    • 2019
  • Recently, increases in major disasters such as fires, earthquakes and typhoons have raised public expectations for safety. In addition to this increase in expectations of safety, the government continues to push for more manpower and better treatment for firefighters who are operating in the disaster scene. Despite the improvement of working conditions and increased welfare for firefighters, however, the incidence and turnover of various mental diseases continues to increase. It is reported that many of the diseases such as post-traumatic stress disorder and the turnover of firefighters are due to a mismatch in individual's personality and work environment. In this study, 108 firefighters were evaluated for their vocational aptitude in the new curriculum. Based on the analysis results, new firefighters were proposed to provide employment and education training improvements, and to provide job security suitable for the individual's personality type through the introduction of the vocational aptitude test for firefighters who are working in the fire service. In addition, we would like to use the vocational aptitude test as a material for reducing post-traumatic stress disorder and increasing turnover through long-term tracking and observation, rather than from a one-off perspective.

A Brief Scrutiny of Malawi's Policy on Nuclear Power

  • Katengeza, Estiner Walusungu
    • Journal of Radiation Protection and Research
    • /
    • v.45 no.4
    • /
    • pp.147-153
    • /
    • 2020
  • Background: Malawi's 2018 National Energy Policy includes nuclear power as an energy option with an operational 100 MW targeted for 2035. Materials and Methods: This paper challenges the scope of the policy on nuclear power by reviewing its implementation strategy and comparing it to: the strategy established for coal in the same policy; some experiences from other countries; and documents by the International Atomic Energy Agency (IAEA) relating to establishing a national position on nuclear power and infrastructural requirements for a nuclear power program. Results and Discussion: It is found that the pro-nuclear position is uninformed, and targets are unrealistic owing to a lack of understanding of nature of nuclear power including the requirements for safety, security and safeguards, and nuclear infrastructure. It is apparent that neither consultation nor a proper analysis were comprehensively conducted for nuclear. Though the national energy policy suggests a national position for nuclear energy, the content does not demonstrate that the position was arrived at knowledgeably. Conclusion: Thus, nuclear power may presently be viewed as a potential energy option that is yet to be seriously considered. It is important to build an appropriate level of literacy on nuclear science and technology for policy makers, key stakeholders, and the public to be better positioned for strategizing on nuclear power.

A Study on the Introduction of Environmental Taxes in Marine Tourism Areas (해양관광지 환경세 도입에 관한 연구)

  • Yang, Mo-Se;Kim, Ji-Hyun;Shin, Eui-Soo
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.187-210
    • /
    • 2021
  • In recent years, many countries are committing to environmental conservation. Following this trend, successful policy implementation of SDGs with ESG management extended to the public sector is emerging as a keyword determining the success or failure of the capital market, countries, and individual companies. Accordingly, many countries are implementing various policies related to the environment. One of them is to implement national policies by introducing environmental taxes. These policies use environmental taxes to control pollution by indirectly influencing the behavior of producers or consumers through economic incentives rather than directly interfering with environmental pollution behavior. This study examines the status of environmental taxes in marine tourism sites in Korea, reviews the effectiveness of such policies, and suggests how to improve them by identifying limitations of the current system.

  • PDF