• Title/Summary/Keyword: security design

Search Result 3,379, Processing Time 0.029 seconds

A Study of the Monitoring Model for the Serious Civil Accidents (중대시민재해 모니터링 모델 연구)

  • ChangYeol Lee;GilJoo Park;Twehwan Kim;Jonggil Chae
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.4
    • /
    • pp.834-843
    • /
    • 2023
  • Purpose: The Serious Civil Accidents consist of the public use facilities, the public transports, and the material and its products. According to the Serious Civil Accidents of the Serious Accidents Punishment Act, it must be constructed the safety and health management framework and execution system. In this study. we are design the model of the Serous Civil Accidents management and action system. Method: Firstly, we review from 8th article to 11th article of the enforcement ordinance of the Serious Accidents Punishment Act. From the articles, we design the visual and structural management system supporting the Act. Result: The Serious Civil Accidents apply to the system is consisted of 6 monitoring modules and 4 kinds DB modules. Conclusion: The Serious Civil Accidents are managed by the private enterprises, local governments, and public institutions. Specially, the CEO of restaurants, cafes, et al, do not know the detail information related to the Act. Also in case of the local governments, there are many facilities related the Act. It is not easy to the construct the management framework of the Act. This study provides the simple management structure for the Act.

The Problem of Space Debris and the Environmental Protection in Outer Space Law (우주폐기물과 지구 및 우주환경의 보호)

  • Lee, Young Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.205-237
    • /
    • 2014
  • Last 50 years there were a lot of space subjects launched by space activities of many states and these activities also had created tremendous, significant space debris contaminating the environment of outer space. The large number of space debris which are surrounding the earth have the serious possibilities of destroying a satellite or causing huge threat to the space vehicles. For example, Chinese anti-satellite missile test was conducted by China on January 11, 2007. As a consequence a Chinese weather satellite was destroyed by a kinetic kill vehicle traveling with a speed of 8 km/s in the opposite direction. Anti-satellite missile tests like this,contribute to the formation of enormous orbital space debris which can remain in orbit for many years and could interfere with future space activity (Kessler Syndrome). The test is the largest recorded creation of space debris in history with at least 2,317 pieces of trackable size (golf ball size and larger) and an estimated 150,000 debris particles and more. Several nations responded negatively to the test and highlighted the serious consequences of engaging in the militarization of space. The timing and occasion aroused the suspicion of its demonstration of anti-satellite (ASAT) capabilities following the Chinese test of an ASAT system in 2007 destroying a satellite but creating significant space debris. Therefore this breakup seemed to serve as a momentum of the UN Space Debris Mitigation Guidelines and the background of the EU initiatives for the International Code of Conduct for Outer Space Activities. The UN Space Debris Mitigation Guidelines thus adopted contain many technical elements that all the States involved in the outer space activities are expected to observe to produce least space debris from the moment of design of their launchers and satellites until the end of satellite life. Although the norms are on the voluntary basis which is normal in the current international space law environment where any attempt to formulate binding international rules has to face opposition and sometimes unnecessary screening from many corners of numerous countries. Nevertheless, because of common concerns of space-faring countries, the Guidelines could be adopted smoothly and are believed faithfully followed by most countries. It is a rare success story of international cooperation in the area of outer space. The EU has proposed an International Code of Conduct for Outer Space Activities as a transparency and confidence-building measure. It is designed to enhance the safety, security and sustainability of activities in outer space. The purpose of the Code to reduce the space debris, to allow exchange of the information on the space activities, and to protect the space objects through safety and security. Of the space issues, the space debris reduction and the space traffic management require some urgent attention. But the current legal instruments of the outer space do not have any binding rules to be applied thereto despite the incresing activities on the outer space. We need to start somewhere sometime soon before it's too late with the chaotic situation. In this article, with a view point of this problem, focused on the the Chinese test of an ASAT system in 2007 destroying a satellite but creating significant space debris and tried to analyse the issues of space debris reduction.

The Design and Application of Vibrator Type(AM) Combination Apparatus for Improving Police Equipment for Fugitive Prevention (도주방지용 경찰장구의 기능개선을 위한 진동자 방식(AM) 결속장치 설계 및 응용)

  • Choi, Ki-Nam;Lee, Seon-Jeh
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.13-24
    • /
    • 2011
  • Policemen judge the situations rationally and use their equipment such as handcuffs and rope within the purview, finding them needed to arrest criminals in the act who commit crimes which conforms to death penalty, life imprisonment or long imprisonment for over 3 years in accordance with Clause 10-2, Article 1 of the Police Mandate Law and prevent fleeing from them, defend their and others' lives and bodies, or if there are probable causes to be recognized that using equipment is necessary to restrain the interference with government officials in the execution of their duties. However, as the cases which the criminals run away in handcuffs or with both hands tied occur, it results in the waste of police force, distrust and enormous trouble in the pursuit of their duties. Therefore, if the way to perceive fleeing of criminals who have already worn the police equipment by some simple assistive devices without developing other new equipment, it will be very effective for police duties. This study is about the combination apparatus for fugitive prevention attached to the existing handcuffs and rope whose alert sounds let the staffs working inside the office perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. The combination apparatus for fugitive prevention which the study introduces contains the connecting parts which connect a flexible tube(cognition tags inside of the tube) of connector equipped with the police equipment with the ends of the tube and the part where these two meet and which connect them inside of the tube. The connecting parts are easy to be attached to the police equipment such as handcuffs and rope, but hard to be dismantled by the people tied up with the equipment. It enables watchers to perceive the fleeing of wanted criminals and examined suspects who wear the handcuffs or are tied up with rope, providing that they go through the exit where a transmitter and a receiver were set. Plus, if it is combined together with the portable receiver, it can be installed on the patrol cars and easily adopted to supervise illegally accessing of evidences. It is also avaliable to be adjunctively utilized for the handcuffs provided and the cost is so reasonable. Owing to its snap-on way to the cuffs, it can clear up any invasion of privacy and it can not be used as a self-injury tool because of the soft tube. Using AM Tag minimizes the lack of malfunction.

The Evaluation of Crime Prevention Environment for Cultural Heritage using the 3D Visual Exposure Index (3D 시각노출도를 이용한 문화재 범죄예방환경의 평가)

  • Kim, Choong-Sik
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.35 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Strengthening surveillance, one of the most important factors in the crime prevention environment of cultural heritages, has difficulty in evaluating and diagnosing the site. For this reasons, surveillance enhancement has been assessed by modelling the shape of cultural heritage, topography, and trees digitally. The purpose of this study is to develop the evaluation method of crime prevention environment for cultural heritage by using the 3D visual exposure index (3DVE) which can quantitatively evaluate the surveillance enhancement in three dimensions. For the study, the evaluation factors were divided into natural, organizational, mechanical, and integrated surveillance. To conduct the analysis, the buildings, terrain, walls, and trees of the study site were modeled in three dimensions and the analysis program was developed by using the Unity 3D. Considering the working area of the person, it is possible to analyze the surveillance point by dividing it into the head and the waist position. In order to verify the feasibility of the 3DVE as the analysis program, we assessed the crime prevention environment by digitally modeling the Donam Seowon(Historic Site No. 383) located in Nonsan. As a result of the study, it was possible to figure out the problems of patrol circulation, the blind spot, and the weak point in natural, mechanical, and organizational surveillance of Donam Seowon. The results of the 3DVE were displayed in 3D drawings, so that the position and object could be identified clearly. Surveillance during the daytime is higher in the order of natural, mechanical, and organizational surveillance, while surveillance during the night is higher in the order of organizational, mechanical, and natural surveillance. The more the position of the work area becomes low, the more it is easy to be shielded, so it is necessary to evaluate the waist position. It is possible to find out and display the blind spot by calculating the surveillance range according to the specification, installation location and height of CCTV. Organizational surveillance, which has been found to be complementary to mechanical surveillance, needs to be analyzed at the vulnerable time when crime might happen. Furthermore, it is note that the analysis of integrated surveillance can be effective in examining security light, CCTV, patrol circulation, and other factors. This study was able to diagnose the crime prevention environment by simulating the actual situation. Based on this study, consecutive researches should be conducted to evaluate and compare alternatives to design the crime prevention environment.

A Hardware Implementation of the Underlying Field Arithmetic Processor based on Optimized Unit Operation Components for Elliptic Curve Cryptosystems (타원곡선을 암호시스템에 사용되는 최적단위 연산항을 기반으로 한 기저체 연산기의 하드웨어 구현)

  • Jo, Seong-Je;Kwon, Yong-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.88-95
    • /
    • 2002
  • In recent years, the security of hardware and software systems is one of the most essential factor of our safe network community. As elliptic Curve Cryptosystems proposed by N. Koblitz and V. Miller independently in 1985, require fewer bits for the same security as the existing cryptosystems, for example RSA, there is a net reduction in cost size, and time. In this thesis, we propose an efficient hardware architecture of underlying field arithmetic processor for Elliptic Curve Cryptosystems, and a very useful method for implementing the architecture, especially multiplicative inverse operator over GF$GF (2^m)$ onto FPGA and futhermore VLSI, where the method is based on optimized unit operation components. We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed We optimize the arithmetic processor for speed so that it has a resonable number of gates to implement. The proposed architecture could be applied to any finite field $F_{2m}$. According to the simulation result, though the number of gates are increased by a factor of 8.8, the multiplication speed and inversion speed has been improved 150 times, 480 times respectively compared with the thesis presented by Sarwono Sutikno et al. [7]. The designed underlying arithmetic processor can be also applied for implementing other crypto-processor and various finite field applications.

Design and Implementation of IoT based Low cost, Effective Learning Mechanism for Empowering STEM Education in India

  • Simmi Chawla;Parul Tomar;Sapna Gambhir
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.163-169
    • /
    • 2024
  • India is a developing nation and has come with comprehensive way in modernizing its reducing poverty, economy and rising living standards for an outsized fragment of its residents. The STEM (Science, Technology, Engineering, and Mathematics) education plays an important role in it. STEM is an educational curriculum that emphasis on the subjects of "science, technology, engineering, and mathematics". In traditional education scenario, these subjects are taught independently, but according to the educational philosophy of STEM that teaches these subjects together in project-based lessons. STEM helps the students in his holistic development. Youth unemployment is the biggest concern due to lack of adequate skills. There is a huge skill gap behind jobless engineers and the question arises how we can prepare engineers for a better tomorrow? Now a day's Industry 4.0 is a new fourth industrial revolution which is an intelligent networking of machines and processes for industry through ICT. It is based upon the usage of cyber-physical systems and Internet of Things (IoT). Industrial revolution does not influence only production but also educational system as well. IoT in academics is a new revolution to the Internet technology, which introduced "Smartness" in the entire IT infrastructure. To improve socio-economic status of the India students must equipped with 21st century digital skills and Universities, colleges must provide individual learning kits to their students which can help them in enhancing their productivity and learning outcomes. The major goal of this paper is to present a low cost, effective learning mechanism for STEM implementation using Raspberry Pi 3+ model (Single board computer) and Node Red open source visual programming tool which is developed by IBM for wiring hardware devices together. These tools are broadly used to provide hands on experience on IoT fundamentals during teaching and learning. This paper elaborates the appropriateness and the practicality of these concepts via an example by implementing a user interface (UI) and Dashboard in Node-RED where dashboard palette is used for demonstration with switch, slider, gauge and Raspberry pi palette is used to connect with GPIO pins present on Raspberry pi board. An LED light is connected with a GPIO pin as an output pin. In this experiment, it is shown that the Node-Red dashboard is accessing on Raspberry pi and via Smartphone as well. In the final step results are shown in an elaborate manner. Conversely, inadequate Programming skills in students are the biggest challenge because without good programming skills there would be no pioneers in engineering, robotics and other areas. Coding plays an important role to increase the level of knowledge on a wide scale and to encourage the interest of students in coding. Today Python language which is Open source and most demanding languages in the industry in order to know data science and algorithms, understanding computer science would not be possible without science, technology, engineering and math. In this paper a small experiment is also done with an LED light via writing source code in python. These tiny experiments are really helpful to encourage the students and give play way to learn these advance technologies. The cost estimation is presented in tabular form for per learning kit provided to the students for Hands on experiments. Some Popular In addition, some Open source tools for experimenting with IoT Technology are described. Students can enrich their knowledge by doing lots of experiments with these freely available software's and this low cost hardware in labs or learning kits provided to them.

A Study on The Enhancement of Aviation Safety in Airport Planning & Construction from a Legal Perspective (공항개발계획과 사업에서의 항공안전성 제고에 대한 법률적 소고)

  • Kim, Tae-Han
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.2
    • /
    • pp.67-106
    • /
    • 2012
  • Today air traffic at the airport is complicated including a significant increase in the volume of air transport, so aviation accidents are constantly occurring. Therefore, we should newly recognize importance of the Air Traffic Safety, the core values of the Air Traffic. The location of airport that is the basic infrastructure of the air traffic and the security of safety for facilities and equipments are more important than what you can. From this dimension, I analyze the step-by-step safety factors that are taken into account in the airport development projects from the construction or improvement of the airport within the current laws and institutions and give my opinion on the enhancement of safety in the design and construction of airport. The safety of air traffic, as well as airport, depends on location, development, design, construction, inspection and management of the airport including airport facilities because we have to carry out the national responsibility that prevents the risk of large social overhead capital for many and unspecified persons in modern society through legislation regarding intervention of specialists and locational criteria for aviation safety from the planning stage of airport development. In addition, well-defined installation standards of airports and air navigation facilities, the key points of the airport development phase, can ensure the safety of the airport and airport facilities. Of course, the installation standards of airport and air navigation facilities are based on the global standard due to the nature of air traffic. However, to prevent the chaos for the safety standards in design, construction, inspection of them and to ensure the aviation safety, the safety standards must be further subdivided in the course of domestic legislation. The criteria for installation of the Air Navigation facilities is regulated most specifically. However, to ensure the safety of the operation for Air Navigation Facilities, performance system proved suitable for the Safety of Air Navigation Facilities must change over from arbitrary restrictions to mandatory restrictions and be applied for foreign producers as well as domestic producers. Of course, negligence of pilots and defective aircraft maintenance lead to a large portion of the aviation accidents. However, I think that air traffic accidents can be reduced if the airport or airport facility is perfect enough to ensure the safety. Therefore, legal and institutional supplement to prioritize the aviation safety from the stage of airport development may be necessary.

  • PDF

Resolution Method of Hazard Factor for Life Safety in Rental Housing Complex (임대주택단지의 생활안전 위해요인 해소방안)

  • Sohn, Jeong-Rak;Cho, Gun-Hee;Kim, Jin-Won;Song, Sang-Hoon
    • Land and Housing Review
    • /
    • v.8 no.1
    • /
    • pp.1-11
    • /
    • 2017
  • The government has been constructing and supplying public rental housing to ordinary people in order to stabilize housing since 1989. However, the public rental houses initially supplied to ordinary people are at high risk for safety accidents due to the deterioration of the facilities. Therefore, this study is aimed to propose a solution to solve the life safety hazards of the old rental housing complex as a follow-up study of Analysis of Accident Patterns and Hazard Factor for Life Safety in Rental Housing Complex. Types of life safety accidents that occur in public rental housing complexes are sliding, falling, crash, falling objects, breakage, fire accidents, traffic accidents and criminal accidents. The types of safety accidents that occur in rental housing complexes analyzed in this study are sliding, crashes, falling objects, and fire accidents. Although the incidence of safety accidents such as falling, breakage, traffic accidents and crime accidents in public rental housing complexes is low, these types are likely to cause safety accidents. The method of this study utilized interviews and seminar results, and it suggested ways to solve the life safety hazards in rental housing complexes. Interviews were conducted with residents and managers of rental housing complexes. Seminars were conducted twice with experts in construction, maintenance, asset management, housing welfare and safety. Through interviews and seminars, this study categorizes the life safety hazards that occur in rental housing complexes by types of accidents and suggests ways to resolve them as follows. (1) sliding ; use of flooring materials with high friction coefficient, installation of safety devices such as safety handles, implementation of maintenance, safety inspections and safety education, etc. (2) falling ; supplementation of safety facilities, Improvement of the design method of the falling parts, Safety education, etc. (3) crash ; increase the effective width of the elevator door, increase the effective width of the lamp, improve the lamp type (U type ${\rightarrow}$ I type), etc. (4) falling objects and breakage ; design of furniture considering the usability of residents, replacement of old facilities, enhancement of safety consciousness of residents, safety education, etc. (5) fire accidents ; installation of fire safety equipment, improvement by emergency evacuation, safety inspection and safety education, etc. (6) traffic accidents ; securing parking spaces, installing safety facilities, conducting safety education, etc. (7) criminal accidents; improvement of CCTV pixels, installation of street lights, removal of blind spots in the complex, securing of security, etc. The roles of suppliers, administrators and users of public rental housing proposed in this study are summarized as follows. Suppliers of rental housing should take into consideration the risk factors that may arise not only in the design and construction but also in the maintenance phase and should consider the possibility of easily repairing old facilities considering the life cycle of rental housing. Next, Administrators of rental housing should consider the safety of the users of the rental housing, conduct safety checks from time to time, and immediately remove any hazardous elements within the apartment complex. Finally, the users of the rental housing needs to form a sense of ownership of all the facilities in the rental housing complex, and efforts should be made not to cause safety accidents caused by the user's carelessness. The results of this study can provide the necessary information to enable residents of rental housing complexes to live a safe and comfortable residential life. It is also expected that this information will be used to reduce the incidence of safety accidents in rental housing complexes.

Design and Hardware Implementation of High-Speed Variable-Length RSA Cryptosystem (가변길이 고속 RSA 암호시스템의 설계 및 하드웨어 구현)

  • 박진영;서영호;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.9C
    • /
    • pp.861-870
    • /
    • 2002
  • In this paper, with targeting on the drawback of RSA of operation speed, a new 1024-bit RSA cryptosystem has been proposed and implemented in hardware to increase the operational speed and perform the variable-length encryption. The proposed cryptosystem mainly consists of the modular exponentiation part and the modular multiplication part. For the modular exponentiation, the RL-binary method, which performs squaring and modular multiplying in parallel, was improved, and then applied. And 4-stage CSA structure and radix-4 booth algorithm were applied to enhance the variable-length operation and reduce the number of partial product in modular multiplication arithmetic. The proposed RSA cryptosystem which can calculate at most 1024 bits at a tittle was mapped into the integrated circuit using the Hynix Phantom Cell Library for Hynix 0.35㎛ 2-Poly 4-Metal CMOS process. Also, the result of software implementation, which had been programmed prior to the hardware research, has been used to verify the operation of the hardware system. The size of the result from the hardware implementation was about 190k gate count and the operational clock frequency was 150㎒. By considering a variable-length of modulus number, the baud rate of the proposed scheme is one and half times faster than the previous works. Therefore, the proposed high speed variable-length RSA cryptosystem should be able to be used in various information security system which requires high speed operation.

Implementation of PersonalJave™ AWT using Light-weight Window Manager (경량 윈도우 관리기를 이용한 퍼스널자바 AWT 구현)

  • Kim, Tae-Hyoun;Kim, Kwang-Young;Kim, Hyung-Soo;Sung, Min-Young;Chang, Nae-Hyuck;Shin, Heon-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.3
    • /
    • pp.240-247
    • /
    • 2001
  • Java is a promising runtime environment for embedded systems because it has many advantages such as platform independence, high security and support for multi-threading. One of the most famous Java run-time environments, Sun's ($PersonalJave^{TM}$) is based on Truffle architecture, which enables programmers to design various GUIs easily. For this reason, it has been ported to various embedded systems such as set-top boxes and personal digital assistants(PDA's). Basically, Truffle uses heavy-weight window managers such as Microsoft vVin32 API and X-Window. However, those window managers are not adequate for embedded systems because they require a large amount of memory and disk space. To come up with the requirements of embedded systems, we adopt Microwindows as the platform graphic system for Personal] ava A WT onto Embedded Linux. Although Microwindows is a light-weight window manager, it provides as powerful API as traditional window managers. Because Microwindows does not require any support from other graphics systems, it can be easily ported to various platforms. In addition, it is an open source code software. Therefore, we can easily modify and extend it as needed. In this paper, we implement Personal]ava A WT using Microwindows on embedded Linux and prove the efficiency of our approach.

  • PDF