• Title/Summary/Keyword: security evaluation system

Search Result 682, Processing Time 0.028 seconds

A Study on the Criminal Justice Rehabilitation System of Sweden (스웨덴 법무보호복지제도 연구)

  • Kwon, Joon-Sung;Gong, Jung-Sik;Hyun, Mun-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.506-514
    • /
    • 2022
  • The method of suppressing recidivism through punishment centered on punishment is showing limitations through criminal policy research in many countries. As an alternative to this, a restorative judicial law aimed at returning criminals to members of society through reconciliation and coordination of community members, victims, and perpetrators is emerging as a paradigm for crime prevention and recidivism. Sweden is a representative welfare state and is confirming positive effects through correction of criminals based on restorative justice. In addition, it has a stable system related to the legal protection welfare system, and maintains a low recidivism rate and social security through scientific and reasonable operation using evidence-based principles in the evaluation and certification process of operating programs. However, research on the legal protection system implemented in advanced welfare and correctional countries, including Sweden, is still insufficient in Korea. Therefore, this study aims to explore the direction of the domestic legal protection system through a review of Swedish criminal policy and legal protection system, and to identify insufficient areas and complementary points of the domestic system to lay the foundation for improving the domestic legal protection welfare system and expanding business.

A study on unmanned watch system using ubiquitous sensor network technology (유비쿼터스 센서 네트워크 기술을 활용한 무인감시체계 연구)

  • Wee, Kyoum-Bok
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.271-303
    • /
    • 2009
  • "Ubiquitous sensor network" definition is this-Someone attaches electro-magnetic tag everything which needs communication between man to man, man to material and material to material(Ubiquitous). By using attached every electro-magnetic tag, someone detects it's native information as well as environmental information such as temperature, humidity, pollution and infiltration information(Sensor). someone connects it realtime network and manage generated information(Network). 21st century's war is joint combined operation connecting with ground, sea and air smoothly in digitalized war field, and is systematic war provided realtime information from sensor to shooter. So, it needs dramatic development on watch reconnaissance, command and control, pinpoint strike etc. Ubiquitous computing and network technologies are essential in national defense to operate 21st century style war. It is possible to use many parts such as USN combined smart dust and sensor network to protect friend unit as well as to watch enemy's deep area by unmanned reconnaissance, wearable computer upgrading soldier's operational ability and combat power dramatically, RFID which can be used material management as well as on time support. Especially, unmanned watch system using USN is core part to transit network centric military service and to get national defense efficiency which overcome the dilemma of national defense person resource reducing, and upgrade guard quality level, and improve combat power by normalizing guardian's bio rhythm. According to the test result of sensor network unmanned watch system, it needs more effort and time to stabilize because of low USN technology maturity and using maturity. In the future, USN unmanned watch system project must be decided the application scope such as application area and starting point by evaluating technology maturity and using maturity. And when you decide application scope, you must consider not only short period goal as cost reduction, soldier decrease and guard power upgrade but also long period goal as advanced defense ability strength. You must build basic infra in advance such as light cable network, frequency allocation and power facility etc. First of all, it must get budget guarantee and driving force for USN unmanned watch system project related to defense policy. You must forwarded the USN project assuming posses of operation skill as procedure, system, standard, training in advance. Operational skill posses is come from step by step application strategy such as test phase, introduction phase, spread phase, stabilization phase and also repeated test application taking example project.

  • PDF

Evaluation of Applicability of Renewable Energy in Controlled Horticulture Farms -Centering on Economic Analysis of Geothermal.Solar Powered- (시설원예농가의 재생에너지 적용가능성평가 -지열.태양광의 경제성 분석을 중심으로-)

  • Kim, Tae-Ho;Yoon, Sung-Yee
    • Korean Journal of Organic Agriculture
    • /
    • v.20 no.3
    • /
    • pp.267-282
    • /
    • 2012
  • In this study, RPS system, one of the renewable energy support systems, is utilized for economic analysis of solar generation equipment and the fuel cost savings plan for controlled horticulture farms with high fuel-cost dependency and facility applicability were evaluated. On the exterior of the upper layer of glass greenhouse (9917$m^2$) of controlled horticulture farms using bunker C oil, half of the area (4958$m^2$) was utilized for theoretical installation and operation of 450kW-level solar power generator, and as the result, first, the effect of investment cost only of solar generation system was found to be quite excellent, but it was analyzed that there were limits to saving the fuel costs of the controlled horticulture farms. Second, when geothermal system was first introduced in the farm and solar system was additionally introduced, it was analyzed that the effect of introducing solar system was excellent. In order to apply such effects to the sites of farming, partial supplementation of RPS system which is being uniformly applied regardless of the purpose of renewable energy is necessary. When the subject of use directly install facilities where it is directly connected to national added-value such as food security created by the farming industry, it is necessary to introduce appropriate system that corresponds to such. Moreover, it was studied that the quick development of demonstrative complex that can practically evaluate the applicability of renewable energy in farming industry and interest and preparation of related institutions in financial support structure for its site application would lead to success.

Accuracy Evaluation and Terrain Model Automation of Reservoir Using Unmanned Aerial Vehicle System (무인항공시스템을 활용한 저수지 지형모델 생성 및 정확도 평가)

  • Kim, Jungmeyon;Park, Sungsik;Kim, Jaehwi;Ahn, Seungwoo;Park, Sungyong;Kim, Yongseong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.2
    • /
    • pp.57-67
    • /
    • 2017
  • This study examines methods for creating terrain models of reservoirs and techniques for verifying the accuracy. Such methods and techniques use unmanned aerial vehicles which are capable of capturing high-resolution images repetitively, are highly economic, and capable of surveying wide areas. In addition, this study suggests methods of acquiring data for reservoir safety management, the methods which also employ the unmanned aerial vehicles. Therefore, this study helps solving problems that can arise when National Disaster Management System rebuilds a reservoir management database, such as a shortage of local government manpower. This study also contributes to providing element technology necessary for advancing the database.

Indoor Passive Location Tracking and Activity Monitoring using WSN for Ubiquitous Healthcare

  • Singh, Vinay Kumar;Lee, Seung-Chul;Lim, Hyo-Taek;Myllyla, Risto;Chung, Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.382-388
    • /
    • 2007
  • Indoor location system using wireless sensor network technology was applied for the status evaluation and activity monitoring of elderly person or chronic invalid at home. Location awareness application is transparent to the daily activities, while providing the embedded computing infrastructure with an awareness of what is happening in this space. To locate an object, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. By using only the sensor nodes without any external network infrastructure the cost of the system was reduced while the accuracy in our experiments. was fairly good and fine grained between 7 and 15 cm for location awareness in indoor environments. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object and several applications are enabled for context awareness.

Research for the survey of method to serviced customer Interruption cost evaluation (전력수용가 정전비용 산출물 위한 설문조사 방법론에 관한 연구)

  • Park, Soo-Man;Kim, Jae-Chul;Moon, Jong-Fil;Bae, Ju-Chun
    • Proceedings of the KIEE Conference
    • /
    • 2002.11b
    • /
    • pp.259-261
    • /
    • 2002
  • KEPCO(Korea Electric Power Corporation) has been management alone before some time. However through the electrical industry reorganization generation and KPX(Korea Power Exchange) were separated on 2001. A marketing and distribution part will be separated in the future. While many problem for appear in future. how to management for power system network is important. unfortunallity, electrical power industry is starting point right now. Thus, detail data is incomplete for this field and detail research for this field is required with distribution reorganazation. In this paper suggest for customer interruption cost compute method to establish a standard. The standard is need to security operation of power system network. The customer interruption cost compute method necessity of customer interruption cost compute method is minimizing process for total cost. As final total cost compute through the interruption cost compute, we can recognize investment point exactly. We cited foreign survey questions, because exactly matched survey questions for in the country circumstance is not exist. And process to survey performance suggest after modify for match in the country circumstance. Survey questions that suggested fer this paper are classified five categories. This paper suggests to detail survey questions and survey method before survey and suggest to how to customer interruption compute when survey data is ensured. Moreover this paper suggest to average interruption cost compute for residential customer using statistical method.

  • PDF

Face Recognition using 2D-PCA and Image Partition (2D - PCA와 영상분할을 이용한 얼굴인식)

  • Lee, Hyeon Gu;Kim, Dong Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.31-40
    • /
    • 2012
  • Face recognition refers to the process of identifying individuals based on their facial features. It has recently become one of the most popular research areas in the fields of computer vision, machine learning, and pattern recognition because it spans numerous consumer applications, such as access control, surveillance, security, credit-card verification, and criminal identification. However, illumination variation on face generally cause performance degradation of face recognition systems under practical environments. Thus, this paper proposes an novel face recognition system using a fusion approach based on local binary pattern and two-dimensional principal component analysis. To minimize illumination effects, the face image undergoes the local binary pattern operation, and the resultant image are divided into two sub-images. Then, two-dimensional principal component analysis algorithm is separately applied to each sub-images. The individual scores obtained from two sub-images are integrated using a weighted-summation rule, and the fused-score is utilized to classify the unknown user. The performance evaluation of the proposed system was performed using the Yale B database and CMU-PIE database, and the proposed method shows the better recognition results in comparison with existing face recognition techniques.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

Probabilistic Performance Evaluation Technique for Mixed-criticality Scheduling with Task-level Criticality-mode (작업별 중요도 모드를 적용한 혼합 중요도 스케줄링에서 확률적 성능 평가 기법)

  • Lee, Jaewoo
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.1-12
    • /
    • 2018
  • Mixed-criticality systems consist of components with different criticality. Recently, components are categorized depending on criticality by ISO 26262 standard and DO-178B standard in automotive and avionic domain. Existing mixed-criticality system research achieved efficient and safe scheduling through system-level criticality mode. The drawback of these approaches is performance degradation of low-criticality tasks on high-criticality mode. Task-level criticality mode is one method to address the problem and improve the performance of low-critical tasks. In this paper, we propose probabilistic performance metric for the approach. In simulation results with probabilistic performance metric, we showed that our approach has better performance than the existing approaches.

A Study on the Real-time Data Interface Technology based on SCM for Shipbuilding and Marine Equipment Production (조선해양기자재 제작을 위한 SCM 기반 실시간 데이터 인터페이스 기술에 관한 연구)

  • Myeong-Ki Han;Young-Hun Kim;Jun-Su Park;Won-Ho Lee
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.1
    • /
    • pp.143-149
    • /
    • 2024
  • The production and procurement of shipbuilding and offshore equipment is an important competitive factor in the shipbuilding and offshore industry. Recently, ICT-based digital technology has been rapidly applied to the manufacturing industry following the Fourth Industrial Revolution. Under the digital transformation, real-time data interface technology based on SCM (Supply Chain Management) is emerging as an important tool to improve the efficiency of the equipment manufacturing process. In this study, the characteristics and advantages and disadvantages of interface technologies of web-based data interface technologies were compared and analyzed. The performance was compared between theoretical evaluation based on technical features and practical application cases. As a result, it was confirmed that GraphQL is useful for selective data processing, but there is a problem with optimization, and REST API has a problem with receiving data due to a fixed data structure. Therefore, this study aims to suggest ways to utilize and optimize these data interface technologies.