• Title/Summary/Keyword: security event

Search Result 394, Processing Time 0.028 seconds

A Study on Releases Determination Scheme for a Forecasted Flood (예측홍수의 방류량 결정방안에 관한 연구)

  • Kwon, Oh-Ig;Shim, Myung-Pil
    • Journal of Korea Water Resources Association
    • /
    • v.30 no.3
    • /
    • pp.257-268
    • /
    • 1997
  • Reservoir operators and managers need to present a rational basis of determining releases for a flood event. This study divides a forecasted flood hydrograph by two parts on the basis of non-damaging discharge, which consists of one part con,trolled by non-damaging discharge and another controlled by using flood control storage of the reservoir. In case of using flood control storage, a new reservoir operation method. called TRF (Transformed Reservoir Flood) ROM, is suggested for the operating rules during a flood to consider the reservoir security as well as the operational efficiency. This paper presents an application of the methodology to the operation of a single multipurpose reservoir at the Taechong Dam during flood and the results analyzed.alyzed.

  • PDF

Relationship Between Impact of Event on Job Stress Private Security Guards (민간경비원의 사건충격과 직무스트레스의 관계)

  • Kim, chan-sun;Lee, ji-eun;Noh, young-jin
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2011.05a
    • /
    • pp.205-206
    • /
    • 2011
  • 이 연구의 목적은 민간경비원의 사건충격과 직무스트레스 및 대처능력의 관계를 규명하는데 있다. 이 연구는 2011년 인천소재 공항에서 재직하고 있는 민간경비원들을 모집단으로 설정한 후 판단표집법을 이용하여 최종분석에 이용된 사례 수는 총 239명이다. 연구에 사용된 설문지는 총 67문항으로 구성되었으며, SPSSWIN 18.0을 이용하여 빈도분석, 요인분석, 신뢰도분석, 회귀분석 등을 실시하였다. 설문지의 신뢰도는 Cronbach's ${\alpha}$값이 .779이상으로 나타났다. 결론은 다음과 같다. 첫째, 민간경비원의 사건충격은 직무스트레스에 영향을 미친다. 즉, 침습이 자주 반복될수록 인간관계에 대한 스트레스는 증가한다. 또한, 과각성이 자주 반복될수록 역할에 대한 스트레스는 증가한다. 둘째, 민간경비원의 사건충격은 대처능력에 영향을 미친다. 즉, 과각성이 자주 반복될수록 문제중심적 대처능력은 감소한다. 반면, 회피성향이 지속적으로 작용할수록 문제중심적 대처능력은 증가한다. 셋째, 민간경비원의 직무스트레스는 대처능력에 영향을 미친다. 즉, 직무특성에 대한 무력감이 작용할수록 문제중심적 대처능력은 증가한다. 반면, 역할에 대한 모호성이 높게 작용할수록 문제중심적 대처능력, 사회적지지 추구능력은 감소한다.

  • PDF

DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks

  • Gazdar, Tahani;Belghith, Abdelfettah;AlMogren, Ahmad S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1533-1556
    • /
    • 2017
  • The concept of trust in vehicular ad hoc networks (VANETs) is usually utilized to assess the trustworthiness of the received data as well as that of the sending entities. The quality of safety applications in VANETs largely depends on the trustworthiness of exchanged data. In this paper, we propose a self-organized distributed trust computing framework (DTCF) for VANETs to compute the trustworthiness of each vehicle, in order to filter out malicious nodes and recognize fully trusted nodes. The proposed framework is solely based on the investigation of the direct experience among vehicles without using any recommendation system. A tier-based dissemination technique for data messages is used to filter out non authentic messages and corresponding events before even going farther away from the source of the event. Extensive simulations are conducted using Omnet++/Sumo in order to investigate the efficiency of our framework and the consistency of the computed trust metrics in both urban and highway environments. Despite the high dynamics in such networks, our proposed DTCF is capable of detecting more than 85% of fully trusted vehicles, and filtering out virtually all malicious entities. The resulting average delay to detect malicious vehicles and fraudulent data is showed to be less than 1 second, and the computed trust metrics are shown to be highly consistent throughout the network.

Android-based Implementation of Remote Monitoring System for Industrial Gas Turbines (안드로이드 기반 산업용 가스터빈 원격 모니터링 시스템 구현)

  • Choi, Joon-Hyuck;Lee, Dong-Ik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.369-376
    • /
    • 2018
  • This paper presents an android-based implementation of real-time remote monitoring system for industrial gas turbines. The use of remote monitoring techniques can be beneficial in terms of not only the reduction of monitoring cost but also the earlier detection of abnormal status. In order to achieve the ability of protecting sensitive information from unauthorized persons, the proposed system supports secure transmissions using the RSA(Rivest Shamir Adleman) algorithm. In the event of abnormal situation on the gas turbine, the remote monitoring system generates an alarm to attract the user's attention by exploiting a push-message technique. The proposed system has been verified through a series of experiments with an experimental setup including a virtual data generator.

Family Life Issues of Poor Female Earners After Korean Economic Crisis (경제위기 이후의 빈곤 여성가장의 생활실태 조사)

  • 옥선화;성미애;허정원
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.2
    • /
    • pp.1-13
    • /
    • 2001
  • The purpose of this study is to examine the effects of poor female-headed families' family life events on their well-being under economic crisis in Korea and to investigate how they overcome their alienation. Specific research questions were as follows : (1) How are poor female earner's life satisfaction level and alienation level after economic crisis\ulcorner (2) How are poor female earner's demands for social security\ulcorner For this empirical analysis, the data was collected from 359 poor female-earners whose first child was of school age in the Seoul metropolitan area from the 14th Feb. to the 18th Mar. 2000. The questionnaire for the survey dealt with demographic information, alienation, life satisfaction and family life event. The major findings of the research project were as fellows: First, poor female-earners'alienation level was not higher than the average level. However among sub areas of alienation, powerlessness was higher than the average level. Second, poor female-easer made a strong claim for social welfare. Especially, they desired so much to be granted the national economic assistance.

  • PDF

A Study on the Improvement Directions of Mobile Simple Payment System: Usage Status Point of View (모바일 간편결제 시스템 개선 방향 연구: 이용 실태 관점)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.51-62
    • /
    • 2019
  • Recently, as the number of Smart Phone users increase, the simple payment system has been able to make payments using only card information such as a registered password without extra authorized certificate authentication or input of card information. In this paper, it will examine and analyze simple payment system provided by IT companies and financial institutions and the simple payment system that operates global online payment system by case view of operational direction. Then with this examination, it will study ways to improve the problems with terms of convenience and stability in terms of users. In this paper, it will analyze the inconvenient problem in using the QR code system that recently introduced and will propose solutions. Also, it will propose suggestions to solve inconvenience that caused by system that supports NFC simple payment terminal in Korea is not universalize by analyze case study on the overseas simple payment system. It will also propose opinions on the matters that customer having responsible for event of a small financial accident related to loss or theft when using the simple payment system. Then it will suggest expected requirements to prepare new security technical countermeasures and solve the conditions of meeting expectation satisfaction of users.

A Study on Generate User Hazzard Event in IoT Intelligent Convergence Security Environment (IoT 지능형 융합 보안 환경에서 사용자 위험 이벤트 생성을 위한 연구)

  • Lee, Jun Young;Park, Dong Ha;Lee, Hyerin;Lee, Sungyeon;George, Uduakobong;Jeong, Junho;Son, YunSik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1271-1273
    • /
    • 2017
  • 융합 보안이란, 물리적으로 정보, 인명, 시설을 보호하는 물리 보안과 ICT 기술을 이용한 정보 보안과의 융합되는 보안 기술 및 서비스를 의미한다. 최근에 IoT 환경의 발전으로 다양한 센서로부터 얻은 정보를 바탕으로 사용자의 상태, 위치 추적, 위험, 제한 시설의 접근을 감지하여 융합 보안에 활용하고자 하는 연구가 진행되고 있다. 본 논문에서는 융합 보안 환경에서 사용자의 위험 요소를 정의하고, 위험 요소에 따른 이벤트를 생성하기 위한 기법을 제안한다.

Analysis on Field Professionals' Assessment of Alternative Fire Escape Methods in Apartment Building (공동주택 대안적 화재 피난방식에 대한 건설전문가 평가조사)

  • Lee, Myung Sik;Lee, So Young
    • KIEAE Journal
    • /
    • v.9 no.5
    • /
    • pp.21-28
    • /
    • 2009
  • In apartment buildings, casualties, especially fatalities have occurred in balcony areas in fires if residents fail to escape to the main entrance. Potential consequences of a particular infrequent event should be considered. In attempting to design apartment buildings for fire safety, alternative escape methods such as vertical penetration could be considered. The purpose of this study is to investigate present building regulations regarding apartment buildings and examine pros and cons of the current escape method and alternative escape methods. Focus group interview was conducted to discuss problems of fire escape methods. In addition, questionnaires were distributed to field professionals working in architecture, construction and related industries. Among 500 questionnaires distributed, 192 questionnaires were collected. Usable 162 questionnaires were analyzed using SPSS 15. Regarding alternative fire escape methods, several concerns were mentioned. Safety, privacy, security, effectiveness of escape, water proof problems were raised. Based on the opinions, vertical penetration between apartment unit appeared more safe, secure, effective than horizontal penetration. However, both methods have its own pros and cons under specific contexts. Alternative escape methods need be considered for a selective options for residents in case of fire.

Footstep Detection in Noisy Environment via Non-Linear Spectral Subtraction and Cross-Correlation (잡음 환경에서 비선형 주파수 차감 및 교차 상관을 이용한 사람 발자국 탐지 방안)

  • Kim, Tae-Bok;Ko, Hanseok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.1
    • /
    • pp.60-69
    • /
    • 2014
  • Footstep detection using seismic sensors for security is a very meaningful task, but readings can easily fluctuate due to noise in outdoor environment. We propose NSSC method based on nonlinear spectral subtraction and cross-correlation using prime footstep model signal as a footstep signal refining process that enhances the signal-to-noise ratio (SNR) and attenuates noise. After de-noising, a detection event classification method is presented as further refining process to ensure that the detection result is a footstep. To validate the proposed algorithm, representative experiments including sunny and rainy-day cases are demonstrated.

Digital Watermarking Method for User's Certification of Camera-Phone (카메라 폰 상에서 사용자 인증을 위한 디지털 워터마킹 기법)

  • Lee, Seung-Ik;Sohn, Jae-Sik;Im, Sung-Woon;Kim, Duk-Gyoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • In the event of a traffic accident, a fire accident, or a criminal act, anyone will be able to capture these important moments and use authentic photographs for evidence purposes. Digital watermarking is able to ensure that the digital photographs taken from a particular camera-phone are authentic and indeed. This paper presents a blind image watermarking technique for digital phone camera. This method is based on singular value decomposition (SVD) and wavelet decomposition. Experimental results show that the proposed technique performs well in security and robustness against JPEG compression.

  • PDF