• 제목/요약/키워드: security inspection

Search Result 222, Processing Time 0.022 seconds

Maritime Interdiction against the DPRK's Illicit Maritime Practices (북한의 불법 해상활동에 대한 해양차단에 관한 연구)

  • Kim, Jeong-Soo
    • Strategy21
    • /
    • s.46
    • /
    • pp.29-56
    • /
    • 2020
  • Despite the deep concerns against the DPRK and the harsh sanctions imposed on it, the country renders the sanctions futile by facilitating various illegal trades such as the ship-to-ship transfers of petroleum or coal. Recently, the international community went into paying attention to solve this matter. Among the measures the community can take, "reinforcing the search and inspection of the DPRK related vessels transiting in the high and territorial seas" is the best policy approach to reduce the sanction evasion and provide the international community with considerable bargaining advantages. This measure requires the forceful action by legal enforcement agencies, also known as VBSS. (Visit, Board, Search, and Seizure) It would make the deals prohibited by the UNSCRs (United Nation Security Council Resolutions) less profitable by reducing the expected return on the deals and increasing the cost for them. So, it would make the illegal deals under the table less attractive. The DPRK has been able to render the sanctions futile by exploiting the limitations of the current maritime sanctions. The resolutions are short of being specific about law enforcement, and the PSI (Proliferation Security Initiative) is legally nonbinding. However, if the UNSCRs and the PSI are combined, they can generate a new source of power and exploit the weakness of the DPRK. Noting that the recent UNSCRs stipulated all the legal discussions in the resolutions are confined and applied only to the DPRK, the PSI can target the commercial trade as well as the WMD-related materials in the case of the DPRK's illegal maritime practices. Therefore, the PSI endorsing partners should go beyond mere commitments. They should discuss action plans to implement the maritime interdictions to the extent that they discourage the DPRK and its business partners continuing the illegal activities.

Correlation Analysis of Load-carrying Capacity by Safety Inspection Indicators in Bridges (교량 안전점검 지표별 내하성능 상관관계 분석)

  • Jung, Kyu San;Seo, Dong Woo;Kim, Jae Hwan;Cho, Han Min;Park, Ki Tae;Shin, Yeon-Woo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.89-99
    • /
    • 2022
  • Bridges are a key infrastructure that underpins economic and social activities. In Korea, bridges began to be built with economic development in the 1970s and were built intensively in the 1980s and 1990s. In recent years, as the number of bridges with a service life of more than 30 years is increasing, continuous maintenance is required to ensure the safety of the bridges. In particular, in order to cope with the aging of bridges, research on technology development such as maintenance using ICT technology, preventive maintenance, life cycle cost reduction, and long life bridge is being actively promoted. This paper presents the results of correlation analysis based on the safety evaluation data of bridges as part of the research on the development of a model for estimating load-carrying capacity of bridges. As a analysis result, indicators highly correlated with the load-carrying capacity of the bridge was derived.

Performance Analysis of Detection Algorithms for the Specific Pattern in Packet Payloads (패킷 페이로드 내 특정 패턴 탐지 알고리즘들의 성능 분석에 관한 연구)

  • Jung, Ku-Hyun;Lee, Bong-Hwan;Yang, Dongmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.794-804
    • /
    • 2018
  • Various applications running in computers exchange information in the form of packets through the network. Most packets are formatted into UDP/IP or TCP/IP standard. Network management administrators of enterprises and organizations should be able to monitor and manage packets transmitted over the network for Internet traffic measurement & monitoring, network security, and so on. The goal of this paper is to analyze the performance of several algorithms which closely examine and analyze payloads in a DPI(Deep Packet Inspection) system. The main procedure of packet payload analysis is to quickly search for a specific pattern in a payload. In this paper, we introduce several algorithms which detect a specific pattern in payloads, analyze the performance of them from three perspectives, and suggest an application method suitable for requirements of a given DPI system.

A Study on Photon Characteristics Generated from Target of Electron Linear Accelerator for Container Security Inspection using MCNP6 Code (MCNP6 코드를 이용한 컨테이너 보안 검색용 전자 선형가속기 표적에서 발생한 광자 평가에 관한 연구)

  • Lee, Chang-Ho;Kim, Jang-Oh;Lee, Yoon-Ji;Jeon, Chan-hee;Lee, Ji-Eun;Min, Byung-In
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.3
    • /
    • pp.193-201
    • /
    • 2020
  • The purpose of this study is to evaluate the photon characteristics according to the material and thickness of the electrons incidented through a linear accelerator. The computer simulation design is a linear accelerator target consisting of a 2 mm thick tungsten single material and a 1.8 mm and 2.3 mm thick tungsten and copper composite material. In the research method, First, the behavior of primary particles in the target was evaluated by electron fluence and electron energy deposition. Second, photons occurring within the target were evaluated by photon fluence. Finally, the photon angle-energy distribution at a distance of 1 m from the target was evaluated by photon fluence. As a result, first, electrons, which are primary particles, were not released out of the target for electron fluence and energy deposition in the target of a single material and a composite material. Then, electrons were linearly attenuated negatively according to the target thickness. Second, it was found that the composite material target had a higher photon generation than the single material target. This confirmed that the material composition and thickness influences photon production. Finally, photon fluence according to the angular distribution required for shielding analysis was calculated. These results confirmed that the photon generation rate differed depending on the material and thickness of the linear accelerator target. Therefore, this study is necessary for designing and operating a linear accelerator use facility for container security screening that is being introduced in the country. In addition, it is thought that it can be used as basic data for radiation protection.

A Development of Real-time Vibration Monitoring and Analysis System Linked to the Integrated Management System of Ministry of Public Safety and Security (국민안전처 통합관리시스템 연계 가능한 시설물 진동 감지 및 분석 시스템 개발)

  • Lim, Ji-Hoon;Jung, Jin-Woo;Moon, Dae-Joong;Choi, Dong-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.20 no.3
    • /
    • pp.130-139
    • /
    • 2016
  • A frequency of earthquake occurrence in the Republic of Korea is increasing over the past few decades. In this situation, an importance of earthquake prevention comes to the fore because the earthquake does damage to structures and causes severe damage of human life. For the earthquake prevention, a real-time vibration measurement for structures is important. As an example, the United States of America and Japan have already been monitoring real-time earthquake acceleration for the important structures and the measured acceleration data has been managed by forming database. This database could be used for revising the seismic design specifications or predicting the damage caused by earthquake. In Korea, Earthquake Recovery Plans Act and Enforcement Regulations are revised and declared lately. Ministry of Public Safety and Security is constructing a integrated management system for the measured earthquake acceleration data. The purpose of this research is to develop a real-time vibration monitoring and analysis system for structures which links to the integrated management system. The developed system contains not only a monitoring function to show real-time acceleration data but also an analysis system to perform fast fourier transform, to obtain natural frequency and earthquake magnitude, to show response spectrum and power spectrum, and to evaluate structural health. Additionally, this system is designed to be able to link to the integrated management system of Ministry of Public Safety and Security. It is concluded that the developed system can be useful to build a safety management network, minimize maintenance cost of structures, and prevention of the structural damage due to earthquake.

Improvement Measures for Enhancing Professional Safety Sheriff's Specialty (안전보안관 전문성 제고를 위한 개선방안)

  • Park, Jeong-Hun
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.175-196
    • /
    • 2019
  • The purpose of this study is to examine the role of safety sheriffs and their necessity in order to improve the activation of safety sheriff's professionalism. Seven security sheriffs were finally selected to discuss their activities and discuss ways to improve their effectiveness. We conducted semi - structured interviews and conducted in - depth interviews with limited data and inadequate prior research. The results of this study are as follows. First, the government should get the help of citizens, citizens and residents. If the state wishes to reduce the number of safety accidents and bring positive results to the public, it should not rely solely on the utilization of institutions. Second, in order to be a safe sheriff with a positive response from the local residents, the activities of the sheriff's sheriff are not only aimed at preventing risks in the environmental domain and reducing the number of accidents, Publicity should be provided to the landlord, tenant, and residents to inform them that the activity is preventive of accident prevention. Third, under the current law, it is necessary to disclose public facilities such as roads, airports, and harbors to the private sector in order to make it possible to monitor school facilities and youth training facilities. Fourth, the safety sheriff is expected to put forward the expectations and positive results of prevention through the beginning of the inspection activities, and the role of the Korean people in becoming psychological stable and efforts to be born as safety experts are required. Finally, it is necessary to establish a concrete manual, strategic safety inspection plan.

A Case Study of the Base Technology for the Smart Grid Security: Focusing on a Performance Improvement of the Basic Algorithm for the DDoS Attacks Detection Using CUDA

  • Huh, Jun-Ho;Seo, Kyungryong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.411-417
    • /
    • 2016
  • Since the development of Graphic Processing Unit (GPU) in 1999, the development speed of GPUs has become much faster than that of CPUs and currently, the computational power of GPUs exceeds CPUs dozens and hundreds times in terms of decimal calculations and costs much less. Owing to recent technological development of hardwares, general-purpose computing and utilization using GPUs are on the rise. Thus, in this paper, we have identified the elements to be considered for the Smart Grid Security. Focusing on a Performance Improvement of the Basic Algorithm for the Stateful Inspection to Detect DDoS Attacks using CUDA. In the program, we compared the search speeds of GPU against CPU while they search for the suffix trees. For the computation, the system constraints and specifications were made identical during the experiment. We were able to understand from the results of the experiment that the problem-solving capability improves when GPU is used. The other finding was that performance of the system had been enhanced when shared memory was used explicitly instead of a global memory as the volume of data became larger.

A Study on u-paperless and secure credit card delivery system development

  • Song, Yeongsim;Jang, Jinwook;jeong, Jongsik;Ahn, Taejoon;Joh, Joowan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.4
    • /
    • pp.83-90
    • /
    • 2017
  • In the past, when the credit card was delivered to the customer, the postal agreement and receipt were signed by customer. The repossessed documents were sent back to the card company through the reorganization process. The card company checks the error by scanning and keeps it in the document storage room. This process is inefficient in cost and personnel due to delivery time, document print out, document sorting, image scanning, inspection work, and storage. Also, the risk of personal data spill is very high in the process of providing personal information. The proposed system is a service that receives a postal agreement and a receipt to a recipient when signing a credit card, signing the mobile image instead of paper, and automatically sending it to the card company server. We have designed a system that can protect the cost of paper documents, complicated work procedures, delivery times and personal information. In this study, we developed 'u-paperless' and secure credit card delivery system applying electronic document and security system.

An Application of FSA Methodology to Hatchway Watertight Integrity of Bulk Carriers (살물선의 화물창 덮개부 수밀 건전성에 대한 공식안전평가의 적용)

  • Eun-Chang Lee;Jae-Ohk Lee;In-Cheol Yeo;Young-Soon Yang
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.37 no.3
    • /
    • pp.69-77
    • /
    • 2000
  • This study was a part of FSA study which was initiated by IMO and was applied to hatchway watertight integrity of bulk carriers. Hazards which were involved in high risk level were identified as follows. Ship Operation out of Design Criteria(Hatch Coaming Damage) and Poor Maintenance & Inspection(Securing Arrangement Damage). The potential risk was calculated by risk analysis and risk control option was made to reduce potential risk. The potential risk was about U$60,000/ship-year and could be reduced to about U$30,000/ship-year by applying RCO 1(Advanced system directly related to Hatchway Security). In addition, effectiveness of RCOs was shown by cost benefit assessment.

  • PDF

A Study on Guideline for the Digitalized R&D Information Security (전자화된 연구개발정보 보호를 위한 가이드 개발 연구)

  • Kyung, Tae-Won;Kim, Kyung-Hun;Song, Young-Jae
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.341-347
    • /
    • 2012
  • The study provides the direction for constructing and operating ELN(Electronic Laboratory Notebook) system for systematic record, management and reliability security of the document. Firstly, Present the standard of the system environment for writing and management of ELN. Secondly, Establish guidelines for systematic maintenance and operation of ELN system. Thirdly, Draw up guidelines of inspection whether ELN system is managed in according with the standards and procedures. Therefore, it is expected that these guidelines contribute to vitalize ELN and set foundation of application for researching and developing information in the medium and long term.