• Title/Summary/Keyword: security model

Search Result 3,984, Processing Time 0.028 seconds

Steep Slope Management System integrated with Realtime Monitoring Information into 3D Web GIS (상시계측센서정보와 3차원 Web GIS를 융합한 급경사지관리시스템)

  • Chung, Dong Ki;Sung, Jae Ryeol;Lee, Dong Wook;Chang, Ki Tae;Lee, Jin Duk
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.3
    • /
    • pp.9-17
    • /
    • 2013
  • Geospatial information data came recently in use to build the location-based service in various fields. These data were shown via a 2-D map in the past but now can be viewed as a 3-D map due to the dramatic evolution of IT technology, thus improving efficiency and raising practicality to a greater extent by providing a more realistic visualization of the field. In addition, many previous GIS applications have been provided under desktop environment, limiting access from remote sites and reducing its approachability for less experienced users. The latest trend offers service with web-based environment, providing efficient sharing of data to all users, both unknown and specific internal users. Therefore, real-time information sensors that have been installed on steep slopes are to be integrated with 3-D geospatial information in this study. It is also to be developed with web-based environment to improve usage and access. There are three steps taken to establish this system: firstly, a 3-D GIS database and 3-D terrain with higher resolution aerial photos and DEM (Digital Elevation Model) have been built; secondly, a system architecture was proposed to integrate real-time sensor information data with 3D Web-based GIS; thirdly, the system has been constructed for Gangwon Province as a test bed to verify the applicability.

Classification of Non-Signature Multimedia Data Fragment File Types With Byte Averaging Gray-Scale (바이트 평균의 Gray-Scale화를 통한 Signature가 존재하지 않는 멀티미디어 데이터 조각 파일 타입 분류 연구)

  • Yoon, Hyun-ho;Kim, Jae-heon;Cho, Hyun-soo;Won, Jong-eun;Kim, Gyeon-woo;Cho, Jae-hyeon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.189-196
    • /
    • 2020
  • In general, fragmented files without signatures and file meta-information are difficult to recover. Multimedia files, in particular, are highly fragmented and have high entropy, making it almost impossible to recover with signature-based carving at present. To solve this problem, research on fragmented files is underway, but research on multimedia files is lacking. This paper is a study that classifies the types of fragmented multimedia files without signature and file meta-information. Extracts the characteristic values of each file type through the frequency differences of specific byte values according to the file type, and presents a method of designing the corresponding Gray-Scale table and classifying the file types of a total of four multimedia types, JPG, PNG, H.264 and WAV, using the CNN (Convolutional Natural Networks) model. It is expected that this paper will promote the study of classification of fragmented file types without signature and file meta-information, thereby increasing the possibility of recovery of various files.

The Relationship between Bodyguard Leisure Types and Attitude toward Leisure (경호.경비요원의 여가 유형과 여가 태도의 관계)

  • Jung, Joo-Sub;Park, Jeong-Hun
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.101-123
    • /
    • 2012
  • The 5 day workweek has become widespread, and more recently, the 40 hour workweek is planned to be implemented to the Korean industry by the government by 2012. It is possible that in the future, we may begin to complain about too much leisure, rather than too much work. There is a need then, for types options in leisure activity, brought about by personal choices and interests. The use of leisure time is a very personal matter. It is deeply related to types with the quality of life. Bagozzi (1981) developed a model discerning among attitude, intention and activity, that attitude affects behavioral intention, and behavioral intention affects activity. So, as behavioral activity has a deep relationship to behavioral intention, participation intention according to leisure types leads to participation in leisure activity. Sports activity and hobby and cultural activity appear to have high participation and it seems that this is reflected in behavioral attitude. Among the types of leisure satisfaction, sport activity satisfaction is associated with a more positive attitude to leisure than other types. With respect to background variables for attitude toward leisure according to leisure satisfaction, the biggest differences in attitude toward leisure were associated with sports activity.

  • PDF

Feed Resources for Animals in Asia: Issues, Strategies for Use, Intensification and Integration for Increased Productivity

  • Devendra, C.;Leng, R.A.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.24 no.3
    • /
    • pp.303-321
    • /
    • 2011
  • The availability and efficient use of the feed resources in Asia are the primary drivers of performance to maximise productivity from animals. Feed security is fundamental to the management, extent of use, conservation and intensification for productivity enhancement. The awesome reality is that current supplies of animal proteins are inadequate to meet human requirements in the face of rapidly depleting resources: arable land, water, fossil fuels, nitrogenous and other fertilisers, and decreased supplies of cereal grains. The contribution of the ruminant sector lags well behind that of non-ruminant pigs and poultry. It is compelling therefore to shift priority for the development of ruminants (buffaloes, cattle, goats and sheep) in key agro-ecological zones (AEZs), making intensive use of the available biomass from the forage resources, crop residues, agro-industrial by-products (AIBP) and other non-conventional feed resources (NCFR). Definitions are given of successful and failed projects on feed resource use. These were used to analyse 12 case studies, which indicated the value of strong participatory efforts with farmers, empowerment, and the benefits from animals of productivity-enhancing technologies and integrated natural resource management (NRM). However, wider replication and scaling up were inadequate in project formulation, including systems methodologies that promoted technology adoption. There was overwhelming emphasis on component technology applications that were duplicated across countries, often wasteful, the results and relevance of which were not clear. Technology delivery via the traditional model of research-extension linkage was also inadequate, and needs to be expanded to participatory research-extension-farmer linkages to accelerate diffusion of technologies, wider adoption and impacts. Other major limitations concerned with feed resource use are failure to view this issue from a farming systems perspective, strong disciplinary bias, and poor links to real farm situations. It is suggested that improved efficiency in feed resource use and increased productivity from animals in the future needs to be cognisant of nine strategies. These include priorities for feed resource use; promoting intensive use of crop residues; intensification of integrated ruminant-oil palm systems and use of oil palm by-products; priority for urgent, wider technology application, adoption and scaling up; rigorous application of systems methodologies; development of adaptation and mitigation options for the effects of climate change on feed resources; strengthening research-extension-farmer linkages; development of year round feeding systems; and striving for sustainability of integrated farming systems. These strategies together form the challenges for the future.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

Analysis of Effects on Adoption of a Safety e-Reporting System (안전신고 제도(안전신문고) 도입에 따른 효과 분석)

  • Lee, Jun;Cho, Sangmyeong;Park, Eunmi;Lee, Sanghwa
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.4
    • /
    • pp.27-41
    • /
    • 2019
  • To analyze the effectiveness of the safety e-reporting system, the present study carried out analysis of safety e-reporting data reported between September 2014 and July 2019, and selected items for measuring the effectiveness of safety e-reporting. Using these items, the effects of adopting the reporting system for the four major parking violations was analyzed, alongside an analysis of effects in terms of traffic accidents using the unit model. When we count the securement of the tax revenue through measures such as charging fines as the beneficial factor per case, the estimation of the benefit is around 62,000 KRW per case. Summing the two factors up, the total value of citizen's reports pertaining to the big four parking violations is about 275,000 KRW per case. Most of the reports made through the Safety e-Report system are about traffic and facilities. When we calculate the total annual benefit with the representative reporting value defined with traffic and facilities, the system received a total of 1,164,439 cases from 2014 to 2019, while citizens reported 52,721 cases for the big four parking violations from April to July 2019. As the value of a safety report is around the net benefit for last five years is around 27,340,000,000 KRW.

A Study on the Finite Element Analysis and Management Criteria by Applying UPRS Method in the Subway Station (기존 지하철정거장 비개착공법 적용시 유한요소 해석과 관리기준에 관한 연구)

  • Cho, Byeong Joon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.4
    • /
    • pp.43-52
    • /
    • 2019
  • To analyze the influence on the stability, resulting from application of upgrade pipe roof structure (UPRS) method to the structure existed under subway Station, physical properties of a ground, elasticity and elasto-plastic theories, including displacement analysis of finite elements, stress analysis of finite elements, displacement caused by steel pipe propulsion and internal excavation, and stress change in a steel pipe, were introduced. Then, the influence on structural stability when applying the UPRS method was compared and reviewed based on the construction management standard of the Ministry Land, Infrastructure and Transport and foreign sources, using numerical analysis with a model which assumes that each microelement divided into a structurally stable point consists of the connection of finite points. As a result of the finite element analysis, 7.21 mm maximum displacement, 1/3,950 angular displacement, 70.28 MPa bending compressive stress of steel pipe structure constructed with UPRS (non-excavation) method and 477.38 MPa maximum shear strength were within their allowable standards (25.00 mm, 1/500, 210.00 MPa and 120.00 MPa, respectively), and therefore, the results showed that the design and construction are stable.

The Process Control Using Modeling Technique in A2O Sewage Treatment Process (모델링기법을 이용한 A2O 하수처리공정에서 주요 공정관리에 관한 연구)

  • Park, Jung Soo;Kim, Sung Duk;Seung, Dho Hyon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.2
    • /
    • pp.65-75
    • /
    • 2020
  • The efficiency of sewage treatment was ananlyzed selecting a sewage treatment plant in Gyeonggi-do where A2O process was applied. Statistical techniques based on the operation data of the sewage treatment were used. The main factors directly affecting the efficiency of the treatment process were analyzed using a GPS-X model. The correlation analysis and one-way ANOVA were performed. The T-N and NH4+-N values of the effluent did not generate statistically significant level (p-value:>0.05) when compared with C/N ration values. Removel of nitrogen components form sewage treatment plants were affected by temperature, HRT, SRT and DO. In the case of BOD, all operating factors were affected, while COD was affecte by factors of HRT, STR and DO. In simulations using GPS-X, the parameters that greatly influence was included the maximum sedimentation rate, the dependent nutrient microbial yield (anoxic), the phosphorus saturation coefficient, the dependent nutrient microbial killing rate, the dependent nutrient microbial maximum growth rate, and the independent trophic microorganisms. The maximum growth rate and the maximum setting rate were identified.

Efficiently Development Plan from the User's Need Analysis of the Army Tactical C4I(ATCIS) System (지상전술 C4I(ATCIS)체계 운용자 요구분석을 통한 효율적 발전 방안)

  • Park, Chang-Woon;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.5
    • /
    • pp.246-259
    • /
    • 2008
  • This study was to minimize the trial and error in the primary step of the C4I system(ATCIS) of the each army corps on the front line, and test the economy and efficiency was tested by reviewing related papers and the system characteristics of other countries. The relationship was researched by analyzing the collected survey data and survey data related to the user's requirement level such as the army standards, that is, commonality, timeliness, simplification, automaticity, field availability and viability, multi-stage security and interoperability, unification. The result showed that the C4I system was efficiently operated through the system reliability for the specification of the system and operation manual, maneuverability and security, adaptability of the war field and system support and management, and good education and training about system operation, and less system maintenance and supplementary element. As a result, the development plan confirmed that the continuous operator education and the construction of the maintenance, and the upgrade digitalization(C4ISR+D) with the korean characteristics based on IT of network systems, and system development of the measurement model of the operator performance must be continuously supplemented in the near future.

A Study on Policing Based on Crime Intelligence in UK (영국의 범죄정보 기반 경찰활동에 관한 연구)

  • Jang, Kwang-ho;Kim, Moon-kwi
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.101-125
    • /
    • 2018
  • In the police, crime intelligence is the basis of decision making for police's original activities in response to crime. Police decision making is done in various ways such as investigation and prevention of individual cases, allocation of resources, organization prioritization, etc. The purpose of this study was to investigate the activities of the UK policing in analyzing crime intelligence and to reflect them in the policing and to draw implications for the comparison with the Korean police. The UK operates a central police agency based on the local police system, and establishes a National Intelligence Model (NIM) system that operates crime intelligence throughout the country. In order to respond to crimes and risks through coordination and cooperation, rather than by centralized police activities, the intelligence department of the police agencies should not only prevent and suppress crime through the analysis of integrated crime information, but also make police decision-making. In contrast, the Korea police operate crime intelligence, such as statistics, case intelligence, and there is no integrated way to use it. In addition, there are few cases in which the organizational decision - making based on crime intelligence is utilized efficiently and systematically. For development, it is necessary to construct an integrated management system and analysis organization for crime intellgence. Criminal Intelligence Analysis Organizations should seek to reorganize the role of the current intelligence department or to operate a separate analysis system through the information system while maintaining the current role of each department.