• Title/Summary/Keyword: security technology

Search Result 6,757, Processing Time 0.036 seconds

Control of Rattus norvegicus on Uninhabitable Islands - Case of Sasudo Island - (무인도에서 집쥐 개체군의 포획과 제어 - 제주 사수도의 사례 -)

  • Jun-Won Lee;Ga-Ram Kim;Seon-Mi Park;Sung-Hwan Choi;Young-Hun Jung;Hong-Shik Oh
    • Korean Journal of Environment and Ecology
    • /
    • v.36 no.6
    • /
    • pp.575-581
    • /
    • 2022
  • Brown rats (Rattus norvegicusBerkenhout, 1769) were eradicated from Sasudo Island (33°55'13.04" N, 126°38'19.98" E), an uninhabited island designated as Natural Monument No. 333 and the largest breeding site for the streaked shearwater (Calonectris leucomelasTemminck, 1835) in South Korea. Twelve eradication studies were conducted from November 2015 to February 2021. The survey was conducted using a line census method that entailed slow wandering throughout the island and identifying starting and returning points. Capture traps were installed around traces of Rattus norvegicus,such as excrement and identified holes. As a result, 2 to 6 individuals were captured at each instance, except for the last time, when no individuals were captured. It is hypothesized that brown rats arrived at Sasudo Island via vessels arriving at the island for leisure and fishing. After the damage to streaked shearwater caused by brown rats was confirmed in 2006, entry to Sasudo Island was strictly prohibited through security measures, and marine clean-up programs that began in 2013 and continuous capturing since 2015 have been successful in eradicating brown rats. To maintain and manage the condition in Sasudo Island, preservation and management measures, such as strict visitor control, are necessary to prevent the inflow of new brown rats in the future.

From Radon and Thoron Measurements, Inhalation Dose Assessment to National Regulation and Radon Action Plan in Cameroon

  • Saidou;Shinji Tokonami;Masahiro Hosoda;Augustin Simo;Joseph Victor Hell;Olga German;Esmel Gislere Oscar Meless
    • Journal of Radiation Protection and Research
    • /
    • v.47 no.4
    • /
    • pp.237-245
    • /
    • 2022
  • Background: The current study reports measurements of activity concentrations of radon (220Rn) and thoron (220Rn) in dwellings, followed by inhalation dose assessment of the public, and then by the development of regulation and the national radon action plan (NRAP) in Cameroon. Materials and Methods: Radon, thoron, and thoron progeny measurements were carried out from 2014 to 2017 using radon-thoron discriminative detectors (commercially RADUET) in 450 dwellings and thoron progeny monitors in 350 dwellings. From 2019 to 2020, radon track detectors (commercially RADTRAK) were deployed in 1,400 dwellings. It was found that activity concentrations of radon range in 1,850 houses from 10 to 2,620 Bq/㎥ with a geometric mean of 76 Bq/㎥. Results and Discussion: Activity concentrations of thoron range from 20 to 700 Bq/㎥ with a geometric mean of 107 Bq/㎥. Thoron equilibrium factor ranges from 0.01 to 0.6, with an arithmetic mean of 0.09 that is higher than the default value of 0.02 given by UNSCEAR. On average, 49%, 9%, and 2% of all surveyed houses have radon concentrations above 100, 200, and 300 Bq/㎥, respectively. The average contribution of thoron to the inhalation dose due to radon and thoron exposure is about 40%. Thus, thoron cannot be neglected in dose assessment to avoid biased results in radio-epidemiological studies. Only radon was considered in the drafted regulation and in the NRAP adopted in October 2020. Reference levels of 300 Bq/㎥ and 1,000 Bq/㎥ were recommended for dwellings and workplaces. Conclusion: Priority actions for the coming years include the following: radon risk mapping, promotion of a protection policy against radon in buildings, integration of the radon prevention and mitigation into the training of construction specialists, mitigation of dwellings and workplaces with high radon levels, increased public awareness of the health risks associated with radon, and development of programs on the scientific and technical aspects.

An Analysis on Climate Change and Military Response Strategies (기후변화와 군 대응전략에 관한 연구)

  • Park Chan-Young;Kim Chang-Jun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.171-179
    • /
    • 2023
  • Due to man-made climate change, global abnormal weather phenomena have occurred, increasing disasters. Major developed countries(military) are preparing for disasters caused by extreme weather appearances. However, currently, disaster prevention plans and facilities have been implemented based on the frequency and intensity method based on statistical data, it is not enough to prepare for disasters caused by frequent extreme weather based on probability basis. The U.S. and British forces have been the fastest to take research and policy approaches related to climate change and the threat of disaster change, and are considering both climate change mitigation and adaptation. The South Korean military regards the perception of disasters to be storm and flood damage, and there is a lack of discussion on extreme weather and disasters due to climate change. In this study, the process of establishing disaster management systems in developed countries(the United States and the United Kingdom) was examined, and the response policies of each country(military) were analyzed using literature analysis techniques. In order to maintain tight security, our military should establish a response policy focusing on sustainability and resilience, and the following three policy approaches are needed. First, it is necessary to analyze the future operational environment of the Korean Peninsula in preparation for the environment that will change due to climate change. Second, it is necessary to discuss climate change 'adaptation policy' for sustainability. Third, it is necessary to prepare for future disasters that may occur due to climate change.

A Case Study on the Threat of Small Drone and the Development of Counter-Drone System (소형드론 위협 사례와 대드론체계 발전방향)

  • Kang-Il Seo;Ki-Won Kim;Jong-Hoon Kim;Sang-Keun Cho;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.327-332
    • /
    • 2023
  • On December 26, 2022, North Korea's drone provocation resumed for the first time in eight years. The threat covered not only the Seoul metropolitan area but also the no-fly zone for the presidential office's security, and the South Korean military's response to it is not appropriate, which is a major controversy. In the midst of this, problems caused by the prohibition of small drones' flight and illegal intrusion into restricted areas are increasing in Korea, and the threat is becoming a reality, such as being used for terrorist attacks abroad. In this paper, the concept of "Counter-Drone" and related technologies were considered for these drone threats, and implications were derived through domestic and overseas small drone threats, and the direction of development of the Counter-Drone system was presented. North Korea's drone threat is expected to be more diversified, massified, and advanced, resulting in bolder attacks and provocations. Therefore, the South Korean military should push for early powering of the integrated control system and the conter drone system, joint and military cooperation in response to the threat of small drones, and the ability to carry out joint operations between South Korea and the U.S.

Development of Predicting Function for Wind Wave Damage based on Disaster Statistics: Focused on East Sea and Jeju Island (재해통계기반 풍랑피해액예측함수 개발 : 동해안, 제주를 중심으로)

  • Choo, Tai-Ho;Kwon, Jae-Wook;Yun, Gwan-Seon;Yang, Da-Un;Kwak, Kil-Sin
    • Journal of the Korean Society for Environmental Technology
    • /
    • v.18 no.2
    • /
    • pp.165-172
    • /
    • 2017
  • In current stage, it is hard to predict the scale of damage caused by natural disaster and it is hard to deal with it. However, in case of disaster planning level, if it is possible to predict the scale of disaster then quick reaction can be done which will reduce the damage. In the present study, therefore, function of wind wave damage estimation among various disaster is developed. Damage of wind wave and typhoon in eastern and Jeju coastal zone was collected from disaster report (1991~2014) published by Ministry of Public Safety and Security and to reflect inflation rate, 2014 damage cost was converted. Also, wave height, wind speed, wave direction, wave period, etc was collected from Meteorological Administration and Korea Hydrographic and Oceanographic Administration web site. To reflect the characteristic of coastal zone when wave damage occurs, CODI(Coastal Disaster Index), COSI(Coastal Sensitivity Index), CPII(Coastal Potential Impact Index) published by Korea Hydrographic and Oceanographic Agency in 2015 were used. When damage occurs, function predicting wind wave damage was developed through weather condition, regional characteristic index and correlation of damage cost.

Latent Profile Analysis of Senior Lifestyle Profile: A stringent study of similarity and differences (시니어세대 라이프스타일 잠재프로파일 유형과 관광 행동 연구)

  • Seo In-seog;Kim Young-mi;Oh Hyun-sung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.899-910
    • /
    • 2023
  • The majority of research on lifestyle has been conducted based on a variable-centered approach. However, over the last decades, there is a growing body of research on lifestyle in terms of a person-centered approach. Hence, this study identifies senior generations' profiles based on the combination of the five realms of lifestyle. More specifically, this study utilized a Latent profile analysis(LPA) to explore both quantitatively and qualitatively distinct types of senior generation' lifestyle profiles. As a result, the five distinct types of senior lifestyle profiles were identified and these five profiles were then contrasted with traveling attitude and behavioral intention(traveling intention). In addition, this study attempted to identify similarity in the patterns of relations with theoretical antecedent, correlate and outcome variables. Results showed that even though senior generation belonging to profile groups pertaining to the high level of all five types of lifestyle were associated with a high level of attitude and behavior intention, there was no differences among the profiles. This means that regardless of the patterns of senor generation lifestyle profiles, there was no similarity. Nevertheless, it should be considered that senior generation consider a security when making a travel ling decision regardless of the patterns of lifestyle profiles. This results suggest that senior generation' traveling satisfaction is more likely obtained with the experience of safety and convenience during their travel. At last, this study discusses some implication tourism theory related to lifestyle, practices and future research on tourism profiles.

An improved technique for hiding confidential data in the LSB of image pixels using quadruple encryption techniques (4중 암호화 기법을 사용하여 기밀 데이터를 이미지 픽셀의 LSB에 은닉하는 개선된 기법)

  • Soo-Mok Jung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.17-24
    • /
    • 2024
  • In this paper, we propose a highly secure technique to hide confidential data in image pixels using a quadruple encryption techniques. In the proposed technique, the boundary surface where the image outline exists and the flat surface with little change in pixel values are investigated. At the boundary of the image, in order to preserve the characteristics of the boundary, one bit of confidential data that has been multiply encrypted is spatially encrypted again in the LSB of the pixel located at the boundary to hide the confidential data. At the boundary of an image, in order to preserve the characteristics of the boundary, one bit of confidential data that is multiplely encrypted is hidden in the LSB of the pixel located at the boundary by spatially encrypting it. In pixels that are not on the border of the image but on a flat surface with little change in pixel value, 2-bit confidential data that is multiply encrypted is hidden in the lower 2 bits of the pixel using location-based encryption and spatial encryption techniques. When applying the proposed technique to hide confidential data, the image quality of the stego-image is up to 49.64dB, and the amount of confidential data hidden increases by up to 92.2% compared to the existing LSB method. Without an encryption key, the encrypted confidential data hidden in the stego-image cannot be extracted, and even if extracted, it cannot be decrypted, so the security of the confidential data hidden in the stego-image is maintained very strongly. The proposed technique can be effectively used to hide copyright information in general commercial images such as webtoons that do not require the use of reversible data hiding techniques.

Analysis and implications of North Korea's new strategic drones 'Satbyol-4', 'Satbyol-9' (북한의 신형 전략 무인기 '샛별-4형', '샛별-9형' 분석과 시사점)

  • Kang-Il Seo;Jong-Hoon Kim;Man-Hee Won;Dong-Min Lee;Jae-Hyung Bae;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.167-172
    • /
    • 2024
  • In major wars of the 21st century, drones are expanding beyond surveillance and reconnaissance to include land and air as well as sea and underwater for purposes such as precision strikes, suicide attacks, and cognitive warfare. These drones will perform multi-domain operations, and to this end, they will continue to develop by improving the level of autonomy and strengthening scalability based on the High-Low Mix concept. Recently, drones have been used as a major means in major wars around the world, and there seems to be a good chance that they will evolve into game changers in the future. North Korea has also been making significant efforts to operate reconnaissance and attack drones for a long time. North Korea has recently continued to engage in provocations using drones, and its capabilities are gradually becoming more sophisticated. In addition, with the recent emergence of new strategic Drones, wartime and peacetime threats such as North Korea's use of these to secure surveillance, reconnaissance and early warning capabilities against South Korea and new types of provocations are expected to be strengthened. Through this study, we hope to provide implications by analyzing the capabilities of North Korea's strategic Drones, predicting their operation patterns, and conducting active follow-up research on the establishment of a comprehensive strategy, such as our military's drone deployment and counter-drone system solutions.

An Empirical Analysis of the Determinants of Defense Cost Sharing between Korea and the U.S. (한미 방위비 분담금 결정요인에 대한 실증분석)

  • Yonggi Min;Sunggyun Shin;Yongjoon Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.183-192
    • /
    • 2024
  • The purpose of this study is to empirically analyze the determining factors (economy, security, domestic politics, administration, and international politics) that affect the ROK-US defense cost sharing decision. Through this, we will gain a deeper understanding of the defense cost sharing decision process and improve the efficiency of defense cost sharing calculation and execution. The scope of the study is ROK-US defense cost sharing from 1991 to 2021. The data used in the empirical analysis were various secondary data such as Ministry of National Defense, government statistical data, SIPRI, and media reports. As an empirical analysis method, multiple regression analysis using time series was used and the data was analyzed using an autoregressive model. As a result of empirical research through multiple regression analysis, we derived the following results. It was analyzed that the size of Korea's economy, that is, GDP, the previous year's defense cost share, and the number of U.S. troops stationed in Korea had a positive influence on the decision on defense cost sharing. This indicates that Korea's economic growth is a major factor influencing the increase in defense cost sharing, and that the gradual increase in the budget and the negotiation method of the Special Agreement (SMA) for cost sharing of stationing US troops in Korea play an important role. On the other hand, the political tendencies of the ruling party, North Korea's military threats, and China's defense budget were found to have no statistically significant influence on the decision to share defense costs.

Application Strategies of Superintelligent AI in the Defense Sector: Emphasizing the Exploration of New Domains and Centralizing Combat Scenario Modeling (초거대 인공지능의 국방 분야 적용방안: 새로운 영역 발굴 및 전투시나리오 모델링을 중심으로)

  • PARK GUNWOO
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.19-24
    • /
    • 2024
  • The future military combat environment is rapidly expanding the role and importance of artificial intelligence (AI) in defense, aligning with the current trends of declining military populations and evolving dynamics. Particularly, in the civilian sector, AI development has surged into new domains based on foundation models, such as OpenAI's Chat-GPT, categorized as Super-Giant AI or Hyperscale AI. The U.S. Department of Defense has organized Task Force Lima under the Chief Digital and AI Office (CDAO) to conduct research on the application of Large Language Models (LLM) and generative AI. Advanced military nations like China and Israel are also actively researching the integration of Super-Giant AI into their military capabilities. Consequently, there is a growing need for research within our military regarding the potential applications and fields of application for Super-Giant AI in weapon systems. In this paper, we compare the characteristics and pros and cons of specialized AI and Super-Giant AI (Foundation Models) and explore new application areas for Super-Giant AI in weapon systems. Anticipating future application areas and potential challenges, this research aims to provide insights into effectively integrating Super-Giant Artificial Intelligence into defense operations. It is expected to contribute to the development of military capabilities, policy formulation, and international security strategies in the era of advanced artificial intelligence.