• Title/Summary/Keyword: system security

Search Result 9,746, Processing Time 0.034 seconds

A Study on the Risk Analysis and Fail-safe Verification of Autonomous Vehicles Using V2X Based on Intersection Scenarios (교차로 시나리오 기반 V2X를 활용한 자율주행차량의 위험성 분석 및 고장안전성 검증 연구)

  • Baek, Yunseok;Shin, Seong-Geun;Park, Jong-ki;Lee, Hyuck-Kee;Eom, Sung-wook;Cho, Seong-woo;Shin, Jae-kon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.6
    • /
    • pp.299-312
    • /
    • 2021
  • Autonomous vehicles using V2X can drive safely information on areas outside the sensor coverage of autonomous vehicles conventional autonomous vehicles. As V2X technology has emerged as a key component of autonomous vehicles, research on V2X security is actively underway research on risk analysis due to failure of V2X communication is insufficient. In this paper, the service scenario and function of autonomous driving system V2X were derived by presenting the intersection scenario of the autonomous vehicle, the malfunction was defined by analyzing the hazard of V2X. he ISO26262 Part3 process was used to analyze the risk of malfunction of autonomous vehicle V2X. In addition, a fault injection scenario was presented to verify the fail-safe of the simulation-based intersection scenario.

An Analysis on Limited Warfare through the Falkland Islands Dispute (포클랜드제도 분쟁을 통한 제한전 분석)

  • Yang, Seong-sil;Lee, Hee-wan;Shin, Jin
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.211-235
    • /
    • 2021
  • As a result of the Falkland Islands War from April 2 to June 14, 1982, Britain overcame severe economic depression and reclaimed the glory of the former British Empire by winning the war. On the other hand, Argentina was greatly affected by the collapse of a military dictatorship and the birth of a democratic government. This study suggests strategies for responding to maritime disputes that may occur in Dokdo Island in the future by applying "DIME on PMESII" to the Falkland Islands dispute. In particular, the study analyzes how DIME (diplomacy, information, military, and economy) capabilities have an effect as a means of the total national power of a country that effectively controls the disputed territory. Based on the results of this study, the response strategies related to the Dokdo maritime dispute are as follows. First, effective control over the disputed territory should be effectively maintained and strengthened like in Britain. This strategy inspires patriotism, supports the government during warfare, secures a just cause for war, and gains international support. Second, 'DIME on PMESII' was effective in modern warfare by focusing our DIME capabilities on the weaknesses of the other country's PMESII system. That is, wars are not won simply by the conflict of armed forces but by a nation's overall national strength, such as diplomatic, information, and economic capabilities. Third, appropriate strategies for neighboring countries are needed to overcome the possibility of limited warfare in the sea through preparations for Dokdo maritime disputes in the future.

  • PDF

The Norwegian Forces' Gender Neutral Draft and Its Implication on the ROK Forces (노르웨이 성 중립 징병제와 한국군에 주는 시사점)

  • Cho, Sang Keun;Kim, In Chan;Hong, Myung Sook;Yu, Sun Young;Jeon, So Min;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.197-202
    • /
    • 2022
  • Gender neutral draft is the system that the level of manpower which military demands right now can be kept and the concept of gender equality can enlarge itself. This thesis draws implications on the necessity of optional review of draft and the amelioration of military organizational culture for the military through the example of Norway that has adopted gender neutral draft initially in Europe. The Military that is characterized by traditionally male led domain accelerates itself the openness to female by the aggrandizement of social participation and the improvement of human right for female. The various concerns about a necessary facilities, the period ofmilitary service, the level of salary, the keeping of combat power, etc just should be overcome in order to enlarge conscription to female in Korea. Situations such as the environment of national security, the level of social participation to female, the treatment to minority are different, so it is difficult for us to draw any conclusion whether the adoption of sex neutral conscription is right or not. Nonetheless, the national strategy that prepares for future may not be concluded easily and we can not stop it even though it is discomfortable truth. In Conclusion, we anticipate that the sound discourse on measures of including female in draft will be continued from the start with this thesis.

Counting and Localizing Occupants using IR-UWB Radar and Machine Learning

  • Ji, Geonwoo;Lee, Changwon;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • Localization systems can be used with various circumstances like measuring population movement and rescue technology, even in security technology (like infiltration detection system). Vision sensors such as camera often used for localization is susceptible with light and temperature, and can cause invasion of privacy. In this paper, we used ultra-wideband radar technology (which is not limited by aforementioned problems) and machine learning techniques to measure the number and location of occupants in other indoor spaces behind the wall. We used four different algorithms and compared their results, including extremely randomized tree for four different situations; detect the number of occupants in a classroom, split the classroom into 28 locations and check the position of occupant, select one out of the 28 locations, divide it into 16 fine-grained locations, and check the position of occupant, and checking the positions of two occupants (existing in different locations). Overall, four algorithms showed good results and we verified that detecting the number and location of occupants are possible with high accuracy using machine learning. Also we have considered the possibility of service expansion using the oneM2M standard platform and expect to develop more service and products if this technology is used in various fields.

Trend Forecasting and Analysis of Quantum Computer Technology (양자 컴퓨터 기술 트렌드 예측과 분석)

  • Cha, Eunju;Chang, Byeong-Yun
    • Journal of the Korea Society for Simulation
    • /
    • v.31 no.3
    • /
    • pp.35-44
    • /
    • 2022
  • In this study, we analyze and forecast quantum computer technology trends. Previous research has been mainly focused on application fields centered on technology for quantum computer technology trends analysis. Therefore, this paper analyzes important quantum computer technologies and performs future signal detection and prediction, for a more market driven technical analysis and prediction. As analyzing words used in news articles to identify rapidly changing market changes and public interest. This paper extends conference presentation of Cha & Chang (2022). The research is conducted by collecting domestic news articles from 2019 to 2021. First, we organize the main keywords through text mining. Next, we explore future quantum computer technologies through analysis of Term Frequency - Inverse Document Frequency(TF-IDF), Key Issue Map(KIM), and Key Emergence Map (KEM). Finally, the relationship between future technologies and supply and demand is identified through random forests, decision trees, and correlation analysis. As results of the study, the interest in artificial intelligence was the highest in frequency analysis, keyword diffusion and visibility analysis. In terms of cyber-security, the rate of mention in news articles is getting overwhelmingly higher than that of other technologies. Quantum communication, resistant cryptography, and augmented reality also showed a high rate of increase in interest. These results show that the expectation is high for applying trend technology in the market. The results of this study can be applied to identifying areas of interest in the quantum computer market and establishing a response system related to technology investment.

A Study on the Tottori Prefectural Archives, Japan (일본 돗토리현 아카이브 연구)

  • Yi, Kyoung Yong
    • The Korean Journal of Archival Studies
    • /
    • no.69
    • /
    • pp.129-152
    • /
    • 2021
  • With the enactment and enforcement of the 「Public Records and Archives Act」, the Tottori Prefectural Archives newly enacted the "Records Management Ordinance" through a comprehensive review of the previous archive function. In accordance with this ordinance, which came into effect in April 2012, Tottori Prefecture expanded the records management institutions (Public Security Committee and Police Headquarters, etc.) A series of archive systems were improved, such as the expansion and reinforcement of the authority to appraisal and select. In addition, the Tottori Prefectural Archives went further and implemented the "Ordinance on the Preservation of Historical Documents, etc." from April 2017. Through this, the municipalities unit basic local government's record management support work was set as a unique function of the local archive, and a linkage and cooperation system was established for the preservation of private records of the prefecture area as well as the basic local area together with cultural heritage institutions such as museums and libraries. As a reference case that continuously guarantees the performance of various activities based on the mission and vision of the local archives in Korea that aim for 'autonomy of records' on the poor archival culture soil, it is worth paying attention to the case of continuous record management reform of the Tottori Prefectural Archives through the enactment of the original role and function of the archive.

Decision Making of Seismic Performance Management for the Aged Road Facilities Based on Road-Network and Fragility Curve (취약도곡선을 이용한 도로망기반 노후도로시설물 내진성능관리 의사결정)

  • Kim, Dong-Joo;Choi, Ji-Hae
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.5
    • /
    • pp.94-101
    • /
    • 2021
  • According to the Facility Management System (FMS) operated by the Korea Authority of Land & Infrastructure Safety, it is expected that the number of aging facilities that have been in use for more than 30 years will increase rapidly to 13.9% in 2019 and 34.5% in 2929, and end up with a social problem. In addition, with the revision of "Common Application of Seismic Design Criteria" by the Ministry of Public Administration and Security in 2017, it is mandatory to re-evaluate all existing road facilities and if necessary seismic reinforcement should be done to minimize the magnitude of earthquake damage and perform normal road functions. The seismic performance management-decision support technology currently used in seismic performance management practice in Korea only determines the earthquake-resistance reinforcement priority based on the qualitative index value for the seismic performance of individual facilities. However with this practice, normal traffic functions cannot be guaranteed. A new seismic performance management decision support technology that can provide various judgment data required for decision making is needed to overcome these shortcomings and better perform seismic performance management from a road network perspective.

A Ship-Wake Joint Detection Using Sentinel-2 Imagery

  • Woojin, Jeon;Donghyun, Jin;Noh-hun, Seong;Daeseong, Jung;Suyoung, Sim;Jongho, Woo;Yugyeong, Byeon;Nayeon, Kim;Kyung-Soo, Han
    • Korean Journal of Remote Sensing
    • /
    • v.39 no.1
    • /
    • pp.77-86
    • /
    • 2023
  • Ship detection is widely used in areas such as maritime security, maritime traffic, fisheries management, illegal fishing, and border control, and ship detection is important for rapid response and damage minimization as ship accident rates increase due to recent increases in international maritime traffic. Currently, according to a number of global and national regulations, ships must be equipped with automatic identification system (AIS), which provide information such as the location and speed of the ship periodically at regular intervals. However, most small vessels (less than 300 tons) are not obligated to install the transponder and may not be transmitted intentionally or accidentally. There is even a case of misuse of the ship'slocation information. Therefore, in this study, ship detection was performed using high-resolution optical satellite images that can periodically remotely detect a wide range and detectsmallships. However, optical images can cause false-alarm due to noise on the surface of the sea, such as waves, or factors indicating ship-like brightness, such as clouds and wakes. So, it is important to remove these factors to improve the accuracy of ship detection. In this study, false alarm wasreduced, and the accuracy ofship detection wasimproved by removing wake.As a ship detection method, ship detection was performed using machine learning-based random forest (RF), and convolutional neural network (CNN) techniquesthat have been widely used in object detection fieldsrecently, and ship detection results by the model were compared and analyzed. In addition, in this study, the results of RF and CNN were combined to improve the phenomenon of ship disconnection and the phenomenon of small detection. The ship detection results of thisstudy are significant in that they improved the limitations of each model while maintaining accuracy. In addition, if satellite images with improved spatial resolution are utilized in the future, it is expected that ship and wake simultaneous detection with higher accuracy will be performed.

A Study on Unauthorized Anchoring of Foreign-flag Vessels in Internal Waters and Territorial Sea (외국선박의 내수 및 영해 무단정박에 관한 연구)

  • Lim, Chae-Hyun;Lee, Chang-Hee;Jeong, Dae-Deuk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.2
    • /
    • pp.280-289
    • /
    • 2022
  • Internal Waters refer to the waters located at the landward side of a baseline and is completely under the sovereignty of a coastal state. However, the right of innocent passage of foreign-flag vessels is recognized in internal waters that are newly incorporated by establishing a straight baseline. Korea has a massive Internal Waters on its south-western coast where the straight baseline is adopted and has a wide Internal Waters that allows innocent passage. A foreign-flag vessel navigating the internal waters must be properly managed according to the interest of the coastal states such as the fishing·safety·security·environment around the Korean coast. Additionally, Territorial Sea comes under the sovereignty of a coastal state and it is a very important sea area for managing the interests of the coastal states. However, several collision accidents involving illegally anchored or drifted foreign-flag vessels have been occurring recently in the Korean Internal Waters and Territorial Sea, and such accidents are a threat to its interests. Thus, this paper analyzes the cases of collision of foreign-flag vessels that anchored or drifted without authorization, and examines domestic·international laws on the passage of foreign-flag vessel through Internal Waters and Territorial Waters. Finally, this paper suggests that unauthorized anchoring of foreign-flag vessels in Korean Internal Waters and Territorial Water violates the requirements for innocent passage and this violation is punishable according to related Acts; a desirable improvement plan for the legal system of passage through Internal Waters and Territorial Waters.

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.