• Title/Summary/Keyword: 방화활동

Search Result 51, Processing Time 0.024 seconds

Development of Test Tool for Testing Packet Filtering Functions (패킷 필터링 기능 테스트를 위한 테스트 도구 개발)

  • Kim, Hyeon-Soo;Park, Young-Dae;Kuk, Seung-Hak
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.2
    • /
    • pp.86-99
    • /
    • 2007
  • Packet filtering is to filter out potentially malicious network packets. In order to test a packet filtering function we should verify whether security policies are performed correctly as intended. However there are few existing tools to test the function. Besides, they need user participation when generating test cases or deciding test results. Many security administrators have a burden to test systematically new security policies when they establish new policies or modify the existing ones. To mitigate the burdens we suggest a new test method with minimal user articipation. Our tool automates generation steps of the test cases and the test oracles, respectively. By using the test oracles generated automatically, deciding test results is possible without user intervention. Our method realizes an automatic testing in three phases; test preparation phase, test execution, and test evaluation. As a result it may enhance confidence of test activities more highly. This paper describes the design and implementation of our test method and tool.

Analyses of Hardware Architecture for High-speed VPN System (VPN 시스템 고속화를 위한 하드웨어 구조 분석)

  • 김정태;허창우;한종욱
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1471-1477
    • /
    • 2003
  • In order to realize the Gbps VPN system, however, newer and more advanced technologies are required to enable wire-rate processing across a wide range of functions and layers. While it is generally accepted that a software soluTion on general-purpose processors cannot scale to process these functionsa wire rate, the KEY POINT is that a software solution on general-purpose processors is the most practical way by which these security allocationscan be developed. Many of these security functions require application layer processing on the content of the packets, and the very nature of application layer software development is characterized by relatively large code size with a high need for portability an flexibility. We have analysed the consideration and specification for realizing Gbps VPN system. from this work. we can obtain a technology of originality.

Lifespan Elongation of Bombus terrestris and Economic Effect by Regular Pollen Supplement to Its Hives Released on Beefsteak-tomato Varieties (완숙토마토 품종별 서양뒤영벌(Bombus terrestris) 방사시 추가 화분공급에 의한 봉군수명 연장과 경제적 효과)

  • Lee, Sang-Beom;Park, In-Gyun;Park, In-Hui;Yoon, Hyung-Joo;Lee, Kyung-Yong;Jang, Sun-Joo;Chae, Young;Yong, Hae-Joong;Choi, Byeong-Rak
    • Korean journal of applied entomology
    • /
    • v.48 no.3
    • /
    • pp.393-401
    • /
    • 2009
  • About 50,000 hives of Bombus terrestris are used for pollination of tomato and other economical crops (fruit vegetables and fruit trees) in Korea. Therefore this study was conducted to find out the effective use of B. terrestris and its economic effect in the major beefsteak-tomato cultivation areas from February to August in 2008. The pollinating activities, rate of bite-mark and lifespan of B. terrestris's hive according to all beefsteak-tomato varieties (Super Momotaro, Zeus42, Mascara and Super Sunroad, 500 $m^2$, $9,600{\sim}12,000$plants) were apparent by regular supplement of pollen ($5{\sim}6g$/3 days) to the hive of B. terrestris. Especially, Super Momotaro and Super Sunroad variety were most distinctive in the effects by regular pollen supplement.

A Basic Study on the Evaluation Index of the Crime Prevention through Environmental Design of Wooden Cultural Buildings (목조 건축문화재의 범죄예방환경설계 평가지표에 대한 기초연구)

  • Kim, Choong-sik
    • Korean Journal of Heritage: History & Science
    • /
    • v.48 no.3
    • /
    • pp.4-29
    • /
    • 2015
  • To protect cultural heritages from damage and destruction, evaluating the crime prevention environments is considered extremely important. This study analyzed the crime patterns related to cultural heritages, classified the crime environments by their types, and deduced the elements of the CPTED(Crime Prevention Through Environment Design), aiming to present the indices for evaluating the crime prevention environments. The results of this study can be summarized as follows. First, the crimes related to cultural heritages that must be prevented were identified as the night time trespassing and arson. According to the results of the analysis of external environments based on crime actions, the crime prevention environments of cultural heritages were classified into 10 types. Second, the important evaluation principles of the cultural heritage CPTED were the access control, surveillance reinforcement and the surrounding environment. Third, the access control that cover the internal region, boundary, external region and surroundings were classified into 22 indices. The surveillance reinforcement covers natural, organized and mechanical surveillance with 21 indices. Fourth, the applicability of the CPTED evaluation index was presented according to the types of the cultural crime prevention environments. The results confirmed that the maximum 43 indices were applicable to the seowon(lecture hall), hyanggyo(Confucian school), and gwana(district government office), and the minimum 10 indices, to the ramparts. Finally, the 43 indices were applied to Donam Seowon to validate their applicability. The results confirmed that most of the indices were applicable with the partial supplements. The evaluation index presented in this study is likely to contribute to studies in the cultural heritage CPTED field and to the protection of cultural heritages. Furthermore, this study is considered significant because it unleashed continuous concerns on and developments of CPTED. However, as the field survey to validate the applicability of the indices was limited to only one type, it may require further objective verification such as through an expert's examination of the validity and applicability of the evaluation index. In addition, to accommodate the index in related policies and systems, more precise verifications of the indices by type are considered necessary.

Utilization of Bombus terrestris as a Sweet Cherry Pollinator in Rain-sheltered Growing (생식용 체리 비가림 재배시 서양뒤영벌(Bombus terrestris L.)의 화분매개 곤충 활용)

  • Kwack, Yong-Bum;Kim, Hong-Lim;Choi, Young Hah;Lee, Jae Han
    • Journal of Bio-Environment Control
    • /
    • v.21 no.3
    • /
    • pp.294-298
    • /
    • 2012
  • In sweet cherry (Prunus avium L.) growing there are several severe problem which have to be overcome to produce highly graded fruits because of fruit rots and fruit crackings, if there is frequent precipitation during immature fruit step and picking season. In order to reduce fungicide sprayings and produce qualified fruits in areas with rainy season like as South Korea, rain-sheltered growing is necessary absolutely. Sweet cherry blooms early to medium April in southern area of South Korea. If we depend on honeybees (Apis mellifera) distributed in natural ecosystem, it is not easy to get normal fruit-set every season because of low temperature around blooming time. And also bee keepers seldom sell honeybee hives as a pollinator during spring, instead they keep honeybee hives to get honey. Recently use of B. terrestris as a pollinator of cherry tomato, oriental pumpkin etc. grown in protected cultivation system increase abundantly. Therefore, in this study we studied B. terrestris as an alternate of honeybee to pollinate sweet cherry grown in rain shelter. In part of foraging activity B. terrestris shows staying on a cherry flower for about six second and visiting frequency of 11 flowers per minute. However A. mellifera stayed about 15 second on a flower and visited 4~5 flowers per minute. There were no significant difference in fruit-setting rate and fruit characteristics after using B. terrestris and A. mellifera as pollinators of sweet cherry. Consequently there is no negative effect when we use B. terrestris as an alternate pollinator of A. mellifera in sweet cherry cultivation under rain shelter.

Neural Substrates of Picture Encoding: An fMRI Study (그림의 부호화 과정과 신경기제 : fMRI 연구)

  • 강은주;김희정;김성일;나동규;이경민;나덕렬;이정모
    • Korean Journal of Cognitive Science
    • /
    • v.13 no.1
    • /
    • pp.23-40
    • /
    • 2002
  • This study is to examine brain regions that are involved in picture encoding in normal adults using fMRI methods. In Scan 1, the picture encoding was studied during a semantic categorization task in comparison with word. In Scan 2 task type effects were studied both during a picture naming task and during a semantic categorization task with pictures. Subjects were asked to make decision either by pressing a mouse button (Scan 1) or by responding subvocally (naming or saying yes/no) (Scan 2). Regardless of stimulus type, left prefrontal, bilateral occipital, and parietal activations were observed during semantic processing in comparison with fixation baseline. Processing of word stimulus relative to picture resulted in activations in prefrontal and parieto-temporal regions in the left side while that of picture stimulus relative to word resultd in activations in bilateral extrastriatal visual cortices and parahippocampal regions. In spite of the same task demands, stimulus-specific information processings were involved and mediated by different neural substrates; the word encoding was associated with more semantic/lexical processings than pictures and the picture processing associated with more perceptual and novelty related information processings than word. Activations of dorsal part of inferior prefrontal region, i.e., Broca's areas were found both during the picture naming and during the semantic tasks subvocally performed Especially, during the picture naming task, greater occipital activations were found bilaterally relative to the semantic categorization task. indicating a possibility that greater and higher visual processing was involved in retrieving the name referred by picture stimuli.

  • PDF

Security of Ethernet in Automotive Electric/Electronic Architectures (차량 전자/전기 아키텍쳐에 이더넷 적용을 위한 보안 기술에 대한 연구)

  • Lee, Ho-Yong;Lee, Dong-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.39-48
    • /
    • 2016
  • One of the major trends of automotive networking architecture is the introduction of automotive Ethernet. Ethernet is already used in single automotive applications (e.g. to connect high-data-rate sources as video cameras), it is expected that the ongoing standardization at IEEE (IEEE802.3bw - 100BASE-T1, respectively IEEE P802.3bp - 1000BASE-T1) will lead to a much broader adoption in future. Those applications will not be limited to simple point-to-point connections, but may affect Electric/Electronic(EE) Architectures as a whole. It is agreed that IP based traffic via Ethernet could be secured by application of well-established IP security protocols (e.g., IPSec, TLS) combined with additional components like, e.g., automotive firewall or IDS. In the case of safety and real-time related applications on resource constraint devices, the IP based communication is not the favorite option to be used with complicated and performance demanding TLS or IPSec. Those applications will be foreseeable incorporate Layer-2 based communication protocols as, e.g., currently standardized at IEEE[13]. The present paper reflects the state-of-the-art communication concepts with respect to security and identifies architectural challenges and potential solutions for future Ethernet Switch-based EE-Architectures. It also gives an overview and provide insights into the ongoing security relevant standardization activities concerning automotive Ethernet. Furthermore, the properties of non-automotive Ethernet security mechanisms as, e.g., IEEE 802.1AE aka. MACsec or 802.1X Port-based Network Access Control, will be evaluated and the applicability for automotive applications will be assessed.

A Study on Emergency Evacuation Route Planning and USN-Based Induction Activities of Correctional Facilities (교정시설의 비상시 피난경로계획 및 USN기반 대피유도활동에 관한 연구)

  • Park, Joo-Hyung;Park, Jong-Hyun
    • Fire Science and Engineering
    • /
    • v.25 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • In correctional facilities with majority of occupants in custody, the safe evacuation guide without getaway accidents should be very important due to complexity in escape paths. Fire causes are various in correctional facilities, for example, arson fire is a major cause in mental treatment facilities, however, old facilities or carelessness of flammable materials consist of fire causes in jail facilities. Both types of correctional facilities are the same in terms of many casualties from the fire cases. The thesis focus on escape paths and evacuation guide plans on the basis of analysis on fire cases and structural vulnerability, and then an electronic unlocking system is concededly installed for safe evacuation of occupants in custody without getaway accidents. Especially, the effect of the electronic unlocking system is going to be analyzed on the basis of RSET (required safe egress time) in order to realize for the occupants to evacuate safely to the front yard in case of emergency. In conclusion, if electronic security allowed system with USN (Ubiquitous Sensor Networks) technology should be installed in multi-storey correctional buildings, it is proposed that the occupants in custody might be a guided safely without getaway trials.

The Evaluation of UWB Wireless Communication Position Determination Function in an Enclosed Space for Fire Fighting (소방활동을 위한 밀폐공간 무선통신 측위성능 평가)

  • Kim, Dong-Hyun;Kim, Chung-Il
    • Fire Science and Engineering
    • /
    • v.31 no.5
    • /
    • pp.117-122
    • /
    • 2017
  • The absence of fire fighters' connection to communication can bring about increased loss of life due to errors and delays in rescue and actions and danger to their own safety. Therefore, when communication infrastructure has been destroyed in an enclosed space, it is necessary to set up an emergency wire or wireless telecommunication environment to fire fighting and to secure safer environment to deal with the disaster by checking the location of fire fighters. In this research, for the establishment communication environment in an enclosed inside using Ultra-Wide Band (UWB) wireless communication network, the performance of communication position determination of a single UWB communication module was evaluated regarding 6 kinds of indoor surroundings. When the communication distance in an indoor environment of each 6 channels bandwidth of UWB communication frequency was measured, the results were as follows: the open space (Ave. 15.5 m, Max. 20 m), the corridor (Ave. 17.33 m, Max 20 m), inside retaining home furnishings (Ave. 15.3 m, Max. 20 m), vertical stairs (Ave. 4.33 m, Max. 6 m), horizontal space with a closed fire door (Ave. 6.5 m, Max. 17 m). It was also found out that the communication function and the distance function were best in the frequency range from 6489.6 to 1081.6 MHz by 7 Ch. Accordingly, the establishment of communication environment in an enclosed space is judged to be possible when UWB communication module is set up at 20 m apart and multiple channels are used.

The Improvement Measures for the Establishment of Emergency Management System in Private Security (위험사회의 전개에 따른 민간경비 산업의 대응과제 - 위기관리를 중심으로)

  • Park, Dong-Kyun
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.103-125
    • /
    • 2005
  • Hazard are defined here as threat to life, well-being, material goods and environmental from the extremes of natural processes or technology. The challenges of natural and technology in increasing the exposure of people and property to risk pose a dilemma for any government seeking the fullest protection for its people and their property. As society progresses and as technology improves and becomes ever more intricate and far reaching, the human species is confronted with increasingly diverse and numerous catastrophic events. Not so infrequently, unfortunately, the impact of either a man-made or natural disaster is compounded by the fact that policy makers have neither prepared themselves or the public to respond appropriately to a disaster once the tragedy has struck. Many concerns have been raised for importance of emergency management after 1990's numerous urban disasters in Korea. Emergency management is the discipline and profession of applying science, technology, planning, and management to deal with extreme events that can injure or kill large numbers of people, cause extensive damage to property, and disrupt community life. When the primary function of private security is to protect lives and property of clients, emergency management should be included in the security service and many countermeasures should be carried out for that purpose. The purpose of this study is to establish ways and means needed to improve the private security emergency management system in Korea. This study is spilt into four chapters. Chapter I is the introduction part. Chapter II introduces the reader to a private security and emergency management theory, and Chapter III deals with the establishment of an effective emergency management system in Korea private security, Chapter IV is a conclusion. Policy makers and private security industry employers in Korea has not concerned with the importance of training and education by lack of recognition and has been passive about qualified guards. And the authorities supervising and the administrating the guards has not recognized the importance of private security and has neglected the training of the guards. In theses contexts, private security should develop and maintain a educational program of emergency management to meet their responsibilities to provide the protection and safety of the clients. Today's modern corporate security director, is, first of all, a competent, well-rounded business executive and, second, a 'service expert'. And, emergency management personnel in private security industry need continuous training.

  • PDF