• Title/Summary/Keyword: 안전 관리 네트워크 시스템

Search Result 364, Processing Time 0.028 seconds

Design and Implementation of a Transparent Security Infrastructure using Filter and Transformer (필터와 트랜스포머를 이용한 투명한 보안기반의 설계 및 구현)

  • Kim, Yong-Min;Lee, Do-Heon;Noh, Bong-Nam;Choi, Rak-Man;Ine, So-Ran
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.975-983
    • /
    • 1998
  • In these days, information communication systems are based on both open distributed computing technologies and object-oriented techniques like inheritance, encapsulation and object reuse to support various system configuration and application. As information systems are interconnected through unsecure networks, the need for the secure information exchange is more critical than before. In this paper, we have designed and implemented a transparent CORBA-basce Security infrastructure with authentication, security context association, access control and security information management to support a secure applications in distributed object environment. SESAME Ver. 4 was adopted as an external security service to manage user privilege attributes and to distribute keys for data encryption, decryption and integrity. Using filter and transformer with an interface to Object Request Broker, it provides a transparent security service to applications. The filter objects are special classes that allow additional parameters to be inserted into messages before they are sent and removed just after they are received. The transformer objects are special classes that allow direct access to the byte stream of every messages for encryption and decryption before it is sent and just after it is received. This study is to implement the access control interceptor(ACI) and the secure invocation interceptor(SII) of secure ORB defined in CORBA using filter and transformer.

  • PDF

The Road Reservation Scheme in Emergency Situation for Intelligent Transportation Systems (지능형 교통 시스템을 위한 긴급 상황에서의 도로 예약 방식)

  • Yoo, Jae-Bong;Park, Chan-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1346-1356
    • /
    • 2011
  • Transportation has been playing important role in our society by providing for people, freight, and information. However, it cuts its own throat by causing car accidents, traffic congestion, and air pollution. The main cause of these problems is a noticeable growth in the number of vehicles. The easiest way to mitigate these problems is to build new road infrastructures unless resources such as time, money, and space are limited. Therefore, there is a need to manage the existing road infrastructures effectively and safely. In this paper, we propose a road reservation scheme that provides fast and safe response for emergency vehicles using ubiquitous sensor network. Our idea is to allow emergency vehicle to reserve a road on a freeway for arriving to the scene of the accident quickly and safely. We evaluate the performance by three reservation method (No, Hop, and Full) to show that emergency vehicles such as ambulances, fire trucks, or police cars can rapidly and safely reach their destination. Simulation results show that the average speed of road reservation is about 1.09 ~ 1.20 times faster than that of non-reservation at various flow rates. However, road reservation should consider the speed of the emergency vehicle and the road density of the emergency vehicle processing direction, as a result of Hop Reservation and Full Reservation performance comparison analysis. We confirm that road reservation can guarantee safe driving of emergency vehicles without reducing their speed and help to mitigate traffic congestion.

Estimation of irrigation return flow from paddy fields on agricultural watersheds (농업유역의 논 관개 회귀수량 추정)

  • Kim, Ha-Young;Nam, Won-Ho;Mun, Young-Sik;An, Hyun-Uk;Kim, Jonggun;Shin, Yongchul;Do, Jong-Won;Lee, Kwang-Ya
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.1
    • /
    • pp.1-10
    • /
    • 2022
  • Irrigation water supplied to the paddy field is consumed in the amount of evapotranspiration, underground infiltration, and natural and artificial drainage from the paddy field. Irrigation return flow is defined as the excess of irrigation water that is not consumed by evapotranspiration and crop, and which returns to an aquifer by infiltration or drainage. The research on estimating the return flow play an important part in water circulation management of agricultural watershed. However, the return flow rate calculations are needs because the result of calculating return flow is different depending on irrigation channel water loss, analysis methods, and local characteristics. In this study, the irrigation return flow rate of agricultural watershed was estimated using the monitoring and SWMM (Storm Water Management Model) modeling from 2017 to 2020 for the Heungeop reservoir located in Wonju, Gangwon-do. SWMM modeling was performed by weather data and observation data, water of supply and drainage were estimated as the result of SWMM model analysis. The applicability of the SWMM model was verified using RMSE and R-square values. The result of analysis from 2017 to 2020, the average annual quick return flow rate was 53.1%. Based on these results, the analysis of water circulation characteristics can perform, it can be provided as basic data for integrated water management.

A Study on the Analysis of Marine Accidents on Fishing Ships Using Accident Cause Data (사고 데이터의 주요 원인을 이용한 어선 해양사고 분석에 관한 연구)

  • Sang-A Park;Deuk-Jin Park
    • Journal of Navigation and Port Research
    • /
    • v.47 no.1
    • /
    • pp.1-9
    • /
    • 2023
  • Many studies have analyzed marine accidents, and since marine accident information is updated every year, it is necessary to periodically analyze and identify the causes. The purpose of this study was to prevent accidents by identifying and analyzing the causes of marine accidents using previous and new data. In marine accident data, 1,921 decisions by the Korea Maritime Safety Tribunal on marine accidents on fishing ships over 16 years were collected in consideration of the specificity of fishing ships, and 1,917 cases of accident notification text history by the Ministry of Maritime Affairs and Fisheries over 3 years were collected. The decision data and text data were classified according to variables and quantified. Prior probability was calculated using a Bayesian network using the quantified data, and fishing ship marine accidents were predicted using backward propagation. Among the two collected datasets, the decision data did not provide the types of fishing ships and fishing areas, and because not all fishing ship accidents were included in the decision data, the text data were selected. The probability of a fishing ship marine accident in which engine damage would occur in the West Sea was 0.0000031%, as calculated by backward propagation. The expected effect of this study is that it is possible to analyze marine accidents suitable for the characteristics of actual fishing ships using new accident notification text data to analyze fishing ship marine accidents. In the future, we plan to conduct research on the causal relationship between variables that affect fishing ship marine accidents.

A Study on Inspection Status of Port State Control and Improvement Measures in Korea (우리나라 항만국통제 점검 실태와 문제점 개선에 관한 연구)

  • Kim, Sun-Tai;Gang, Sang-Geun;Jeong, Jae-Yong;Kim, Deug-Bong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.6
    • /
    • pp.671-676
    • /
    • 2014
  • Based on the data of PSC information management system of MOF(Ministry of oceans and fisheries) and APCIS(Asia-Pacific Computerized Information System) of Tokyo-MOU information system, the result of the evaluation on the reality of PSC was done, and base on 2009, it showed a trend of decrease in every DFR(Deficiency Rate) and DTR(Detention Rate). But for vessels built for more than 30 years, flags of convenience vessels, RO-RO ferry and general cargo vessel, small size vessels with gross tonnage less than 1,000 ton showed a high DFR and DTR. Each harbours is classified by the total harbours' average DFR which was 82.5 % and the average DTR was 5.1 %, excluding the Jeju harbour, showing a hugh deviation for classification of each harbour. Classification of each harbour has to be inspected by PSC and it showed a great unbalance of the number of vessels for each territory for inspection. the biggest problem with our country's PSC, where it was pointed out by the PSCO was lack of workers and independent inspection by just one worker. To strength the substantiality of the inspection of our country is to have concentrated inspection on the high risk cautious vessels, forming a human network each classified by four different sectors of the area, recalculating the amount of assignment of inspection classified by each harbour and securing workforce the PSCO improvements are necessary.

Study on the establishment of an efficient disaster emergency communication system focused on the site (현장중심의 효율적 재난통신체계 수립 방안 연구)

  • Kim, Yongsoo;Kim, Dongyeon
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.4
    • /
    • pp.518-527
    • /
    • 2014
  • Our society is changed and diversified rapidly and such tendency is accelerated day after day and has made a lot of problems in the many fields. The important thing we have to recognize is such tendency has a bad effect recently on the safety system in Korea. So it is time to enhance the national safety system and moreover recently Sewol-ho(passenger ship) went down in the sea, it made people remind the importance of national safety system. With this incident, Korean government decided to establish the national safety communication network against the disaster. At this time, I will propose several ideas about the national safety communication network. 1. It must to be established an unified network to contact people who is on a disaster site anytime and anywhere. This is most important element on all disaster sites. 2. PS-LTE technology must to be adopted to the network because it has many advantages including various multimedia services compared to the TETRA in the past. 3. 700MHz is the most efficient band for the network because it has wide cell sites coverage compared to 1.8GHz. 4. Satellite communication system is needed to the network for back-up. 5. It will be effective to adopt Social Media to the communication network system like a Twitter or Facebook for sharing many kinds of information and notifying people of warning message. 6. It can make the network more useful to introduce the latest technology like a sensor network. And Korean government has to improve the system related to the disaster including law and operating organization.

Design and Implementation of an Efficient Web Services Data Processing Using Hadoop-Based Big Data Processing Technique (하둡 기반 빅 데이터 기법을 이용한 웹 서비스 데이터 처리 설계 및 구현)

  • Kim, Hyun-Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.726-734
    • /
    • 2015
  • Relational databases used by structuralizing data are the most widely used in data management at present. However, in relational databases, service becomes slower as the amount of data increases because of constraints in the reading and writing operations to save or query data. Furthermore, when a new task is added, the database grows and, consequently, requires additional infrastructure, such as parallel configuration of hardware, CPU, memory, and network, to support smooth operation. In this paper, in order to improve the web information services that are slowing down due to increase of data in the relational databases, we implemented a model to extract a large amount of data quickly and safely for users by processing Hadoop Distributed File System (HDFS) files after sending data to HDFSs and unifying and reconstructing the data. We implemented our model in a Web-based civil affairs system that stores image files, which is irregular data processing. Our proposed system's data processing was found to be 0.4 sec faster than that of a relational database system. Thus, we found that it is possible to support Web information services with a Hadoop-based big data processing technique in order to process a large amount of data, as in conventional relational databases. Furthermore, since Hadoop is open source, our model has the advantage of reducing software costs. The proposed system is expected to be used as a model for Web services that provide fast information processing for organizations that require efficient processing of big data because of the increase in the size of conventional relational databases.

Scrambling Technology using Scalable Encryption in SVC (SVC에서 스케일러블 암호화를 이용한 스크램블링 기술)

  • Kwon, Goo-Rak
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.575-581
    • /
    • 2010
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and not fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. The SVC offers temporal, spatial, and SNR scalability to varying network bandwidth and different application needs. Meanwhile, for many multimedia services, security is an important component to restrict unauthorized content access and distribution. This suggests the need for new cryptography system implementations that can operate at SVC. In this paper, we propose a new scrambling encryption for reserving the characteristic of scalability in MPEG4-SVC. In the base layer, the proposed algorithm is applied and performed the selective scambling. And it encrypts various MVS and intra-mode scrambling in the enhancement layer. In the decryption, it decrypts each encrypted layers by using another encrypted keys. Throughout the experimental results, the proposed algorithms have low complexity in encryption and the robustness of communication errors.

Leakage Monitoring Model by Demand Pattern Analysis in Water Distribution Systems (상수도 수요량 패턴분석을 통한 누수감지 모형)

  • Kim, Ju-Hwan;Lee, Doo-Jin;Choi, Doo-Youg;Bae, Cheol-Ho;Park, Su-Wan
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.479-483
    • /
    • 2012
  • 최근 국내외에서 기상이변에 따른 물 부족에 대응하고 먹는 물의 생산과 공급 효율성 향상을 위하여 스마트워터그리드에 대한 연구가 활발히 진행되고 있는 경향으로 이는 상수도 인프라시설의 운영오류, 자연재해, 사이버를 통한 의도적 공격 등에 대해 안전하고 신뢰성이 높은 시스템을 구축하기 위한 것이다. 또한 상수도 분야에서는 스마트 미터링 개념을 도입하여 상수관망에서 발생되는 각종 사고나 물 손실을 저감하기 위한 노력이 시도되고 있는 실정이다. 일반적으로 누수량이 많을 경우에는 누수의 징후가 지표면에서 확인이 가능하나 미세한 경우 탐사장비의 운영이나 인력의 투입을 통해 가능하다. 물 공급계통인 상수관망에서 물 손실을 저감시키기 위한 방법중 하나로서 수도미터로부터 기록되는 물 사용량 데이터를 이용하여 누수패턴을 추출함으로써 누수감시가 가능하도록 하는 모형을 개발하고자 하였다. 이는 탐사장비에 의한 누수감지와 상호 보완적을 활용할 수 있는 것으로서 사용량 자료를 분석하여 사전에 처리된 자료의 노이즈와 결함 있는 계측값을 필터링시키는 기법이 도입된 것이며 신속한 감지를 통해 누수 지속시간을 감소시킴으로서 누수량의 저감을 목표로 한다. 물 공급 네트워크를 보다 더 효율적 만들 수 있는 누수 감시모형은 상수관망의 운영에 필요한 정보를 도출하기 위하여 보다 정확하고 다양한 수학적 및 통계적 분석을 기반으로 구성되어 누수 외에도 각종 결함을 찾아내는 역할을 수행할 수 있다. 향후 다양한 지역을 이러한 수용가의 물 사용량 미터링 결과를 토대로 실제 사용량과 누수량을 분리하여 분석함으로써 국내 실정에 적합한 누수감시 기술배발 토대를 마련할 수 있을 것으로 판단되며, 누수저감을 위한 실질적인 상수관망의 운영관리 효율향상의 정보로서 활용이 가능할 것으로 판단된다.

  • PDF

An Extended SAML Delegation Model Based on Multi-Agent for Secure Web Services (안전한 웹서비스를 위한 멀티 에이전트 기반의 확장된 SAML 위임 모델)

  • Kim, Kyu-Il;Won, Dong-Ho;Kim, Ung-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.111-122
    • /
    • 2008
  • Web service is defined to support interoperable machine to machine interaction over a network and defined as distributed technologies. Recently in web service environment, security has become one of the most critical issues. An attacker may expose user privacy and service information without authentication. Furthermore, the users of web services must temporarily delegate some or all of their behalf. This results in the exposure of user privacy information by agents. We propose a delegation model for providing safety of web service and user privacy in ubiquitous computing environments. In order to provide safety of web service and user privacy, XML-based encryption and a digital signature mechanism need to be efficiently integrated. In this paper, we propose web service management server based on XACML, in order to manage services and policies of web service providers. For this purpose, we extend SAML to declare delegation assertions transferred to web service providers by delegation among agents.