• Title/Summary/Keyword: 출입 통제

Search Result 207, Processing Time 0.026 seconds

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

Analysis of Actual Conditions of Unnatural Death Cases and Questionnaire for Initial Crime Scene Investigation of Police (변사체 발생실태 및 경찰의 현장 초동조치에 관한 설문 분석 - 경북지역을 중심으로 -)

  • Cho, Doo-Won;Chae, Jong-Min
    • Journal of forensic and investigative science
    • /
    • v.1 no.1
    • /
    • pp.11-30
    • /
    • 2006
  • The preliminary investigative activities by the police officer play a critical role in identifying the cause of death in unnatural death investigations. The failure to secure the crime scene leads to the destruction of significant evidence, which results in the difficulty or impossibility to identify the cause of death. In order to prevent this jeopardizing crucial evidence, and to identify the level of preliminary investigation on the scene, this research is conducted and analyzed with questionnaires of 300 police first responders and 100 detectives. As a result, it was disclosed that there is a possibility for first responders to fail to ensure scene security, scene observation, and canvass interviews. Besides, when medical personnel have no choice but to contaminate the crime scene in order to save lives, it is necessary for them to take photos and to take proper actions before they enter the scene. The importance of scene-control education cannot be emphasized enough in order to prevent media from entering and destroying the evidence. Through research of actual conditions of unnatural death cases which occurred in Kyongbook Province for last five years, the statistics regarding a few different types of death were analyzed as follows. Evidence that homicide, suicide, accidental death, and disaster deaths have increased year by year. Therefore, it is deemed necessary for the government to take multilateral policies to reduce them, and for police to reinforce their investigative skills. Further, the insufficient number of autopsy facilities and forensic pathologists, only 13% of the deceased (1,237 cases) have had an autopsy conducted to identify the cause of death for last five years. The other, 87.3% (8,496 cases) of the deceased, were handled through simple postmortem examination. The significance of this percentage is that there is still the possibility not revealing the cause of unjust deaths. Therefore, it is necessary to furnish police agency with the reasonable amount of funding for autopsies and maintaining enough forensic pathologists.

  • PDF

The Effect of the Chang in Forest Environment on physico-chemical Properhes of Soil Located in Seoul Royal Tomb (서울 왕릉지역의 산림환경변화가 토양 이.화학성에 미치는 영향)

  • Nam, Yi;Yee, Sun;Bae, Sang-Won
    • Journal of Soil and Groundwater Environment
    • /
    • v.10 no.3
    • /
    • pp.32-37
    • /
    • 2005
  • The soil properties of the royal tombs (managed by cultural properties administration) located in Seoul and suburban Gyonggi area were investigated to see the influence of the change in soil environment on the royal tomb s이I. To compare the soil chemical properties of four royal tombs soil of Changdeokgung, Jongmyo, Seooneung, and Dongguneung, pH, organic content, available phosphate, extractable calcium, extractable potassium, extractable magnesium, cation exchange capacity, degree of base saturation, and total nitrogen content were measured. The concentrations of Cd, Pb, and Cu measured as the degree of heavy metal contamination can be an indication of atmospheric pollution in the soil environment. To estimate the degree of soil compaction, soil hardness, pore space, porosity, bulk density, and soil atmosphere were analyzed. Through these studies, following conclusions were made: 1. The soil hardness and pore space which can be used as indexes of soil compaction, were worse in the soil of Seooneung than in those of Changdeokgung and Dongguneury. These phenomena seem to be the result of increase in visitors in Seooneung and Dongguneung better and soil management in Changdeokgung and Dongguneung. When three different regions of forest area, prohibited area, and soil compaction area in Seooneung soil were compared, the degree of compaction in the forest area was less than compaction area, indicating the need for the employment of soil resting period in the compaction area. 2. The pH measurements of all four royal tombs soil were higher in top soil than sub soil. The higher soil pH values in Jongmyo and Seooneung seem to result from the application of soil conditioner. In the case of Seooneung, the values for soil pH and organic content were higher in the forest area than those in compaction area. It is thought that active soil management was employed in the forest area through application of organic matters and soil conditioners. 3. The heavy metal contents from soil of Changdeokgung and Jongmyo were higher than that from soil of Dongguneung. Since Changdeokgung and Jongmyo are located inside Seoul, it is thought that the high level of heavy metal concentrations in these royal tomb soil is the result of accumulation of pollutants from the city.

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.

Ecological Changes of Seunghwanglim -Natural Monument No. 93- Wonju Seungnamri (원주 성남리 성황림-천연기념물 제 93호-의 생태적 변화)

  • Kim, Gab-Tae
    • Korean Journal of Environment and Ecology
    • /
    • v.21 no.6
    • /
    • pp.559-564
    • /
    • 2007
  • This research is aimed at finding out the ecological change of Seunghwanglim through the examination of vegetational change of tree seedlings of old giant trees growing at Seunghwanglim [Seunghwang Forest designated as a Natural Monument No.93] after the installation of protective iron fence. The survey results are as follows: First, as a result of keeping out people by installing a protective iron fence in 1989, soil hardness of the plane forest was greatly improved except the area used as roads. The seedlings of the plane forest, whose damage index is 2,3,4, were found to have the highest 1,202 $individuals/400m^2$, and those of the plane forest, whose damage index is 1, were revealed to have 565 $individuals/400m^2$, and those of the slope forest were found to have 403 $individuals/400m^2$. The number of the young sapling[taller than 2 meters] individuals of the plane forest whose damage index is 1 was found to be the most $48/400m^2$, and that of the plane forest whose damage index is 2, 3, 4- was $31/400m^2$, and that of the slope forest proved to be $14/400m^2$. In the plane forest whose damage index is 2, 3, 4, the saplings of the Ulmus davidiana var. japonica and Acer triflorum are relatively much distributed, and in the plane forest whose damage index is 1, many saplings of the Prunus padus and Styrax obassia, were found to grow and in the slope forest, many saplings of the Acer pictum subsp. mono and Acer pseudo-sieboldianum. were found to grow. Many seedlings of Rubus spp. - R. oldhamii, R. coreanus and R. crataegifolius. - and Akebia quinata were growing vigorously on plane forest, but they might decrease in number with the increasing number of the tree saplings.

Enterprise Human Resource Management using Hybrid Recognition Technique (하이브리드 인식 기술을 이용한 전사적 인적자원관리)

  • Han, Jung-Soo;Lee, Jeong-Heon;Kim, Gui-Jung
    • Journal of Digital Convergence
    • /
    • v.10 no.10
    • /
    • pp.333-338
    • /
    • 2012
  • Human resource management is bringing the various changes with the IT technology. In particular, if HRM is non-scientific method such as group management, physical plant, working hours constraints, personal contacts, etc, the current enterprise human resources management(e-HRM) appeared in the individual dimension management, virtual workspace (for example: smart work center, home work, etc.), working time flexibility and elasticity, computer-based statistical data and the scientific method of analysis and management has been a big difference in the sense. Therefore, depending on changes in the environment, companies have introduced a variety of techniques as RFID card, fingerprint time & attendance systems in order to build more efficient and strategic human resource management system. In this paper, time and attendance, access control management system was developed using multi camera for 2D and 3D face recognition technology-based for efficient enterprise human resource management. We had an issue with existing 2D-style face-recognition technology for lighting and the attitude, and got more than 90% recognition rate against the poor readability. In addition, 3D face recognition has computational complexities, so we could improve hybrid video recognition and the speed using 3D and 2D in parallel.

Fast Detection of Finger-vein Region for Finger-vein Recognition (지정맥 인식을 위한 고속 지정맥 영역 추출 방법)

  • Kim, Sung-Min;Park, Kang-Roung;Park, Dong-Kwon;Won, Chee-Sun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.1
    • /
    • pp.23-31
    • /
    • 2009
  • Recently, biometric techniques such as face recognition, finger-print recognition and iris recognition have been widely applied for various applications including door access control, finance security and electric passport. This paper presents the method of using finger-vein pattern for the personal identification. In general, when the finger-vein image is acquired from the camera, various conditions such as the penetrating amount of the infrared light and the camera noise make the segmentation of the vein from the background difficult. This in turn affects the system performance of personal identification. To solve this problem, we propose the novel and fast method for extracting the finger-vein region. The proposed method has two advantages compared to the previous methods. One is that we adopt a locally adaptive thresholding method for the binarization of acquired finger-vein image. Another advantage is that the simple morphological opening and closing are used to remove the segmentation noise to finally obtain the finger-vein region from the skeletonization. Experimental results showed that our proposed method could quickly and exactly extract the finger-vein region without using various kinds of time-consuming filters for preprocessing.

Security Problem of National Major Facility's Parking Lot and its Improvement Method -Focused on Doonchi(Waterside) Parking Lot of National (국가중요시설의 주차장 보안의 문제점과 개선방안: 국회둔치주차장을 중심으로)

  • Lee, Sang-Hun;Lee, Sang-Yeol
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.61-87
    • /
    • 2017
  • National Assembly is a constitutional institution that is required to first consult the will of the people and it should do its effort continuously so that security of citizens using parking lot would be enhanced at the same time while improving parking service in order to increase customer satisfaction of the people. Under this recognition, in this study, Doonchi parking lot of National Assembly under consigned management was first reviewed in a perspective of criminal prevention through environmental design(CPTED) and particularly, fence installation and reinforcement work for securing 'territoriality' and operation of all round shooting camera and installation of No-trespassing warning board at entrance were suggested. Second, it was recommended to change independent control system in which CCTV security system of National Assembly Doonchi parking lot is operated separately from National Assembly safety situation room and integrate it with National Assembly safety situation room(revised to double safety system) and performance of CCTV camera was made to be increased to over 2m. In addition, video recording mode was converted to NVR mode for application to IP camera in the future and in order to avoid dead zone of security monitoring area and based on site inspection result, addition 3 places of newly installing CCTV were indicated. Third, it was recommended to introduce parking fare billing and management system through unmanned equipment in parking lot management and operation.(specialized management of professional parking service provider was reviewed). By doing so, risk of cash handling by charging personnel was removed by reducing current 7 working personnel to 3 and particularly, by converting parking lot management mode being operated temporarily from 9 A.M. to 9 P.M. at present to 24 hours operation mode and providing more specialized parking service, citizens visiting National Assembly were provided with convenience and image of National Assembly was also enhanced. This study was carried out in parallel with various literature and case studies, including data from the Office of the Defense Protection in the National Assembly.

  • PDF

A Study on Institutional Foundation on the Korea Counter-Terrorism System (한국 테러대응 시스템의 제도적 구축방안)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.27-61
    • /
    • 2010
  • This study looks at plans for the efficient functions of the current terror response system in Korea. The results are derived from by comparing and analyzing American, British, German, Japanese, and Korean terror response systems. It focuses especially on addressing some problems with Korea's terror response system and how to operate it effectively. The study will systematically compare and analyze each nation's terror countermeasure studying organizational, functional, and legal aspects as standards. This study shows that there is not an exclusive terror response center in Korea compared with other nations such as America, the United Kingdom, Germany, and Japan. Also it is difficult to expect effective and vigorous operations due to weak cooperation across the relevant organizations. The presidential directive of the state's anti-terrorism action guidelines is legally ineffective. This means that on legal grounds, it is difficult to take actions to prevent the terrorism. Therefore, keys to counteracting terrorism derived from this study are summarized below. In the first place, an integrated terror response system should be set up for expansion of information sharing which leads to emergence effect. In the second place, the superior legislative systems should be made for the cleardefinition and extent of what the terror is, rigid enforcement of investigation, immigration, and keeping an eye on the funds raised by terrorists and tracking down the terrorists, the plan for eco-terrorism. In the third place, to augment security of vital facilities and peoples' awareness of terrorism safety should be emphasized and a cooperative system between civil and government organizations need to be built. In the fourth place, system for crisis management must be provided in an effort to maximize management system of terrorism and unify a decentralized emergency countermeasures effectively.

  • PDF

The Important Factors in Security for Introducing the Cloud Services (클라우드 서비스 도입을 위한 보안 중요도 인식에 대한 연구)

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • Journal of Internet Computing and Services
    • /
    • v.13 no.6
    • /
    • pp.33-40
    • /
    • 2012
  • The cloud service has become the significant factor to save the IT operation cost and to improve the productivities in companies. It was introduced to Korea for enterprise services of major companies in 2008. As the increase of recognition for its effect, more small businesses and public institutions plan to introduce the cloud computing services. The cloud computing researches have only focused on the security threats and response technologies to them. Therefore, this research analyzed the importances of responses to security threats in specific domains. The domains were divided into managerial, physical, and technical security. The specific factors in three domains were used for the analysis in this research as well. The ordered logit model was used for the analysis and the analysis results showed that physical security and managerial security are considered to be significantly important in the cloud computing security. The results also presented that the security policy, the control and surveillance to service infrastructure, and application security are highly important in the respect of specific factors. This research will contribute to enterprises or institutions in Korea, which want to introduce the cloud computing services, by aiding the establishment of effective security strategies.