• Title/Summary/Keyword: 출입 통제

Search Result 207, Processing Time 0.025 seconds

Effects of Habitat Environment on Bird Community in Forest (산림지역에서 서식지 환경이 조류군집에 미치는 영향)

  • Kim, Jung-Soo;Shin, Ju-Ryul;Lee, Hwa-Su;Koo, Tae-Hoe
    • Journal of Environmental Policy
    • /
    • v.7 no.3
    • /
    • pp.141-160
    • /
    • 2008
  • The effects of disturbance on bird community were studied in Ssanggok Valley and Beopju Temple area, Songni Mt. National Park in $2006{\sim}2008$. We divided three sites by habitat condition such as traffic road(strong disturbance), trail(medium) and control(weak) site. During breeding and non-breeding seasons(n=12), number of species, number of individuals, species diversity and density did not differ among three sites, but in breeding season(n=9), number of species(Kruskal Wallis, $x^2$=10.32, p=0.006), number of individuals(Kruskal Wallis, $x^2$=7.118, p=0.028) and species diversity of birds(Kruskal Wallis, $x^2$=9.847, p=0.007) were significantly higher in trail site with medium disturbance than in other sites. In breeding season, nesting and foraging guild rate were not different among three sites. In guild analysis, hole was the highest nesting guild and canopy was the highest foraging guild in three sites.

  • PDF

Legal Interpretation on Management Power of Article 7 Section 1 of Security Business Act (경비업법 제7조 제1항 "관리권 범위"에 대한 법적 해석)

  • Lee, Jong-Hwan;Lee, Min-Hyung
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.59-87
    • /
    • 2011
  • Security Business Act of Korea is leaning toward the aspect of regulation, while it provides few provisions about vesting the authority, which causes problems such as legal loopholes to be raised in regard to the rules about authorizing the private security personnel to perform security affairs properly and defining the limit of power. So, it should be done to interpret the law in order to draw the legal basis of empowering as well as to set limits of the authority of security main agent, and Article 7, Section 1, of Security Business Act is the very provision that involves the legal basis. In the scope of 'Management Power', the statutory authority in the first clause of Article 7 of Security Business Act, the security personnel can use force for self-defense, defense of others and property, and prevention of crimes. In addition, the powers of interrogation, access control, and eviction notice are involved in its scope. The private security personnel as the occupation assistant can take precautions and if the infringement on the benefit and protection of the law is imminent or done, he or she can use force within the limits of the passive resistance and the means of defiance on the basis of 'Management Power'. The private security personnel, however, can exercise the force only if the necessary conditions of legal defense, emergency evacuation, and legitimate act of criminal law are fulfilled.

  • PDF

Status and prospects of Knowledge Information Security Industry (지식정보보안 산업의 현황과 전망)

  • Choi, Jeong-Il;Chang, Ye-Jin;Lee, Ok-Dong
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.269-294
    • /
    • 2014
  • Korea is concerned with information security industry due to recent leak-out private information of 3 card companies. Executives are aware of damage from breach of security such as personal data spill, is more dangerous than any other financial risks. The information security industry, which was limited in physical security and network security formerly, is evolving into convergence security of public and facility security industry. The field of interest has also been changed into security of smart phone and intelligence image recently, from firewall or Anti-virus. The convergence security is originally about access control of facility, but recently its demand has been increased mostly by public institutions and major companies. The scope of the industry also varies from finance, education, distribution, national defense, medical care to automobile industry. The market of convergence security has been expanded and new various products and services of security of intelligent vehicle, 'U' healthcare, finance, smart grid and key industries are also developed. It is required to create and enhance of new curriculum and cultivate human resources for the development of knowledge information security industry. Raising standard of education and security consciousness of the nation is also necessary to strengthen the global competitiveness.

  • PDF

Evaluating Home Ranges of Endangered Asiatic Black Bears for In Situ Conservation (멸종위기종 반달가슴곰의 현장 내 복원을 위한 행동권 평가)

  • Kang, Hye-Soon;Paek, Kyung-Jin
    • The Korean Journal of Ecology
    • /
    • v.28 no.6
    • /
    • pp.395-404
    • /
    • 2005
  • A project has recently begun to reintroduce endangered Asiatic black bears to the Jirisan National Park. However, information on home range that is necessary to maintain the Minimum Viable Population (MVP) of those bears does not exist. Based on point data of two bears that were released for trial in Jirisan in 2001, we identified the movement pattern of bears and estimated their home ranges with two different methods Finally, the possibility of conserving the MVP of bears was evaluated by comparing the location and size of the home range with habitats which have been found to be suitable for bears. The frequency of bears' appearance reduced drastically as road densities of both paved roads and legal trails increased. The midpoint of home ranges of the two bears was 376.85 $km^2$ and 50.76 $km^2$ based on 100% MCP (Minimum Convex Polygon) and 95% AK (Adaptive Kernel Home Range Method), respectively, with an overlapped area of 126.0 $km^2$ and 3.99 $km^2$ each. The core areas of their home ranges are located not in the no-entry zone, where major trails were open to the public - despite being designated as no -entry zone - but in areas where most trails were closed to the public. A discrepancy between core areas of home ranges and potentially suitable habitats suggests the effects of vehicles and tracking people through roads within the park. Thus, for the success of in situ conservation of endangered bears, well-planned management of habitats is needed to protect bears and to ensure the home ranges to support the MVP.

A Study on Crime Prevention Design in Urban Apartment Complex by Application of a CPTED -focused on the Medium sized City- (중소도시 아파트단지 방범계획의 CPTED 요소 적용에 관한 연구)

  • Bahn, Sang-Chul;Shin, Hee-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.2
    • /
    • pp.1176-1187
    • /
    • 2014
  • In Contemporary residential area, especially apartment commplex, crime affect the quality of life and sustainability of cities. So our interest is an all-time high in the role that planning processes and the design of the physical environment can play in reducing the opportunity for crime. The purpose of this study try to find the possibility of application of CPTED in Urban Apartment Complex. Recently, as increase of residencial density, diverse and new types of crime are increasing in urban apartment complex. It is the current of times which demand our serious consideration. This research focused on crime reduction through the physical environmental control methods. And the concepts and contents of CPTED are studied and the case studies of developed countries are surveyed. For groping in the practical application, researched into the case study of apartment blocks in medium sized city, Cheongju. Also Local crime prevention initiatives require partnership working, both between professionals and with local communities. The result of this study has implicated, increasing importance on daily safety issue in urban life and examining the possibility of applying crime prevention and reduction program and systems.

South and North Korean Collaboration for Natural Heritage Conservation across Demilitarized Zone : Its Significance and Challenges (비무장지대(DMZ) 자연유산 남북 공동협력의 의의와 과제)

  • Je, Jonggeel
    • Korean Journal of Heritage: History & Science
    • /
    • v.52 no.1
    • /
    • pp.242-257
    • /
    • 2019
  • The Demilitarized Zone (DMZ) stretches two kilometers north and south from the Military Demarcation Line (MDL) of South and North Korea. This area was established as a weapons-free buffer zone when an armistice agreement was signed in 1953. However, there have been several very high-tension military standoffss over the past 65 years. On the South Korean side, civilian access to the Civilian Control Line (CCL) and beyond to the north has been restricted, and natural heritage has been well maintained. Natural heritage is defined as living things, their habitat and non-living things of the ecosystem which deserve to be protected. Research shows that a variety of flora and fauna, their habitat, marshes and geographical structures are found across the DMZ region. Although the DMZ region has not been such a good place for habitat conservation, we can say that this area may be the best location for restoration in terms of its variety of ecosystems and considerable land size. Restoration of course depends on future plans and management policies. This area, including the DMZ and the well-protected north of the CCL, will be the best habitat for endangered species of wild fauna and flora if we classify the various habitat types and create a habitat map. In doing this project, we need to include the estuary of the Han River and the lagoon (brackish water lake) of the East Sea coast. In addition, we must establish long-term plans for conservation and sustainable use and do international scientific research across the DMZ region in collaboration with scientists of South and North Korea and international experts. Mutual cooperation between the two Koreas for investigation and conservation efforts is paramount.

Fat Client-Based Abstraction Model of Unstructured Data for Context-Aware Service in Edge Computing Environment (에지 컴퓨팅 환경에서의 상황인지 서비스를 위한 팻 클라이언트 기반 비정형 데이터 추상화 방법)

  • Kim, Do Hyung;Mun, Jong Hyeok;Park, Yoo Sang;Choi, Jong Sun;Choi, Jae Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.3
    • /
    • pp.59-70
    • /
    • 2021
  • With the recent advancements in the Internet of Things, context-aware system that provides customized services become important to consider. The existing context-aware systems analyze data generated around the user and abstract the context information that expresses the state of situations. However, these datasets is mostly unstructured and have difficulty in processing with simple approaches. Therefore, providing context-aware services using the datasets should be managed in simplified method. One of examples that should be considered as the unstructured datasets is a deep learning application. Processes in deep learning applications have a strong coupling in a way of abstracting dataset from the acquisition to analysis phases, it has less flexible when the target analysis model or applications are modified in functional scalability. Therefore, an abstraction model that separates the phases and process the unstructured dataset for analysis is proposed. The proposed abstraction utilizes a description name Analysis Model Description Language(AMDL) to deploy the analysis phases by each fat client is a specifically designed instance for resource-oriented tasks in edge computing environments how to handle different analysis applications and its factors using the AMDL and Fat client profiles. The experiment shows functional scalability through examples of AMDL and Fat client profiles targeting a vehicle image recognition model for vehicle access control notification service, and conducts process-by-process monitoring for collection-preprocessing-analysis of unstructured data.

An Intelligent CCTV-Based Emergency Detection System for Rooftop Access Control Problems (옥상 출입 통제 문제 해결을 위한 지능형 CCTV 기반 비상 상황 감지 시스템 제안)

  • Yeeun Kang;Soyoung Ham;Seungchae Joa;Hani Lee;Seongmin Kim;Hakkyong Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.59-68
    • /
    • 2024
  • With advancements in artificial intelligence technology, intelligent CCTV systems are being deployed across various environments, such as river bridges and construction sites. However, a conflict arises regarding the opening and closing of rooftop access points due to concerns over potential accidents and crime incidents and their role as emergency evacuation spaces. While the relevant law typically mandates the constant opening of designated rooftop access points, closures are often tacitly permitted in practice for security reasons, with a lack of appropriate legal measures. In this context, this study proposes a detection system utilizing intelligent CCTV to respond to emergencies that may occur on rooftops. We develop a system based on the YOLOv5 object detection model to detect assault and suicide attempts by jumping, introducing a new metric to assess them. Experimental results demonstrate that the proposed system rapidly detects assault and suicide attempts with high accuracy. Additionally, through a legal analysis of rooftop access point management, deficiencies in the legal framework regarding rooftop access and CCTV installation are identified, and improvement measures are proposed. With technological and legal improvements, we believe that crime and accident incidents in rooftop environments will decrease.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF