• Title/Summary/Keyword: IT security

Search Result 11,284, Processing Time 0.034 seconds

Wide Integrated Surveillance System of Marine Territory Using Multi-Platform (다중플랫폼을 이용한 해양영토 광역통합감시 시스템)

  • Ryu, Joo-Hyung;Lee, Seok;Kim, Duk-jin;Hwang, Jae Dong
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.2_2
    • /
    • pp.307-311
    • /
    • 2018
  • It is necessary to establish wide integrated surveillance system of marine territory to reduce damage caused by maritime security threats, marine pollution and accidents for safe and clean marine use and efficient development of marine resources. For marine surveillance, the information characteristics of space-time specific, accuracy and operability are required, and real-time information about the wide area should be provided at all times. This special issue has been published to identify the characteristics of each platform, evaluate its usability for the establishment of a wide integrated surveillance system, and present the direction for future convergence studies between platforms. Since 2015, KIOST and cooperative research team have been performing the project, "Base research for building wide integrated surveillance system of marine territory using multi-platform" that detect vessels and red tide etc. near real time by using satellite, UAV and HF Ocean Radar. The objective of this special issue is to introduce the significance for an integrated system for maritime surveillance and to create a forum for discussion on recent advances in remote sensing technology and applications for marine disasters, pollution, and accident surveillance.

Analyzing Community CPTED Perception of Local Residents in the School Areas (학교 주변 커뮤니티 CPTED에 관한 지역 주민의 인식 연구)

  • Ko, Eun Bi;Lee, Jae Song;Chung, Seung Yun;Choi, Yeol
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.37 no.5
    • /
    • pp.891-903
    • /
    • 2017
  • In recent days, school violence has been rising as a significant social problem. The occurrence of school violence can be fueled by a wide range of social and environmental contexts, thus it is very difficult to come up with the ultimate solution. Community CPTED program is one of the more comprehensive set of efforts that has been developed to prevent crime in general, and the primary focus of the study is to investigate suitable components of CPTED to prevent school violence based on the physical conditions of communities as well as the perception of residents outside of school grounds, in the vicinity of schools. Three sets of analyses in series were employed in the research. First, Ward's minimum-variance cluster analysis was used to classify the places where school violence can occur outside of school grounds based on the physical conditions recognized by local residents. Next, Importance-Performance Analysis was performed to analyze the perception of local residents about the importance and the effectiveness of CPTED components in preventing school violence. Subsequently, Ordered Logit Model was used to analyze the local residents' awareness on safety regarding school violence in their community space. Combining the results of the analyses, the priority of the community CPTED applications to prevent school violence outside of school was derived. Reflecting the local residents' perception on safety of students in their community, the sense of security in communities against school violence can be reinforced by the communities' sensible efforts in creating safer environment for their students.

Evaluation Methods of Soil Resilience Related to Agricultural Environment (농업환경 분야에서 토양 리질리언스 분야별 평가 방법)

  • Kim, Min-Suk;Min, Hyun-Gi;Hyun, Seung-Hun;Kim, Jeong-Gyu
    • Ecology and Resilient Infrastructure
    • /
    • v.7 no.2
    • /
    • pp.97-113
    • /
    • 2020
  • Soil is the foundation of human life and the basis for food security. Considering this it is prioritized in the UN's Sustainable Development Goals (SDG). Therefore, research on soil resilience in the agricultural environment is crucial for sound and sustainable soil management, especially in highly uncertain and unpredictable conditions. Soil resilience is defined in different ways by several researchers; however, its definition typically includes the concepts of recovery and resistance to stress. The physical, chemical, and biological characteristics of soils that are used to assess the soil resilience, i.e., the response of soil to various types of stress are summarized in this study. In addition, various statistical processing techniques and quantification methods are summarized considering the wide spatial and temporal scope of soil resilience research. Several soil resilience studies typically conduct the following five steps: (1) soil and site selection (2) stress (independent variable) setting (3) soil characteristics and indicator (dependent variable) setting (4) performing various spatiotemporal scale experiments (5) statistical analysis. The previous and present studies present a general introduction of soil resilience, based on which, further practical research considering domestic agricultural environment should be conducted. The extensive range of soil resilience measurements will require collaboration between researchers in various fields.

Video Retrieval System supporting Adaptive Streaming Service (적응형 스트리밍 서비스를 지원하는 비디오 검색 시스템)

  • 이윤채;전형수;장옥배
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.1-12
    • /
    • 2003
  • Recently, many researches into distributed processing on Internet, and multimedia data processing have been performed. Rapid and convenient multimedia services supplied with high quality and high speed are to be needed. In this paper, we design and implement clip-based video retrieval system on the Web enviroment in real-time. Our system consists of the content-based indexing system supporting convenient services for video content providers, and the Web-based retrieval system in order to make it easy and various information retrieval for users in the Web. Three important methods are used in the content-based indexing system, key frame extracting method by dividing video data, clip file creation method by clustering related information, and video database construction method by using clip unit. In Web-based retrieval system, retrieval method ny using a key word, two dimension browsing method of key frame, and real-time display method of the clip are used. In this paper, we design and implement the system that supports real-time display method of the clip are used. In this paper, we design and implement the system that supports real-time retrieval for video clips on Web environment and provides the multimedia service in stability. The proposed methods show a usefulness of video content providing, and provide an easy method for serching intented video content.

Sampling based Network Flooding Attack Detection/Prevention System for SDN (SDN을 위한 샘플링 기반 네트워크 플러딩 공격 탐지/방어 시스템)

  • Lee, Yungee;Kim, Seung-uk;Vu Duc, Tiep;Kim, Kyungbaek
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.24-32
    • /
    • 2015
  • Recently, SDN is actively used as datacenter networks and gradually increase its applied areas. Along with this change of networking environment, research of deploying network security systems on SDN becomes highlighted. Especially, systems for detecting network flooding attacks by monitoring every packets through ports of OpenFlow switches have been proposed. However, because of the centralized management of a SDN controller which manage multiple switches, it may be substantial overhead that the attack detection system continuously monitors all the flows. In this paper, a sampling based network flooding attack detection and prevention system is proposed to reduce the overhead of monitoring packets and to achieve reasonable functionality of attack detection and prevention. The proposed system periodically takes sample packets of network flows with the given sampling conditions, analyzes the sampled packets to detect network flooding attacks, and block the attack flows actively by managing the flow entries in OpenFlow switches. As network traffic sampler, sFlow agent is used, and snort, an opensource IDS, is used to detect network flooding attack from the sampled packets. For active prevention of the detected attacks, an OpenDaylight application is developed and applied. The proposed system is evaluated on the local testbed composed with multiple OVSes (Open Virtual Switch), and the performance and overhead of the proposed system under various sampling condition is analyzed.

Analysis for Practical use as KOMPSAT-2 Imagery for Product of Geo-Spatial Information (지형공간정보 생성을 위한 KOPMSAT-2 영상의 활용성 분석)

  • Lee, Hyun-Jik;You, Ji-Ho;Koh, Young-Chang
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.17 no.1
    • /
    • pp.21-35
    • /
    • 2009
  • KOMPSAT-2 is the seventh high-resolution image satellite in the world that provides both 1m-grade panchromatic images of the GSD and 4m-grade multispectral images of the GSD. It's anticipated to be used across many different areas including mapping, territory monitoring and environmental watch. However, due to the complexity and security concern involved with the use of the MSC, the use of KOMPSAT-2 images are limited in terms of geometric images, such as satellite orbits and detailed mapping information. Therefore, this study aims to produce DEM and orthoimage by using the stereo images of KOMPSAT-2, and to explore the applicability of geo-spatial information with KOMPSAT -2. Orientation interpretations were essential for the production of DEM and orthoimage using KOMPSAT-2 images. In the study, they are performed by utilizing both RPC and GCP. In this study, the orientation interpretations are followed by the generation of DEM and orthoimage, and the analysis of their accuracy based on a 1:5,000 digital map. The accuracy analysis of DEM is performed and the results indicate that their altitudes are, in general, higher than those obtained from the digital map. The altitude discrepancies on plains, hills and mountains are calculated as 1.8m, 7.2m, and 11.9m, respectively. In this study, the mean differences between horizontal position between the orthoimage data and the digital map data are found to be ${\pm}3.081m$, which is in the range of ${\pm}3.5m$, within the permitted limit of a 1:5,000 digital map. KOMPSAT-2 images are used to produce DEM and orthoimage in this research. The results suggest that DEM can be adequately used to produce digital maps under 1:5,000 scale.

  • PDF

A Technical Assessment of Possibility Sanction for Assistance to DPRK (대북 바이오가스플랜트 지원의 제재 가능성에 대한 기술적 평가)

  • Chung, Yongjin;Kwon, Yongchai
    • Journal of Energy Engineering
    • /
    • v.24 no.4
    • /
    • pp.192-199
    • /
    • 2015
  • Under the economic banner of "self-reliance," North Korea has focused on hydro and thermal power as its main energy supply sources. However, in the face of extreme energy penury caused by machinery and material supply instability in the wake of the collapse of the former communist block as well as equipment aging and deterioration due to floods and other disasters, North Korea and international aid organizations are increasingly turning their attention toward energy source diversification. In particular, renewable energy is recognized as the best strategic energy source for North Korea and it is a decentralized energy option that is suitable in light of North Korea's power distribution networks and its pursuit of self-reliance. Biogas can contribute to improving the human rights situation of North Koreans in conjunction with an increase in food production. For this reason, renewable energy is the most promising option for an energy source that is likely to secure humanitarian aid from international organizations such as the Food and Agricultural Organization (FAO) and the World Food Programme (WFP). However, the implementation of such humanitarian aid has been hampered by rising concerns about the diversion of provided energy materials for military purposes and the disguised introduction of dual use items strategic materials as well as UN Security Council resolutions and sanctions of the international community against North Korea's military provocation, including nuclear tests and missile launches. This paper explores the possibility of solving this dilemma and proceeding with the humanitarian aid to North Korea by evaluating the potential for sanction and the risk of diversion of the possible products for biogas-related aid on the basis of the list of UN-sanctioned items.

The secured mobile wallet system using by integrated ID (통합 아이디를 이용한 안전한 모바일 월렛 시스템)

  • Nam, Choon-Sung;Jeon, Min-Kyung;Shin, Dong-Ryeol
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.9-20
    • /
    • 2015
  • Nowadays, Smart Wallet technology trend that is able to save users' consuming costs and also retain users' redundant behaviors such as Single-tapping, One-way communication, Integrated ID, has been issued in recent Mobile Industrial Fields. As one of Smart Wallet functions, Integrated ID is proposed for users' convenience, handiness, and immediate responses. It is designed for the effective management of users' IDs which are easy to be forgot because of its unusual structures. To be detail, instead of user, Integrated ID system can certificate users identification from various online sites (where user resisted) authorization requests via one-clicking, not putting identification data in each sites. So, this technology would be helpful much to a certain user who has lots ID and its Password in multiple Online shopping companies by establishing integrated ID. However, although Integrated ID has lots advantages to be used, most Mobile Service Companies has hesitated to apply Integrated ID service in their shopping systems because this technology requires them sharing their users' data. They have worried that this service would be not helpful to gain their profits. Furthermore, Users who join in multiple shopping companies and use Integrated ID services also are difficult to decide which company they have to save their points in before payment because this system could not show any financial benefit analysis data to their users. As following facts, via this paper majorly we propose the advanced Integrated ID system which concern shopping point management. Basically, this system has a strong security payment service and secure network services like other mobile Shopping systems. Additionally, this system is able to service (or to support) shopping -point -saving guide for customers' financial benefits and conveniences.

Social Media Analysis Based on Keyword Related to Educational Policy Using Topic Modeling (토픽모델링을 이용한 교육정책 키워드 기반 소셜미디어 분석)

  • Chung, Jin-myeong;Park, Young-ho;Kim, Woo-ju
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.53-63
    • /
    • 2018
  • The traditional mass media function of conveying information and forming public opinion has rapidly changed into an environment in which information and opinions are shared through social media with the development of ICT technology, and such social media further strengthens its influence. In other words, it has been confirmed that the influence of the public opinion through the production and sharing of public opinion on political, social and economic changes is increasing, and this change is already in use on the political campaign. In addition, efforts to grasp and reflect the opinions of the public by utilizing social media are being actively carried out not only in the political area but also in the public area. The purpose of this study is to explore the possibility of using social media based public opinion in educational policy. We collected media data, analyzed the main topic and probability of occurrence of each topic, and topic trends. As a result, we were able to catch the main interest of the public(the 'Domestic Computer Education Time' accounted for 43.99%, and 'Prime Project Selection' topics was 36.81% and 'Artificial Intelligence Program' topics was 7.94%). In addition, we could get a suggestion that flexible policies should be established according to the timing of the curriculum and the subject of the policy even if the category of the policy is same.

Comparative Analysis on Cloud and On-Premises Environments for High-Resolution Agricultural Climate Data Processing (고해상도 농업 기후 자료 처리를 위한 클라우드와 온프레미스 비교 분석)

  • Park, Joo Hyeon;Ahn, Mun Il;Kang, Wee Soo;Shim, Kyo-Moon;Park, Eun Woo
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.21 no.4
    • /
    • pp.347-357
    • /
    • 2019
  • The usefulness of processing and analysis systems of GIS-based agricultural climate data is affected by the reliability and availability of computing infrastructures such as cloud, on-premises, and hybrid. Cloud technology has grown in popularity. However, various reference cases accumulated over the years of operational experiences point out important features that make on-premises technology compatible with cloud technology. Both cloud and on-premises technologies have their advantages and disadvantages in terms of operational time and cost, reliability, and security depending on cases of applications. In this study, we have described characteristics of four general computing platforms including cloud, on-premises with hardware-level virtualization, on-premises with operating system-level virtualization and hybrid environments, and compared them in terms of advantages and disadvantages when a huge amount of GIS-based agricultural climate data were stored and processed to provide public services of agro-meteorological and climate information at high spatial and temporal resolutions. It was found that migrating high-resolution agricultural climate data to public cloud would not be reasonable due to high cost for storing a large amount data that may be of no use in the future. Therefore, we recommended hybrid systems that the on-premises and the cloud environments are combined for data storage and backup systems that incur a major cost, and data analysis, processing and presentation that need operational flexibility, respectively.