• Title/Summary/Keyword: Physical security

Search Result 1,047, Processing Time 0.025 seconds

A Study on the Maritime Security using RFID Applications (RFID 기술을 이용한 해상 인명사고 방지에 관한 연구)

  • Kim, Chan;Jeong, Don-Ki;Choi, Byung-Ha
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2006.11a
    • /
    • pp.299-301
    • /
    • 2006
  • It is very important to protect life, property at sea and marine environments from any pollution. The RFID when it applies a technique, is able to raise the stability of vessel as controling the mobile course and an entrance and exit of the crews as well as previously preventing accident from the vessel. The RFID technique which is applied, It show the effect which prevents an accident in advance, Currently it is used plentifully from physical distribution field and RFID KS domestic Standard $860MHz{\sim}960MHz$ band use the crew has the RFID tag and it will grasp incoming, leaving and movement.

  • PDF

Root cause analys is and improving strategy of suicidal sentinel events (의료기관 내 자살사건의 근본원인분석과 개선전략)

  • Lim, Hun-Sun;Kim, Hong-Soon;Yum, Ho-Kee
    • Quality Improvement in Health Care
    • /
    • v.19 no.2
    • /
    • pp.50-64
    • /
    • 2013
  • Objectives : Suicide is a serious sentinel event in healthcare organization. Suicide and suicidal attempt are fatal and long lasting mental and physical damage to themselves, family, and medical staffs. To develope the system to prevent suicidal accident in hospital, we reviewed and analysed one case of suicidal sentinel event. Methods: The risks of suicidal sentinel event were evaluated and analysed through the root cause analysis and failure mode effects analysis. Result: We found several root causes such as initial assessment of oldest patient and security issues. Couple of action plans to fix the problems were done immediately. According to failure mode, we evaluate the risk priority number to modify the action plans. Conclusion: To reduce the risk of sentinel events, we reviewed the suicidal event and established the new system and action plan to prevent sentinel events.

The Relationship Between the Exhibitors'Show Performance and the Service Quality of Trade Shows : As reported by participating exhibitor managers in International Trade Shows held in Korea (전시회 서비스 품질과 참가 기업의 성과와의 관계: 한국개최 국제전시회 참가기업의 전시 담당자의 인식을 중심으로)

  • Kim, Nam-Su;Lee, Eun-Sup
    • International Commerce and Information Review
    • /
    • v.12 no.3
    • /
    • pp.3-34
    • /
    • 2010
  • The purpose of this study is first to identify the dimensions of a trade show's service quality and the dimensions of the exhibitors' show performance, and thereafter determine the relationship between the trade show's service quality and the exhibitors' show performance. This study attempted empirical research, together with a literature review, to discover the effect of service quality upon on exhibitors' performance. A survey was conducted during an international trade show that was held in Korea where more than 100 businesses participated. The sample was selected from among the people who were in charge (e.g., managers) of their own private businesses. As a result, the study validated nine dimensions of a trade show's service quality: host and public relations, security, reputation and reliability, access, customer service, exhibition program, physical facilities, convenient facilities, and attendance cost. The study also identified five dimensions of the performance of participants: sales performance, information collection, networking, image building, and motivation. Overall, the empirical results of this study verified that there is a correlation between the performance of exhibitors and the service quality. of trade shows.

  • PDF

Housing Improvement Elements Depended on the Analysis of Urban Residents' Perceived Korean Housing Quality Related to Mental Health (거주자가 지각한 정신건강 관련 주거의 질 분석에 기초한 주거 개선요소)

  • Choi, Byungsook;Park, Jung-A
    • Journal of the Korean housing association
    • /
    • v.24 no.6
    • /
    • pp.189-197
    • /
    • 2013
  • The purpose of the study was to analyze the improvement elements depended on housing quality measurement tool related to mental health. The data for the analysis was collected through questionnaire survey method from November 1, 2012 to January 17, 2013, and the sample consisted of 720 respondents living in single detached houses, multi-families detached houses, apartments, and town houses in 4 cities, Seoul, Busan, Daejeon, and Kwangju. The data were analyzed using descriptive statistics. The results of improvement elements are as follows: 1) Pedestrian-threaten street from cars in physical safety 2) A secluded or dark spot and fear of walking at night in social security, 3) Indoor noise, outdoor noise, and evidence of abandoned trash heap/bottle in neighborhood in health & sanitation, 4) Illegal parking and heating control system in facility convenience, 5) Extra kitchen, number of bathrooms, and community spaces in space convenience, 6) Openness and spaciousness of indoor room, and satisfaction of house and neighborhood in comfort, 7) Management common/sharing space in maintenance, 8) Energy saving facility and environment friendly materials use in sustainability, 9) Burden on housing cost, asset value on house, and school district in economic value, 10) Reflection of residents style, surrounding building's number of layers, and neighborhood appearance of preference in housing environment image.

스마트그리드에서의 CPS (cyber-physical system) 시뮬레이션 구현을 위한 제반 연구이슈 및 방법론 검토

  • Kang, Dong-Joo;Kim, Huy-Kang
    • Review of KIISC
    • /
    • v.22 no.5
    • /
    • pp.62-72
    • /
    • 2012
  • 스마트그리드는 전력시스템과 이를 제어하기 위한 통신 인프라를 중심으로 다양한 시스템이 서로 통합되는 종합적인 플랫폼으로 이해할 수 있다. 기존에 각기 독립적으로 운영되는 시스템과 통신 인프라가 통합되기 시작하면서 다양한 상호작용이 파생되고 그로 인해 잠재적인 보안 측면의 위험성도 커지게 된다. 전통적인 전력시스템은 폐쇄적인 SCADA 네트워크를 기반으로 운영되었기 때문에 최소한의 보안강도가 보장되었지만, 스마트그리드 하에서는 개방형 통신망과 연계되면서, 기존의 사이버 보안 위협들이 전력시스템으로 유입하게 된다. 기존의 IT 시스템과는 달리 전력시스템과 같은 제어시스템은 물리적 작동과 공정이 수반되기 때문에 새로운 위험이 발생하기도 하고 기존의 위험이 증폭되기도 한다. 전력시스템에서는 가용성이 그 무엇보다 중요하기 때문에, 스마트그리드 체제하에서의 다양한 위협요인을 미리 파악하고 이에 대비한 계획을 수립함으로써, 그러한 가용성의 수준을 유지할 필요가 있다. 이를 위해서는 기존의 사이버 위협이 어떠한 경로를 통해 전력시스템에 영향을 미치게 되며 그로 인한 잠재적 위험이 얼마나 되는가를 평가할 필요가 있다. 그러나 스마트그리드는 아직까지 구축중인 미래형 시스템이고 누적된 과거 데이터가 없기 때문에 가상의 하드웨어 기반 테스트베드 내지 소프트웨어 기반의 시뮬레이션 모델을 통해 이를 사전적으로 테스트할 필요가 있다. 또한 스마트그리드는 서로 다른 IT 시스템과 물리적 설비들이 결합되는 복잡한 시스템이라는 측면에서, 잠재적으로 발생 가능한 다양한 위험을 분석하고 평가할 수 있는 모델의 수립이 요구된다. 본고에서는 그러한 CPS 기반 시뮬레이션 모델에 대한 현재의 연구동향을 검토하고, 향후 실질적으로 구현하기 위한 방안을 제안하고자 한다.

Indoor Passive Location Tracking and Activity Monitoring using WSN for Ubiquitous Healthcare

  • Singh, Vinay Kumar;Lee, Seung-Chul;Lim, Hyo-Taek;Myllyla, Risto;Chung, Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.382-388
    • /
    • 2007
  • Indoor location system using wireless sensor network technology was applied for the status evaluation and activity monitoring of elderly person or chronic invalid at home. Location awareness application is transparent to the daily activities, while providing the embedded computing infrastructure with an awareness of what is happening in this space. To locate an object, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. By using only the sensor nodes without any external network infrastructure the cost of the system was reduced while the accuracy in our experiments. was fairly good and fine grained between 7 and 15 cm for location awareness in indoor environments. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object and several applications are enabled for context awareness.

Elderly Public Housing in the U.S. - A Study on the Environmental Conditions and Resident Needs - (미국 고령자용 공공임대주택 거주노인들의 주거환경실태 및 요구 - 미조리주 콜럼비아시 사례를 중심으로 -)

  • Park, Jung-A;Kim, Sang-Hee;Yoon, So-Yeon
    • Journal of the Korean housing association
    • /
    • v.20 no.5
    • /
    • pp.41-50
    • /
    • 2009
  • This case study is an effort to provide new knowledge on the U.S. elderly public housing focusing on the residents' perceptions of the environmental conditions. For this study, we conducted a survey using written questionnaires and interviews with 20 residents who rent in Columbia, MO. The recorded interview data was used for final analysis; primary findings are as follows: The residents reported relatively high satisfaction on their overall environmental conditions in the two target public housing, built in 1950s. As the most significant problem, residents perceive the lack of storage space for individual units, Partially attributed to space limitations. In addition, bathroom needs varied dramatically among residents based on their health and whether wheelchairs are used. Therefore, it was found that instead of standardized bathrooms, a customizable configuration for the resident's unique physical condition and accessibility must be considered. The residents also addressed their concerns about security for entrance and foyer areas. Due to the small living areas, they wanted to have available outdoor public space for various social activities. Furthermore, they reported the need for small social gathering areas while friends and family members are visiting them, in addition to their small living units, which average 49.8 sq. ft. each.

Exploiting Correlation Characteristics to Detect Covert digital communication

  • Huang, Shuhua;Liu, Weiwei;Liu, Guangjie;Dai, Yuewei;Tian, Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3550-3566
    • /
    • 2020
  • As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.

Lightweight Acknowledgement-Based Method to Detect Misbehavior in MANETs

  • Heydari, Vahid;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5150-5169
    • /
    • 2015
  • Mobile Ad hoc NETworks (MANETs) are the best choice when mobility, scalability, and decentralized network infrastructure are needed. Because of critical mission applications of MANETs, network security is the vital requirement. Most routing protocols in MANETs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise MANETs by inserting misbehaving nodes into the network that make blackhole attacks. Previous research to detect the misbehaving nodes in MANETs used the overhearing methods, or additional ACKnowledgement (ACK) packets to confirm the reception of data packets. In this paper a special lightweight acknowledgement-based method is developed that, contrary to existing methods, it uses ACK packets of MAC layer instead of adding new ACK packets to the network layer for confirmations. In fact, this novel method, named PIGACK, uses ACK packets of MAC 802.11 to piggyback confirmations from a receiver to a sender in the same transmission duration that the sender sends a data packet to the receiver. Analytical and simulation results show that the proposed method considerably decreases the network overhead and increases the packet delivery ratio compared to the well-known method (2ACK).

A Study Privacy and Security in Ubiquitous City Environment (Focous on Computing Values Analysis of Personal Information) (유비쿼터스 도시 환경에서 프라시버시 보호 방안에 관한 소고 - 경쟁하는 개인정보가치 분석을 중심으로 -)

  • Jung Chang-Duk;Kang Jang-Mook
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.249-254
    • /
    • 2006
  • As the concept of Ubiquitous City has become an important issue, we need to have a voice in the field of privacy. The Ubiquitous Computing revolution, it is achieved a physical space and an intelligent union of cyber space in the space where an off-line space was integrated with on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. According to the recent papers and studies, Privacy or Personal Information sector is mentioned as a major problem for Ubiquitous Computing Society. Therefore, this paper checks Ubiquitous City, the present privacy concept and situation of currently proceeding Ubiquitous computing environment. Also, The main purpose of this paper is to analyze the concepts privacy, personal information. Thus this paper treated the analysis of case, technological or social issue, problem and solution, competing values of privacy and so on.

  • PDF