• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.026 seconds

Stepwise process of Military force acquisition strategy considering Defense Planning and Management System (국방기획관리체계를 고려한 단위사업획득전략의 단계화 작성방안 - '사업추진기본전략'을 중심으로 -)

  • Shin, Hee-Rae
    • Journal of National Security and Military Science
    • /
    • s.13
    • /
    • pp.109-136
    • /
    • 2016
  • Define the importance and role of the acquisition strategy based on the Defense Acquisition Management System, diagnose and analyze the actual state of document preparation. We analyzed the timing and details of the basic strategy of the project in 2015 and suggested a supplementary plan to improve the efficiency of Military force improvement projects in conjunction with the Defense Planning and Management System. It is necessary to reduce the preparation period including the policy decision making process and then divide it into planning and programming stages to complement the role of acquisition strategy. In order to apply these improvements, the necessary revision of laws and regulations to be reviewed is referred to, enabling continuous research.

  • PDF

Modeling and simulation of CNP-applied network security models with application of fuzzy rule-based system (퍼지를 적용한 계약망 프로토콜 기반의 네트워크 보안 모델의 설계 및 시뮬레이션)

  • Lee Jin-ah;Cho Tae-ho
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.1
    • /
    • pp.9-18
    • /
    • 2005
  • Attempts to attack hosts in the network have become diverse, due to crackers developments of new creative attacking methods. Under these circumstances the role of intrusion detection system as a security system component gets considerably importance. Therefore, in this paper, we have suggested multiple intrusion detection system based on the contract net protocol which provides the communication among multiple agents. In this architecture, fuzzy rule based system has been applied for agent selection among agents competing for being activated. The simulation models are designed and implemented based on DEVS formalism which is theoretically well grounded means of expressing discrete event simulation models.

  • PDF

The Countermeasure to Explosives on World Cup Stadiums (월드컵 경기장에 대한 폭발물 안전대책)

  • Kim, Myung-Gon
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.61-81
    • /
    • 1999
  • While the progress of preparation for the 2002 World Cup games goes on the environment is changing by industrializations development of science and specialization of technology, because of that recently the crime has also became intellectual so the importance on countermeasure of safety has raised. The countermeasure for safety The stadium is a limited space where amount of population could be concentrated, so that in a moment there could be a great casualties by terrorism, specially there should be efficient countermeasures for bomb terrorism. So to be prepared for the problems that had been appeared on bomb terrorism activities of North Korea around the world, we should know about the inspection environment and special inspection environment, and for the prevention first of all I've studied on suitable way to inspect the stadiums secondly to plan on specialized training of the necessary personnel on inspection and finally efficiency of use on inspection equipment. With there following plans we could make perfect safety countermeasures focused on prevention for the successful World Cup games.

  • PDF

State Estimation Method and MMI Format of KEPCO EMS (한전(韓電)EMS의 상태추정기법(狀態推定技法)과 MMI 형식(形式))

  • Lee, Kyung-Jae;Yu, Sung-Chul;Kim, Yeong-Han;Lee, Hyo-Sang
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.866-869
    • /
    • 1988
  • In the operation of a power system, the security of the system has acquired significant importance to supply electric power of better quality. The State Estimator, a part of security functions, provides a complete real time solution estimate of the steady-state conditions of the power system for use by the Real Time Network Analysis functions. This paper briefly introduces the Fast Decoupled Weighted Least Square State Estimator which is adopted in the KEPCO EMS with features of Man-Machine Interface.

  • PDF

The History of Sniping Combat Scenes and Future Prospects (저격전의 역사와 미래전망)

  • Yang, Tae-Kyu
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.281-350
    • /
    • 2007
  • The purpose of this study is to survey the circumstances of sniping warfare and to prove the importance of usage of snipers. The research method was referred to the history of foreign warfares and autobiographies, articles, and testimonies of snipers. Also, various news reports were also studied to collect information. The content of this study investigates the circumstances of sniping combat scenes from its first appearance in the world's major warfares to contemporary ones. Also, the research contains the history of weapons, ammunition, rifles, and the principle of rifle shooting including ballistics. We hope this study provides ROK Army and government agencies the foundation of sniping and thereby improving the effectiveness of correspondence to international conflicts and terrorism.

  • PDF

Vulnerability Analysis and Research on Digital Contents Storage System (디지털콘텐츠 저장장치시스템의 취약성 연구)

  • Kim, Jeom-Goo;Kim, Tae-Eun;Choi, Jae-Wan;Kim, Won-Gil;Lee, Joong-Seok
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.35-41
    • /
    • 2007
  • In accordance with increasing of digital contents and rising of property value, the importance of storing equipment system which can store and control essential contents has been maximized, and securer storing equipment system overcoming various vulnerabilities is now required. Therefore, in this paper, we analyzed misuse, abuse, modification, leak, and various vulnerabilities of storing equipment system that might be damaged, and we researched into an intrusion detection & recovery system which can solve potential vulnerabilities.

  • PDF

A Study on Contingency Constrained Optimal Power Flow Algorithm (상정사고를 고려한 최적조류계산 알고리즘에 관한 연구)

  • Joung, Sang-Houn;Chung, Koo-Hyung;Kim, Bal-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.55 no.3
    • /
    • pp.123-127
    • /
    • 2006
  • The recent movement to deregulated and competitive electricity market requires new concepts in applying dispatch algorithms to system operation and planning. As power systems tend to be operated more closely to their ultimate ratings, the role of Contingency Constrained Optimal Power Flow is changed and the importance for security enhancement will be more increased in the new and competitive electricity market. This paper presents a contingency constrained optimal power flow (CCOPF) algorithm. The proposed algorithm maintains the nodal voltage levels and transmission line's power flow within the specified limits before and after a contingency. A case study demonstrates the proposed algorithm with the IEEE-14RTS under N-1 contingency criterion.

Analysis of Freight Big Data using R-Language (화물 배차 빅데이터 분석)

  • Selvaraj, Suganya;Choi, Eunmi
    • Annual Conference of KIPS
    • /
    • 2018.05a
    • /
    • pp.320-322
    • /
    • 2018
  • Data analysis is a process of generating useful information by evaluating real-world raw data for making better decisions in business development. In the freight transport logistics companies, the analysis of freight data is increasingly garnering considerable importance among the users for making better decisions regarding freight cost reductions. Consequently, in this study, we used R programming language to analyze the freight data that are collected from freight transport logistics company. Usually, the freight rate varies based on chosen day of the week. In here, we analyzed and visualized the results such as frequency of cost vs days, frequency of requested goods in ton vs days, frequency of order vs days, and frequency of order status vs days for the last one-year freight data. These analysis results are beneficial in the viewpoint of the users in ordering process.

On Location Security Solutions in Vehicular Ad Hoc Networks

  • Hussain, Rasheed;Son, Junggab;Oh, Heekuck
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.1053-1056
    • /
    • 2012
  • Location information is considered to be of prime importance in Vehicular Ad Hoc NETworks (VANETs) because important decisions are made based on accurate and sound location information. Vehicles exchange their whereabouts in the form of scheduled beacon messages with their neighbors. These messages contain location, speed, time, and lane information etc. In this paper we aim at the location security in VANET and emphasize on the confidentiality and integrity of location information in case of Nonline-of-Sight (NLoS). For location confidentiality we propose a geolock-based mechanism whereas for location integrity we leverage cooperation among neighbors. In case of NLoS, the verifier vehicle asks its one-hop neighbors in an efficient way to verify the claimed location of the node on his behalf. On the basis of trust values and weightage assigned to neighbors, it is decided whether the verification is sound.

Maritime Navigation System: Technological Solutions to Ensure The Safety Of Maritime Navigation

  • Burmaka, Igor;Vorokhobin, Igor;Chimshir, Valentin;Burmaka, Oleksiy;Smyrnova, Iryna;Danylenko, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.141-150
    • /
    • 2021
  • The article assesses the level of navigation safety, in theoretical terms, defines the complexity of managing navigational risks in practice. The issues of assessing the navigational safety have been studied due to the importance and relevance of the issue in question, however, due to the great complexity of the problem under consideration, the article considers and indicates the directions for the development of the solution of the given direction, where, first of all, it became necessary to analyze the issue of assessing the levels of navigation risks when navigating vessels of various types in difficult navigation conditions.