• Title/Summary/Keyword: Security RoadMap

Search Result 29, Processing Time 0.021 seconds

Development of Hazard Prediction Map S/W for Mountain River Road (산지하천도로 재해지도 작성을 위한 SW 개발)

  • Jang, Dae Won;Yang, Dong Min;Kim, Ki Hong
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.1
    • /
    • pp.75-80
    • /
    • 2009
  • The objectives of this research are to develop hazard prediction map S/W for mountain river road. This mountain river road disaster happens by debris flow, landslide, debris accumulation and this cause are locally rainfall and heavy rainfall. System is constructed to GIS base. This research app lied to Kangwondo. We developed protocol to analyze calamity danger in mountain district area and examined propriety system. Furthermore examined the DB required and expression plan for hazard map creation SW construction by mountain rivers road.

  • PDF

Complex Disaster Risk Assessment of Local Road using a Landslide Hazard Map (산사태위험지도를 이용한 도로중심 복합재난 위험도 평가)

  • Kim, Min-Ho;Jang, Chang-Deok;Jun, Kye-Won
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.31-40
    • /
    • 2022
  • Domestic disaster risk maps are mainly produced and studied as a single disaster map by grid unit and disaster type. In particular, it is necessary to present an evaluation method of the disaster risk map that is more suitable for the relevant facility (local road) in order to utilize the work of practitioners who are mainly in charge of facility maintenance. In this study, an evaluation method was presented to evaluate the risk with a focus on local roads by using the landslide risk map and debris flow risk map provided by the Korea Forest Service. In addition, the risk was evaluated and verified for the provinces located in Gangwon-do. As a result of the evaluation, it was possible to evaluate the risk of grades 1 to 5 for 1,513 evaluation sections in the evaluation section with a total length of 234.59 km.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

Using GIS to Find the Best Safe Route between Khartoum and Arqin-Crossing

  • Mumdouh M.M Hassan
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.43-52
    • /
    • 2023
  • The paper aims to clarify how to make a decision using geographic information systems and how to choose the best route between two cities to suit the expectations of the driver and his sense of safety and comfort on the road. Use a special model for network analysis, where the network analysis tool relied on the following data (maximum speed of the road - number of intersections - road width - peak period) in choosing the best safe path. The paper concluded that the best safe route for refugees between the cities of Khartoum - Arqin crossing is ( Khartoum - Shendi - Atbara - Meroe - Abu Hamad - Wadi Halfa). We advise all GIS users to use the theories of spatial analysis when creating a new model.

Road Map for ROK-US Alliance Readjustment with the Changing Security Environment (안보환경 변화에 따른 한미동맹 조정 로드맵)

  • Park, Won Gon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.577-589
    • /
    • 2018
  • The future of ROK-US alliance has not been discussed in detail by both governments since early 2000s. However, it is becoming more apparent that ROK-US alliance is facing various daunting challenges. The new administrations both in ROK and US might have different perspectives about the future of alliance. In the process of resolving outstanding North Korean nuclear issue, the alliance can face challenges to change its fundamental features such as halting joint military exercise. ROK-US governments also agreed to transfer wartime operational control as soon as possible. All those factors indicates the growing necessity to articulate the future of ROK-US alliance. ROK and US needs to facilitate to dialogue for future alliance with the possible scenarios of changing security environment such as maintaining status quo, reconciliation of North and South Korea, and entering the reunification stage. In each phase, ROK-US has to develop the goal for the alliance, military institution to implement the alliance, role of USFK, and etc. It is imperative to develop the road map for future ROK-US alliance at this stage to avoid unnecessary folly.

Design of Security RoadMap for C4I System (C4I 시스템 보안 로드맵 설계)

  • Lee, Gang-Taek;Lee, Dong-Hwi;Yang, Jae-Su;J. Kim, Kui-Nam;Park, Sang-Min
    • Convergence Security Journal
    • /
    • v.6 no.4
    • /
    • pp.113-120
    • /
    • 2006
  • C4I system is the centerpiece of the military force. The system is an information based system which facilitates information grid, collection of data and dissemination of the information. The C4I system seeks to assure information dominance by linking warfighting elements in the battlespace to information network which enables sharing of battlespace information and awareness; thereby shifting concept of warfare from platform-centric paradigm to Network Centric Warfare. Although, it is evident that C4I system is a constant target from the adversaries, the issues of vulnerability via cyberspace from attack still remains. Therefore, the protection of C4I system is critical. The roadmap I have constructed in this paper will guide through the direction to protect the system during peace and war time. Moreover, it will propose vision, objectives and necessary supporting framework to secure the system from the threat. In order to fulfill these tasks, enhanced investments and plans from the Joint chief of Staff and Defense of Acquisition and Program Administration (DAPA) is critical; thereby enabling the establishment of rapid and efficient security system.

  • PDF

Proposed Message Transit Buffer Management Model for Nodes in Vehicular Delay-Tolerant Network

  • Gballou Yao, Theophile;Kimou Kouadio, Prosper;Tiecoura, Yves;Toure Kidjegbo, Augustin
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.153-163
    • /
    • 2023
  • This study is situated in the context of intelligent transport systems, where in-vehicle devices assist drivers to avoid accidents and therefore improve road safety. The vehicles present in a given area form an ad' hoc network of vehicles called vehicular ad' hoc network. In this type of network, the nodes are mobile vehicles and the messages exchanged are messages to warn about obstacles that may hinder the correct driving. Node mobilities make it impossible for inter-node communication to be end-to-end. Recognizing this characteristic has led to delay-tolerant vehicular networks. Embedded devices have small buffers (memory) to hold messages that a node needs to transmit when no other node is within its visibility range for transmission. The performance of a vehicular delay-tolerant network is closely tied to the successful management of the nodes' transit buffer. In this paper, we propose a message transit buffer management model for nodes in vehicular delay tolerant networks. This model consists in setting up, on the one hand, a policy of dropping messages from the buffer when the buffer is full and must receive a new message. This drop policy is based on the concept of intermediate node to destination, queues and priority class of service. It is also based on the properties of the message (size, weight, number of hops, number of replications, remaining time-to-live, etc.). On the other hand, the model defines the policy for selecting the message to be transmitted. The proposed model was evaluated with the ONE opportunistic network simulator based on a 4000m x 4000m area of downtown Bouaké in Côte d'Ivoire. The map data were imported using the Open Street Map tool. The results obtained show that our model improves the delivery ratio of security alert messages, reduces their delivery delay and network overload compared to the existing model. This improvement in communication within a network of vehicles can contribute to the improvement of road safety.

Methodology of Identifying Crime Vulnerable Road and Intersection Using Digital Map Version 2.0 (수치지도 2.0을 이용한 범죄 취약도로 및 교차점 식별기법)

  • Kim, Eui Myoung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.4
    • /
    • pp.135-142
    • /
    • 2014
  • As interest in social safety has recently increased at the national level, the various activities which can effectively prevent crimes are being carried out. Because the existing maps related to crimes provide the information about the present condition of crimes by administrative district for users, women and pedestrians who go by night could not actually grasp safe roads in advance. Therefore, this study developed the methodology that can easily extract dangerous areas due to crimes by the digital map 2.0. In the digital map 2.0, location and attribute information of center-lines of roads and building layers were used to find dangerous areas of crimes in these layers. Pavement materials and road width which are already built by the attribute information were used in the center-lines of roads. Crossing angles that roads and roads cross each other were additionally extracted and utilized. The attribute information about building types were input in the building layers of the digital map 2.0. The areas that are more the threshold values set by totaling up all the risk scores when considering pavement materials, road width, crossing angles of road, and building types in the center-lines of roads and road crossings were extracted as the dangerous areas that crimes can occur. Verification of the developed methodology was done by experiment. In the spatial apsect, the dangerous areas of crimes could be found by using the digital 2.0, roads, and building layers only through the experiment. In the administrative aspect to prevent crimes, additional installation of safety facilities such as street lights and security lights in the identified areas which are vulnerable for crimes is thought to be increasing safety of dangerous areas.

An Estimation Method for Location Coordinate of Object in Image Using Single Camera and GPS (단일 카메라와 GPS를 이용한 영상 내 객체 위치 좌표 추정 기법)

  • Seung, Teak-Young;Kwon, Gi-Chang;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.112-121
    • /
    • 2016
  • ADAS(Advanced Driver Assistance Systems) and street furniture information collecting car like as MMS(Mobile Mapping System), they require object location estimation method for recognizing spatial information of object in road images. But, the case of conventional methods, these methods require additional hardware module for gathering spatial information of object and have high computational complexity. In this paper, for a coordinate of road sign in single camera image, a position estimation scheme of object in road images is proposed using the relationship between the pixel and object size in real world. In this scheme, coordinate value and direction are used to get coordinate value of a road sign in images after estimating the equation related on pixel and real size of road sign. By experiments with test video set, it is confirmed that proposed method has high accuracy for mapping estimated object coordinate into commercial map. Therefore, proposed method can be used for MMS in commercial region.