• Title/Summary/Keyword: Security Target

Search Result 693, Processing Time 0.035 seconds

The Effects of Sight Alignment Method on Pistol Shooting Records of Security Guard (경호요원 권총사격시 조준선정렬방식과 기록변화와의 관계)

  • Lee, Sang-Chul;Shin, Seung-Cheol
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.367-388
    • /
    • 2007
  • Some of individuals working at various fields of security guard are given the legal right to use a gun to cope with expected risks and crimes. Not only in Korea but also throughout the world, a pistol is being used as a device for the workers of security guard such as the army, the police and intelligence agencies to keep the law and social order. A pistol, which is regarded as the last safety measure of security guard, is easy to carry but, because of its short barrel for high portability, its hit ratio and long-range shooting performance are much lower than ordinary guns. Despite such weak points, a pistol can be a great tool because of its high portability and if the users make steady efforts to improve their skills and, for this reason, it has been being used widely until now. National agency workers' pistol shooting skills depend on several important factors, but for the fast and accurate shooting, the mot important factor is how to aim at the target. Because it takes a relatively longer time to align the sight on the target, the change of the sight alignment method is expected to improve pistol shooting skills a lot. In Korea, however, most of national agency training centers teach the basic aiming method that crosses the foresight and the backsight and aligns the crossing to the target. That is, they teach the sight alignment method for fixed targets. Some agencies in Korea and foreign countries that have used guns more frequently and longer than us are teaching different sight alignment methods as well. Representative ones of them are aiming only with the foresight and pointing shooting. These aiming methods are expected to produce good results against moving targets. While the basic sight alignment method has to cross the foresight and the backsight and then to align the crossing to the target, so takes a longer time than other aiming methods, the other two aiming methods are expected to be effective in fields where both swiftness and accuracy are require. Because domestic agencies are teaching mainly the basic sight alignment method, the present study purposed to examine the effects of different aiming methods on shooting records and ultimately to contribute to national agency workers' operation. For this purpose, we selected 20 policemen from local police commandos under the National Police Agency who were accustomed to pistol shooting and measured their pistol shooting. According to the results, the pointed shooting method showed the best record in 5m short.range shooting. As to hit ratio in 15m shooting, which is relatively long.range for pistol shooting, the basic aiming method showed the best record, but the results of statistical analysis showed that pointed shooting is most superior. Of course, the results were obtained from a group who were used to and skillful in pistol shooting, but they are considered meaningful in that all the police and national agency workers should have such high shooting skills.

  • PDF

An Certification and a Location Tracing Protect Model on RFID (RFID 시스템에서의 인증 및 위치추적 방지 모델)

  • Kim, Jin-Mook;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.6 no.1
    • /
    • pp.33-43
    • /
    • 2006
  • RFID System has an advantage that it need not touch an objects for identification of many objects. Because it is working through wireless communication. Also, So many objects can be identified with RFID System at once. However, although RFID System has convenience like above, it has serious privacy concern at the same time. If RFID System is working with an target object through wireless communication, other objects will respond to RFID System signal as well as a target object. Hence, RFID System can be easily exposed user privacy by attacker. In this paper, We propose RFID system authentication model in order to protecting user privacy and traking. Proposed RFID system is operating that not only server authenticate RFID reader but also RFID reader and tag authenticate mutually by using symetric cryptography that operating with tiny and simple processing.

  • PDF

Study of Information Hiding Methods for SONAR Images in the Naval Combat System (정보은닉기법을 적용한 함정 전투체계 소나 영상의 정보관리 방안 연구)

  • Lee, Joon-Ho;Shin, Sang-Ho;Jung, Ki-Hyun;Yoo, Kee-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.6
    • /
    • pp.779-788
    • /
    • 2015
  • The SONAR waterfall image(SWI) is used typically to target detection in SONAR operation and is managed with additional data linked in the naval combat system. The SWI and additional data are very important to classify a kind of target. Although additional data of the SWI is essential and must be kept together with the SWI, it was stored separately in the current system. In this paper, we propose an improved information management method in the naval combat system, where additional data can be contained in the SWI together by using information hiding techniques. The experimental results show that the effectiveness of information hiding techniques in the naval combat system. It is demonstrated that the information hiding techniques can be applied to the SWI that can make the naval combat system to be robust and secure.

Memory Injection Technique and Injected DLL Analysis Technique in Windows Environment (윈도우 환경에서의 메모리 인젝션 기술과 인젝션 된 DLL 분석 기술)

  • Hwang, Hyun-Uk;Chae, Jong-Ho;Yun, Young-Tae
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.59-67
    • /
    • 2006
  • Recently the Personal Computer hacking and game hacking for the purpose of gaining an economic profit is increased in Windows system. Malicious code often uses methods which inject dll or code into memory in target process for using covert channel for communicating among them, bypassing secure products like personal firewalls and obtaining sensitive information in system. This paper analyzes the technique for injecting and executing code into memory area in target process. In addition, this analyzes the PE format and IMPORT table for extracting injected dll in running process in affected system and describes a method for extracting and analyzing explicitly loaded dll files related with running process. This technique is useful for finding and analyzing infected processes in affected system.

  • PDF

An Analysis of the Case Study on Fashion Show Planning and Production (패션쇼 연출기획의 사례분석연구)

  • 오현남;김현주
    • Journal of the Korean Home Economics Association
    • /
    • v.41 no.11
    • /
    • pp.11-20
    • /
    • 2003
  • The purpose of this study is : first, to examine factors of fashion show planning and production and to classify types of fashion show planning and production: second, to compare and analyze the factors through a case analysis to defined their differences. For the purpose, data are collected to compare and analyze from literature as well as the interview with fashion show planning and production companies in Korea. The result shows that all the factors are considered on a practical level except security and publicity among 15 factors presented in literature : the purpose of the show, target spectators, product selection, product prices, type of show, size, location, models, time of show, duration, theme, security, budget, and publicity. Show types are divided into national brands, designer brands, imported brands, and collections. The result of the comparison and analysis of the factors of the planning and production by type shows that factors vary greatly depending on the purpose of the show, target spectators, and form of the show and products. By analyzing the case study on fashion show planning and production on a practical level, the study recognizing the need of specialized development of fashion show planning in Korea's fashion industry, is a basic process of theory systematization for the planning and production in its marketing aspects, and will provide relevant theories in such aspects for those who want to enter into the field.

A Study on the Seeker Technology in Guided Weapon System (유도무기체계 탐색기 기술에 관한 연구)

  • Lee, Young-Uk
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.103-109
    • /
    • 2008
  • In this paper, a study on the seeker technology in guided weapon system development. Seeker is guided weapons mounted on the device that is targeted for implementation homing guided looking for confirmation of the target after picking up, tracking, command, induce calculations necessary to induce the target's direction or control device to provide location information to perform a series of features. Therefore, the Seeker is guided weapons systems and important device that determines the performance of one guided control. Explorer is a tactical and strategy guided weapons from different goals and specifications of weapons systems development and encourage economic efficiency, Interoperability, designed to improve the reliability and hit requirements and the more numerous. Therefore, this research through the Explorer's attributes and weapons systems encourage the development direction of the technical details of the offer.

  • PDF

User Behavior Based Web Attack Detection in the Face of Camouflage (정상 사용자로 위장한 웹 공격 탐지 목적의 사용자 행위 분석 기법)

  • Shin, MinSik;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.365-371
    • /
    • 2021
  • With the rapid growth in Internet users, web applications are becoming the main target of hackers. Most previous WAFs (Web Application Firewalls) target every single HTTP request packet rather than the overall behavior of the attacker, and are known to be difficult to detect new types of attacks. In this paper, we propose a web attack detection system based on user behavior using machine learning to detect attacks of unknown patterns. In order to define user behavior, we focus on features excluding areas where an attacker can camouflage as a normal user. The experimental results shows that by using the path and query information to define users' behaviors, best results for an accuracy of 99% with Decision forest.

The Study of Selecting a Test Area for Validating the Proposal Specification of InSAS(Interferometric Synthetic Aperture Sonar) (간섭계측 합성개구소나 성능 평가를 위한 해상 시험장 선정에 관한 연구)

  • Park, Yosup;Kim, Seong Hyeon;Koh, Jieun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.329-338
    • /
    • 2022
  • This paper provides a case study of development testing and evaluation of design goal of Interferometric SAS (Synthetic Aperture Sonar) system that is developing supported by Civil-Military Technology Cooperation Center in offshore fields. For Deep water operating capabilities evaluation, We have surveyed candidate field, bathymetric mapping and target identification over 200 m depth, East Sea. In testing phase, We have provided environmental information of testing field include water column, seabed and weather condition in real time. And to compare excellency of developing InSAS, we have gather commercial imaging sonar system data with same target. This case study will support the Test Readiness Review of future underwater surveillance system developing via investigate marine testing field environment, testing facilities and planning.

Generation of ship's passage plan based on deep reinforcement learning (심층 강화학습 기반의 선박 항로계획 수립)

  • Hyeong-Tak Lee;Hyun Yang;Ik-Soon Cho
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.11a
    • /
    • pp.230-231
    • /
    • 2023
  • This study proposes a deep reinforcement learning-based algorithm to automatically generate a ship's passage plan. First, Busan Port and Gwangyang Port were selected as target areas, and a container ship with a draft of 16m was designated as the target vessel. The experimental results showed that the ship's passage plan generated using deep reinforcement learning was more efficient than the Q-learning-based algorithm used in previous research. This algorithm presents a method to generate a ship's passage plan automatically and can contribute to improving maritime safety and efficiency.

  • PDF

Moderating Effect of Online Shopping Experience on Adoption of e-Governance in Rural India

  • Swapnil Undale;Harshali Patil
    • Asia pacific journal of information systems
    • /
    • v.32 no.1
    • /
    • pp.32-50
    • /
    • 2022
  • Technology acceptance is one of the most popular research areas. Rapid developments in technology are making human life more comfortable. However, still most of the rural area has been deprived of benefits of technological advancement. Seventy percent population of India resides in rural area. Leveraging the improved penetration of the internet; mobile friendly population in rural India has been increasingly shopping online in the last few years. e-Governance is one of the important vehicles to provide efficient services to the citizens by Governments. One major obstacle is acceptance of e-Governance platforms by the citizens. Considering the increasing trend of using e-Commerce in rural area, this paper attempts to investigate moderating effect of online shopping experience on intention to use e-Governance portals. We surveyed 365 villagers across Maharashtra: one of the leading states in India. The result confirmed online shopping experience moderates the relationship between: 'perceived security & privacy' and 'attitude'; 'perceived security & privacy' and 'intention to use'; 'Perceived usefulness' and 'attitude'; and, 'attitude' and 'intention to use'. In this study definition of moderating variable 'experience' is unique and different than most of the popular studies. We defined experience as: 'prior use of any application of technology similar to the target application of technology'. Whereas prior studies considered experience as prior experience with target application of the technology.