• Title/Summary/Keyword: Security Target

Search Result 697, Processing Time 0.026 seconds

A Estimation Study on Water Integration Management Model using Water-Energy-Food-Carbon Nexus - Focused on Yeongsan River - (물-에너지-식량-탄소 넥서스를 이용한 통합물관리 모델 평가 연구 - 영산강 수계를 중심으로 -)

  • Na, Ra;Park, Jin-hyeon;Joo, Donghyuk;Kim, Hayoung;Yoo, Seung-Hwan;Oh, Chang-Jo;Lee, Sang-hyun;Oh, Bu-Yeong;Hur, Seung-oh
    • Journal of Korean Society of Rural Planning
    • /
    • v.29 no.1
    • /
    • pp.37-49
    • /
    • 2023
  • Active attention and effort are needed to develop an integrated water management system in response to climate change. In this study, it proposed models for cross-use of agricultural water and river maintenance water using sewage treatment water as an integrated water management system for the Yeongsan River. The impact of the integrated water management models was assessed by applying the concept of Nexus, which is being presented worldwide for sustainable resource management. The target year was set for 2030 and quantitatively analyzed water, energy, land use and carbon emissions and resource availability index by integrated water management models was calculated by applying maximum usable amount by resource. An integrated water management system evaluation model using the Nexus concept developed in this study can play a role that can be viewed in a variety of ways: security and environmental impact assessment of other resources. The results of this research will be used as a foundation for the field of in the establishment of a policy decision support system to evaluate various security policies, as we analyzed changes in other factors according to changes in individual components, taking into account the associations between water, energy, food, and carbon resources. In future studies, additional sub-models need to be built that can be applied flexibly to changes in the future timing of the inter-resource relationship components.

Modeling of Damage Effects Caused by Ammonia Leakage Accidents in Combined Cycle Power Plant (복합화력발전소 내 암모니아 누출 사고에 의한 피해영향 모델링)

  • Eun-Seong Go;Kyeong-Sik Park;Dong-Min Kim;Young-Tai Noh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.3
    • /
    • pp.1-15
    • /
    • 2023
  • This study focuses on modeling the impact of ammonia leakage from the storage tank in a combined cycle power plant's flue gas denitrification facility. It employs accident impact assessments and diffusion models to determine the optimal scenarios for ammonia storage tank leakage accidents. The study considers the operating conditions of variables as standard conditions for predicting the extent of damage. The Taean combined cycle power plant is chosen as the target area, taking into account seasonal factors such as temperature, humidity, wind speed, atmospheric stability, and wind direction. By utilizing a Gaussian diffusion model, the concentration of ammonia gas at various locations is estimated to assess the potential extent of external damage resulting from a leak. The study reveals that in conditions of high temperature and stable atmosphere within the specified range, lower wind speeds contribute to increased damage to the human body due to ammonia diffusion.

Scaling Attack Method for Misalignment Error of Camera-LiDAR Calibration Model (카메라-라이다 융합 모델의 오류 유발을 위한 스케일링 공격 방법)

  • Yi-ji Im;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1099-1110
    • /
    • 2023
  • The recognition system of autonomous driving and robot navigation performs vision work such as object recognition, tracking, and lane detection after multi-sensor fusion to improve performance. Currently, research on a deep learning model based on the fusion of a camera and a lidar sensor is being actively conducted. However, deep learning models are vulnerable to adversarial attacks through modulation of input data. Attacks on the existing multi-sensor-based autonomous driving recognition system are focused on inducing obstacle detection by lowering the confidence score of the object recognition model.However, there is a limitation that an attack is possible only in the target model. In the case of attacks on the sensor fusion stage, errors in vision work after fusion can be cascaded, and this risk needs to be considered. In addition, an attack on LIDAR's point cloud data, which is difficult to judge visually, makes it difficult to determine whether it is an attack. In this study, image scaling-based camera-lidar We propose an attack method that reduces the accuracy of LCCNet, a fusion model (camera-LiDAR calibration model). The proposed method is to perform a scaling attack on the point of the input lidar. As a result of conducting an attack performance experiment by size with a scaling algorithm, an average of more than 77% of fusion errors were caused.

Performance Factors for Delaying Slope Failure through Hydraulic Experiments of Dam Overtopping (댐 월류 수리실험을 통한 사면붕괴지연 성능인자 도출)

  • Sung Woo, Lee;Dong Hyun Kim;Seung Oh Lee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.17 no.2
    • /
    • pp.1-11
    • /
    • 2024
  • Most reservoirs in South Korea are earthen dams, mainly because they are cost-effective and easy to construct. However, earthen dams are highly vulnerable to seepage and overtopping, making them prone to sudden failure during excessive flooding. Such sudden failures can lead to a rapid increase in flood discharge, causing significant damage to downstream rivers and inhabited areas. This study investigates the effect of riprap placement on the slopes of earthen dams in delaying dam failure. Delaying the failure time is crucial as it allows more time for evacuation, significantly reducing potential casualties, which is essential from a disaster response perspective. Hydraulic experiments were conducted in a straight channel, using two different sizes of riprap for protection. Unlike previous studies, these experiments were performed under unsteady flow conditions to reflect the impact of rising water levels inside the dam. The target dam for the study was a cofferdam installed in a diversion tunnel. Experimental results indicated that the presence of riprap protection effectively prevented slope failure under the tested conditions. Without riprap protection, increasing the size of the riprap delayed the failure time. This delay can reduce peak discharge, mitigating damage downstream of the dam. Furthermore, these findings can serve as critical reference material for establishing emergency action plans (EAP) for reservoir failure.

Multiple SL-AVS(Small size & Low power Around View System) Synchronization Maintenance Method (다중 SL-AVS 동기화 유지기법)

  • Park, Hyun-Moon;Park, Soo-Huyn;Seo, Hae-Moon;Park, Woo-Chool
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.73-82
    • /
    • 2009
  • Due to the many advantages including low price, low power consumption, and miniaturization, the CMOS camera has been utilized in many applications, including mobile phones, the automotive industry, medical sciences and sensoring, robotic controls, and research in the security field. In particular, the 360 degree omni-directional camera when utilized in multi-camera applications has displayed issues of software nature, interface communication management, delays, and a complicated image display control. Other issues include energy management problems, and miniaturization of a multi-camera in the hardware field. Traditional CMOS camera systems are comprised of an embedded system that consists of a high-performance MCU enabling a camera to send and receive images and a multi-layer system similar to an individual control system that consists of the camera's high performance Micro Controller Unit. We proposed the SL-AVS (Small Size/Low power Around-View System) to be able to control a camera while collecting image data using a high speed synchronization technique on the foundation of a single layer low performance MCU. It is an initial model of the omni-directional camera that takes images from a 360 view drawing from several CMOS camera utilizing a 110 degree view. We then connected a single MCU with four low-power CMOS cameras and implemented controls that include synchronization, controlling, and transmit/receive functions of individual camera compared with the traditional system. The synchronization of the respective cameras were controlled and then memorized by handling each interrupt through the MCU. We were able to improve the efficiency of data transmission that minimizes re-synchronization amongst a target, the CMOS camera, and the MCU. Further, depending on the choice of users, respective or groups of images divided into 4 domains were then provided with a target. We finally analyzed and compared the performance of the developed camera system including the synchronization and time of data transfer and image data loss, etc.

Counter-terrorism Safety Measures in Public Facilities (다중이용시설의 대테러 안전대책)

  • Kim, Du-Hyun;Ahn, Kwang-Ho
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.37-64
    • /
    • 2010
  • Since the September 11, 2001, the motives and objectives of terrorism that have been targeted at hard targets such as key national facilities have now shifted towards soft targets such as subways, department stores, and tourist hotels; the attacks on these soft targets are steadily increasing. Simultaneous, unconventional, and indiscriminate terrorist attacks on civilians has also increased. In November, 2010, nearly forty states of the G20 and B20 (Business 20) will join in international summits to be hosted in Seoul. This coming July, an additional 350 troops will be deployed to Afghanistan for the sustainment of public security. Such events are sensitive topics, and there is the possibility of terrorist movement. Korea has successfully hosted various international events such as the APEC and ASEM Summits, and the 2002 Korea-Japan World Cup. The experiences from these events must be applied to ensure the safety of public facilities against the dangers of terrorism. First, counter-terrorism center must be established for the long-term, above the General Officer level to ensure the safety and efficiency of multilateral, international summits, as well as promoting policies and legislation aimed at preventing terrorism. Second, a terrorist threat management system must be secured and safety measures must be emphasized. Third, a fundamental structure must be established for the prevention of terrorism on public facilities, as well as legal and government action against the new threat of IED. Fourth, the police and fire fighting networks' must have a firm rapid response posture on the scene of an attack. Fifth, the state of mentality on the recognition of terrorist threats must be changed and restructured by promoting to and educating the population. Sixth, prevention measures must be established via research and academia. Seventh, for the guarantee of security in public facilities, safety management should employ cutting edge technology such as the 3D SICS and further develop and apply such technology. All methods and resources must be fully utilized for the establishment and strengthening terrorism prevention measures.

  • PDF

Road Sign Recognition and Geo-content Creation Schemes for Utilizing Road Sign Information (도로표지 정보 활용을 위한 도로표지 인식 및 지오콘텐츠 생성 기법)

  • Seung, Teak-Young;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.252-263
    • /
    • 2016
  • Road sign is an important street furniture that gives some information such as road conditions, driving direction and condition for a driver. Thus, road sign is a major target of image recognition for self-driving car, ADAS(autonomous vehicle and intelligent driver assistance systems), and ITS(intelligent transport systems). In this paper, an enhanced road sign recognition system is proposed for MMS(Mobile Mapping System) using the single camera and GPS. For the proposed system, first, a road sign recognition scheme is proposed. this scheme is composed of detection and classification step. In the detection step, object candidate regions are extracted in image frames using hybrid road sign detection scheme that is based on color and shape features of road signs. And, in the classification step, the area of candidate regions and road sign template are compared. Second, a Geo-marking scheme for geo-content that is consist of road sign image and coordinate value is proposed. If the serious situation such as car accident is happened, this scheme can protect geographical information of road sign against illegal users. By experiments with test video set, in the three parts that are road sign recognition, coordinate value estimation and geo-marking, it is confirmed that proposed schemes can be used for MMS in commercial area.

Hardware Implementation of Elliptic Curve Scalar Multiplier over GF(2n) with Simple Power Analysis Countermeasure (SPA 대응 기법을 적용한 이진체 위의 타원곡선 스칼라곱셈기의 하드웨어 구현)

  • 김현익;정석원;윤중철
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.9
    • /
    • pp.73-84
    • /
    • 2004
  • This paper suggests a new scalar multiplication algerian to resist SPA which threatens the security of cryptographic primitive on the hardware recently, and discusses how to apply this algerian Our algorithm is better than other SPA countermeasure algorithms aspect to computational efficiency. Since known SPA countermeasure algorithms have dependency of computation. these are difficult to construct parallel architecture efficiently. To solve this problem our algorithm removes dependency and computes a multiplication and a squaring during inversion with parallel architecture in order to minimize loss of performance. We implement hardware logic with VHDL(VHSIC Hardware Description Language) to verify performance. Synthesis tool is Synplify Pro 7.0 and target chip is Xillinx VirtexE XCV2000EFGl156. Total equivalent gate is 60,508 and maximum frequency is 30Mhz. Our scalar multiplier can be applied to digital signature, encryption and decryption, key exchange, etc. It is applied to a embedded-micom it protects SPA and provides efficient computation.

International Benchmarking on Factors Affecting the Number of Country Domain Name (국가도메인 네임 등록 수에 영향을 미치는 요인에 관한 국제 비교)

  • Kim, So-ra;Jun, Hyo-Jung;Kim, Tae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2434-2442
    • /
    • 2015
  • With the arrival of the era of the Internet of Things (IoT), identification of an individual object is gaining significance. Internet address resources such as domain name, IP address, and OID are expected to play the role of an identifier and demand for them is also expected to increase. Accordingly, it becomes important to obtain the Internet address resources. As the Internet address resources market development, Internet address resources at the present time there is a need to gauge whether the potential to develop into industry. For this purpose, we have selected factors affecting the number of country domain name with 18 countries among OECD member countries as research target and carried out a regression analysis.

Vulnerabilities Analysis of the OTP Implemented on a PC (PC에 탑재된 OTP의 취약점 분석)

  • Hong, Woo-Chan;Lee, Kwang-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.361-370
    • /
    • 2010
  • OTP(One Time Password) is a user authentication using secure mechanism to authenticate each other in a way to generate a password, an attacker could intercept the password to masquerade as legitimate users is a way to prevent attacks. The OTP can be implemented as H/W or S/W. Token and card type OTP, implemented as H/W, is difficult to popularize because of having problem with deployment and usability. As a way to replace it implemented as S/W on Mobile or PC is introduced. However, S/W products can be target of malicious attacks if S/W products have vulnerability of implementation. In fact, FSA said the OTP implemented on a mobile have vulnerability of implementation. However, the OTP implemented on a PC have no case about analysis of vulnerability. So, in this paper derive security review and vulnerabilities analysis of implemented on a PC.