• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.032 seconds

A Study on the Finite Element Analysis and Management Criteria by Applying UPRS Method in the Subway Station (기존 지하철정거장 비개착공법 적용시 유한요소 해석과 관리기준에 관한 연구)

  • Cho, Byeong Joon
    • Journal of Korean Society of Disaster and Security
    • /
    • v.12 no.4
    • /
    • pp.43-52
    • /
    • 2019
  • To analyze the influence on the stability, resulting from application of upgrade pipe roof structure (UPRS) method to the structure existed under subway Station, physical properties of a ground, elasticity and elasto-plastic theories, including displacement analysis of finite elements, stress analysis of finite elements, displacement caused by steel pipe propulsion and internal excavation, and stress change in a steel pipe, were introduced. Then, the influence on structural stability when applying the UPRS method was compared and reviewed based on the construction management standard of the Ministry Land, Infrastructure and Transport and foreign sources, using numerical analysis with a model which assumes that each microelement divided into a structurally stable point consists of the connection of finite points. As a result of the finite element analysis, 7.21 mm maximum displacement, 1/3,950 angular displacement, 70.28 MPa bending compressive stress of steel pipe structure constructed with UPRS (non-excavation) method and 477.38 MPa maximum shear strength were within their allowable standards (25.00 mm, 1/500, 210.00 MPa and 120.00 MPa, respectively), and therefore, the results showed that the design and construction are stable.

Crime Mapping using GIS and Crime Prevention Through Environmental Design (GIS와 범죄예방환경설계 기반의 범죄취약지도 작성)

  • Park, Dong Hyun;Kang, In Joon;Choi, Hyun;Kim, Sang Seok
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.23 no.1
    • /
    • pp.31-37
    • /
    • 2015
  • The recent long-term economic recession and business depression are constantly increasing the occurence of the five major crimes(murder, robbery, rape, theft, violence). When looking into the previously-analyzed characteristics of how the five major crimes are committed, this study understands that the crimes mostly occur in these crime-ridden areas of poor public order and security and, in order to decrease the crime rates of the crime-prone areas, any relevant fields have been emphasizing the application of CPTED. In the light of that, referring to CPTED surveillance factors and the current crime rate data, the study presented ways to help the relevant fields draw up a crime-prone area grade map. In particular, the security center among monitoring elements was visualized by dividing it into point patrol and directed patrol and by dividing it into 3 steps monitoring levels with CCTV and street lights. In addition, we checked the crime rate by zoning through crime statistics occurred in the research areas and established a crime status map. We estimated the weight through AHP analysis on the built monitoring elements and the zoning of the occurred areas, as a result of making a map vulnerable to crime by monitoring steps by overlapping each element, we were able to confirm that 60% of theft, 52% of violence and 33% of rape in the 1st grade area were reduced compared to the 1st step in monitoring Step 3.

A Study on the Problem of Application of Seismic Performance Reinforcement Method for Urban Railways Case of Fiber and Rigid Reinforcement (섬유 및 강성 보강재료 기반 도시철도 내진성능 보강공법적용의 문제점 연구)

  • Ha, Kyoung Hwa;Park, Jae Yil;Kang, Hwi Jin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.1
    • /
    • pp.13-23
    • /
    • 2020
  • In 2005, Urban railway seismic design was introduced in Rep. Of Korea, and many studies on seismic performance evaluation and reinforcement methods were conducted. In accordance with the Enforcement Decree of the Earthquake Disaster Countermeasures Act issued in March 2009, during April 2010 to October 2013, some of local governments established detailed evaluation and reinforcement measures for seismic performance of the urban railway underground structure. Afterwards, the seismic performance reinforcement of the existing urban railway structures was conducted for the sections that a long period of used until the end of 2018, and the reinforcement works are carried out by various methods using the previously studied methods. However, various reinforcing materials and construction methods using have been studied, but the classification research on the construction methods currently applied to reinforcement construction of urban railways is insufficient. The purpose of study is to analysis the cases currently applied to seismic reinforcement construction and to show the characteristics of each construction method, the reasons for its application and problems.

Robust DNA Watermarking based on Coding DNA Sequence (부호 영역 DNA 시퀀스 기반 강인한 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.123-133
    • /
    • 2012
  • This paper discuss about DNA watermarking using coding DNA sequence (CDS) for the authentication, the privacy protection, or the prevention of illegal copy and mutation of DNA sequence and propose a DNA watermarking scheme with the mutation robustness and the animo acid preservation. The proposed scheme selects a number of codons at the regular singularity in coding regions for the embedding target and embeds the watermark for watermarked codons and original codons to be transcribed to the same amino acids. DNA base sequence is the string of 4 characters, {A,G,C,T} ({A,G,C,U} in RNA). We design the codon coding table suitable to watermarking signal processing and transform the codon sequence to integer numerical sequence by this table and re-transform this sequence to floating numerical sequence of circular angle. A codon consists of a consecutive of three bases and 64 codons are transcribed to one from 20 amino acids. We substitute the angle of selected codon to one among the angle range with the same animo acid, which is determined by the watermark bit and the angle difference of adjacent codons. From in silico experiment by using HEXA and ANG sequences, we verified that the proposed scheme is more robust to silent and missense mutations than the conventional scheme and preserve the amino acids of the watermarked codons.

A Design of an AMI System Based on an Extended Home Network for the Smart Grid (스마트 그리드를 위한 확장 홈 네트워크 기반의 AMI 시스템 설계)

  • Hwang, Yu-Jin;Lee, Kwang-Hui
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.7
    • /
    • pp.56-64
    • /
    • 2012
  • A smart grid is the next generation power grid which combines the existing power grid with information technology, so an energy efficient power grid can be provided. In this paper, in order to build an efficient smart grid an AMI system, which gears with the existing home network and provides an user friendly management function, is proposed. The proposed AMI system, which is based on an extended home network, consists of various functional units; smart meters, communication modules, home gateway, security modules, meter data management modules (MDMM), electric power application modules and so on. The proposed home network system, which can reduce electric power consumption and transmit data more effectively, is designed by using IEEE 802.15.4. The extended home gateway can exchange energy consumption information with the outside management system via web services. The proposed AMI system is designed to enable two-way communication between the home gateway and MDMM via the Internet. The AES(Advanced Encryption Standard) algorithm, which is a symmetric block cipher algorithm, is used to ensure secure information exchange. Even though the results in this study could be limited to our experimental environment, the result of the simulation test shows that the proposed system reduces electric power consumption by 4~42% on average compared to the case of using no control.

Study on Management Plan of the Financial Supervisory Service According to Increase of Risk of Household Debts (중소형증권사 Project-Financing 우발채무 확대에 따른 금융감독원 관리방안에 관한 연구)

  • Lee, YunHong
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.4
    • /
    • pp.21-33
    • /
    • 2018
  • In 2018, the real estate markets have hardly been transacted according to the government's tight regulations of real estates, and have the high possibility to reach a low hit due to the hike of loan interest rates following the U. S rise of base money rate. The key profits for the large construction companies mainly come from the overseas plant projects and the domestic non-governmental construction projects. They suffered a lot such as the lowering of their credit ratings due to the large losses caused by the frquent design changes and work delay. Even in the domestic non-governmental construction projects, the general business risks are on the rise due to the property marketing moving over to the decreasing phase. The small and medium sized security companies has realized a lot of operaring profits as they participated in the PF market to make up for the losses in the securities trading business. But, now as the housing market is not so good around the nation except Seoul and the financial states of large construction companies are not good enough, they can face the liquidity crisis if there happens the problems in the PF backed securities which they have handled. As Korean economy experienced the crisis in the savings banks before, it is recommended that Financial Supervisory Service proposes the preemptive control method and supervision direction to overcome the crisis.

A System of Audio Data Analysis and Masking Personal Information Using Audio Partitioning and Artificial Intelligence API (오디오 데이터 내 개인 신상 정보 검출과 마스킹을 위한 인공지능 API의 활용 및 음성 분할 방법의 연구)

  • Kim, TaeYoung;Hong, Ji Won;Kim, Do Hee;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.895-907
    • /
    • 2020
  • With the recent increasing influence of multimedia content other than the text-based content, services that help to process information in content brings us great convenience. These services' representative features are searching and masking the sensitive data. It is not difficult to find the solutions that provide searching and masking function for text information and image. However, even though we recognize the necessity of the technology for searching and masking a part of the audio data, it is not easy to find the solution because of the difficulty of the technology. In this study, we propose web application that provides searching and masking functions for audio data using audio partitioning method. While we are achieving the research goal, we evaluated several speech to text conversion APIs to choose a proper API for our purpose and developed regular expressions for searching sensitive information. Lastly we evaluated the accuracy of the developed searching and masking feature. The contribution of this work is in design and implementation of searching and masking a sensitive information from the audio data by the various functionality proving experiments.

Experimental Study of Collapse Delay Effect of Riprap on Dam Slope (사력댐 사석 보호공의 붕괴 지연 효과에 대한 실험 연구)

  • Jeong, Seokil;Kim, Seung Wook;Kim, Hong Taek;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.1
    • /
    • pp.31-38
    • /
    • 2018
  • The 99.1% of small dam and most of the levees in Korea are soil dam which can be constructed with lower cost and less effort compared with ones made of concrete. However, they are so vulnerable to overflow. Sudden collapses of these strucrues lead to increase flow rate rapidly, which may cause catastrophic problems in downstream regions. In this study, the experimental study on the collapse delay effect of riprap that was laid on slope of soil levee was carried out. A prismatic rectangular open channel was used and three different sizes of the riprap were installed on slope of a scaled earth dam. A new formula for the collapse time of the levee with the installation of riprap was presented, using the previous researches and the dimensional analysis. In this process, an unsteady flow condition was considered to derive the deviation time of the riprap. And additional experiments were conducted to understand the effect of reinforcement of riprap, and it was found that the reinforcement of riprap was more effective than twice sizing of intial riprap. If the collapse time is delayed, EAP (Emergency Action Plan) and forecasting can greatly reduce the degree of flood damage. Also, it will be meaningful that the results of this study are used for river design.

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.

A Proposal of Personal Information DB Encryption Assurance Framework (개인정보 DB 암호화 검증 프레임웍 제안)

  • Ko, Youngdai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.397-409
    • /
    • 2014
  • According to the Personal Information Protection Act(PIPA) which is legislated in March 2011, the individual or company that handles personal information, called Personal information processor, should encrypt some kinds of personal information kept in his Database. For convenience sake we call it DB Encryption in this paper. Law enforcement and the implementation agency accordingly are being strengthen the supervision that the status of DB Encryption is being properly applied and implemented as the PIPA. However, the process of DB Encryption is very complicate and difficult as well as there are many factors to consider in reality. For example, there are so many considerations and requirements in the process of DB Encryption like pre-analysis and design, real application and test, etc.. And also there are surely points to be considered in related system components, business process and time and costs. Like this, although there are plenty of factors significantly associated with DB Encryption, yet more concrete and realistic validation entry seems somewhat lacking. In this paper, we propose a realistic DB Encryption Assurance Framework that it is acceptable and resonable in the performance of the PIPA duty (the aspect of the individual or company) and standard direction of inspection and verification of DB Encryption (the aspect of law enforcement).