• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.033 seconds

Hotspot Analysis of Urban Crime Using Space-Time Scan Statistics (시공간검정통계량을 이용한 도시범죄의 핫스팟분석)

  • Jeong, Kyeong-Seok;Moon, Tae-Heon;Jeong, Jae-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.13 no.3
    • /
    • pp.14-28
    • /
    • 2010
  • The aim of this study is to investigate crime hotspot areas using the spatio-temporal cluster analysis which is possible to search simultaneously time range as well as space range as an alternative method of existing hotspot analysis only identifying crime occurrence distribution patterns in urban area. As for research method, first, crime data were collected from criminal registers provided by official police authority in M city, Gyeongnam and crime occurrence patterns were drafted on a map by using Geographic Information Systems(GIS). Second, by utilizing Ripley K-function and Space-Time Scan Statistics analysis, the spatio-temporal distribution of crime was examined. The results showed that the risk of crime was significantly clustered at relatively few places and the spatio-temporal clustered areas of crime were different from those predicted by existing spatial hotspot analysis such as kernel density analysis and k-means clustering analysis. Finally, it is expected that the results of this study can be not only utilized as a valuable reference data for establishing urban planning and crime prevention through environmental design(CPTED), but also made available for the allocation of police resources and the improvement of public security services.

A Study on the Placeness of Vacant Houses in the Street of Historical Culture - Focused on HangZhou Zhongshan Road - (역사문화거리 빈집의 장소성에 관한 연구 -중국 항저우 중산로를 중심으로-)

  • Wang, Hui-Hui;Hong, Kwan-Seon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.617-629
    • /
    • 2020
  • In the historical and cultural blocks with the most concentrated urban cultural heritage, the development of both side streets is impacted by the development of the main street, which shows a gradual decline. The loss of placeness on both side streets has resulted in more empty houses. Therefore, it is urgent to pay attention and take countermeasures to the empty houses in historical and cultural blocks. In this study, the vacant houses on Zhongshan Road in Hangzhou, China were taken as the object of study to understand the location theory and the six dimensions of Matthew Carmona's urban design. Meanwhile, it further analyzed the evaluative features of the placeness of the vacant houses in the historical and cultural street, to provide direction and basis for the flexible using of other empty houses in Zhongshan Road. Then by applying the Analytic Hierarchy Process (AHP), it obtained the importance scale of each evaluative feature and compared the evaluation results of experts with the analysis results of cases, getting the results as follows: In the flexible application of vacant houses in historical and cultural street, the evaluation result of placeness indicates that this kind of usage should be in order of societal level, perceptional level, functional level, morphological level, visual hierarchy and temporal level; among the evaluative features, security, identity, usability, individuality, aesthetics, connection, diversity, openness, continuity, accessibility, order and history should be considered in turn.

The Attitude of the Korean Television Drama in Mongolia Market Impact Korea Country Image, Corporate and Product's Image Formation (몽골 시장에서 한국 드라마에 대한 태도가 한국 국가 이미지, 기업 및 제품 이미지 형성에 미치는 영향 연구)

  • Odmandakh, Batsukh;Lee, Kee-Sung;Jin, Chang-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.12
    • /
    • pp.223-232
    • /
    • 2016
  • The purpose of the study is to explore the attitude of the Korean television drama in mongolia market impact Korea country image, corporate and product's image formation. The research is conducted effects of Korean image, its company, product and belief of its product and influence of procurement of Korean products in Mongolia in terms of Mongolian has enormously watched Korean drama since latest of 1990. Korean drama can influence Korean products image. Watching Kore and rama can influence view of Mongolian in quality of Korean products, design etc. Korean dramas can affect images of Korean company. Watching Korean drama can influence opinion of Mongolian in staff, culture, level of technique of Korean company moreover, competitiveness of Korean company in international market and etc. Korean drama can influence Korean image. Watching Korean drama can reach aspect of Mongolian in Korean education level, national security, reconstruction and income of population and etc. The most effective factor in product reliability and procurement was country image but company image can not influence that. In conclusion according to survey result within Mongolian customers that Korean drama has some influence in Korean image, its company image, product image, and product reliability and procurement of Korean product.

An Investigation of Social Commerce Service Quality on Consumer's Satisfaction (소셜커머스의 서비스품질과 소비자 만족도의 상관관계 분석)

  • Shin, Seung-Soo;Shin, Miyea;Jeong, Yoon-Su;Lee, Jihea
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.27-32
    • /
    • 2015
  • Recently, service-related products have gained more attention than general products on the existing social commerce sites. Based on the situation, the effect that the service quality of social commerce has on customer satisfaction was analyzed in this study. It is a study that analyzes how much the service quality affects the customer satisfaction after the purchase, targeting consumers who have made purchases of social commerce products. In the case of social commerce, it is well-known that the diversity and convenience of products have a significant effect on customer satisfaction. Social commerce is currently being dumped beyond the 900 sites and dozens of cases of news, real-time searches of popular portal sites appeared not to be bored enough to related sites to drive the popularity coming quickly dug into our everyday lives of human beings. Yet the perception of social commerce seems not properly established because of the new concept was suddenly going to go through penetration without a collective interpretation and acceptance process. Most of the companies that often mimic the syoseol commerce is large, the blame did not depart from the forms of social shopping. We believe that personal and exhibit their skills and talents, and to wonder to see the social rather than the individuals who make unilateral companies.

  • PDF

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

The Experimental Study on Transverse Field Joint Method of Precast Road Deck Slab of Double Deck Tunnel in Great Depth (대심도 복층터널 프리캐스트 중간슬래브의 횡방향 현장이음방식에 대한 실험연구)

  • Lee, Doo-Sung;Kim, Bo-Yeon;Bae, Chul-Gi;Hur, Jae-Hun
    • Journal of the Korea Concrete Institute
    • /
    • v.29 no.1
    • /
    • pp.23-32
    • /
    • 2017
  • The joints between precast PSC slabs of the intermediate road slab in double deck tunnel are inevitably generated in the road traffic vehicle traveling direction. Therefore, it is important to make the behavior of parts on the joint in one piece. The imtermediate road slab system of double deck tunnel in great depth proposed in this study will be constructed with precast PSC slab in order to minimize the construction period. And the joint connection between the precast slab has been developed in two methods: the 'Transverse tendon reinforcement method' and 'High strength bolts connection method'. Also, the experiments were performed for the full scale model in order to evaluate the performance of the intermediate road deck slab with two type joints systems, the structural stability was verified through the F.E.M analsysis. The results of static loading test and F.E.M analysis investigated a very stable behavior of intermediate road deck slab in double deck tunnel applying the joint methods developed in this study, in the cracks and deflections to satisfy the design standards of Highway Roads Bridges (2011), it was determined that there is no problem even servicebility.

Implementation of Smartphone Adaptor for Real-Time Live Simulations (실시간 Live 시뮬레이션을 위한 스마트폰 연동기 구현)

  • Kim, Hyun-Hwi;Lee, Kang-Sun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.1
    • /
    • pp.9-20
    • /
    • 2013
  • Defense M&S for weapons effectiveness is a realistic way to support virtual warfare similar to real warfare. As the war paradigm becomes platform-centric to network-centric, people try to utilize smartphones as the source of sensor, and command/control data in the simulation-based weapons effectiveness analysis. However, there have been limited researches on integrating smartphones into the weapon simulators, partly due to high modeling cost - modeling cost to accomodate client-server architecture, and re-engineering cost to adapt the simulator on various devices and platforms -, lack of efficient mechanisms to exchange large amount of simulation data, and low-level of security. In this paper, we design and implement Smartphone Adaptor to utilize smartphones for the simulationbased weapons effectiveness analysis. Smartphone Adaptor automatically sends sensor information, GPS and motion data of a client's smartphone to a simulator and receives simulation results from the simulator on the server. Also, we make it possible for data to be transferred safely and quickly through JSON and SEED. Smartphone Adaptor is applied to OpenSIM (Open simulation engine for Interoperable Models) which is an integrated simulation environment for weapons effectiveness analysis, under development of our research team. In this paper, we will show Smartphone Adaptor can be used effectively in constructing a Live simulation, with an example of a chemical simulator.

Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks (무선 단말기의 계산 효율성을 고려한 유.무선 통합 네트워크 환경에서의 안전한 그룹 통신)

  • Chang Woo-Suk;Kim Hyun-Jue;Nam Jung-Hyun;Cho Seok-Hyang;Won Dong-Ho;Kim Seung-Joo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.60-71
    • /
    • 2006
  • Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely and efficiently establish a common secret key, Over the years, a number of solutions to the group key agreement protocol have been proposed with varying degrees of complexity, and the research relating to group key agreement to securely communicate among a group of members in integrated wired and wireless networks has been recently proceeded. Both features of wired computing machines with the high-performance and those of wireless devices with the low-power are considered to design a group key agreement protocol suited for integrated wired and wireless networks. Especially, it is important to reduce computational costs of mobile devices which have the limited system resources. In this paper, we present an efficient group key agreement scheme which minimizes the computational costs of mobile devices and is well suited for this network environment and prove its security.

Implementation of the Metadata Registry-based Framework for Semantic Interoperability of Application in Ubiquitous Environment (유비쿼터스 환경에서 어플리케이션의 의미 상호운용성을 위한 메타데이터 레지스트리 기반의 프레임워크 구현)

  • Kim, Jeong-Dong;Jeong, Dong-Won;Kim, Jin-Hyung;Baik, Doo-Kwon
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.1
    • /
    • pp.11-19
    • /
    • 2007
  • Under ubiquitous environment, applications can gather and utilize various sensing information. There are many issues such as energy management, protocol standardization, independency on sensor fields, and security to be resolved for the complete ubiquitous computing. Especially, the independent information access in the sensor field is one of the most important issues to maximize the usability of sensors in various sensor fields. However, existing frameworks are not suitable for the ubiquitous computing environment because of data heterogeneity between data elements in sensor fields. Existing applications are dependent to sensor fields and sensors in the existing ubiquitous computing on environment is dependent to the application in the sensor field. In other word, an application can utilize just information from a specific sensor field. To overcome this restriction, many issues from a hardware or software view must be resolved. In this paper, we provide the design and implementation of the Metadata Registry-based framework (UbiMDR) of the Ubiquitous environment. This framework can provides the semantic interoperability among ubiquitous applications or various sensor fields. In addition, we describe comparison evaluation between conventional Ubiquitous computing framework and UbiMDR framework with data accuracy of interoperability.

  • PDF

Design and evaluation of a VPRS-based misbehavior detection scheme for VANETs (차량애드혹망을 위한 가변정밀도 러프집합 기반 부정행위 탐지 방법의 설계 및 평가)

  • Kim, Chil-Hwa;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1153-1166
    • /
    • 2011
  • Detecting misbehavior in vehicular ad-hoc networks is very important problem with wide range of implications including safety related and congestion avoidance applications. Most misbehavior detection schemes are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners. Because of rational behavior, it is more important to detect false information than to identify misbehaving nodes. In this paper, we propose the variable precision rough sets based misbehavior detection scheme which detects false alert message and misbehaving nodes by observing their action after sending out the alert messages. In the proposed scheme, the alert information system, alert profile is constructed from valid actions of moving nodes in vehicular ad-hoc networks. Once a moving vehicle receives an alert message from another vehicle, it finds out the alert type from the alert message. When the vehicle later receives a beacon from alert raised vehicle after an elapse of time, then it computes the relative classification error by using variable precision rough sets from the alert information system. If the relative classification error is lager than the maximum allowable relative classification error of the alert type, the vehicle decides the message as false alert message. Th performance of the proposed scheme is evaluated as two metrics: correct ratio and incorrect ratio through a simulation.