• Title/Summary/Keyword: Security element

Search Result 372, Processing Time 0.03 seconds

Crime Mapping using GIS and Crime Prevention Through Environmental Design (GIS와 범죄예방환경설계 기반의 범죄취약지도 작성)

  • Park, Dong Hyun;Kang, In Joon;Choi, Hyun;Kim, Sang Seok
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.23 no.1
    • /
    • pp.31-37
    • /
    • 2015
  • The recent long-term economic recession and business depression are constantly increasing the occurence of the five major crimes(murder, robbery, rape, theft, violence). When looking into the previously-analyzed characteristics of how the five major crimes are committed, this study understands that the crimes mostly occur in these crime-ridden areas of poor public order and security and, in order to decrease the crime rates of the crime-prone areas, any relevant fields have been emphasizing the application of CPTED. In the light of that, referring to CPTED surveillance factors and the current crime rate data, the study presented ways to help the relevant fields draw up a crime-prone area grade map. In particular, the security center among monitoring elements was visualized by dividing it into point patrol and directed patrol and by dividing it into 3 steps monitoring levels with CCTV and street lights. In addition, we checked the crime rate by zoning through crime statistics occurred in the research areas and established a crime status map. We estimated the weight through AHP analysis on the built monitoring elements and the zoning of the occurred areas, as a result of making a map vulnerable to crime by monitoring steps by overlapping each element, we were able to confirm that 60% of theft, 52% of violence and 33% of rape in the 1st grade area were reduced compared to the 1st step in monitoring Step 3.

A Study on Application of Improved Tunnel Water-Sealing Grouting Construction Process and the Inverse Analysis Material Selection Method Using the Injection Processing Results (개선된 터널 차수그라우팅 시공 프로세스 적용 및 그 주입시공결과를 이용한 역해석 재료선정방법 연구)

  • Kim, Jin Chun;Yoo, Byung Sun;Kang, Hee Jin;Choi, Gi Sung;Kim, Seok Hyun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.101-113
    • /
    • 2022
  • This study is planned with the aim of developing a systematic construction process based on the scientific and engineering theory of the water-sealing grouting construction applied to the tunnel excavation process during the construction of the downtown underground traffic network, so that the construction quality of the relatively backward domestic tunnel water-sealing grouting construction is improved and continuously maintained no matter who constructs it. The main contents of the improved tunnel water-sealing grouting can be largely examined in the classification of tunnel water-sealing grouting application and the definition of grouting materials, the correlation analysis of groundwater pressure conditions with groundwater inflow, the study of the characteristic factors of bedrock, and the element technologies and injection management techniques required for grouting construction. Looking at the trends in global research, research in the field of theoretical-based science and engineering grouting is actively progressing in Nordic countries (Sweden, Finland, Norway, etc.), Japan, Germany, and the United States. Therefore, in this study, the algorithm is established through theoretical analysis of the elements of tunnel water-sealing grouting construction techniques to provide an integrated solution including a construction process that can effectively construct tunnel water-sealing grouting construction.

Hate Speech Detection Using Modified Principal Component Analysis and Enhanced Convolution Neural Network on Twitter Dataset

  • Majed, Alowaidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.112-119
    • /
    • 2023
  • Traditionally used for networking computers and communications, the Internet has been evolving from the beginning. Internet is the backbone for many things on the web including social media. The concept of social networking which started in the early 1990s has also been growing with the internet. Social Networking Sites (SNSs) sprung and stayed back to an important element of internet usage mainly due to the services or provisions they allow on the web. Twitter and Facebook have become the primary means by which most individuals keep in touch with others and carry on substantive conversations. These sites allow the posting of photos, videos and support audio and video storage on the sites which can be shared amongst users. Although an attractive option, these provisions have also culminated in issues for these sites like posting offensive material. Though not always, users of SNSs have their share in promoting hate by their words or speeches which is difficult to be curtailed after being uploaded in the media. Hence, this article outlines a process for extracting user reviews from the Twitter corpus in order to identify instances of hate speech. Through the use of MPCA (Modified Principal Component Analysis) and ECNN, we are able to identify instances of hate speech in the text (Enhanced Convolutional Neural Network). With the use of NLP, a fully autonomous system for assessing syntax and meaning can be established (NLP). There is a strong emphasis on pre-processing, feature extraction, and classification. Cleansing the text by removing extra spaces, punctuation, and stop words is what normalization is all about. In the process of extracting features, these features that have already been processed are used. During the feature extraction process, the MPCA algorithm is used. It takes a set of related features and pulls out the ones that tell us the most about the dataset we give itThe proposed categorization method is then put forth as a means of detecting instances of hate speech or abusive language. It is argued that ECNN is superior to other methods for identifying hateful content online. It can take in massive amounts of data and quickly return accurate results, especially for larger datasets. As a result, the proposed MPCA+ECNN algorithm improves not only the F-measure values, but also the accuracy, precision, and recall.

Paradigm of the Transformation of Potential-Forming Space Under the Impact of Intellectual-Innovation Determinants

  • Khanin, Semen;Derhaliuk, Marta;Stavroyany, Serhii;Kudlasevych, Olga;Didkivska, Lesia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.340-346
    • /
    • 2022
  • The article examines the formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants. Based on the study of different scientific views on the nature and properties of potential-forming space through the study of approaches to understanding the concept of "space" clarified the complexity and multifaceted nature of the phenomenon and found that its characteristics are relevant to the industrial development model. It is revealed that the leading modern trends related to the spread of globalization and regionalization, rapid development of information and communication technologies, diffusion of innovations accompany the transition from industrial to post-industrial development and its development, which leads to new development: changes production, nature and relations between business entities, etc. It is proved that under such conditions, the region as a key element of the economic system, acquires a leading role in achieving sustainable and balanced development. These processes significantly affect the potential-forming space of the regional economy under the influence of intellectual and innovative determinants, leading to the need for its transformation and change in accordance with modern realities, which is reflected in thorough research on the formation of scientific paradigm based on the formation of its theoretical foundations and methodological basis. This study reveals the essence, role, functions, structure, process of formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants. It is proved that the formation of the modern scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants occurs in the context of building a post-industrial model of development, accompanied by consideration of the region as a spatial object territories from the physical plane to the spatial environment in which the development of human capital, innovation and self-development of the region. Taking into account the above, the article outlines the prerequisites and factors of formation of the scientific paradigm of transformation of the potential-forming space of the regional economy under the influence of intellectual and innovative determinants.

Ecological Functions and Losses of Traditional Korean Village Groves

  • Lee, D.-W.;Park, C.-R.
    • The Korean Journal of Quaternary Research
    • /
    • v.18 no.2 s.23
    • /
    • pp.65-66
    • /
    • 2004
  • There have been groves, in many cases, along with hedgerows and remnant forests around a traditional Korean village. A village grove is very closely connected to the life of residents. Sometimes it was a holy place where important village festivals were held, and became a resting place for farmers, especially in sunny summer. As a matter of fact, it is noted that traditional Korean village groves had been fostered for many purpose as religion, Confucianism, scenery, sanitation, traffic guard, public security, agriculture, hunting, and military and public uses were included in Chosun Govemor General(1938). Village groves were usually located at the outlet of watershed inside which a village was built. In addition, village groves used to be established along part of mountain ranges, streams and streets. A unique type of village grove, called bibosoop was fostered especially where the outlet of watershed was largely opened. In other cases, it was placed where a part of mountain range was relatively low, or where village residents were likely to see ugly objects such as a huge cliff, stony upland with an unvegetated area and the like(Kim and Jang 1994). In a sense, a sheltebelt is a sort of bibosoop as it is a landscape element to complement places that are exposed to strong winds. However, it is comparable to other typical bibosoop that is situated at a topographically very specific zone of watershed. In this paper, we will address potential functions of Korean village groves from a perspective of modern landscape ecology and show current status of some remnants, based on preliminary surveys. A village grove functions as barrier or filter of objects such as water, nutrients, and other elements and habitat of wildlife (park et al. 2003, Lee 2004). The village grove slows down the flow of water and air, maintains soil moisture an hinders soil erosion, enabling cultivation of crops and bringing up creatures nearby. It contributes to enhancing biodiversity. Birds rest on shrubby and woody trees of the element. Presumably, other organisms may also inhabit the village groves and take advantage of it when those move from a forest patch to others. Emerging insects acclimate themselves in the shade of the green space before they fly to sunny air. Besides the village grove acts as a component of agroforestry system as leaf litter is shed from a grove to an asjacent agricultural area, and transformed into green manure(Lee 2004). By the way, many of the landscape elements were destroyed or declined in Koea during the past several decades. The losses have been parallel or linked to environmental degradation. Unfortunately, we have a little reliable data as for how many groves have disappeared in Korea until now. There has been no complete census on the village groves in Korea, and the viewpoints of survey were to a degree different depending on surveyors. So, it is difficult to analyze the temporal and spatial change of village groves. Currently, national inventory data of Korean village groves are available in three reports. We reviewed the locations of village groves and arranged those according to the present administrative units, DONG. With the limited data, we found that at least 484 of village groves were recorded in South Korea. Among all provinces, village groves were most in Gyeongsanbuk-Do Province and least in Chungcheongbuk-Do Province(Table 1). This is a preliminary report prepared while some quantitative data regarding functions and lossers of the village groves are being collected. More detailed data will be introduced in the near future.

  • PDF

Accessibility Information Element & a PNC Selection Method in the High Rate WPAN (WPAN에서 통신가능성 정보 요소와 PNC 선택 방법)

  • Jeong, Heon-Ju;Cho, Moo-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.639-647
    • /
    • 2005
  • When a DEV associates with an existing WPAN, the PNC checks the capabilities of the new DEV to see if it is more capable to be the PNC of the piconet based on the criteria defined in the IEEE Std 802.15. If the new DEV is more capable and the current security policies allow it, then the PNC has the option of handing over control of the piconet to the DEV that has just joined. And, If the PNC is shutting down or wants to leave the WPAN, it also uses the handover process to give control to another DEV in the piconet. However, IEEE 802.15.3 checks only DEV capability information for more PNC capable. For PNC selection, it should consider the radio coverage of new PNC capable DEVs. So, we propose the method of PNC selection with accessibility check. This method manages PNC candidate list in the current piconet. In this paper, we analyze accessibility problems for PNC selection in section 2. In section 3, we explain CI(Configuration Inquiry) process which is proposed by Sony Corporation and propose PCI(PNC Candidate Inquiry) process. Also, we perform numerical analysis to compare PCI process with CI process in section 4. Finally, we conclude in section 5.

A Study on the Suppression and Punishment of International Terrorism (국제(國際)테러리즘의 억제(抑制)와 처벌(處罰)에 관한 연구(硏究) -중국민항기(中國民航機) 공중납치사건(空中拉致事件)을 중심(中心)으로-)

  • Yoh, Yeung-Moo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.87-123
    • /
    • 1989
  • The purpose of this thesis is to do a research on suppression of peacetime international terrorism and penal system of terrorists by political and economic means. International terrorism means wanton killing, hostage taking, hijacking, extortion or torture committed or threatened to be comitted against the innocent civilian in peacetime for political motives or purposes provided that international element is involved therein. This research is limited to international terrorism of political purposes in peacetime, especially, hijacking of civil aircraft. Hijacking of civil aircraft include most of international terrorism element in its criminal act and is considered to be typical of international terrorism in view of multinationality of its crews, passengers and transnational borders involved in aircraft hijacking. Civil air transportation of today is a indispensable part of international substructure, as it help connect continuously social cultural and economic network of world community by dealing with massive and swift transportation of passengers and all kinds of goods. Current frequent hijacking of civil aircraft downgrade the safety and trust of air travel by mass slaughter of passengers and massdestruction of goods and endanger indispensable substructure of world community. Considering these facts, aircraft hijacking of today poses the most serious threat and impact on world community. Therefore, among other thing, legal, political, diplomatic and economic sanctions should be imposed on aircraft hijacking. To pursue an effective research on this thesis aircraft hijacking by six Chineses on 5th May, 1983, from mainland China to Seoul, Korea, is chosen as main theme and the Republic of Korea's legal, political and diplomatic dealing and settlement of this hijacking incident along with six hijackers is reviewed to find out legal, political diplomatic means of suppression and solution of international terrorism. Research is focused on Chinese aircraft hijacking, Korea-China diplomatic negotiation, Korea's legal diplomatic handling and settlement of Tak Chang In, mastermind of aircraft hijacking and responses and position of three countries, Korea, China and Taiwan to this case is thoroughly analyzed through reviewing such materials as news reportings and comments of local and international mass media, Korea-China Memorandum, statements of governments of Korea, China and Taiwan, verdicts of courts of Korea, prosecution papers and oral argument by the defendants and lawyers and three antiaircraft hijacking conventions of Hague, Tokyo and Montreal and all the other instruments of international treaties necessary for the research. By using above-mentioned first-hand meterials as yardsticks, legal and political character of Chinese aircraft hijacking is analyzed and reviewed and close cooperation among sovereign states based on spirit of solidarity and strict observance of international treaties such as Hague, Tokyo and Montreal Conventions is suggested as a solution and suppressive means of international terrorism. The most important and indispensable factor in combating terrorism is, not to speak, the decisive and constant resolution and all-out effort of every country and close cooperation among sovereign states based on "international law of cooperation."

  • PDF

Research for the Element to Analyze the Performance of Modern-Web-Browser Based Applications (모던 웹 브라우저(Modern-Web-Browser) 기반 애플리케이션 성능분석을 위한 요소 연구)

  • Park, Jin-tae;Kim, Hyun-gook;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.278-281
    • /
    • 2018
  • The early Web technology was to show text information through a browser. However, as web technology advances, it is possible to show large amounts of multimedia data through browsers. Web technologies are being applied in a variety of fields such as sensor network, hardware control, and data collection and analysis for big data and AI services. As a result, the standard has been prepared for the Internet of Things, which typically controls a sensor via HTTP communication and provides information to users, by installing a web browser on the interface of the Internet of Things. In addition, the recent development of web-assembly enabled 3D objects, virtual/enhancing real-world content that could not be run in web browsers through a native language of C-class. Factors that evaluate the performance of existing Web applications include performance, network resources, and security. However, since there are many areas in which web applications are applied, it is time to revisit and review these factors. In this thesis, we will conduct an analysis of the factors that assess the performance of a web application. We intend to establish an indicator of the development of web-based applications by reviewing the analysis of each element, its main points, and its needs to be supplemented.

  • PDF

Numerical Analysis of Authentication Algorithm using Randomized CA Groups in Mobile Ad Hoc Networks (모바일 애드혹 네트워크에서 랜덤 CA 그룹을 이용한 인증 알고리즘에 대한 성능 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.8
    • /
    • pp.22-33
    • /
    • 2009
  • Mobile Ad Hoc Networks (MANETs) are self-organized networks that do not rely in their operation on wired infrastructure. As in any networking technology, security is an essential element in MANET as well, for proliferation of this type of networks. But supporting secure communication in MANETs proved to be a significant challenge, mainly due to the fact that the set of nodes in the network can change frequently and rapidly and due to the lack of access to the wired infrastructure. In particular, the trust model and the authentication protocols, which were developed for wired and infrastructure-based networks, cannot be used in MANETs. In [1], we addressed the problem of efficient authentication of distributed mobile users in geographically large networks and proposed a new authentication scheme for this case of MANETs. The proposed scheme exploits randomized groups to efficiently share authentication information among nodes that together implement the function of a distributive Certification Authority(CA). In this paper, we analyze numerically the performance of authentication method using randomized groups and compare with the simulation result.

Access Control for XML Documents Using Extended RBAC (확장된 RBAC를 이용한 XML문서에 대한 접근제어)

  • Kim, Jong-Hun;Ban, Yong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.869-881
    • /
    • 2005
  • XML(eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Internet. XML documents contain information of different sensitivity degrees, so that XML Document must selectively shared by user communities. There is thus the need for models and mechanisms enabling the specification and enforcement of access control policies for XML documents. Mechanisms are also required enabling a secure and selective dissemination of documents to users, according to the authorizations which the users have. In this paper, we give an account of access control model and mechanisms, which XML documents can be securely protected in web environments. We make RBAC Based access Control polices to the problem of secure and selective access of XML documents. The proposed model and mechanism guarantee that the secure use for XML documents through definition of authority for element, attribute, link within XML document as well as XML document.

  • PDF