• Title/Summary/Keyword: Security problem

Search Result 2,525, Processing Time 0.029 seconds

Image-based Subway Security System by Histogram Projection Technology

  • Bai, Zhiguo;Jung, Sung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.3
    • /
    • pp.287-297
    • /
    • 2015
  • A railway security detection system is very important. There are many safety factors that directly affect the safe operation of trains. Security detection technology can be divided into passive and active approaches. In this paper, we will first survey the railway security systems and compare them. We will also propose a subway security detection system with computer vision technology, which can detect three kinds of problems: the spark problem, the obstacle problem, and the lost screw problem. The spark and obstacle detection methods are unique in our system. In our experiment using about 900 input test images, we obtained about a 99.8% performance in F- measure for the spark detection problem, and about 94.7% for the obstacle detection problem.

An Awareness of Security Guard Supervisors for Improvement of Security Guard Supervisor System (경비지도사 자격제도 개선에 대한 경비지도사의 인식)

  • Kim, Il Gon
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.167-176
    • /
    • 2013
  • This study was analysis that first, a problem of security guard supervisor system, second, a problem of on the job training, third, a problem of basic and refresher training for improvement of security guard supervisor system that among security guard supervisor by NVivo 10. It was suggestion what improvement about problem.

An Approach for Optimal Dispatch Scheduling Incorporating Transmission Security Constraints (송전계통 안전도 제약조건을 반영한 급전계획 알고리즘 개발에 관한 연구)

  • Chung, Koo-Hyung;Kim, Bal-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.54 no.12
    • /
    • pp.597-602
    • /
    • 2005
  • The introduction of competition in electricity market emphasizes the importance of sufficient transmission capacities to guarantee various electricity transactions. Therefore, when dispatch scheduling, transmission security constraints should be considered for the economic and stable electric power system operation. In this paper, we propose an optimal dispatch scheduling algorithm incorporating transmission security constraints. For solving these constraints, the dispatch scheduling problem is decomposed into a master problem to calculate a general optimal power flow (OPF) without transmission security constraints and several subproblems to inspect the feasibility of OPF solution under various transmission line contingencies. If a dispatch schedule given by the master problem violates transmission security constraints, then an additional constraint is imposed to the master problem. Through these iteration processes between the master problem and subproblems, an optimal dispatch schedule reflecting the post-contingency rescheduling is derived. Moreover, since interruptible loads can positively participate as generators in the competitive electricity market, we consider these interruptible loads active control variables. Numerical example demonstrates efficiency of the proposed algorithm.

A literature review of Korean and International research on the supply chain security (공급 사슬 보안에 관한 국내외 문헌 조사 연구)

  • Yang, Byoung-Hak
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.3
    • /
    • pp.87-96
    • /
    • 2011
  • This research is a literature survey on the Supply chain security. International organization and governments have build security regulations to improve the security in the shipment through supply chain. The researches on supply chain security were increasing during last 10 years. We were surveyed 53 research including Korean and international papers. ills study was classified by research subjects, security regulation, and research methods. Korean researches were focused to introducing and reviewing on the security regulation, but the researches on specific security reinforcement were very rare. International researches were concerned with the subject of the airport security scanning problem, transportation security problem, port selection problem.

Analysis of the Security and Technical Problem of National Education Information System (교육행정정보시스템의 보안 및 기술적 문제 분석)

  • Lee, Dae Sik;Yun, Dong Sic
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2004
  • This paper is to analyze security and technical problem of NEIS and suggest an improving methods about the effective system. Therefore questionnaire was performed in the five items with security as well as technical problem of NEIS to primary and secondary school teachers. The result of questionnaire analysis on each item is that they think of NEIS as the essential system for the age of information, despite problems such as the invasion of human right and security as well as reveal of personal data.

  • PDF

Cryptographic Protocols using Semidirect Products of Finite Groups

  • Lanel, G.H.J.;Jinasena, T.M.K.K.;Welihinda, B.A.K.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.17-27
    • /
    • 2021
  • Non-abelian group based cryptosystems are a latest research inspiration, since they offer better security due to their non-abelian properties. In this paper, we propose a novel approach to non-abelian group based public-key cryptographic protocols using semidirect products of finite groups. An intractable problem of determining automorphisms and generating elements of a group is introduced as the underlying mathematical problem for the suggested protocols. Then, we show that the difficult problem of determining paths and cycles of Cayley graphs including Hamiltonian paths and cycles could be reduced to this intractable problem. The applicability of Hamiltonian paths, and in fact any random path in Cayley graphs in the above cryptographic schemes and an application of the same concept to two previous cryptographic protocols based on a Generalized Discrete Logarithm Problem is discussed. Moreover, an alternative method of improving the security is also presented.

Maternal Behavior during Mother-Child Problem Solving : Effects of Marital Satisfaction, Parenting Stress, and Attachment Security (문제 해결을 위한 모-자 상호작용시 어머니 행동과 관련된 변인 : 결혼 만족도, 자녀양육 스트레스, 애착 안정성)

  • Park, Kyung Ja;Kwon, Yeon Hee
    • Korean Journal of Child Studies
    • /
    • v.23 no.4
    • /
    • pp.53-70
    • /
    • 2002
  • Maternal interactions during mother-child problem solving tasks were analyzed by marital satisfaction, parenting stress, and child attachment security. Forty 36-to 52-month-old children and their mothers were observed at home. Mothers' ratings of marital satisfaction and parenting stress were collected by questionnaires, and Attachment Q-set assessed child attachment security. Marital satisfaction and child attachment security were negative1y related to parenting stress. Marital satisfaction, parenting stress, and attachment security were related to maternal behaviors. The relations between child's attachment security and maternal behaviors were mediated by parenting stress. Stronger child attachment security was related to lower parenting stress, which in turn contributed to competent maternal behaviors during problem solving.

  • PDF

The Effect of Managerial Information Security Intelligence on the Employee's Information Security Countermeasure Awareness (경영진의 정보보안 지능이 조직원의 보안대책 인식에 미치는 영향)

  • Jin Young Han;Hyun-Sun Ryu
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.137-153
    • /
    • 2016
  • Organizations depend on smart working environments, such as mobile networks. This development motivates companies to focus on information security. Information leakage negatively affects companies. To address this issue, management and information security researchers focus on compliance of employees with information security policies. Countermeasures in information security are known antecedents of intention to comply information security policies. Despite the importance of this topic, research on the antecedents of information security countermeasures is scarce. The present study proposes information security intelligence as an antecedent of information security countermeasures. Information security intelligence adapted the concept of safety intelligence provided by Kirwan (2008). Information security intelligence consists of problem solving skills, social skills, and information security knowledge related to information security. Results show that problem solving skills and information security knowledge have positive effects on the awareness of employees of information security countermeasures.

On-Line/Off-Line Signature Schemes with Tight Security Reduction to the RSA Problem (RSA 문제와 동등한 안전성을 갖는 온라인/오프라인 서명 기법)

  • Choi, Kyung-yong;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.327-338
    • /
    • 2018
  • On-line/off-line signature is a technique for performing heavy computations required for signature generation in the off-line stage and completing the final signature by a simple operation in the online stage. This is suitable for application environments that require immediate signing responses to multiple users. In this paper, we propose two new on-line/off-line signature schemes based on RSA problem. The first technique can generate a signature with a fixed base exponentiation when signing online, and the second technique can complete an online signature with a very simple calculation such as a hash operation. The security of both signatures is based on the RSA problem, which is proven to be tightly secure without security loss in the random oracle model.

A Study on the Application of Asynchronous Team Theory for QVC and Security Assessment in a Power System (전력계통의 무효전력 제어 및 안전도 평가를 위한 Asynchronous Team 이론의 적용에 관한 연구)

  • 김두현;김상철
    • Journal of the Korean Society of Safety
    • /
    • v.12 no.3
    • /
    • pp.67-75
    • /
    • 1997
  • This paper presents a study on the application of Asynchronous Team(A-Team) theory for QVC(Reactive power control) and security assessment in a power system. Reactive power control problem is the one of optimally establishing voltage level given reactive power sources, which is very important problem to supply the demand without interruption and needs methods to alleviate a bus voltage limit violation more quickly. It can be formulated as a mixed-integer linear programming(MILP) problem without deteriorating of solution accuracy to a certain extent. The security assessment is to estimate the relative robustness of the system and deterministic approach based on AC load flow calculations is adopted to assess it, especially voltage security. A distance measure, as a measurement for voltage security, is introduced. In order to analyze the above two problem, reactive power control and static security assessment, In an integrated fashion, a new organizational structure, called an A-team, is adopted. An A-team is well-suited to the development of computer-based, multi-agent systems for operation of large-scaled power systems. In order to verify the usefulness of the suggested scheme herein, modified IEEE 30 bus system is employed as a sample system. The results of a case study are also presented.

  • PDF