• 제목/요약/키워드: Security problem

검색결과 2,525건 처리시간 0.028초

Image-based Subway Security System by Histogram Projection Technology

  • Bai, Zhiguo;Jung, Sung-Hwan
    • 한국멀티미디어학회논문지
    • /
    • 제18권3호
    • /
    • pp.287-297
    • /
    • 2015
  • A railway security detection system is very important. There are many safety factors that directly affect the safe operation of trains. Security detection technology can be divided into passive and active approaches. In this paper, we will first survey the railway security systems and compare them. We will also propose a subway security detection system with computer vision technology, which can detect three kinds of problems: the spark problem, the obstacle problem, and the lost screw problem. The spark and obstacle detection methods are unique in our system. In our experiment using about 900 input test images, we obtained about a 99.8% performance in F- measure for the spark detection problem, and about 94.7% for the obstacle detection problem.

경비지도사 자격제도 개선에 대한 경비지도사의 인식 (An Awareness of Security Guard Supervisors for Improvement of Security Guard Supervisor System)

  • 김일곤
    • 융합보안논문지
    • /
    • 제13권5호
    • /
    • pp.167-176
    • /
    • 2013
  • 본 연구는 경비지도사 자격제도 개선과 관련하여 현재 경비지도사 업무를 수행하고 있는 경비지도사를 대상으로 NVivo 10을 활용하여, 첫째, 경비지도사 자격시험제도의 문제점, 둘째. 경비지도사 직무교육 문제점, 셋째, 경비지도사 기본 및 보수교육의 문제점에 대하여 고찰하였다. 이들 문제점과 관련된 개선방안을 제시하였다.

송전계통 안전도 제약조건을 반영한 급전계획 알고리즘 개발에 관한 연구 (An Approach for Optimal Dispatch Scheduling Incorporating Transmission Security Constraints)

  • 정구형;김발호
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제54권12호
    • /
    • pp.597-602
    • /
    • 2005
  • The introduction of competition in electricity market emphasizes the importance of sufficient transmission capacities to guarantee various electricity transactions. Therefore, when dispatch scheduling, transmission security constraints should be considered for the economic and stable electric power system operation. In this paper, we propose an optimal dispatch scheduling algorithm incorporating transmission security constraints. For solving these constraints, the dispatch scheduling problem is decomposed into a master problem to calculate a general optimal power flow (OPF) without transmission security constraints and several subproblems to inspect the feasibility of OPF solution under various transmission line contingencies. If a dispatch schedule given by the master problem violates transmission security constraints, then an additional constraint is imposed to the master problem. Through these iteration processes between the master problem and subproblems, an optimal dispatch schedule reflecting the post-contingency rescheduling is derived. Moreover, since interruptible loads can positively participate as generators in the competitive electricity market, we consider these interruptible loads active control variables. Numerical example demonstrates efficiency of the proposed algorithm.

공급 사슬 보안에 관한 국내외 문헌 조사 연구 (A literature review of Korean and International research on the supply chain security)

  • 양병학
    • 대한안전경영과학회지
    • /
    • 제13권3호
    • /
    • pp.87-96
    • /
    • 2011
  • This research is a literature survey on the Supply chain security. International organization and governments have build security regulations to improve the security in the shipment through supply chain. The researches on supply chain security were increasing during last 10 years. We were surveyed 53 research including Korean and international papers. ills study was classified by research subjects, security regulation, and research methods. Korean researches were focused to introducing and reviewing on the security regulation, but the researches on specific security reinforcement were very rare. International researches were concerned with the subject of the airport security scanning problem, transportation security problem, port selection problem.

교육행정정보시스템의 보안 및 기술적 문제 분석 (Analysis of the Security and Technical Problem of National Education Information System)

  • 이대식;윤동식
    • 융합보안논문지
    • /
    • 제4권3호
    • /
    • pp.9-18
    • /
    • 2004
  • 본 연구에서는 교육행정정보시스템의 보안 및 기술적 문제를 분석하여 보다 효율적인 시스템에 대한 개선 방안을 제시한다. 따라서 초 중 고 선생님들에게 교육행정정보시스템의 보안 및 기술적 문제를 5가지 항목으로 나누어 설문 조사를 실시하였다. 각 항목별 설문 문항을 분석한 결과, 교육행정정보시스템은 인권침해와 보안 및 개인정보유출 등의 문제가 있지만 정보화시대에 꼭 필요한 시스템이라는 인식이 높았다.

  • PDF

Cryptographic Protocols using Semidirect Products of Finite Groups

  • Lanel, G.H.J.;Jinasena, T.M.K.K.;Welihinda, B.A.K.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권8호
    • /
    • pp.17-27
    • /
    • 2021
  • Non-abelian group based cryptosystems are a latest research inspiration, since they offer better security due to their non-abelian properties. In this paper, we propose a novel approach to non-abelian group based public-key cryptographic protocols using semidirect products of finite groups. An intractable problem of determining automorphisms and generating elements of a group is introduced as the underlying mathematical problem for the suggested protocols. Then, we show that the difficult problem of determining paths and cycles of Cayley graphs including Hamiltonian paths and cycles could be reduced to this intractable problem. The applicability of Hamiltonian paths, and in fact any random path in Cayley graphs in the above cryptographic schemes and an application of the same concept to two previous cryptographic protocols based on a Generalized Discrete Logarithm Problem is discussed. Moreover, an alternative method of improving the security is also presented.

문제 해결을 위한 모-자 상호작용시 어머니 행동과 관련된 변인 : 결혼 만족도, 자녀양육 스트레스, 애착 안정성 (Maternal Behavior during Mother-Child Problem Solving : Effects of Marital Satisfaction, Parenting Stress, and Attachment Security)

  • 박경자;권연희
    • 아동학회지
    • /
    • 제23권4호
    • /
    • pp.53-70
    • /
    • 2002
  • Maternal interactions during mother-child problem solving tasks were analyzed by marital satisfaction, parenting stress, and child attachment security. Forty 36-to 52-month-old children and their mothers were observed at home. Mothers' ratings of marital satisfaction and parenting stress were collected by questionnaires, and Attachment Q-set assessed child attachment security. Marital satisfaction and child attachment security were negative1y related to parenting stress. Marital satisfaction, parenting stress, and attachment security were related to maternal behaviors. The relations between child's attachment security and maternal behaviors were mediated by parenting stress. Stronger child attachment security was related to lower parenting stress, which in turn contributed to competent maternal behaviors during problem solving.

  • PDF

경영진의 정보보안 지능이 조직원의 보안대책 인식에 미치는 영향 (The Effect of Managerial Information Security Intelligence on the Employee's Information Security Countermeasure Awareness)

  • 한진영;유현선
    • 경영정보학연구
    • /
    • 제18권3호
    • /
    • pp.137-153
    • /
    • 2016
  • 조직의 비즈니스 환경이 스마트워크와 같이 모바일이나 네트워크에 의존하는 비중이 높아지면서, 기업들은 정보보안에 더 높은 관심을 가지게 되었다. 특히, 내부자의 의한 정보유출은 기업입장에서 상당히 부정적인 영향을 미치게 된다. 따라서 기업뿐 아니라 정보보안 관련 연구자들은 조직원의 정보보안 정책 준수에 초점을 두어 연구를 해왔다. 그 중에서 정보보안 대책(Information security countermeasure)은 조직원의 정보보안 정책 준수 의도의 선행요인으로 알려져 왔다. 하지만 조직원이 정보보안 대책을 인식하도록 하는 선행요인에 대한 연구는 미흡한 실정이다. 본 연구는 조직원의 보안대책 인식에 대한 선행요인으로 경영진의 정보보안 지능을 제안하고 이들의 관계를 실증적으로 연구하였다. 정보보안 지능은 Kirwan(2008)이 제안한 안전지능을 응용하여 정보보안 관련 문제해결능력, 사회적 역량, 정보보안 지식으로 구성된다. 연구결과 경영진의 정보보안 관련 문제해결 능력과 정보보안 지식은 조직원이 정보보안 정책 및 교육/훈련 프로그램을 인식하는데 긍정적인 영향을 미치는 것으로 나타났다.

RSA 문제와 동등한 안전성을 갖는 온라인/오프라인 서명 기법 (On-Line/Off-Line Signature Schemes with Tight Security Reduction to the RSA Problem)

  • 최경용;박종환
    • 정보보호학회논문지
    • /
    • 제28권2호
    • /
    • pp.327-338
    • /
    • 2018
  • 온라인/오프라인(On-line/off-line) 서명은 오프라인 단계에서 서명생성에 필요한 무거운 연산을 수행하고, 온라인 단계에서 간단한 연산만으로 최종 서명을 완성하는 기법이다. 이는 다수의 사용자에게 즉각적인 서명 응답을 해야 하는 응용환경에 적합하다. 본 논문에서는 RSA 문제에 기반한 새로운 온라인/오프라인 서명기법을 두 가지로 제안한다. 첫 번째 기법은 온라인 서명 시 고정된 밑수에서의 지수승이면 되고, 두 번째 기법은 해쉬연산과 같은 매우 간단한 계산만으로 온라인 서명을 완성할 수 있다. 두 서명의 안전성은 모두 RSA 문제로 환원되는데, 랜덤 오라클 모델에서 안전성 손실 없이 증명이 된다.

전력계통의 무효전력 제어 및 안전도 평가를 위한 Asynchronous Team 이론의 적용에 관한 연구 (A Study on the Application of Asynchronous Team Theory for QVC and Security Assessment in a Power System)

  • 김두현;김상철
    • 한국안전학회지
    • /
    • 제12권3호
    • /
    • pp.67-75
    • /
    • 1997
  • This paper presents a study on the application of Asynchronous Team(A-Team) theory for QVC(Reactive power control) and security assessment in a power system. Reactive power control problem is the one of optimally establishing voltage level given reactive power sources, which is very important problem to supply the demand without interruption and needs methods to alleviate a bus voltage limit violation more quickly. It can be formulated as a mixed-integer linear programming(MILP) problem without deteriorating of solution accuracy to a certain extent. The security assessment is to estimate the relative robustness of the system and deterministic approach based on AC load flow calculations is adopted to assess it, especially voltage security. A distance measure, as a measurement for voltage security, is introduced. In order to analyze the above two problem, reactive power control and static security assessment, In an integrated fashion, a new organizational structure, called an A-team, is adopted. An A-team is well-suited to the development of computer-based, multi-agent systems for operation of large-scaled power systems. In order to verify the usefulness of the suggested scheme herein, modified IEEE 30 bus system is employed as a sample system. The results of a case study are also presented.

  • PDF