• Title/Summary/Keyword: strength of security

Search Result 284, Processing Time 0.025 seconds

A Study on the Role of Maritime Enforcement Organization As Response of Illegal Fishing (불법어업에 대한 해상집행기관의 역할 및 방향 - 중국어선의 불법어업을 중심으로 -)

  • Jung, Bong-Kyu;Choi, Jung-Ho;Lim, Seok-Won
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.26 no.4
    • /
    • pp.769-788
    • /
    • 2014
  • Today, all the countries of the world newly recognize importance of sea on 70% area of the earth, which are focused on efforts for security of marine territory and fishes resources. On the security concerns of the ocean & fishes resources, Sea are very important on the ground of the importance of the ocean, thus international community has been trying to combat a maritime security threat and illegal fisheries. Coastal states need to have proper state's jurisdiction and exercise it's jurisdiction to response effectively to a maritime security threat and illegal fisheries. Here, many of the coastal states strengthened the rights in Exclusive Economic Zone(;EEZ) naturally, there are made cooperation activities and keen competition in the sea because deepening of complex understanding of the relationship between the surrounding countries with marine surveys & continental shelf development, island territorial sovereignty & marine jurisdiction in overlap of sea area on EEZ. In these circumstances, foreign fishing boats invaded to our territorial waters and EEZ many times. in addition, Chinese fishing boats are going to illegal fisheries naturally. On this point, a powerful crackdown of maritime enforcement organization had no effect on them. Also more and more their resistance gathered strength and tendency of a illegal activities became systematization, group action and atrocity little by little. So this thesis includes a study on the regal regulation, the system and formalities on the control of illegal fishing. And the author analyzed the details of the activities of illegal fishing and boats controlled by Korea Coast Guard(KCG), fishing patrol vessels of Ministry of Maritime Affaires and Fisheries(MOMAF) and Navy etc. from in adjacent sea area of Korea. In relation to this, the policy and activity plan were devised to crackdown to illegal fisheries of foreign fishing boats and then it was enforced every year. According to this, analyze the present conditions of illegal fisheries of a foreign fishing boats on this study, also analyze the present conditions of maritime enforcement organization & found out problems to compared it. protect the territorial waters, at the same time protection of marine mineral resources & fishes resources of EEZ including continental shelf, which has want to study for the role & response of maritime enforcement organization for the protection of fisheries resources and a proper, a realistic confrontation plan of maritime enforcement organization against illegal fisheries of foreign fishing boats.

AUTHENTICATION PROTOCOL: METHODS REVIEW

  • Cahyo Crysdian;Abdullah, Abdul-Hanan
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.242-245
    • /
    • 2002
  • Authentication protocol as a part of security system has been growth rapidly since it was known that sending clear text password in the network is unsecured. Many protocols could be noted proposed to strengthen the authentication process. In 1985 an attempt to safeguard network services within Athena project resulting on the born of Kerberos 〔1〕〔8〕, one of the protocol that has a lot of attention from the research community. Several years later researchers were discovered some weaknesses carried by this protocol 〔2〕〔21〕. In 1992. EKE was introduced by Bellovin and Merrit. Since that time, many protocols introduced could be considered as its variant 〔5〕〔9〕〔13〕〔14〕. Some other protocols such as OKE〔5〕 and SRP〔18〕 although claimed different from EKE, they have the same basic mechanism in holding authentication process. Here, we explain the mechanism of those protocols, their strength and their weaknesses and shortcomings. Due to the limitations of the number of paper pages, only two types of authentication protocol can be explained here i.e EKE and SRP.

  • PDF

A Study on the Prediction and Control of Welding Deformation of the BRACKET TILT in Automotive Parts (I) - Experimental Examination- (자동차 부품 BRACKET TILT의 용접변형 예측 및 제어에 관한 연구 (I) - 실험적 검토-)

  • 장경복;김하근;강성수
    • Journal of Welding and Joining
    • /
    • v.16 no.6
    • /
    • pp.97-103
    • /
    • 1998
  • The bracket tilt among automobile parts is weld parts which construct the column assembly bracket tilt of equipments and accurate dimension after welding is more essential than weldment strength. By the way, it is insufficient that systematic study about this parts which have an importance on welding deformation. The reason is that welding deformation is complex problem with shape, size, material of parts and welding sequence, conditions etc. For reduction and removal of welding deformation, therefore, it is necessary that the security of welding deformation data and systematic examination about equipment, costs, work environment, manufacturing process etc. It is all the better that the prediction of welding deformation using simulation of welding process by FEA is supplemented. In this study, the countermeasure for this welding deformation of bracket tilt is brought up through experimental inspection before the choice of the optimum welding conditions with minimum welding deformation by simulation of welding process.

  • PDF

A study on the optimization for size design of EMU aluminium bodyshell (알루미늄 구조체의 치수 최적화에 관한 연구)

  • 홍재성;이호용;김원경;최성규
    • Proceedings of the KSR Conference
    • /
    • 1999.05a
    • /
    • pp.232-237
    • /
    • 1999
  • The standardization urban transit project has been started by government and the Korean standard electrical railcar has been designed. The bodyshell of standard railcar is made of aluminium alloy. In the present paper, the design of its bodyshell is evaluated in the viewpoint of strength analysis. The loading condition is based on the 'Test Methods of Static Load for Body Structure of Electrical Multiple Unit', standard specification. The bodyshell of Korean standard EMU consist of longitudinal extrusion members which are double-skin structure type. For the purpose of security and lightening we decided the section of the aluminium carbody through the size optimization in this paper Hereafter this paper will contribute to the shape optimization.

  • PDF

Measurement of harmful factors occurring in Machinery and Core workshop (기계 및 중자 제조작업장에서 발생하는 유해인자의 측정)

  • 안승두;박근호
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.3
    • /
    • pp.25-32
    • /
    • 1996
  • This study is a survey on the effect of working security and worksite environment connected to the worst case of noise and dust which was generated in the manufacturing workshop of machinery and easting. The noise intensity of the manufacturing process tends to increase up to the limited strength of 90db (A) or the higher during the last 4~5 years in 1990~1994. This result requires a significant improvement of worksite environment of unit workshop. The concentration of dust in the gouging process tends to increase to a significantly high level compared with other worksite, which also requires a local ventilation method to reduce the dust diffusion. Organic solvents used most frequently in the manufacturing process machinery were the aromatic hydrocarbons, but were gradually diversed in recent years.

  • PDF

Implementing Balanced Scorecard with System Dynamics Approach

  • Yoon, Joseph Y. K.
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.330-336
    • /
    • 2000
  • This paper discusses the potential of system dynamics modelling to support balanced scorecard. The balanced scorecard is a conceptual framework for translating an organisation's strategy into a set of performance indicators. These performance indicators are distributed across the 'classic'model's four perspective: Customers, Internal Business Processes, Financial, and Learning and Growth. This balanced scorecard, whilst having significant strength, suffers from the limitation of all performance indicator systems, namely that the interrelationships between indicators are overlooked and there is no way of taking into account the impact of delayed feedback which flows from introduction of new policy and legislative changes. System Dynamics is a methodology for understanding complex problems where there is dynamic behaviour and where feedback impacts significantly on system outcomes. System dynamics provides a rigorous basis for qualitative testing of the effects of performance indicators in complex environments such as health or social security. This can be supplemented with quantitative system dynamics simulation tools that further test the validity of indicators and the business rules implicit in them. System dynamics modelling has an important role to play in extending feedback cycle in performance measurements to a full systems approach.

  • PDF

Multiregional secure localization using compressive sensing in wireless sensor networks

  • Liu, Chang;Yao, Xiangju;Luo, Juan
    • ETRI Journal
    • /
    • v.41 no.6
    • /
    • pp.739-749
    • /
    • 2019
  • Security and accuracy are two issues in the localization of wireless sensor networks (WSNs) that are difficult to balance in hostile indoor environments. Massive numbers of malicious positioning requests may cause the functional failure of an entire WSN. To eliminate the misjudgments caused by malicious nodes, we propose a compressive-sensing-based multiregional secure localization (CSMR_SL) algorithm to reduce the impact of malicious users on secure positioning by considering the resource-constrained nature of WSNs. In CSMR_SL, a multiregion offline mechanism is introduced to identify malicious nodes and a preprocessing procedure is adopted to weight and balance the contributions of anchor nodes. Simulation results show that CSMR_SL may significantly improve robustness against attacks and reduce the influence of indoor environments while maintaining sufficient accuracy levels.

Nonlinear finite element model updating with a decentralized approach

  • Ni, P.H.;Ye, X.W.
    • Smart Structures and Systems
    • /
    • v.24 no.6
    • /
    • pp.683-692
    • /
    • 2019
  • Traditional damage detection methods for nonlinear structures are often based on simplified models, such as the mass-spring-damper and shear-building models, which are insufficient for predicting the vibration responses of a real structure. Conventional global nonlinear finite element model updating methods are computationally intensive and time consuming. Thus, they cannot be applied to practical structures. A decentralized approach for identifying the nonlinear material parameters is proposed in this study. With this technique, a structure is divided into several small zones on the basis of its structural configuration. The unknown material parameters and measured vibration responses are then divided into several subsets accordingly. The structural parameters of each subset are then updated using the vibration responses of the subset with the Newton-successive-over-relaxation (SOR) method. A reinforced concrete and steel frame structure subjected to earthquake loading is used to verify the effectiveness and accuracy of the proposed method. The parameters in the material constitutive model, such as compressive strength, initial tangent stiffness and yielding stress, are identified accurately and efficiently compared with the global nonlinear model updating approach.

A Security Analysis of a Key Management Scheme for PCS/SCADA Sensor Networks (PCS/SCADA 센서 네트워크용 키 관리 프로토콜에 대한 보안 분석)

  • Park, DongGook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.123-131
    • /
    • 2009
  • Process Control Systems (PCSs) or Supervisory Control and Data Acquisition (SCADA) systems have recently been added to the already wide collection of wireless sensor networks applications. The PCS/SCADA environment is somewhat more amenable to the use of heavy cryptographic mechanisms such as public key cryptography than other sensor application environments. The sensor nodes in the environment, however, are still open to devastating attacks such as node capture, which makes designing a secure key management challenging. Recently, Nilsson et al. proposed a key management scheme for PCS/SCADA, which was claimed to provide forward and backward secrecies. In this paper, we define four different types of adversaries or attackers in wireless sensor network environments in order to facilitate the evaluation of protocol strength. We then analyze Nilsson et al. 's protocol and show that it does not provide forward and backward secrecies against any type of adversary model.

USN's Efforts to Rebuild its Combat Power in an Era of Great Power Competition (강대국 간의 경쟁시대와 미 해군의 증강 노력)

  • Jung, Ho-Sub
    • Strategy21
    • /
    • s.44
    • /
    • pp.5-27
    • /
    • 2018
  • The purpose of this paper is to look at USN's efforts to rebuild its combat power in the face of a reemergence of great powers competition, and to propose some recommendations for the ROKN. In addition to the plan to augment its fleet towards a 355-ships capacity, the USN is pursuing to improve exponentially combat lethality(quality) of its existing fleet by means of innovative science and technology. In other words, the USN is putting its utmost efforts to improve readiness of current forces, to modernize maintenance facilities such as naval shipyards, and simultaneously to invest in innovative weapons system R&D for the future. After all, the USN seems to pursue innovations in advanced military Science & Technology as the best way to ensure continued supremacy in the coming strategic competition between great powers. However, it is to be seen whether the USN can smoothly continue these efforts to rebuild combat strength vis-a-vis its new competition peers, namely China and Russian navy, due to the stringent fiscal constraints, originating, among others, from the 2011 Budget Control Act effective yet. Then, it seems to be China's unilateral and assertive behaviors to expand its maritime jurisdiction in the South China Sea that drives the USN's rebuild-up efforts of the future. Now, some changes began to be perceived in the basic framework of the hitherto regional maritime security, in the name of declining sea control of the USN as well as withering maritime order based on international law and norms. However, the ROK-US alliance system is the most excellent security mechanism upon which the ROK, as a trading power, depends for its survival and prosperity. In addition, as denuclearization of North Korea seems to take significant time and efforts to accomplish in the years to come, nuclear umbrella and extended deterrence by the US is still noting but indispensible for the security of the ROK. In this connection, the naval cooperation between ROKN and USN should be seen and strengthened as the most important deterrents to North Korean nuclear and missile threats, as well as to potential maritime provocation by neighboring countries. Based on these observations, this paper argues that the ROK Navy should try to expand its own deterrent capability by pursuing selective technological innovation in order to prevent this country's destiny from being dictated by other powers. In doing so, however, it may be too risky for the ROK to pursue the emerging, disruptive innovative technologies such as rail gun, hypersonic weapon... etc., due to enormous budget, time, and very thin chance of success. This paper recommends, therefore, to carefully select and extensively invest on the most cost-effective technological innovations, suitable in the operational environments of the ROK. In particular, this paper stresses the following six areas as most potential naval innovations for the ROK Navy: long range precision strike; air and missile defense at sea; ASW with various unmanned maritime system (UMS) such as USV, UUV based on advanced hydraulic acoustic sensor (Sonar) technology; network; digitalization for the use of AI and big data; and nuclear-powered attack submarines as a strategic deterrent.