• 제목/요약/키워드: terror

검색결과 353건 처리시간 0.025초

항만보안 출입통제에 관한 연구 및 개선점 고찰 (컨테이너 터미널 중심으로) (A Study of security improvements to access in port (Focus on Container Terminal))

  • 곽규석;남기찬;정수천;민세홍;박승재
    • 한국항해항만학회:학술대회논문집
    • /
    • 한국항해항만학회 2014년도 춘계학술대회
    • /
    • pp.205-206
    • /
    • 2014
  • 세계화의 진전 및 시장 개방의 가속화로 인해 국내외 항만물류산업의 중요성이 높아지고 있다. 우리나라는 항만의 경쟁에서 살아남기 위해 첨단기술을 적용한 무인 자동화 컨테이너 터미널의 구축 등을 통해 생산성, 경제성, 보안성 및 서비스 수준을 향상을 위해 연구 하고 있다. 하지만 컨테이너터미널 내부 효율 및 생산성을 향상시키는 연구가 대부분이며 보안업무 등을 처리하는 연구는 미흡한 실정이다. 컨테이너 터미널 보안의 중요성은 갈수록 중요 ${\cdot}{\cdot}$(중략)${\cdots}{\cdot}$.

  • PDF

방사능테러에 대한 국제동향 분석 및 향후 전망 (International Status and Prospects on Radiological Terrorism)

  • 류재수
    • 한국기술혁신학회:학술대회논문집
    • /
    • 한국기술혁신학회 2003년도 춘계학술대회
    • /
    • pp.403-412
    • /
    • 2003
  • 알 카에다 및 기타 테러집단들은 방사능폭탄 제조에 사용될 수 있는 방사성물질을 획득하려고 노력해 온 것으로 밝혀지고 있으며, 방사능폭탄의 제조와 관련된 문서가 발견된 것으로 보도되었다. 이에 미국을 중심으로 하는 국제사회는 방사능테러에 대비한 방사성 물질의 규제 및 보안을 개선하기 위하여 노력해 오고 있다. 따라서, 본 논문에서는 방사능테러의 가능성 및 테러의 수단으로 사용될 방사능확산장치를 조사하고, 방사능테러에 대비한 국제동향 및 향후 전망을 분석하고자 하였다.

  • PDF

Impact of composite materials on buried structures performance against blast wave

  • Mazek, Sherif A.;Wahab, Mostafa M.A.
    • Structural Engineering and Mechanics
    • /
    • 제53권3호
    • /
    • pp.589-605
    • /
    • 2015
  • The use of the rigid polyurethane foam (RPF) to strengthen buried structures against blast terror has great interests from engineering experts in structural retrofitting. The aim of this study is to use the RPF to strengthen the buried structures under blast load. The buried structure is considered to study the RPF as structural retrofitting. The Guowei model (Guowei et al. 2010) is considered as a case study. The finite element analysis (FEA) is also used to model the buried structure under shock wave. The buried structure performance is studied based on detonating different TNT explosive charges. There is a good agreement between the results obtained by both the Guowei model and the proposed numerical model. The RPF improves the buried structure performance under the blast wave propagation.

Incoterms(R) 2010상 수출입 당사자의 보안관련 의무에 관한 연구 (A Study on the Security related Obligations of Contracting Party under the Incoterms(R) 2010 Rules)

  • 양정호
    • 무역상무연구
    • /
    • 제54권
    • /
    • pp.45-80
    • /
    • 2012
  • Since the 9.11 terror attack, the event which caused supply chain disruption, supply chain security has become more important than ever before. With this as a momentum, a customs supply chain security paradigm emerged intended to guarantee secure flow of cargo across boarder. Under this circumstances Incoterms(R) 2010 rules have allocated obligations between the buyer and seller to obtain or to render assistances in obtaining security clearances. Thus, security related obligations such as providing advance manifest information is the mandatory requirements for any export and import. The impact on the seller and buyer of security related obligations under the Incoterms(R) 2010 rules environment is obvious. Assistance to provide the security information in advance has become indispensable obligations to the seller and buyer. As such assistances is at the cost and risk of the party responsible for the clearances of the goods, the choice of recognised partner and compliance with the relevant security program, in order to enjoy the relevant benefits, becomes paramount.

  • PDF

Evaluation for cargo tracking systems in railroad transportation

  • Park, Nam-Kyu;Kim, Joo-Young;Choi, Woo-Young
    • Journal of information and communication convergence engineering
    • /
    • 제6권3호
    • /
    • pp.239-244
    • /
    • 2008
  • Cargo tracking issue on train transportation is challenging area because of long distance haulage, theft, terror attack and customer service. This paper aims at evaluating various cargo tracking systems in terms of cost and technology. The contents of this paper consist of the research trend of cargo tracking system in the railroad transportation and reviewing of technical alternatives in cost and service side. GNSS and RFID are reviewed as location tracking technology, Internet and Satellite technology like INMASAT and Low Earth Orbit are also reviewed as communication infrastructure. This paper selects cost and service factors in two alternatives of GNSS-Satellite and RFID-Internet, among GNSS-Internet, GNSS, Satellite, RFID-Internet, RFID-Satellite and evaluate each alternative in terms of cost and service. In a result, in terms of cost, RFID-Internet type is superior to GNSS-Satellite type, but in service GNSS-Satellite type is preferred to RFID-Internet in point of area coverage and service coverage.

한국 민간경호 ${\cdot}$ 경비관련 자격제도 도입방안 (A Study on the Plan for Professional License of the Private Security in Korea)

  • 박준석;박대우
    • 시큐리티연구
    • /
    • 제7호
    • /
    • pp.191-212
    • /
    • 2004
  • According to current record of private security in Korea, more than 107,963 private security guards are employed by 2,051 security guard association. However, it is obvious that there is lack of any kinds of professional license. To ensure the profession of Private Security industry and at the same time to improve the quality of private guard duty, it is necessary to introduce professional license system which is specialized and developed. The kinds of license anticipated are security guards services, armored car services, alarm services, proprietary security services, special guards services, terror, security consultants services, and private investigators. To settle those license system, there should be not only exertion of academic society but also administrative support of government and research of legal office th arrange legal and official structure.

  • PDF

프랑스혁명 이후의 Incroyables와 Merveilleuses 복식에 대한 연구 (A Study on the Incroyables and Merveilleuses Costume after the French Revolution)

  • 이유경
    • 복식문화연구
    • /
    • 제12권3호
    • /
    • pp.429-440
    • /
    • 2004
  • The age after the French Revolution was the period of experiment and change in dress for both men and women. Directly after the close of the Reign of Terror, Directoire(1795-1799) became the extreme fashion known as incroyables and merveilleuses which mean 'impossible' or 'unimaginable'. This study aimed to investigate the sociocultural phenomena which affect to clothing change through the French Revolution period and clothing analysis of incroyables and merveillues. Furthermore, this study will contribute to establishing the theory of clothing culture and help predicting clothing change in accordance with social circumstances. Incroyables and merveilleuses represent extreme opposites in sleekness of attire and grooming. Incroyables required an unkempt, wrinkled appearance and a contrived carelessness. Merveilleuseses show the exaggerated transparency and simplicity in the fashions of female. Also, they devoted to the worship of the antique and the masculine fashions. This fashion madness appeared as the result of revolutionary social change. Their costume showed characteristics of the transition period between French Revolution and Classic period. However, they simply carried existing tendencies to the point of caricature by an enthusiastic overstatement.

  • PDF

고속 비상체의 충격시험에 의한 섬유보강콘크리트의 내충격 성능평가 (Evaluation on the Impact Resistance Performance of Fiber Reinforced Concrete by High Velocity Steel Projectile Test)

  • 남정수;최형길;김영선;박종호;정용;김규용
    • 한국콘크리트학회:학술대회논문집
    • /
    • 한국콘크리트학회 2009년도 춘계 학술대회 제21권1호
    • /
    • pp.389-390
    • /
    • 2009
  • 최근 폭탄테러 등에 의한 건축구조물의 피해 및 2차적인 인적 물적 피해가 증가하고 있다. 따라서 본 연구에서는 고속 비상체의 충격시험에 의한 섬유보강콘크리트의 내충격 성능평가를 실시하여 내충격 성능의 향상을 위한 기초자료를 제시하는데 목적을 두고 있다.

  • PDF

U-city 사이버 테러 방지를 위한 예.경보 알고리즘에 관한 연구 (forecast and Warning Algorithm for U-city cyber terror protection)

  • 김형중;정규일;이준엽
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2009년도 정보통신설비 학술대회
    • /
    • pp.19-22
    • /
    • 2009
  • This thesis offers forecast & warning algorithm about the accessing networks though statistical sampling methods to prevent computer terrors. These networks are occurred among U-city network groups. The main characteristic of current computer attacks is avoiding well-known detection patterns by successive changes in spreading speeds and attacking codes. The improvement of attacking stills leads to a problem causing the defense-time delay and creates vicious cycle that tries to fix networks after damage. Proposed algorithm notices and warns the potential attacking areas through defecting previous attacking signs, analysing attaching results ed tracing attaching sources at the beginning of the attack.

  • PDF

사용자 질의어를 이용한 개인 인증 보안 알고리즘 (Algorithm of certificate security based-on using query language)

  • 이창조
    • 융합보안논문지
    • /
    • 제11권6호
    • /
    • pp.45-51
    • /
    • 2011
  • 개인 인증 보안은 온라인 시스템에서 사용자 인증 서비스를 사용하기 위한 중요한 수단이다. 본 논문에서는 사이버테러 대응 목적으로 온라인 인증서를 효율적으로 활용하는 방법의 일환으로 이 논문에서 설계한 SOL이라 불리는 알고리즘을 온라인 전자거래 인증에 적용하기 위한 방법을 설계하고 구현해 보았다. 이 결과는 각종 인증서의 효율적인 관리와 활용을 통해서 정보화 시대의 근간을 이루고 있는 온라인 인증에 대한 서비스를 보다 효율적으로 이용할 수 있을 것이다. 특히 SOL은 특정 목적을 지니고 운영하는 소규모 단위의 온라인 시스템에 호환성을 가지도록 효율적으로 접목시켜 상호 호환하여 사용할 수 있음을 본 논문을 통해서 알 수 있게 된다.