• Title/Summary/Keyword: Mechanical Security System

Search Result 72, Processing Time 0.034 seconds

Study on the improvement of mechanical security system (기계경비 취약점에 대한 개선방안 연구)

  • Ahn, Hwang Kwon
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.45-52
    • /
    • 2014
  • Up to now, the security system in Korea has been developed from the human security system to more efficient mechanical security system. The mechanical security system has its advantages over the human security system in terms of economy and operation. However, as there are weaknesses in the use of mechanical security equipment such as erroneous alarm sounds, the studies have been done to improve them. This paper tries to suggest how to improve the mechanical security system based on the results of the study on the weakness of the mechanical security obtained through AHP technique.

Fuzzy Logic Based Active Ventilation System with Security Function (퍼지로직 기반 보안기능 통합형 능동 환기 시스템)

  • Jung, Byung-Chan;Kim, Hun-Mo
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.14 no.3
    • /
    • pp.58-67
    • /
    • 2006
  • In this paper, fuzzy logic based active ventilation system with security function is proposed and implemented. We can easily experience the situation that inner air is so hot to get start immediately after parking at summer day. Hot temperature is enough to explode a gas lighter or to suffocate a little chid. Proposed system has 1 blower and 2 axial fans to ventilate inner air. Based on the fuzzy logic, speed and direction of each fan are controlled. In addition to controlling fans, controller put down windows and adjust the periods of open time. In order to prevent the theft and security problems, IR sensors are used to detect objects. On detecting objects, controller put up windows. Experimental result shows that implemented system can be effectively ventilate inner air and reduce temperature. Proposed system can be applicable to commercial automobiles.

A Study of Data Mining Methodology for Effective Analysis of False Alarm Event on Mechanical Security System (기계경비시스템 오경보 이벤트 분석을 위한 데이터마이닝 기법 연구)

  • Kim, Jong-Min;Choi, Kyong-Ho;Lee, Dong-Hwi
    • Convergence Security Journal
    • /
    • v.12 no.2
    • /
    • pp.61-70
    • /
    • 2012
  • The objective of this study is to achieve the most optimal data mining for effective analysis of false alarm event on mechanical security system. To perform this, this study searches the cause of false alarm and suggests the data conversion and analysis methods to apply to several algorithm of WEKA, which is a data mining program, based on statistical data for the number of case on movement by false alarm, false alarm rate and cause of false alarm. Analysis methods are used to estimate false alarm and set more effective reaction for false alarm by applying several algorithm. To use the suitable data for effective analysis of false alarm event on mechanical security analysis this study uses Decision Tree, Naive Bayes, BayesNet Apriori and J48Tree algorithm, and applies the algorithm by deducting the highest value.

An Approach for Security Problems in Visual Surveillance Systems by Combining Multiple Sensors and Obstacle Detection

  • Teng, Zhu;Liu, Feng;Zhang, Baopeng;Kang, Dong-Joong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.1284-1292
    • /
    • 2015
  • As visual surveillance systems become more and more common in human lives, approaches based on these systems to solve security problems in practice are boosted, especially in railway applications. In this paper, we first propose a robust snag detection algorithm and then present a railway security system by using a combination of multiple sensors and the vision based snag detection algorithm. The system aims safety at several repeatedly occurred situations including slope protection, inspection of the falling-object from bridges, and the detection of snags and foreign objects on the rail. Experiments demonstrate that the snag detection is relatively robust and the system could guarantee the security of the railway through these real-time protections and detections.

Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism (안드로이드 권한과 브로드캐스트 인텐트 매커니즘의 사용 현황 및 보안 취약성 분석)

  • Kim, Young-Dong;Kim, Ikhwan;Kim, Taehyoun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1145-1157
    • /
    • 2012
  • Google Android employs a security model based on application permissions to control accesses to system resources and components of other applications from a potentially malicious program. But, this model has security vulnerabilities due to lack of user comprehension and excessive permission requests by 3rd party applications. Broadcast intent message is widely used as a primary means of communication among internal application components. However, this mechanism has also potential security problems because it has no security policy related with it. In this paper, we first present security breach scenarios caused by inappropriate use of application permissions and broadcast intent messages. We then analyze and compare usage patterns of application permissions and broadcast intent message for popular applications on Android market and malwares, respectively. The analysis results show that there exists a characteristic set for application permissions and broadcast intent receiver that are requested by typical malwares. Based on the results, we propose a scheme to detect applications that are suspected as malicious and notify the result to users at installation time.

Technology trend of Smart-home Security System (스마트 홈 시큐리티 기술 동향)

  • Jang, Ye-Jin;Jeon, Yong-Tae
    • Korean Security Journal
    • /
    • no.30
    • /
    • pp.117-138
    • /
    • 2012
  • To cope with rapidly increasing crimes, the Smart-home system has become common to minimize and prevent crimes in the residential space. Accordingly, the interest on the security-related Smart-home system is also increasing. First is the establishment of Smart-home security standard. At present, the Smart-home security systems are implemented by individual policies of construction companies or by the requirement of residents. Each construction company has their own characteristics in the Smart-home security system; while there is no standardized system. Second is the introduction of Smart-home security certificate system. Like people have certificates, now the residential spaces may also need certificates. A certificate system that represents the performance of residential spaces cannot be an absolute criterion in the evaluation of apartment quality, however, it can be a basic requirement for the convenient residential environment and policies being implemented by the government. If a certificate system would be introduced, construction companies will compete with each other to provide with better security system and apartment operation companies will hire more specialized security personnel in order to get higher certificates. Consequently, better security of residential space will be secured. It is also required to develop and establish response measures by studying the key changes and trends of Smart-home security system. The advance in mechanical security devices will bring about more changes in the future. Therefore, more various in-depth studies are required on the basic specifications of security system in the residential spaces.

  • PDF

Fiber Optic Security System based on Multimode Fiber (광파이비를 이용한 침입자 감시시스템)

  • Kim, Y.H.;Kim, I.S.;Park, H.S.;Oh, S.K.
    • Proceedings of the KIEE Conference
    • /
    • 1997.07e
    • /
    • pp.1887-1889
    • /
    • 1997
  • This paper reports the principle, design, configuration, and test results of the fiber optic security system using multimode fiber. In this system, optical fiber works as a sensing element. The length of sensing element may be from several meters to several killometers. Physical principle of this system is the dependence of interferometric pattern on the end of the fiber on mechanical perturbation in the area, where this fiber is situated. Near and far field patterns of the output light for multimode fiber are speckle pattern. A number of speckles on the fiber depends on mode numbers. Light intensity in each point of the fiber end depends on phase difference of modes. Finally we introduced a "Fiber Optic Security System based on Multimode" Fiber which we developed, it may be available in the field of the important area and building.

  • PDF

A Study on Development of Security Detection System for Infant, the Old and the Weak by using TRIZ (TRIZ를 활용한 유아 및 노약자를 위한 안전감지시스템 개발에 관한 연구)

  • Lee, Kook-Hwan;Lee, Kyeong-Won
    • Journal of the Semiconductor & Display Technology
    • /
    • v.7 no.1
    • /
    • pp.59-65
    • /
    • 2008
  • There are no products, systems to manage health and detect security for infant, the old and the weak in Korea. Recently, the concerns of parents are increasing more about all of children(baby, infant, etc) because rate of birth is decreasing gradually. Also, the average span of human life is on an increasing trend according to well-being and evolution of medical treatment. Therefore, this treatise analyzed problems in managing and following-up infant, the old and the weak at present. By using TRIZ to solve problems, we devised new conceptional ideas, detail designs to manage health, detect security, cope with correspondences for them and developed the prototype and tested it. Excellent performances are proved through various field test.

  • PDF

Development of Data Fusion Human Identification System Based on Finger-Vein Pattern-Matching Method and photoplethysmography Identification

  • Ko, Kuk Won;Lee, Jiyeon;Moon, Hongsuk;Lee, Sangjoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.149-154
    • /
    • 2015
  • Biometric techniques for authentication using body parts such as a fingerprint, face, iris, voice, finger-vein and also photoplethysmography have become increasingly important in the personal security field, including door access control, finance security, electronic passport, and mobile device. Finger-vein images are now used to human identification, however, difficulties in recognizing finger-vein images are caused by capturing under various conditions, such as different temperatures and illumination, and noise in the acquisition camera. The human photoplethysmography is also important signal for human identification. In this paper To increase the recognition rate, we develop camera based identification method by combining finger vein image and photoplethysmography signal. We use a compact CMOS camera with a penetrating infrared LED light source to acquire images of finger vein and photoplethysmography signal. In addition, we suggest a simple pattern matching method to reduce the calculation time for embedded environments. The experimental results show that our simple system has good results in terms of speed and accuracy for personal identification compared to the result of only finger vein images.