• Title/Summary/Keyword: 노출제한 방법

Search Result 133, Processing Time 0.032 seconds

A Study on Local Three-Dimensional Visualization Methodology for Effective Analysis of Construction Environments in Extreme Cold Regions (효과적인 극한지 건설환경 분석을 위한 현지 3차원 가시화 방안 연구)

  • Kim, Eui Myoung;Lee, Woo Sik;Hong, Chang Hee
    • Spatial Information Research
    • /
    • v.20 no.6
    • /
    • pp.129-137
    • /
    • 2012
  • For construction project in extreme cold region, it is essential to establish basic data on the site such as topographical data from the early stage of construction of planning and designing, and it is needed to frequently perform site investigation when necessary. However, extreme cold regions are characteristic of being at long distance and difficult in approaching, and special regions such as Antarctica, in particular, are hard to conduct site investigation. Although a site investigation may be conducted, those who can visit Antarctica are sufficiently limited so that most of the staff may participate in construction without knowledge of the site and increase the risk of errors in decision making or designing. In order to resolve such problems, the authors in this study identified methods of building wide-area topographical data and bedrock classification data of exposed areas via remote sensing and of building precise topographical data on the construction site. Also, the authors attempted to present methods by which such data can be managed and visualized integrally via three-dimensional GIS technology and all the participants in construction can learn sense of field and conduct necessary analysis as frequent as possible. The areas around the Jangbogo Antarctic Station were selected to be the research area for conducting effective integrational management and three-dimensional visualization of various spatial data such as wide-area digital elevation model, ortho-images, bedrock classification data, local precise digital elevation model, and site images. The results of this study may enable construction firms to analyze local environments for construction whenever they need for construction in extreme cold regions and then support construction work including decision making or designing.

An Experimental Study on the Influence of the Spread of Firebrand on Building Exterior Materials and Roofing Materials in Urban Areas (도심지 인접 산불의 불티 확산이 건축물 외장재와 지붕재에 미치는 영향에 관한 실험적 연구)

  • Min, Jeong-Ki
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.3
    • /
    • pp.617-626
    • /
    • 2021
  • Purpose: The purpose of this study is to evaluate the fire srpead risk of building exterior and roofing materials due to the firebrand of forest fire occurring in the urban areas. Method: In order to achieve this research purpose, by selecting building materials used for exterior and roofing materials of buildings, the time to ignition, total heat release, and heat release rate were investigated, and a forest fire firebrand system was established to the possibility of fire spread was confirmed. Result: As a result of the cone calorimeter test, the roofing material had a similar or faster ignition time due to radiant heat compared to the exterior material with the steel plate exposed to the outside, and showed a higher heat release rate and total heat release than the exterior material. Although it was affected by the flammable material, it was confirmed that it did not spread easily due to the limited amount of combustible material, and carbonization marks appeared inside. Conclusion: The cone calorimeter test method has been shown to be useful in understanding the combustion characteristics of building materials by radiant heat, but the fire spread due to a firebrand in a forest fire is directly affected by the flame due to the ignition of surrounding combustibles, so finding a direct correlation with the cone calorimeter method is difficult. It is judged that the roof material may be more vulnerable to the spread of fire due to the fire than the exterior material.

Source-Location Privacy in Wireless Sensor Networks (무선 센서 네트워크에서의 소스 위치 프라이버시)

  • Lee, Song-Woo;Park, Young-Hoon;Son, Ju-Hyung;Kang, Yu;Choe, Jin-Gi;Moon, Ho-Gun;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.125-137
    • /
    • 2007
  • This paper proposes a new scheme to provide the location privacy of sources in Wireless Sensor Networks (WSNs). Because the geographical location of a source sensor reveals contextual information on an 'event' in WSN, anonymizing the source location is an important issue. Despite abundant research efforts, however, about data confidentiality and authentication in WSN, privacy issues have not been researched well so far. Moreover, many schemes providing the anonymity of communication parties in Internet and Ad-hoc networks are not appropriate for WSN environments where sensors are very resource limited and messages are forwarded in a hop-by-hop manner through wireless channel. In this paper, we first categorize the type of eavesdroppers for WSN as Global Eavesdropper and Compromising Eavesdropper. Then we propose a novel scheme which provides the anonymity of a source according to the types of eavesdroppers. Furthermore, we analyze the degree of anonymity of WSN using the entropy-based modeling method. As a result, we show that the proposed scheme improves the degree of anonymity compared to a method without any provision of anonymity and also show that the transmission range plays a key role to hide the location of source sensors.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

One-probe P300 based concealed information test with machine learning (기계학습을 이용한 단일 관련자극 P300기반 숨김정보검사)

  • Hyuk Kim;Hyun-Taek Kim
    • Korean Journal of Cognitive Science
    • /
    • v.35 no.1
    • /
    • pp.49-95
    • /
    • 2024
  • Polygraph examination, statement validity analysis and P300-based concealed information test are major three examination tools, which are use to determine a person's truthfulness and credibility in criminal procedure. Although polygraph examination is most common in criminal procedure, but it has little admissibility of evidence due to the weakness of scientific basis. In 1990s to support the weakness of scientific basis about polygraph, Farwell and Donchin proposed the P300-based concealed information test technique. The P300-based concealed information test has two strong points. First, the P300-based concealed information test is easy to conduct with polygraph. Second, the P300-based concealed information test has plentiful scientific basis. Nevertheless, the utilization of P300-based concealed information test is infrequent, because of the quantity of probe stimulus. The probe stimulus contains closed information that is relevant to the crime or other investigated situation. In tradition P300-based concealed information test protocol, three or more probe stimuli are necessarily needed. But it is hard to acquire three or more probe stimuli, because most of the crime relevant information is opened in investigative situation. In addition, P300-based concealed information test uses oddball paradigm, and oddball paradigm makes imbalance between the number of probe and irrelevant stimulus. Thus, there is a possibility that the unbalanced number of probe and irrelevant stimulus caused systematic underestimation of P300 amplitude of irrelevant stimuli. To overcome the these two limitation of P300-based concealed information test, one-probe P300-based concealed information test protocol is explored with various machine learning algorithms. According to this study, parameters of the modified one-probe protocol are as follows. In the condition of female and male face stimuli, the duration of stimuli are encouraged 400ms, the repetition of stimuli are encouraged 60 times, the analysis method of P300 amplitude is encouraged peak to peak method, the cut-off of guilty condition is encouraged 90% and the cut-off of innocent condition is encouraged 30%. In the condition of two-syllable word stimulus, the duration of stimulus is encouraged 300ms, the repetition of stimulus is encouraged 60 times, the analysis method of P300 amplitude is encouraged peak to peak method, the cut-off of guilty condition is encouraged 90% and the cut-off of innocent condition is encouraged 30%. It was also conformed that the logistic regression (LR), linear discriminant analysis (LDA), K Neighbors (KNN) algorithms were probable methods for analysis of P300 amplitude. The one-probe P300-based concealed information test with machine learning protocol is helpful to increase utilization of P300-based concealed information test, and supports to determine a person's truthfulness and credibility with the polygraph examination in criminal procedure.

Constructing Geological Cross-sections at Depth and Interpreting Faults Based on Limited Shallow Depth Data Analysis and Core Logging: Southern Section of the Yangsan Fault System, SE Korea (제한된 천부자료와 시추코어분석을 통한 심부지질단면도 작성과 단층 인지법: 한반도 남동부 양산단층대 주변에서의 적용)

  • Kim, Taehyung;Kim, Young-Seog;Lee, Youngmin;Choi, Jin-Hyuck
    • The Journal of Engineering Geology
    • /
    • v.26 no.2
    • /
    • pp.277-290
    • /
    • 2016
  • Deep geological cross-sectional data is generally not common nor easy to construct, because it is expensive and requires a great deal of time. As a result, geological interpretations at depth are limited. Many scientists attempt to construct geological cross-sections at depth using geological surface data and geophysical data. In this paper, we suggest a method for constructing cross-sections from limited geological surface data in a target area. The reason for this study is to construct and interpret geological cros-sections at depth to evaluate heat flow anomaly along the Yangsan fault. The Yangsan Fault passes through the south-eastern part of the Korean Peninsula. The cross-section is constructed from Sangbukmyeon to Unchonmyeon passing perpendicularly through the Yangsan Fault System trending NW-SE direction. The geological cross-section is constructed using the following data: (1) Lithologic distributions and main structural elements. (2) Extensity of sedimentary rock and igneous rock, from field mapping. (3) Fault dimension calculated based on geometry of exposed surface rupture, and (4) Seismic and core logging data. The Yangsan Fault System is composed of the Jain fault, Milyang fault, Moryang fault, Yangsan fault, Dongnae fault, and Ingwang fault which strike NNE-SSW. According to field observation, the western section of the Yangsan fault bounded by igneous rocks and in the eastern section sedimentary rocks are dominant. Using surface fault length we infer that the Yangsan Fault System has developed to a depth of kilometers beneath the surface. According to seismic data, sedimentary rocks that are adjacent to the Yangsan fault are thin and getting thicker towards the east of the section. In this study we also suggest a new method to recognize faults using core loggings. This analysis could be used to estimate fault locations at different scales.

A Qualitative Study on Reducing Dental Anxiety through Cognitive Behavioral Therapy (인지행동치료를 통한 치과불안 감소에 대한 질적 연구)

  • Koh, Boo-Il;Song, Youn-Mi;Bae, Soo-Myoung
    • Journal of dental hygiene science
    • /
    • v.17 no.1
    • /
    • pp.46-55
    • /
    • 2017
  • Many people in Korea suffer from a fear of dental treatments; however, only a few studies have focused on this population. This study assessed the effectiveness of cognitive behavioral therapy (CBT) and its interventions in reducing dental anxiety, especially when administered by trained dental staff. Using case studies, the authors analyzed the content of each session and examined the process of reducing dental anxiety. First, the authors observed that the results of both dental fear scale and subjective unit of disturbance decreased significantly with changes in cognitive distortions related to dental anxiety and that rapid improvements were noted after two therapy sessions. Second, the study reported that practicing relaxation (deep-breathing) and muscle relaxation techniques; using hand signals to indicate anxiety or discomfort; establishing an empathic relationship with the therapist; making an anxiety list; and graded insensitive and exposure along with rehearsal, were effective in coping with dental anxiety and in changing negative thoughts towards the dentist. Third, a simple cognitive behavioral intervention can be effective in reducing dental anxiety. In summary, a short-term, five-session psychological intervention with CBT produced a sustained decrease in the symptoms of dental anxiety, allowing the patients to receive the required procedures. The authors discussed the study limitations and the implication of their results on future research.

Health Effects of Ambient Perticulate Pollutants (대기분진에 의한 건강영향)

  • Hong, Yun-Chul;Cho, Soo-Hun
    • Journal of Preventive Medicine and Public Health
    • /
    • v.34 no.2
    • /
    • pp.103-108
    • /
    • 2001
  • Recently, numerous studies have focused on the health effects of ambient particulate pollutants. Compared to earlier studios that focused on severe air pollution episodes, recent studies are more relevant to understanding the health effects of air pollution at levels common to contemporary cities. We reviewed recent epidemiologic studies that evaluated health effects of particulate air pollution and concluded that respirable particulate air pollution is an important contributing factor to acute mortality and morbidity. We observed increased respiratory and cardiovascular deaths, increased hospital admissions and visits, and decreased lung function. We also observed increased mortality and morbidity in a Korean population. Theses health effects were observed at levels below the current Ambient Air Quality Standard for particulate air pollution.

  • PDF

A Study of the Landscape Agreement Project for Historical and Cultural Landscape Preservation (역사문화경관 보전을 위한 경관협정 항목에 관한 연구)

  • Shin, Min-Ji;Shin, Ji-Hoon
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.41 no.6
    • /
    • pp.129-139
    • /
    • 2013
  • This study was designed to suggest a landscape agreement in order to effectively preserve historical and cultural landscapes at this point of time when many landscape agreements are being concluded for landscape management, to analyze landscape management methods according to the problems of comprehensive and widespread landscape agreements and landscape types and to generalize landscape agreement contents. To begin, sustainable and practical landscape management plans that local people can themselves participate and carry out were proposed, based on historical and cultural landscape preservation guidelines extracted from the consideration of domestic and foreign cases about landscape management by citizen autonomy and participation. The guidelines considered what regional residents would follow by themselves, as well as what should be considered with regard to the accessibility and symbolism of a building's appearance and external spaces designed with the motif of historical and cultural landscapes. The guidelines also pay attention to the maintenance management of outdoor advertisements and facilities in order to maintain a pedestrian-friendly street environment which pursues designs in harmony with the existing historical and cultural landscapes. In addition, the recommended guidelines that are considered less important,are restricting the sizes of buildings, encouraging maintenance management of the details and external spaces to hide building facilities and block them from being exposed and including information about the use of nature-friendly materials, and the management of neon signs in the landscapes and lighting time during the night. These results demonstrate that local residents need to improve the landscapes and change their consciousness by themselves to maintain the historical and cultural landscapes with a sense of tradition.

Analysis of Sedimentation Around Jetties in the West Coast: based on field measurement and hydrodynamic modeling (서해연안 돌제구조물 주위의 침퇴적 해석: 실측 및 수동역학 모델에 의한 초기추정)

  • Suh, Seung-Won;Yoo, Gyeong-Sun;Lee, Hwa-Young
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.19 no.4
    • /
    • pp.345-354
    • /
    • 2007
  • A sedimentation analysis has been attempted to figure out sedimentation environment due to construction of coastal jetties, such as fish harbor dike, flow guided dike and jetty in shallow Kusipo area, in which tidal range marks up to 6.6 meters in spring tide. As an initial approach of understanding field measurement were done on several stations along reference lines with total station and photo analysis taken by remote controlled small air craft far one and half years. Also numerical tests were done by 2-D ADCIRC model considering dry-wet treatment to evaluate flow and bottom shear stress variations. According to direct measurement, deposition seems to be dominant on Kusipo beach. Model results show bottom shear stress lessens to $0.10{\sim}0.15\;N/m^2$ on most shadow zone of jetties and the inner zone is suffering sedimentation as a result of dike construction. However this is the first approach with limited analysis, thus it should be dealt further considering physical characteristics of bottom sediments in a complete sediment model on upcoming study.