• Title/Summary/Keyword: 로그기반

Search Result 957, Processing Time 0.027 seconds

Behavioral Contextualization for Extracting Occupant's ADL Patterns in Smart-home Environment (스마트 홈 환경에서의 재실자 일상생활 활동 패턴 추출을 위한 행동 컨텍스트화 프로세스에 관한 연구)

  • Lee, Bogyeong;Lee, Hyun-Soo;Park, Moonseo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.1
    • /
    • pp.21-31
    • /
    • 2018
  • The rapid increase of the elderly living alone is a critical issue in worldwide as it leads to a rapid increase of a social support costs (e.g., medical expenses) for the elderly. In early stages of dementia, the activities of daily living (ADL) including self-care tasks can be affected by abnormal patterns or behaviors and used as an evidence for the early diagnosis. However, extracting activities using non-intrusive approach is still quite challenging and the existing methods are not fully visualized to understand the behavior pattern or routine. To address these issues, this research suggests a model to extract the activities from coarse-grained data (spatio-temporal data log) and visualize the behavioral context information. Our approach shows the process of extracting and visualizing the subject's spaceactivity map presenting the context of each activity (time, room, duration, sequence, frequency). This research contributes to show a possibility of detecting subject's activities and behavioral patterns using coarse-grained data (limited to spatio-temporal information) with little infringement of personal privacy.

Microscopic Evacuation Simulation in Large-scale Buildings using EgresSIM (EgresSIM을 이용한 대형건축물의 미시적 대피시뮬레이션)

  • Kwak, Suyeong;Nam, Hyunwoo;Jun, Chulmin
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.1
    • /
    • pp.53-61
    • /
    • 2016
  • This paper introduces 'EgresSIM', which is microscopic evacuation simulation software. EgresSIM developed in this paper is a three-dimensional (3D) pedestrian evacuation simulator based on the improved model advanced from the floor field model(FFM), a microscopic pedestrian model. This software can simulate large size buildings that consist of a number of floors, stairs, rooms, and exit doors. Moreover, this software can arrange several hundreds or thousands of pedestrians in indoor space and check their movements through the 3D viewer in real time, as well as produce detailed results about evacuation situations such as which paths are employed by individual pedestrians, how long does it takes to evacuate, and how many evacuees are gathered at each of the exit doors. Building data needed in the simulation are constructed as XML files according to pre-defined indoor data models and information of simulation results is also created as XML log files. A moving pattern of pedestrians can be represented in many ways by adjusting the sensitivity parameters of two walk models supported by EgresSIM. Thus, evacuation simulation can be done based on many assumptions of situations such as movement to the nearest exit door or blackout after outage.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Multi User-Authentication System using One Time-Pseudo Random Number and Personal DNA STR Information in RFID Smart Card (RFID 스마트카드내 DNA STR Information과 일회용 의사난수를 사용한 다중 사용자 인증시스템)

  • Sung, Soon-Hwa;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.747-754
    • /
    • 2003
  • Thia paper suggests a milti user-authentication system comprises that DNA biometric informatiom, owner's RFID(Radio Frequency Identification) smartcard of hardware token, and PKI digital signqture of software. This system improved items proposed in [1] as follows : this mechanism provides one RFID smartcard instead of two user-authentication smartcard(the biometric registered seal card and the DNA personal ID card), and solbers user information exposure as RFID of low proce when the card is lost. In addition, this can be perfect multi user-autentication system to enable identification even in cases such as identical twins, the DNA collected from the blood of patient who has undergone a medical procedure involving blood replacement and the DNA of the blood donor, mutation in the DNA base of cancer cells and other cells. Therefore, the proposed system is applied to terminal log-on with RFID smart card that stores accurate digital DNA biometric information instead of present biometric user-authentication system with the card is lost, which doesn't expose any personal DNA information. The security of PKI digital signature private key can be improved because secure pseudo random number generator can generate infinite one-time pseudo randon number corresponding to a user ID to keep private key of PKI digital signature securely whenever authenticated users access a system. Un addition, this user-authentication system can be used in credit card, resident card, passport, etc. acceletating the use of biometric RFID smart' card. The security of proposed system is shown by statistical anaysis.

A Study on the Characteristics of Local Energy Consumption by Using Index Decomposition Analysis (지수분해분석을 이용한 지자체의 에너지 소비특성에 관한 연구)

  • Jin, Sang Hyeon;Hwang, In Chang
    • Environmental and Resource Economics Review
    • /
    • v.18 no.4
    • /
    • pp.557-586
    • /
    • 2009
  • Although energy demand management policy attracts attention internationally and domestically, the importance of local government in this policy is not so much as central government. But local government can do a role with regard to this policy because it is close to energy consumers not like central government. So local energy plan should be based on the understanding local energy consumption characteristics to activate local energy demand management policy. This paper tries to analyze energy characteristics of 16 local governments by decomposing energy consumption into population, production and intensity factors. The result of index decomposition analysis shows that energy intensity improvement has offset the increase of energy consumption caused by economic growth in the metropolitan cities, while it couldn't offset in the other provinces because of industrialization based on the manufacturing. In conclusion, this paper suggests that it will be necessary to switch to low energy society by carrying out concrete energy efficiency improvement projects in the metropolitan cities while it will be helpful to make a local development plan for low energy intensive industrialization in the other provinces.

  • PDF

A Study on the Development of Product Design Database Based on Product Attributes (제품속성을 기반으로 한 제품디자인 데이터베이스 개발에 대한 기초적 연구)

  • 박정순;이건표
    • Archives of design research
    • /
    • v.12 no.2
    • /
    • pp.133-144
    • /
    • 1999
  • Considering product as mass of information, it is very critical for designers to have good means of accessing to and organizing information on products. However, designers conventionally depend on their experience, bunch of catalogues, or short visit to some fairs for gathering information on products. There are no systematically organized information for designing new products. If any, those are ones developed by market researchers or engineers who speak fundamentally different language from designers. It is needed to develop the information system through which designer can get insights on the essence of product and communicate information with various persons involved in new product planning. At first, the design information in product planning is discussed and the necessity of development of new design information system is emphasized. Then, product is understood as a composite of various attributes and a set of fundamental attributes of product is defined by surveying and summarizing existing theories of product attributes: namely technological, human, and market attributes. The possibility of new design information system is explored by analyzing various relationships between attributes of different products. Computer program 'DISPP' displays various visual information of product itself, perceptual map, trend slope, profile chart and general information of manufacturer, style, color, price, size. Finally, findings of thesis are concluded and further prospects of the study are proposed.

  • PDF

A study on vulnerability analysis and incident response methodology based on the penetration test of the power plant's main control systems (발전소 주제어시스템 모의해킹을 통한 취약점 분석 및 침해사고 대응기법 연구)

  • Ko, Ho-Jun;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.295-310
    • /
    • 2014
  • DCS (Distributed Control System), the main control system of power plants, is an automated system for enhancing operational efficiency by monitoring, tuning and real-time operation. DCS is becoming more intelligent and open systems as Information technology are evolving. In addition, there are a large amount of investment to enable proactive facility management, maintenance and risk management through the predictive diagnostics. However, new upcoming weaponized malware, such as Stuxnet designed for disrupting industrial control system(ICS), become new threat to the main control system of the power plant. Even though these systems are not connected with any other outside network. The main control systems used in the power plant usually have been used for more than 10 years. Also, this system requires the extremely high availability (rapid recovery and low failure frequency). Therefore, installing updates including security patches is not easy. Even more, in some cases, installing security updates can break the warranty by the vendor's policy. If DCS is exposed a potential vulnerability, serious concerns are to be expected. In this paper, we conduct the penetration test by using NESSUS, a general-purpose vulnerability scanner under the simulated environment configured with the Ovation version 1.5. From this result, we suggest a log analysis method to detect the security infringement and react the incident effectively.

A Study on Continuous Monitoring Reinforcement for Sales Audit Using Process Mining Under Big Data Environment (빅데이터 환경에서 프로세스 마이닝을 이용한 영업감사 상시 모니터링 강화에 대한 연구)

  • Yoo, Young-Seok;Park, Han-Gyu;Back, Seung-Hoon;Hong, Sung-Chan
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.123-131
    • /
    • 2016
  • Process mining in big data environment utilize a number of data were generated from the business process. It generates lots of knowledge and insights regarding implementation and improvement of the process through the event log of the company's enterprise resource planning (ERP) system. In recent years, various research activities engaged with the audit work of company organizations are trying actively by using the maximum strength of the mining process. However, domestic studies on applicable sales auditing system for the process mining are insufficient under big data environment. Therefore, we propose process-mining methods that can be optimally applied to online and traditional auditing system. In advance, we propose continuous monitoring information system that can early detect and prevent the risk under the big data environment by monitoring risk factors in the organizations of enterprise. The scope of the research of this paper is to design a pre-verification system for risk factor via practical examples in sales auditing. Furthermore, realizations of preventive audit, continuous monitoring for high risk, reduction of fraud, and timely action for violation of rules are enhanced by proposed sales auditing system. According to the simulation results, avoidance of financial risks, reduction of audit period, and improvement of audit quality are represented.

Determination of Hydraulic Conductivities in the Sandy Soil Layer through Cross Correlation Analysis between Rainfall and Groundwater Level (강우-지하수위 상관성 분석을 통한 사질토층의 수리전도도 산정)

  • Park, Seunghyuk;Son, Doo Gie;Jeong, Gyo-Cheol
    • The Journal of Engineering Geology
    • /
    • v.29 no.3
    • /
    • pp.303-314
    • /
    • 2019
  • Surface permeability and shallow geological structures play significant roles in shaping the groundwater recharge of shallow aquifers. Surface permeability can be characterized by two concepts, intrinsic permeability and hydraulic conductivity, with the latter obtained from previous near-surface geological investigations. Here we propose a hydraulic equation via the cross-correlation analysis of the rainfall-groundwater levels using a regression equation that is based on the cross-correlation between the grain size distribution curve for unconsolidated sediments and the rainfall-groundwater levels measured in the Gyeongju area, Korea, and discuss its application by comparing these results to field-based aquifer test results. The maximum cross-correlation equation between the hydraulic conductivity derived from Zunker's observation equation in a sandy alluvial aquifer and the rainfall-groundwater levels increases as a natural logarithmic function with high correlation coefficients (0.95). A 2.83% difference between the field-based aquifer test and root mean square error is observed when this regression equation is applied to the other observation wells. Therefore, rainfall-groundwater level monitoring data as well as aquifer test are very useful in estimating hydraulic conductivity.

Moderating effects of Income Smoothing on the relationship between managerial ability and manager compensation (경영자 능력과 경영자 보상의 관련성에 이익유연화가 미치는 조절효과)

  • Lee, Eun-Ju;Hwang, Sung-Jun
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.321-329
    • /
    • 2021
  • A measure of managerial ability was derived using DEA, a measure of management efficiency, and the correlation coefficient between discretionary accrual and non-discretionary accrual, net income and operating cash flow standard deviation was used as a proxy for income smoothing. verified. In addition, the manager's compensation was used by taking the natural logarithm of the cash compensation per manager. The analysis results are summarized as follows. The analysis period for hypothesis testing is from 2004 to 2017, as a result of the hypothesis analysis of the correlation with the level of manager's compensation, it was suggested that the income smoothing behavior decreased the performance-based compensation and increased the performance-controlled compensation. This can be said to be the result of indirectly confirming that additional compensation is differentially paid for income smoothing. This study has a contribution to the study by empirically analyzing whether income smoothing affects the relationship between managerial ability and managerial compensation. However, although a number of previous studies empirically analyzed that there are upper and lower bounds for manager compensation, there is limitations that could not be analyzed for asymmetric compensation due to income smoothing is expected to expand.