• Title/Summary/Keyword: 사회적 위협

Search Result 670, Processing Time 0.03 seconds

Human-induced global warming and changes in aridity (인간활동에 기인한 지구온난화와 전구 건조도 변화)

  • Kim, Hyungjun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.108-108
    • /
    • 2022
  • 기후변화는 전 지구 수문순환과 수자원 분포에 커다란 영향을 준다. 하지만 지금까지 관측되어온 지구상의 건조도 변화에 있어서 기후의 자연변동성의 영향과 인간활동에 의한 온난화의 영향을 명시적으로 밝힌 연구는 존재하지 않는다. 본 연구에서는 데이터 구동형 모델과 물리 모델을 이용해 관측 기반의 전구 수자원 분포를 1902년부터 2014년까지 재구축함으로써 지구의 평균온도가 약 1도 상승해온 지난 세기에 걸쳐 건기의 수자원 분포가 어떻게 변해왔는지 보인다. 재구축된 전구 변화 패턴은 인간활동에 의한 온실가스 증가등을 고려한 기후 모델 시뮬레이션과 흡사함을 알 수 있었으며 기후의 자연변동성만을 고려한 기후 모델 시뮬레이션에서는 발견되지 않았다. 주로 북아시아, 북미, 유럽 등 중위도 온대지방에서 더욱더 건조한 건기가 뚜렷하게 나타났으며 이는 강수량의 감소보다는 증발산의 증가에 기인하는 것으로 나타난다. 이와 같은 건조도의 변화는 미래 있어서 또한 인류에 대한 커다란 위협으로 자리한다. 미래 기후에서의 가뭄의 변화에 대해 다양한 연구들이 존재하지만 대부분 높은 수준의 온난화 (예를들어 RCP-SSP 585)에서의 영향에 국한된다. 다시 말해 인류가 21세기 중반에 달성을 목표로 하는 탄소중립이 가뭄의 측면에서 어떤 영향을 주게 될지에 대한 연구는 아직 충분하지 않다고 할 수 있다. 본 연구에서는 약한 혹은 중간 수준의 기후변화 시나리오를 이용해 파리협약에서 목표로 하는 1.5℃와 2℃ 상승에 따라 전 지구의 건조도 분포가 어떻게 변하고 그 변화에 있어서 어떠한 수문기후학적 메커니즘이 작용하는지 밝힌다. 지중해 연안 지역에서는 건조도의 가속이 +1.5℃와 +2℃사이에 존재하였으나 동아시아에서는 +1.5℃와 +2℃ 모두에서 습윤해짐을 알 수 있었으며 이러한 지역적 불균일성은 기후변화 대응 노력에 있어서 과거 온실가스 배출에 대한 책임뿐만 아니라 다양한 부문에 걸친 미래의 잠재 적응 노력 또한 고려해야만 함을 시사한다. 본 연구는 제6차 Coupled Model Intercomparison Project의 Land Surface, Snow, Soil-moisture Model Intercomparison Project (CMIP6/LS3MIP)와 Half a degree Additional warming, Prognosis and Projected Impacts (HAPPI)의 다중 모델 앙상블 시뮬레이션 결과를 이용했다.

  • PDF

The Model of Network Packet Analysis based on Big Data (빅 데이터 기반의 네트워크 패킷 분석 모델)

  • Choi, Bomin;Kong, Jong-Hwan;Han, Myung-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.5
    • /
    • pp.392-399
    • /
    • 2013
  • Due to the development of IT technology and the information age, a dependency of the network over the most of our lives have grown to a greater extent. Although it provides us to get various useful information and service, it also has negative effectiveness that can provide network intruder with vulnerable roots. In other words, we need to urgently cope with theses serious security problem causing service disableness or system connected to network obstacle with exploiting various packet information. Many experts in a field of security are making an effort to develop the various security solutions to respond against these threats, but existing solutions have a lot of problems such as lack of storage capacity and performance degradation along with the massive increase of packet data volume. Therefore we propose the packet analysis model to apply issuing Big Data technology in the field of security. That is, we used NoSQL which is technology of massive data storage to collect the packet data growing massive and implemented the packet analysis model based on K-means clustering using MapReudce which is distributed programming framework, and then we have shown its high performance by experimenting.

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.

COVID-19-related Korean Fake News Detection Using Occurrence Frequencies of Parts of Speech (품사별 출현 빈도를 활용한 코로나19 관련 한국어 가짜뉴스 탐지)

  • Jihyeok Kim;Hyunchul Ahn
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.267-283
    • /
    • 2023
  • The COVID-19 pandemic, which began in December 2019 and continues to this day, has left the public needing information to help them cope with the pandemic. However, COVID-19-related fake news on social media seriously threatens the public's health. In particular, if fake news related to COVID-19 is massively spread with similar content, the time required for verification to determine whether it is genuine or fake will be prolonged, posing a severe threat to our society. In response, academics have been actively researching intelligent models that can quickly detect COVID-19-related fake news. Still, the data used in most of the existing studies are in English, and studies on Korean fake news detection are scarce. In this study, we collect data on COVID-19-related fake news written in Korean that is spread on social media and propose an intelligent fake news detection model using it. The proposed model utilizes the frequency information of parts of speech, one of the linguistic characteristics, to improve the prediction performance of the fake news detection model based on Doc2Vec, a document embedding technique mainly used in prior studies. The empirical analysis shows that the proposed model can more accurately identify Korean COVID-19-related fake news by increasing the recall and F1 score compared to the comparison model.

A Study on the Selection of Base Port and Establishment of International Cooperation System for Seafarer Rotation In case of Emergency - Focusing on the Service Network of HMM - (비상 시 선원교대를 위한 거점항만 선정과 국제협력 방안 - HMM 정기선을 중심으로 -)

  • Kim, Bo-ram;Lee, Hye-jin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.2
    • /
    • pp.275-285
    • /
    • 2021
  • COVID-19 is threatening the safety of ships and seafarers by delaying seafarer rotation. Shipping companies and governments have a blindspot in case of the onboard environment of seafarers. An effective, alternative plan should be devised to eliminate the possibility of human accidents in an emergency that threatens the safety of seafarers. According to the survey of former and current seafarers, the most important factor in boarding life was safety, and the most necessary thing during emergencies was to secure smooth seafarer rotation rather than improve wages and welfare. By analyzing the major routes of national shipping companies by continent, ports with a large number of calls and a high Air Connectivity Index were selected as the base port. In addition, the route was designed for effective, domestic seafarer rotation during international shipping. Other countries must be consulted to establish a travel route linking ships, ports, and airports for the safe return of sailors to their home countries during an emergency. In addition, it is necessary to work together for the seafarers who are in trouble of seafarer rotation through cooperation with the International Maritime Organization(IMO). Starting with this, the government should have a monitoring system for the return and non-return routes as well as the number of seafarers on board. If such a system is established, it will be able to determine the response direction of our country's policy in case of an emergency. Along with the shipping company's ef orts to improve the treatment of seafarers, national and social attention will be needed to review domestic laws and improve awareness about seafarers.

IPTV Service Provider over FTTH (광가입자망을 통한 IPTV 서비스 제공)

  • Park In-Gyu
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.5 s.347
    • /
    • pp.7-16
    • /
    • 2006
  • IPTV is referred to the service which provide integrated IPTV services for providing video, 10/100-Mbit/sec Internet, voice, video-on-demand (VOD), and other broadband applications including home security, video conferencing, and telemedicine. All services are integrated into an IP (Internet Protocol) architecture designed specifically for Gigabit Ethernet FTTH systems, HFC or xDLC. It is absolutely necessary that telecon operators provide IP video delivery platforms that enable service providers to transform their business. With their own products, they can better manage their existing services and generate new revenues from broadcast TV, movies on demand and multimedia. Triple-play is a combination of broadcast, telephony and broadband services offered through IPTV networks. With cable operators allowed to offer a triple-play bundle, the nation's telecom operators are beginning to get a little anxious. Cable operators assert that triple-play is a must-have and natural extension of the cable service bundle. The Korean Cable TV Association asserts that the triple-play model is of paramount importance to the cable industry's future growth. But the telecom sector considers itself unfairly disadvantaged, saying they cannot compete until regulatory issues are resolved. The start of web-based television in Korea may still be some time off with a confrontation between the nation's IT regulator and broadcasting sector over the service's legal boundaries shows no signs of being resolved my time soon. korea should be is the fastest-growing provider of IPTV solutions in the industry, with over worldwide customers.

DoS/DDoS attacks Detection Algorithm and System using Packet Counting (패킷 카운팅을 이용한 DoS/DDoS 공격 탐지 알고리즘 및 이를 이용한 시스템)

  • Kim, Tae-Won;Jung, Jae-Il;Lee, Joo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.151-159
    • /
    • 2010
  • Currently, by using the Internet, We can do varius things such as Web surfing, email, on-line shopping, stock trading on your home or office. However, as being out of the concept of security from the beginning, it is the big social issues that malicious user intrudes into the system through the network, on purpose to steal personal information or to paralyze system. In addition, network intrusion by ordinary people using network attack tools is bringing about big worries, so that the need for effective and powerful intrusion detection system becomes very important issue in our Internet environment. However, it is very difficult to prevent this attack perfectly. In this paper we proposed the algorithm for the detection of DoS attacks, and developed attack detection tools. Through learning in a normal state on Step 1, we calculate thresholds, the number of packets that are coming to each port, the median and the average utilization of each port on Step 2. And we propose values to determine how to attack detection on Step 3. By programing proposed attack detection algorithm and by testing the results, we can see that the difference between the median of packet mounts for unit interval and the average utilization of each port number is effective in detecting attacks. Also, without the need to look into the network data, we can easily be implemented by only using the number of packets to detect attacks.

A Study on Risk Factors of Metabolic Syndrome and Health Behaviors in a Region - 2014 community health survey - (일 지역 대사증후군 위험인자와 건강행태에 관한 연구 -2014 지역사회건강조사-)

  • Ahn, Ok-hee;Choi, Seong-hui;Kim, Seo-Hyeon;Ryu, Si-Ok;Choi, Young-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.218-225
    • /
    • 2016
  • Recently, Korea has undergone rapid social and economic development, and with that came various changes in living habits and disease patterns; the nation, accordingly, has been alerted to the associated risks of chronic ailments. As risk factors of metabolic syndrome commonly include causal factors of chronic diseases, prevention is important. The prevalence of metabolic syndrome in Korean adults is 22.4%, which comprises a large portion of the whole disease (Korean National Health and Nutrition Examination Survey, 2013). This study aims to examine the elements of healthy living practices by analyzing the risk factors of metabolic syndrome and health behaviors, and provide basic materials to contribute to the activation of health promotion. Among 12,481 subjects of the source data from the 2014 community health survey, which was performed on adults aged 19 and over in Jeonlabuk-do, 12,185 people were analyzed in this study using SPSS 23.0. There were significant differences with respect to sex, smoking status, age, education level, and number of days of physical activity among the results of the difference of the risk factors of the metabolic syndrome according to the characteristics of the health behavior of the subjects. Of the risk factors for metabolic syndrome, this study emphasized the necessity of strategies to promote health programs regarding the management of drinking, smoking, physical activities, depression, subjective health condition and quality of life to the group of those with dyslipidemia, hypertension, and diabetes.

Classification of hydropower dam in North-han River based on water storage characteristics (저류특성을 고려한 북한강수계 발전용댐의 유형 구분방안 제시)

  • Choi, Jeongwook;Jeong, Gimoon;Kang, Doosun;Ahn, Jeonghwan;Kim, Taesoon
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.8
    • /
    • pp.567-576
    • /
    • 2021
  • Climate change threatens the security of domestic water resources in South Korea. To overcome the potential water shortage, various approaches are being studied by alterning the operation of dams or by integrated operation of multiple dams and reservoirs. However, most of the related researches were developed and applied for multi-purpose dams, and few studies were conducted for the hydropower dams. The main purpose of the hydropower dam is to generate electric energy; however, the potential water shortage due to prolonged droughts brings the idea to supply water from the hydropower dam in the basin. To that end, it is required to estimate the water supply ability of the hydropower dams. In this study, we proposed a methodology to classify the hydropower dam into a "storage-type" and "run-of-river type" dam. The proposed approach was demonstrated using the hydropower dams located in North-han River basin. The results of this study are expected to contribute for further analysis of the hydropower dams, such as evaluation of water supply capacity and drought mitigation purpose operation of the hydropower dams.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.