• Title/Summary/Keyword: 위험대응

Search Result 1,446, Processing Time 0.031 seconds

Dynamic Threshold Determination Method for Energy Efficient SEF using Fuzzy Logic in Wireless Sensor Networks (무선 센서 네트워크에서 통계적 여과 기법의 에너지 효율 향상을 위한 퍼지논리를 적용한 동적 경계값 결정 기법)

  • Choi, Hyeon-Myeong;Lee, Sun-Ho;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.53-61
    • /
    • 2010
  • In wireless sensor networks(WSNs) individual sensor nodes are subject to security compromises. An adversary can physically capture sensor nodes and obtain the security information. And the adversary injects false reports into the network using compromised nodes. If undetected, these false reports are forwarded to the base station. False reports injection attacks can not only result in false alarms but also depletion of the limited amount of energy in battery powered sensor nodes. To combat these false reports injection attacks, several filtering schemes have been proposed. The statistical en-routing filtering(SEF) scheme can detect and drop false reports during the forwarding process. In SEF, The number of the message authentication codes(threshold) is important for detecting false reports and saving energy. In this paper, we propose a dynamic threshold determination method for energy efficient SEF using fuzzy-logic in wireless sensor networks. The proposed method consider false reports rate and the number of compromised partitions. If low rate of false reports in the networks, the threshold should low. If high rate of false reports in networks, the threshold should high. We evaluated the proposed method’s performance via simulation.

High-resolution Urban Flood Modeling using Cellular Automata-based WCA2D in the Oncheon-cheon Catchment in Busan, South Korea (셀룰러 오토마타 기반 WCA2D 모형을 이용한 부산 온천천 유역 고해상도 도시 침수 해석)

  • Choi, Hyeonjin;Lee, Songhee;Woo, Hyuna;Noh, Seong Jin
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.5
    • /
    • pp.587-599
    • /
    • 2023
  • As climate change increasesthe frequency and risk of flooding in major cities around theworld, the importance ofsimulation technology that can quickly and accurately analyze high-resolution 2D flooding information in large-scale areasis emerging. The physically-based approaches based on the Shallow Water Equations (SWE) often requires huge computer resources hindering high-resolution flood prediction. This study investigated the theoretical background of Weighted Cellular Automata 2D (WCA2D), which simulates spatio-temporal changes offlooding using transition rules and weight-based system, and assessed feasibility to simulate pluvial flooding in the urbancatchment, theOncheon-cheon catchmentinBusan, SouthKorea.Inaddition,the computation performancewas compared by applying versions using OpenComputing Language (OpenCL) andOpenMulti-Processing (OpenMP) parallel computing techniques. Simulationresultsshowed that the maximuminundation depthmap by theWCA2Dmodel cansimilarly reproduce historical inundation maps. Also, it can precisely simulate spatio-temporal changes of flooding extent in the urban catchment with complex topographic characteristics. For computation efficiency, parallel computing schemes, theOpenCLandOpenMP, improved the computation by about 8~14 and 5~6 folds respectively, compared to the sequential computation.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

Development of Risk Analysis Structure for Large-scale Underground Construction in Urban Areas (도심지 대규모 지하공사의 리스크 분석 체계 개발)

  • Seo, Jong-Won;Yoon, Ji-Hyeok;Kim, Jeong-Hwan;Jee, Sung-Hyun
    • Journal of the Korean Geotechnical Society
    • /
    • v.26 no.3
    • /
    • pp.59-68
    • /
    • 2010
  • Systematic risk management is necessary in grand scaled urban construction because of the existence of complicated and various risk factors. Problems of obstructions, adjacent structures, safety, environment, traffic and geotechnical properties need to be solved because urban construction is progressed in limited space not as general earthwork. Therefore the establishment of special risk management system is necessary to manage not only geotechnical properties but also social and cultural uncertainties. This research presents the technique analysis by the current state of risk management technique. Risk factors were noticed and the importance of each factor was estimated through survey. The systemically categorized database was established. Risk extraction module, matrix and score module were developed based on the database. Expected construction budget and time distribution can be computed by Monte Carlo analysis of probabilities and influences. Construction budgets and time distributions of before and after response can be compared and analyzed 80 the risks are manageable for entire whole construction time. This system will be the foundation of standardization and integration. Procurement, efficiency improvement, effective time and resource management are available through integrated management technique development and application. Conclusively decrease in cost and time is expected by systemization of project management.

A Study on 'Romalpa' Clause under SGA (SGA상 'Romalpa' 조항에 관한 연구)

  • Min, Joo-Hee
    • Korea Trade Review
    • /
    • v.42 no.2
    • /
    • pp.391-410
    • /
    • 2017
  • This study examines Romalpa clause as an extended or enlarged retention of title clause under SGA. Under a simple retention of title clause, the seller retains title to goods supplied until the goods have been paid. A simple retention of title gives the seller super-priority interest in other creditors of the buyer without registering a charge. Aluminium Industrie Vaassen BV v. Romalpa Aluminium Ltd introduced the concept of 'extended reservation of title(so called 'Romalpa clause') in English law. It is because the Court of Appeal held that under an extended reservation about title clause the seller can trace his title into money which constitutes the proceed of sale by the buyer of goods supplied by the seller. However, since Romalpa case, the courts are reluctant to uphold the seller's extended title. Under Romalpa clause, the seller attempts to extend his protection by laying claims to new products manufactured from his goods or to proceeds of sale by the buyer. Where the seller's goods are lawfully used by the buyer to create new goods, the property in the new goods will generally vest in the buyer. It is because there has been discomfort if the seller gains the windfall profit of the new goods. Moreover, regarding tracing proceeds of sale by the buyer, the courts held that the seller must establish fiduciary relationship with the buyer. If the fiduciary requirement cannot be established, the extended retention of title clause is seen as a charge over the proceeds, and void if not registered. For these reasons, it is difficult that the claims based on the extended retention of title clause would be upheld.

  • PDF

Corporate Bankruptcy Prediction Model using Explainable AI-based Feature Selection (설명가능 AI 기반의 변수선정을 이용한 기업부실예측모형)

  • Gundoo Moon;Kyoung-jae Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.2
    • /
    • pp.241-265
    • /
    • 2023
  • A corporate insolvency prediction model serves as a vital tool for objectively monitoring the financial condition of companies. It enables timely warnings, facilitates responsive actions, and supports the formulation of effective management strategies to mitigate bankruptcy risks and enhance performance. Investors and financial institutions utilize default prediction models to minimize financial losses. As the interest in utilizing artificial intelligence (AI) technology for corporate insolvency prediction grows, extensive research has been conducted in this domain. However, there is an increasing demand for explainable AI models in corporate insolvency prediction, emphasizing interpretability and reliability. The SHAP (SHapley Additive exPlanations) technique has gained significant popularity and has demonstrated strong performance in various applications. Nonetheless, it has limitations such as computational cost, processing time, and scalability concerns based on the number of variables. This study introduces a novel approach to variable selection that reduces the number of variables by averaging SHAP values from bootstrapped data subsets instead of using the entire dataset. This technique aims to improve computational efficiency while maintaining excellent predictive performance. To obtain classification results, we aim to train random forest, XGBoost, and C5.0 models using carefully selected variables with high interpretability. The classification accuracy of the ensemble model, generated through soft voting as the goal of high-performance model design, is compared with the individual models. The study leverages data from 1,698 Korean light industrial companies and employs bootstrapping to create distinct data groups. Logistic Regression is employed to calculate SHAP values for each data group, and their averages are computed to derive the final SHAP values. The proposed model enhances interpretability and aims to achieve superior predictive performance.

Control measures in Cyberspace in the light of Rimland theory (림랜드 이론으로 본 사이버공간 통제방안 (북한의 사이버전 사례연구를 중심으로))

  • Dong-hyun Kim;Soo-jin Lee;Wan-ju Kim;Jae Sung Lim
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.11-16
    • /
    • 2022
  • Development of science technology make integrated CPS(Cyber-Physical System) appear. In CPS era, cyberspace and physical-space are hard to separate anymore, that is developing toward integrated CPS. The reality is not stopping, that is consistently changing and the concept of space is developing too. But several articles are considering for cyberspace and physical-space separately, and they are developing tailed alternative each case. The theorical approaching that is not considering reality is dwelled on past, and is dangerous from dropping down to floating cloud that is not considering progressed reality. This article is suggested to consider rimland theory to control measures in cyberspace. That is dedicated to integrated approaching from physical-space to cyberspace. And that is developing concreted controling measures in cyberspace. Especially, this article is suggested to policy alternative by analyzing north korea cyber warfare from rimland theory including human sources. Simplicity is the ultimate sophistication. This article make integrated approaching effects about cyberspace and physical-space to preparing in the CPS era.

A Policy Proposal for the Safety of Inland Water Ships (내수면 선박의 안전성 확보를 위한 정책 제언)

  • Byung-Hwa Song;Hong-Hoon Lee;Chang-Hyun Lee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.4
    • /
    • pp.332-337
    • /
    • 2023
  • Korea is not only surrounded by the sea on three sides, but also has national and local rivers extending 26,843 km, so it has a geographical feature in which abundant sea and inland water surface coexist. As the number of ships operating in the inland waters is continuously increasing due to the improvement of national income, the risk of ship accidents and human casualties in the inland waters is also increasing. In this study, a macroscopic plan for the safety management of inland water ships was presented through investigation of inland water related laws and operation status analysis. As an improvement plan, as a hardware infrastructure it is proposed to secure sufficient inland water fire-boats to secure the golden time for early response to accidents and lifesaving, and to operate an institution specializing in the prevention of inland water ships accidents. And as a software infrastructure, establish departure control standards for inland water ships and the safety diagnosis system currently applied only to sea going ships, the introduction of a system tailored to the characteristics of inland water ships. The proposed inland water safety management policy is expected to contribute to the preparation of prompt and systematic countermeasures in the event of an inland water ship accident, and it is hoped that it will serve as an opportunity to continue to pay attention to safety-related research on inland water ships, which was briefly activated after the sinking of M/V Sewol.

The comparative study of determinants of family policy expenditure : focused on OECD 14 countries (복지국가의 아동·가족 복지 지출 결정요인에 대한 비교연구: OECD 국가를 중심으로)

  • Ryu, Yunkyu;Baek, Seungho
    • Korean Journal of Social Welfare Studies
    • /
    • v.41 no.1
    • /
    • pp.145-173
    • /
    • 2010
  • The purpose of this study is to verify that several theories explaining the determinants of welfare expenditure is applied to the family policy expenditure and to find out if there' re unique determinants of the family policy expenditure. We analyzed the data (OECD 14 countries for 1980~2005) by pooled time series analysis. As for industrialization theory, female labor force participation rate has positive effect on family policy expenditure while population under 15-year children has negative effect, which refers to the demand of family policies is that of female workers, not children's. Power resource theory is applied to the determinants of family policy expenditure as those of welfare expenditure. Women's political & economic empowerment has partly positive effects on family policy expenditure, which is the evidence of the effectiveness of feminist theory. In the institutional theory, we verified the effect of policy legacy but couldn't find out the crowding-out effect. The theoretical implication of this study is the empirical verification of the theories explaining the determinants of welfare expenditure being applied to the family policy expenditure. We also suggested the political and institutional foundation to effectively respond to the new social risks in spite of budget constraints, which can be a policy implication.

A Study on Evacuation Guidance using Location Identification Technology for Disaster (재난시 위치식별기술을 활용한 피난 유도에 관한 연구)

  • Moon, Sang-ho;Yu, Young-jung;Lee, Chul-gyoo
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.12
    • /
    • pp.937-946
    • /
    • 2017
  • Recently, urban structures including buildings are becoming increasingly large and super high-rise in order to make human life more convenient. As the number of super high-rise buildings increases, however, the risk of fire and other disasters is increasing. Especially, it is expected that deaths and injuries will be tremendous than imagined if the evacuation guidance is not provided promptly and precisely for the occupants in case of a fire in super high-rise buildings. Therefore, rapid rescue should be done for those who are in need of residence or rescue in the building. To do this, identification of the size and location of people inside the building should be preceded. To do this, first, we conduct a preliminary study on existing location tracking technologies to identify occupants. Based on this, in this paper, we will study how to improve evacuation time in case of a fire in super high-rise buildings. For this purpose, we utilize the location tracking technology to identify the number of people in real time and improve the density when a disaster such as a fire occurs.