• Title/Summary/Keyword: 위협요소

Search Result 746, Processing Time 0.035 seconds

Decision tree based obesity and metabolic syndrome data classification and feature importance analysis (의사결정나무 기반 비만과 대사증후군 데이터 분류와 특징 중요도 분석)

  • Lee, Jongwook;Kim, Youngho;Baek, Byunghyun;Hwang, Doosung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.880-883
    • /
    • 2021
  • 비만은 다양한 합병증을 일으키는 위험요소로 현대인의 건강을 위협한다. 비만에 영향을 주는 요소들은 유전적 영향, 식습관, 신체활동 등이 연관된다. 비만 인구의 증가로 대사증후군의 발병률이 높아졌다. 대사증후군은 비만, 고지혈증과 고혈압 등의 여러 가지 성인병을 동반한다. 비만과 대사증후군 판별 요소 검출을 위한 개인의 신체 정보와 생활 정보 분석이 필요하다. 본 논문에서는 의사결정나무를 이용하여 비만과 대사증후군을 분류하고 분류 시 사용된 특징의 중요도 분석을 수행한다. 비만 분석 결과는 체중과 신장이 높은 특징 중요도를 나타냈으며 대사증후군은 HDL, 허리둘레, 혈압과 나이 등이 높은 특징 중요도를 보였다.

A Study on The Effects of Maritime Autonomous Surface Ships on the VTS Environment (자율운항선박이 VTS환경에 미치는 영향에 관한 연구)

  • Chul Son;Jihyun Oh;Jong-ik Park
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.25-25
    • /
    • 2023
  • 빅데이터, AI, 인공지능 등 기술이 발전함에 있어서 자율운항도입에 따른 VTS 체계변화에 대한 인식이 필요한 실정이다. 이 연구에서는 자율운항선박이 상용화함에 따라 요구되는 적합성을 제고하기 위해 영향을 미치는 내외적인 환경요인들을 전문가집단의 브레인스토밍, 설문조사, 인터뷰 등 다방면으로 조사하고, 해당 요소를 기반으로 TOWS분석을 통해 강점(Strength), 약점(Weakness), 기회(Opportunities), 위협(Threats)의 각 요소를 상호 결합해 전략주제 도출 및 새로운 관제절차와 관련 기술, 자율운항 교육프로그램, 사이버 보안조치, 자율운항 관련 알고리즘 구성 요소 등 구체적 실행계획을 제시함으로써 예측되는 변화 대응에 기여하고자 한다.

  • PDF

The Development of Vulnerable Elements and Assessment of Vulnerability of Maeul-soop Ecosystem in Korea (한국 마을숲 생태계 취약요소 발굴 및 취약성 평가)

  • Lim, Jeong-Cheol;Ryu, Tae-Bok;Ahn, Kyeong-Hwan;Choi, Byoung-Ki
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.34 no.4
    • /
    • pp.57-65
    • /
    • 2016
  • Maeul-soop(Village forest) is a key element of Korean traditional village landscape historically and culturally. However, a number of Maeul-soops have been lost or declined due to various influences since the modern age. For this Maeul-soop that has a variety of conservation values including historical, cultural and ecological ones, attention and efforts for a systematic conservation and restoration of Maeul-soop are needed. The purpose of the present study is to provide information on ecological restoration and sustainable use and management of Maeul-soops based on component plant species, habitat and location characteristics of 499 Maeul-soops spread throughout Korea. Major six categories of threat factors to Maeul-soop ecosystem were identified and the influence of each factor was evaluated. For the evaluation of weight by threat factors for the influence on the vulnerability of Maeul-soop ecosystem, more three-dimensional analysis was conducted using Analytic Hierarchy Process (AHP) analysis method. In the results of evaluation using AHP analysis method, reduction of area, among six categories, was spotted as the biggest threat to existence of Maeul-soops. Next, changes in topography and soil environment were considered as a threat factor of qualitative changes in Maeul-soop ecosystem. Influence of vegetation structure and its qualitative changes on the loss or decline of Masul-soop was evaluated to be lower than that of changes in habitat. Based on weight of each factor, the figures were converted with 100 points being the highest score and the evaluation of vulnerability of Maeul-soop was conducted with the converted figures. In the result of evaluation of vulnerability of Maeul-soops, grade III showed the highest frequency and a normal distribution was formed from low grade to high grade. 38 Maeul-soops were evaluated as grade I which showed high naturality and 10 Maeul-soops were evaluated as grade V as their maintenance was threatened. Also in the results of evaluation of vulnerability of each Maeul-soop, restoration of Maeul-soop's own area was found as top priority to guarantee the sustainability of Maeul-soops. It was confirmed that there was a need to prepare a national level ecological response strategy for each vulnerability factor of Maeul-soop, which was important national ecological resources.

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.

Study on Material Fracture and Debris Dispersion Behavior via High Velocity Impact (고속충돌에 따른 재료 파괴 및 파편의 분산거동 연구)

  • Sakong, Jae;Woo, Sung-Choong;Kim, Jin-Young;Kim, Tae-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.41 no.11
    • /
    • pp.1065-1075
    • /
    • 2017
  • In this study, high velocity impact tests along with modeling of material behavior and numerical analyses were conducted to predict the dispersion behavior of the debris resulting from a high velocity impact fracture. For the impact tests, two different materials were employed for both the projectile and the target plate - the first setup employed aluminum alloy while the second employed steel. The projectile impacts the target plate with a velocity of approximately 1 km/s were enforced to generate the impact damages in the aluminum witness plate through the fracture debris. It was confirmed that, depending on the material employed, the debris dispersion behavior as well as the dispersion radii on the witness plate varied. A numerical analysis was conducted for the same impact test conditions. The smoothed particle hydrodynamics (SPH)-finite element (FE) coupled technique was then applied to model the fracture and damage upon the debris. The experimental and numerical results for the diameters of the perforation holes in the target plate and the debris dispersion radii on the witness plate were in agreement within a 5% error. In addition, the impact test using steel was found to be more threatening as proven by the larger debris dispersion radius.

Managing the Reverse Extrapolation Model of Radar Threats Based Upon an Incremental Machine Learning Technique (점진적 기계학습 기반의 레이더 위협체 역추정 모델 생성 및 갱신)

  • Kim, Chulpyo;Noh, Sanguk
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.29-39
    • /
    • 2017
  • Various electronic warfare situations drive the need to develop an integrated electronic warfare simulator that can perform electronic warfare modeling and simulation on radar threats. In this paper, we analyze the components of a simulation system to reversely model the radar threats that emit electromagnetic signals based on the parameters of the electronic information, and propose a method to gradually maintain the reverse extrapolation model of RF threats. In the experiment, we will evaluate the effectiveness of the incremental model update and also assess the integration method of reverse extrapolation models. The individual model of RF threats are constructed by using decision tree, naive Bayesian classifier, artificial neural network, and clustering algorithms through Euclidean distance and cosine similarity measurement, respectively. Experimental results show that the accuracy of reverse extrapolation models improves, while the size of the threat sample increases. In addition, we use voting, weighted voting, and the Dempster-Shafer algorithm to integrate the results of the five different models of RF threats. As a result, the final decision of reverse extrapolation through the Dempster-Shafer algorithm shows the best performance in its accuracy.

Comparison of Factors Influencing to Mobilization of Police to Crowd Gathering Occasion (다중운집행사 경찰동원에 영향을 미치는 요인 비교)

  • Kim, Sang-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.643-649
    • /
    • 2017
  • This research is to compare factors which influence to mobilize police force necessary for crowd gathering occasions, and the purpose of this research is to prepare scientific basis for mobilization of police force by understanding order of priority of obstructive factors to mobilize police force for progressing safe crowd gathering occasions. Crowd gathering occasion has a characteristic that minor cause can lead to huge damage because many people concentrically gather at a specific place. In order to control these risks, it is necessary to analyze criteria on order of priority which can arouse risk to mobilize police force. In this research, I classified the factors influencing safety of crowd gathering occasion as internal risk factor, external risk factor and traffic safety threatening and set up the level of private security manpower and participants mobilized to crowd gathering occasion as independent variable and set up mobilized police force from 2013 to 2014 as dependent variable and analyzed it hierarchical analysis. From the result of analysis, the biggest influence to mobilization of police force for crown gathering occasion was the number of participants, and next self order-keeping agents and reason of mobilizing police force. Based on the result of analysis that the biggest factor to mobilize police force to crowd gathering occasion is the number of participants, it can be resulted that the number of participants influence to the risk of crowd gathering occasion.

Quantitative Cyber Security Scoring System Based on Risk Assessment Model (위험 평가 모델 기반의 정량적 사이버 보안 평가 체계)

  • Kim, Inkyung;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1179-1189
    • /
    • 2019
  • Cyber security evaluation is a series of processes that estimate the level of risk of assets and systems through asset analysis, threat analysis and vulnerability analysis and apply appropriate security measures. In order to prepare for increasing cyber attacks, systematic cyber security evaluation is required. Various indicators for measuring cyber security level such as CWSS and CVSS have been developed, but the quantitative method to apply appropriate security measures according to the risk priority through the standardized security evaluation result is insufficient. It is needed that an Scoring system taking into consideration the characteristics of the target assets, the applied environment, and the impact on the assets. In this paper, we propose a quantitative risk assessment model based on the analysis of existing cyber security scoring system and a method for quantification of assessment factors to apply to the established model. The level of qualitative attribute elements required for cyber security evaluation is expressed as a value through security requirement weight by AHP, threat influence, and vulnerability element applying probability. It is expected that the standardized cyber security evaluation system will be established by supplementing the limitations of the quantitative method of applying the statistical data through the proposed method.

Visual Features and Shape Extraction of Voice Analysis Elements for Heart Diseases Diagnosis (심장 질환 진단을 위한 음성분석학적 요소의 시각 특징 및 형태 추출)

  • Kim, Bong-Hyun;Lee, Se-Hwan;Park, Sun-Ae;Ka, Min-Kyoung;Oh, Won-Geun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.405-408
    • /
    • 2007
  • 건강관리 및 유지에 대한 현대인들의 관심이 증대되면서 삶의 질 향상을 추구하는 고령화 사회에서 성인병 및 만성질환은 매우 위험한 요인이 되고 있는 실정이다. 특히 심장 질환은 3대 사망률 중 한 부분을 차지하고 있을 정도로 위협적이며 비전염성 만성질환 중 하나이다. 그러나 모든 질환에 대한 대처 방법이 동일하듯이 조기 진단에 의한 질환 예방이 무엇보다 중요하다. 따라서 본 논문에서는 심장 질환자의 음성 신호를 획득하여 다양한 음성분석학적 요소 추출 및 분석을 통해 심장 질환과의 연관성을 파악하고자 한다. 이를 위해 본 논문에서는 기존의 음성 분석 요소에 대한 1차 실험을 검증하고 추가 음성 분석 요소들에 대한 2차 실험을 행하여 각각의 분석 요소들과 음성에 대한 형태학적 특징을 시각화하여 편리하게 심장 질환을 진단하는 기법들을 제시하고자 한다.

  • PDF

The Design of CALS Security Model (CALS 정보보호 모델 설계)

  • 윤여웅;이정현;이대기;소우영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1997.11a
    • /
    • pp.368-377
    • /
    • 1997
  • 정보 통신 기술의 발달로 인하여 시ㆍ공간을 초월한 국제 개방화 시대로 접어들면서 각 기업과 국가에서는 국제적인 경쟁력 우위를 선점하고자 CALS를 도입하여 추진 중에 있다. 그러나 CALS 추진에 있어 다양한 문제들이 발생되고 있고 특히, 정보보호 문제는 CALS 추진의 지연 원인이 되고 있으며 안전한 CALS 구축을 위하여 CALS 정보보호에 대한 연구가 요구되고 있다. 본 논문에서는 CALS 정보보호 위협 요소를 비롯한 정보보호 서비스와 메커니즘을 분석하고 안전한 CALS를 구축하기 위한 정보보호 모델을 제시하고자 한다.

  • PDF