• Title/Summary/Keyword: 카운팅

Search Result 65, Processing Time 0.019 seconds

Implications for Japan's National REDD+ Strategies - Focused on Joint Credit Mechanism (JCM) - (일본 REDD+의 국가 전략 및 시사점 - 양국간 크레딧 메커니즘(JCM)을 중심으로 -)

  • Park, Jeongmook;Seo, Hwanseok;Lee, Jungsoo
    • Journal of Korean Society of Forest Science
    • /
    • v.105 no.2
    • /
    • pp.238-246
    • /
    • 2016
  • The study aims to examine Japan's National REDD+ Strategies prepared for Post-2020 and the status of its implementation by organizations in Japan, and then to suggest the potential REDD+ countermeasures against Joint Credit Mechanism (JCM) for Republic of Korea and their implications. As for the technical limitations of the guidelines of REDD+ under the JCM, it is pointed out that forests located at the place with less potential safeguard intervention tend to be selected as the target area for a project and that, as reference emission trend changes depending on the basic year of the baseline, differences could occur among the amounts of greenhouse gas emission. In addition, it is pointed out that the result of the calculation of the displacement of emissions, or leakeage, in REDD+, can have an uncertainty, since the calculation is done by just multiplying leakage area by certain coefficients, without considering the size of the leakage area. Furthermore, the lack of implementation guideline or methodologies for a project level is also pointed out as a limitation, considering that there are only some national and sub-national monitoring guidelines at present. Finally, internationally accepted guidelines for safeguard and its sub-items needed to be prepared, as current safeguard policy only includes lists without detailed items. Such things mentioned above are all related to, and can lead to the problem of double counting of items in Nested Approach etc., as well as of the distribution of credits. Therefore, Republic of Korea should take these into consideration when implementing its REDD+ projects.

A Query Result Integrity Assurance Scheme Using an Order-preserving Encryption Scheme in the Database Outsourcing Environment (데이터베이스 아웃소싱 환경에서 순서 보존 암호화 기법을 이용한 질의 결과 무결성 검증 기법)

  • Jang, Miyoung;Chang, Jae Woo
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Recently, research on database encryption for data protection and query result authentication methods has been performed more actively in the database outsourcing environment. Existing database encryption schemes are vulnerable to order matching and counting attack of intruders who have background knowledge of the original database domain. Existing query result integrity auditing methods suffer from the transmission overhead of verification object. To resolve these problems, we propose a group-order preserving encryption index and a query result authentication method based on the encryption index. Our group-order preserving encryption index groups the original data for data encryption and support query processing without data decryption. We generate group ids by using the Hilbert-curve so that we can protect the group information while processing a query. Finally, our periodic function based data grouping and query result authentication scheme can reduce the data size of the query result verification. Through performance evaluation, we show that our method achieves better performance than an existing bucket-based verification scheme, it is 1.6 times faster in terms of query processing time and produces verification data that is 20 times smaller.

Development of Smart Athleisure Fashion for Dumbbell Economy -Focused on the Analysis of Upper and Lower body muscle strength by angle- (덤벨 이코노미 현상을 반영한 스마트 애슬레저 패션 개발 -상·하체의 각도별 근력운동을 중심으로-)

  • Kim, Ga-Yeon;Kim, Youn-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.165-176
    • /
    • 2021
  • Recently, interest in home training and changes in lifestyle are expanding the market in the healthcare field, and high value-added fashion products reflecting the dumbbell economy phenomenon are being released. This study had the following objectives: to investigate the possibility of developing a fashion item that can be applied to the dumbbell economy phenomenon; to develop the UI/UX of a smartphone application for beginners who wish to work out their upper and lower bodies regardless of time and space; and to create a wearable customized smart athleisure fashion device. First, the study identified factors related to exercise methods, breathing techniques, and range of exercises for beginners by investigating the postures of workouts of the upper and lower bodies by angles. Based on the results, the study collected empirical data through a user needs analysis from muscle strengthening exercise experts to verify the significance of the study and use as fundamental data. Second, the study developed the UI/UX of a smartphone application with three different contents: counting, suggesting exercise postures, and providing exercise calendars. Further, the study analyzed necessary user-centered concepts and characteristics in terms of design and technology and developed a wearable customized smart athleisure fashion device based on the results.

DoS/DDoS attacks Detection Algorithm and System using Packet Counting (패킷 카운팅을 이용한 DoS/DDoS 공격 탐지 알고리즘 및 이를 이용한 시스템)

  • Kim, Tae-Won;Jung, Jae-Il;Lee, Joo-Young
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.151-159
    • /
    • 2010
  • Currently, by using the Internet, We can do varius things such as Web surfing, email, on-line shopping, stock trading on your home or office. However, as being out of the concept of security from the beginning, it is the big social issues that malicious user intrudes into the system through the network, on purpose to steal personal information or to paralyze system. In addition, network intrusion by ordinary people using network attack tools is bringing about big worries, so that the need for effective and powerful intrusion detection system becomes very important issue in our Internet environment. However, it is very difficult to prevent this attack perfectly. In this paper we proposed the algorithm for the detection of DoS attacks, and developed attack detection tools. Through learning in a normal state on Step 1, we calculate thresholds, the number of packets that are coming to each port, the median and the average utilization of each port on Step 2. And we propose values to determine how to attack detection on Step 3. By programing proposed attack detection algorithm and by testing the results, we can see that the difference between the median of packet mounts for unit interval and the average utilization of each port number is effective in detecting attacks. Also, without the need to look into the network data, we can easily be implemented by only using the number of packets to detect attacks.

Log Collection Method for Efficient Management of Systems using Heterogeneous Network Devices (이기종 네트워크 장치를 사용하는 시스템의 효율적인 관리를 위한 로그 수집 방법)

  • Jea-Ho Yang;Younggon Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.119-125
    • /
    • 2023
  • IT infrastructure operation has advanced, and the methods for managing systems have become widely adopted. Recently, research has focused on improving system management using Syslog. However, utilizing log data collected through these methods presents challenges, as logs are extracted in various formats that require expert analysis. This paper proposes a system that utilizes edge computing to distribute the collection of Syslog data and preprocesses duplicate data before storing it in a central database. Additionally, the system constructs a data dictionary to classify and count data in real-time, with restrictions on transmitting registered data to the central database. This approach ensures the maintenance of predefined patterns in the data dictionary, controls duplicate data and temporal duplicates, and enables the storage of refined data in the central database, thereby securing fundamental data for big data analysis. The proposed algorithms and procedures are demonstrated through simulations and examples. Real syslog data, including extracted examples, is used to accurately extract necessary information from log data and verify the successful execution of the classification and storage processes. This system can serve as an efficient solution for collecting and managing log data in edge environments, offering potential benefits in terms of technology diffusion.