• Title/Summary/Keyword: 환경적 침해

Search Result 390, Processing Time 0.038 seconds

Comparative Study of Anomaly Detection Accuracy of Intrusion Detection Systems Based on Various Data Preprocessing Techniques (다양한 데이터 전처리 기법 기반 침입탐지 시스템의 이상탐지 정확도 비교 연구)

  • Park, Kyungseon;Kim, Kangseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.11
    • /
    • pp.449-456
    • /
    • 2021
  • An intrusion detection system is a technology that detects abnormal behaviors that violate security, and detects abnormal operations and prevents system attacks. Existing intrusion detection systems have been designed using statistical analysis or anomaly detection techniques for traffic patterns, but modern systems generate a variety of traffic different from existing systems due to rapidly growing technologies, so the existing methods have limitations. In order to overcome this limitation, study on intrusion detection methods applying various machine learning techniques is being actively conducted. In this study, a comparative study was conducted on data preprocessing techniques that can improve the accuracy of anomaly detection using NGIDS-DS (Next Generation IDS Database) generated by simulation equipment for traffic in various network environments. Padding and sliding window were used as data preprocessing, and an oversampling technique with Adversarial Auto-Encoder (AAE) was applied to solve the problem of imbalance between the normal data rate and the abnormal data rate. In addition, the performance improvement of detection accuracy was confirmed by using Skip-gram among the Word2Vec techniques that can extract feature vectors of preprocessed sequence data. PCA-SVM and GRU were used as models for comparative experiments, and the experimental results showed better performance when sliding window, skip-gram, AAE, and GRU were applied.

Independent Production Routines and Environmental Changes In 'Comprehensive Programming Television Channels' in Korea Focusing on Interviews with Independent Producers, Broadcast Writers and Individuals Involved with the TV Channels (종합편성채널의 독립제작 환경과 관행에 관한 연구 독립PD, 작가 및 종합편성채널 관계자 심층인터뷰를 중심으로)

  • Choi, Sun Young;Han, Hee Jeong
    • Korean journal of communication and information
    • /
    • v.73
    • /
    • pp.56-91
    • /
    • 2015
  • This study examined changes in the independent production environment in the perspectives from flexible specialization of labor and media routines since January 2011, when comprehensive programming television channels (JTBC, MBN, Channel A, TV Chosun) emerged in Korea. In-depth interviews were conducted with thirteen individuals, including producers from independent production companies, broadcast writers, and individuals involved with these TV channels. The interview results indicated that a flexible specialization production system had been established by the comprehensive programming channels. This means that they were heavily dependent on independent producers, except in relations to their own news programs. Moreover, it was identified that the production of diverse programs could be difficult due to absurd contract practices such as those related to TV ratings and performance systems. Second, these channels have implemented some positive changes such as the payment of higher production costs and an incentive system, compared to terrestrial TV stations. However, the incentive system also helps to aggravate internal competition in the channel and also instigate contract competitions among independent companies, which can eventually result in the channels for holding exclusive rights to certain content and, hence, unfair business practices. Third, as a result of the newspaper and broadcast cross-owenership system of the comprehensive programming channels, hierarchical independent production practices can be established under the influence of newspaper proprietors and executives or managers who have previously worked for newspapers. Lastly, as a result of interviews with independent producers and individuals involved with the TV channels concerning the awareness of comprehensive programming channels, it could not be ascertained whether it is difficult to produce programs dealing with diverse items and genres, because programming autonomy has been distorted by capital or the advertisement market. In this circumstance, it is not surprising that some comprehensive programming channels mentioned that they prioritize profit and performance in programming. In conclusion, it is absolutely imperative that complementary and legal measures be implemented institutionally in order to redress the existing systematic dysfunctional routines in the independent productions of the comprehensive programming TV channels in Korea.

  • PDF

A Review of the Supreme Court Decision on Damages for the Airport Noise (항공기소음피해에 대한 국가배상판결에 대한 고찰)

  • Chae, Young-Geun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.20 no.1
    • /
    • pp.211-253
    • /
    • 2005
  • Recently, the Korean Supreme Court released two important decisions concerning damages for the pain and suffering from Aircraft noise. The local people who are living near the Air Force practice site at Maehyang-ri and the Kimpo International Airport brought lawsuits against the Korean government requesting damages for their financial loss from the severe noise and the damages for their pain and suffering. Plaintiffs alleged that they suffered physical malfunctions, extreme disturbances and the reduction of property values from the extreme noises which were daily repeated. District Court of Seoul Province did not allow plaintiffs all but the damages for pain and suffering. Plaintiffs could not prove the causation between their financial loss and the noise. The Supreme Court confirmed the lower court's decision. Article V of the National Compensation Act (analogous to the Federal Tort Claims Act of the USA) reads, "the government shall be liable for any loss caused by the defect on establishment or maintenance of public facilities." In the two cases, the major issue was whether the government's establishment or maintenance of Air Force practice site and the airport was defective because they caused serious noise to surrounding neighbors. Previously, the Supreme Court interpreted the clause "defect on establishment or maintenance of public facilities" as failure of duty to provide safety measures to the degree generally required to ordinary manager. However the Court at this time interpreted differently that the defect could be found if the facility caused to any person loss to the degree intolerable. In the two cases the Court confirmed the lower court's finding that noise level at the site was severe enough to be intolerable. This standard is based on the severity of the loss rather than the failure of duty. It became easier for plaintiffs to prove the cause of action under this interpretation. The consequence of the ruling of these two cases is 'rush to the courtroom' by the local people at similar situations. The ruling of these two cases was not appropriate both in theory and in consequence. The Korean tort system is basically based on the theory of negligence. Strict liability is exceptional only when there is special legislation. The Court created strict liability rule by interpreting the Art. V of the National Compensation Act. This is against the proper role of the court. The result of the cases is also dismal. The government was already sued by a number of local people for damages. Especially the Department of Defense which is operating many airports nationwide has financial hardship, which will cause downsizing military practice by the Air Force in the long run, This is no good to anyone. Tens of millions of dollars which might be used for compensation might be better used to prevent further noise problem surrounding airports.

  • PDF

Detection of Phantom Transaction using Data Mining: The Case of Agricultural Product Wholesale Market (데이터마이닝을 이용한 허위거래 예측 모형: 농산물 도매시장 사례)

  • Lee, Seon Ah;Chang, Namsik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.161-177
    • /
    • 2015
  • With the rapid evolution of technology, the size, number, and the type of databases has increased concomitantly, so data mining approaches face many challenging applications from databases. One such application is discovery of fraud patterns from agricultural product wholesale transaction instances. The agricultural product wholesale market in Korea is huge, and vast numbers of transactions have been made every day. The demand for agricultural products continues to grow, and the use of electronic auction systems raises the efficiency of operations of wholesale market. Certainly, the number of unusual transactions is also assumed to be increased in proportion to the trading amount, where an unusual transaction is often the first sign of fraud. However, it is very difficult to identify and detect these transactions and the corresponding fraud occurred in agricultural product wholesale market because the types of fraud are more intelligent than ever before. The fraud can be detected by verifying the overall transaction records manually, but it requires significant amount of human resources, and ultimately is not a practical approach. Frauds also can be revealed by victim's report or complaint. But there are usually no victims in the agricultural product wholesale frauds because they are committed by collusion of an auction company and an intermediary wholesaler. Nevertheless, it is required to monitor transaction records continuously and to make an effort to prevent any fraud, because the fraud not only disturbs the fair trade order of the market but also reduces the credibility of the market rapidly. Applying data mining to such an environment is very useful since it can discover unknown fraud patterns or features from a large volume of transaction data properly. The objective of this research is to empirically investigate the factors necessary to detect fraud transactions in an agricultural product wholesale market by developing a data mining based fraud detection model. One of major frauds is the phantom transaction, which is a colluding transaction by the seller(auction company or forwarder) and buyer(intermediary wholesaler) to commit the fraud transaction. They pretend to fulfill the transaction by recording false data in the online transaction processing system without actually selling products, and the seller receives money from the buyer. This leads to the overstatement of sales performance and illegal money transfers, which reduces the credibility of market. This paper reviews the environment of wholesale market such as types of transactions, roles of participants of the market, and various types and characteristics of frauds, and introduces the whole process of developing the phantom transaction detection model. The process consists of the following 4 modules: (1) Data cleaning and standardization (2) Statistical data analysis such as distribution and correlation analysis, (3) Construction of classification model using decision-tree induction approach, (4) Verification of the model in terms of hit ratio. We collected real data from 6 associations of agricultural producers in metropolitan markets. Final model with a decision-tree induction approach revealed that monthly average trading price of item offered by forwarders is a key variable in detecting the phantom transaction. The verification procedure also confirmed the suitability of the results. However, even though the performance of the results of this research is satisfactory, sensitive issues are still remained for improving classification accuracy and conciseness of rules. One such issue is the robustness of data mining model. Data mining is very much data-oriented, so data mining models tend to be very sensitive to changes of data or situations. Thus, it is evident that this non-robustness of data mining model requires continuous remodeling as data or situation changes. We hope that this paper suggest valuable guideline to organizations and companies that consider introducing or constructing a fraud detection model in the future.

Chinese Maritime Dispute Strategy for territorialization in Korea's West Sea (중국의 한국 서해 내해화 전략 분석)

  • Lee, Eunsu;Shin, Jin
    • Maritime Security
    • /
    • v.5 no.1
    • /
    • pp.113-136
    • /
    • 2022
  • China has been pushing for a systematic strategy for territorialization over a long period of time to invade Korea's West Sea (Yellow Sea) in order to create China's territorial water. China's strategy for territorializing the West Sea is an activity in which China curbs the use of South Korea and enforces the illegal use of China in order to dominate the West Sea exclusively. China aided Chinese fishing boats that engaged in illegal fishing in Korea's jurisdiction as a means to territorialize the West Sea, and is opposed to combined exercise and training of Korea and the United States Naval Forces in the West Sea, while intentionally entering KADIZ(Korea Air Defense Identification Zone). In addition, Beijing used 'scientific exploration and research' measures as a pretext for its strategies in order to encroach on Korea's West Sea. China is carrying out such work to announce to the world that China is a systematic and organized country while consistently attempting to dominate the West Sea. China's activities in the West Sea seriously infringe South Korea's sovereignty. In order to respond to China's strategies of territorialization in the West Sea stated above, I analyzed the rejection effect of the ROK-US combined military training in the West Sea and presented a 'proportional response strategy centered on the ROK-US combined forces'. Korea should be able to respond proportionally to China's activities in the seas around the Korean peninsula, and Korea should be able to neutralize China's attempt to a Fait Accompli. In addition, just as China installs buoys in the Korea-China Provisional Measures Zone, Korea should be able to install and actively utilize some devices in the West Sea and for the use of free and open West Sea. Korea should not just wait for the tragic future to come without preparing for China's gradual and long-term strategy, and Seoul needs to respond to China's maritime policy in the West Sea with a more active attitude than it is now. China has historically taken a bold and aggressive response to neighboring countries that are consistent with a passive attitude, on the other hand, Beijing has taken a cautious approach to neighboring countries that respond with an active attitude. It should not be forgotten that Korea's passive response to the Chinese strategy in the name of a 'realistic approach' such as Korea's economic dependence on China for economy will result in China's success for territorialization of the West Sea.

  • PDF

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.

A Study on Imposing Contribution in the Compensation for Uncontrollable Medical Malpractice during Delivery (분만관련 불가항력적 의료사고 보상제도에 있어 분담금부과에 관한 연구 -헌법재판소 2018. 4. 26. 선고 2015헌가13 사건을 중심으로-)

  • Beom, Kyung Chul
    • The Korean Society of Law and Medicine
    • /
    • v.19 no.2
    • /
    • pp.139-171
    • /
    • 2018
  • The 「Act on Remedies for Injuries from Medical Malpractice and Mediation of Medical Disputes」(hereinafter referred to as 'the Act on Mediation of Medical Disputes') provides that the state should compensate the victims of medical accidents occurred irresistibly in childbirth despite that health and medical service personnel fulfilled their duty of care for their damage within the range of its budget(Article 46 of the Act on Mediation of Medical Disputes). Given that victims of medical accidents could expect demage recovery only through lawsuits thus far, this act can be said to be a groundbreaking act. However, However, as 30% of the costs for such medical accident compensation projects are borne by those who have records of childbirth among the founders of health and medical institutions (Article 21 of the Act on Mediation of Medical Disputes), there has been a question about whether doctors are held responsible despite that the accidents such as the deaths of mothers and newborn babies occurred irresistibly without doctors' fault. However, recently, the Constitutional Court ruled that 'the range of founders of health and medical institutions' and 'share ratios of finances for compensation' in Article 46 (3) of the Act on Mediation of Medical Disputes' related to the imposition of the share of costs are institutional (Constitutional Court ruling dated April 26, 2018, 2015Heonga13, hereinafter referred to as 'the ruling in the case'). Although the ruling in the case was made based on only the principle of statutory reservation and the principle of ban on comprehensive authorization, this paper added a practical judgment. This paper proved that the share of costs in this case has the nature of burden charges in pursuit of study and does not infringe on the property rights of the founders of health medical institutions even in light of the principle of proportionality because there is a legitimate reason for imposing the burden charge. The imposition of the share of costs in the system for compensation for medical accidents occurred irresistibly is against the principle of liability with fault in part. However, the medical accident compensation projects are rational a national policy for the victims of medical accidents and the medical world clearly gains some benefits from the effect to terminate medical disputes. The expansion of finances for compensation through the payments of the share of costs will reduce the suffering and misunderstanding of victims of medical accidents occurred in the process of childbirth and will be very helpful to the construction of stable treatment environments of medical workers by quickly establishing the medical accident compensation projects as such.

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Studies on Neck Blast Infection of Rice Plant (벼 이삭목도열병(病)의 감염(感染)에 관(關)한 연구(硏究))

  • Kim, Hong Gi;Park, Jong Seong
    • Korean Journal of Agricultural Science
    • /
    • v.12 no.2
    • /
    • pp.206-241
    • /
    • 1985
  • Attempts to search infection period, infection speed in the tissue of neck blast of rice plant, location of inoculum source and effects of several conditions about the leaf sheath of rice plants for neck blast incidence have been made. 1. The most infectious period for neck blast incidence was the booting stage just before heading date, and most of necks have been infected during the booting stage and on heading date. But $Indica{\times}Japonica$ hybrid varieties had shown always high possibility for infection after booting stage. 2. Incubation period for neck blast of rice plants under natural conditions had rather a long period ranging from 10 to 22 days. Under artificial inoculation condition incubation period in the young panicle was shorter than in the old panicle. Panicles that emerged from the sheath of flag leaf had long incubation period, with a low infection rate and they also shown slow infection speed in the tissue. 3. Considering the incubation period of neck blast of rice plant, we assumed that the most effective application periods of chemicals are 5-10 days for immediate effective chemicals and 10-15 days for slow effective chemicals before heading. 4. Infiltration of conidia into the leaf sheath of rice plant carried out by saturation effect with water through the suture of the upper three leaves. The number of conidia observed in the leaf sheath during the booting stage were higher than those in the leaf sheath during other stages. Ligule had protected to infiltrate of conidia into the leaf sheath. 5. When conidia were infiltrated into the leaf sheath, the highest number of attached conidia was observed on the panicle base and panicle axis with hairs and degenerated panicle, which seemed to promote the infection of neck blast. 6. The lowest spore concentration for neck blast incidence was variable with rice varietal groups. $Indica{\times}Japonica$ hybrid varieties were infected easily compared to the Japonica type varieties, especially. The number of spores for neck blast incidence in $Indica{\times}Japonica$ hybrid varieties was less than 100 and disease index was higher also in $Indica{\times}Japonica$ hybrid than in Japonica type varieties. 7. Nitrogen content and silicate content were related with blast incidence in necks of rice plants in the different growing stage changed during growing period. Nitrogen content increased from booting stage to heading date and then decreased gradually as time passes. Silicate content increased from booting stage after heading with time. Change of these content promoted to increase neck blast infection. 8. Conidia moved to rice plant by ascending and desending dispersal and then attached on the rice plant. Conidia transfered horizontally was found very negligible. So we presumed that infection rate of neck blast was very low after emergence of panicle base from the leaf sheath. Also ascending air current by temperature difference between upper and lower side of rice plant seemed to increase the liberation of spores. 9. Conidial number of the blast fungus collected just before and after heading date was closely related with neck blast incidence. Lesions on three leaves from the top were closely related with neck blast incidence, because they had high potential for conidia formation of rice blast fungus and they were direct inoculum sources for neck blast. 10. The condition inside the leaf sheath was very favorable for the incidence of neck blast and the neck blast incidence in the leaf sheath increased as the level of fertilizer applied increased. Therefore, the infection rate of neck blast on the all panicle parts such as panicle base, panicle branches, spikelets, nodes, and internodes inside the leaf sheath didn't show differences due to varietal resistance or fertilizers applied. 11. Except for others among dominant species of fungi in the leaf sheath, only Gerlachia oryzae appeared to promote incidence of neck blast. It was assumed that days for heading of varieties were related with neck blast incidence.

  • PDF