• Title/Summary/Keyword: Level of Information Provided

Search Result 1,151, Processing Time 0.028 seconds

The Development of a Risk Management System in the Field of Industrial Safety in the Republic of Kazakhstan

  • Kudryavtsev, Sergey S.;Yemelin, Pavel V.;Yemelina, Natalya K.
    • Safety and Health at Work
    • /
    • v.9 no.1
    • /
    • pp.30-41
    • /
    • 2018
  • Background: The purpose of the work is to develop a system that allows processing of information for analysis and industrial risk management, to monitor the level of industrial safety and to perform necessary measures aimed at the prevention of accidents, casualties, and development of professional diseases for effective management of industrial safety at hazardous industrial sites. Methods: Risk assessment of accidents and incidents is based on expert evaluations. Based on the lists of criteria parameters and their possible values, provided by the experts, a unified information and analytical database is compiled, which is included in the final interrogation questionnaires. Risk assessment of industrial injuries and occupational diseases is based on statistical methods. Results: The result of the research is the creation of Guidelines for risk management on hazardous industrial sites of the Republic of Kazakhstan. The Guidelines determine the directions and methods of complex assessment of the state of industrial safety and labor protection and they could be applied as methodological basis at the development of preventive measures for emergencies, casualties, and incidents at hazardous industrial sites. Conclusion: Implementation of the information-analytical system of risk level assessment allows to analyze the state of risk of a possible accident at industrial sites, make valid management decisions aimed at the prevention of emergencies, and monitor the effectiveness of accident prevention measures.

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.

Message Security Level Integration with IoTES: A Design Dependent Encryption Selection Model for IoT Devices

  • Saleh, Matasem;Jhanjhi, NZ;Abdullah, Azween;Saher, Raazia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.328-342
    • /
    • 2022
  • The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party databases. Implementation of data encryption is an integral approach for IoT device designers to protect IoT data. For a variety of reasons, IoT device designers have been unable to discover appropriate encryption to use. The static support provided by research and concerned organizations to assist designers in picking appropriate encryption costs a significant amount of time and effort. IoTES is a web app that uses machine language to address a lack of support from researchers and organizations, as ML has been shown to improve data-driven human decision-making. IoTES still has some weaknesses, which are highlighted in this research. To improve the support, these shortcomings must be addressed. This study proposes the "IoTES with Security" model by adding support for the security level provided by the encryption algorithm to the traditional IoTES model. We evaluated our technique for encryption algorithms with available security levels and compared the accuracy of our model with traditional IoTES. Our model improves IoTES by helping users make security-oriented decisions while choosing the appropriate algorithm for their IoT data.

Role-based Self-Organization Protocol of Clustering Hierarchy for Wireless Sensor Networks (무선 센서 네트워크를 위한 계층형 클러스터링의 역할 기반 자가 구성 프로토콜)

  • Go, Sung-Hyun;Kim, Hyoung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.137-145
    • /
    • 2008
  • In general, a large-scale wireless sensor network(WSNs) is composed of hundreds of or thousands of sensor nodes. In this large-scale wireless sensor networks, it is required to maintain and manage the networks to lower management cost and obtain high energy efficiency. Users should be provided with sensing service at the level of quality for users through an efficient system. In evaluating the result data quality provided from this network to users, the number of sensors related to event detection has an important role. Accordingly, the network protocol which can provide proper QoS at the level of users demanding quality should be designed in a way such that the overall system function has not to be influenced even if some sensor nodes are in error. The energy consumption is minimized at the same time. The protocol suggested in this article is based on the LEACH protocol and is a role-based self-Organization one that is appropriate for large-scale networks which need constant monitoring.

  • PDF

Power Allocation for Opportunistic Full-Duplex based Relay Selection in Cooperative Systems

  • Zhong, Bin;Zhang, Dandan;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3908-3920
    • /
    • 2015
  • In this paper, performance analysis of full-duplex (FD) relay selection under decode-and-forward (DF) relaying mode is carried out by taking into account several critical factors, including the distributions of the received signal-to-noise ratio (SNR) and the outage probability of wireless links. The tradeoff between the FD and half-duplex (HD) modes for relay selection techniques is also analyzed, where the former suffers from the impact of residual self-interference, but the latter requires more channel resources than the former (i.e., two orthogonal channels are required). Furthermore, the impact of optimal power allocation (OPA) on the proposed relay-selection scheme is analyzed. Particularly, the exact closed-form expressions for outage probability of the proposed scheme over Rayleigh fading channels are derived, followed by validating the proposed analysis using simulation. Numerical results show that the proposed FD based scheme outperforms the HD based scheme by more than 4 dB in terms of coding gain, provided that the residual self-interference level in the FD mode can be substantially suppressed to the level that is below the noise power.

Needs of Community Residents For Educational Program Development Related to Clothing Information (의생활 정보의 사회교육프로그램 개발을 위한 주민의 요구도 분석)

  • Kim, Yang-Weon
    • Korean Journal of Human Ecology
    • /
    • v.9 no.3
    • /
    • pp.363-369
    • /
    • 2000
  • This study examined to obtain the basic data related to fashion information and to identify residents for educational program for the community residents. The data were analyzed by using $x^2-test$ by sex, age, education level, and income. Total 476 subjects were surveyed in Taejon. Findings of the this study provided some results to develop educational programs for community people. The major results were as follows. 1. There were significant differences in needs of community residents by age. Needs were divided into two categories, they grouped teen aged and twenties into thirties and forties. Thus, education contents necessarily involved fashion design, fashion coordination. The data suggested that educational program contents should be differed by age such as the image making by clothes, clothing construction, and checking of body shape. 2. It showed significant differences in residents by educational level. 3. There were not significant differences in residents by income. 4. About 70% of residents answered that educational program should be implicated clothing recycling and management of clothing and textiles.

  • PDF

The Roles of Information Load and Information Quality in Online Apparel Shopping (온라인 의류쇼핑에서 정보부하와 정보품질의 역할)

  • Park, Min-Jung
    • Journal of the Korean Home Economics Association
    • /
    • v.47 no.9
    • /
    • pp.101-110
    • /
    • 2009
  • The purpose of this study was to examine the effect for information load on perceived information quality and website quality, and the relationships among perceived information quality, website quality and behavioral intentions in online apparel shopping contexts. The information load theory provided the theoretical framework for this study. The research strategy employed an online experimentation using an apparel mock website. The total of 647 responses were used for data analyses. The model of the study was tested by MANOVA and SEM. The results of MANOVA revealed the effect of information load on perceived information quality and website quality. The medium level of information load was perceived as having more positive information quality and website quality as compared to the low or high level of information load. The findings of SEM revealed the positive effect of information quality on website quailty, the positive effect of website quality on WOM and willingness to pay more, and the negative effect of website quailty on willingness to switch. Online apparel retailers and website designers need to manage information quantity and quality by understanding the importance of information load.

An Evaluation of the Importance of Major Indicators for Measuring the Level of Spatial Informatization in Local Governments (지방정부의 공간정보화 수준 측정을 위한 주요 지표의 중요도 평가)

  • Kim, Yeon-Seong;Seo, Won-Chan;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.985-994
    • /
    • 2022
  • This study diagnoses the maturity level of local government's spatial information policy in the face of the digital transformation period. To this end, by using the stratification (AHP) analysis technique, for the spatial information expert group, the importance evaluation is performed along with the selection of measurement indicators of the level of spatial informatization. First, the current status and indicators in terms of spatial information policies of local governments are studied through theoretical considerations. In addition, by examining previous studies, differentiation from this study is presented. In this study, 3 indicators and 18 detailed items of spatial informatization level evaluation indicators could be selected. As a result of the evaluation, the overall importance ranking for the measurement index was 0.125 (12.5%) for the establishment and utilizations of GIS Systems provided by local governments, 0.109 (10.9%) for the quality management of basic spatial information, 0.107 (10.7%) for the establishment and utilization of its own spatial information. 0.073 (7.3%) for the collaboration and sharing within the institution, 0.071 (7.1%) for the operation of education and support system on spatial information, 0.065 (6.5%) for the securing a dedicated organization and professional human resources, and interest at the institutional level were derived in the order of 0.053 (5.3%). The results of this study are expected to be usefully utilized as basic data to evaluate the level of spatial information policies promoted by local governments. In addition, if the local government's spatial information policy is pursued centering on the major indicators derived from the study, it is expected that efficient policy operation will be possible.

The factors that influence the financial supports and benefits between an adult married child and the parents by gender (기혼자녀의 성별에 따른 부모에 대한 경제적 지원 및 수혜의 영향 요인)

  • Hong, Sung-Hee
    • Journal of Family Resource Management and Policy Review
    • /
    • v.22 no.1
    • /
    • pp.79-98
    • /
    • 2018
  • The purpose of this study was to analyze the influence of a married adult on child-toparent and on parent-to-child financial supports. The data, derived from Korean General Social Survey(KGSS) was obtained from the Survey Research Center at Sung Kyun Kwan University. The samples included 367 married adult children who had more than one living parent. Multiple regression analysis was used to analyze the research model. The findings from the analysis showed that monthly household income had no significant impact on the financial supports that adult children provided to their parents or that the parents provided to their child. The expectation of financial supports from their parents in the future was a important factor that affected the level of female and male children's financial supports that they received from their parents. The level of instrumental supports from their parents and their parents-in-law did influence the level of financial transfers between them. These results showed that financial transfers between married adult children and their parents differed based on the children's attitude towards the supporting parents, and whether or not the children or parents had alternative resources available to them for financial supports. Moreover, the variation in financial supports and benefits showed complex differences based on the gender of the children, and based on whether the financial support was coming from the respondent's parents or their partner's parents.

Toward Trustworthy Social Network Services: A Robust Design of Recommender Systems

  • Noh, Giseop;Oh, Hayoung;Lee, Kyu-haeng;Kim, Chong-kwon
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.145-156
    • /
    • 2015
  • In recent years, electronic commerce and online social networks (OSNs) have experienced fast growth, and as a result, recommendation systems (RSs) have become extremely common. Accuracy and robustness are important performance indexes that characterize customized information or suggestions provided by RSs. However, nefarious users may be present, and they can distort information within the RSs by creating fake identities (Sybils). Although prior research has attempted to mitigate the negative impact of Sybils, the presence of these fake identities remains an unsolved problem. In this paper, we introduce a new weighted link analysis and influence level for RSs resistant to Sybil attacks. Our approach is validated through simulations of a broad range of attacks, and it is found to outperform other state-of-the-art recommendation methods in terms of both accuracy and robustness.