• Title/Summary/Keyword: Majority attack

Search Result 24, Processing Time 0.036 seconds

A Study on the Actual Wearing Conditions of Battle Dress Uniform for the Korean Police Special Weapons Attack Team (경찰특공대(SWAT) 작전복(BDU) 착용실태에 관한 연구)

  • Moon Yeon-Sil;Choi Hei-Sun;Kim Eun-Kyong
    • Journal of the Korean Society of Costume
    • /
    • v.55 no.5 s.95
    • /
    • pp.108-119
    • /
    • 2005
  • The objective of the study is was investigate the condition of the battle dress uniform worn by male members of the Korean Police Special Weapons Attack Team(KP-SWAT), identify problems, and provide basic raw materials for developing improved design of BDU. For this purpose, the researcher conducted a questionnaire survey on 92 male members of SWAT (Special Weapon Attack Team) units in Seoul using a questionnaire developed through observation and interview. Also, the body sizes of male SWAT members were measured. According to the results of body size measurements, male SWAT members generally require uniforms with a target bust girth, armhole, biceps circumference, thigh and calf circumference, longer jacket length, sleeve length, and trouser length to the knee. According to the results of the questionnaire survey, they reported dissatisfaction with the fit. In addition, they said that the Pockets are positioned too low for convenient use. Many subjects reported that their trousers were too short because of the rubber rings at the bottom of the legs. In addition, many subjects requested the alteration of the inconveniences caused by the designs finished with velcro on the bottom collar of the upper uniform, the marks and ensigns of the upper uniform, the bottom of the upper and lower uniform, and several pockets. Furthermore, there were many complaints concerning how they had to wear their uniform. The most frequently worn out and the body parts most often injured in field training and operations, they were reported, on the upper uniform, as the elbow, collar, neck, armpit, shoulder, and sleeve hem in that order, and on the lower uniform, the knee, interior calf, waist (belt rings), buttocks (rear pockets), and the bottom of the trousers (ankle) in that order As for questions concerning priorities in the improvements of the operational uniform and preferred design, the subjects recommended improvement in safety (protectiveness), workability (motional flexibility), design (shape), fit (size), comfort, ease in terms of putting on and taking off, etc., and the majority preferred two-piece designs ($67.4\%$), followed by one-piece ($30.4\%$), or both ($2.2\%$).

Factors Affecting the Increase in Internet Use Among South Korean Elementary Schoolers (초등학생 인터넷 사용 증가에 영향을 미치는 요인들)

  • Park, Sun-Hee
    • Korean Journal of Health Education and Promotion
    • /
    • v.24 no.1
    • /
    • pp.75-91
    • /
    • 2007
  • Objectives: It is known that the majority of middle schoolers spend the substantial amount of time using the Internet. Despite the fact, little is known about which factors are related to an increase in Internet use and what could be the consequences of excessive Internet use. The aim of this study was to explore factors affecting an increase in Internet use among elementary schoolers representing the population of South Korean elementary schoolers. Method: Secondary data obtained from the Korea Youth Panel Survey were analyzed longitudinally. Results: The average minutes spent using the Internet was 73.43 in the first wave, and was 92.17 in the second wave. Also, the percentage of those who experienced illegal behaviors on the Internet was 22.86% in the first wave, and was 30.92% in the second wave. Second, increased Internet use was strongly associated with an attack tendency, depression, suicidal ideation, stress, and delinquent behaviors. Finally, gender(being female), and increased attacking tendency, and smoking experiences successfully predicted an increase in Internet use one year later. Conclusions: It is necessary to provide education programs to young people and to develop preventive strategies for them. Through providing education programs, children can form desirable attitudes regarding the Internet use. Through providing intervention strategies, children can prevent from experiencing negative consequences due to excessive Internet use.

A Study on the Stress Perception Response Following the Aftereffect in Poststroke Patients (중풍환자(中風患者)의 후유증(後遺症)에 따른 Stress 지각반응(知覺反應)에 대(對)한 조사연구(調査硏究))

  • Park Jae-Hyeon;Lyu Yeong-Soo
    • Journal of Oriental Neuropsychiatry
    • /
    • v.8 no.1
    • /
    • pp.151-165
    • /
    • 1997
  • The primary purpose of this study was to assess the relation of stress perception and poststroke. This study was done on 50 stroke patients in hospital. According to activities of functional impairment, they were classified into walking disturbance, motor weakness, dysphagia, or reattack etc. The stress perception test(GARS Scles) and stress response assessment shows the follwing results. 1. On the distribution in the stroke 50 patients, For the majority group were male in sex, sixty inage, middle towns people in residence. 2. On the comprehensive GARS scale scores, It marked the higest scores thirty at age, merchandise or salesman on jobs, a city in residence. There was no signigicant difference in mean GARS Scales scores between males and females group, the left hemiplegia and the Rt hemiplegia. 3. On the comprehensive GARS Scale tests, Overall glogal stressor(G8) and sickness stresor(G4) marked the highest scores of all GARS Scales. 4. On the comparative assessment of each group's stress reponse test scores, zung-bu(中腑) was showed higher scores than the other group in oriental diagnosis and hemorrage was showed higher scores than the other group in western medical diagnosis. 5. On the comprehensive assessment of each group's stress reponse test scores, aphsia(不語) marked the highest scores in another disphagia group's. It marked the highest scores in another group's that banshinbulsoo(半身不遂) as regards as hemiplegia generally. Standing disability is the higher scores than another group's walking alone or assist, and standing alone. 6. Secondary attack is the highest scores of all reattack stroke on the stress repones test. 7. Comparing and analyzing the GARS Scale total scores and GARS Scale subject fator at stroke, we found that sickness stressor and fininial stressor is showed the highest correlated to stress response fowlloing stroke. With those results, we can see that functional impairment following stroke is correlated to stress perception and reponse. In the furture studies using, we hope that the findings the study would have clinical relevance to the psychosocial adjustment and total rehabilation of stroke patients.

  • PDF

Utilization of Google Earth for Distribution Mapping of Cholangiocarcinoma: a Case Study in Satuek District, Buriram, Thailand

  • Rattanasing, Wannaporn;Kaewpitoon, Soraya J;Loyd, Ryan A;Rujirakul, Ratana;Yodkaw, Eakachai;Kaewpitoon, Natthawut
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.14
    • /
    • pp.5903-5906
    • /
    • 2015
  • Background: Cholangiocarcinoma (CCA) is a serious public health problem in the Northeast of Thailand. CCA is considered to be an incurable and rapidly lethal disease. Knowledge of the distribution of CCA patients is necessary for management strategies. Objectives: This study aimed to utilize the Geographic Information System and Google $Earth^{TM}$ for distribution mapping of cholangiocarcinoma in Satuek District, Buriram, Thailand, during a 5-year period (2008-2012). Materials and Methods: In this retrospective study data were collected and reviewed from the OPD cards, definitive cases of CCA were patients who were treated in Satuek hospital and were diagnosed with CCA or ICD-10 code C22.1. CCA cases were used to analyze and calculate with ArcGIS 9.2, all of data were imported into Google Earth using the online web page www.earthpoint.us. Data were displayed at village points. Results: A total of 53 cases were diagnosed and identified as CCA. The incidence was 53.57 per 100,000 population (65.5 for males and 30.8 for females) and the majority of CCA cases were in stages IV and IIA. The average age was 67 years old. The highest attack rate was observed in Thung Wang sub-district (161.4 per 100,000 population). The map display at village points for CCA patients based on Google Earth gave a clear visual deistribution. Conclusions: CCA is still a major problem in Satuek district, Buriram province of Thailand. The Google Earth production process is very simple and easy to learn. It is suitable for the use in further development of CCA management strategies.

ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks

  • Kim, Hyeong-S.;Jung, Eun-Jin;Yeom, Heon-Y.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1311-1326
    • /
    • 2010
  • Peer-to-peer (P2P) networks consume the most bandwidth in the current Internet and file sharing accounts for the majority of the P2P traffic. Thus it is important for a P2P file sharing application to be efficient in bandwidth consumption. Bandwidth consumption as much as downloaded file sizes is inevitable, but those in file search and bad downloads, e.g. wrong, corrupted, or malicious file downloads, are overheads. In this paper, we target to reduce these overheads even in the presence of high volume of malicious users and their bad files. Sybil attacks are the example of such hostile environment. Sybil attacker creates a large number of identities (Sybil nodes) and unfairly influences the system. When a large portion of the system is subverted, either in terms of the number of users or the number of files shared in the system, the overheads due to the bad downloads rapidly increase. We propose ELiSyR, a file search protocol that can tolerate such a hostile environment. ELiSyR uses social networks for P2P file search and finds benign files in 71% of searches even when more than half of the users are malicious. Furthermore, ELiSyR provides similar success with less bandwidth than other general efforts against Sybil attacks. We compare our algorithm to SybilGuard, SybilLimit and EigenTrust in terms of bandwidth consumption and the likelihood of bad downloads. Our algorithm shows lower bandwidth consumption, similar chances of bad downloads and fairer distribution of computation loads than these general efforts. In return, our algorithm takes more rounds of search than them. However the time required for search is usually much less than the time required for downloads, so the delay in search is justifiable compared to the cost of bad downloads and subsequent re-search and downloads.

Hierarchical IoT Edge Resource Allocation and Management Techniques based on Synthetic Neural Networks in Distributed AIoT Environments (분산 AIoT 환경에서 합성곱신경망 기반 계층적 IoT Edge 자원 할당 및 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.2 no.3
    • /
    • pp.8-14
    • /
    • 2023
  • The majority of IoT devices already employ AIoT, however there are still numerous issues that need to be resolved before AI applications can be deployed. In order to more effectively distribute IoT edge resources, this paper propose a machine learning-based approach to managing IoT edge resources. The suggested method constantly improves the allocation of IoT resources by identifying IoT edge resource trends using machine learning. IoT resources that have been optimized make use of machine learning convolution to reliably sustain IoT edge resources that are always changing. By storing each machine learning-based IoT edge resource as a hash value alongside the resource of the previous pattern, the suggested approach effectively verifies the resource as an attack pattern in a distributed AIoT context. Experimental results evaluate energy efficiency in three different test scenarios to verify the integrity of IoT Edge resources to see if they work well in complex environments with heterogeneous computational hardware.

A Study on Traceback by WAS Bypass Access Query Information of DataBase (DBMS WAS 우회접속의 쿼리정보 역추적 연구)

  • Baek, Jong-Il;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.181-190
    • /
    • 2009
  • DBMS access that used high speed internet web service through WAS is increasing. Need application of DB security technology for 3-Tier about DBMS by unspecified majority and access about roundabout way connection and competence control. If do roundabout way connection to DBMS through WAS, DBMS server stores WAS's information that is user who do not store roundabout way connection user's IP information, and connects to verge system. To DBMS in this investigation roundabout way connection through WAS do curie information that know chasing station security thanks recording and Forensic data study. Store session about user and query information that do login through web constructing MetaDB in communication route, and to DBMS server log storing done query information time stamp query because do comparison mapping actuality user discriminate. Apply making Rule after Pattern analysis receiving log by elevation method of security authoritativeness, and develop Module and keep in the data storing place through collection and compression of information. Kept information can minimize false positives of station chase through control of analysis and policy base administration module that utilize intelligence style DBMS security client.

Research on Measures to Enhance Railroad Security Checks of Railroad Police Officers to Prevent Terrorist Attacks (철도테러 예방을 위한 철도경찰 보안검색 강화 방안 연구)

  • Gwon, Hyeon-Shik
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.157-183
    • /
    • 2016
  • Countries across the globe, including those in Europe, are waging a "war against terrorism" as international terrorist groups such as ISIS and lone-wolf terrorists have unleashed various large-scale attacks on rail infrastructure. Anti-South Korean sentiment exists in Muslim-majority countries because the nation has cooperated with the US for its military interventions in the Middle East, and ISIS has threatened to target South Korea four times since September 9, 2015. In addition, North Korea has been left isolated in the international community with its missile and nuclear tests, while further escalating inter-Korean tension and threatening to strike major facilities and attack important figures in the South. These situations imply that South Korea is no longer immune to terrorist attacks. If the nation fails to prevent or deter such terrorist attacks against rail networks, massive casualties, property damage and social confusion would be unavoidable, deteriorating national and international trust in its counter-terrorism policies. This may lead to a national crisis involving decreases in the number of tourists, dampened interest of foreign investors, and capital flight. This study aims to propose policy measures to enhance railroad security checks, based on the work of railroad police officers, for the sake of protecting citizens and public safety. The suggestions include an incremental expansion of railroad security checks; growth of the railroad police force and adjustment of their policing distribution with other police officers; enhancement of security systems across important rail networks; improvement of the Railroad Safety Act; Southeast Asia, including the corresponding strengthening of the national crackdown illegal immigrants, and plans for pre-emptive and regular cooperation among organizations related to the promotion of security checks and the prevention of terrorist attacks.

  • PDF

A Watermarking Scheme Based on k-means++ for Design Drawings (k-means++ 기반의 설계도면 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.57-70
    • /
    • 2009
  • A CAD design drawing based on vector data that is very important art work in industrial fields has been considered to content that the copyright protection is urgently needed. This paper presents a watermarking scheme based on k-means++ for CAD design drawing. One CAD design drawing consists of several layers and each layer consists of various geometric objects such as LINE, POLYLINE, CIRCLE, ARC, 3DFACE and POLYGON. POLYLINE with LINE, 3DFACE and ARC that are fundamental objects make up the majority in CAD design drawing. Therefore, the proposed scheme selects the target object with high distribution among POLYLINE, 3DFACE and ARC objects in CAD design drawing and then selects layers that include the most target object. Then we cluster the target objects in the selected layers by using k-means++ and embed the watermark into the geometric distribution of each group. The geometric distribution is the normalized length distribution in POLYLINE object, the normalized area distribution in 3DFACE object and the angle distribution in ARC object. Experimental results verified that the proposed scheme has the robustness against file format converting, layer attack as well as various geometric editing provided in CAD editing tools.

Effect of Hypersonic Missiles on Maritime Strategy: Focus on Securing and Exploiting Sea Control (극초음속 미사일이 해양전략에 미치는 영향: 해양통제의 확보와 행사를 중심으로)

  • Cho, Seongjin
    • Maritime Security
    • /
    • v.1 no.1
    • /
    • pp.241-271
    • /
    • 2020
  • The military technology currently receiving the most attention is the hypersonic missile. hypersonic is faster than the speed of sound or Mach 5+. The vast majority of the ballistic missiles that it inspired achieved hypersonic speeds as they fell from the sky. Rather than speed, today's renewed attention to hypersonic weapons owes to developments that enable controlled flight. These new systems have two sub-varieties: hypersonic glide vehicles and hypersonic cruise missiles. Hypersonic weapons could challenge detection and defense due to their speed, maneuverability, and low altitude of flight. The fundamental question of this study is: 'What effect will the hypersonic missile have on the maritime strategy?' It is quite prudent to analyze and predict the impact of technology in the development stage on strategy in advance. However, strategy is essential because it affect future force construction. hypersonic missiles act as a limiting factor in securing sea control. The high speed and powerful destructive power of the hypersonic missile are not only difficult to intercept, but it also causes massive ship damage at a single shot. As a result, it is analyzed that the Securing sea control will be as difficult as the capacity of sea denial will be improved geographically and qualitatively. In addition, the concept of Fortress Fleet, which was criticized for its passive strategy in the past, could be reborn in a modern era. There are maritime power projection/defence, SLOC attack/defence in exploiting sea control. The effects of hypersonic missiles on exploiting sea control could be seen as both limiting and opportunity factors.

  • PDF