• Title/Summary/Keyword: Responding techniques

Search Result 69, Processing Time 0.027 seconds

A Study on the Costs Factors of an being additional Budget by the Security System (보안시스템으로 인해 추가되는 예산 외 비용의 요인에 관한 연구)

  • Jeon, Jeong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1481-1488
    • /
    • 2011
  • Recently, Hacking Attacks are appearing as a various Attack techniques with evolution of the Network. and most of the network through a Various Security Systems are responding to an attack. In addition, it should be placed adding the Security Systems to protect the Internal Network's Information assets from External attacks. But, The use of Security Systems inside the network makes a significant impact on Security and Performance, as well as a result causes Economic Additional Costs. Therefore, In this paper, it will be to analyze by associated a case study and experimental results about the Additional Costs Factors(Variable situations difficult to predict and Information Security Recognition levels, Security Systems, Information Asset Assessment). This is expected to serve as a valuable Information for the Reduction of an Costs in a Network deployment and Design in a future.

Implementation of the automatic switching device for the voice communications between heterogeneous devices (이종 기기 간 음성통신을 위한 자동전환장치의 구현)

  • Lew, Chang-Guk;Lee, Bae-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.12
    • /
    • pp.1321-1328
    • /
    • 2015
  • A radio is a half-duplex voice communication method using the PTT(: Push To Talk), occupy a single line calls during transmission. As an interface between the telephone and the radio, UHF and VHF, for voice communication between the different heterogeneous devices, A device automatically switches between the two devices is required. Therefore, in accordance with the performance of the voice switching apparatus for detecting a voice to be transmitted from an input signal, loss of the audio signal to be transmitted is subjected to Significant influence. Conventional method has the problem responding to noise by setting the level through simple means of amplitude of input signal, in other words, the energy level of the input signal. This paper, by using the audio signal processing techniques, this discriminated what the voice is among the input signal and substantiated a device for the automatic voice transmission between heterogeneous devices. With this proposal, I was confirmed of improvement of performance in the automatic voice switching device, could perform loss-less transmission of voice between heterogeneous devices.

Inhibitory actions of borneol on the substantia gelatinosa neurons of the trigeminal subnucleus caudalis in mice

  • Nguyen, Phuong Thao Thi;Jang, Seon Hui;Rijal, Santosh;Park, Soo Joung;Han, Seong Kyu
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.24 no.5
    • /
    • pp.433-440
    • /
    • 2020
  • The substantia gelatinosa (SG) of the trigeminal subnucleus caudalis (Vc) is the first relay site for the orofacial nociceptive inputs via the thin myelinated Aδ and unmyelinated C primary afferent fibers. Borneol, one of the valuable time-honored herbal ingredients in traditional Chinese medicine, is a popular treatment for anxiety, anesthesia, and antinociception. However, to date, little is known as to how borneol acts on the SG neurons of the Vc. To close this gap, the whole-cell patch-clamp technique was applied to elucidate the antinociceptive mechanism responding for the actions of borneol on the SG neurons of the Vc in mice. In the voltage-clamp mode, holding at -60 mV, the borneol-induced non-desensitizing inward currents were not affected by tetrodotoxin, a voltage-gated Na+ channel blocker, 6-cyano-7-nitro-quinoxaline-2,3-dione, a non-N-methyl-ᴅ-aspartate (NMDA) glutamate receptor antagonist and DL-2-amino-5-phosphonopentanoic acid, an NMDA receptor antagonist. However, borneol-induced inward currents were partially decreased in the presence of picrotoxin, a γ-aminobutyric acid (GABA)A receptor antagonist, or strychnine, a glycine receptor antagonist, and was almost suppressed in the presence of picrotoxin and strychnine. Though borneol did not show any effect on the glycine-induced inward currents, borneol enhanced GABA-mediated responses. Beside, borneol enhanced the GABA-induced hyperpolarization under the current-clamp mode. Altogether, we suggest that borneol contributes in part toward mediating the inhibitory GABA and glycine transmission on the SG neurons of the Vc and may serve as an herbal therapeutic for orofacial pain ailments.

A Study on the Impact of Multi-Skilled Agents on the Service Quality of Call Centers (멀티스킬 상담 인력이 콜센터 서비스 품질에 미치는 영향에 관한 연구)

  • Chen, Taoyuan;Park, Chan-Kyoo
    • Journal of Information Technology Services
    • /
    • v.18 no.3
    • /
    • pp.17-35
    • /
    • 2019
  • Call centers do not simply play a role of responding to customers' calls, but they have developed into a core unit for maintaining competitiveness through services, marketing, or sales. Since the service quality of call centers heavily affects customer satisfaction, organizations have focused on enhancing it by reducing waiting time and increasing service level. One of the techniques, which improve the service quality of call centers, is to employ multi-skilled agents that can handle more than one type of calls. This study deals with three issues relevant to multi-skilled agents. First, we analyze how the way of allocating a specific group of agents to a set of skills affects the performance of call centers. Secondly, we investigate the relationship between the number of multi-skilled agents and the performance of call centers. Finally, we examine the impact of agent selection rules on the performance of call centers. Two selection rules are compared : the first rule is to assign a call to any available agent at random while the other rule is to assign a call preferably to single-skilled agents over multi-skilled agents when applicable. Based on simulation experiments, we suggest three implications. First, as the length of cycles in the agent-skill configuration network becomes longer, call centers achieve higher service level and shorter waiting time. Secondly, simulation results show that as the portion of multi-skilled agents increases, the performance of call centers improves. However, most of the improvement is attained when the portion of multi-skilled agents is relatively low. Finally, the agent selection rules do not significantly affect the call centers' performance, but the rule of preferring single-skilled agents tends to distribute the workload among agents more equally.

Development of Traditional Indonesian Boatyards: The Simulation of Collaborative Working with a Large Shipbuilding Facility

  • Birmingham, Richard;Samodra;Widijaja, Sjarie
    • Journal of Ship and Ocean Technology
    • /
    • v.5 no.1
    • /
    • pp.1-13
    • /
    • 2001
  • As Indonesia determines to increase its marine fishery production, the development of tradi-tional boatyards has to be included in the agenda as it will give the local fishing communities a better chance to compete with large capital intensive fishing companies. It will also spread job opportunities evenly throughout the country instead of concentration fishing vessel con- struction in a few large shipyards located primarily on the highly populated island of Java. However development every single boatyard in indonesia would not only be prohibitively ex-pensive, but it would also create social tensions as the introduced technology would not be immediately accepted by the rural societies whose own traditions are still culturally signif-icant. Both these problems can be reduced by developing a collaborative scheme between traditional boatyards and a larger shipyard. The shipyard, with modern facilities, can develop work packages containing knock down components which are then assembled in the tradi-tional boatyards. The work packages are planned and designed so that every component can be assembled with relatively simple tools. Radical changes can be avoided as new techniques can be introduced gradually, responding to the boatyard\\`s own requirements and aspirations. While this manufacturing procedure is conceptually straightforward its efficient implemen-tation is in practice complicated by the fact that each traditional boatyard has unique char-acteristics in terms of labour resources, technological capability, and transportation links. By developing a computer model to simulate the interaction between the main shipyard and small traditional a computer model to simulate the interaction between the main shipyard and small traditional boatyards work packages can be designed that ensure that activities at all manufacturing locations are efficient.

  • PDF

Multi-level detection method for DRDoS attack (DRDoS 공격에 대한 다단계 탐지 기법)

  • Baik, Nam-Kyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.12
    • /
    • pp.1670-1675
    • /
    • 2020
  • In this study, to provide the basis for establishing effective network based countermeasures against DRDoS(Distributed Reflection Denial of Service) attacks, we propose a new 'DRDoS attack multi-level detection method' that identifies the network based characteristics of DRDoS and applies probability and statistical techniques. The proposed method removes the limit to which normal traffic can be indiscriminately blocked by unlimited competition in network bandwidth by amplification of reflectors, which is characteristic of DRDoS. This means that by comparing 'Server to Server' and 'Outbound Session Incremental' for it, accurate DRDoS identification and detection is possible and only statistical and probabilistic thresholds are applied to traffic. Thus, network-based information security systems can take advantage of this to completely eliminate DRDoS attack frames. Therefore, it is expected that this study will contribute greatly to identifying and responding to DRDoS attacks.

Vulnerability Mitigation System Construction Method Based on ATT&CK in M ilitary Internal Network Environment (국방 네트워크 환경에서 ATT&CK 기반 취약점 완화 체계 구축 방안)

  • Ahn, Gwang Hyun;Lee, Hanhee;Park, Won Hyung;Kang, Ji Won
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.135-141
    • /
    • 2020
  • The Ministry of National Defense is strengthening the power and capacity of cyber operations as cyber protection training is conducted. However, considering the level of enemy cyber attack capability, the level of cyber defense capability of the ministry of national defense is significantly low and the protection measures and response system for responding to cyber threats to military networks are not clearly designed, falling short of the level of cyber security capabilities of the public and private sectors. Therefore, this paper is to investigate and verify the establishment of a military internal network vulnerability mitigation system that applies the intention of attackers, tactics, techniques and procedures information (ATT&CK Framework), identified military internal network main threat information, and military information system security requirements with military specificity as factors that can establish a defense network vulnerability mitigation system by referring to the domestic and foreign cyber security framework It has the advantage of having.

An Analysis of International Research Trends in Green Infrastructure for Coastal Disaster (해안재해 대응 그린 인프라스트럭쳐의 국제 연구동향 분석)

  • Song, Kihwan;Song, Jihoon;Seok, Youngsun;Kim, Hojoon;Lee, Junga
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.26 no.1
    • /
    • pp.17-33
    • /
    • 2023
  • Disasters in coastal regions are a constant source of damage due to their uncertainty and complexity, leading to the proposal of green infrastructure as a nature-based solution that incorporates the concept of resilience to address the limitations of traditional grey infrastructure. This study analyzed trends in research related to coastal disasters and green infrastructure by conducting a co-occurrence keyword analysis of 2,183 articles collected from the Web of Science (WoS). The analysis resulted in the classification of the literature into four clusters. Cluster 1 is related to coastal disasters and tsunamis, as well as predictive simulation techniques, and includes keywords such as surge, wave, tide, and modeling. Cluster 2 focuses on the social system damage caused by coastal disasters and theoretical concepts, with keywords such as population, community, and green infrastructure elements like habitat, wetland, salt marsh, coral reef, and mangrove. Cluster 3 deals with coastal disaster-related sea level rise and international issues, and includes keywords such as sea level rise (or change), floodplain, and DEM. Finally, cluster 4 covers coastal erosion and vulnerability, and GIS, with the theme of 'coastal vulnerability and spatial technique'. Keywords related to green infrastructure in cluster 2 have been continuously appearing since 2016, but their focus has been on the function and effect of each element. Based on this analysis, implications for planning and management processes using green infrastructure in response to coastal disasters have been derived. This study can serve as a valuable resource for future research and policy in responding to and managing various disasters in coastal regions.

A Study on the Response of Military Sexual Violence: Based on Big Data Analysis of Related Articles (군 성폭력 대응 실태연구: 관련 기사 빅 데이터 분석 중심)

  • Young-Ran Kim;Min-Sun Lee;Hyun Song
    • Industry Promotion Research
    • /
    • v.8 no.4
    • /
    • pp.131-137
    • /
    • 2023
  • This study collected and analyzed articles related to military sex crimes covered in the news from February 2019 to May 28, 2022 in order to identify problems arising from sexual crimes in the military. In order to understand the current status of military sexual violence reported in the media, articles were collected using BIGKinds, a news big data analysis system, and using the Textom program, the study was conducted using frequency analysis by period, word cloud, and semantic network analysis techniques for keywords. The study was conducted using the technique. As a result of data analysis, first, it was confirmed that the public's attention was focused on the victims in reports related to sex crimes within the military. Second, the problem of the lukewarm system of the relevant authorities in responding to sex crimes was revealed. Third, there was a lack of support for victims of sex crimes.

Prediction of Divided Traffic Demands Based on Knowledge Discovery at Expressway Toll Plaza (지식발견 기반의 고속도로 영업소 분할 교통수요 예측)

  • Ahn, Byeong-Tak;Yoon, Byoung-Jo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.36 no.3
    • /
    • pp.521-528
    • /
    • 2016
  • The tollbooths of a main motorway toll plaza are usually operated proactively responding to the variations of traffic demands of two-type vehicles, i.e. cars and the other (heavy) vehicles, respectively. In this vein, it is one of key elements to forecast accurate traffic volumes for the two vehicle types in advanced tollgate operation. Unfortunately, it is not easy for existing univariate short-term prediction techniques to simultaneously generate the two-vehicle-type traffic demands in literature. These practical and academic backgrounds make it one of attractive research topics in Intelligent Transportation System (ITS) forecasting area to forecast the future traffic volumes of the two-type vehicles at an acceptable level of accuracy. In order to address the shortcomings of univariate short-term prediction techniques, a Multiple In-and-Out (MIO) forecasting model to simultaneously generate the two-type traffic volumes is introduced in this article. The MIO model based on a non-parametric approach is devised under the on-line access conditions of large-scale historical data. In a feasible test with actual data, the proposed model outperformed Kalman filtering, one of a widely-used univariate models, in terms of prediction accuracy in spite of multivariate prediction scheme.