• Title/Summary/Keyword: School security

Search Result 3,325, Processing Time 0.033 seconds

Research on the Direction of Building an Integrated Smart Platform at Construction Sites (건설현장 통합 스마트플랫폼 구축방향에 대한 연구)

  • Yeon Cheol Shin;Yu Mi Moon
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.3
    • /
    • pp.620-634
    • /
    • 2024
  • Purpose: This study aims to strengthen the linkage between the construction site and the headquarters, suggest the direction of building an integrated smart platform that can actually be operated and utilized in the field, and effectively implement safety management. Method: Agile methodologies were applied to build a flexible and scalable system through cloud-based and three-tier architectures. Functional requirements were set through an on-site survey, and design and construction were carried out by reflecting personal information protection and legal requirements. Result: The integrated smart platform proposed in this study strengthens the connection between the site and the headquarters to maximize the effect of safety accident prevention and safety management. This system has improved the safety awareness of workers and managers, and has realized more efficient safety management through a unified communication system. Conclusion: In the establishment of an integrated smart platform, it is essential to reflect the characteristics of the site when selecting the development method and establishing the function plan. In the basic design and detailed design stages, it is necessary to establish security measures, design mobile functions, and review device expansion, and consider enterprise-wide safety management, user convenience, and scalability. It is also important to maintain and improve the system, reflect legal requirements, and support the elderly and foreign workers. By strengthening personal information and CCTV security and continuously improving it by reflecting user opinions, it can be expected to activate an integrated smart platform.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

Factors influencing quality of life for individuals and Korean society: Indigenous psychological analysis across different generations (한국 사회와 개인 삶의 질 인식에 대한 토착심리 탐구: 삶의 질을 높이는 요소와 낮추는 요소에 대한 세대별 지각을 중심으로)

  • Youngshin Park;Uichol Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.12 no.1
    • /
    • pp.161-195
    • /
    • 2006
  • The purpose of this study is to examine factors influencing quality of life for individuals in the family, school or workplace, leisure settings, and Korean society using the indigenous psychological analysis. A total of 3,406 participants, consisting of 1,331 elementary, middle, high school students and 2,075 parents and teacher, completed an open-ended questionnaire developed by Kim and Park (2004b). The respondents reported the factors that influence quality of life in Korean society as follows: Economic condition, collective effort, leisure and cultural life, harmonious interpersonal relationships, effective government policy, and educational attainment. The factors that reduce quality of life in Korean society are as follows: Economic uncertainty, political instability, lack of citizenry, ingroup favoritism, corruption, lack of facilities for leisure and social life, and overemphasis on educational achievement. Second, the factors that influence quality of life in the family are as follows: Harmonious family relations and financial security. For students relationship with friends and academic achievement are reported as important factors influencing quality of life at school. For adults, harmonious interpersonal relationship, financial factors and occupational achievement are reported as important factors influencing quality of life at the workplace. For leisure and social leisure life, financial security, leisure time and interpersonal relationships are reported as important factors influencing quality of life. Third, as for generational differences, students reported political instability and adults reported economic uncertainty as the most important factor reducing quality of life in Korean society. For family life, students reported conflicts among family members and adults reported financial constraints as the most important factor reducing quality of life. For leisure and social life, students reported lack of leisure time and adults reported financial constraints as the most important factor reducing quality of life. Fourth, for students the following characteristics were associated with higher quality of life: Higher socio-economic status of the family, younger, and higher academic achievement. For adults, the following characteristics were associated with higher quality of life: Higher socio-economic status of the family and greater achievement their social life. Implications of these results on the quality of life in Korea, focusing on human relationship, financial factors, self-regulation and educational achievement are discussed.

Factors Affecting Continuous Intention to Use Mobile Wallet : Based on Value-based Adoption Model (모바일 지갑의 가치와 지속사용의도의 영향요인 : VAM 모형을 기반으로)

  • Lee, Chungah;Yun, Haejung;Lee, Chunghun;Lee, Choong C.
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.117-135
    • /
    • 2015
  • Mobile wallet that can keep coupons and membership cards for mobile is one of rapidly growing services due to its usability and financial benefit. However, in spite of its rapid growth, the increase of users who do not use continuously it is an important consideration to service providers for making a profit. This study aims to test the effects of factors affecting the continuous use intention of mobile wallet based on VAM (Value-based Adoption Model) which can analyse them in both benefit and sacrifice aspects, so as to suggest considerations to increase the use period of mobile wallet for service providers. The research findings supported the hypotheses regarding to the effects of usefulness, value-expression, perceived security and enjoyment in the benefit aspect and technicality in the sacrifice aspect on perceived value. In addition, the causal path from perceived value to continuous use intention was significant. The study results are expected to be used in marketing or service improvement for short-term users by taking account of emotional factors as well as functional factors.

Switching Positionality of Border Region as Exceptional Space (예외 공간으로서 접경지역의 위치성 전환)

  • Kim, Boo-Heon;Lee, Sung-Cheol
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.267-286
    • /
    • 2017
  • The main purpose of this paper is to identify the spatiality of North Korea and China border regions through investigating the exceptional characteristics of the regions with the concept of positionality, which allows us to realize the relative position between subject and object. Border regions could be identified appropriately by considering the concept of switching positionality, as it is a kind of multiple space in which its sudden closure and opening should be configured in accordance with geopolitical and geoeconomic changes centering around border line. The main arguments of this research concerned with border regions with the concept of switching positionality are fallen into three. Firstly, changes in border regions should be analyzed by investigating more broader contexts and conjunctural perspectives, and even an internal condition stemmed from locality. Secondly, trajectories of border regions could be analyzed by the assemblages of various powers. Finally, the positionality of economic actors should be examined by identifying dynamic relations between geoeconomics and geopolitics. In particular, the concept of positionality has led to a number of insights into discussions on time-space, and spatiality in relational-dialectical, socio-spatial, and power-topological perspectives. Based upon this concept of positionality, the research has identified exceptional characteristics in North Korea and China border regions. It argues that the exceptionality of the region has stemmed from the intersection between the unstability of geopolitical security and various geoeconomic benefits.

Development of Evaluation Factors for Selecting Operator of Rail Traffic-Control (철도 관제권 운영주체 선정을 위한 평가항목 개발)

  • Oh, Jae Kyoung;Chung, Sung Bong;Kim, Ji Yeon;Kim, Sigon
    • Journal of Korean Society of Transportation
    • /
    • v.32 no.4
    • /
    • pp.327-335
    • /
    • 2014
  • The Korean government, as of last year, is attempting to introduce a competitive system in the rail-market. However there are some pertinent issues which need to be addressed in order to select the best possible organization for optimum railway traffic control. As there are no standard guidelines in selecting an agency, objective evaluation factors need to be properly applied to ensure the best possible decision is made. Through literature review and various interviews with experts, appropriate criteria were selected to evaluate the suitability of each potential operator. As generally mentioned, both safety and efficiency play vital roles in the selection process but in addition, there are other factors such as security and fairness, which also need to be considered. The individual weight of these factors were calculated by the AHP, in which three groups of experts were interviewed to acquire their expertise. According to the results, as a potential operator, the score of a railway operating company and the management cooperation of railway is 2.75 and 3.85, respectively. In the future, in preparation towards becoming a competitive rail-market, this research is expected to assist in choosing the best party to control the rail traffic system.

A Study on Evaluation of Water Supply Capacity with Coordinated Weirs and Multi-reservoir Operating Model (댐-보 최적 연계운영을 통한 용수공급능력 평가에 관한 연구)

  • Chae, Sun-Il;Kim, Jae-Hee;Kim, Sheung-Kown
    • Journal of Korea Water Resources Association
    • /
    • v.45 no.8
    • /
    • pp.839-851
    • /
    • 2012
  • When we evaluate the water supply capacity of a river basin, it is a common practice to gradually increase the water demand and check if the water demands are met. This practice is not only used in the simulation approach, but also in the optimization approach. However, this trial and error approach is a tedious task. Hence, we propose a two-phase method. In the first phase, by assuming that the decision maker has complete information on inflow data, we use a goal programming model that can generate the maximum water supply capacity at one time. In the second phase, we simulate the real-time operation for the critical period by utilizing the water supply capacity given by the goal programming model under the condition that there is no foresight of inflow. We applied the two-phase method to the Geum-River basin, where multi-purpose weirs were newly constructed. By comparing the results of the goal programming model with those of the real-time simulation model we could comprehend and estimate the effect of perfect inflow data on the water supply capacity.

A Systematic Literature Review on SaaS: Identifying Research Trend in Korean Academia (SaaS관련 체계적인 연구문헌 분석: 국내 학술 경향 연구)

  • Lee, Hye-Jung;Lee, Jung-Woo;Cho, Cheul-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.6
    • /
    • pp.2729-2738
    • /
    • 2012
  • The purpose of this study is, to analyze the recent trend of studies on SaaS(Software as a Service) in Korea and to suggest a direction for the future research. For this purpose, the relevant literatures published in Korea Citation Index and literatures presented in conferences were gathered. Among these literatures, total of 39 samples were selected and used in the systematic literature review. The result shows that the application of SaaS in actual operations of industries are widely proliferated. However, the studies on SaaS generally lacks in its number and types. For example, studies so far are only on field of engineering and technology. Considering the fact that SaaS is moving towards the service orientation, studies on SaaS should develop in the fields of policy, business, individual and society sides of studies. In addition, the existing studies uses different concepts of relations between SaaS and ASP(Application Service Provider), as well as, different definitions of SaaS. Lastly, our research analyzed the problems of utilization of SaaS and found that, the quality, performance and security are presented as the core of the problems.

Design of PUF-Based Encryption Processor and Mutual Authentication Protocol for Low-Cost RFID Authentication (저비용 RFID 인증을 위한 PUF 기반 암호화 프로세서와 상호 인증 프로토콜 설계)

  • Che, Wonseok;Kim, Sungsoo;Kim, Yonghwan;Yun, Taejin;Ahn, Kwangseon;Han, Kijun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.831-841
    • /
    • 2014
  • The attacker can access the RFID systems illegally because authentication operation on the RFID systems are performed in wireless communication. Authentication methods based on the PUF were presented to defend attacks. Because of Hash and AES, the cost is expensive for the low-cost RFID tag. In this paper, the PUF-based encryption processor and the mutual authentication protocol are proposed for low-cost RFID authentication. The challenge-response pairs (PUF's input and output) are utilized as the authentication key and encrypted by the PUF's characteristics. The encryption method is changed each session and XOR operation with random number is utilized. Therefore, it is difficult for the attacker to analyze challenge-response pairs and attack the systems. In addition, the proposed method with PUF is strong against physical attacks. And the method protects the tag cloning attack by physical attacks because there is no authentication data in the tag. Proposed processor is implemented at low cost with small footprint and low power.

A Study of the Relationship on the Perceived Family Support and the Level of Depression among Adolescents (청소년이 지각한 가족지지와 우울과의 상관관계 연구)

  • Park Myung Hee;Kim Chang Sook;Suh Young Sook;Suh Hee Sook;No Hyun Shin
    • Journal of Korean Public Health Nursing
    • /
    • v.12 no.2
    • /
    • pp.67-88
    • /
    • 1998
  • Present study was attempt to explore the relationship between perceived family support and depression and to emphasize the importance or needs of family support in psychological care especially among adolescents. Study subjects comprized of 308 high school students including vocational students in part, and data collection was done in the Kwangju City area in April. 1998. The Moos Family Environment Scale and the Zung's Self-Rating Depression Scale modified by investigators were used as measurement tools of 59 item questionnaire and in data analysis, statistical methods of T-test, ANOVA. and Pearson Correlation Coefficient were utilized. The study findings are as follows 1. The hypothesis of the study, 'the higher the degree of perceived family support among adolescents, the lower the level of depression', was supported (r=-0.4469, p<.001). 2. Some variables in demographic characteristics related to the degree of family support with statistical significance were school division of vacational vs non-vocational(t=-2.02, p<.05), age(f=5.47, p<.01), family monthly income (f=2.49, p<.05), mother's level of education (f=3.01. p<.05), residence at developmental stage (f=2.87, p<.05), personal problem of highest priority at present(f=7.73, p<.001), and family problem perceived by adolescents(f=7.38, p< .001). 3. Items In general characteristics related to the level of depression with statistical significance were sex(t=-2.91, p<.0l). mother's level of education(f=2.53. p<.05). residence at developmental stage (f=3.95. p<.0l). present personal problem of highest priority (f=3.68. p<.1l). and perceived in-family problem (f=4.58. p<.001). 4. The mean score of the degree of perceived family support was 61.26 $(SD=\pm14.45)$ in a range of 21.00 to 96.00 ; that of the level of depression. 43.74 $(SD=\pm8.04)$ in a range of 23.00 to 67.00. which demonstrated that the higher the degree of perceived family support, the lower the level of depression. In conclusion. it was found that the degree of family support perceived by adolescents is a variable affecting the level of depression. Based on the study outcome, further research suggestions can be made as such that repeated studies are needed in order to delineate the various factors affecting family support and depression, and a study involving family support implementation program is required as a nursing intervention for the development of emotional security among adolescents, perceived family support, depression, adolescence.

  • PDF