• Title/Summary/Keyword: Security Event

Search Result 394, Processing Time 0.029 seconds

Healthcare and Emergency Response Service Platform Based on Android Smartphone

  • Choi, Hoan-Suk;Rhee, Woo-Seop
    • International Journal of Contents
    • /
    • v.16 no.1
    • /
    • pp.75-86
    • /
    • 2020
  • As the elderly population is becoming an aging society, the elderly are experiencing many problems. Social security costs for the elderly are increasing and the un-linked social phenomenon is emerging. Thus, the social infrastructure and welfare system established in the past economic growth period are in danger of not functioning properly. People socially isolated or with chronic diseases among the elderly are exposed to various accidents. Thus, an active healthcare management service is imperative. Additionally, in the event of a dangerous situation, the system must have ways to notify guardians (family or medical personnel) regarding appropriate action. Thus, in this paper, we propose the smartphone-based healthcare and emergency response service platform. The proposed service platform aggregates movement of relevant data in real-time using a smartphone. Based on aggregated data, it will always recognize the user's movements and current state using the human motion recognition mechanism. Thus, the proposed service platform provides real-time status monitoring, activity reports, a health calendar, location-based hospital information, emergency situation detection, and cloud messaging server-based efficient notification to several subscribers such as family, guardians, and medical personnel. Through this service, users or guardians can augment the level of care for the elderly through the reports. Also, if an emergency situation is detected, the system immediately informs guardians so as to minimize the risk through immediate response.

The Taxonomy Criteria of DoS Attack Pattern for Enhanced Intrusion Detection System (향상된 침입 탐지 시스템을 위한 DoS 공격 유형의 분류 체계)

  • Kim, Kwang-Deuk;Park, Seung-Kyun;Lee, Tae-Hoon;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3606-3612
    • /
    • 1999
  • System(IDS) hasn't Protection capability for various security attacks perfectly. Because, It is probably affected by IDS's workload caused by treating all kind of the characteristics and attack patterns of system and can't probe all of the attack types being intelligently different with attack patterns. In this paper, we propose a new taxonomy criteria about DoS(denial of service attacks) to make more efficient and new real time probing system. It's started with an idea that most of the goal oriented systems make the state of system operation more unambiguous than general purpose system. A new event caused the state of the system operation to change and classifying a category of the new events may contribute to design the IDS.

  • PDF

A Study on the Dynamic Voltage Stability Considering the Power System Security Control (계통(系統)의 안전성(安全性) 제어(制御)를 고려(考慮)한 동적(動的) 전압안정도(電壓安定度)에 관(關)한 연구(硏究))

  • Lee, Geun-Joon;Hwang, Jong-Young;Lee, Gil-Soon;Jeong, Tay-Ho;Kim, Keon-Jung;Kim, Yong-Bae
    • Proceedings of the KIEE Conference
    • /
    • 1994.11a
    • /
    • pp.54-60
    • /
    • 1994
  • The cause of black out of Tokyo Power in 1987 has been identified as the voltage stability problem. After this event many researchers has been interested in voltage stability or voltage collapse phenomena. The voltage instability is different Com the transient stability in the sense of reactive power mismatch and the long duration time. In this study, we developed efficient tool for analyze and control the dynamic voltage instability. To analize specific condition of dynamic voltage stability, quasi-dynamic simulation method is developed. To provide proper mathmatical model for dynamic voltage stability, generator, SVC, OLTC, induction motor models are introducted. To provide specified dynamic voltage stability, the authors considered to use reactive loss function(${\partial}Q/{\partial}p_L$) as reactive power facility control index. This program was tested and identified its usefulness in real KEPCO system.

  • PDF

The Development Path of China's Private Health Insurance and Its Role in the Health Care System (중국 민간의료보험의 발전경로와 의료보장체계에서의 역할)

  • Jung, Kee Taig;Fan, Jian Cheng;Chen, Wan Yun
    • Health Policy and Management
    • /
    • v.31 no.4
    • /
    • pp.423-436
    • /
    • 2021
  • This article summarizes the structure of China's current social health insurance system and reviews the development status of China's private health insurance (PHI). China's medical security system is mainly composed of two parts: basic medical insurance (BMI) and PHI. Among them, the BMI provides reimbursement of basic medical expenses for the insured persons according to different proportions. PHI is a necessary supplement to the BMI and provides assistance to the insured persons in the event of illness or accident. By having PHI, people can obtain medical protection outside the coverage of BMI. In the development of PHI in China, the total medical cost is high and the insurance market size is large, but the proportion of PHI expenditure is low and the personal burden is high. Through this Chinese case, it will be helpful for mutual development between Korean PHI and national health insurance, for Korean insurance companies to enter the Chinese market, and for removing the medical burden on the people.

Computer vision monitoring and detection for landslides

  • Chen, Tim;Kuo, C.F.;Chen, J.C.Y.
    • Structural Monitoring and Maintenance
    • /
    • v.6 no.2
    • /
    • pp.161-171
    • /
    • 2019
  • There have been a few checking frameworks intended to ensure and improve the nature of their regular habitat. The greater part of these frameworks are constrained in their capacities. In this paper, the insightful checking framework intended for debacle help and administrations has been exhibited. The ideal administrations, necessities and coming about plan proposition have been indicated. This has prompted a framework that depends fundamentally on ecological examination so as to offer consideration and security administrations to give the self-governance of indigenous habitats. In this sense, ecological acknowledgment is considered, where, in light of past work, novel commitments have been made to help include based and PC vision situations. This epic PC vision procedure utilized as notice framework for avalanche identification depends on changes in the normal landscape. The multi-criteria basic leadership strategy is used to incorporate slope data and the level of variety of the highlights. The reproduction consequences of highlight point discovery are shown in highlight guide coordinating toward discover steady and coordinating component focuses and effectively identified utilizing these two systems, by examining the variety in the distinguished highlights and the element coordinating.

Random Vibration Analysis of Portable Power Supply Container for Radar With U.S. Military Standards (미 군사규격을 적용한 레이더 전력공급용 이동식 컨테이너의 Random Vibration 해석)

  • Do, Jae-Seok;Hur, Jang-Wook
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.21 no.9
    • /
    • pp.71-77
    • /
    • 2022
  • In times of war or emergencies, weapon systems, such as radars, must receive stable power. This can be achieved using improved onboard portable power systems made of steel containers. However, a breakdown can occur in the event of random vibration during transportation via a vehicle or train. Electrical-power shortages or restrictions pose a significant threat to security. In this study, Composite Wheeled Vehicle(CWV) data and rail cargo data with Acceleration Spectral Density(ASD), specified in MIL-STD-810H METHOD 514.8, were interpreted as input data of the three-axis random vibration method using ANSYS 19.2. Modal analysis was performed up to 500 Hz, and deformations in modes 1 to 117 were calculated to utilize all ASD data. The maximum equivalent stress in the three-axis direction was obtained using a random vibration analysis. Similarly, the margin of safety was calculated using the derived equivalent stress and material properties. Overall, the analysis verified that the portable container designed for the power supply system satisfied the required vibration demands.

Analysis of Abnormal Event Detection Research using Intelligent IoT Devices for Human Health Cares

  • Lee, Do-hyeon;Kim, Da-hyeon;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.37-44
    • /
    • 2022
  • With the outbreak of COVID-19, non-face-to-face activities such as remote learning and telecommuting have increased rapidly. As a result, the number of people staying at home and the number of hours spent inside the house have also increased since the pandemic. Our team had previously worked on methods for detecting abnormal conditions in a person's health in various circumstances within the house by converging single sensor-based algorithms. In our previous research, we installed IoT sensors indoors to detect people emergency situations requiring aids, the scope of detection was limited to indoor space due to the limitation in sensors. In this study, we have come up with a system that integrates our previous study with a new method for detecting abnormal conditions in outdoor environments using outdoor security cameras and wearable devices. The proposed system enables users to be notified of emergency situations in both indoor and outdoor areas and respond to them as quickly as possible.

Aspect of the chief of state guard EMP (Electro Magnetic Pulse) protection system for the consideration (국가원수 경호적 측면에서의 EMP(Electro Magnetic Pulse) 방호 시스템에 대한 고찰)

  • Jung, Joo-Sub
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.37-66
    • /
    • 2014
  • In recent years, with the development of computers and electronics, electronics and communication technology in a growing and each part is dependent on the cross-referencing makes all electronic equipment is obsolete due to direct or indirect damage EMP. Korea and the impending standoff North Korea has a considerable level of technologies related to the EMP, EMP weapons you already have or in a few years, the development of EMP weapons will complete. North Korea launched a long-range missile and conducted a nuclear test on several occasions immediately after, when I saw the high-altitude nuclear blackmail has been strengthening the outright offensive nuclear EMP attacks at any time and practical significance for the EMP will need offensive skills would improve. At this point you can predict the damage situation of Korea's security reality that satisfy the need, more than anything else to build a protective system of the EMP. The scale of the damage that unforeseen but significant military damage and socio-economic damage and fatalities when I looked into the situation which started out as a satellite communications systems and equipment to attack military and security systems and transportation, finance, national emergency system, such as the damage elsewhere. In General, there is no direct casualties reported, but EMP medical devices that rely on lethal damage to people who can show up. In addition, the State power system failure due to a power supply interruption would not have thought the damage would bring State highly dependent on domestic power generation of nuclear plants is a serious nuclear power plant accident in the event of a blackout phenomenon can lead to the plant's internal problems should see a forecast. First of all, a special expert Committee of the EMP, the demand for protective facilities and equipment and conduct an investigation, he takes fits into your budget is under strict criteria by configuring the contractors should be sifting through. He then created the Agency for verification of performance EMP protection after you have verified the performance of maintenance, maintenance, safety and security management, design and construction company organized and systematic process Guard facilities or secret communications equipment and perfect for the EMP, such as protective equipment maneuver system should take.

  • PDF

A Study on the Methods of Fault Analysis to Improve Safety in U-Healthcare System for Managing Emergency Rescue for Seniors (시니어들의 응급구난 관리를 위한 U-Healthcare시스템에서 안전성 개선을 위한 결함 분석 방법에 관한 연구)

  • Kim, Gyu-A;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.2
    • /
    • pp.170-179
    • /
    • 2014
  • Recently the U-Healthcare system has been rapidly advanced to manage emergence rescue for seniors. We can access emergency rescue systems with high quality services anytime, anywhere under ubiquitous healthcare systems. The more the various systems develop, the more software security systems become important. Therefore, the safety-critical system has been widely spread to the world by advancement of the information and communication technologies. There are a lot kind of fault analysis methods to evaluate software security systems. However due to characteristics of software that is not applied by human error, it can be prevented the enormous damages and losses from improving the safety of safety-critical system. So this paper proposes an integration method of FTA and Forward and Backward FMECA. This method has each strength of FTA and FMECA which is visual and numeric in normalization. First, by use of FTA, we can redraw FTA with Forward FMECA and Backward FMECA in consideration of occurrence, severity, detection, correctness, robustness, and security. Also according to value of NRVP at each event, we can modify FTA diagrams as shown critical paths given by severity and occurrence. Also, we propose the improved emergency rescue service platform of ubiquitous healthcare systems through identifying priorities of the criticality according to normalized risk priority values (NRPV).

Evaluation of Distributed Intrusion Detection System Based on MongoDB (MongoDB 기반의 분산 침입탐지시스템 성능 평가)

  • Han, HyoJoon;Kim, HyukHo;Kim, Yangwoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.12
    • /
    • pp.287-296
    • /
    • 2019
  • Due to the development and increased usage of Internet services such as IoT and cloud computing, a large number of packets are being generated on the Internet. In order to create a safe Internet environment, malicious data that may exist among these packets must be processed and detected quickly. In this paper, we apply MongoDB, which is specialized for unstructured data analysis and big data processing, to intrusion detection system for rapid processing of big data security events. In addition, building the intrusion detection system(IDS) using some of the private cloud resources which is the target of protection, elastic and dynamic reconfiguration of the IDS is made possible as the number of security events increase or decrease. In order to evaluate the performance of MongoDB - based IDS proposed in this paper, we constructed prototype systems of IDS based on MongoDB as well as existing relational database, and compared their performance. Moreover, the number of virtual machine has been increased to find out the performance change as the IDS is distributed. As a result, it is shown that the performance is improved as the number of virtual machine is increased to make IDS distributed in MongoDB environment but keeping the overall system performance unchanged. The security event input rate based on distributed MongoDB was faster as much as 60%, and distributed MongoDB-based intrusion detection rate was faster up to 100% comparing to the IDS based on relational database.