• Title/Summary/Keyword: Security Events

Search Result 279, Processing Time 0.025 seconds

Discrimination of Arcing Faults from Normal Distribution Disturbances by Wave form Distortion Analysis

  • Kim, C. J.
    • Journal of Electrical Engineering and information Science
    • /
    • v.1 no.2
    • /
    • pp.52-57
    • /
    • 1996
  • Detection of arcing high impedance faults has been a perplexing in the power distribution protection. Transient analysis of distribution disturbances for fault discrimination from other normal events is important for a secure protection of the power system. A simple parameter of wave form distortion quantification is used to analyze the behaviors of arcing faults and normal distribution disturbances. Theoretical perspectives of the transients were studied and actual disturbances were examined. From this investigation, a discrimination guideline based on the revised crest factor is developed. The discrimination method has a high potential to enhance the reliability and security for the distribution system protection.

  • PDF

Streaming Contents Execution Point Analysis using Activated Events on Smart Devices (스마트 단말에서의 이벤트 기반 스트리밍 콘텐츠 재생 시점 탐지 방법)

  • Na, Seung Jae;Seo, Chang Wook;Kim, Min Cheol;Lee, Hyung-Woo;Jeong, Chi Yoon;Han, Seungwan
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.61-64
    • /
    • 2015
  • 최근 청소년들의 스마트 단말 사용이 급격히 증가하면서, 스마트 단말을 통하여 유해 콘텐츠에 접근하는 비중이 점점 더 늘어나고 있다. 이에 본 논문에서는 스마트 단말에서 스트리밍 콘텐츠가 실행되는 메커니즘을 분석하고, 이를 기반으로 실행 이벤트의 연관성을 분석하여 스트리밍 콘텐츠가 재생되는 시점을 자동으로 탐지할 수 있는 방법을 제안하였다. 제안된 방법을 사용하면 스마트 단말에서 스트리밍 유해 콘텐츠를 효과적으로 차단 할 수 있을 것으로 기대된다.

  • PDF

Impact of ITSM Military Service Quality and Value on Service Trust

  • Woo, Hanchul;Lee, Sangdo;Huh, Jun-Ho;Jeong, Sukjae
    • Journal of Multimedia Information System
    • /
    • v.7 no.1
    • /
    • pp.55-72
    • /
    • 2020
  • As the IT service environment grows, it is critical in terms of IT service quality to minimize the occurrence of failures due to changes in applications and to diagnose and recover in a short period of time how failure will affect the business. Thus, the Defense Acquisition Program Administration (DAPA) has been building and operating ITSMs to implement IT service management in a leading manner. Information Technology Service Management (ITSM) is divided into events, obstacles, changes, versions and setup management to ensure flexibility and stability in service delivery. It is also operated separately from service level, availability, capacity, financial and IT service continuity management to ensure service quality and cost efficiency. Based on ITSM military service history, this study looks at the impact of quality of service on value, satisfaction, and trust. The results of the analysis are highly valuable for future ITSM implementation and operation.

Application of Martial Arts Method for the Detail Protection (근접경호업무 수행을 위한 경호무도의 접근방법)

  • Lee, Sang-Chul
    • Korean Security Journal
    • /
    • no.2
    • /
    • pp.161-191
    • /
    • 1999
  • Protection martial arts are neither the ability to protect oneself nor the exercise to increase the personal record. Their aim is to protect clients for the sake of their safety, Therefore, it needs special training course distinguished form general martial arts. Those who perform the duty of protection should make efforts to master every skill capable of meeting any situations in which unforeseen accidents may occur. So the coaches of protection martial arts should teach their disciples basic techniques by stages according to each martial art. They also should teach them systematically how to deal with each accidental affair on the ground of protection method. With teaching the way to cope with a crisis coaches might make the disciples feel real by presenting the real situation of different events to which protection arts can be applicable. And a mock exercise with a careful plan and enough practices as well as a mental training to all evaluate the anxiety which might be shown on duty could be helpful for educating elite personnel who will perform the duty of protection completely.

  • PDF

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face

  • Satone, M.P.;Kharate, G.K.
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.483-494
    • /
    • 2012
  • Many recent events, such as terrorist attacks, exposed defects in most sophisticated security systems. Therefore, it is necessary to improve security data systems based on the body or behavioral characteristics, often called biometrics. Together with the growing interest in the development of human and computer interface and biometric identification, human face recognition has become an active research area. Face recognition appears to offer several advantages over other biometric methods. Nowadays, Principal Component Analysis (PCA) has been widely adopted for the face recognition algorithm. Yet still, PCA has limitations such as poor discriminatory power and large computational load. This paper proposes a novel algorithm for face recognition using a mid band frequency component of partial information which is used for PCA representation. Because the human face has even symmetry, half of a face is sufficient for face recognition. This partial information saves storage and computation time. In comparison with the traditional use of PCA, the proposed method gives better recognition accuracy and discriminatory power. Furthermore, the proposed method reduces the computational load and storage significantly.

Analysis of the Requirement on the Intelligent CCTV Camera in Subway Environment (도시철도 지능형 카메라에 요구되는 성능 및 관련기술 연구)

  • Chang, Il-Sik;Park, Jong-Hwa;Kim, Joo-Sun;Kim, Hyung-Min;Park, Goo-Man
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.1151-1156
    • /
    • 2008
  • In this paper we have analysed various requirements on the intelligent camera which is one of the essential component in Integrated Intelligent Security System in Subway Service Environment. The purpose of Integrated Intelligent Security System is to protect possible accidents and respond to the events in the most effective and quickest way to reduce the loss in minimum.

  • PDF

A Survey of Arabic Thematic Sentiment Analysis Based on Topic Modeling

  • Basabain, Seham
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.155-162
    • /
    • 2021
  • The expansion of the world wide web has led to a huge amount of user generated content over different forums and social media platforms, these rich data resources offer the opportunity to reflect, and track changing public sentiments and help to develop proactive reactions strategies for decision and policy makers. Analysis of public emotions and opinions towards events and sentimental trends can help to address unforeseen areas of public concerns. The need of developing systems to analyze these sentiments and the topics behind them has emerged tremendously. While most existing works reported in the literature have been carried out in English, this paper, in contrast, aims to review recent research works in Arabic language in the field of thematic sentiment analysis and which techniques they have utilized to accomplish this task. The findings show that the prevailing techniques in Arabic topic-based sentiment analysis are based on traditional approaches and machine learning methods. In addition, it has been found that considerably limited recent studies have utilized deep learning approaches to build high performance models.

Modeling in System Engineering: Conceptual Time Representation

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.153-164
    • /
    • 2021
  • The increasing importance of such fields as embedded systems, pervasive computing, and hybrid systems control is increasing attention to the time-dependent aspects of system modeling. In this paper, we focus on modeling conceptual time. Conceptual time is time represented in conceptual modeling, where the notion of time does not always play a major role. Time modeling in computing is far from exhibiting a unified and comprehensive framework, and is often handled in an ad hoc manner. This paper contributes to the establishment of a broader understanding of time in conceptual modeling based on a software and system engineering model denoted thinging machine (TM). TM modeling is founded on a one-category ontology called a thimac (thing/machine) that is used to elaborate the design and analysis of ontological presumptions. The issue under study is a sample of abstract modeling domains as exemplified by time. The goal is to provide better understanding of the TM model by supplementing it with a conceptualization of time aspects. The results reveal new characteristics of time and related notions such as space, events, and system behavior.

Leadership Development: What Role for Vocational Training?

  • Khemissi, Farid
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.11-20
    • /
    • 2021
  • The aim of this paper is to examine the factors that could influence leadership development and employee retention in private sector organizations. In this research, we will seek to determine the nature and extent of the impact of professional training on leadership development. This research project is one of the new topics that some researchers have started in recent years. the novelty of this subject is the inclusion of the vocational training factor. This factor is likely to have a positive impact on leadership development. Some of the factors already known for their impact on leadership development such as personality, power, and material and moral incentives will be adopted. It is assumed that the results of this research will have a positive impact on the development of leadership within companies.

Problems of Gender Parity in the State Administration System: Conceptual and Empirical Aspects

  • Kireieva, Zoia;Sardaryan, Karinna;Voytsekhovska, Yuliya;Britchenko, Igor;Samoilenko, Viktoria;Popova, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.369-375
    • /
    • 2022
  • The article is timed to coincide with the thirtieth anniversary of Ukraine's independence. Based on the generalization of fundamental and applied studies of scientists, the author's vision of such category as the gender parity is conceptualized. Based on the analysis of historical events related to the development of the state, the formation of cultural and social values in determining the gender identity of modern society is substantiated. Based on the analysis of literary and regulatory sources, the structure of the state administration of Ukraine is visualized, which has become the basis for the diagnosis of gender aspects. Based on the analysis, the problems of gender parity in the public administration system of Ukraine are identified.