• 제목/요약/키워드: Security Integration

검색결과 447건 처리시간 0.101초

The research of Correspondence Analysis centered on the Failure Period to improve the reliability of Weapon Systems (무기체계의 신뢰성 향상을 위한 고장발생기간 중심의 대응분석 연구)

  • Song, Bong-Geun;Kim, Geun-Hyung;Kim, Young-Kuk;Park, Seung Hwan;Baek, Jun-Geol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제17권10호
    • /
    • pp.289-299
    • /
    • 2016
  • Weapon systems require reliability in the development phase for efficient combat readiness. Improved reliability in various manufacturing processes have been achieved using data analysis. However, data analysis in the development phase is difficult due to problems such as the lack of data, high cost, and the importance of security. Therefore, Post Logistics Support (PLS) data collected following integration is analyzed for long-term quality improvement of weapon systems. In this study, we propose a methodology for examining the correlation between the failure rate and PLS data as follows: First, key variables affecting reliability were identified the correlation between variables on the failure rate examined. Second, corresponding analysis was conducted for determining the correlation between patterns of categorical data. Third, extract categories with the higher contribution and quality of representation, and find the highest variable correlated with failure period through visualization. Then, after selecting patterns which have shorter failure period, the cause of decreased reliability was confirmed through frequency analysis. This study will contribute to improving reliability when developing new weapon systems and will help to strengthen the combat readiness of military.

Development on Metallic Nanoparticles-enhanced Ultrasensitive Sensors for Alkaline Fuel Concentrations (금속 나노입자 도입형의 초고감도 센서 개발 및 알칼라인 연료 측정에 적용 연구)

  • Nde, Dieudonne Tanue;Lee, Ji Won;Lee, Hye Jin
    • Applied Chemistry for Engineering
    • /
    • 제33권2호
    • /
    • pp.126-132
    • /
    • 2022
  • Alkaline fuel cells using liquid fuels such as hydrazine and ammonia are gaining great attention as a clean and renewable energy solution possibly owing to advantages such as excellent energy density, simple structure, compact size in fuel container, and ease of storage and transportation. However, common shortcomings including cathode flooding, fuel crossover, side yield reactions, and fuel security and toxicity are still challenging issues. Real time monitoring of fuel concentrations integrated into a fuel cell device can help improving fuel cell performance via predicting any loss of fuels used at a cathode for efficient energy production. There have been extensive research efforts made on developing real-time sensing platforms for hydrazine and ammonia. Among these, recent advancements in electrochemical sensors offering high sensitivity and selectivity, easy fabrication, and fast monitoring capability for analysis of hydrazine and ammonia concentrations will be introduced. In particular, research trend on the integration of metallic and metal oxide nanoparticles and also their hybrids with carbon-based nanomaterials into electrochemical sensing platforms for improvement in sensitivity and selectivity will be highlighted.

From Radon and Thoron Measurements, Inhalation Dose Assessment to National Regulation and Radon Action Plan in Cameroon

  • Saidou;Shinji Tokonami;Masahiro Hosoda;Augustin Simo;Joseph Victor Hell;Olga German;Esmel Gislere Oscar Meless
    • Journal of Radiation Protection and Research
    • /
    • 제47권4호
    • /
    • pp.237-245
    • /
    • 2022
  • Background: The current study reports measurements of activity concentrations of radon (220Rn) and thoron (220Rn) in dwellings, followed by inhalation dose assessment of the public, and then by the development of regulation and the national radon action plan (NRAP) in Cameroon. Materials and Methods: Radon, thoron, and thoron progeny measurements were carried out from 2014 to 2017 using radon-thoron discriminative detectors (commercially RADUET) in 450 dwellings and thoron progeny monitors in 350 dwellings. From 2019 to 2020, radon track detectors (commercially RADTRAK) were deployed in 1,400 dwellings. It was found that activity concentrations of radon range in 1,850 houses from 10 to 2,620 Bq/㎥ with a geometric mean of 76 Bq/㎥. Results and Discussion: Activity concentrations of thoron range from 20 to 700 Bq/㎥ with a geometric mean of 107 Bq/㎥. Thoron equilibrium factor ranges from 0.01 to 0.6, with an arithmetic mean of 0.09 that is higher than the default value of 0.02 given by UNSCEAR. On average, 49%, 9%, and 2% of all surveyed houses have radon concentrations above 100, 200, and 300 Bq/㎥, respectively. The average contribution of thoron to the inhalation dose due to radon and thoron exposure is about 40%. Thus, thoron cannot be neglected in dose assessment to avoid biased results in radio-epidemiological studies. Only radon was considered in the drafted regulation and in the NRAP adopted in October 2020. Reference levels of 300 Bq/㎥ and 1,000 Bq/㎥ were recommended for dwellings and workplaces. Conclusion: Priority actions for the coming years include the following: radon risk mapping, promotion of a protection policy against radon in buildings, integration of the radon prevention and mitigation into the training of construction specialists, mitigation of dwellings and workplaces with high radon levels, increased public awareness of the health risks associated with radon, and development of programs on the scientific and technical aspects.

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • 제13권6호
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.

Intelligent Transportation System (ITS) research optimized for autonomous driving using edge computing (엣지 컴퓨팅을 이용하여 자율주행에 최적화된 지능형 교통 시스템 연구(ITS))

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • 제3권1호
    • /
    • pp.23-29
    • /
    • 2024
  • In this scholarly investigation, the focus is placed on the transformative potential of edge computing in enhancing Intelligent Transportation Systems (ITS) for the facilitation of autonomous driving. The intrinsic capability of edge computing to process voluminous datasets locally and in a real-time manner is identified as paramount in meeting the exigent requirements of autonomous vehicles, encompassing expedited decision-making processes and the bolstering of safety protocols. This inquiry delves into the synergy between edge computing and extant ITS infrastructures, elucidating the manner in which localized data processing can substantially diminish latency, thereby augmenting the responsiveness of autonomous vehicles. Further, the study scrutinizes the deployment of edge servers, an array of sensors, and Vehicle-to-Everything (V2X) communication technologies, positing these elements as constituents of a robust framework designed to support instantaneous traffic management, collision avoidance mechanisms, and the dynamic optimization of vehicular routes. Moreover, this research addresses the principal challenges encountered in the incorporation of edge computing within ITS, including issues related to security, the integration of data, and the scalability of systems. It proffers insights into viable solutions and delineates directions for future scholarly inquiry.

Application Strategies of Superintelligent AI in the Defense Sector: Emphasizing the Exploration of New Domains and Centralizing Combat Scenario Modeling (초거대 인공지능의 국방 분야 적용방안: 새로운 영역 발굴 및 전투시나리오 모델링을 중심으로)

  • PARK GUNWOO
    • The Journal of the Convergence on Culture Technology
    • /
    • 제10권3호
    • /
    • pp.19-24
    • /
    • 2024
  • The future military combat environment is rapidly expanding the role and importance of artificial intelligence (AI) in defense, aligning with the current trends of declining military populations and evolving dynamics. Particularly, in the civilian sector, AI development has surged into new domains based on foundation models, such as OpenAI's Chat-GPT, categorized as Super-Giant AI or Hyperscale AI. The U.S. Department of Defense has organized Task Force Lima under the Chief Digital and AI Office (CDAO) to conduct research on the application of Large Language Models (LLM) and generative AI. Advanced military nations like China and Israel are also actively researching the integration of Super-Giant AI into their military capabilities. Consequently, there is a growing need for research within our military regarding the potential applications and fields of application for Super-Giant AI in weapon systems. In this paper, we compare the characteristics and pros and cons of specialized AI and Super-Giant AI (Foundation Models) and explore new application areas for Super-Giant AI in weapon systems. Anticipating future application areas and potential challenges, this research aims to provide insights into effectively integrating Super-Giant Artificial Intelligence into defense operations. It is expected to contribute to the development of military capabilities, policy formulation, and international security strategies in the era of advanced artificial intelligence.

Multilateral Approach to forming Air Logistics Hub on North East Asia Region (동북아 항공물류허브을 구축하기 위한 다자적 접근방안)

  • Hong, Seock-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • 제19권2호
    • /
    • pp.97-136
    • /
    • 2004
  • The Northeast Asian air cargo market has expanded tremendously as a result of the opening up of the Chinese market. The importance of the Asia-Pacific region in the global air transport has also increased. The exchange of human and material resources, services, and information in Northeast Asia, which is expected to increase in the near future, requires that the airlines operating within this region adopt a more liberalized approach. This paper introduced alternatives which can be applied to the Northeast Asian airlines industry so as to bring about the integration of regional air transport: First, this paper found a need for individual Northeast Asian nations to alter their policies towards the airlines industry. Second, each country should further liberalize their respective domestic air transport. Third, there is a need for freer air service agreements to be signed between the nations of Northeast Asia. Fourth, the strategic alliances between the airlines operating in Northeast Asia should be further strengthened. Fifth, this liberalization process should be carried out in an incremental manner, beginning with more competitive airports and routes, or with less-in-demand routes. Sixth, there is a need for a shuttle system to be put into place between the main airports in China, Korea, and Japan. Seventh, these three nations jointly develop aviation safety and security systems that are in accordance with international standards. Eighth, the liberalization process of the aviation industry should be undertaken in conjunction with other related fields. Ninth, organizations linking together civil aviation organization in the Asia-Pacific area should be formed, as should each government linking together. By doing so, these countries will be able to establish regular venues through which to exchange opinions on the integration and liberalization of the air cargo market so as to induce the gradual liberalization of the actual market. The liberalization of the air transport in Northeast Asia will prove to be a daunting task in the short term. However, if the Chinese airlines continue to exhibit continuous growth and Japanese airlines are able to complete their move towards a low-cost structure, this process could be completed earlier than expected. Over the last twenty five years the air transport has undergone tremendous changes. The most important factor behind these changes has been the increased liberalization of the market. As a result, rates have decreased while demand has increased. This has resulted in turning the air transport industry, which was long perceived as an industry in decline, into a high-growth industry. The only method of increasing regional exchanges in the air transport is to pursue further liberalization. The country which implements this liberalization process at the earliest date may very well emerge as a leading force within the air transport industry.

  • PDF

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • 제18권1호
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.

A Study on the Operation Plan of the Gangwon-do Disaster Management Resources Integrated Management Center (강원도 재난관리자원 통합관리센터 운영방안에 관한 연구)

  • Hang-Il Jo;Sang-Beom Park;Kye-Won Jun
    • Journal of Korean Society of Disaster and Security
    • /
    • 제17권1호
    • /
    • pp.9-16
    • /
    • 2024
  • In Korea, as disasters become larger and more complex, there is a trend of shifting from a focus on response and recovery to a focus on prevention and preparedness. In order to prevent and prepare for disasters, each local government manages disaster management resources by stockpiling them. However, although disaster management resources are stored in individual warehouses, they are managed by department rather than by warehouse, resulting in insufficient management of disaster management resources due to the heavy workload of those in charge. In order to intensively manage these disaster management resources, an integrated disaster management resource management center is established and managed at the metropolitan/provincial level. In the case of Gangwon-do, the subject of this study, a warehouse is rented and operated as an integrated disaster management resource management center. When leasing an integrated management center, there is the inconvenience of having to move the location every 1 to 2 years, so it is deemed necessary to build a dedicated facility in an available site. To select a location candidate, network analysis was used to measure access to and use of facilities along interconnected routes of networks such as roads and railways. During network analysis, the Location-Allocation method, which was widely used in the past to determine the location of multiple facilities, was applied. As a result, Hoengseong-gun in Gangwon-do was identified as a suitable candidate site. In addition, if the integrated management center uses our country's logistics system to stockpile disaster management resources, local governments can mobilize disaster management resources in 3 days, and it is said that it takes 3 days to return to normal life after a disaster occurs. Each city's disaster management resource stockpile is 3 days' worth per week, and the integrated management center stores 3 times the maximum of the city's 4-day stockpile.

Review of Family Planning / Health Integration Efforts and Evaluation Results in Korea (가족계획과 보건사업의 통합시도 및 평가결과)

  • Bang, Sook
    • Korea journal of population studies
    • /
    • 제10권2호
    • /
    • pp.58-81
    • /
    • 1987
  • The purpose of this study is to examine major factors that affect patterns of living arrangements of older Korean noncitizens in the United States using the 1990 8% Public Use Microdata Sample(PUMS). In order to do so, I analyzed the effects of four factors including acculturation(English proficiency and Age at migration), economic circumstances(Personal Income and Supplemental Security Income: SSI receipt), health status(Mobility and Personal care limitation), and the ethnic community. The results show that acculturation and economic circumstances play an important role in determining the patterns of living arrangements among older Korean aliens, whereas the health status and the ethnic community do not show consistent effects. Regardless of marital status, the impact of age at migration is positively associated with solitary living of older Korean noncitizens, though, the effect of English proficiency show the opposite direction in accordance with marital status. That is, among nonmarried elders, those who cannot speak English are more likely to live alone. The case is reverse for married elders. The impact of economic feasibility is also positively associated with independent living arrangements. Those who receive SSI are much more likely to live apart from family, and elders whose annual personal income between $5,001 and $10,000 have the greatest propensity of solitary living-a large proportion of their income source is SSI. Individuals who receive SSI are also qualified to collect Medicaid, food stamps, rent subsidies, and other welfare benefits. In a sense, the economic feasibility provided by welfare benefits is the key determinant of independent living of older Korean noncitizens. Therefore, the recent welfare reform which denies legal aliens welfare benefits such as SSI and food stamps will severly affect the present living arrangements of older Korean aliens, and give economic burden to their family member The findings also show that there are significant differences within the elderly Korean Americans in terms of demographics, income, fertility, health status, and patterns of living arrangements by U.S. citizenship status. In particular, after controlling for age at migration as a proxy for acculturation, there is a statistically significant variation in living arrangements between elderly Korean noncitizens and naturalized citizens. For both theoretical and methodological reasons, future research on minority aging needs to investigate the concept of U.S. citizenship status for its impact on patterns of living arrangements among the minority elderly.

  • PDF