• 제목/요약/키워드: Sensitive data

검색결과 2,479건 처리시간 0.035초

Retrieval of emissivity and land surface temperature from MODIS

  • Suh Myoung-Seok;Kang Jeon-Ho;Kim So-Hee;Kwak Chong-Heum
    • Proceedings of the KSRS Conference
    • /
    • 대한원격탐사학회 2005년도 Proceedings of ISRS 2005
    • /
    • pp.165-168
    • /
    • 2005
  • In this study, emissivity and land surface temperature (LST) were retrieved using the previously developed algorithms and Aqua/MODIS data. And sensitivity of estimated emissivity and LST to the predefined values, such as land cover, normalized difference vegetation index (NOVI) and spectral emissivity were investigated. The methods used for emissivity and LST were vegetation cover method (VCM) and four different split-window algorithms. The spectral emissivity retrieved by VCM was not sensitive to the NOVI error but more sensitive to the land cover error. The comparison of LST showed that the LST was systematically different without regard to the land cover and season. And the LST was very sensitive to the emissivity error excepting the Uliveri et al. This preliminary result indicates that more works are needed for the retrieval of reliable LST from satellite data.

  • PDF

Methodology for Selection and Sensitivity Index of Socio-economic Resources for Marine Oil Spill Incidents (해양 유류유출 오염으로 인한 사회·경제적 민감자원 선정 및 지수화 방안)

  • Roh, Young-Hee;Kim, Choong-Ki
    • Journal of Environmental Impact Assessment
    • /
    • 제25권6호
    • /
    • pp.402-413
    • /
    • 2016
  • Marine oil spill accidents are occurring continuously due to the marine transportation of the oil. While building a preventive system for oil spill is uttermost necessary, we also need to have a systematic response system to handle the oil spills that inevitably occur. So far, studies have focused on the environmentally sensitive resources affected by oil spills. However, there is a need to conduct research to evaluate the damage to the socially and economically sensitive resources that make up the life of local residents. This study represents the process of building an analytical framework for the assessment of socioeconomic resources affected by marine oil spills. While it is important to provide a scheme for identification and indexation of socially and economically sensitive resources that is compatible with Korea's situations, using existing data for identifying socio-economically sensitive resources might also be meaningful. However, to allow accurate analysis for better evaluation, we need to select more applicable data among the various indicators. In this research, we have reviewed many existing case studies of sensitive resources, studies of the variables that have been used for indexing sensitive resources, and various factors considered in SIA (Social Impact Assessment). Based on the findings, we classify socio-economically sensitive resources into marine products acquisition, population, land usage, administrative area, and cultural heritage and tourist region.

Opportunistic Routing for Bandwidth-Sensitive Traffic in Wireless Networks with Lossy Links

  • Zhao, Peng;Yang, Xinyu
    • Journal of Communications and Networks
    • /
    • 제18권5호
    • /
    • pp.806-817
    • /
    • 2016
  • Opportunistic routing (OR) has been proposed as a viable approach to improve the performance of wireless multihop networks with lossy links. However, the exponential growth of the bandwidth-sensitive mobile traffic (e.g., mobile video streaming and online gaming) poses a great challenge to the performance of OR in term of bandwidth guarantee. To solve this problem, a novel mechanism is proposed to opportunistically forwarding data packets and provide bandwidth guarantee for the bandwidth-sensitive traffic. The proposal exploits the broadcast characteristic of wireless transmission and reduces the negative effect of wireless lossy links. First, the expected available bandwidth (EAB) and the expected transmission cost (ETC) under OR are estimated based on the local available bandwidth, link delivery probability, forwarding candidates, and prioritization policy. Then, the policies for determining and prioritizing the forwarding candidates is devised by considering the bandwidth and transmission cost. Finally, bandwidth-aware routing algorithm is proposed to opportunistically delivery data packets; meanwhile, admission control is applied to admit or reject traffic flows for bandwidth guarantee. Extensive simulation results show that our proposal consistently outperforms other existing opportunistic routing schemes in providing performance guarantee.

A Dynamic Locality Sensitive Hashing Algorithm for Efficient Security Applications

  • Mohammad Y. Khanafseh;Ola M. Surakhi
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.79-88
    • /
    • 2024
  • The information retrieval domain deals with the retrieval of unstructured data such as text documents. Searching documents is a main component of the modern information retrieval system. Locality Sensitive Hashing (LSH) is one of the most popular methods used in searching for documents in a high-dimensional space. The main benefit of LSH is its theoretical guarantee of query accuracy in a multi-dimensional space. More enhancement can be achieved to LSH by adding a bit to its steps. In this paper, a new Dynamic Locality Sensitive Hashing (DLSH) algorithm is proposed as an improved version of the LSH algorithm, which relies on employing the hierarchal selection of LSH parameters (number of bands, number of shingles, and number of permutation lists) based on the similarity achieved by the algorithm to optimize searching accuracy and increasing its score. Using several tampered file structures, the technique was applied, and the performance is evaluated. In some circumstances, the accuracy of matching with DLSH exceeds 95% with the optimal parameter value selected for the number of bands, the number of shingles, and the number of permutations lists of the DLSH algorithm. The result makes DLSH algorithm suitable to be applied in many critical applications that depend on accurate searching such as forensics technology.

A New Filtering System against the Disclosure of Sensitive Internal Information (내부 중요정보 유출 방지를 위한 차단 시스템 개발)

  • Ju, Tae-kyung;Shin, Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제19권5호
    • /
    • pp.1137-1143
    • /
    • 2015
  • Sensitive internal information has been transmitted in a variety of services of Internet environment, but almost users do not know what internal information is sent. In this paper, we intend to develop a new filtering system that continuously monitors the sensitive information in outbound network packets and notifies the internal user whether or not to expose. So we design a filtering system for sensitive information and analyze the implementation results. Thus users visually can check whether disclosure of the important information and drop the corresponding packets by the proposed system. The results of this study can help decrease cyber threats various targeting internal information of company by contributing to prevent exposure of sensitive internal information.

Multi-classification Sensitive Image Detection Method Based on Lightweight Convolutional Neural Network

  • Yueheng Mao;Bin Song;Zhiyong Zhang;Wenhou Yang;Yu Lan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권5호
    • /
    • pp.1433-1449
    • /
    • 2023
  • In recent years, the rapid development of social networks has led to a rapid increase in the amount of information available on the Internet, which contains a large amount of sensitive information related to pornography, politics, and terrorism. In the aspect of sensitive image detection, the existing machine learning algorithms are confronted with problems such as large model size, long training time, and slow detection speed when auditing and supervising. In order to detect sensitive images more accurately and quickly, this paper proposes a multiclassification sensitive image detection method based on lightweight Convolutional Neural Network. On the basis of the EfficientNet model, this method combines the Ghost Module idea of the GhostNet model and adds the SE channel attention mechanism in the Ghost Module for feature extraction training. The experimental results on the sensitive image data set constructed in this paper show that the accuracy of the proposed method in sensitive information detection is 94.46% higher than that of the similar methods. Then, the model is pruned through an ablation experiment, and the activation function is replaced by Hard-Swish, which reduces the parameters of the original model by 54.67%. Under the condition of ensuring accuracy, the detection time of a single image is reduced from 8.88ms to 6.37ms. The results of the experiment demonstrate that the method put forward has successfully enhanced the precision of identifying multi-class sensitive images, significantly decreased the number of parameters in the model, and achieved higher accuracy than comparable algorithms while using a more lightweight model design.

QoS-Sensitive Admission Policy for Non-Real Time Data Packets in Voice/Data CDMA Systems (음성/데이터 CDMA 시스템에서의 서비스 품질을 고려한 비 실시간 데이터 패킷 전송 제어 정책)

  • Seungjae Bahng;Insoo Koo;Jeongrok Yang;Kim, Kiseon
    • Proceedings of the IEEK Conference
    • /
    • 대한전자공학회 1999년도 추계종합학술대회 논문집
    • /
    • pp.125-128
    • /
    • 1999
  • In this paper, we propose a QoS-sensitive admission threshold method for the transmission of the non-real tine data packet such that the quality of services for both voice and data traffics are maintained to a required level. By detecting the active voice traffic during the current time slot, the non-real-time data packets are transmitted up to an admission threshold level during the next time slot. We found out that the optimum admission threshold is four voice traffic resources lower from the maximum allowable threshold to maintain the outage probability within 1% when the connected voice users are 15.

  • PDF

Sensitive Sectors in Free Trade Agreements

  • Deardorff, Alan V.
    • East Asian Economic Review
    • /
    • 제22권4호
    • /
    • pp.403-425
    • /
    • 2018
  • This paper documents the presence of "sensitive sectors" in Free Trade Agreements, defined as sectors for which the within-FTA tariffs remain positive. The paper includes some brief theoretical discussion of the welfare implications of these, but the main emphasis is on reporting two measures of this phenomenon for countries in FTAs that entered into force between 1994 and 2003. One measure is the percentage of tariff lines that remain dutiable, and the second is the change, from before the FTA to after, in the average maximum (across 6-digit products) positive tariffs. Both measures are derived from data in the UNCTAD TRAINS database, and are then related to measures of country characteristics that might explain them. Low per capita GDP countries tend to have larger fractions of dutiable tariff lines, while higher income countries tend to post larger increases in average maximum positive tariffs. Both suggest that the favored treatment of sensitive sectors is undermining the potential gains from trade that FTAs could provide.

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

Survival Outcomes of Recurrent Epithelial Ovarian Cancer: Experience from a Thailand Northern Tertiary Care Center

  • Jansaka, Natpat;Suprasert, Prapaporn
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제15권24호
    • /
    • pp.10837-10840
    • /
    • 2015
  • To assess survival outcomes in a retrospective study, recurrent epithelial ovarian cancer patients were divided into three groups according to the platinum free interval as follows: platinum refractory that included the patients with tumor progression during treatment; platinum resistant and platinum sensitive that included the patients with tumor progression less than or more than six months, respectively. Clinical data for tumor progression in epithelial ovarian cancer patients treated at Chiang Mai University Hospital between January, 2006 and December, 2010 were reviewed. Thirty-nine patients were in the platinum refractory group while 27 were in the platinum resistant group and 75 in the platinum sensitive group. The mean age, the parity, the administration of neoadjuvant chemotherapy and the serous type did not significantly different across groups while the mean total number of chemotherapy regimens, the early stage patients, the patients with complete surgery and the surviving patients were significant more frequent in the platinum sensitive group. Regarding subsequent treatment after tumor recurrence, 87.2% underwent chemotherapy. With the median follow up time at 29 months, the median overall survival rates were 20 months, 14 months and 42 months in platinum refractory, platinum resistant and platinum sensitive groups, respectively (p<0.001). In addition, when the platinum sensitive patients developed the next episode of tumor progression, the median progression free interval time was only three to four months. In conclusion, the outcomes for platinum refractory the and platinum resistant groups was poorer than the platinum sensitive group. However, subsequent progression in the platinum sensitive group was also associated with a poor outcome.