• Title/Summary/Keyword: Service block

Search Result 440, Processing Time 0.021 seconds

A Growth and Yield Model for Predicting Both Forest Stumpage and Mill Side Manufactured Product Yields and Economics

  • Schultz Emily B.;Matney Thomas G.
    • Proceedings of the Korea Technical Association of the Pulp and Paper Industry Conference
    • /
    • 2006.06b
    • /
    • pp.305-309
    • /
    • 2006
  • This paper presents and illustrates the application of a growth and yield model that supports both forest and mill side volume and value estimates. Traditional forest stand growth and yield models represent the forest landowner view of yield and economics. Predicted yields are estimates of what one would expect from a procurement cruise, and current stumpage prices are applied to investigate optimum management strategies. Optimum management regimes and rotation ages obtained from the forest side view are unlikely to be economically optimal when viewed from the mill side. The actual distribution of recoverable manufactured product and its value are highly dependent on mill technologies and configurations. Overcoming this limitation of growth and yield computer models necessitates the ability to predict and price the expected manufactured distribution of lumber, lineal meters of veneer, and tonnes of air dried pulp fiber yield. With these embedded models, users of the yield simulator can evaluate the economics of possible/feasible management regimes from both the forest and mill business sides. The simulator is a forest side model that has been modified to produce estimates of manufactured product yields by embedding models for 1) pulpwood chip size class distribution and pulp yield for any kappa number (Schultz and Matney, 2002), 2) a lumber yield and pricing model based on the Best Opening Face model developed by the USDA Forest Service Forest Products Laboratory (Lewis, 1985a and Lewis, 1985b), and 3) a lineal meter veneer model derived from peeler block tests. While the model is strictly applicable to planted loblolly pine (Pinus taeda L.) on cutover site-prepared land in the United States (US) Gulf South, the model and computer program are adaptable to any region and forest type.

  • PDF

A Study on Maturity Model for the Assessment of Cyber Resilience Level in the Defence Information System (국방정보시스템 사이버복원력 수준 평가를 위한 성숙도모델에 관한 연구)

  • Choi, Jae-hyeok;Kim, Wan-ju;Lim, Jae-sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1153-1165
    • /
    • 2019
  • Recently, threats of hacking have been increasing on the national intelligence service network and key infrastructure, including the defense field. The defense information system responds to threats from the outside through the network separation, but if the defense information system is hacked, it has a serious impact on the operations of wartime or peacetime military forces. Today, cyberattacks and threats are rising to unpredictable levels and making it practically impossible to completely block and prevent hacking threats completly. So, in this study proposed a maturity model to assess the level of cyber-resilience, which is the ability to ensure the system's viability and maintain continuity through rapid response and recovery if signs of cyberattacks by the defense information system are expected or occurred. The proposed maturity model is expected to contribute to improving the cyber security level of the defense information system by assessing the level of cyber resilience of the defense information system and identifying and supplementing fields that are lacking.

Dynamic Rank Subsetting with Data Compression

  • Hong, Seokin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.1-9
    • /
    • 2020
  • In this paper, we propose Dynamic Rank Subsetting (DRAS) technique that enhances the energy-efficiency and the performance of memory system through the data compression. The goal of this technique is to enable a partial chip access by storing data in a compressed format within a subset of DRAM chips. To this end, a memory rank is dynamically configured to two independent sub-ranks. When writing a data block, it is compressed with a data compression algorithm and stored in one of the two sub-ranks. To service a memory request for the compressed data, only a sub-rank is accessed, whereas, for a memory request for the uncompressed data, two sub-ranks are accessed as done in the conventional memory systems. Since DRAS technique requires minimal hardware modification, it can be used in the conventional memory systems with low hardware overheads. Through experimental evaluation with a memory simulator, we show that the proposed technique improves the performance of the memory system by 12% on average and reduces the power consumption of memory system by 24% on average.

An Enhancement Scheme of Dynamic Analysis for Evasive Android Malware (분석 회피 기능을 갖는 안드로이드 악성코드 동적 분석 기능 향상 기법)

  • Ahn, Jinung;Yoon, Hongsun;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.519-529
    • /
    • 2019
  • Nowadays, intelligent Android malware applies anti-analysis techniques to hide malicious behaviors and make it difficult for anti-virus vendors to detect its presence. Malware can use background components to hide harmful operations, use activity-alias to get around with automation script, or wipe the logcat to avoid forensics. During our study, several static analysis tools can not extract these hidden components like main activity, and dynamic analysis tools also have problem with code coverage due to partial execution of android malware. In this paper, we design and implement a system to analyze intelligent malware that uses anti-analysis techniques to improve detection rate of evasive malware. It extracts the hidden components of malware, runs background components like service, and generates all the intent events defined in the app. We also implemented a real-time logging system that uses modified logcat to block deleting logs from malware. As a result, we improve detection rate from 70.9% to 89.6% comparing other container based dynamic analysis platform with proposed system.

Propensity score matching analysis on inpatient period differences of hemorrhagic stroke survivors depending on medical insurance coverage

  • Kim, Sang-Mi;Kim, Young;Lee, Seong-A
    • Physical Therapy Rehabilitation Science
    • /
    • v.8 no.2
    • /
    • pp.67-73
    • /
    • 2019
  • Objective: The purpose of this study was to compare the differences in the length of hospital stay between hemorrhage stroke survivors with health insurance and those with medical care after controlling all factors except for the type of medical insurance by using the propensity score matching (PSM) method. Design: Retrospective cohort study. Methods: Data from the Korean National Centers for Disease Control and Prevention's In-Depth Discharge Injury Survey between the years 2006 and 2012 were used for analysis. A total of 4,538 cases were defined as persons with hemorrhagic stroke (I60-I62) based on the block of categories in the International Classification of Diseases (10th). In order to analyze the inpatient period differences depending on the type of health care, which reflects one's socio-economic level, the chi-square and t-test was conducted. Results: Frequency and percentage were presented, and regression analysis was used to determine the factors affecting the inpatient period. Age, severity of disease, treatment outcome, and post-discharge status were no longer statistically significant after matching. The inpatient period of the persons receiving medical aid benefits was found to be significantly longer than those with national health insurance (p<0.05). Conclusions: The factors influencing the inpatient period of hemorrhagic stroke survivors were treatment outcomes, severity of disease, hospital admission process, and the type of health care. It is necessary for systematic and comprehensive governmental management for persons with hemorrhagic stroke to be transferred to long-term care facilities.

Development and Application of Tumblr's API Permalink Automatic Extractor - Focusing on the Prevention of Secondary Damage in the Unauthorized Video - (텀블러의 API 퍼머링크(Permalink) 자동추출기 개발 및 활용방안 - 비동의 영상물 2차 피해방지 방안을 중심으로 -)

  • Oh, Wan Gyun;Jeong, Dae Yong
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.71-82
    • /
    • 2018
  • Using small cameras such as smartphones, criminals shoot secretly in public restrooms and women's changing rooms. And Revenge porn is also increasing. As a result social damage is increasing. Tumblr is an overseas service and it is very difficult to work with Tumbler on international legal cooperation and deletions. Thus In order to block the distribution of videos, victims must find and report the video URL themselves. But it's hard for victims who lack IT expertise to proceed those procedure. In this study, we automatically collect the URL of stored information and hash values of the images from API permlink of Tumbler blog. It is then saved as a document file with and presented to the victim. Through these technical methods, we can help victims report violations easily and quickly.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

The Blockchain based Undeniable Multi-Signature Scheme for Protection of Multiple Authorship on Wisdom Contents (지혜콘텐츠 공동저작권 보호에 적합한 블록체인 기반 부인봉쇄 다중서명 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.2
    • /
    • pp.7-12
    • /
    • 2021
  • Wisdom Contents are created with experiences and ideas of multiple authors, and consumed in Internet based Social Network Services that are not subjected to regional restrictions. Existing copyright management systems are designed for the protection of professional authors' rights, and effective in domestic area. On the contrary, the blockchain protocol is subjected to the service and the block is added by the consensus of participating nodes. If the data is stored to the blockchain, it cannot be modified or deleted. In this paper, we propose the blockchain based undeniable multi-signature scheme for the protection of multiple authorship on Wizdom Contents. The proposed scheme is consisted of co-authors' common public key generation, multi-signature generation and verification protocols. In the undeniable signature scheme, the signature cannot be verified without help of the signer. The proposed scheme is best suited to the contents purchase protocol. All co-authors cannot deny the fairness of the automated profit distribution through the verification of multiple authorship on Wizdom Contents.

Voice Assistant for Visually Impaired People (시각장애인을 위한 음성 도우미 장치)

  • Chae, Jun-Gy;Jang, Ji-Woo;Kim, Dong-Wan;Jung, Su-Jin;Lee, Ik Hyun
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.4
    • /
    • pp.131-136
    • /
    • 2019
  • People with compromised visual ability suffer from many inconveniences in daily life, such as distinguishing colors, identifying currency notes and realizing the atmospheric temperature. Therefore, to assist the visually impaired people, we propose a system by utilizing optical and infrared cameras. In the proposed system, an optical camera is used to collect features related to colors and currency notes while an infrared camera is utilized to get temperature information. The user is enabled to select the desired service by pushing the button and the appreciate voice information are provided through the speaker. The device can distinguish 16 kinds of colors, four different currency notes, and temperature information in four steps and the current accuracy is around 90%. It can be improved further through block-wise input image, machine learning, and a higher version of the infrared camera. In addition, it will be attached to the stick for easy carrying and to use it more conveniently.

Long-Term Monitoring of the Barrier Effect of the Wild Boar Fence

  • Lim, Sang Jin;Kwon, Ji Hyun;Namgung, Hun;Park, Joong Yeol;Kim, Eui Kyeong;Park, Yung Chul
    • Journal of Forest and Environmental Science
    • /
    • v.38 no.2
    • /
    • pp.128-132
    • /
    • 2022
  • Wild boars (Sus scrofa) not only cause crop damage and human casualties, but also facilitate the spread of many infectious diseases in domestic animals and humans. To determine the efficiency of a fencing system in blocking the movement of wild boars, long-term monitoring was performed in a fenced area in Bukhansan National Park using camera traps. Upon monitoring for a period of 46 months, there was a 72.6% reduction in the number of wild boar appearances in the fence-enclosed area, compared to that in the unenclosed area. For 20 months after the fence installation, the blocking effect of the fence was effective enough to reduce the appearance of wild boars by 92.6% in the fence-enclosed area, compared to that in the unenclosed area. The blocking effect of the fence remained effective for 20 months after its installation, after which its effectiveness decreased. Maintaining a fence for a long time is likely to lead to habitat fragmentation. It can also block the movement of other wild animals, including the endangered species - the long-tailed goral. This study suggests a 20-month retention period for the fences installed to inhibit the movement of wild boars in wide forests such as Gangwon-do in South Korea. To identify how long the blocking effect of the fences lasts, further studies are needed focusing on the length and height of the fence, and the conditions of the ground surface.