• Title/Summary/Keyword: Threat Factor

Search Result 181, Processing Time 0.022 seconds

Validation of OpenDrift-Based Drifter Trajectory Prediction Technique for Maritime Search and Rescue

  • Ji-Chang Kim;Dae, Hun, Yu;Jung-eun Sim;Young-Tae Son;Ki-Young Bang;Sungwon Shin
    • Journal of Ocean Engineering and Technology
    • /
    • v.37 no.4
    • /
    • pp.145-157
    • /
    • 2023
  • Due to a recent increase in maritime activities in South Korea, the frequency of maritime distress is escalating and poses a significant threat to lives and property. The aim of this study was to validate a drift trajectory prediction technique to help mitigate the damages caused by maritime distress incidents. In this study, OpenDrift was verified using satellite drifter data from the Korea Hydrographic and Oceanographic Agency. OpenDrift is a Monte-Carlo-based Lagrangian trajectory modeling framework that allows for considering leeway, an important factor in predicting the movement of floating marine objects. The simulation results showed no significant differences in the performance of drift trajectory prediction when considering leeway using four evaluation methods (normalized cumulative Lagrangian separation, root mean squared error, mean absolute error, and Euclidean distance). However, leeway improved the performance in an analysis of location prediction conformance for maritime search and rescue operations. Therefore, the findings of this study suggest that it is important to consider leeway in drift trajectory prediction for effective maritime search and rescue operations. The results could help with future research on drift trajectory prediction of various floating objects, including marine debris, satellite drifters, and sea ice.

Factors Influencing Participation in Barter Trade by Rural Farming Households in Ondo State, Nigeria

  • Adejobi, A.O.;Sanusi, O.G.;Mafimisebi, T.E.
    • The Journal of Economics, Marketing and Management
    • /
    • v.3 no.4
    • /
    • pp.5-11
    • /
    • 2015
  • The study examined the socio-economic factors influencing the participation of rural farming households in barter trade in Ondo State, Nigeria. The objectives were to compare the socio-economic characteristics of the participants and non-participants in barter trade, analyze the preference for barter trade and identify the constraints to it. Also, the factors affecting respondents' participation in barter trade were identified. Empirical results indicated that there were significant differences in the socio-economic characteristics of the participants and non-participants in barter trade. The SWOT analysis showed that possession of agrarian attributes by the locality where the trade is practiced was the strongest factor ensuring the survival of barter in the study area. Double coincidence of wants was found to be the most prevailing weakness associated with barter while the major reason for participation by some households was that the quantity of commodities received is usually higher compared with cash transactions. Transportation cost to barter markets was found to be the greatest threat to the continued existence of barter trade in the area. The results of the Probit model showed that age, household size, transportation cost to cash markets, farm size, distance to barter markets, and formal education significantly affected the probability participating in barter trade.

A Case Study on the Marketing Strategy for a Take-Out Specialty Store through Analysis of Customer Informations (소비자 정보 분석을 통한 Take-out 전문점의 마케팅 전략 사례연구)

  • Lee, So-Jung;Shin, Seo-Young;Yang, Il-Sun;Lee, Myung-Kang
    • Journal of the Korean Society of Food Culture
    • /
    • v.21 no.2
    • /
    • pp.131-141
    • /
    • 2006
  • The purpose of this research is to develop the management strategy for a take-out specialty sore on the basis of SWOT analysis which requires analysis of internal and external environmental informations. The survey was performed in order to gather the internal and external customer informations for a take-out specialty store. The questionnaires developed were distributed to customers (N=188) and employees (N=23) at 5 take-out specialty store branches from April 25, 2002 to April 29, 2002. The statistical data analysis was completed by SPSS WIN 10.0 for descriptive analysis, factor nalaysis, and Pearson's correlation. IPA(Importance-Performance Analysis) was applied in order to identify the critical management issues which would be explained with the organization's weakness or strength. SWOT analysis was performed through identifying the organizational strength and weakness as internal environment factors and external environmental opportunity and threat as uncontrollable external factors.

Cyber Security Considerations and Countermeasures for UAM Air Traffic Management Infrastructure (UAM 항공교통관리 인프라의 사이버보안 고려사항 및 대응방안)

  • Kyungwook Kim
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.6
    • /
    • pp.17-29
    • /
    • 2023
  • In this paper, we aim to propose cyber security considerations and countermeasures for infrastructure and services in the UAM(Urban Air Mobility) Air Traffic Management field, which is one of the key elements of the UAM market that has not yet bloomed. Air traffic management is an important factor for safe navigation and social acceptance of UAM. In order to realize air traffic management, infrastructure and services based on solid network connectivity must be established. And for industries where connectivity is the core component, it can become an infiltration route for cyber threats. Therefore, cyber security is essential for the infrastructure and services. In detail, we will look into the definition of the existing air traffic management field and the cyber threats. In addition, we intend to identify cyber security threat scenarios that may occur in the newly designed UAM air traffic management infrastructure. Moreover, in order to study the cyber security countermeasures of the UAM air traffic management infrastructure, there will be analysis of the UAM operation concept. As a result, countermeasures applicable to the infrastructure and service fields will be suggested by referring to the cyber security frameworks.

Is ChatGPT an Ally or an Enemy? Its Impact on Society Based on a Systematic Literature Review

  • Juliana Basulo-Ribeiro;Leonor Teixeira
    • Journal of Information Science Theory and Practice
    • /
    • v.12 no.2
    • /
    • pp.79-95
    • /
    • 2024
  • The new AI based conversational chatbot, ChatGPT, launched in November 2022, is causing a stir. There are many opinions about this being a 'threat or a promise,' and thus it is important to understand what has been said about this tool and, based on the growing literature that has emerged on the subject, demystify its effective impact on society. To analyse this impact, a systematic literature review with the support of the preferred reporting items for systematic reviews and meta-analysis protocol was used. The data, scientific documents, were collected using the main scientific databases - SCOPUS and Web of Science - and the results were presented based on a bibliometric and thematic exploration of content. The main findings indicate that people are increasingly using this chatbot in more diverse areas. Therefore, this study contributes at the practical level, aiming to enlighten people in general - both in professional and personal life - about this tool and its impacts. Also, it contributes at the theoretical level, which involves expanding understanding and elucidation of the impacts of ChatGPT in different areas of study.

Improvement Factors for Reinforced Concrete Firm against Removing the restriction of Construction Market Activation (겸업제한 폐지에 따른 철근콘크리트 전문건설업체의 발전요인)

  • Park, Jeong-Ho;Jun, Hun-Bai;Cho, Kyu-Man;Hong, Tae-Hoon;Koo, Kyo-Jin;Hyun, Chang-Taek
    • Korean Journal of Construction Engineering and Management
    • /
    • v.9 no.1
    • /
    • pp.118-125
    • /
    • 2008
  • Recently, the Ministry of Construction and Transportation announced a notice of the legislation related to remove the restriction of construction market activation in advance. he removement is an overwhelming change of the business structure in the Korean construction industry and has a far-reaching influence on general and trade contractors. The purpose of this research was to suggest improvement factors to survive an excessive competition in reinforced concrete market. This research did SWOT analysis to examine the strength, weakness, opportunity and threat of reinforced concrete firm, and established business strategies. The factor analysis was also applied with questionnaire survey to staff in charge of reinforced concrete company. It is expected that the suggested improvement factors can give effective business strategies to reinforced concrete firm. Furthermore, trade contractors having difficulty in a bottleneck in management can get help from the result of this research.

Sucess Factor of 3D Movie "Avatar" and the Possibility Analysis of the Korean 3D Contents (아바타 3D영화의 성공요인과 한국형 3D 콘텐츠의 가능성 분석)

  • Cho, Byung-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.137-145
    • /
    • 2010
  • Many research works are actively being done due to the 3D contents production technology for global competition through the world. In korea, many experts have taken notice of high quality 3D movies produced by Hollywood. Recently, 3D movie "Avatar" advanced 3D computer graphics based digital production technology is heavily influencing the contents industry in global market. Therefore, In this paper, the success factor of "Avatar"has to be analyzed. Also, the analysis of 3D contents production environment of the domestic and Hollywood is performed. Based on that, we analyzed the factors of threat and opportunity of the Korean 3D contents. Also, Based on the statistical data analysis of the korean film commission, favorable reactions of the korean movie and the government's powerful policy direction, we proposed the successful possibility of the korean 3D contents.

An Empirical Assessment of the Strategic Roles of e-Learning Center in the Community of Local Universities (지역 대학 e-Learning 센터의 전략적 역할분석에 관한 연구)

  • Jeong Dae-Yul;Kim Kwon-Su
    • The Journal of Information Systems
    • /
    • v.14 no.2
    • /
    • pp.75-99
    • /
    • 2005
  • Today, many universities are confronted with the changing education paradigm such as e-learning, Distance Education, Virtual University, This IT-based teaming paradigm shift is certainly a new opportunity or a threat to our universities. To overcome this problem the universities should think e-Learning as strategic weapon, such as many firms created competitive weapons from the information systems at the 1980s. So, e-Learning system can be a SIS(Strategic Information System) which supports university's future education strategies. To build a e-Learning system, not only many H/W and S/W resources but also expert personnels are required. An organization such as local university who is week at financial status can't himself plan the system. The Local University Community e-Learning Centers that support the demand of e-learning for their community are recommended. In order to operate these centers efficiently, the strategic roles of the e-Learning center should first be defined. To define the strategic roles, We classified the strategic roles of the e-Learning center into four dimensions, (1) to improve management efficiency, (2) to enhance educational service, (3) to acquire competitive advantages, (4) to build new education infrastructure, and each dimension has 5 or 6 measurement items. As result, to enhance the educational service was considered as the most significant factor among the four dimensions of strategic roles, and the infrastructure building was the next. We also tried to find the difference for each factor by the characteristics of responsor. The data showed that there was litter difference between the groups in evaluating the significance of strategic roles of e-learning centers. Through the strategic roles definition and analysis of expected role ratings, we could have recommended the direction and operation policies of the e-Loaming centers.

  • PDF

A Study on the Transmitter Design for Transmitting Output Power Enhancement of Active Magnetic Sensor (능동형 자기센서의 송신출력 향상을 위한 송신기 설계에 관한 연구)

  • Chung, Hyun-Ju;Yang, Chang-Seob;Jeon, Jae-Jin
    • Journal of the Korean Magnetics Society
    • /
    • v.23 no.5
    • /
    • pp.159-165
    • /
    • 2013
  • A active magnetic sensor has been widely used in the underwater guided weapon system because it is able to detect a target accurately in close range, but the target doesn't have any good countermeasure to overcome the threat from the active magnetic sensor. Recently, in order to increase the damage area of target by shock wave with explosion of the underwater weapon system and to detect small target, the maximum target detection range of the active magnetic sensor needs to be increased. One method for improving maximum target detection range is to improve output power from transmitter through demagnetization factor minimization of a transmitting core. Thus, in this paper, we describe the study results on the transmitter core shape design to enhance output power of the active magnetic sensor.

A Study on Prediction of Mass SQL Injection Worm Propagation Using The Markov Chain (마코브 체인을 이용한 Mass SQL Injection 웜 확산 예측에 관한 연구)

  • Park, Won-Hyung;Kim, Young-Jin;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.173-181
    • /
    • 2008
  • Recently, Worm epidemic models have been developed in response to the cyber threats posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical model techniques such as Epidemic(SI), KM (Kermack-MeKendrick), Two-Factor and AAWP(Analytical Active Worm Propagation). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the network such as CodeRed worm and it was able to be applied to the specified threats. Therefore, we propose the probabilistic of worm propagation based on the Markov Chain, which can be applied to cyber threats such as Mass SQL Injection worm. Using the proposed method in this paper, we can predict the occurrence probability and occurrence frequency for each threats in the entire system.

  • PDF