• Title/Summary/Keyword: Vulnerable function

Search Result 235, Processing Time 0.025 seconds

A Study on the Efficient Operation of Automated Teller Machine(ATM) Maintenance Using Simulation (시뮬레이션을 이용한 금융 ATM기 유지보수의 효율적 운영에 관한 연구)

  • Yu, Hyeung-Keun;Lee, Kang-Won
    • Korean Management Science Review
    • /
    • v.28 no.1
    • /
    • pp.107-116
    • /
    • 2011
  • The automated teller machine (ATM) is developed as a system to provide customers with an easy deposit and withdrawal of their money without time restriction and be served for 24 hours. Today, ATM is come up to the level of an unmanned branch. The automatic financing system is developed as an essential one for dealing with the rationalization of management and the globalization of financing in order to improve the efficiency of financial management work and increase the customer service quality. With reducing the operational cost of financial organizations through the efficient maintenance operation of ATM and increasing the service quality through the maximization of its processing efficiency, this study is to draw the scheme to ensure the competitiveness among the finance companies. The importance of ATM is highly recognized as the utilization of ATM is increased and the processing function is extended, but ATM is quite vulnerable to the malfunction occurred during the nighttime after banking hours. The ATM maintenance is done through consignment to the specialized maintenance company. The efficient operation of ATM maintenance work is important to the satisfaction of customer using ATM in the nighttime.

A Review of Postpartum Depression: Focused on Psychoneuroimmunological Interaction (산후 우울의 고찰: 정신신경면역계 상호작용을 중심으로)

  • Kim, Yunmi;Ahn, Sukhee
    • Women's Health Nursing
    • /
    • v.21 no.2
    • /
    • pp.106-114
    • /
    • 2015
  • Purpose: The purpose of this review was to describe a psychoneuroimmunology (PNI) framework for postpartum depression (PPD) and discuss its implications for nursing research and practice for postpartum women. Methods: This study explored the role of hypothalamic-pituitary-adrenal (HPA) axis and inflammation as possible mediators of risk factors for PPD through literature review. Results: From this PNI view, human bodies are designed to respond with the reciprocal interactions among the neuro-endocrine and immune system when they are faced with physical or psychological stressors. Chronic stress induces alterations in the function of HPA axis, and a chronic low-grade inflammatory response is associated with depression. The dysfunctions of cytokines and HPA axis have been observed during the postpartum period. Stress promotes glucocorticoid receptor resistance, which can promote inflammatory responses. This, in turn, can contribute to the pathophysiology of depression. This can especially affect populations at vulnerable time-points, such as women in the postpartum. Conclusion: From a PNI perspective, well-designed prospective research evaluating the role of stress and inflammation as an etiology of PPD and the effect of stress reduction is warranted to prevent PPD.

How Vulnerable is Indonesia's Financial System Stability to External Shock?

  • Pranata, Nika;Nurzanah, Nurzanah
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.4 no.2
    • /
    • pp.5-17
    • /
    • 2017
  • The main objective of the study is to measure the vulnerability of Indonesia's financial system stability in response to external shocks, including from regional economies namely three biggest Indonesia major trading partners (China, the U.S and Japan) and other external factors (oil price and the federal funds rate). Using Autoregressive Distributed Lag (ARDL) model and Orthogonalized Impulse Response Function (OIRF) with quarterly data over the period Q4 2002 - Q1 2016, results confirm that, 1) oil price response has the largest effect to Indonesia financial stability system and the effect period is the longest compared to others, represented by NPL and IHSG; 2) among those three economies, only China's economic growth has significantly positive effect to Indonesia financial stability system. Based on the findings it is better for the authorities to: 1) Diversify international trade commodities by decreasing share of oil, gas, and mining export and boosting other potential sectors such as manufacture, and fisheries; 2) Ensure the survival of Indonesia large coal exporter companies without neglecting burden of national budget; and 3) Create buffer for demand shock from specific countries by diversifying and increasing share of trading from other countries particularly from ASEAN member states.

Intrusion Detection: Supervised Machine Learning

  • Fares, Ahmed H.;Sharawy, Mohamed I.;Zayed, Hala H.
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.305-313
    • /
    • 2011
  • Due to the expansion of high-speed Internet access, the need for secure and reliable networks has become more critical. The sophistication of network attacks, as well as their severity, has also increased recently. As such, more and more organizations are becoming vulnerable to attack. The aim of this research is to classify network attacks using neural networks (NN), which leads to a higher detection rate and a lower false alarm rate in a shorter time. This paper focuses on two classification types: a single class (normal, or attack), and a multi class (normal, DoS, PRB, R2L, U2R), where the category of attack is also detected by the NN. Extensive analysis is conducted in order to assess the translation of symbolic data, partitioning of the training data and the complexity of the architecture. This paper investigates two engines; the first engine is the back-propagation neural network intrusion detection system (BPNNIDS) and the second engine is the radial basis function neural network intrusion detection system (BPNNIDS). The two engines proposed in this paper are tested against traditional and other machine learning algorithms using a common dataset: the DARPA 98 KDD99 benchmark dataset from International Knowledge Discovery and Data Mining Tools. BPNNIDS shows a superior response compared to the other techniques reported in literature especially in terms of response time, detection rate and false positive rate.

PRODUCTION OF GROUND SUBSIDENCE SUSCEPTIBILITY MAP AT ABANDONED UNDERGROUND COAL MINE USING FUZZY LOGIC

  • Choi, Jong-Kuk;Kim, Ki-Dong
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.717-720
    • /
    • 2006
  • In this study, we predicted locations vulnerable to ground subsidence hazard using fuzzy logic and geographic information system (GIS). Test was carried out at an abandoned underground coal mine in Samcheok City, Korea. Estimation of relative ratings of eight major factors influencing subsidence and determination of effective fuzzy operators are presented. Eight major factors causing ground subsidence were extracted and constructed as a spatial database using the spatial analysis and the probability analysis functions. The eight factors include geology, slope, landuse, depth of mined tunnel, distance from mined tunnel, RMR, permeability, and depth of ground water. A frequency ratio model was applied to calculate relative rating of each factor, and the ratings were integrated using fuzzy membership function and five different fuzzy operators to produce a ground subsidence susceptibility map. The ground subsidence susceptibility map was verified by comparing it with the existing ground subsidences. The obtained susceptibility map well agreed with the actual ground subsidence areas. Especially, ${\gamma}-operator$ and algebraic product operator were the most effective among the tested fuzzy operators.

  • PDF

Reforming Property of Tile and Concrete Surface layer Using Self-cleaning Concrete Impregnant (Self-cleaning 침투성 함침제의 적용에 따른 타일 및 콘크리트 표층부의 개질특성)

  • Song, Hun;Jeon, Chan-Soo;Kim, Young-Ho
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.13 no.4
    • /
    • pp.61-68
    • /
    • 2013
  • Concrete structure is not the only material vulnerable to physical and chemical processes of deterioration associates with severe conditions. Deterioration of the concrete structure, however, occurs more progressively from the outside of the concrete exposed to severe conditions. Especially, Carbonation, chloride ion attack is more important factor of concrete durability. This study is interested in manufacturing the self-cleaning concrete surface impregnant including TEOS, lithium silicate for the repair of the exposed concrete surface and the color concrete requiring the advanced function in view of the concrete appearance. Form the results, TEOS and lithium silicate are very effective that increasing the concrete durability using self-cleaning concrete impregnant. Self-cleaning concrete impregnant specimens is satisfied with performance requirement of KS standard in adhesion test in tension but the reinforcement of concrete substrate is slight. So, the self-cleaning concrete impregnant of this study is more desirable for the improvement of durability rather than the reinforcement.

Design and Implementation of Automatic Control System in Room using Sensor (센서를 이용한 자동 실내 온도 제어시스템 설계 및 구현)

  • Jeong, Gyu-Tae;Lee, Eun-Jin;Kim, Heung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.326-328
    • /
    • 2015
  • Function of the window of the building is an environment of the room through the entry of solar radiation. It is vulnerable to significant energy conservation off the thermal efficiency. Also this summer, cooling costs are weighted because of excessive solar radiation. In this paper, we develop a windows automatic control system to use the indoor environmental information, such as home temperature, humidity, light intensity, solar radiation. The system collects the indoor environment information using a variety of sensor, using the collected information, and controls the motor to the system to control the window.

  • PDF

Improved Authentication Protocol for RFID/USN Environment (RFID/USN 환경을 위한 개선된 인증 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.1
    • /
    • pp.1-10
    • /
    • 2009
  • Recently, Shin and Park proposed an authentication protocol using the hash function and the XOR operation in RFID/USN environment. However, Shin and Park's proposed authentication protocol is vulnerable to spoofing attack and location tracking attack and tag key exposure attack, and it does not provide tag anonymity. In this paper, we propose an improved authentication protocol for the RFID/USN environment that can withstand those attacks. The proposed authentication protocol provides more improved secrecy and communication efficiency because it decreases the communication rounds compared with the Shin and Park's protocol.

Jammer Identification Technique based on a Template Matching Method

  • Jin, Mi Hyun;Yeo, Sang-Rae;Choi, Heon Ho;Park, Chansik;Lee, Sang Jeong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.3 no.2
    • /
    • pp.45-51
    • /
    • 2014
  • GNSS has the disadvantage of being vulnerable to jamming, and thus, the necessity of jamming countermeasure techniques has gradually increased. Jamming countermeasure techniques can be divided into an anti-jamming technique and a jammer localization technique. Depending on the type of a jammer, applicable techniques and performance vary significantly. Using an appropriate jamming countermeasure technique, the effect of jamming on a GNSS receiver can be attenuated, and prompt action is enabled when estimating the location of a jammer. However, if an inappropriate jamming countermeasure technique is used, a GNSS receiver may not operate in the worst case. Therefore, jammer identification is a technique that is essential for proper action. In this study, a technique that identifies a jammer based on template matching was proposed. For template matching, analysis of a received jamming signal is required; and the signal analysis was performed using a spectral correlation function. Based on a simulation, it was shown that the proposed identification of jamming signals was possible at various JNR.

Arabidopsis PYL8 Plays an Important Role for ABA Signaling and Drought Stress Responses

  • Lim, Chae Woo;Baek, Woonhee;Han, Sang-Wook;Lee, Sung Chul
    • The Plant Pathology Journal
    • /
    • v.29 no.4
    • /
    • pp.471-476
    • /
    • 2013
  • Plants are frequently exposed to numerous environmental stresses such as dehydration and high salinity, and have developed elaborate mechanisms to counteract the deleterious effects of stress. The phytohormone abscisic acid (ABA) plays a critical role as an integrator of plant responses to water-limited condition to activate ABA signal transduction pathway. Although perception of ABA has been suggested to be important, the function of each ABA receptor remains elusive in dehydration condition. Here, we show that ABA receptor, pyrabactin resistance-like protein 8 (PYL8), functions in dehydration conditions. Transgenic plants overexpressing PYL8 exhibited hypersensitive phenotype to ABA in seed germination, seedling growth and establishment. We found that hypersensitivity to ABA of transgenic plants results in high degrees of stomatal closure in response to ABA leading to low transpiration rates and ultimately more vulnerable to drought than the wild-type plants. In addition, high expression of ABA maker genes also contributes to altered drought tolerance phenotype. Overall, this work emphasizes the importance of ABA signaling by ABA receptor in stomata during defense response to drought stress.