• Title/Summary/Keyword: false description

Search Result 13, Processing Time 0.047 seconds

A Study on the Taxonomy and lsozymes of False Spider Mites (Acarina: Temwpalpidae) from Korea (한국산 애응애과 응애의 분류 및 동위효소에 관한 연구)

  • 이정상
    • The Korean Journal of Zoology
    • /
    • v.31 no.2
    • /
    • pp.147-155
    • /
    • 1988
  • Six species of false spider mites were collected and ciassifled in South Korea. Among them, a taxonomic description was carried out on the following four species new to Korea: 1. Aegyptobia nothus Pritchard and Baker, 2. Pentomerismus taxi (Hailer), 3. P. oregonensis McGregor, 4. Brevipalpus lewisi McGregor. And also esterase and alkaline phosphatase patterns obtained by polyacrylamide slab gel electrophoresis were compared on some spades. Esterase rymogram showed difference among species in band number and mobility.

  • PDF

A Study on the Computer­Aided Processing of Sentence­Logic Rule (문장논리규칙의 컴퓨터프로세싱을 위한 연구)

  • Kum, Kyo-young;Kim, Jeong-mi
    • Journal of Korean Philosophical Society
    • /
    • v.139
    • /
    • pp.1-21
    • /
    • 2016
  • To quickly and accurately grasp the consistency and the true/false of sentence description, we may require the help of a computer. It is thus necessary to research and quickly and accurately grasp the consistency and the true/false of sentence description by computer processing techniques. This requires research and planning for the whole study, namely a plan for the necessary tables and those of processing, and development of the table of the five logic rules. In future research, it will be necessary to create and develop the table of ten basic inference rules and the eleven kinds of derived inference rules, and it will be necessary to build a DB of those tables and the computer processing of sentence logic using server programming JSP and client programming JAVA over its foundation. In this paper we present the overall research plan in referring to the logic operation table, dividing the logic and inference rules, and preparing the listed process sequentially by dividing the combination of their use. These jobs are shown as a variable table and a symbol table, and in subsequent studies, will input a processing table and will perform the utilization of server programming JSP, client programming JAVA in the construction of subject/predicate part activated DB, and will prove the true/false of a sentence. In considering the table prepared in chapter 2 as a guide, chapter 3 shows the creation and development of the table of the five logic rules, i.e, The Rule of Double Negation, De Morgan's Rule, The Commutative Rule, The Associative Rule, and The Distributive Rule. These five logic rules are used in Propositional Calculus, Sentential Logic Calculus, and Statement Logic Calculus for sentence logic.

A Study on Hierarchical Distributed Intrusion Detection for Secure Home Networks Service (안전한 홈네트워크 서비스를 위한 계층적 분산 침입탐지에 관한 연구)

  • Yu, Jae-Hak;Choi, Sung-Back;Yang, Sung-Hyun;Park, Dai-Hee;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.49-57
    • /
    • 2008
  • In this paper, we propose a novel hierarchical distributed intrusion detection system, named HNHDIDS(Home Network Hierarchical Distributed Intrusion Detection System), which is not only based on the structure of distributed intrusion detection system, but also fully consider the environment of secure home networks service. The proposed system is hierarchically composed of the one-class support vector machine(support vector data description) and local agents, in which it is designed for optimizing for the environment of secure home networks service. We support our findings with computer experiments and analysis.

Host based Feature Description Method for Detecting APT Attack (APT 공격 탐지를 위한 호스트 기반 특징 표현 방법)

  • Moon, Daesung;Lee, Hansung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.839-850
    • /
    • 2014
  • As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal behavior, and then collected 8.7 million feature data set that are occurred during running both malware and normal executable file. Further, each process is represented as 83-dimensional vector that profiles the frequency of appearance of features. the vector also includes the frequency of features generated in the child processes of each process. Therefore, it is possible to represent the whole behavior information of the process while the process is running. In the experimental results which is applying C4.5 decision tree algorithm, we have confirmed 2.0% and 5.8% for the false positive and the false negative, respectively.

Improvement Plan for Material Safety Data Sheet Policy to Support the Realization of Chemical Regulation (화학물질 규제 현실화를 위한 물질안전보건자료 정책 개선방안)

  • Woo Sub Shim;Yoo Jin Ahn
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.33 no.3
    • /
    • pp.365-374
    • /
    • 2023
  • Objectives: After the MSDS submission and non-disclosure review system was introduced in January 2021, there were compliance difficulties in the field. Accordingly, for the establishment of the MSDS system, the government intends to investigate what has been improved and what urgently needs to be improved in the future, and to suggest detailed improvement plans. Methods: The background and problems of urgent difficulties in the field handling chemicals were investigated, and realistic improvement plans were derived through review of other laws related to the MSDS system and overseas cases. Results: In order to guarantee the safety of the public while at the same time promoting corporate R&D, it is necessary to alleviate the non-disclosure screening system for chemical substances for R&D, and to improve the irrationality of failing to implement the non-disclosure screening system due to information on unclassified substances being circulated. For this reason, it seems necessary to ease the requirement to submit all ingredients. In addition, it is necessary to strengthen punishment to raise awareness so that health problems do not occur due to the harmfulness and danger of hidden substances among workers who handle chemical substances and downstream users due to false descriptions in MSDS. Conclusions: All members of our society, including chemical manufacturers/importers and handling companies, academia, civil society, and the government, each subject of chemicals, should take an interest in the entire process from production to disposal of chemicals and work together to prevent harm to the public.

College Students' Understanding on the System of Separation between Proscribing and Dispensing (일부 대학생의 의약분업 정책에 대한 이해도)

  • 박종연;강혜영;김한중;윤지현
    • Health Policy and Management
    • /
    • v.11 no.3
    • /
    • pp.151-164
    • /
    • 2001
  • This study is to investigate the level of understanding of the separation of dispensing and prescribing health policy in Korea and its associated factors. A questionnaire survey was conducted upon a sample of college students responded from 540, response rate 77.1%, 4 months after the introduction of the policy. The understanding level was measured using 4 question items describing the goal and motivation of the policy, and 8 items describing its operational rules. For each item, respondents were asked to mark whether the description was true or false. While the goal and motivation of the policy was relatively well informed (mean understanding score: 69.6 out of 100), the students did not have good understanding of the operational details of the policy (mean score: 32.5). The results of regression analyses showed that personal interest and agreement with the need of the policy were the most significant factors affecting the understanding level. It is suggested that, for other health policies in the future, policy makers in Korea need to develop more effective media communication strategies to inform general public of the practical details of the policy.

  • PDF

Detection of Traffic Flooding Attacks using SVDD and SNMP MIB (SVDD와 SNMP MIB을 이용한 트래픽 폭주 공격의 탐지)

  • Yu, Jae-Hak;Park, Jun-Sang;Lee, Han-Sung;Kim, Myung-Sup;Park, Dai-Hee
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2008.06a
    • /
    • pp.124-127
    • /
    • 2008
  • DoS/DDoS로 대표되는 트래픽 폭주 공격은 대상 시스템뿐만 아니라 네트워크 대역폭, 프로세서 처리능력, 시스템 자원 등에 악영향을 줌으로써 네트워크에 심각한 장애를 유발할 수 있다. 따라서 신속한 트래픽 폭주 공격의 탐지는 안정적인 서비스 제공 및 시스템 운영에 필수요건이다. 전통적인 패킷 수집을 통한 DoS/DDoS의 탐지방법은 공격에 대한 상세한 분석은 가능하나 설치의 확장성 부족, 고가의 고성능 분석시스템의 요구, 신속한 탐지를 보장하지 못한다는 문제점을 갖고 있다. 본 논문에서는 15초 단위의 SNMP MIB 객체 정보를 바탕으로 SVDD(support vector data description)를 이용하여 보다 빠르고 정확한 침입탐지와 쉬운 확장성, 저비용탐지 및 정확한 공격유형별 분류를 가능케 하는 새로운 시스템을 설계 및 구현하였다. 실험을 통하여 만족스러운 침입 탐지율과 안전한 false negative rate, 공격유형별 분류율 수치 등을 확인함으로써 제안된 시스템의 성능을 검증하였다.

  • PDF

Traffic Flooding Attack Detection on SNMP MIB Using SVM (SVM을 이용한 SNMP MIB에서의 트래픽 폭주 공격 탐지)

  • Yu, Jae-Hak;Park, Jun-Sang;Lee, Han-Sung;Kim, Myung-Sup;Park, Dai-Hee
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.351-358
    • /
    • 2008
  • Recently, as network flooding attacks such as DoS/DDoS and Internet Worm have posed devastating threats to network services, rapid detection and proper response mechanisms are the major concern for secure and reliable network services. However, most of the current Intrusion Detection Systems(IDSs) focus on detail analysis of packet data, which results in late detection and a high system burden to cope with high-speed network environment. In this paper we propose a lightweight and fast detection mechanism for traffic flooding attacks. Firstly, we use SNMP MIB statistical data gathered from SNMP agents, instead of raw packet data from network links. Secondly, we use a machine learning approach based on a Support Vector Machine(SVM) for attack classification. Using MIB and SVM, we achieved fast detection with high accuracy, the minimization of the system burden, and extendibility for system deployment. The proposed mechanism is constructed in a hierarchical structure, which first distinguishes attack traffic from normal traffic and then determines the type of attacks in detail. Using MIB data sets collected from real experiments involving a DDoS attack, we validate the possibility of our approaches. It is shown that network attacks are detected with high efficiency, and classified with low false alarms.

The Processing of Spatial Joins using a Bit-map Approximation (비트맵 근사 표현을 이용한 효율적인 공간 조인)

  • 홍남희;김희수
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.2
    • /
    • pp.157-164
    • /
    • 2001
  • This paper studies on the processing of spatial joins. The spatial join operation is divided into filters and refinement steps in general. The processing of spatial joins can be greatly improved by the use of filters that reduce the polygons in order to find the intersecting ones. As a result, three possible sets of answers are identified: the positive one, the negative one and the inconclusive one. To identify all the interesting pairs of polygons with inconclusive answers, it is necessary to have access to the representation of polygons so that an exact geometry test can take place. We introduce a bit-map approximation technique to drastically reduce the computation required by the refinement step during refinement processing. Bit-map representation are used for the description of the internal, the external and the boundary regions of the polygon objects. The proposed scheme increases the chance of trivial acceptance and rejection of data objects, and reduces unnecessary disk accesses in query processing. It has been shown that the reference to the object data file can be cut down by as much as 60%.

  • PDF

Development of a Hierarchical HydroG-OneFlow Web Services of River GeoSpatial Information (하천공간정보의 계층적 HydroG-OneFlow 웹서비스 개발)

  • Shin, Hyung Jin;Hwang, Eui Ho;Chae, Hyo Sok;Hong, Sung Soo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.626-626
    • /
    • 2015
  • 본 연구에서는 하천공간정보의 웹서비스를 위해 SOAP(Simple Object Access Protocol) API 및 REST(Representation State Transfer) API로 제공하는 HydroG-OneFlow 웹서비스를 개발하였다. HydroG-OneFlow는 GML 기반의 서비스를 제공하며 GetBasin, GetGeoVariable 및 GetData 등의 기본서비스로 구성된다. GML은 GIS S/W의 벡터 GML 포맷과 공간정보 오픈플랫폼 서비스인 브이월드 데이터 API에서 제공하는 GML 포맷을 참고하여 하천공간 벡터정보를 제공할 수 있도록 GML을 구성하였다. GDM 공간 데이터에 대한 벡터정보 ML 수용 수준을 향상시킬 수 있도록 벡터구조의 점, 선, 면 정보에 대하여 GML의 PointPropertyType, CurvePropertyType, SurfacePropertyType을 도입하였다. 또한 일반적인 공간자료에서는 Multi 객체에 대한 지원도 필요하다. 현 GDM 데이터베이스에서도 OGC 표준의 MultiPoint, MultiLineString, MultiPolygon을 지원하고 있다. 이를 위하여 GML의 상응 요소인MultiPointPropertyType, MultiCurvePropertyType, MultiSurfacePropertyType을 하천공간정보 벡터 스키마에 도입하여 활용하였다. 클라이언트 서버 통신은 메시지 교환프로토콜인 SOAP을 사용하여 서버의 객체를 직접 호출하여 이루어진다. 서버는 서버의 제공 서비스를 WSDL(Web Service Description Language)를 통하여 게시하고 클라이언트는 이 기준(Criteria)을 참고하여 접근한다. GetData의 경우 Type(GRID or VECTOR), GDM(Geospatial Data Model) 여부(true or false), LayerName, BasinID, GenTime을 인자로 받아 GeoData에서 검색된 정보를 반환한다. SOAP버전은 1.1과 1.2를 지원하여 접근하는 클라이언트에서 선택할 수 있도록 개발하였다.

  • PDF