• Title/Summary/Keyword: preemptive-response

Search Result 74, Processing Time 0.028 seconds

A Study on the Trend Analysis Based on Personal Information Threats Using Text Mining (텍스트 마이닝을 활용한 개인정보 위협기반의 트렌드 분석 연구)

  • Kim, Young-Hee;Lee, Taek-Hyun;Kim, Jong-Myoung;Park, Won-Hyung;Koo, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • For that reason, trend research has been actively conducted to identify and analyze the key topics in large amounts of data and information. Also personal information protection field is increasing activities in order to identify prospects and trends in advance for preemptive response. However, only research based on technology such as trends in information security field and personal information protection solution is broadly taking place. In this study, threat-based trends in personal information protection field is analyzed through text mining method. This will be the key to deduct undiscovered issues and provide visibility of current and future trends. Policy formulation is possible for companies handling personal information and for that reason, it is expected to be used for searching direction of strategy establishment for effective response.

Concepts of Disaster Prevention Design for Safety in the Future Society

  • Noh, Hwang-Woo;Kitagawa, Keiko;Oh, Yong-Sun
    • International Journal of Contents
    • /
    • v.10 no.1
    • /
    • pp.54-61
    • /
    • 2014
  • In this paper, we propose a pioneering concept of DPD(Disaster Prevention Design) to realize a securable society in the future. Features of danger in the future society are expected to be diverse, abrupt occurring, large scale, and complicated ways. Due to increment of dangers with their features of uncertainty, interactivity, complexity, and accumulation, human-oriented design concept naturally participates in activities to prevent our society against disasters effectively. We presented DPD is an essential design activity in order to cope with dangers expected in the future societies as well as realize securable environments. DPD is also an integrated design aids including preemptive protections, rapid preparing, recovery, and interactive cooperation. We also expect these activities of DPD is effective for generation of new values in the market, satisfaction of social needs, expansion of design industry, and a novel chance for development in the future society. Throughout this paper, we submit various aspects of DPD concepts including definition, classification, scope, necessity, strategy, influencing elements, process, and its principle. We expect these concepts will be the seed and/or basement of DPD research for the future works. For the direction of study for DPD in the future, we emphasize alarm system for preemptive protection rather than recovery strategy for the damage occurred. We also need to research about progressive prevention techniques and convergence with other areas of design. In order to transfer the concept of product design from facility-oriented mechanism to human-oriented one, we should develop new kinds of city basis facilities, public-sense design concepts referred to social weak-party, e-Learning content design preparing disasters, and virtual simulation design etc. On the other hand, we have to establish laws and regulations to force central and/or provincial governments to have these DPD strategies applying their regional properties. Modern design activities are expanding to UI(user interface) content design area overcoming the conventional design concept of product and/or service. In addition, designers are recognized as art directors or life stylists who will change the human life and create the social value. DPD can be divided into prevention design, preparedness design, response design, and recovery design. Five strategies for successful DPD are Precaution-oriented, Human-oriented, Sense-oriented, Legislation, and Environment Friendly Strategies.

FMD response cow hooves and temperature detection algorithm using a thermal imaging camera (열화상 카메라를 이용한 구제역 대응 소 발굽 온도 검출 알고리즘 개발)

  • Yu, Chan-Ju;Kim, Jeong-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.292-301
    • /
    • 2016
  • Because damages arising from the occurrence of foot-and-mouth disease (FMD) are very great, it is essential to make a preemptive diagnosis to cope with it in order to minimize those damages. The main symptoms of foot-and-mouth disease are body temperature increase, loss of appetite, formation of blisters in the mouth, on hooves and breasts, etc. in a cow or a bull, among which the body temperature check is the easiest and quickest way to detect the disease. In this paper, an algorithm to detect FMD from the hooves of cattle was developed and implemented for preemptive coping with foot-and-mouth disease, and a hoof check test is conducted after the installation of a high-resolution camera module, a thermo-graphic camera, and a temperature/humidity module in the cattle shed. Through the algorithm and system developed in this study, it is possible to cope with an early-stage situation in which cattle are suspected as suffering from foot-and-mouth disease, creating an optimized growth environment for cattle. In particular, in this study, the system to cope with FMD does not use a portable thermo-graphic camera, but a fixed camera attached to the cattle shed. It does not need additional personnel, has a function to measure the temperature of cattle hooves automatically through an image algorithm, and includes an automated alarm for a smart phone. This system enables the prediction of a possible occurrence of foot-and-mouth disease on a real-time basis, and also enables initial-stage disinfection to be performed to cope with the disease without needing extra personnel.

A Study on the Current Status Associated with Challenging Behaviors of Adults with Developmental Disabilities and the Perception of Workers: Focused on Cases at Lifelong Education Centers for the Developmentally Disabled in Seoul (성인 발달장애인의 도전적 행동 관련 현황 및 종사자의 인식에 대한 연구: 서울시 발달장애인 평생교육센터를 중심으로)

  • You, SuJin;Lee, EunHye;Han, JeongEun
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.383-392
    • /
    • 2020
  • This study was conducted to understand the current status associated with challenging behaviors of adults with developmental disabilities and review the perception of workers at lifelong education centers for the developmentally disabled. To that end, a survey and a focus group interview were conducted. The findings were as follows. First, 85.4% of people working at lifelong education centers for the developmentally disabled had experienced injury in the past year due to challenging behaviors, and those who experience injuries responded that they suffered burnout, psychological trauma, and considered changing jobs. Second, in terms of preemptive response by the organization to address challenging behaviors, 'securing individual space' and 'preemptive identification of causes of challenging behaviors' ranked the highest, with 87.5% of the respondents giving this answer, respectively. For follow-up measures, 81.3% of organizations answered that they hold meetings on individual cases and provide supervision. Third, in terms of suggestions for ways to address challenging behaviors, establishment of an organization-wide system and cooperation with related organizations were cited as needed.

A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic (다크넷 트래픽 기반의 알려지지 않은 IoT 봇넷 선제탐지 방안)

  • Gunyang Park;Jungsuk Song;Heejun Roh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.267-280
    • /
    • 2023
  • With development of computing and communications technologies, IoT environments based on high-speed networks have been extending rapidly. Especially, from home to an office or a factory, applications of IoT devices with sensing environment and performing computations are increasing. Unfortunately, IoT devices which have limited hardware resources can be vulnerable to cyber attacks. Hence, there is a concern that an IoT botnet can give rise to information leakage as a national cyber security crisis arising from abuse as a malicious waypoint or propagation through connected networks. In order to response in advance from unknown cyber threats in IoT networks, in this paper, We firstly define four types of We firstly define four types of characteristics by analyzing darknet traffic accessed from an IoT botnet. Using the characteristic, a suspicious IP address is filtered quickly. Secondly, the filtered address is identified by Cyber Threat Intelligence (CTI) or Open Source INTelligence (OSINT) in terms of an unknown suspicious host. The identified IP address is finally fingerprinted to determine whether the IP is a malicious host or not. To verify a validation of the proposed method, we apply to a Darknet on real-world SOC. As a result, about 1,000 hosts who are detected and blocked preemptively by the proposed method are confirmed as real IoT botnets.

Analysis of the Chinese Navy's Offensive Strategy for the West Sea and the Development Direction of the Korean Navy's Response Strategy (중국해군의 공세적 서해(西海) 진출 전략 분석과 한국해군의 대응전략 발전방향)

  • Kim, Nam-su
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.1-35
    • /
    • 2023
  • The purpose of this study is to present the direction of development of our navy's response strategy through analysis at the ends, ways, and means level of the Chinese navy's offensive strategy for the West Sea. As a result of the analysis, at the ends level, the Chinese Navy's offensive strategy for the West Sea strategy is being linked to a grand strategy to protect maritime rights and achieve maritime power between the U.S. and China competition, at the ways level, the Chinese Navy is expected to create a foundation for the international community to recognize the West Sea as China's inland sea through "routine entry" and "exercise authority", and in case of emergency, it will try to secure sea control in the West Sea in a short period of time by blocking Korea's maritime transportation route based on the overwhelming preemptive attack capability of aircraft carriers. At the means level, it is accelerating the construction of aircraft carrier warfare units and improving its ability to engage long-range missiles. As a direction of development of the Korean Navy's response strategy in response to this, first, Establishment and Development of National Maritime Security Strategy in conjunction with the Korean Indo-Pacific Strategy. Second, it proposes the development of the concept of effective security operations for the east sea area of the West Sea intermediate line, and third, the development of the concept of combat performance and capacity building to strengthen survival and lethality.

  • PDF

Combined analysis of meteorological and hydrological drought for hydrological drought prediction and early response - Focussing on the 2022-23 drought in the Jeollanam-do - (수문학적 가뭄 예측과 조기대응을 위한 기상-수문학적 가뭄의 연계분석 - 2022~23 전남지역 가뭄을 대상으로)

  • Jeong, Minsu;Hong, Seok-Jae;Kim, Young-Jun;Yoon, Hyeon-Cheol;Lee, Joo-Heon
    • Journal of Korea Water Resources Association
    • /
    • v.57 no.3
    • /
    • pp.195-207
    • /
    • 2024
  • This study selected major drought events that occurred in the Jeonnam region from 1991 to 2023, examining both meteorological and hydrological drought occurrence mechanisms. The daily drought index was calculated using rainfall and dam storage as input data, and the drought propagation characteristics from meteorological drought to hydrological drought were analyzed. The characteristics of the 2022-23 drought, which recently occurred in the Jeonnam region and caused serious damage, were evaluated. Compared to historical droughts, the duration of the hydrological drought for 2022-2023 lasted 334 days, the second longest after 2017-2018, the drought severity was evaluated as the most severe at -1.76. As a result of a linked analysis of SPI (StandQardized Precipitation Index), and SRSI (Standardized Reservoir Storage Index), it is possible to suggest a proactive utilization for SPI(6) to respond to hydrological drought. Furthermore, by confirming the similarity between SRSI and SPI(12) in long-term drought monitoring, the applicability of SPI(12) to hydrological drought monitoring in ungauged basins was also confirmed. Through this study, it was confirmed that the long-term dryness that occurs during the summer rainy season can transition into a serious level of hydrological drought. Therefore, for preemptive drought response, it is necessary to use real-time monitoring results of various drought indices and understand the propagation phenomenon from meteorological-agricultural-hydrological drought to secure a sufficient drought response period.

A study on Improvement and Analysis of Records Management Status for Disaster Safety Archives in Online Environment (재난안전정보 아카이브 구축을 위한 온라인 기록정보 현황분석 및 개선방안 연구)

  • Han, Hui-Jeong;Park, Tae-Yeon;Oh, Hyo-Jung;Kim, Yong
    • Journal of Korean Library and Information Science Society
    • /
    • v.48 no.2
    • /
    • pp.187-213
    • /
    • 2017
  • In order for preemptive response and prevention against disasters, it is necessary to systematically collect, preserve, manage, and utilize the information resources of records related with disaster safety. Therefore, this study analyzed the types and status of text-based document archives among the records information resources which were published and produced by the disaster safety-related institutions via online. Detail types analysis of disasters in document archives also was conducted. Based on filed interviews, the actual users' requirements for the disaster safety information archives are converged. The ultimate goal of this study is to establish a basis for building of disaster safety information archives by deriving improved management strategies of disaster safety records resources.

Post-Chlorination Process Control based on Flow Prediction by Time Series Neural Network in Water Treatment Plant

  • Lee, HoHyun;Shin, GangWook;Hong, SungTaek;Choi, JongWoong;Chun, MyungGeun
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.3
    • /
    • pp.197-207
    • /
    • 2016
  • It is very important to maintain a constant chlorine concentration in the post chlorination process, which is the final step in the water treatment process (hereafter WTP) before servicing water to citizens. Even though a flow meter between the filtration basin and clear well must be installed for the post chlorination process, it is not easy to install owing to poor installation conditions. In such a case, a raw water flow meter has been used as an alternative and has led to dosage errors due to detention time. Therefore, the inlet flow to the clear well is estimated by a time series neural network for the plant without a measurement value, a new residual chlorine meter is installed in the inlet of the clear well to decrease the control period, and the proposed modeling and controller to analyze the chlorine concentration change in the well is a neuro fuzzy algorithm and cascade method. The proposed algorithm led to post chlorination and chlorination improvements of 1.75 times and 1.96 times respectively when it was applied to an operating WTP. As a result, a hygienically safer drinking water is supplied with preemptive response for the time delay and inherent characteristics of the disinfection process.

A Study on Construction of Platform Using Spectrum Big Data (전파 빅데이터 활용을 위한 플랫폼 구축방안 연구)

  • Kim, Hyoung Ju;Ra, Jong Hei;Jeon, Woong Ryul;Kim, Pankoo
    • Smart Media Journal
    • /
    • v.9 no.2
    • /
    • pp.99-109
    • /
    • 2020
  • This paper proposes a platform construction plan for the use of spectrum big data, collects and analyzes the big data in the radio wave field, establishes a linkage plan, and presents a support system scheme for linking and using the spectrum and public sector big data. It presented a plan to build a big data platform in connection with the spectrum public sector. In a situation where there is a lack of a support system for systematic analysis and utilization of big data in the field of radio waves, by establishing a platform construction plan for the use of big data by radio-related industries, the preemptive response to realize the 4th Industrial Revolution and the status and state of the domestic radio field. The company intends to contribute to enhancing the convenience of users of the big data platform in the public sector by securing the innovation growth engine of the company and contributing to the fair competition of the radio wave industry and the improvement of service quality. In addition, it intends to contribute to raising the social awareness of the value of spectrum management data utilization and establishing a collaboration system that uses spectrum big data through joint use of the platform.