• Title/Summary/Keyword: system security

Search Result 9,674, Processing Time 0.038 seconds

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

A Study on Actual Conditions of Preschool Education for Activation of Public Education (공교육 활성화를 위한 유아교육 현황 분석)

  • Jeong, Kyoung Hwa;Kwon, Eun Joo
    • Korean Journal of Childcare and Education
    • /
    • v.2 no.1
    • /
    • pp.65-88
    • /
    • 2006
  • This study intended to activate public education, researched and analyzed real conditions of preschool education to know desirable directions of public education and help parents recognize public education. The final purpose is to offer basic materials to reestablish preschool education in the public education system. First, parents' recognition concerning preschool education in the public education system was much different from that of teachers. As for definitions of preschool education as a public education, parents understood that it means 'the nation and self-governing bodies manage aid both the public and private kindergartens', and teachers recognized that it means that 'the nation and self-governing bodies not only found operate public kindergartens but also aid manage educational funds of private kindergartens. Second, the examination of educational environments of kindergartens told that teachers and parents thought that opportunity to enter the kindergarten is not equal for all children in our country, and quality of kindergarten teachers is satisfactory. Also, they thought that curriculums of preschool educational organs have been set well according to children's developmental stages, education quality is different according to preschool education organs' foundation-types. They recognized that facilities and apparatus of preschools are satisfactory, security and neatness of preschools are satisfactory, too. Third, the examination of developmental directions of preschool education as a public education proved following facts; as for foundation-types of kindergartens in the future when promoting preschool education as a public education, parents answered financial support and supervision by the government, teachers answered aid and management of operational fees as well as support for teacher personnel expenses.

  • PDF

A Study on Awareness of the Dental Health Insurance Coverage (치과 건강보험에 관한 인식 조사)

  • Han, Ji-Hyoung;Kim, Yoon-Sin
    • Journal of dental hygiene science
    • /
    • v.8 no.2
    • /
    • pp.65-71
    • /
    • 2008
  • The purpose of this study was to examine people's awareness of health insurance in a bid to help improve the management of dental health insurance coverage. The subjects in this study were 1,036 people who included experts in that field and medical consumers. The findings of the study were as follows: 1. In regard to the demographic characteristics of the expert group including gender and age, the female experts outnumbered the males, as the former accounted for 84.7 percent. And the experts in their 20s made up the largest age group, followed by the 30-39 age group and those in their 40s. As to the demographic characteristics of the medical consumers, the rates of the men and women stood at 49.8 percent and 50.2 percent respectively, which were similar. By age, the largest number of the medical consumers were in their 20s, followed by in their 30s and in their 40s. 2. Concerning opinions on the procurement of finance for health insurance, many respondents in both groups agreed that the health insurance coverage should be enlarged by securing more finance, and that items involved in the coverage should be prioritized again. Regarding a means of securing financial resources, the experts placed the most emphasis on extended budgetary support from the government, followed by establishing a social security system and budget compilation by local governments. The medical consumers attached the most importance to extended budgetary backing from the government, followed by budget compilation by local governments and determining contribution according to income level. 3. As for general view of the dental health insurance, the experts believed that the amounts of copayment and self-payment by the insured were appropriate(2.47), and they found the number of benefitted items to be proper(2.29) as well. The medical consumers thought that the benefit percentage of the dental health insurance in the overall health insurance budget was appropriate(2.26), and they also considered the number of benefitted items adequate(2.16). But this group didn't give a lot of marks to the appropriateness of those things. 4. As to perception about the dental health insurance, both groups took a similar view of it. Specifically, they felt the strong need for a dental health insurance system. In terms of satisfaction level, both groups were dissatisfied with it, and there was a strong tendency for them to be discontented with the health insurance coverage.

  • PDF

Development of Three-Dimensional Trajectory Model for Detecting Source Region of the Radioactive Materials Released into the Atmosphere (대기 누출 방사성물질 선원 위치 추적을 위한 3차원 궤적모델 개발)

  • Suh, Kyung-Suk;Park, Kihyun;Min, Byung-Il;Kim, Sora;Yang, Byung-Mo
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.1
    • /
    • pp.31-39
    • /
    • 2016
  • Background: It is necessary to consider the overall countermeasure for analysis of nuclear activities according to the increase of the nuclear facilities like nuclear power and reprocessing plants in the neighboring countries including China, Taiwan, North Korea, Japan and South Korea. South Korea and comprehensive nuclear-test-ban treaty organization (CTBTO) are now operating the monitoring instruments to detect radionuclides released into the air. It is important to estimate the origin of radionuclides measured using the detection technology as well as the monitoring analysis in aspects of investigation and security of the nuclear activities in neighboring countries. Materials and methods: A three-dimensional forward/backward trajectory model has been developed to estimate the origin of radionuclides for a covert nuclear activity. The developed trajectory model was composed of forward and backward modules to track the particle positions using finite difference method. Results and discussion: A three-dimensional trajectory model was validated using the measured data at Chernobyl accident. The calculated results showed a good agreement by using the high concentration measurements and the locations where was near a release point. The three-dimensional trajectory model had some uncertainty according to the release time, release height and time interval of the trajectory at each release points. An atmospheric dispersion model called long-range accident dose assessment system (LADAS), based on the fields of regards (FOR) technique, was applied to reduce the uncertainties of the trajectory model and to improve the detective technology for estimating the radioisotopes emission area. Conclusion: The detective technology developed in this study can evaluate in release area and origin for covert nuclear activities based on measured radioisotopes at monitoring stations, and it might play critical tool to improve the ability of the nuclear safety field.

A Research on the Regulations and Perception of Interactive Game in Data Broadcasting: Special Emphasis on the TV-Betting Game (데이터방송 인터랙티브 게임 규제 및 이용자 인식에 관한 연구: 승부게임을 중심으로)

  • Byun, Dong-Hyun;Jung, Moon-Ryul;Bae, Hong-Seob
    • Korean journal of communication and information
    • /
    • v.35
    • /
    • pp.250-291
    • /
    • 2006
  • This study examines the regulatory issues and introduction problems of TV-betting data broadcasts in Korea by in-depth interview with a panel group. TV-betting data broadcast services of card games and horse racing games are widely in use in Europe and other parts of the world. In order to carry out the study, a demo program of TV-betting data broadcast in the OCAP(OpenCableTM Application Platform Specification) system environment, which is the data broadcasting standard for digital cable broadcasts in Korea was exposed to the panel group and then they were interviewed after watching and using the program. The results could be summarized as below. First of all, while TV-betting data broadcasts have many elements of entertainment, the respondents thought that it would be difficult to introduce TV-betting in data broadcasts as in overseas countries largely due to social factors. In addition, in order to introduce TV-betting data broadcasts, they suggested that excessive speculativeness must be suppressed through a series of regulatory system devices, such as by guaranteeing credibility of the media based on safe security systems for transactions, scheduling programs with effective time constraints to prevent the games from running too frequently, limiting the betting values, and by prohibiting access to games through set-top boxes of other data broadcast subscribers. The general consensus was that TV-betting could be considered for gradual introduction within the governmental laws and regulations that would minimize its ill effects. Therefore, the government should formulate long-term regulations and policies for data broadcasts. Once the groundwork is laid for safe introduction of TV-betting on data broadcasts within the boundary of laws and regulations, interactive TV games are expected to be introduced in Korea not only for added functionality of entertainment but also for far-ranging development of data broadcast and new media industries.

  • PDF

Development of the Holocene Sediments in Gamak Bay of the South Sea, Korea (남해 가막만의 현생퇴적층 발달특성)

  • Kim, So Ra;Lee, Gwang Soo;Choi, Dong Lim;Kim, Dae Choul;Lee, Tae Hee;Seo, Young Kyo
    • The Sea:JOURNAL OF THE KOREAN SOCIETY OF OCEANOGRAPHY
    • /
    • v.19 no.2
    • /
    • pp.131-146
    • /
    • 2014
  • High-resolution seismic profiles coupled with sediment sampling were analyzed to investigate the acoustic characters and distribution patterns of the late Holocene sediments in Gamak Bay of the South Sea, Korea. The mean grain size of surficial sediment lies around $6.3{\sim}9.7{\Phi}$. Sediments in the bay consist of silt and clay with progressive decrease toward the inner bay. The seismic sedimentary sequence overlying the acoustic basement can be divided into two sedimentary units (GB I and II) by a prominent mid-reflector (Maximum Flooding Surface; MFS). The acoustic basement occurs at the depth between 20 m and 40 m below the sea-level and deepens gradually southward. The GB I, mostly occupying the channel-fill, is characterized by reflection-free seismic facies. It can be formed as late Transgressive System Tract (TST), interpreted tidal environment deposits. MFS appears at the depth of about 15~28 m below the sea-level and is well defined by even and continuous reflectors on the seismic profile. The GB II overlying MFS is composed of acoustically transparent to semitransparent and parallel internal reflectors. GB II is interpreted as the Highstand System Tract (HST) probably deposited during the last 6,000 yrs when the sea level was close to the present level. Especially, it is though that the GB II was subdivided into two layers (GB II-a and II-b) by a HST-reflector and this was classified by wind, sea water flux, and tidal current.

Influences of Bulking Materials on Sustainable Livestock Mortality Composting (부자재 종류가 친환경적 사축퇴비화에 미치는 영향)

  • Won, Seung Gun;Park, Ji Young;Cho, Won Sil;Kwag, Jung Hoon;Choi, Dong Yoon;Ahn, Hee Kwon;Ra, Chang Six
    • Journal of Animal Science and Technology
    • /
    • v.55 no.5
    • /
    • pp.483-488
    • /
    • 2013
  • To develop a sustainable composting method for livestock mortality, a natural aeration-composting process was designed and the influences of bulking materials on the mortality composting process were studied. Bulking materials (e.g., compost, swine manure, sawdust, and rice husks), easily supplied at the scene of an animal mortality outbreak, were tested in this research. A lab-scale composting system (W34 ${\times}$ L60 ${\times}$ H26 cm) was made using 100 mm styrofoam, and natural aeration was achieved through pipes installed on the bottom of the system. Four treatments were designed (compost, compost + swine feces, sawdust, and rice husks treatment groups) and all experiments were done in triplicates. During composting for 40 days, no leachate was observed in compost and sawdust treatment groups, whereas 18 and 8.2 ml leachate/kg-mortality was emitted from the compost + feces and rice husks treatment groups, respectively. Dimethyl disulfide (DMDS) emission during the composting was very low in all treatment groups, possibly due to the bio-filtering function of the compost cover layer on the pile. The mortality degradability in compost, compost + feces, sawdust, and rice husks groups was 25.3, 25.8, 13.5, and 14.5%, respectively, showing significantly higher levels in compost and compost + feces groups (p<0.05). Also, only the compost + feces group produced enough heat (over $55^{\circ}C$) and lasted for 7 days, indicating that bio-security cannot be guaranteed without feces supplementation.

Structural Relationships Among Factors to Adoption of Telehealth Service (원격의료서비스 수용요인의 구조적 관계 실증연구)

  • Kim, Sung-Soo;Ryu, See-Won
    • Asia pacific journal of information systems
    • /
    • v.21 no.3
    • /
    • pp.71-96
    • /
    • 2011
  • Within the traditional medical delivery system, patients residing in medically vulnerable areas, those with body movement difficulties, and nursing facility residents have had limited access to good healthcare services. However, Information and Communication Technology (ICT) provides us with a convenient and useful means of overcoming distance and time constraints. ICT is integrated with biomedical science and technology in a way that offers a new high-quality medical service. As a result, rapid technological advancement is expected to play a pivotal role bringing about innovation in a wide range of medical service areas, such as medical management, testing, diagnosis, and treatment; offering new and improved healthcare services; and effecting dramatic changes in current medical services. The increase in aging population and chronic diseases has caused an increase in medical expenses. In response to the increasing demand for efficient healthcare services, a telehealth service based on ICT is being emphasized on a global level. Telehealth services have been implemented especially in pilot projects and system development and technological research. With the service about to be implemented in earnest, it is necessary to study its overall acceptance by consumers, which is expected to contribute to the development and activation of a variety of services. In this sense, the study aims at positively examining the structural relationship among the acceptance factors for telehealth services based on the Technology Acceptance Model (TAM). Data were collected by showing audiovisual material on telehealth services to online panels and requesting them to respond to a structured questionnaire sheet, which is known as the information acceleration method. Among the 1,165 adult respondents, 608 valid samples were finally chosen, while the remaining were excluded because of incomplete answers or allotted time overrun. In order to test the reliability and validity of the assessment scale items, we carried out reliability and factor analyses, and in order to explore the causal relation among potential variables, we conducted a structural equation modeling analysis using AMOS 7.0 and SPSS 17.0. The research outcomes are as follows. First, service quality, innovativeness of medical technology, and social influence were shown to affect perceived ease of use and perceived usefulness of the telehealth service, which was statistically significant, and the two factors had a positive impact on willingness to accept the telehealth service. In addition, social influence had a direct, significant effect on intention to use, which is paralleled by the TAM used in previous research on technology acceptance. This shows that the research model proposed in the study effectively explains the acceptance of the telehealth service. Second, the research model reveals that information privacy concerns had a insignificant impact on perceived ease of use of the telehealth service. From this, it can be gathered that the concerns over information protection and security are reduced further due to advancements in information technology compared to the initial period in the information technology industry, and thus the improvement in quality of medical services appeared to ensure that information privacy concerns did not act as a prohibiting factor in the acceptance of the telehealth service. Thus, if other factors have an enormous impact on ease of use and usefulness, concerns over these results in the initial period of technology acceptance may become irrelevant. However, it is clear that users' information privacy concerns, as other studies have revealed, is a major factor affecting technology acceptance. Thus, caution must be exercised while interpreting the result, and further study is required on the issue. Numerous information technologies with outstanding performance and innovativeness often attract few consumers. A revised bill for those urgently in need of telehealth services is about to be approved in the national assembly. As telemedicine is implemented between doctors and patients, a wide range of systems that will improve the quality of healthcare services will be designed. In this sense, the study on the consumer acceptance of telehealth services is meaningful and offers strong academic evidence. Based on the implications, it can be expected to contribute to the activation of telehealth services. Further study is needed to assess the acceptance factors for telehealth services, such as motivation to remain healthy, health care involvement, knowledge on health, and control of health-related behavior, in order to develop unique services according to the categorization of customers based on health factors. In addition, further study may focus on various theoretical cognitive behavior models other than the TAM, such as the health belief model.

Attitudes and Problems of Urban Parks, in Taegu City, Korea (도시공원(都市公園)의 속성(屬性)과 문제점(問題點))

  • Choi, Seok-Joo
    • Journal of the Korean association of regional geographers
    • /
    • v.2 no.2
    • /
    • pp.205-217
    • /
    • 1996
  • Today in the industrial society, the urban park is the place for citizens' health, recreation, exercise, and education. This is a very important place as a fine sight and maintenance of public security. As the results of rapid economic growth during the last thirty years, citizens are in the age of material civilization and are challenged with many serious urban problems such as pollution, noise, traffic congestion, human alienation, etc. Rapid material civilization brought to citizens' mental and physical diseases. To some of the problems, it is necessary that we should have proper leisure and recreation facilities, and that we should have the active, positive posture to them. Especially we need the out door recreational spaces and facilities. But nowadays the urban parks are given little thought in spites of the necessity of parks which should be used as a recreational spaces in the urban areas. So, This study attempt to comprehend the function, quantity and quality of the urban park system in Taegu. It is clear that the quantity is inappropriate. Because of inappropriate disposition and management, its coefficiency of utilization is low. In view of the population and park ratio, Dong Gu, Nam Gu, Suseong Gu and Dalseong Gun have comparative good, environments. However, Dalseo Qu, Seo Gu and Jung Gu have less geographical features. There are some methods to provide expansion of the aggregate of urban parks. We can use the school-grounds and their facilities. which were moved from C.B.D. to the outskirts of Daegu, or some parts of urban redevelopment, or the riverside of Sincheon river. In the urban park-program, users' satisfaction-factors are analyzed. We must reconsider the efficiency. The above problems are improved. Active administration and inhabitants' Positive participation are demanded so that the sound development of cities and daily life-surroundings are promoted.

  • PDF