• Title/Summary/Keyword: threat value

Search Result 168, Processing Time 0.029 seconds

Anomaly detection in particulate matter sensor using hypothesis pruning generative adversarial network

  • Park, YeongHyeon;Park, Won Seok;Kim, Yeong Beom
    • ETRI Journal
    • /
    • v.43 no.3
    • /
    • pp.511-523
    • /
    • 2021
  • The World Health Organization provides guidelines for managing the particulate matter (PM) level because a higher PM level represents a threat to human health. To manage the PM level, a procedure for measuring the PM value is first needed. We use a PM sensor that collects the PM level by laser-based light scattering (LLS) method because it is more cost effective than a beta attenuation monitor-based sensor or tapered element oscillating microbalance-based sensor. However, an LLS-based sensor has a higher probability of malfunctioning than the higher cost sensors. In this paper, we regard the overall malfunctioning, including strange value collection or missing collection data as anomalies, and we aim to detect anomalies for the maintenance of PM measuring sensors. We propose a novel architecture for solving the above aim that we call the hypothesis pruning generative adversarial network (HP-GAN). Through comparative experiments, we achieve AUROC and AUPRC values of 0.948 and 0.967, respectively, in the detection of anomalies in LLS-based PM measuring sensors. We conclude that our HP-GAN is a cutting-edge model for anomaly detection.

The Distribution of Mismatches in Government Policy Response against COVID-19 in Terms of Risk Communication and its Implications

  • BAE, Suk-Kyeong;CHOI, Choongik
    • Journal of Distribution Science
    • /
    • v.19 no.12
    • /
    • pp.91-101
    • /
    • 2021
  • Purpose: This study aims to explore the effects of government's value intervention messages on the prevention and control of infectious disease in the risk communication process in terms of goveremnt policy response to COVID-19 from the mismatch message perspective, and draws the relevant implicaitons. Due to the infeciton spread, some people point out that depression caused by COVID-19 is because of wrong signals of the government and infectious disease prevention and control authorities, namely value intervention messsages. Research design, data and methodology: This study examined the epidcmic situation through message deails regarding the effects of government's mismatch messages on prevention and control of infectious disease and the resulting phenomena. Results: People's lives are under serious threat overall, so the declaration of the end of COVID-19 is almost impossible unlike MERS. Economic downturn due to foreced prevention and control regulaitons of COVID-19, mistruct of social distancing, fatigue on mismatch messages, and moral hazard on the awareness of prevention and control of infectious disease are negative phenomena to risk communiaiton on COVID-19. Conclusions: This study investigated the government authorities' policy sending wrong signals due to mismatching of the reality at this point in time for infectious disease prevention and control from the risk communicaiton perspectrive.

The Effectiveness of Apps Recommending Best Restaurant through Location-based Knowledge Information: Privacy Calculus Perspective (위치기반 지식정보를 활용한 맛집 추천 앱의 효과: 프라이버시 계산을 중심으로)

  • Jiang, Taypun;Lim, Hyun A;Choi, Jaewon
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.1
    • /
    • pp.89-106
    • /
    • 2017
  • In advanced mobile devices environment, the market share of mobile application has been increased. Among various mobile services, Location-based Service (LBS) is an important feature to increase user motivation related to purchase intention on mobile. However, individual privacy has also increased as an important problem for invasion of privacy and information leakage while too many LBS based applications (App) rapidly launched in the App market. In this study, we focused on perceived values of LBS App users who use Apps related to recommending best restaurants in China and South Korea. The purpose of this study is to identify important factors for perceived value when users provide personal information for LBS service provider. The result of this study is follows: perceived value can increase while LBS customers can more control self-information and information useability. Also information ability of users affected perceived values for LBS Apps. Also users' app user ability and perceived value were effects on privacy revenue. In addtion, perceived weakness of users and perceived value increased privacy threat.

Agricultural Systems for Saline Soil: The Potential Role of Livestock

  • Masters, D.G.;Norman, H.C.;Barrett-Lennard, E.G.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.18 no.2
    • /
    • pp.296-300
    • /
    • 2005
  • Human-induced soil salinity is becoming a major threat to agriculture across the world. This salinisation occurs in both irrigated and rain-fed agricultural zones with the highest proportions in the arid and semi-arid environments. Livestock can play an important role in the management and rehabilitation of this land. There are a range of plants that grow in saline soils and these have been used as animal feed. In many situations, animal production has been poor as a result of low edible biomass production, low nutritive value, depressed appetite, or a reduction in efficiency of energy use. Feeding systems are proposed that maximise the feeding value of plants growing on saline land and integrate their use with other feed resources available within mixed livestock and crop farming systems. Salt-tolerant pastures, particularly the chenopod shrubs, have moderate digestible energy and high crude protein. For this reason they represent a good supplement for poor quality pastures and crop residues. The use of salt-tolerant pasture systems not only provides feed for livestock but also may act as a bio-drain to lower saline water tables and improve the soil for growth of alternative less salt tolerant plants. In the longer term there are opportunities to identify and select more appropriate plants and animals for saline agriculture.

A Study on Driver's Perception over the Change of the Headlamp's Illuminance : 4. Development of the Standard and the Algorithm for Limiting Brightness Change (전조등 조도변동에 대한 운전자의 인식연구 : 4. 조도변동 기준 및 평가 알고리즘 개발)

  • Kim, Gi-Hoon;Kim, Huyn-Ji;An, Ok-Hee;Lim, Tae-Young;Min, Jae-Woong;Lim, Jun-Chae;Kang, Byung-Do;Kim, Hoon
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.21 no.10
    • /
    • pp.13-21
    • /
    • 2007
  • Based on the measurement results, a limit value for the change of the brightness of the headlamp, and an estimation algorithm considering the driver's safety was developed. Limitation values concerning being uncomfortable, blinking, and brightness change were indicated based on a subjective estimation of the psychological estimation. Also a safety estimation algorithm and a limitation value for stopping safely without the threat of obstacles to the vehicle were indicated by the perception measurement.

Exploiting Correlation Characteristics to Detect Covert digital communication

  • Huang, Shuhua;Liu, Weiwei;Liu, Guangjie;Dai, Yuewei;Tian, Wen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.8
    • /
    • pp.3550-3566
    • /
    • 2020
  • As a widely used way to exfiltrate information, wireless covert channel (WCC) brings a serious threat to communication security, which enables the wireless communication process to bypass the authorized access control mechanism to disclose information. Unlike the covert channel on the network layer, wireless covert channels on the physical layer (WCC-P) is a new covert communication mode to implement and improve covert wireless communication. Existing WCC-P scheme modulates the secret message bits into the Gaussian noise, which is also called covert digital communication system based on the joint normal distribution (CJND). Finding the existence of this type of covert channel remains a challenging work due to its high undetectability. In this paper, we exploit the square autocorrelation coefficient (SAC) characteristic of the CJND signal to distinguish the covert communication from legitimate communication. We study the sharp increase of the SAC value when the offset is equal to the symbol length, which is caused by embedding secret information. Then, the SAC value of the measured sample is compared with the threshold value to determine whether the measured sample is CJND sample. When the signal-to-noise ratio reaches 20db, the detection accuracy can reach more than 90%.

Using the Contingent Valuation Method Based on Multi-attribute Utility Theory to Measure the Environmental Value of the Nakdong-river Estuary (다속성 효용이론에 근거한 조건부 가치측정법을 이용한 낙동강 하구의 환경가치 추정)

  • Yoo, Seung-Hoon
    • Ocean and Polar Research
    • /
    • v.29 no.1
    • /
    • pp.69-80
    • /
    • 2007
  • This paper attempts to measure the environmental value of the Nakdong-river estuary, which is ecologically important but confronted with the threat of development. Especially, in order to elicit the environmental values of its four attributes, contingent valuation method(CVM) based on multi-attribute utility theory is applied and the CVM survey was rigorously designed to comply with the guidelines for best-practiced CVM studies. We surveyed a randomly selected sample of 400 and 350 households in Busan and six large cities(Seoul, Incheon, Daegu, Daejeon, Gwangju, and Ulsan), respectively and asked respondents questions in person-to-person interviews about how they would willing to pay for the estuary conservation and management program. Respondents overall accepted the contingent market and were willing to contribute a significant amount(2,457 won in Busan and 3,560 won in six large cities), on average, per household per year, which implies that there exists a large difference between the two. The aggregate values of the Nakdong-river estuary in Busan and six large cities amount to 2.92 and 22.32 billion won, respectively, per year. In addition, expanding the values to Korea produces 51.34 billion won per year. The quantitative values can be utilized in planning and decision-making about development versus conservation of the estuary.

Proposal of Artificial Intelligence Convergence Curriculum for Upskilling of Financial Manpower : Focusing on Private Bankers and Robo-Advisors

  • KIM, JiWon;WOO, HoSung
    • Fourth Industrial Review
    • /
    • v.2 no.1
    • /
    • pp.19-32
    • /
    • 2022
  • Purpose - As new technologies that have led the 4th industrial revolution spread after the COVID-19 pandemic, the business crisis of existing financial institutions and the threat of employee jobs are growing, especially in the financial sector. The purpose of this study is to propose a human-technology convergence curriculum for creating high value-added in financial institutions and upskilling financial manpower. Research design, data, and methodology - In this study, a curriculum was designed to strengthen job competency for Private Bankers, high-quality employees of a bank dealing with high-net-worth owners. The focus of the design is that learners acquire skills to use robo-advisors as a tool and supplement artificial intelligence ethics. Result - The curriculum is organized into a total of 16 classes, and the main contents are changes in the financial environment and financial consumers, the core technology of robo-advisors and AI ethics, and establishment and evaluation of hyper-personalized asset management strategies using robo-advisors. To achieve the educational goal, two evaluations are performed to derive individual tasks and team project results. Conclusion - Human-centered upskilling convergence education will contribute to improving employee value and expanding corporate high value-added business areas by utilizing new technologies as tools. It is expected that the development and application of convergence curriculum in various fields will continue to be advanced in the future.

Determination Method of Security Threshold using Fuzzy Logic for Statistical Filtering based Sensor Networks (통계적 여과 기법기반의 센서 네트워크를 위한 퍼지로직을 사용한 보안 경계 값 결정 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.2
    • /
    • pp.27-35
    • /
    • 2007
  • When sensor networks are deployed in open environments, all the sensor nodes are vulnerable to physical threat. An attacker can physically capture a sensor node and obtain the security information including the keys used for data authentication. An attacker can easily inject false reports into the sensor network through the compromised node. False report can lead to not only false alarms but also the depletion of limited energy resource in battery powered sensor networks. To overcome this threat, Fan Ye et al. proposed that statistical on-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and energy, where security threshold value is the number of message authentication code for verification of false report. In this paper, we propose a fuzzy rule-based system for security threshold determination that can conserve energy, while it provides sufficient detection power in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the probability of a node having non-compromised keys, the number of compromised partitions, and the remaining energy of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

  • PDF

Privacy leakage security system research for small physical companies (중소 경호.경비업체의 개인정보 유출 방지를 위한 보안 체계 연구)

  • Kang, Poo-Reum;Lee, DongHwi;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.87-97
    • /
    • 2012
  • Privacy of personal information disclosure incident occurs frequently as a problem to our society's most important and sensitive social agenda is emerging. Personal information is actually more accurate, depending on the type or types of economic value and sensitivity, the quality of the information, because it can cause a spill a serious social threat and systematic personal information protection and management are not carried out and the information society in a big mess can result. Customers my affairs when small guard security companies, especially the sensitive personal information of customers who need to work, the collected information be leaked or the company's trade secrets, are exposed on the outside, it could be a serious threat to a greater problem cause. Small escort guard companies, however, compared with large companies to build its own security system, due to issues such as the extent of funding, staffing shortages, there are many difficulties. Status of Information Security, scale and analyze the characteristics of small escort guard companies occupied by guard security companies in the present study, sleep, look at him in the solution of the practical issues of information protection system laid small guard. Expenses supplier of propose a security system for preventing the leakage of personal information.