• Title/Summary/Keyword: threat value

Search Result 168, Processing Time 0.024 seconds

A Brief Review on Limestone Sources and Oyster Waste Generation-Bantayan

  • Yu, Kwang Sun;Thriveni, Thenepalli;Jegal, Yujin;Whan, Ahn Ji
    • Journal of Energy Engineering
    • /
    • v.26 no.1
    • /
    • pp.62-67
    • /
    • 2017
  • Limestone is an important commodity in Philippines. Limestone has numerous uses that range from agricultural applications to building materials to medicines. Many limestone products require rock with specific physical and chemical characteristics. Most limestone is biochemical in origin meaning the calcium carbonate in the stone originated from shelled oceanic creatures. In this paper, we reported the natural sources of limestone, geological formation of limestone and the oyster shell waste in Cebu, Bantayan, Philippines were reported. Due to the mining or quarrying in Cebu, Bantayan, in a limestone area poses the threat of groundwater pollution (since limestone is a porous geologic formation with a high transmissivity). The other environmental issue is oyster shell waste. The oyster shell waste is the major source of limestone. We developed and applied appropriate technologies for the extraction of limestone from oyster shell waste and utilizes as high value added material.

Detecting Anomalies in Time-Series Data using Unsupervised Learning and Analysis on Infrequent Signatures

  • Bian, Xingchao
    • Journal of IKEEE
    • /
    • v.24 no.4
    • /
    • pp.1011-1016
    • /
    • 2020
  • We propose a framework called Stacked Gated Recurrent Unit - Infrequent Residual Analysis (SG-IRA) that detects anomalies in time-series data that can be trained on streams of raw sensor data without any pre-labeled dataset. To enable such unsupervised learning, SG-IRA includes an estimation model that uses a stacked Gated Recurrent Unit (GRU) structure and an analysis method that detects anomalies based on the difference between the estimated value and the actual measurement (residual). SG-IRA's residual analysis method dynamically adapts the detection threshold from the population using frequency analysis, unlike the baseline model that relies on a constant threshold. In this paper, SG-IRA is evaluated using the industrial control systems (ICS) datasets. SG-IRA improves the detection performance (F1 score) by 5.9% compared to the baseline model.

Sustainability of pensions in Asian countries

  • Hyunoo, Shim;Siok, Kim;Yang Ho, Choi
    • Communications for Statistical Applications and Methods
    • /
    • v.29 no.6
    • /
    • pp.679-694
    • /
    • 2022
  • Mortality risk is a significant threat to individual life, and quantifying the risk is necessary for making a national population plan and is a traditionally fundamental task in the insurance and annuity businesses. Like other advanced countries, the sustainability of life pensions and the management of longevity risks are becoming important in Asian countries entering the era of aging society. In this study, mortality and pension value sustainability trends are compared and analyzed based on national population and mortality data, focusing on four Asian countries from 1990 to 2017. The result of analyzing the robustness and accuracy of generalized linear/nonlinear models reveals that the Cairns-Blake-Dowd model, the nonparametric Renshaw-Haberman model, and the Plat model show low stability. The Currie, CBD M5, M7, and M8 models have high stability against data periods. The M7 and M8 models demonstrate high accuracy. The longevity risk is found to be high in the order of Taiwan, Hong Kong, Korea, and Japan, which is in general inversely related to the population size.

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

A method for quantitative measuring the degree of damage by personal information leakage (개인 정보 노출에 대한 정량적 위험도 분석 방안)

  • Kim, Pyong;Lee, Younho;Khudaybergenov, Timur
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.395-410
    • /
    • 2015
  • This research defines the degree of the threat caused by the leakage of personal information in a quantitative way. The proposed definition classifies the individual items in a personal data, then assigns a risk value to each item. The proposed method considers the increase of the risk by the composition of the multiple items. We also deals with various attack scenarios, where the attackers seek different types of personal information. The concept of entropy applies to associate the degree of the personal information exposed with the total risk value. In our experiment, we measured the risk value of the Facebook users with their public profiles. The result of the experiment demonstrates that they are most vulnerable against stalker attacks among four possible attacks with the personal information.

China Shocks to Korea's ICT Exports

  • Ko, Dong-Whan
    • Journal of Korea Trade
    • /
    • v.25 no.4
    • /
    • pp.146-163
    • /
    • 2021
  • Purpose - This paper examines China's impact on Korea's ICT exports considering the direct competition channel, the production shift channel, and the indirect demand channel at once. This paper also takes China's economic rebalancing into account and discusses whether it makes any differences in the effect of the three channels. Design/methodology - To quantify the effect of the three channels, I constructed a linear panel regression model and estimated it with various estimation methods including the system GMM. China's exports toward the same destination as Korea's exports, Korea's exports toward China, and the third countries' exports toward China respectively reflect the three channels. China's GVC indicators are included as well to evaluate the effect of further China's economic rebalancing. Since the present paper has a greater interest in the effect of China rather than the determinant of bilateral trade, a (fixed effect) panel model becomes more appropriate than the gravity model because timeinvariant variables in the gravity model, such as the distance and the language, are eliminated during the estimation process. Findings - The estimation results indicate that Chinese ICT exports are complementary to Korea's ICT exports in general. However, when markets are considered in subgroups, China's ICT exports could have a negative effect in the long run, especially for SITC75 and SITC76 markets, implying a possible competitive threat of China. The production shift effect turns significant during China's economic rebalancing in the markets for the advanced economies and the SITC76 product. China's indirect demand channel is also in effect significantly for the advanced economy and SITC75 commodities during China's economic rebalancing periods. In addition, this paper shows that China's transition toward upstream in the global value chain could have a positive impact on Korea's ICT exports, especially at the Asian market. Originality/value - The contribution of this paper is threefold. First, it focuses on the ICT industry for which Korea increasingly depends on China and China becomes a global hub of the GVC. Second, this paper quantitatively studies three channels in a model in contrast to the literature which mostly examines those channels separately and pays less attention to the GVC aspect. Third, by utilizing relatively recent data from the period of 2001-2017, this paper discusses whether China's economic rebalancing affects the three channels.

Population structure and regeneration of Zanthoxylum armatum DC. in Salyan, Nepal

  • Phuyal, Nirmala;Jha, Pramod Kumar;Raturi, Pankaj Prasad;Rajbhandary, Sangeeta
    • Journal of Ecology and Environment
    • /
    • v.46 no.2
    • /
    • pp.111-125
    • /
    • 2022
  • Background: Zanthoxylum armatum is one of the 30 prioritized medicinal plants for economic development of Nepal with a high trade value. Understanding the ecology of individual species is important for conservation and cultivation purposes. However, relation of ecological factors on the distribution and populations of Z. armatum in Nepal remain unknown. To address this knowledge gap, an attempt has been made to study the population structure, distribution, and regeneration potentiality of Z. armatum. Vegetation sampling was conducted at six different localities of Salyan district along the elevation range of 1,000 m to 2,000 m. Results: Altogether 50 plant species belonging to 44 genera under 34 families were found to be associated with Z. armatum. Significantly higher species richness was found at Rim (1,400-1,700 m) and Chhatreshwori (1,800-2,000 m) and lower at Kupinde (1,600-1,800 m). The highest population density of Z. armatum was at Kupinde (1,600-1,800 m) with a total of 1,100 individuals/ha. and the lowest at Chhatreshwori (1,800-2,000 m) with 740 individuals/ha. Based on the A/F value (Whitford index), it can be said that Z. armatum has random distribution in the study area. The plants were categorized into seedlings, saplings and adults based on plant height and the status of natural regeneration category determined. The regeneration potentiality of Z. armatum in the study area was fair with the average seedlings and saplings densities of 150 and 100 individuals/ha. Respectively. A Shannon-Weinner index mean value of 2.8 was obtained suggesting high species diversity in the study area. Conclusions: The natural distribution and regeneration of Z. armatum is being affected in the recent years due to anthropogenic disturbances. Increasing market demand and unsustainable harvesting procedures are posing serious threat to Z. armatum. Thus, effective conservation and management initiatives are most important for conserving the natural population of Z. armatum in the study area.

A Study on the Accessibility of Web Resources via Citation Analysis (인용문헌에 나타난 웹 자원의 접근성에 관한 연구)

  • Kim, Hong-Ryul
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.1 s.59
    • /
    • pp.181-200
    • /
    • 2006
  • The purpose of this study is to analyze the accessibility of web resources contained in the references section of journal articles.1 was identified a total of 1,377 web citations for a major journal in information science over a ten year period. The results show that the accessible ratio of domestic web resources was at 40% and the ratio of foreign web resources about 50%. The accessible ratio of domain type web resources was shown 58% while the same ratio for file type web resources was 45%. This low accessibility of we resources in references poses threat to the overall value of journal articles.

The Impact of Patent Disputes on Firms' Subsequent Innovative Activity (특허분쟁이 기업의 향후 혁신 활동에 미치는 영향)

  • Lee, Jong-seon;Kim, Nami
    • Knowledge Management Research
    • /
    • v.21 no.1
    • /
    • pp.1-25
    • /
    • 2020
  • Although patents have mainly been considered as the results of the invention process, of late their value as strategic assets have increasingly been emphasized. Consequently, the competition for patents among firms has intensified, and the number of patent disputes have been steadily increasing. Patent disputes, which cause enormous expense and resource utilization, increase uncertainty and have been considered as a threat or problem for the firms involved. Patent disputes are expected to have a significant impact on the decision making about subsequent innovation activities. This study attempts to analyze the effect of patent disputes on the subsequent innovative activities of the firms that are sued. After experiencing litigation as defendants, we examine their subsequent patenting strategies. According to the results of the study, firms who are experiencing patent litigation are more likely to achieve high-quality patents and cite recent technology when they apply for patents. Meanwhile, patent litigation experience has been shown to negatively affect the amount of subsequent patents applied. This study increases understanding by examining whether patent disputes, which have been mainly recognized negatively as obstacles, can be an opportunity that comes during a crisis.

Design and Implementation for Card Holder Initiated Card Payment System Using the Mobile Devices (모바일 기기를 활용한 고객 개시 카드결제 시스템 설계 및 구현)

  • Seo, Moon Seog
    • Journal of Information Technology Services
    • /
    • v.13 no.4
    • /
    • pp.245-254
    • /
    • 2014
  • Payment system is defined as the various contracts and operating facilities for the transfer of monetary value to clear the relationship between credit and debt. Payment systems essentially require the efficient and reliable operations. Card-based payment systems are developed practically and creatively in accordance with the progress of ICT. Especially in mobile environment with intelligent mobile devices such as smart-phones and tablets, a variety of payment services are provided. Existing card-based payment services are configured by the payment transaction initiated by the merchants card acceptance and then swiping into the CAT (Card Authorization Terminal) to begin the transaction. The merchant initiated payment services are now applied to the Wireless CAT (W-CAT) for mobile environment. That kind of payment services cause many problems such the illegal card information leaks and the lingering threat of W-CAT theft. Also, the use of many W-CATs increased cost to the merchant. In this paper, we propose the card holder initiated card payment system using the intelligent mobile devices in mobile environment for solving problems of the existing merchant initiated card payment system and coping effectively with the activation of a wireless data network and changes of information technology.