• Title/Summary/Keyword: violations

Search Result 356, Processing Time 0.028 seconds

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

Design Methodology of Automotive Wheel Bearing Unit with Discrete Design Variables (이산 설계변수를 포함하고 있는 자동차용 휠 베어링 유닛의 설계방법)

  • 윤기찬;최동훈
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.9 no.1
    • /
    • pp.122-130
    • /
    • 2001
  • In order to improve the efficiency of the design process and the quality of the resulting design, this study proposes a design method for determining design variables of an automotive wheel-bearing unit of double-row angular-contact ball bearing type by using a genetic algorithm. The desired performance of the wheel-bearing unit is to maximize system life while satisfying geometrical and operational constraints without enlarging mounting spae. The use of gradient-based optimization methods for the design of the unit is restricted because this design problem is characterized by the presence of discrete design variables such as the number of balls and standard ball diameter. Therefore, the design problem of rolling element bearings is a constrained discrete optimization problem. A genetic algorithm using real coding and dynamic mutation rate is used to efficiently find the optimum discrete design values. To effectively deal with the design constraints, a ranking method is suggested for constructing a fitness function in the genetic algorithm. A computer program is developed and applied to the design of a real wheel-bearing unit model to evaluate the proposed design method. Optimum design results demonstrate the effectiveness of the design method suggested in this study by showing that the system life of an optimally designed wheel-bearing unit is enhanced in comparison with that of the current design without any constraint violations.

  • PDF

U.S. Consumers' Motivations for Purchasing and Not Purchasing Fashion Counterfeit Goods

  • Kim, Hye-Jeong;Latour, Brittany N.
    • International Journal of Costume and Fashion
    • /
    • v.12 no.1
    • /
    • pp.11-27
    • /
    • 2012
  • This study explores U.S. consumers' perceptions about fashion counterfeit goods and counter feiting and motivations for purchasing and not purchasing those goods. A qualitative research technique utilizing self-administered essay questions was used to collect data. A convenience sample of female college students(N=128) drawn from classes at Midwestern and Southern universities in the U.S. participated in this study. This study found that a majority of consumers tended to perceive that fashion counterfeit goods are merely imitations of the legitimate goods and that counterfeiting is producing and selling fake goods, but a small number of consumers associated those goods with illegally produced goods and illegal practices or violations of intellectual property rights. The major motivations for purchasing counterfeit fashion goods were found to be price/value consciousness, appearance of counterfeit goods, status consumption, availability of the goods, desire for souvenirs, and social(family and peer) influences. In addition, the major deterrents to purchasing these goods were identified as integrity/ethical judgment, poor quality of counterfeit goods, self-image/status, and unavailability of the goods. This study provides policy makers and anti-counterfeit coalitions with information to develop effective educational programs or campaigns to influence consumers' counterfeit fashion purchasing behavior.

A Study on the Effects of Nuclear Power Plant Workers and Organizational Characteristics on Accidents (원전 종사자 및 조직 특성이 사고에 미치는 영향)

  • Kim, Byung-Suk;Jo, Hyun-Woong;Oh, Youngmin
    • Korean System Dynamics Review
    • /
    • v.15 no.2
    • /
    • pp.5-25
    • /
    • 2014
  • The purpose of this study is to analyze the effects of nuclear power plant workers and organizational characteristics on accidents, and seek the combination of policies for reducing accidents. For this purpose, it grasped, by using System Dynamics and Causal Loop Diagram, how various factors that cause accidents in nuclear plants are interrelated, and performed simulations after building simulation models. As a result of the analysis, first, the fundamental cause of safety accidents in nuclear power plants turned out to be the time constraint on the workload. Second, it turned out that as the workload of workers increases, physical and mental stresses increase, thereby increasing accidents due to errors and violations. Third, it turned out that as the levels of educational training and compliance with regulations and procedures are enhanced, accidents are reduced. Lastly, it turned out that as the combination of policies (reliance level + working environment + educational training + compliance with regulations and procedures) is increased, accidents are reduced. Especially, it turned out that if the combination of policies is increased by 30%, more than 10 cases of accidents are reduced.

  • PDF

Comparing the Effectiveness of Punishment Severity and Policy Means on Traffic Laws Violating Drivers (위법운전자에 대한 제재 수준과 정책수단 선택의 교통안전효과 비교)

  • Myeong, Myo-Hee;kim, Kwang-Sik
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.1
    • /
    • pp.89-100
    • /
    • 2008
  • The purpose of this paper is to analyze the differences between the severity of punishments for traffic laws related offenders and the choice of policy measures with a view to reducing traffic accidents. To this end, government data on the drivers given a sentence of license suspension or revocation were collected and analyzed in terms of sex, age, type of driver's license, driving career, number of traffic laws violations, and number of traffic accidents generated. The statistics of analysis of covariance and tests of significance were used and conducted to compare the effectiveness of punishment for the penalty and the incentive groups. The results showed that the incentive policy measure on the drivers who violate traffic regulations repeatedly is more effective to reduce the number of traffic offenders and traffic accidents.

A new hybrid optimization algorithm based on path projection

  • Gharebaghi, Saeed Asil;Ardalan Asl, Mohammad
    • Structural Engineering and Mechanics
    • /
    • v.65 no.6
    • /
    • pp.707-719
    • /
    • 2018
  • In this article, a new method is introduced to improve the local search capability of meta-heuristic algorithms using the projection of the path on the border of constraints. In a mathematical point of view, the Gradient Projection Method is applied through a new approach, while the imposed limitations are removed. Accordingly, the gradient vector is replaced with a new meta-heuristic based vector. Besides, the active constraint identification algorithm, and the projection method are changed into less complex approaches. As a result, if a constraint is violated by an agent, a new path will be suggested to correct the direction of the agent's movement. The presented procedure includes three main steps: (1) the identification of the active constraint, (2) the neighboring point determination, and (3) the new direction and step length. Moreover, this method can be applied to some meta-heuristic algorithms. It increases the chance of convergence in the final phase of the search process, especially when the number of the violations of the constraints increases. The method is applied jointly with the authors' newly developed meta-heuristic algorithm, entitled Star Graph. The capability of the resulted hybrid method is examined using the optimal design of truss and frame structures. Eventually, the comparison of the results with other meta-heuristics of the literature shows that the hybrid method is successful in the global as well as local search.

Drones flying and violations of privacy laws, such as riskon (드론비행과 사생활침해 등 법률위반 위험성 연구)

  • Jeong, Soonchae;Mfitumukiza, Joseph;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.22-27
    • /
    • 2017
  • In this paper, A heightened interest in the latest drone, yet steady increase in the field to exploit them. The next market is expected to be vastly improved, and use drone also increasingly will be strengthened. But also not a few side effects of him. In order to use safer and more commonly a drone safety and privacy protection, and there are many issues that need to be considered. Violating privacy laws, such as relations caused by the drone flight and review this study ways to resolve the breach. The flight due to a draw at peace with human life and behavior and enjoy it, but this problem created by new outbreak.

A Study on Probabilistic Reliability Evaluation by Using PRA (PRA를 이용한 확률론적 신뢰도 평가에 관한 연구)

  • Kwon, J.J.;Taan, T.T.;Jeong, S.H.;Bo, Shi;Choi, J.S.;Cha, J.M.;Yoon, Y.T.;Choi, H.S.;Jeon, D.H.
    • Proceedings of the KIEE Conference
    • /
    • 2006.11a
    • /
    • pp.27-29
    • /
    • 2006
  • This paper deals with the application of the concept of POM to analysis of power system behavior and describes a practical method of PRA for KEPCO system. This paper presents not only marginal power flow evaluation of KEPCO system in view point of physical and operation mode by using Physical and Operational Margins (POM Ver. 2.2), which is developed by V&R Energy System Research, but also by using Probabilistic Reliability Assessment (PRA Ver.3.1), which is developed by EPRI. The ability of the method to provide insights on root causes, weak points and regional causes and effects was shown. The approach offers fast and accurate determination of bottlenecks in the transmission network and optimal mitigation measures to alleviate the identified violations.

  • PDF

Protecting Copyright Owners in Nigeria: A Panacea for Intellectual Development

  • Owushi, Emmanuel
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2020
  • The paper looks at protecting copyright owners in Nigeria: a panacea for intellectual development. A descriptive survey design was adopted in carrying out the study. The sample size for the study was 112. Three research objectives guided the study. The study utilized a self-developed questionnaire for data collection. A total of 112 copies of the questionnaire were distributed to librarian and lecturers, out of which 108 copies were duly filled and returned, representing 96.4%. The collected data was arranged in frequency and analyzed using percentage and mean score. The findings revealed that protection of copyright will encourage creators of intellectual works, and that if authors are well remunerated there is likelihood of adequate availability of various publications to meet information needs of Nigerians. The result showed that the right to intellectual properties is one of the ways to encourage intellectual development. The finding revealed that copyright protection provides security for intellectual product and does not negatively affect the availability of intellectual materials. Based on the research findings, it was recommended that owners of intellectual property deserve good earnings for their intellectual works in order to promote Knowledge proliferation and availability so as to meet the reading needs of the citizens at the various levels. The study also recommended that all cases relating to copyright violation in our courts should be summarily dealt with. The study advocated that the provision on the punishment should be reviewed such that it could deter people from infringing on authors rights.

A Study of Methodology to Examine Organizational Root Causes through the Retrospect Error Analysis of Railroad Accident Cases

  • Ra, Doo Wan;Cha, Woo Chang
    • Journal of the Ergonomics Society of Korea
    • /
    • v.34 no.2
    • /
    • pp.103-113
    • /
    • 2015
  • Objective: This study proposes a systematic process to present the analysis methods and solutions of organizational root causes to human errors on the railroad. Background: In fact, organizational root cause such as organizational culture is an important factor in the safety concerns on human errors in the nuclear power plant, railroad and aircraft. Method: The proposed process is as follows: 1) define analysis boundary 2) select human error taxonomy 3) perform accident analysis 4) draw root causes with FGI 5) review root causes analysis with survey 6) chart analysis of root causes, and 7) propose alternatives and solutions. Results: As a result, root causes of the organizations like railroad and nuclear power plant came from the educational problems, violations, payoff system, safety culture and so forth. Conclusion: The proposed process does predict potential railroad accident through retrospect error analysis by building new human error taxonomies and problem solution. Application: This study would contribute to examination of the relationship between human error-based accidents and organizational root causes.