• Title/Summary/Keyword: 취약성 지도

Search Result 1,860, Processing Time 0.025 seconds

Study on the Vulnerabilities of Automatic Speech Recognition Models in Military Environments (군사적 환경에서 음성인식 모델의 취약성에 관한 연구)

  • Elim Won;Seongjung Na;Youngjin Ko
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.201-207
    • /
    • 2024
  • Voice is a critical element of human communication, and the development of speech recognition models is one of the significant achievements in artificial intelligence, which has recently been applied in various aspects of human life. The application of speech recognition models in the military field is also inevitable. However, before artificial intelligence models can be applied in the military, it is necessary to research their vulnerabilities. In this study, we evaluates the military applicability of the multilingual speech recognition model "Whisper" by examining its vulnerabilities to battlefield noise, white noise, and adversarial attacks. In experiments involving battlefield noise, Whisper showed significant performance degradation with an average Character Error Rate (CER) of 72.4%, indicating difficulties in military applications. In experiments with white noise, Whisper was robust to low-intensity noise but showed performance degradation under high-intensity noise. Adversarial attack experiments revealed vulnerabilities at specific epsilon values. Therefore, the Whisper model requires improvements through fine-tuning, adversarial training, and other methods.

The Effect of Individuals' Vulnerability to the Different Sex's Physical Attractions on Their Own Acceptance of Extramarital Relationship and Intentions of Open Marriage (이성의 신체적 매력에 대한 취약성이 본인의 혼외관계 수용성 및 개방결혼의도에 미치는 영향)

  • Lee, Hee-Jin
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.7
    • /
    • pp.203-216
    • /
    • 2020
  • The purpose of this study is to reveal the effects of the VDSPA(Vulnerability to the Different Sex's Physical Attraction) on IOM(the intention of open marriages), the mediating effect of the SAEMR(Self Acceptance of Extra-Marital Relationship) and the moderating effect of gender. This is an empirical research based on data analysis obtained by surveying 655. The notable findings are as follow: First, respondents' perceptions of their own extramarital affairs(M=2.284) and open marriages(M=2.175) are generally negative, but women were more negative than men. Second, both men and women were vulnerable to the physical attraction of the opposite sex(M=3.569), especially men than women. Third, the more vulnerable to the physical attraction of the opposite sex, the more receptive to their own infidelity. The more receptive to their own extramarital affair, the more clear their intention to open marriage. Lastly, in the case of women, it is confirmed that the vulnerability of the physical attraction of the opposite sex has a significant effect on the intention of an open marriage, with the acceptability of the one's own infidelity as a mediator. In the case of men, there is no mediating effect of accepting their own extramarital affairs, which proved to be a moderating effect by gender. Unlike men, in the case of women, it is concluded that 'accepting their own extramaritality is a critical factor that directly or indirectly has a significant effects on their intention to open marriage.

Research on Education and Training of the Analyzer for Security Enhancement of SW Vulnerability (SW 취약점의 보안성 강화를 위한 진단원의 교육 양성 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.5
    • /
    • pp.945-950
    • /
    • 2017
  • Due to the vulnerability of the software, there is a hacking attack on the country's cyber infrastructure and real financial assets. Software is an integral part of the operating system and execution system that controls and operates Internet information provision, cyber financial settlement and cyber infrastructures. Analyzing these software vulnerabilities and enhancing security will enhance the security of cyber infrastructures and enhance the security of actual life in the actual country and people. Software development security system analysis and software development Security diagnosis analysis and research for enhancing security of software vulnerability. In addition, we will develop a textbook for the training of software vulnerability diagnosis and maintenance education, develop pilot test problems, pilot test of diagnostic staff, The purpose of this study is to enhance the software security of the cyber infrastructures of national and national life by presenting curriculum and diagnosis guide to train the software vulnerability examiner.

Assessment of Landslide on Climate Change using GIS (GIS를 이용한 기후변화에 따른 산사태 취약성 평가)

  • Xu, Zhen;Kwak, Hanbin;Lee, Woo-Kyun;Park, Taejin;Kwon, Tae-Hyub;Park, Sunmin
    • Journal of Climate Change Research
    • /
    • v.2 no.1
    • /
    • pp.43-54
    • /
    • 2011
  • Recently, due to severe rainfall by the global climate change, natural disasters such as landslide had also been increased rapidly all over the world. Therefore, it has been very necessary to assess vulnerability of landslide and prepare adaptation measures to future climate change. In this study, we employed sensitivity, exposure and adaptative capacity as criteria for assessing the vulnerability of landslide due to climate change. Spatial database for the criteria was constructed using GIS technology. And vulnerability maps on the entire Korea of past and future were made based on the database. As a result, highly vulnerable area for landslide was detected in most area of Gangwon-do, the east of Gyeonggi-do, and southeast of Jeollanam-do, and the southwest of Gyeongsangnam-do. The result of landslide vulnerability depends on time shows that degree of very low class and low class were decreased and degree of moderate, high, and very high were increase from past to the future. Especially, these three classes above low class were significantly increased in the result of far future.

A Study on Vulnerability Function of Residential Building Using Expert Opinion (전문가의견을 활용한 주거건물 손상함수 개발)

  • Kim, Gilho;Choi, Cheonkyu;Hong, Seungjin;Kim, Kyungtak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.339-339
    • /
    • 2017
  • 손상함수란 건물, 차량, 농작물 등과 같은 피해대상물에 재난강도에 따른 취약도(vulnerability)를 정량화한 함수로, 재난리스크 모델에서 널리 사용되는 개념이다. 홍수재난에서 손상함수는 일반적으로 피해지역에서 조사된 경험적 피해자료(empirical data)를 활용하거나, 표준화된 피해대상물에 대한 손상성을 전문가의 의견(expert opinion)을 참고하여 개발된다. 이때, 취약도를 설명하는 설명변수는 일반적으로 침수심(inundation depth)이 사용되며, 그에 따른 취약도는 손상률(percent damage)로서 상대함수 형태가 일반적이다. 본 연구는 주거건물(residential building)에 대한 손상함수 개발을 위해 자연재난 손해사정 경력자(8인)를 대상으로 표준화된 주거건물(단독주택, 아파트, 연립/다세대주택)에 대해 침수에 따른 건물 손상성을 조사하였다. 주거건물 손상성을 설명하는 최대범위는 건물내부 바닥고를 기준으로 침수심 3m까지이며, 침수심 변화에 따른 손상성을 건물신축 공종에 따라 질의하고 이를 종합하였다. 조사과정은 (1) 표준건물에 대한 정의, (2) 공종별 침수에 따른 손상여부 질의, (3) 공종별 최대 손상률 평가 및 주요 피해내역 토의, (4) 공종별 침수심에 따른 손상률 평가, (5) 결과종합의 단계로 진행되었고, 이를 통해 주거건물 유형에 따른 손상함수를 개발할 수 있었다. 본 연구에서 개발된 손상함수는 다양한 침수높이에서 주거건물에 대한 취약도를 설명하는 데 장점이 있으나, 그 결과는 향후 홍수피해지역을 대상으로 수집된 다양한 피해조사 결과와 비교하여 보완될 필요가 있다.

  • PDF

도시형화재에 있어서 중국대도시 시가지의 구조적 취약성

  • 최영수
    • Fire Science and Engineering
    • /
    • v.5 no.1
    • /
    • pp.74-78
    • /
    • 1991
  • 본 케이스 스타디는 1983년 4월 17일 중국 하얼빈에서 일어났던 도시형 화재를 통하여 근대화가 급속히 이루어지고 있는 중국의 대도시, 특히 도상시가지에서의 생활양식과 도시구조의 격변, 이에 따른 안전과의 관련을 찾아내고자 하는 시도이다.

  • PDF

Vulnerability Analysis in the Nakdong River Basin for the Utilization of Flood Risk Mapping (홍수위험지도 활용을 위한 낙동강 유역에서의 홍수취약도 분석)

  • Kim, Tae-Hyung;Han, Kun-Yeun;Cho, Wan-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.14 no.3
    • /
    • pp.203-222
    • /
    • 2011
  • The characteristics of flood damages have been increasingly strengthened and take the form of unpredictable and unusual weather phenomena caused by climate change and climate anomalies. To prevent inundation damage caused by breach of hydraulic structure such as dam or levee, and trouble of drainage of inner basin, the prediction necessity of flood inundation area, flood risk analysis, and drawing flood risk maps have been on the rise, and the national flood risk maps have been produced. In this study, the quantitative flood vulnerability analysis was performed, which represents population living within flood-affected areas, types of economic activities, facilities affected by flood, in order to extend flood risk mapping from simple hazard concept into risk based idea. By applying it to Nakdong River basin, the flood vulnerability indices were estimated to draw flood risk maps subdivided into administrative districts. The result of this study can be applied to establish the disaster prevention measures and priority decision of disaster prevention project.

Classification of Cities in the Metropolitan Area based on Natural Hazard Vulnerability (기후변화 대응을 위한 광역도시권 차원의 자연재해 저감방안 연구 -자연재해 취약성에 따른 수도권 도시의 유형화-)

  • Shim, Jae Heon;Kim, Ja Eun;Lee, Sung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.11
    • /
    • pp.5534-5541
    • /
    • 2012
  • This paper classifies cities in the metropolitan area based on natural hazard vulnerability. The procedure of our empirical analysis is divided into three parts as follows: First, it summarizes variables related to natural hazard vulnerability to significant factors, carrying out principal component analysis. Second, it classifies cities in the metropolitan area, conducting cluster analysis using factor scores. Lastly, it proposes differential measures for natural hazard mitigation for classified cities in the metropolitan area, based on natural hazard vulnerability.

A Course Scheduling Multi-module System based on Web using Algorithm for Analysis of Weakness (취약성 분석 알고리즘을 이용한 웹기반 코스 스케줄링 멀티 모듈 시스템)

  • 이문호;김태석;김봉기
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.3
    • /
    • pp.290-297
    • /
    • 2002
  • The appearance of web technology has accelerated the role of the application of multimedia technology, computer communication technology and multimedia application contents. Recently WBI model which is based on web has been proposed in the part of the new activity model of teaching-teaming. How to learn and evaluate is required to consider individual learner's learning level. And it is recognized that the needs of the efficient and automated education agents in the web-based instruction is increased But many education systems that had been studied recently did not service fluently the courses which learners had been wanting and could not provide the way for the learners to study the learning weakness which is observed in the continuous feedback of the course. In this paper we propose design of multi-module system for course scheduling of learner-oriented using weakness analysis algorithm. First proposed system monitors learner's behaviors constantly, evaluates them, and calculates his accomplishment and weakness. From this weakness the multi-agent prepares the learner a suitable course environment to strengthen his weakness. Then the learner achieves an active and complete teaming from the repeated and suitable course.

  • PDF

Response Technique for the Vulnerability of Broadcast Intent Security in Android (안드로이드 브로드캐스트 인텐트의 보안 취약성 대응기법)

  • Lim, Jae-Wan;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.61-67
    • /
    • 2012
  • Accordingly the number of smart-phone-based malicious codes is also increasing and their techniques for malicio us purpose are getting more clever and evolved. Among them, the malicious codes related to Android take the major portion and it can be estimated that they are based on open source so that the access to the system is easy. Intent is a technique to support the communication between application's components by transmitting message subjects in Android. Intent provides convenience to developers, but it can be utilized as security vulnerability that allows the developer with a malicious purpose to control the system as intended. The vulnerability of intent security is that personal information can be accessed using discretionally its proper function given to application and smart phone's functions can be maliciously controlled. This paper improves with the Intent security vulnerability caused by the smart phone users' discretional use of custom kernel. Lastly, it verifies the malicious behaviors in the process of installing an application and suggests a technique to watch the Intent security vulnerability in realtime after its installation.