• Title/Summary/Keyword: Alert system

Search Result 361, Processing Time 0.026 seconds

Investigation of Criterion on Harmful Algae Alert System using Correlation between Cell Numbers and Cellular Microcystins Content of Korean Toxic Cyanobacteria (한국산 유독 남조류의 독소함량을 근거로 한 조류경보제 발령기준 검토)

  • Park, Hae-Kyung;Kim, Hwabin;Lee, Jay J.;Lee, Jae-An;Lee, Haejin;Park, Jong-Hwan;Seo, Jungkwan;Youn, Seok-Jea;Moon, Jeongsuk
    • Journal of Korean Society on Water Environment
    • /
    • v.27 no.4
    • /
    • pp.491-498
    • /
    • 2011
  • We investigated the ranges of total cellular microcystins content of cyanobacterial blooms collected in Korean lakes and rivers from 2005 to 2009. The amount and composition of microcystins of Korean cyanobacteria varied depending on the sampling water bodies and dominant cyanobacterial genera. Toxic cyanobacterial cell numbers equivalent to $1{\mu}g$ MCYSTs/L using total cellular microcystin content of Korean cyanobacteria were in the range of 2,348 to 66,980,638 cells/mL. Only four samples among forty nine samples showed less cell numbers than current criterion of Harmful Algae Alert System, 5,000 cells/mL indicating current criterion do not reflect properly the microcystins content of Korean cyanobacteria. Anabaena and Aphanizomenon spp. showed three to six times higher cell numbers equivalent to $1{\mu}g$ MCYSTs/L than Microcystis spp. To propose criteria of Harmful Algae Alert System for Korean toxic cyanobacteria, we calculated about 50% selective geometrical means of cyanobacterial cell numbers equivalent to $1{\mu}g$ MCYSTs/L in order of toxic content. The proposed criteria for Microcystis, Oscillatoria, Anabaena, and Aphanizomenon spp., are 10,000, 20,000, 40,000, and 80,000 cells/mL, respectively.

Mobile Edge Computing based Building Disaster Alert System Implementation (Mobile Edge Computing을 활용한 건물 재난 알림 시스템 구축 방안)

  • Ha, Taeyoung;Kim, Jungsung;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.18 no.4
    • /
    • pp.35-42
    • /
    • 2017
  • In this paper, a building disaster notification system with MEC (Mobile Edge Computing) technology is proposed, which informs people in a building about the disaster. The overview of MEC is presented, and the structure and characteristics of network using MEC are described. In addition, the characteristics of a enterprise integration pattern based Apache Camel is described, and how to implement MEC with Apache Camel is presented. Finally, an implementation method of building disaster notification system with Apache Camel based MEC is proposed to quickly recognize disasters through sensors and to rapidly evacuate people from buildings.

Developmental Plan of Man-Overboard Alert Devices of Small Fishing Vessels: A Study (소형어선의 선외추락 경보장치 개발 방안 연구)

  • Kim, Jae-Won;Kim, Byung-Ok;Lim, Jung-Gyun;Lee, Ju-Han;Yim, Jea-Hong;Park, Dong-Kook
    • Journal of Navigation and Port Research
    • /
    • v.42 no.4
    • /
    • pp.245-252
    • /
    • 2018
  • A method of transmitting an alert signal in case of man-overboard (MOB) systems in a small fishing vessel navigating within coastal area is being operated as VHF-DSC equipment via a distress alert button and V-P ass Equipment via alert button or beacon separation. However, a small fishing vessel with a couple of crews on board is an inappropriate way to alert a man-overboard condition. However, internationally, MOB equipment using VHF-DSC, AIS, and Bluetooth technologies is used to transmit alert signals directly to the mother ship and other radio stations. In order to analyze the performance and technology of the MOB equipment operating in foreign countries, it was confirmed that the alarm signal can be received within a maximum of one nautical mile when the MOB device is on the water surface. An MOB device that meets domestic conditions needs to send an alarm signal to a station within the VHF communication range. However, in order to reduce the false alert signal, it is most appropriate to operate the VHF-DSC radio equipment installed on the ship remotely. Analysis of various technologies connecting the MOB and the VHF-DSC revealed that the Bluetooth system has advantages such as device miniaturization. When an emergency signal is transmitted from the MOB device, it can be received by a dedicated receiver and recognized through an external input terminal of the VHF-DSC equipment generating its own alarm. If the emergency situation cannot be processed at the mother ship, a distress alert is sent to all radio stations via VHF-DSC for response under emergencies faced by small fishing vessels.

An Improved Location Polling Algorithm for Location-Based Alert Services (위치기반 경보서비스를 위한 향상된 위치획득 알고리즘)

  • Song, Jin-Woo;Ahn, Byung-Ik;Lee, Kwang-Jo;Han, Jung-Suk;Yang, Sung-Bong
    • Journal of KIISE:Databases
    • /
    • v.37 no.1
    • /
    • pp.22-32
    • /
    • 2010
  • Location-based services have been expanded rapidly in local and overseas markets due to technological advances and increasing applications of wireless internet. Various researches have been made to manage efficiently the location information of moving objects. A basic location-based alert service provides alerting messages automatically when either entering or leaving a specific location and it is expected to become one of the most important location-based services. Location-based alert services require a location polling method to acquire current locations for a large number of moving objects. However, a simple periodical location polling method causes severe system overload because a system should keep updating location information of the moving objects ceaselessly. Most location polling algorithms for location-based alerting services are not suitable for mobile users with dynamic and unsteady moving patterns. In this paper, we propose an improved location polling algorithm for location-based alerting services to reduce the amount of location information acquisition and therefore, to decrease the system load. Various experiments show that the proposed algorithm outperforms other algorithms.

A Practical Effectiveness Analysis on Alert Verification Method Based on Vulnerability Inspection (취약점 점검을 활용한 보안이벤트 검증 방법의 실증적 효과분석)

  • Chun, Sung-Taek;Lee, Youn-Su;Kim, Seok-Hun;Kim, Kyu-Il;Seo, Chang-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.11
    • /
    • pp.39-49
    • /
    • 2014
  • Cyber threats on the Internet are tremendously increasing and their techniques are also evolving constantly. Intrusion Detection System (IDS) is one of the powerful solutions for detecting and analyzing the cyber attacks in realtime. Most organizations deploy it into their networks and operate it for security monitoring and response service. However, IDS has a fatal problem in that it raises a large number of alerts and most of them are false positives. In order to cope with this problem, many approaches have been proposed for the purpose of automatically identifying whether the IDS alerts are caused by real attacks or not. In this paper, we present an alert verification method based on correlation analysis between vulnerability inspection results for real systems that should be protected and the IDS alerts. In addition, we carry out practical experiments to demonstrate the effectiveness of the proposed verification method using two types of real data, i.e., the IDS alerts and the vulnerability inspection results.

Correlation between Paldang Reservoir Discharge and Causes of Algal Blooming (팔당호 방류량과 조류발생요인들의 상관성)

  • Yoo, Hosik;Lee, Byonghi;Rhee, Seung-Whee
    • Journal of the Korea Organic Resources Recycling Association
    • /
    • v.21 no.3
    • /
    • pp.93-98
    • /
    • 2013
  • Main causes of algal bloom was studied in Paldang reservoir. Statistical approach was tried using meteorological and water quality data. Algae alert system showed that more than ten days were counted in a year, once it happened in Paldang reservoir. Alert dates increased in recent 5 years. Correlation coefficients between chlorophyll-a and other indexes did not showed strong relations resulting in coefficients less than 0.4. Among them, sunshine duration, BOD, and flow rate were appeared relatively main causes of algal blooming. Sunshine duration and BOD showed positive relation while flow rate did negative one, which is resonable for photosynthetic microorganisms. Water temperature and total phosphorus, which were presumed probable main causes before study, resulted in low correlation coefficients. Correlation coefficients between discharge flow and rainfall, water temperature showed positive relation due to seasonal effect.

An Efficient Method for Analyzing Network Security Situation Using Visualization (시각화 기반의 효율적인 네트워크 보안 상황 분석 방법)

  • Jeong, Chi-Yoon;Sohn, Seon-Gyoung;Chang, Beom-Hwan;Na, Jung-Chan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.107-117
    • /
    • 2009
  • Network administrator recognizes the abnormal phenomenon in the managed network by using the alert messages generated in the security devices including the intrusion detection system, intrusion prevention system, firewall, and etc. And then the series of task, which searches for the traffic related to the alert message and analyzes the traffic data, are required to determine where the abnormal phenomenon is the real network security threat or not. There are many alert messages to have to inspect in order to determine the network security situation. Also the much times are needed so that the network administrator can analyze the security condition using existing methods. Therefore, in this paper, we proposed an efficient method for analyzing network security situation using visualization. The proposed method monitors anomalies occurred in the entire IP address's space and displays the detail information of a security event. In addition, it represents the physical locations of the attackers or victims by linking GIS information and IP address. Therefore, it is helpful for network administrator to rapidly analyze the security status of managed network.

Study on the Modelling of Algal Dynamics in Lake Paldang Using Artificial Neural Networks (인공신경망을 이용한 팔당호의 조류발생 모델 연구)

  • Park, Hae-Kyung;Kim, Eun-Kyoung
    • Journal of Korean Society on Water Environment
    • /
    • v.29 no.1
    • /
    • pp.19-28
    • /
    • 2013
  • Artificial neural networks were used for time series modelling of algal dynamics of whole year and by season at the Paldang dam station (confluence area). The modelling was based on comprehensive weekly water quality data from 1997 to 2004 at the Paldang dam station. The results of validation of seasonal models showed that the timing and magnitude of the observed chlorophyll a concentration was predicted better, compared with the ANN model for whole year. Internal weightings of the inputs in trained neural networks were obtained by sensitivity analysis for identification of the primary driving mechanisms in the system dynamics. pH, COD, TP determined most the dynamics of chlorophyll a, although these inputs were not the real driving variable for algal growth. Short-term prediction models that perform one or two weeks ahead predictions of chlorophyll a concentration were designed for the application of Harmful Algal Alert System in Lake Paldang. Short-term-ahead ANN models showed the possibilities of application of Harmful Algal Alert System after increasing ANN model's performance.

A Study on Intrusion Alert Redustion Method for IDS Management (침입탐지 시스템 관리를 위한 침입경보 축약기법 적용에 관한 연구)

  • Kim, Seok-Hun;Jeong, Jin-Young;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.1-6
    • /
    • 2005
  • Today the malicious approach and information threat against a network system increase and, the demage about this spread to persnal user from company. The product which provides only unit security function like an infiltration detection system and an infiltration interception system reached the limits about the composition infiltration which is being turn out dispersion anger and intelligence anger Necessity of integrated security civil official is raising its head using various security product about infiltration detection, confrontation and reverse tracking of hacker. Because of the quantity to be many analysis of the event which is transmitted from the various security product and infiltration alarm, analysis is difficult. So server is becoming the charge of their side. Consequently the dissertation will research the method to axis infiltration alarm data to solve like this problem.

  • PDF

Implementation of One-Stop Service System on Domestic & Foreign Technology Information (국내외 기술정보의 연계 서비스 체제 구축)

  • Seo, Jin-Ny;Noh, Kyung-Ran
    • Journal of Information Management
    • /
    • v.32 no.1
    • /
    • pp.1-22
    • /
    • 2001
  • In traditional environment, user must search each journal OPAC, bibliographic DB, and full-text DB and E-Journal separately until user finds scientific and technology informations that he needs. The purpose of this study is to build one-click service system of Journals that supports integrating search. This system provides various functions, such as, journal browsing, journal search, article search, alert function, my library, document delivery service by integrating databases and electronic journals. Users search all information sources through journal OPAC and acquire journal full-text by single interface.

  • PDF