• Title/Summary/Keyword: Context Information Service

Search Result 955, Processing Time 0.029 seconds

A Study on the Response to Acts of Unlawful Interference by Insider Threat in Aviation Security (항공보안 내부자 위협에 의한 불법방해행위의 대응을 위한 연구)

  • Sang-hoon Lim;Baek-yong Heo;Ho-won Hwang
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.16-22
    • /
    • 2023
  • Terrorists have been attacking in the vulnerable points of aviation sector with the diverse methods of attacks. Recently, Vulnerability is increasing because the Modus Operandi of Terrorism is carried out by exploitation of people in the form of employee working in aviation sector whose role provides them with privileged access to secured locations, secured items or security sensitive information. Furthermore, cases of insider threat are rising across the world with the phenomenon of personal radicalization through internet and social network service. The government of ROK must respond to insider threat could exploit to acts of unlawful interference and the security regulations should be established to prevent from insider threat in advance refer to the acts of unlawful interference carried out in foreign countries and the recommendations by USA, UK and ICAO.

Network Traffic Analysis System Based on Data Engineering Methodology (데이터 엔지니어링 방법론을 기반으로한 네트워크 트래픽 분석 시스템)

  • Han, Young-Shin;Kim, Tae-Kyu;Jung, Jason J.;Jung, Chan-Ki;Lee, Chil-Gee
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.1
    • /
    • pp.27-34
    • /
    • 2009
  • Currently network users, especially the number of internet users, increase rapidly. Also, high quality of service is required and this requirement results a sudden network traffic increment. As a result, an efficient management system for huge network traffic becomes an important issue. Ontology/data engineering based context awareness using the System Entity Structure (SES) concepts enables network administrators to access traffic data easily and efficiently. The network traffic analysis system, which is studied in this paper, is designed and implemented based on a model and simulation using data engineering methodology to be avaiable in evaluating large network traffic data. Extensible Markup Language (XML) is used for metadata language in this system. The information which is extracted from the network traffic analysis system could be modeled and simulated in Discrete Event Simulation (DEVS) methodology for further works such as post simulation evaluation, web services, and etc.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

A study on the implementation of Medical Telemetry systems using wireless public data network (무선공중망을 이용한 의료 정보 데이터 원격 모니터링 시스템에 관한 연구)

  • 이택규;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.278-283
    • /
    • 2000
  • As information communication technology developed we could check our blood pressure, pulsation electrocardiogram, SpO2 and blood test easily at home. To check our health at ordinary times is able though interlocking the house medical instrument with the wireless public data network This service will help the inconvenience to visit the hospital everytime and will save the individual's time and cost. In each house an organism data which is detected from the human body will be transmitted to the distance hospital and will be essentially applied through wireless public data network The medical information transmit system is utilized by wireless close range network It would transmit the obtained organism signal wirelessly from the personal device to the main center system in the hospital. Remote telemetry system is embodied by utilizing wireless media access protocol. The protocol is embodied by grafting CSMA/CA(Carrier Sense Multiple Access with Collision Avoidance) protocol falling mode which is standards from IEEE 802.11. Among the house care telemetry system which could measure blood pressure, pulsation, electrocardiogram, SpO2 the study embodies the ECC(electrocardiograph) measure part. It within the ECC function into the movable device and add 900㎒ band wireless public data interface. Then the aged, the patients even anyone in the house could obtain ECG and keep, record the data. It would be essential to control those who had a health-examination heart diseases or more complicated heart diseases and to observe the latent heart disease patient continuously. To embody the medical information transmit system which is based on wireless network. It would transmit the ECG data among the organism signal data which would be utilized by wireless network modem and NCL(Native Control Language) protocol to contact through wireless network Through the SCR(Standard Context Routing) protocol in the network it will be connected to the wired host computer. The computer will check the recorded individual information and the obtained ECC data then send the correspond examination to the movable device. The study suggests the medical transmit system model utilized by the wireless public data network.

  • PDF

For History : Roles of Historians and Archivists - Public Archives, Archivists, and Historians - (역사를 위하여: 아키비스트와 역사가의 역할 -공공기록보존소를 중심으로-)

  • Lee, Sang-min
    • The Korean Journal of Archival Studies
    • /
    • no.6
    • /
    • pp.225-262
    • /
    • 2002
  • Chief Consultant Archives Government Archives & Records Service -table of contents- 1. Introduction 2. Relationship of Historical Studies and Archive 3. Relationship of Archives and Archives 4. Conclusion; Historians, Archives, and Archivists, and Their Roles This essay is mainly written for historians who may have "little or limited experience" in dealing with archives and archivists in their course of historical research. It may sound very ridiculous to say that "historians have little or limited experience" in using archives but it is also true that many Korean historians have depended on various compiled editions of historical materials or personally donated and/or collected materials when they do research, rather than they would visit archives and search for the materials by themselves. This is the main reason for that the public archives in Korea have not served historians well and effectively, and vice versa, that historians have not visited archives sometime with no knowledge of archives, and have not requested opening of archives for their research. It is a simple fact that historian's study depends on the records he/she uses. Without records, there should be no history. Use of archives for historical research is a common thing and a must in modern archives. Records are selected to be preserved in archives for their preservation as well as their future use. Who select the records as archives? Archivists do mostly. Then, what are the criteria for the archivists to chose records as permanent preservable archives? Answers to this fundamental question have been provided by many historians and archivists. The closest answer may be that selecting archivists would be better trained and equipped with historical research and knowledgeable of the major trends in historical research. With his/her own experience of historical research and tracing the trends of historical studies and materials used in the historiography, they could chose better and appropriate records for future use using their prudence and discretion. It also means that historians have had influence on archivists in their selecting archives by providing the theme and context of historical studies of the time. Though not necessarily becoming a historian themselves, selecting or appraising archivists should understand the process of creating the records and should know how they become archives. This is a precondition to become a good archivist. But that's not all. They must know how the archives are used and what archives are used for what purposes. Among many other roles of modern archivists, selecting and describing the archives are the foremost tasks of an archivist. Archivists therefore developed modern methods to select future archives based on functional analysis and records series concept rather than a record file or item as a unit of selection. Historians are users or consumers of the archives held in the archives building or repository. The quality of their study depends on the "quality" of the materials they use. With the help of archivists not to mention of reference service, historians owe much to archivists in having an access to the materials they need, intellectually and physically. Too many closed archives and too long closed archives in the archives repository would benefit neither historians nor archivists. However, archivists can mostly react only to archive requests and demands made by historians for more wide accessibility. Using the FOIA, as in the U.S., or the Information Opening Act, as in case of Korea, historians can promote the use of historical materials as well as promoting accountability and transparence for the benefit to society as whole. In this context, it is vary desirable to establish a close professional relationship between historians and archivists even in the age of information society. At present, historians need more understanding of operation and importance of archives while archives administration need to realize the potential archival demands from research community and civil movement for clean government.

u-EMS : An Emergency Medical Service based on Ubiquitous Sensor Network using Bio-Sensors (u-EMS : 바이오 센서 네트워크 기반의 응급 구조 시스템)

  • Kim, Hong-Kyu;Moon, Seung-Jin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.7
    • /
    • pp.433-441
    • /
    • 2007
  • The bio-Sensors, which are sensing the vital signs of human bodies, are largely used by the medical equipment. Recently, the sensor network technology, which composes of the sensor interface for small-seize hardware, processor, the wireless communication module and battery in small sized hardware, has been extended to the area of bio-senor network systems due to the advances of the MEMS technology. In this paper we have suggested a design and implementation of a health care information system(called u-EMS) using a bio-sensor network technology that is a combination of the bio-sensor and the sensor network technology. In proposed system, we have used the following vital body sensors such as EKG sensor, the blood pressure sensor, the heart rate sensor, the pulse oximeter sensor and the glucose sensor. We have collected various vital sign data through the sensor network module and processed the data to implement a health care measurement system. Such measured data can be displayed by the wireless terminal(PDA, Cell phone) and the digital-frame display device. Finally, we have conducted a series of tests which considered both patient's vital sign and context-awared information in order to improve the effectiveness of the u-EMS.

An Investigation on Image Needs and Contexts in Image Search Failure (이미지 검색 실패에 나타난 이미지 요구와 맥락에 관한 분석)

  • Chung, EunKyung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.1
    • /
    • pp.199-215
    • /
    • 2015
  • As a way of identifying users' image needs for improved effectiveness of image search, there have been recent research approaches to examine contextual factors in image needs with multiple perspectives. In this line of research, this study examined a total of 70 unsuccessful image searches for the purpose of investigating users' image needs. In order to achieve the purpose of this study, in particular, the characteristics of image needs, contextual factors on image needs, and image queries were investigated. The findings of this study demonstrated that information needs from the failed image searches are categorized primarily into specific and general/nameable categories. More importantly, these information needs are embedded with multiple contextual factors, primarily, task purpose and use purpose. With an analysis of detailed use purposes for image, illustration use was found most in this data set. For query analysis, the type of unique/refined image query was revealed primarily. As the results of this study were found similar to the findings of previous studies, it is possible to characterize the image needs from the failed image searches. In addition, the findings of this study are expected to be useful to the design and service of image retrieval.

GIS and Geographically Weighted Regression in the Survey Research of Small Areas (지역 단위 조사연구와 공간정보의 활용 : 지리정보시스템과 지리적 가중 회귀분석을 중심으로)

  • Jo, Dong-Gi
    • Survey Research
    • /
    • v.10 no.3
    • /
    • pp.1-19
    • /
    • 2009
  • This study investigates the utilities of spatial analysis in the context of survey research using Geographical Information System(GIS) and Geographically Weighted Regression (GWR) which take account of spatial heterogeneity. Many social phenomena involve spatial dimension, and with the development of GIS, GPS receiver, and online location-based services, spatial information can be collected and utilized more easily, and thus application of spatial analysis in the survey research is getting easier. The traditional OLS regression models which assume independence of observations and homoscedasticity of errors cannot handle spatial dependence problem. GWR is a spatial analysis technique which utilizes spatial information as well as attribute information, and estimated using geographically weighted function under the assumption that spatially close cases are more related than distant cases. Residential survey data from a Primary Autonomous District are used to estimate a model of public service satisfaction. The findings show that GWR handles the problem of spatial auto-correlation and increases goodness-of-fit of model. Visualization of spatial variance of effects of the independent variables using GIS allows us to investigate effects and relationships of those variables more closely and extensively. Furthermore, GIS and GWR analyses provide us a more effective way of identifying locations where the effect of variable is exceptionally low or high, and thus finding policy implications for social development.

  • PDF

Offline Friend Recommendation using Mobile Context and Online Friend Network Information based on Tensor Factorization (모바일 상황정보와 온라인 친구네트워크정보 기반 텐서 분해를 통한 오프라인 친구 추천 기법)

  • Kim, Kyungmin;Kim, Taehun;Hyun, Soon. J
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.375-380
    • /
    • 2016
  • The proliferation of online social networking services (OSNSs) and smartphones has enabled people to easily make friends with a large number of users in the online communities, and interact with each other. This leads to an increase in the usage rate of OSNSs. However, individuals who have immersed into their digital lives, prioritizing the virtual world against the real one, become more and more isolated in the physical world. Thus, their socialization processes that are undertaken only through lots of face-to-face interactions and trial-and-errors are apt to be neglected via 'Add Friend' kind of functions in OSNSs. In this paper, we present a friend recommendation system based on the on/off-line contextual information for the OSNS users to have more serendipitous offline interactions. In order to accomplish this, we modeled both offline information (i.e., place visit history) collected from a user's smartphone on a 3D tensor, and online social data (i.e., friend relationships) from Facebook on a matrix. We then recommended like-minded people and encouraged their offline interactions. We evaluated the users' satisfaction based on a real-world dataset collected from 43 users (12 on-campus users and 31 users randomly selected from Facebook friends of on-campus users).

Target-Aspect-Sentiment Joint Detection with CNN Auxiliary Loss for Aspect-Based Sentiment Analysis (CNN 보조 손실을 이용한 차원 기반 감성 분석)

  • Jeon, Min Jin;Hwang, Ji Won;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.4
    • /
    • pp.1-22
    • /
    • 2021
  • Aspect Based Sentiment Analysis (ABSA), which analyzes sentiment based on aspects that appear in the text, is drawing attention because it can be used in various business industries. ABSA is a study that analyzes sentiment by aspects for multiple aspects that a text has. It is being studied in various forms depending on the purpose, such as analyzing all targets or just aspects and sentiments. Here, the aspect refers to the property of a target, and the target refers to the text that causes the sentiment. For example, for restaurant reviews, you could set the aspect into food taste, food price, quality of service, mood of the restaurant, etc. Also, if there is a review that says, "The pasta was delicious, but the salad was not," the words "steak" and "salad," which are directly mentioned in the sentence, become the "target." So far, in ABSA, most studies have analyzed sentiment only based on aspects or targets. However, even with the same aspects or targets, sentiment analysis may be inaccurate. Instances would be when aspects or sentiment are divided or when sentiment exists without a target. For example, sentences like, "Pizza and the salad were good, but the steak was disappointing." Although the aspect of this sentence is limited to "food," conflicting sentiments coexist. In addition, in the case of sentences such as "Shrimp was delicious, but the price was extravagant," although the target here is "shrimp," there are opposite sentiments coexisting that are dependent on the aspect. Finally, in sentences like "The food arrived too late and is cold now." there is no target (NULL), but it transmits a negative sentiment toward the aspect "service." Like this, failure to consider both aspects and targets - when sentiment or aspect is divided or when sentiment exists without a target - creates a dual dependency problem. To address this problem, this research analyzes sentiment by considering both aspects and targets (Target-Aspect-Sentiment Detection, hereby TASD). This study detected the limitations of existing research in the field of TASD: local contexts are not fully captured, and the number of epochs and batch size dramatically lowers the F1-score. The current model excels in spotting overall context and relations between each word. However, it struggles with phrases in the local context and is relatively slow when learning. Therefore, this study tries to improve the model's performance. To achieve the objective of this research, we additionally used auxiliary loss in aspect-sentiment classification by constructing CNN(Convolutional Neural Network) layers parallel to existing models. If existing models have analyzed aspect-sentiment through BERT encoding, Pooler, and Linear layers, this research added CNN layer-adaptive average pooling to existing models, and learning was progressed by adding additional loss values for aspect-sentiment to existing loss. In other words, when learning, the auxiliary loss, computed through CNN layers, allowed the local context to be captured more fitted. After learning, the model is designed to do aspect-sentiment analysis through the existing method. To evaluate the performance of this model, two datasets, SemEval-2015 task 12 and SemEval-2016 task 5, were used and the f1-score increased compared to the existing models. When the batch was 8 and epoch was 5, the difference was largest between the F1-score of existing models and this study with 29 and 45, respectively. Even when batch and epoch were adjusted, the F1-scores were higher than the existing models. It can be said that even when the batch and epoch numbers were small, they can be learned effectively compared to the existing models. Therefore, it can be useful in situations where resources are limited. Through this study, aspect-based sentiments can be more accurately analyzed. Through various uses in business, such as development or establishing marketing strategies, both consumers and sellers will be able to make efficient decisions. In addition, it is believed that the model can be fully learned and utilized by small businesses, those that do not have much data, given that they use a pre-training model and recorded a relatively high F1-score even with limited resources.