• Title/Summary/Keyword: Early response system

Search Result 346, Processing Time 0.029 seconds

Design of Intelligent Intrusion Context-aware Inference System for Active Detection and Response (능동적 탐지 대응을 위한 지능적 침입 상황 인식 추론 시스템 설계)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.126-132
    • /
    • 2022
  • At present, due to the rapid spread of smartphones and activation of IoT, malicious codes are disseminated using SNS, or intelligent intrusions such as intelligent APT and ransomware are in progress. The damage caused by the intelligent intrusion is also becoming more consequential, threatening, and emergent than the previous intrusion. Therefore, in this paper, we propose an intelligent intrusion situation-aware reasoning system to detect transgression behavior made by such intelligent malicious code. The proposed system was used to detect and respond to various intelligent intrusions at an early stage. The anticipated system is composed of an event monitor, event manager, situation manager, response manager, and database, and through close interaction between each component, it identifies the previously recognized intrusive behavior and learns about the new invasive activities. It was detected through the function to improve the performance of the inference device. In addition, it was found that the proposed system detects and responds to intelligent intrusions through the state of detecting ransomware, which is an intelligent intrusion type.

VALIDATION AND UTILIZATION OF THE SKINTEXTM SYSTEM

  • Gordon, V.C.;Realica, B.;Tolstrup, K.;Puls, B.
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.17 no.1
    • /
    • pp.64-80
    • /
    • 1991
  • The SKINTEX Method is based on a two-compartment physico-chemical model which includes a Biomembrane Barrier in compartment one and an organized macromolecular matrix in compartment two. Test samples absorb onto or permeate through the keratin/collagen Biomembrane Barrier and then can interact with the organized macromolecular matrix. Changes in the integrity of the barrier release a dye indicator: Changes in the matrix can alter its transparency. The sum of these two responses is read spectrophotometrically at 470nm. An early investigation of 950 chemicals and formulations in the SKINTEX System produced results which were 89% concordance to in vivo Draize dermal irritation results obtained with 24-hour occluded application of test samples with-out abrasion and standard scoring. Alkaline materials were analyzed in a specialized SKINTEX AMA Protocol. In this early study, the model did not distinguish nonirritant test materials and formulation with PDII(Primary Dermal Irritation Index)in the range from 0 to 1.2, A High Sensitivity Assay Protocol(HSA)was developed to amplify the changes in both compartments of this model and provide more accurate calibration of these changes. A study of 60 low irritation test samples including cosmetics, household products, chemicals and petro-chemicals distinguished nonirritants with PDII $\leq$ 0.7 for 26 of 30 nonirritants. A second protocol was developed to evaluate the SKINTEX model predictability with respect to human irritation. The Human Response Assay (HRA )has been optimized based on differences in penetration and irritation responses in humans and rabbits. An additional 32 test materials with different mechanisms and degrees of dermal toxicity were evaluated by the HRA. These in vitro results were 86% concordant to human patch test results. In order to further evaluate this model, a Standard Chemical Labelling (SCL) Protocol was developed to optimize this system to predict Draize dermal irritation results after a 4-hour application of the test material. In a study of 52 chemicals including acids, bases, solvents, salts, surfactants and preservatives, the SCL results demonstrated 85% concordance to Draize results for a 4-hour application of test samples on non-abraded rabbit skin. The SKINTEX System, including three specialized protocols, provided results which demonstrated good correlation to the endpoint of dermal irritation in man and rabbits at different application times.

  • PDF

Evaluation of Reservoir Drought Response Capability Considering Precipitation of Non-irrigation Period using RCP Scenario (RCP 시나리오에 따른 비관개기 누적강수량을 고려한 둑높이기 저수지의 미래 가뭄대응능력 평가)

  • Bang, JeHong;Lee, Sang-Hyun;Choi, Jin-Yong;Lee, Sung-Hack
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.1
    • /
    • pp.31-43
    • /
    • 2017
  • Recent studies about irrigation water use have focused on agricultural reservoir operation in irrigation period. At the same time, it is significant to store water resource in reservoir during non-irrigation period in order to secure sufficient water in early growing season. In this study, Representative Concentration Pathways (RCP) 4.5, 8.5 scenarios with the Global Climate Model (GCM) of The Second Generation Earth System Model (CanESM2) were downscaled with bias correlation method. Cumulative precipitation during non-irrigation season, October to March, was analyzed. Interaction between cumulative precipitation and carry-over storage was analyzed with linear regression model for ten study reservoirs. Using the regression model, reservoir drought response ability was evaluated with expression of excess and deficiency. The results showed that future droughts will be more severe than past droughts. Especially in case of non-exceedance probability of 10%, drought in southern region seemed to be serious. Nine study reservoirs showed deficiency range from 10% to 55%, which turned out to be vulnerable for future drought. Only Jang-Chan reservoir was secure for early growing season in spite of drought with deficiency of 8% and -2%. The results of this study represents current agricultural reservoirs have vulnerability for the upcoming drought.

Major Principles and Changes of Zero Tolerance Policy on School Violence in USA (미국 학교폭력에 대한 무관용정책의 변화와 시사점)

  • Chung, Ilhwan;Kim, Younghwan
    • Korean Journal of Comparative Education
    • /
    • v.22 no.4
    • /
    • pp.25-49
    • /
    • 2012
  • Coping with the problems of school violence, weapon and drug abuses, 'zero tolerance policies' have been adopted in the United States since the 1980's. Authorities have been securing the safety and learning-friendly environment of the school, imposing predetermined penalties on any case of school violence or disruption. It is reported that the school violence rate drops accordingly. However, the policies are criticized for their rather escalating effect due to severe punishments on minor offenses, evidencing no effectiveness worthwhile. As alternatives, 'graduated systems of discipline' meeting minor misbehaviors with less severe consequences or 'early response model' are suggested, without abandoning those main rules of zero tolerance policies. Recently Korean government tries to take charge of school violence, issuing some nation-wide measures such as 'the Comprehensive Measures to Stop School Violence'. This article analyzed major principles and changes of the zero tolerance polices of US case, to induce some policy suggestions for the validity of Korean government's measures implemented under the understanding that "little bullying" is also a "crime" to disclose all school violence.

Building Living Lab for Acquiring Behavioral Data for Early Screening of Developmental Disorders

  • Kim, Jung-Jun;Kwon, Yong-Seop;Kim, Min-Gyu;Kim, Eun-Soo;Kim, Kyung-Ho;Sohn, Dong-Seop
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.47-54
    • /
    • 2020
  • Developmental disorders are impairments of brain and/or central nervous system and refer to a disorder of brain function that affects languages, communication skills, perception, sociality and so on. In diagnosis of developmental disorders, behavioral response such as expressing emotions in proper situation is one of observable indicators that tells whether or not individual has the disorders. However, diagnosis by observation can allow subjective evaluation that leads erroneous conclusion. This research presents the technological environment and data acquisition system for AI based screening of autism disorder. The environment was built considering activities for two screening protocols, namely Autism Diagnostic Observation Schedule (ADOS) and Behavior Development Screening for Toddler (BeDevel). The activities between therapist and baby during the screening are fully recorded. The proposed software in this research was designed to support recording, monitoring and data tagging for learning AI algorithms.

Concept of an intelligent operator support system for initial emergency responses in nuclear power plants

  • Kang, Jung Sung;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • v.54 no.7
    • /
    • pp.2453-2466
    • /
    • 2022
  • Nuclear power plant operators in the main control room are exposed to stressful conditions in emergency situations as immediate and appropriate mitigations are required. While emergency operating procedures (EOPs) provide operators with the appropriate tasks and diagnostic guidelines, EOPs have static properties that make it difficult to reflect the dynamic changes of the plant. Due to this static nature, operator workloads increase because unrelated information must be screened out and numerous displays must be checked to obtain the plant status. Generally, excessive workloads should be reduced because they can lead to human errors that may adversely affect nuclear power plant safety. This paper presents a framework for an operator support system that can substitute the initial responses of the EOPs, or in other words the immediate actions and diagnostic procedures, in the early stages of an emergency. The system assists operators in emergency operations as follows: performing the monitoring tasks in parallel, identifying current risk and latent risk causality, diagnosing the accident, and displaying all information intuitively with a master logic diagram. The risk causalities are analyzed with a functional modeling methodology called multilevel flow modeling. This system is expected to reduce workloads and the time for performing initial emergency response procedures.

Model Proposal for Detection Method of Cyber Attack using SIEM (SIEM을 이용한 침해사고 탐지방법 모델 제안)

  • Um, Jin-Guk;Kwon, Hun-Yeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.43-54
    • /
    • 2016
  • The occurrence of cyber crime is on the rise every year, and the security control center, which should play a crucial role in monitoring and early response against the cyber attacks targeting various information systems, its importance has increased accordingly. Every endeavors to prevent cyber attacks is being attempted by information security personnel of government and financial sector's security control center, threat response Center, cyber terror response center, Cert Team, SOC(Security Operator Center) and else. The ordinary method to monitor cyber attacks consists of utilizing the security system or the network security device. It is anticipated, however, to be insufficient since this is simply one dimensional way of monitoring them based on signatures. There has been considerable improvement of the security control system and researchers also have conducted a number of studies on monitoring methods to prevent threats to security. In accordance with the environment changes from ESM to SIEM, the security control system is able to be provided with more input data as well as generate the correlation analysis which integrates the processed data, by extraction and parsing, into the potential scenarios of attack or threat. This article shows case studies how to detect the threat to security in effective ways, from the initial phase of the security control system to current SIEM circumstances. Furthermore, scenarios based security control systems rather than simple monitoring is introduced, and finally methods of producing the correlation analysis and its verification methods are presented. It is expected that this result contributes to the development of cyber attack monitoring system in other security centers.

Neuropathic Pain Behaviors and the Change of Spinal Neuropeptides following Peripheral Nerve Injury in Neonatal Rats

  • Yoon, Young-Sul;Back, Seung-Keun;Kim, Hee-Jin;Na, Heung-Sik
    • Journal of Korean Neurosurgical Society
    • /
    • v.39 no.1
    • /
    • pp.52-57
    • /
    • 2006
  • Objective : It has been suggested that the occurrence of persistent pain signal during the early postnatal period may alter an individual's response to pain later in life. The aim of this study is to assess whether neonatal nerve injury resulted in long-lasting consequences on nociceptive system in the rat. Methods : We examined whether neuropathic pain behaviors and the changes of spinal neuropeptides [SP, CGRP, VIP and VIP] induced by peripheral nerve injury within 1 day after birth [Neonate group] were different from those at 8 weeks after birth [Mature group]. Results : The Neonate group showed more robust and long-lasting pain behaviors than the Mature group. Immunohistochemical findings demonstrated that spinal SP- & CGRP-immunoreactivities[ir] of the ipsilateral to the contralateral side increased in the Neonate group, whereas those decreased in the Mature group. In addition, increase in spinal VIP- & NPY-ir of the ipsilateral to the contralateral side was more robust in the Mature group than in the Neonate group. Conclusion : These results suggest that peripheral nerve injury in the early postnatal period may result in long-lasting and potentially detrimental alterations in nociceptive pathways.

The Importance of Nutritional Assessment and Dietary Counseling in Infants and Young Children with Common Illnesses (소아의 흔한 질병 상황에서 식이, 영양의 중요성)

  • Jeong, Su-Jin
    • Pediatric Gastroenterology, Hepatology & Nutrition
    • /
    • v.14 no.1
    • /
    • pp.33-44
    • /
    • 2011
  • The influence of nutrition during early life on physical growth as well as mental development has been thoroughly discussed in the literature. The physical dimensions of the body are greatly influenced by nutrition, particularly during the period of rapid growth in early childhood. Nutritional status affects every pediatric patient's response toillness. Good nutrition is important for achieving normal growth and development. It is indicated that permanent impairment of the central nervous system may result from dietary restriction of imbalance during certain periods of life. If children under 3 years of age show a good nutritional status, it may be assumed that they are well nourished. Several common diseases of children such as iron deficiency, chronic constipation and atopic dermatitis are known food related diseases. Patients with chronic illness and those at risk of malnutrition should have detailed nutritional assessments done. Components of a complete nutritional assessment include a medical history, nutritional history including dietary intake, physical examination, anthropometrics (weight, length or stature, head circumference, midarm circumference, and triceps skinfold thickness), pubertal staging, skeletal maturity staging, and biochemical tests of nutritional status. The use of age, gender, and disease-specific growth charts is essential in assessing nutritional status and monitoring nutrition interventions. Nutrition assessment and dietary counseling is helpful for the cure of disease, and moreover, the prevention of illness.

Security Operation Implementation through Big Data Analysis by Using Open Source ELK Stack (오픈소스 ELK Stack 활용 정보보호 빅데이터 분석을 통한 보안관제 구현)

  • Hyun, Jeong-Hoon;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.181-191
    • /
    • 2018
  • With the development of IT, hacking crimes are becoming intelligent and refined. In Emergency response, Big data analysis in information security is to derive problems such as abnormal behavior through collecting, storing, analyzing and visualizing whole log including normal log generated from various information protection system. By using the full log data, including data we have been overlooked, we seek to detect and respond to the abnormal signs of the cyber attack from the early stage of the cyber attack. We used open-source ELK Stack technology to analyze big data like unstructured data that occur in information protection system, terminal and server. By using this technology, we can make it possible to build an information security control system that is optimized for the business environment with its own staff and technology. It is not necessary to rely on high-cost data analysis solution, and it is possible to accumulate technologies to defend from cyber attacks by implementing protection control system directly with its own manpower.