• Title/Summary/Keyword: LANDSCAPE INTRUSION

Search Result 8, Processing Time 0.024 seconds

Characteristic Analysis of Natural Landscape: Based on the Assessments of Naturalness by Landscape Professionals and Laypersons (자연경관의 특질 분석 : 자연성에 대한 조경 전문가와 일반인의 평가를 중심으로)

  • 이영경
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.31 no.6
    • /
    • pp.1-14
    • /
    • 2004
  • As urbanization becomes widely spread, environmental benefits of natural landscapes have been highly appreciated. The social demands to conserve such landscapes are becoming stronger in modem society. In order to effectively manage natural landscapes, one should know what natural landscapes are. The characteristics of natural landscapes revealed by foreign research include wilderness, absence of human intrusion, and presence of diverse natural element (plants, trees, waters). The purpose of this paper is to investigate the characteristics of diverse natural landscapes with different levels of naturalness. The methods adopted here consist of three phases. First, 368 landscapes were photographed to include different levels of naturalness. Second, two professional landscape groups assessed the degree of naturalness of the collected landscapes, in which the characteristics of five degrees of naturalness were examined. Lastly, undergraduate students, as laypersons, assessed the 33 landscapes that were selected as representative of the five degrees of naturalness. The results show that there is no difference between professionals and laypersons on the assessment of naturalness of landscape. The characteristics of natural landscape that participants perceive include no human intrusion, preservation of original state, traditional quality such as Korean-style architecture, dominance of natural elements, and minimum facilities that harmonize with natural surroundings, Many characteristics are similar to the results of foreign research, However, the results reveal that Koreans do not perceive man-made nature as natural, while they perceive traditional elements as natural. Based on the results, some suggestions for landscape management are presented in the conclusion section.

A Study on Landscape Destruction and Intrusion at National Park in Japan (일본 국립공원에 있어서 경관파괴 및 침해에 관한 연구)

  • 배중남
    • Korean Journal of Environment and Ecology
    • /
    • v.11 no.3
    • /
    • pp.316-325
    • /
    • 1997
  • The purpose of this study was to understand landscape edstruction and intrusion problems in national parks in Japan. Literature survey focused on the related journals was attempted for classifying landscape problems in period, cause, regional base. In period base, landscape problems in national parks can be classified into four representative time periods(1960~1967, 1968~1975, 1976~1985 and 1990's). Eight categories, such as dam construction, forest practices, visitor impacts, park planning, and others, were also found as the major causes on landscape destruction. In addition, the survey results showed that these problems have been more concentrated in KANTO(FUJI-HAKONE-IZU, NIKKO National Park) and CHUBU region(CHUBUSANKAKU National Park) than other regions in Japan. This seemed to be caused by increased visitor numbers, development of tourist facilities, forest practices and so on.

  • PDF

Design and Evaluation of a Weighted Intrusion Detection Method for VANETs (VANETs을 위한 가중치 기반 침입탐지 방법의 설계 및 평가)

  • Oh, Sun-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.181-188
    • /
    • 2011
  • With the rapid proliferation of wireless networks and mobile computing applications, the landscape of the network security has greatly changed recently. Especially, Vehicular Ad Hoc Networks maintaining network topology with vehicle nodes of high mobility are self-organizing Peer-to-Peer networks that typically have short-lasting and unstable communication links. VANETs are formed with neither fixed infrastructure, centralized administration, nor dedicated routing equipment, and vehicle nodes are moving, joining and leaving the network with very high speed over time. So, VANET-security is very vulnerable for the intrusion of malicious and misbehaving nodes in the network, since VANETs are mostly open networks, allowing everyone connection without centralized control. In this paper, we propose a weighted intrusion detection method using rough set that can identify malicious behavior of vehicle node's activity and detect intrusions efficiently in VANETs. The performance of the proposed scheme is evaluated by a simulation study in terms of intrusion detection rate and false alarm rate for the threshold of deviation number ${\epsilon}$.

Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks

  • Zimba, Aaron;Wang, Zhaoshun;Chen, Hongsong;Mulenga, Mwenge
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3258-3279
    • /
    • 2019
  • Recently, ransomware has earned itself an infamous reputation as a force to reckon with in the cybercrime landscape. However, cybercriminals are adopting other unconventional means to seamlessly attain proceeds of cybercrime with little effort. Cybercriminals are now acquiring cryptocurrencies directly from benign Internet users without the need to extort a ransom from them, as is the case with ransomware. This paper investigates advances in the cryptovirology landscape by examining the state-of-the-art cryptoviral attacks. In our approach, we perform digital autopsy on the malware's source code and execute the different malware variants in a contained sandbox to deduce static and dynamic properties respectively. We examine three cryptoviral attack structures: browser-based crypto mining, memory resident crypto mining and cryptoviral extortion. These attack structures leave a trail of digital forensics evidence when the malware interacts with the file system and generates noise in form of network traffic when communicating with the C2 servers and crypto mining pools. The digital forensics evidence, which essentially are IOCs include network artifacts such as C2 server domains, IPs and cryptographic hash values of the downloaded files apart from the malware hash values. Such evidence can be used as seed into intrusion detection systems for mitigation purposes.

Land Cover Change and Urban Greenery Prediction in Jabotabek by using Remote Sensing

  • Zain, Alinda-Medrial;Takeuchi, Kazuhiko;Tsunekawa, Atsushi
    • Journal of the Korean Institute of Landscape Architecture International Edition
    • /
    • no.1
    • /
    • pp.59-66
    • /
    • 2001
  • The tremendous growth of population and physical development in the largest urban agglomeration in Indonesia -the Jakarta Metropolitan Region, also known as Jabotabek (Jakarta, Bogor, Tanggerang, Bekasi)- has created many environmental problems, such as land use conversion, increasing urban temperature, water and air pollution, intrusion of seawater, and flooding. These problems have become more serious as the urban green space (trees, shrubs, and groundcovers) has decreased rapidly with the urbanization process. Urban green space directly benefits the urban environment through ameliorating air pollution, controlling temperature, contributing to the balance of the hydrological system, and providing space for recreation and relaxation. Because there is little hard data to support the claim of decreasing greenery in Jabotabek, it is necessary to measure the amount of urban green space. The paper describes the spatial analysis of urban green space within Jabotabek through the use of a geographical information system (GIS). We used GIS and remote sensing to determine land cover change and predicted greenery percentage. Interpretation of Landsat data for 1972, 1983, 1990, and 1997 showed that Jabotabek has experiences rapid development and associated depletion of green open space. The proportion of green open space fell by 23% from 1972 to 1997. We found a low percentage of urban green space in the center of Jakarta but a high percentage in fringe area. The amount of greenery is predicted by the Ratio Vegetation Index (RVI) model: predicted greenery (%) = [146.04] RVI - 134.96. We consider that our result will be useful for landscape planning to improve the environment of Jabotabek.

  • PDF

Study on Trusted Models and Intelligent Intrusion Detection Systems for 6G Mobile Networks (6G 환경을 고려한 트러스트 모델 및 지능형 침입 탐지 기술 동향)

  • C.H. Park;K.M. Park;J.H. Song;J.H. Kim;S.H. Kim
    • Electronics and Telecommunications Trends
    • /
    • v.39 no.5
    • /
    • pp.74-85
    • /
    • 2024
  • The advent of 6G mobile communication technologies promises to surpass the capabilities of existing 5G by offering ultra high-speed data transmission, ultra low latency, and extensive connectivity, enabling a new wave of digital transformation across various fields. However, the openness and decentralized nature of 6G systems, which enhance their flexibility and scalability, can expand the attack surface and increase security threats from cyber-attacks. In this article, we analyze the current research trends related to security in the 6G mobile communication landscape.

Estimation of Instream Flow in Han River (한강에서의 하천유지유량 산정)

  • 오규창;정상만
    • Water for future
    • /
    • v.24 no.1
    • /
    • pp.119-128
    • /
    • 1991
  • This study was focused on establishing the concepts of the instream flow to prevent the problems for the conceptual ambiguity and the difference in the instream flow estimation methods. The average drought flow is defined as the flow required to guarantee the minimum function of the river such as prevention of drying. The environmental control flow is defined as the flow required to control optimal river environment, the flow required for navigation, prevention of sea water-intrusion, protection of river management facilities, conservation of water Quality, fishing, prevention of river mouth closure, control of groundwater level, protection of animals and plants, and landscape. The average drought flow was obtained by flow duration analysis for the natural flows in the Han River at Indo-Bridge gaging station. When considering the 9 factors related to environment conservation, the conservation of water quality was proved to be most important. The pollutants for the river flows were estimated and the water qualities were forecasted. After comparing the water qualities in the future and water quality standards, there quired optimal dilution flow was estimated. The average drought flow and environmental control flow are all non-consumptive flows. Therefore larger flow between them, i.e., Max. (average drought flow, environmental control flow) can be the instream flow. The river management flow can be added to the flows for water utilization in the downstream. The results from this study are expected to be very helpful in the systematic river management on the other main rivers in Korea.

  • PDF

Discussions on the Distribution and Genesis of Mountain Ranges in the Korean Peninsular (I) : The Identification Mountain Ranges using a DEM and Reconsideration of Current Issues on Mountain Range Maps (한국 산맥론(I) : DEM을 이용한 산맥의 확인과 현행 산맥도의 문제점 및 대안의 모색)

  • Park Soo Jin;SON ILL
    • Journal of the Korean Geographical Society
    • /
    • v.40 no.1 s.106
    • /
    • pp.126-152
    • /
    • 2005
  • In recent years, there are some confusions related to the definition and existence of mountain ranges, which have been described in current geography text books. We contend that these confusions came from the lack of understanding on the geomorphological processes that form the mountain system in Korea. This research attempts to clarify the definition of mountain ranges and offer geological and geomorphological explanations about the formation of them. Based on the analyses of the social and cultural causes underlying the recent debates on the existence of mountain ranges, we tried to identify the relationships among the definition of mountain ranges, geological structure of Korea, and the forming processes of mountain ranges. The current and past mountain range maps were compared with geological structures, geological maps, surface curvature, and hill shade maps. The latter two maps were derived from a Digital Elevation Model of the Korean Peninsular. The results show that we are able to prove the existence of most mountain ranges, which provides a useful framework to understand the geological evolution of Korean peninsular and formation of mountainous landscape of Korea. In terms of their morphological continuity and genesis, however, we identified five different categories of mountain ranges: 1) Uplift mountain ranges(Hamkyeong Sanmaek, Nangrim Sanmaek, Taebaek Sanmaek), which were formed by the uplift processes of the Korean Peninsular during the Tertiary; 2) Falut mountain ranges(Macheonryeong Sanmaek, Sobaek Sanmaek, Buksubaek Sanmaek), whirh were directly related to the uplift processes of the Korean Peninsular during the Tertiary; 3) Trust mountain ranges(Jekyouryeong Sanmaek, Kwangju Sanmaek, Charyeong Sanmaek, Noryeong Sanmaek), which were formed by the intrusion of granite and consequent orogenic processes during the Mesozoic era; 4) Drainage divide type mountain ranges, which were formed by the erosion processes after the uplift of Korean Peninsular; 5) Cross-drainage basin type mountain ranges (Kangnam Sanmaek, Eunjin Sanmaek, Myelak sanmaek), which were also formed by the erosion processes, but the mountain ranges cross several drainage basins as connecting mountains laterally We believe that the current social confusions related to the existence of mountain ranges has partly been caused by the vague definition of mountain ranges and the diversity of the forming processes. In order to overcome theses confusions, it is necessary to characterize the types of them according the genesis, the purpose of usages and also the scale of maps which will explains the mountain systems. It is also necessary to provide appropriate educational materials to increase the general public's awareness and understanding of geomorphological processes.