• Title/Summary/Keyword: Protect And Utilize

Search Result 72, Processing Time 0.02 seconds

To Protect and Utilize Suburban Green Space and To Expend Green Ecological Space at Urban Periphery

  • Dinghua Liu;Yaojiong Mei
    • Journal of the Korean Institute of Landscape Architecture International Edition
    • /
    • no.2
    • /
    • pp.164-170
    • /
    • 2004
  • Suburban green space is an important component part of urban ecological system, the third largest space between urban center and peripheral countryside. Because of the specific regional location of the suburban green space, it differs from the green space in the center of the city in the respects of construction and planning. Anyhow, it has the features of less investment, quicker efficiency, free and easy management and good ecological effects. The writer of this paper holds that urban ecological construction should be planned rationally and laid out in an overall way under the prerequisite of making full use of and protecting local species so as to further extend the green ecological space at urban periphery, to create dense green surroundings, and to explore a way for ecological construction to develop in a scientific, effective and healthy way.

  • PDF

Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack

  • Nugraha, Muhammad;Paramita, Isyana;Musa, Ardiansyah;Choi, Deokjai;Cho, Buseung
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.988-994
    • /
    • 2014
  • Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

A Study on Hidden Node Margin to Protect DTV Service in Korea (국내 DTV 서비스 보호를 위한 은닉 노드 마진 연구)

  • Kang, Kyu-Min;Cho, Sang-In;Jeong, Byung-Jang
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.12
    • /
    • pp.1165-1171
    • /
    • 2011
  • In this paper, we investigate hidden node problem to effectively utilize TV band devices(TVBDs) in the TV white space(TVWS), and also to protect digital television(DTV) service in Korea. Firstly, we classify the radio propagation environment into an urban area, a basin area, and a coastal area based on geographical characteristics. Thereafter, we measure and analyze local shape based hidden node attenuation at eight segmented positions in each geographic area. Because commercial buildings as well as residential and commercial buildings in Korea are located in closer proximity to each other than in other countries, hidden node margin should be more than 38 dB in order to safely protect DTV service in Korea.

Quantitative Risk Assessment Method for Deep Placed Underground Spaces (대심도지하공간의 정량적위험성 평가기법)

  • Lee, Chang-wook
    • Journal of the Society of Disaster Information
    • /
    • v.6 no.1
    • /
    • pp.92-119
    • /
    • 2010
  • As the necessity to utilize deep-placed underground spaces is increasing, we have to seriously consider the safety problems arising from the U/G spaces which is a restricted environment. Due to the higher cost of land compensation for above ground area and environmental issues, the plan to utilize deep-placed U/G spaces is currently only being established for the construction of U/G road network and GTX. However it is also expected that the U/G spaces are to be used as a living space because of the growing desires to change the above ground areas into the environmentally green spaces. Accordingly it is necessary to protect the U/G environments which is vulnerable against desasters caused by fire, explosion, flooding, terrorism, electric power failure, etc. properly. We want to introduce the principles of the Quantitative Risk Assessment(QRA) method for preparedness against the desasters arising from U/G environments, and also want to introduce an example of QRA which was implemented for the GOTTHARD tunnel which is the longest one in Europe.

Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection

  • Xu, Yanping;Wu, Chunhua;Zheng, Kangfeng;Niu, Xinxin;Lu, Tianling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4658-4679
    • /
    • 2017
  • Android is now the most popular smartphone platform and remains rapid growth. There are huge number of sensitive privacy information stored in Android devices. Kinds of methods have been proposed to detect Android malicious applications and protect the privacy information. In this work, we focus on extracting the fine-grained features to maximize the information of Android malware detection, and selecting the least joint features to minimize the number of features. Firstly, permissions and APIs, not only from Android permissions and SDK APIs but also from the developer-defined permissions and third-party library APIs, are extracted as features from the decompiled source codes. Secondly, feature selection methods, including information gain (IG), regularization and particle swarm optimization (PSO) algorithms, are used to analyze and utilize the correlation between the features to eliminate the redundant data, reduce the feature dimension and mine the useful joint features. Furthermore, regularization and PSO are integrated to create a new joint feature mining method. Experiment results show that the joint feature mining method can utilize the advantages of regularization and PSO, and ensure good performance and efficiency for Android malware detection.

Stalking Crimes and the Need for Private Security (스토킹 범죄와 민간경비의 필요성)

  • Jaemin Lee
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.4
    • /
    • pp.778-785
    • /
    • 2022
  • Purpose: Recently, crimes caused by stalking crimes have become a social issue. Following the "Stalking Response Manual", we would like to examine measures and problems to protect victims, and to examine the necessity of private expenses as a supplementary alternative. Method: The victim protection measures of stalking crimes and the police's 'stalking response manual' were identified, and problems and the necessity of private expenses were analyzed. Result: The number of people in charge of the police is 398 per person, and the police alone have limitations in protecting stalking victims. It is necessary to find ways to actively utilize the parts that cannot be solved only by the police while cooperating by entrusting them to private expenses. Conclusion: With the enactment of the Stalking Punishment Act in 2021, measures to protect victims were stipulated in the stalking response manual, but there are limitations in protecting victims due to various problems. Therefore, it is necessary to study ways to protect victims using private expenses.

Design of Over Current Sequence Control Algorithm According to Lithium Battery Fuse Temperature Compensation (리튬 배터리 퓨즈 온도 보상에 따른 과전류 시퀀스 제어 알고리즘 설계)

  • Song, Jung-Yong;Huh, Chang-Su
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.32 no.1
    • /
    • pp.58-63
    • /
    • 2019
  • Lithium-ion batteries used for IT, automobiles, and industrial energy-storage devices have battery management systems (BMS) to protect the battery from abnormal voltage, current, and temperature environments, as well as safety devices like, current interruption device (CID), fuse, and vent to obtain positive temperature coefficient (PTC). Nonetheless, there are harmful to human health and property and damage the brand image of the manufacturer because of smoke, fire, and explosion of lithium battery packs. In this paper, we propose a systematic protection algorithm combining battery temperature, over-current, and interconnection between protection elements to prevent copper deposition, internal short circuit, and separator shrinkage due to frequent and instantaneous over-current discharges. The parameters of the proposed algorithm are suggested to utilize the experimental data in consideration of battery pack operating conditions and malicious conditions.

Impact Analysis of Intellectual Property Infrastructure

  • Sohn, Soo Jeoung
    • STI Policy Review
    • /
    • v.4 no.2
    • /
    • pp.1-18
    • /
    • 2013
  • As the value and role of intellectual property increases in our knowledge-based economy, countries around the world have exerted various efforts to secure, utilize, and protect their intellectual property. The present study diagnoses the level of IP infrastructure of major OECD countries and analyzes their characteristics and impact. According to the diagnosis, the US, Switzerland, and Germany form a leading group followed by the mid-level countries of Korea, Ireland, Australia, and France, with Spain and Italy in the bottom group. In contrast to Korea's competitiveness in S&T and R&D infrastructures, its competitiveness in IP infrastructure is lower than the OECD average. This is thought to be due to Korea's IP infrastructure being hastily formed under the influence of international pressures rather than having been gradually built up by internal needs. A TFP analysis of the impact of IP infrastructure on economic growth shows IP infrastructure positively influences economic growth. Though this analysis is limited due to inability to secure sufficient data and indicators, it is a useful guide for understanding the nature and key characteristics of IP infrastructure.

Hood and Bumper Structure Design Methodology for Pedestrian Regulation (보행자 법규와 자동차 후드 및 범퍼 구조물 설계방안)

  • Lee Jaewan;Yoon Kyonghan;Kang Younsoo;Park Kyungtaek;Park Gyungjin
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.13 no.3
    • /
    • pp.162-170
    • /
    • 2005
  • Although the numbers of pedestrian fatalities and injuries are steadily declining worldwide, pedestrian protection is still an important issue. Extensive researches have been carried out in the field of pedestrian protection in order to establish pedestrian safety regulations. The automobile hoods and bumpers, which pedestrians frequently run into during accidents, should be safely designed for pedestrians. Two analysis methods are utilized to design safe structures of the hood and the bumper. They are real experiment and computer simulation. In this research, a method is developed to simultaneously utilize the results from the experiment and the simulation. For design, orthogonal arrays are employed to combine the two methods. Based on this method, a hood and a bumper are designed to protect pedestrians.

What is the Meaning of Moxibustion Experiences for the Korean? (한국인 수지뜸 경험에 대한 의미)

  • Kim, Bun-Han;Lee, Youn-Ju
    • Research in Community and Public Health Nursing
    • /
    • v.16 no.3
    • /
    • pp.300-307
    • /
    • 2005
  • Purpose: The purpose of this study is to identify how the participants understand the meaning of the hand-moxibustion that is mainly used for an alternative therapy, so that the participants utilize the data for the basic nursing intervention through the understand and use of the hand-moxibustion. Method: This research was carried from January to May of 2003 and its participants were the elder five men and one woman who have been living in Seoul and had jobs. the researcher assorted the topics of the study by Ben Menun' methodology. Result: The results showed that there was a significant effects of the hand moxibustion and treatment with protect. Conclusion: The moxibustion therapy is a nursing intervention that can provide a better quality of life for the prevention of disease, health promotion may be develope in the future.

  • PDF