• 제목/요약/키워드: Protect And Utilize

검색결과 74건 처리시간 0.032초

To Protect and Utilize Suburban Green Space and To Expend Green Ecological Space at Urban Periphery

  • Dinghua Liu;Yaojiong Mei
    • Journal of the Korean Institute of Landscape Architecture International Edition
    • /
    • 제2호
    • /
    • pp.164-170
    • /
    • 2004
  • Suburban green space is an important component part of urban ecological system, the third largest space between urban center and peripheral countryside. Because of the specific regional location of the suburban green space, it differs from the green space in the center of the city in the respects of construction and planning. Anyhow, it has the features of less investment, quicker efficiency, free and easy management and good ecological effects. The writer of this paper holds that urban ecological construction should be planned rationally and laid out in an overall way under the prerequisite of making full use of and protecting local species so as to further extend the green ecological space at urban periphery, to create dense green surroundings, and to explore a way for ecological construction to develop in a scientific, effective and healthy way.

  • PDF

Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack

  • Nugraha, Muhammad;Paramita, Isyana;Musa, Ardiansyah;Choi, Deokjai;Cho, Buseung
    • 한국멀티미디어학회논문지
    • /
    • 제17권8호
    • /
    • pp.988-994
    • /
    • 2014
  • Software Defined Network (SDN) is a new technology in computer network area which enables user to centralize control plane. The security issue is important in computer network to protect system from attackers. SYN flooding attack is one of Distributed Denial of Service attack methods which are popular to degrade availability of targeted service on Internet. There are many methods to protect system from attackers, i.e. firewall and IDS. Even though firewall is designed to protect network system, but it cannot mitigate DDoS attack well because it is not designed to do so. To improve performance of DDOS mitigation we utilize another mechanism by using SDN technology such as OpenFlow and sFlow. The methodology of sFlow to detect attacker is by capturing and sum cumulative traffic from each agent to send to sFlow collector to analyze. When sFlow collector detect some traffics as attacker, OpenFlow controller will modify the rule in OpenFlow table to mitigate attacks by blocking attack traffic. Hence, by combining sum cumulative traffic use sFlow and blocking traffic use OpenFlow we can detect and mitigate SYN flooding attack quickly and cheaply.

국내 DTV 서비스 보호를 위한 은닉 노드 마진 연구 (A Study on Hidden Node Margin to Protect DTV Service in Korea)

  • 강규민;조상인;정병장
    • 한국전자파학회논문지
    • /
    • 제22권12호
    • /
    • pp.1165-1171
    • /
    • 2011
  • 본 논문에서는 국내 전파 환경에서 DTV 서비스를 안전하게 보호하면서 동시에 TV 유휴 대역 기기를 효과적으로 운용하기 위해 은닉 노드에 의한 DTV 신호 감쇄 영향을 살펴본다. 이를 위해, 국내 전파 환경을 지리적 특성에 따라 해안형, 분지형, 도시형 지역으로 분류하고, 각 지역을 지형적 특징에 따라 다시 8개 지형으로 세분화하여 측정 지점을 선정한 후 DTV 신호의 은닉 노드 감쇄 정도를 측정하고 분석한다. 국내 대도시의 경우 빌딩 건물 지역과 주상 복합 지역이 다른 나라에 비해 상대적으로 밀집해 있기 때문에, 국내 DTV 서비스를 안전하게 보호하기 위해서는 은닉 노드 마진을 최소한 38 dB 이상 설정해야 한다.

대심도지하공간의 정량적위험성 평가기법 (Quantitative Risk Assessment Method for Deep Placed Underground Spaces)

  • 이창욱
    • 한국재난정보학회 논문집
    • /
    • 제6권1호
    • /
    • pp.92-119
    • /
    • 2010
  • As the necessity to utilize deep-placed underground spaces is increasing, we have to seriously consider the safety problems arising from the U/G spaces which is a restricted environment. Due to the higher cost of land compensation for above ground area and environmental issues, the plan to utilize deep-placed U/G spaces is currently only being established for the construction of U/G road network and GTX. However it is also expected that the U/G spaces are to be used as a living space because of the growing desires to change the above ground areas into the environmentally green spaces. Accordingly it is necessary to protect the U/G environments which is vulnerable against desasters caused by fire, explosion, flooding, terrorism, electric power failure, etc. properly. We want to introduce the principles of the Quantitative Risk Assessment(QRA) method for preparedness against the desasters arising from U/G environments, and also want to introduce an example of QRA which was implemented for the GOTTHARD tunnel which is the longest one in Europe.

Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection

  • Xu, Yanping;Wu, Chunhua;Zheng, Kangfeng;Niu, Xinxin;Lu, Tianling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권9호
    • /
    • pp.4658-4679
    • /
    • 2017
  • Android is now the most popular smartphone platform and remains rapid growth. There are huge number of sensitive privacy information stored in Android devices. Kinds of methods have been proposed to detect Android malicious applications and protect the privacy information. In this work, we focus on extracting the fine-grained features to maximize the information of Android malware detection, and selecting the least joint features to minimize the number of features. Firstly, permissions and APIs, not only from Android permissions and SDK APIs but also from the developer-defined permissions and third-party library APIs, are extracted as features from the decompiled source codes. Secondly, feature selection methods, including information gain (IG), regularization and particle swarm optimization (PSO) algorithms, are used to analyze and utilize the correlation between the features to eliminate the redundant data, reduce the feature dimension and mine the useful joint features. Furthermore, regularization and PSO are integrated to create a new joint feature mining method. Experiment results show that the joint feature mining method can utilize the advantages of regularization and PSO, and ensure good performance and efficiency for Android malware detection.

스토킹 범죄와 민간경비의 필요성 (Stalking Crimes and the Need for Private Security)

  • 이재민
    • 한국재난정보학회 논문집
    • /
    • 제18권4호
    • /
    • pp.778-785
    • /
    • 2022
  • 연구목적: 최근 스토킹 범죄로인한 범죄가 사회적으로 이슈되고 있다. '스토킹 대응 매뉴얼'을 따라 피해자를 보호하는 조치와 문제점을 살펴보고 보충적 대안으로 민간경비의 필요성을 살펴보고자 한다. 연구방법:스토킹 범죄와 경찰의 '스토킹 대응 매뉴얼'의 피해자 보호조치를 파악하고 문제점과 민간경비의 필요성을 분석하였다. 연구결과: 경찰이 담당하는 1인당 담당인구수는 398명으로 경찰만으로는 스토킹 피해자를 보호하기에는 한계가 있어, 이를 보완하는 방법으로 민간경비에 위탁하는 방안을 제시하여 본다. 경찰과의 효과적인 업무 분장을 통하여 보다 안정적인 치안서비스제공이 가능할 수 있음을 기대할 수 있다. 결론: 2021년에 스토킹 처벌법이 제정되면서 스토킹 대응 매뉴얼에 피해자 보호조치 방안이 명문화되었지만 여러 가지 문제로 피해자를 보호하는데 한계가 있다. 그러므로 민간경비를 이용해 피해자 보호 할 방안을 연구해야할 것이다.

리튬 배터리 퓨즈 온도 보상에 따른 과전류 시퀀스 제어 알고리즘 설계 (Design of Over Current Sequence Control Algorithm According to Lithium Battery Fuse Temperature Compensation)

  • 송정용;허창수
    • 한국전기전자재료학회논문지
    • /
    • 제32권1호
    • /
    • pp.58-63
    • /
    • 2019
  • Lithium-ion batteries used for IT, automobiles, and industrial energy-storage devices have battery management systems (BMS) to protect the battery from abnormal voltage, current, and temperature environments, as well as safety devices like, current interruption device (CID), fuse, and vent to obtain positive temperature coefficient (PTC). Nonetheless, there are harmful to human health and property and damage the brand image of the manufacturer because of smoke, fire, and explosion of lithium battery packs. In this paper, we propose a systematic protection algorithm combining battery temperature, over-current, and interconnection between protection elements to prevent copper deposition, internal short circuit, and separator shrinkage due to frequent and instantaneous over-current discharges. The parameters of the proposed algorithm are suggested to utilize the experimental data in consideration of battery pack operating conditions and malicious conditions.

Impact Analysis of Intellectual Property Infrastructure

  • Sohn, Soo Jeoung
    • STI Policy Review
    • /
    • 제4권2호
    • /
    • pp.1-18
    • /
    • 2013
  • As the value and role of intellectual property increases in our knowledge-based economy, countries around the world have exerted various efforts to secure, utilize, and protect their intellectual property. The present study diagnoses the level of IP infrastructure of major OECD countries and analyzes their characteristics and impact. According to the diagnosis, the US, Switzerland, and Germany form a leading group followed by the mid-level countries of Korea, Ireland, Australia, and France, with Spain and Italy in the bottom group. In contrast to Korea's competitiveness in S&T and R&D infrastructures, its competitiveness in IP infrastructure is lower than the OECD average. This is thought to be due to Korea's IP infrastructure being hastily formed under the influence of international pressures rather than having been gradually built up by internal needs. A TFP analysis of the impact of IP infrastructure on economic growth shows IP infrastructure positively influences economic growth. Though this analysis is limited due to inability to secure sufficient data and indicators, it is a useful guide for understanding the nature and key characteristics of IP infrastructure.

인체유래물을 사용하는 연구와 Institutional Review Board 심의 (Research Using Human Biological Materials and Institutional Review Board Review)

  • 이미경
    • 대한기관윤리심의기구협의회지
    • /
    • 제6권2호
    • /
    • pp.33-37
    • /
    • 2024
  • Recently, with the development of biotechnology and molecular genetics, research using human biological materials has been receiving attention, and the demand for the use of human- biological materials has also increased significantly. In particular, human biological materials contain the personal information of the person providing them, so special care must be taken to protect personal information throughout the entire process from drafting the human biological materials research plan, Institutional Review Board (IRB) review, and research progress. In addition, it is important to appropriately utilize residual human biological materials obtained during medical diagnosis and treatment at medical institutions to achieve scientific results, while protecting the rights of human biological materials providers and improving the method of expressing consent so as not to damage the trust of human biological materials providers in researchers. To this end, it is necessary to provide sufficient information and education so that researchers and IRB members can understand and apply related laws such as the Bioethics Act and the Personal Information Protection Act.

  • PDF

보행자 법규와 자동차 후드 및 범퍼 구조물 설계방안 (Hood and Bumper Structure Design Methodology for Pedestrian Regulation)

  • 이제완;윤경한;강연수;박경택;박경진
    • 한국자동차공학회논문집
    • /
    • 제13권3호
    • /
    • pp.162-170
    • /
    • 2005
  • Although the numbers of pedestrian fatalities and injuries are steadily declining worldwide, pedestrian protection is still an important issue. Extensive researches have been carried out in the field of pedestrian protection in order to establish pedestrian safety regulations. The automobile hoods and bumpers, which pedestrians frequently run into during accidents, should be safely designed for pedestrians. Two analysis methods are utilized to design safe structures of the hood and the bumper. They are real experiment and computer simulation. In this research, a method is developed to simultaneously utilize the results from the experiment and the simulation. For design, orthogonal arrays are employed to combine the two methods. Based on this method, a hood and a bumper are designed to protect pedestrians.