• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.025 seconds

Feasibility of Economic Analysis of Riverfront Facility Based on Mobile Big Data (통신 빅데이터 기반 하천이용시설 사용성능 경제성평가기법개발)

  • Choi, Byeong Jun;Noh, Hee-Ji;Bang, Young Jun;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.3
    • /
    • pp.29-38
    • /
    • 2021
  • Riverfront facilities are river space facilities used by citizens for the rest and convenience. Recently, although the importance of efficient maintenance of riverfront facilities is increasing, damaging facilities cases are increasing due to frequent floods. Currently, the inspections and diagnosis of river space facilities are limited to the main flood control facilities. And the standards for the maintenance and management of the riverfront facilities are insufficient. Utilization survey, which is the standard for managing river space facilities, is also inefficient in terms of manpower consumption and economic feasibility. This study uses mobile big data to classify river usage and conducts a survey for usability of river facilities to derive economic evaluation for usage performance. In the future, if economical method system that considers safety, usability, and durability is conducted and demanding analysis for each convenience facility is evaluated, it is expected that the efficient maintenance of riverfront facilities is perfomed better and the use of rivers by citizens will further increase.

A Comparative Study on Direct Instrument Methods in Open Channel for Measuring River Water Usage (하천수 사용량 계측을 위한 개수로에서의 직접 계측방법 비교 연구)

  • Baek, Jongseok;Kim, Chiyoung;Lee, Kisung;Kang, Hyunwoong;Song, Jaehyun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.4
    • /
    • pp.65-74
    • /
    • 2020
  • Continuous and accurate instrument of river water usage is needed for sustainable river water management. Although the instrument methods applicable to each point of use of river water are different, more precise direct instrument methods are required at the point of major open channel. Users of river water should select appropriate direct instrument methods to measure usage, but there is a lack of standards and verification research. In this study, the H-Q rating curve method, ultrasonic method, and microwave method were applied directly to the test basin in the upper basin of Mangyeong river, and the accuracy of measurement data was evaluated by comparing absolute error between discharge data calculated by instrument method. When comparing the calculated discharge of point units, the ultrasonic method showed the best results of the actual measurement. Through continuous instrument, the sum of the daily and monthly units was compared, and the ultrasonic and microwave methods were shown to be highly accurate. Based on the results of this study, it is hoped that the appropriate direct measurement method can be selected according to the importance of the river water use facility, considering that the ultrasonic method and the microwave method are relatively costly compared to the water level-flow relationship method.

Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center (개인정보 오.남용 방지 및 보호를 위한 정보공유센터 프레임워크)

  • Ko, Yu-Mi;Choi, Jae-Won;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.391-400
    • /
    • 2012
  • This study focused on the role of the center for private information, which can manage and share the personal data from data breach incidents. Especially, this study addresses on the importance of establishing information management systems for preventing secondary misappropriation of breached personal data and private information. The database of breached personal data can be used for reducing privacy worries of potential victims of secondary misuse of personal data. Individuals who use the same IDs and passwords on multiple websites may find this service more effective and necessary. The effectiveness of this breached data center on reducing secondary privacy infringement may differ depending on the extend of data being shared and the conditions of data submission. When businesses experienced data breach and submission of data to this center is required by the law, the accuracy and effectiveness of this service can be enhanced. In addition, centralized database with high quality data set can increase matching for private information and control the secondary misappropriation of personal data or private information better.

Scenario-based Vulnerability Assessment of Hydroelectric Power Plant (시나리오 기반 수력플랜트 설비의 취약성 평가)

  • Nam, Myeong Jun;Lee, Jae Young;Jung, Woo Young
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.1
    • /
    • pp.9-21
    • /
    • 2021
  • Recently, the importance of eco-friendly power generation facility using renewable energy has newly appeared. Hydropower plant is a very important source of electricity generation and supply which is very important to secure safety because it is commonly connected with multi facility and operated on a large scale. In this study, a scenario-based analysis method was suggested to assess vulnerability of a penstock system caused by water hammer commonly occurred in the operation of hydropower plants. A hypothetical hydropower plant was used to demonstrate the applicability of a transient analysis model. In order to verify reliability of the model, the prediction of pressure behaviors were compared with the results of commercial model (SIMSEN) and measured data, then a real hydroelectric power plant was applied to develop all potential water hammer scenarios during the actual operation. The scenario-based simulation and vulnerability assessment for water hammer in the penstock system were performed with internal and external load conditions. The simulation results indicated that the vulnerability of a penstock system was varied with the operating conditions of hydropower facilities and significantly affected by load combination consisting of different load scenarios. The proposed numerical method could be an useful tool for the vulnerabilityty assessment of the hydropower plants due to water hammer.

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

Establishment of Evaluation System for Disaster Resilience Focusing on the Local Road under Complex Disaster (복합재해 발생 예상 시 지방도로 중심의 재난 레질리언스 평가체계 구축)

  • Kim, Young-Hwan;Jun, Kye-Won
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.4
    • /
    • pp.37-46
    • /
    • 2020
  • Although the importance of resilience is emerging around the world, the single definition of resilience related to natural disasters is not clear. The reason for this is that there is no specific definition of how the definition of resilience relates to similar terms such as vulnerability, recovery, adaptability, and sustainability. In addition, it is because each country and region have different geographic and geological characteristics, and each measurement index is different, just as typhoons, droughts, and earthquakes have different types of disasters. Therefore, in this study, the definition of resilience is reflected in the spatial characteristics of this study as the ability to recover from'complex disasters (concentrated heavy rain, landslides, earth and stone flows) occurring on local roads or on local roads adjacent to people or facilities. Defined. And it was divided into DRR: Disaster Resilience focusing on the Road. In addition, domestic and foreign literature surveys were conducted to derive road-centered disaster resilience factors, and a hierarchical structure was established and AHP survey was conducted to establish a DRR evaluation system. As a result of the analysis of the AHP survey, the weight of direct road disaster influencing factors (drainage facilities, protection facilities, etc.) located inside local roads was 0.742, and the weight of indirect road disaster influencing factors (population, property, etc.) located near local roads. Was found to be 0.258, indicating that the direct impact factor of road disaster was relatively higher than that of the indirect impact factor.

Interactive UI for Smartphone/ Web Applications and Impact of Social Networks

  • Malik, Hafiz Abid Mahmood;Mohammad, AbdulHafeez;Mehmood, Usman;Ali, Ashraf
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.189-200
    • /
    • 2022
  • In today's digital world, smartphones and web-based applications have gained remarkable importance throughout the globe. These smart applications are playing a very significant role in maintaining a powerful business. As well as, they are helping a lot to expand these businesses via social networks. Social media networks such as Instagram, Facebook, Twitter, and LinkedIn are playing a prominent role to promote the companies. In the hospitality sector, most of the companies are running their hotel booking systems by utilizing mobile applications and a web-based infrastructure, but usability issues still exist. This study has been conducted specifically to tackle the usability issues of hotel booking systems and the best utilization of social networks to promote the business. TripAdvisor was selected as an authentic source for selecting those systems and two international hotels are selected for this study. The first step is to identify different hotel booking systems. In the second step, the user's satisfaction level was measured for the selected systems by performing the System Usability Scale (SUS, Quick & Dirty) approach. Additionally, by which source (social media or personal relations) they found these hotels. It is found that the SUS rating for both systems is below the acceptable level of usability. The Mean SUS for hotel 1 is found at 55.25 and 51.2 for hotel 2. The third step was to identify the user interface (UI) issues, and heuristic evaluation is performed for this. The experts identified the UI issues on the basis of their experience. The major issues were related to the visibility of system status, error prevention, flexibility and efficiency of use. Depending upon the identified issues, an interactive UI (prototype) for the selected web-based applications was proposed. This prototype is mainly based on the user's perspective. This prototype can be used for improving the UI of the selected systems which is based on the user's perspective. During the process of verifying the satisfaction level, it is revealed that the targeted audience is not able to use these systems efficiently and effectively. The reason behind this is the negligence of usability guidelines throughout the process of design and development of these hotel booking systems. Therefore, it is highly recommended that the usability of these systems should be evaluated and redesigned, based on expert opinions. It has also been observed that the reviews/ feedback of customers has spread a negative impact through social networks.

Application of Art Therapy with Usage of Distance Education in the Process of Specialists Professional Training

  • Klepar, Maria;Khomyak, Hryhoriy;Kurkina, Snizhana;Ishchenko, Liudmyla;Bai, Ihor;Lashkul, Valerii;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.251-257
    • /
    • 2022
  • Nowadays, the issues of comprehensive formation of a person capable of self-education, self-development and creative self-realization in the conditions of distance education are relevant. There is a need to solve this problem, which is due to social, cultural, and pedagogical factors. This makes it necessary to find effective means of personality formation. In this matter, great importance is attached to the modern method of forming a creative personality - art therapy. Various approaches to the definition of art therapy have been clarified. They consider various forms of art therapy when working with children, adolescents and adults in the context of distance education. The most relevant are the two main forms of work - individual and group art therapy. Art therapy develops the individual's creativity. Therefore, during art therapy, attention is focused on the inner world, experiences, and feelings. Therefore, we believe that in the context of distance education, art therapy has everything for the powerful potential of personality formation. Scientists consider this therapy as therapy by means of art, which is based on experiences, conflicts that can be expressed in the visual arts and music. Art therapy helps to get rid of conflicts and experiences. This happens in the context of distance education through the development of attention to feelings, strengthening one's own personal value and increasing artistic competence. The article describes the signs that characterize art therapy. Art-therapeutic technologies in the context of distance education, which are now actively used by psychologists, teachers and art therapists themselves, are highlighted. The advantages of distance learning are considered. The characteristic features of distance learning and features of the use of art therapy by means of distance education in the process of professional training of specialists are determined.

Innovative Technologies in Higher School Practice

  • Popovych, Oksana;Makhynia, Nataliia;Pavlyuk, Bohdan;Vytrykhovska, Oksana;Miroshnichenko, Valentina;Veremijenko, Vadym;Horvat, Marianna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.248-254
    • /
    • 2022
  • Educational innovations are first created, improved or applied educational, didactic, educative, and managerial systems and their components that significantly improve the results of educational activities. The development of pedagogical technology in the global educational space is conventionally divided into three stages. The role of innovative technologies in Higher School practice is substantiated. Factors of effectiveness of the educational process are highlighted. Technology is defined as a phenomenon and its importance is emphasized, it is indicated that it is a component of human history, a form of expression of intelligence focused on solving important problems of being, a synthesis of the mind and human abilities. The most frequently used technologies in practice are classified. Among the priority educational innovations in higher education institutions, the following are highlighted. Introduction of modular training and a rating system for knowledge control (credit-modular system) into the educational process; distance learning system; computerization of libraries using electronic catalog programs and the creation of a fund of electronic educational and methodological materials; electronic system for managing the activities of an educational institution and the educational process. In the educational process, various innovative pedagogical methods are successfully used, the basis of which is interactivity and maximum proximity to the real professional activity of the future specialist. There are simulation technologies (game and discussion forms of organization); technology "case method" (maximum proximity to reality); video training methodology (maximum proximity to reality); computer modeling; interactive technologies; technologies of collective and group training; situational modeling technologies; technologies for working out discussion issues; project technology; Information Technologies; technologies of differentiated training; text-centric training technology and others.

A Study on the Application of Non-destructive (Ultrasonic) Inspection Technique to Detect Defects of Anchor Bolts for Road Facilities (도로시설물 적용 앵커볼트 결함 검출을 위한 비파괴(Ultrasonic) 검사 기법 적용에 대한 연구)

  • Dong-Woo Seo;Jaehwan Kim;Jin-Hyuk Lee;Han-Min Cho;Sangki Park;Min-Soo Kim
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.11-20
    • /
    • 2022
  • The general non-destructive inspection method for anchor bolts in Korea applies visual inspection and hammering inspection, but it is difficult to check corrosion or fatigue cracks of anchor bolts in the part included in the foundation or in the part where the nut and base plate are installed. In reality, objective investigation is difficult because inspection is affected by the surrounding environment and individual differences, so it is necessary to develop non-destructive inspection technology that can quantitatively estimate these defects. Inspection of the anchor bolts of domestic road facilities is carried out by visual inspection, and since the importance of anchor bolts such as bridge bearings and fall prevention facilities is high, the life span of bridges is extended through preventive maintenance by developing non-destructive testing technology along with existing inspection methods. Through the development of this technology, non-destructive testing of anchor bolts is performed and as a technology capable of preemptive/active maintenance of anchor bolts for road facilities, practical use is urgently needed. In this paper, the possibility of detecting defects in anchor bolts such as corrosion and cracks and reliability were experimentally verified by applying the ultrasonic test among non-destructive inspection techniques. When the technology development is completed, it is expected that it will be possible to realize preemptive/active maintenance of anchor bolts by securing source technology for improving inspection reliability.