• Title/Summary/Keyword: Security Target

Search Result 693, Processing Time 0.024 seconds

Crop Science Approaches to Alleviate the Food Security Concerns in Korea

  • Hee-Jong Koh
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.8-8
    • /
    • 2022
  • Unstable crop production and distribution affected by climate change and COVID-19 pandemic has raised the food security concerns worldwide. In particular, Russia's invasion to Ukraine has blocked the grain trade such as wheat and com to importing countries, which has aggravated the situation. Korea has relied on foreign imports for about 80% of domestic grain demand, raising great concerns on food security. Considering situations related to Korea's food security, some points in view of a crop scientist are suggested and discussed as follows; 1) Domestic production of major grain crops should be increased through encouraging farmers by appropriate governmental subsidy programs 2) International corporation should be strengthened and diversified for sustainable overseas agricultural development and for stable import even in case of food crisis and emergency. 3) Self-sufficiency target should be specified by law so that more budget investments could be put to alleviate the food security concerns. 4) Technologies for climate smart agriculture and for competitive agricultural products should be developed aided by social and governmental support.

  • PDF

A Study on the Procedure Model to Carry on Works of the Private Security Company (민간경비업체의 업무 수행 절차 및 모델 설정에 관한 연구)

  • Lee, Sang-Chul;Kim, Tae-Min
    • Korean Security Journal
    • /
    • no.6
    • /
    • pp.47-65
    • /
    • 2003
  • In Korea, Private security companies has steadily grown and amounts to 2,051 places as of November 30, 2002. Private security in korea is carrying out firm name role assignment to have held the police and public peace environment change factors for a standard faithfully, and protects social a little property that is a basic purpose, and it is spare no efforts in loss prevention. In spite of numeral increase of private security companies, private security companies have many problem. Moreover, they mostly did not have any remarkable in-house expertises in their own business under tough conditions. Under the unfavorable circumstances including insufficient investment and education in private security guard, there have been actually little further studies on private security business in practices. So this study mainly focused on addressing the installation security business managed by authorized companies, which amount to 96%(1,963 companies) of total 2,051 domestic security companies. Furthermore, the study formulated and modeled a series of business procedures in private security companies. A series of business procedures of private security companies can be modeled as follows : Setting of a business scope and aim market ${\Rightarrow}$ Marketing, Contact from customers(On-line or Off-line) ${\Rightarrow}$ Diagnosis of security target ${\Rightarrow}$ Submission of security operational plan ${\Rightarrow}$ Estimation of security operational plan ${\cdot}$ decision ${\Rightarrow}$ Contract ${\Rightarrow}$ Employment, selection of security guards ${\Rightarrow}$ Nomination of security guard instructors ${\Rightarrow}$ Education & training of security guards ${\Rightarrow}$ subscribe to insurance of damage liability ${\Rightarrow}$ Commitment and placement of security guards ${\Rightarrow}$ Establishment and preparation of security planning ${\Rightarrow}$ Field management and procurement of relevant security service.

  • PDF

Security Technology Trends to Prevent Medical Device Hacking and Ransomware (커넥티드 의료기기 해킹 및 랜섬웨어 대응기술 동향)

  • Kwon, H.C.;Chung, B.H.;Moon, D.S.;Kim, I.K.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.5
    • /
    • pp.21-31
    • /
    • 2021
  • Ransomware attacks, such as Conti, Ryuk, Petya, and Sodinokibi, that target medical institutions are increasing rapidly. In 2020, in the United States., ransomware attacks affected over 600 separate clinics, hospitals, and organizations, and more than 18 million patient records. The cost of these attacks is estimated to be almost $21 billion USD. The first death associated with a ransomware attack was reported in 2020 by the University Hospital of Düesseldorf in Germany. In the case of medical institutions, as introduced in the Medjack report issued by TrapX Labs, in many cases, attackers target medical devices that are relatively insecure and then penetrate deep into more critical network infrastructure, such as EMR servers. This paper introduces security vulnerabilities of hospital medical devices, considerations for ransomware response by medical institutions, and related technology trends.

Using Hierarchical Performance Modeling to Determine Bottleneck in Pattern Recognition in a Radar System

  • Alsheikhy, Ahmed;Almutiry, Muhannad
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.292-302
    • /
    • 2022
  • The radar tomographic imaging is based on the Radar Cross-Section "RCS" of the materials of a shape under examination and investigation. The RCS varies as the conductivity and permittivity of a target, where the target has a different material profile than other background objects in a scene. In this research paper, we use Hierarchical Performance Modeling "HPM" and a framework developed earlier to determine/spot bottleneck(s) for pattern recognition of materials using a combination of the Single Layer Perceptron (SLP) technique and tomographic images in radar systems. HPM provides mathematical equations which create Objective Functions "OFs" to find an average performance metric such as throughput or response time. Herein, response time is used as the performance metric and during the estimation of it, bottlenecks are found with the help of OFs. The obtained results indicate that processing images consumes around 90% of the execution time.

Improving Adversarial Domain Adaptation with Mixup Regularization

  • Bayarchimeg Kalina;Youngbok Cho
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.2
    • /
    • pp.139-144
    • /
    • 2023
  • Engineers prefer deep neural networks (DNNs) for solving computer vision problems. However, DNNs pose two major problems. First, neural networks require large amounts of well-labeled data for training. Second, the covariate shift problem is common in computer vision problems. Domain adaptation has been proposed to mitigate this problem. Recent work on adversarial-learning-based unsupervised domain adaptation (UDA) has explained transferability and enabled the model to learn robust features. Despite this advantage, current methods do not guarantee the distinguishability of the latent space unless they consider class-aware information of the target domain. Furthermore, source and target examples alone cannot efficiently extract domain-invariant features from the encoded spaces. To alleviate the problems of existing UDA methods, we propose the mixup regularization in adversarial discriminative domain adaptation (ADDA) method. We validated the effectiveness and generality of the proposed method by performing experiments under three adaptation scenarios: MNIST to USPS, SVHN to MNIST, and MNIST to MNIST-M.

Modern Methods of Text Analysis as an Effective Way to Combat Plagiarism

  • Myronenko, Serhii;Myronenko, Yelyzaveta
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.242-248
    • /
    • 2022
  • The article presents the analysis of modern methods of automatic comparison of original and unoriginal text to detect textual plagiarism. The study covers two types of plagiarism - literal, when plagiarists directly make exact copying of the text without changing anything, and intelligent, using more sophisticated techniques, which are harder to detect due to the text manipulation, like words and signs replacement. Standard techniques related to extrinsic detection are string-based, vector space and semantic-based. The first, most common and most successful target models for detecting literal plagiarism - N-gram and Vector Space are analyzed, and their advantages and disadvantages are evaluated. The most effective target models that allow detecting intelligent plagiarism, particularly identifying paraphrases by measuring the semantic similarity of short components of the text, are investigated. Models using neural network architecture and based on natural language sentence matching approaches such as Densely Interactive Inference Network (DIIN), Bilateral Multi-Perspective Matching (BiMPM) and Bidirectional Encoder Representations from Transformers (BERT) and its family of models are considered. The progress in improving plagiarism detection systems, techniques and related models is summarized. Relevant and urgent problems that remain unresolved in detecting intelligent plagiarism - effective recognition of unoriginal ideas and qualitatively paraphrased text - are outlined.

Strategy based PSO for Dynamic Control of UPFC to Enhance Power System Security

  • Mahdad, Belkacem;Bouktir, T.;Srairi, K.
    • Journal of Electrical Engineering and Technology
    • /
    • v.4 no.3
    • /
    • pp.315-322
    • /
    • 2009
  • Penetration and installation of a new dynamic technology known as Flexible AC Transmission Systems (FACTS) in a practical and dynamic network requires and force expert engineer to develop robust and flexible strategy for planning and control. Unified Power Flow Controller (UPFC) is one of the recent and effective FACTS devices designed for multi control operation to enhance the power system security. This paper presents a dynamic strategy based on Particle Swarm Optimization (PSO) for optimal parameters setting of UPFC to enhance the system loadability. Firstly, we perform a multi power flow analysis with load incrementation to construct a global database to determine the initial efficient bounds associated to active power and reactive power target vector. Secondly a PSO technique applied to search the new parameters setting of the UPFC within the initial new active power and reactive power target bounds. The proposed approach is implemented with Matlab program and verified with IEEE 30-Bus test network. The results show that the proposed approach can converge to the near optimum solution with accuracy, and confirm that flexible multi-control of this device coordinated with efficient location enhance the system security of power system by eliminating the overloaded lines and the bus voltage violation.

A Proposal Countermeasure to DDoS attacks targered DNS (DNS을 목표한 DDoS공격에 효과적인 대응 방법 제안)

  • Choi, Ji-Woo;Chun, Myung-Jin;Hong, Do-Won;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.729-735
    • /
    • 2013
  • The recent issue of distributed denial of service attack paralyze major government and financial institution in internet sites. They threatened to the cyber security. There hasn't been easy defense of now using attack. There seems to be increases in damage. In this paper, The recent continue to evolve of distributed denial of service attack. DNS target of distributed denial of service attack give specific examples. but, DNS target of DDoS attacks about defense is insufficient. The DNS Cyber-shelter system was created based on the Cyber-shelter system for DDoS attack in Kisa.. We proposal DNS Cyber-shelter system.

Measurements of Sound Speed and Density Contrasts of the Moon Jellyfish (Aurelia aurita s.l.) for Hydroacoustic Model (수중음향 모델을 위한 보름달물해파리(Aurelia aurita s.l.)의 체내 음속비 및 밀도비)

  • Kang, Don-Hyug;Lee, Chang-Won;Lee, Hyung-Been;Kim, Mi-Ra
    • Ocean and Polar Research
    • /
    • v.34 no.1
    • /
    • pp.85-91
    • /
    • 2012
  • Physical properties such as sound speed contrast (h) and density contrast (g) of the interested target are key parameters to understand acoustic characteristics by using theoretical scattering models. The density and sound speed of moon jellyfish (common jellyfish, Aurelia aurita s.l.) were measured. Sound speed contrast (h) was measured from travel time difference (time-of-flight method) of an acoustic signal in a water tank for APOP studies (Acoustic Properties Of zooplankton). Density contrast (g) was measured by the displacement volume and wet weight (dual-density method). The sound speed remained almost constant as the moon jellyfish increased in bell length. The mean values${\pm}$standard deviation of h and g were $1.0005{\pm}0.0012$ and $0.9808{\pm}0.0195$), respectively. These results will provide important input for use in theoretical scattering models for estimating the acoustic target strength of jellyfish.

Factors contributing to participation in food assistance programs in the elderly population

  • Hong, Seo Ah;Kim, Kirang
    • Nutrition Research and Practice
    • /
    • v.8 no.4
    • /
    • pp.425-431
    • /
    • 2014
  • BACKGROUND/OBJECTIVES: The study objectives were to examine the participation rate in food assistance programs and explore the factors that contribute to such participation among the Korean elderly population. SUBJECTS/METHODS: The study sample comprised 3,932 respondents aged 65 years or older who were selected from a secondary data set, the fourth Korean Welfare Panel Study (KoWePS). The factors, related to participation in programs were examined based on the predisposing, enabling and need factors of the help-seeking behavior model. Multiple logistic regression analysis was used to select the best contributors among the factors related to program participation. RESULTS: The predisposing rate in food assistance programs was 8.5% (7.1% for men and 10.4% for women). When all variables were included in the model, living without spouse, no formal education, low income, having social security benefits and food insecurity in elderly men, and age, low income, having social security benefits and feeling poor in elderly women were significantly related to a higher tendency to program participation. CONCLUSIONS: The predisposing and need factors, such as living without spouse, low education level, food insecurity and feeling poor were important for program participation, as well as enabling factors, such as household income and social security benefits. A comprehensive approach considering these factors to identify the target population for food assistance programs is needed to increase the effectiveness and target population penetration of these programs.