• Title/Summary/Keyword: Space Threat

Search Result 146, Processing Time 0.027 seconds

How did the "invisible space stock" in Japan's suburbs arise and what will happen in the future?

  • Ryo NAMISHIMA;Kozo KADOWAKI
    • International conference on construction engineering and project management
    • /
    • 2024.07a
    • /
    • pp.201-208
    • /
    • 2024
  • The suburban residential areas encircling major Japanese cities, established during the era of rapid economic growth, grapple with a formidable challenge as their original residents age swiftly. The migration of individuals toward city centers and proximity to train stations, coupled with an aging populace and diminishing birthrate, portends a diminishing functionality of these towns, significantly impacting residents' lives and posing a potential threat to their future. Within the context of a rapidly aging society, the effective utilization of the substantial existing housing stock emerges as a critical issue, essential for shaping future housing policies in a super-aging society. This thesis investigates vacant rooms within detached houses, a segment of spatial stock, with the goal of comprehending the mechanisms instigating their occurrence. The aim is to predict their future through the formulation of a mathematical equation encapsulating the conditions leading to their formation. Through the analysis of data from 76 houses out of 118 questionnaires and 36 interviews, where respondents acknowledged having vacant rooms, the study seeks to elucidate the governing mechanisms. It identifies factors exhibiting correlation or causal relationships with the emergence of vacant rooms by scrutinizing the timing and circumstances of the current vacant rooms. The thesis asserts that the genesis of vacant spaces can be explicated by a simple equation, notably linked with life plans. It introduces three scenarios-optimistic, intermediate, and pessimistic-and provides recommendations for addressing potential outcomes. In the backdrop of a diminishing and aging population, understanding available spatial resources is pivotal. The thesis contends that the detailed exploration of each scenario offers crucial insights for cultivating sustainable residential communities, extending beyond urban planning to encompass area management, individual decision-making, and the development of commercially viable housing aligned with these decisions.

A Simulation Study on the Improvement of Lighting Condition on Sidewalks Considering the Type and Growth of Roadside Trees (가로수의 유형 및 성장을 고려한 보행로 조명환경 개선에 관한 시뮬레이션 연구)

  • Lee, Jong-Sung;Lee, Seok-Jun
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.3
    • /
    • pp.93-103
    • /
    • 2013
  • In recently, a growing concern for the health of urban residents increased interests in a variety of outdoor activities simply be done in terms of cost and time. They are specially interested in low-impact and safe exercises around residential or working area. Walking is the one of easily doing exercise in daytime or nighttime near residential area. The sidewalks of boulevard near the residential area is the best place for exercise because of easy access and the green space with roadside trees. However, if the nighttime is not guaranteed the proper lighting condition, the possibility of exposure to crime and the threat to pedestrian safety can be increased. Because roadside trees are one of the potential obstacle for lighting condition, supplementary lightings are important to mitigate interruption for safety. To meet such a need, the purpose of this study is to propose a simulation approach which improves lighting condition on sidewalks of boulevard with variety of roadside trees. To do so, the simulation approach is applied for analyzing the interrupted condition by classified five standard types of roadside trees considering the growth of them and finding optimal layout of supplementary luminaires by lighting types. The results of this approach shows that it is useful for assessing the safety of pedestrian in nighttime.

Threatening privacy by identifying appliances and the pattern of the usage from electric signal data (스마트 기기 환경에서 전력 신호 분석을 통한 프라이버시 침해 위협)

  • Cho, Jae yeon;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1001-1009
    • /
    • 2015
  • In Smart Grid, smart meter sends our electric signal data to the main server of power supply in real-time. However, the more efficient the management of power loads become, the more likely the user's pattern of usage leaks. This paper points out the threat of privacy and the need of security measures in smart device environment by showing that it's possible to identify the appliances and the specific usage patterns of users from the smart meter's data. Learning algorithm PCA is used to reduce the dimension of the feature space and k-NN Classifier to infer appliances and states of them. Accuracy is validated with 10-fold Cross Validation.

A Study on the Direction of the Formulation of "Safe Country" Laws and Regulations due to the Development of Information Technology (정보사회에 있어서 '안전국가' 법규의 정립방향에 관한 소고)

  • Kim, Hyun-Kyung
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.151-163
    • /
    • 2013
  • It is no doubt that information technology is the key factor of national safety. Information technology is positively useful for national security such as crime prevention and detection, criminal investigation, disaster management, and national defense. However, it might be a threat to the security as we saw in the examples such as '3.4 DDoS attacks' and 'Nong-hyup Computer Network Failure.' Although the effect that information technology makes upon the national security is immense, the current legal system does not reflect these changes well. National security should be kept during 'prevention-response-recovery' process regardless it is in the online on offline. In addition, public administration for national security should be based on laws. However, the current legal system is lack of legislative basis on cyber and physical disaster, and the laws on the response to disaster might cause confusing. Therefore, this study examines the limitation of the current legal system on national security, and suggests directions for the development of the system based on the new establishment of the legal concept for 'national security'.

PLANE COURTESY: HOW PASSENGER ATTITUDES ON BOARD CAN DECREASE THE AIR RAGE PHENOMENON

  • Hunter, Joyce A
    • 한국항공우주법학회:학술대회논문집
    • /
    • 2008.05a
    • /
    • pp.153-161
    • /
    • 2008
  • What was once known as common courtesy is rapidly disappearing in the air travel industry, and the violent behavior known as air rage is a constant threat. Once sought after by other industries for advice because of its expertise in customer service, the air travel industry has now slipped to the lowest rungs of companies with unhappy customers. As airlines cut corners in order to avoid bankruptcy, passengers' patience is tested by the stress of flight delays, crowded airports and close packed seating on airplanes. This article examines the situation, strategies used by passengers and ways the airline industry might better inspire courteous behavior in passengers. A cultural expectation of entitlement and competitiveness for limited resources has led to a breakdown in civilized behavior throughout society, both in the United States and internationally. Air travelers faced with rude and intrusive behavior from others on the flight are beginning to find their own ways of coping, such as high quality headphones to block offensive noises, and mechanical devices to keep the seat in front from reclining to the point where it hits their knees. The most potentially effective remedies will come from airlines that enlist cooperation by offering effective passenger education and possibly even incentives. Acceptable airline behaviors need to be plainly defined and stressed for passengers, both before boarding and onboard. In this paper, some methods are suggested to motivate passengers and to inspire courteous behavior.

  • PDF

Local Collision Avoidance of Multiple Robots Using Avoidability Measure and Relative Distance

  • Ko, Nak-Yong;Seo, Dong-Jin;Kim, Koung-Suk
    • Journal of Mechanical Science and Technology
    • /
    • v.18 no.1
    • /
    • pp.132-144
    • /
    • 2004
  • This paper presents a new method driving multiple robots to their goal position without collision. To consider the movement of the robots in a work area, we adopt the concept of avoidability measure. The avoidability measure figures the degree of how easily a robot can avoid other robots considering the velocity of the robots. To implement the concept to avoid collision among multiple robots, relative distance between the robots is proposed. The relative distance is a virtual distance between robots indicating the threat of collision between the robots. Based on the relative distance, the method calculates repulsive force against a robot from the other robots. Also, attractive force toward the goal position is calculated in terms of the relative distance. These repulsive force and attractive force are added to form the driving force for robot motion. The proposed method is simulated for several cases. The results show that the proposed method steers robots to open space anticipating the approach of other robots. In contrast, since the usual potential field method initiates avoidance motion later than the proposed method, it sometimes fails preventing collision or causes hasty motion to avoid other robots. The proposed method works as a local collision-free motion coordination method in conjunction with higher level of task planning and path planning method for multiple robots to do a collaborative job.

Control of International Cyber Crime

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.2
    • /
    • pp.137-144
    • /
    • 2016
  • The followings are required to establish uniform principle of criminal jurisdiction for international cyber crime into customary international law; (1) clear guideline of UN for promoting national practice (2) formation of general practices based on these guidelines (3) these general practices should obtain legal confidence. International society is in close cooperation for investigating and controlling cyber threat. The US FBI has closed down the largest online crime space called 'Darkcode' and prosecuted related hackers based on joint investigation with 19 countries including England, Australia, Canada, Bosnia, Croatia, Israel, and Rumania. More and more people in Korea are raising their voices for joining cyber crime treaty, 'Budapest Treaty.' Budapest Treaty is the first international treaty prosecuting cyber crime by setting out detailed regulations on internet criminal act. Member countries have installed hotline for cyber crime and they act together. Except European countries, America, Canada, and Japan have joined the treaty. In case of Korea, from few years before, it is reviewing joining with Ministry of Foreign affairs, Ministry of Justice and the National Police but haven't made any conclusion. Different from offline crime, cyber crime is planned in advance and happens regardless of border. Therefore, international cooperation based on position of punishing criminals and international standards. Joining of Budapest international cyber crime treaty shall be done as soon as possible for enhancing national competence.

XSSClassifier: An Efficient XSS Attack Detection Approach Based on Machine Learning Classifier on SNSs

  • Rathore, Shailendra;Sharma, Pradip Kumar;Park, Jong Hyuk
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.1014-1028
    • /
    • 2017
  • Social networking services (SNSs) such as Twitter, MySpace, and Facebook have become progressively significant with its billions of users. Still, alongside this increase is an increase in security threats such as cross-site scripting (XSS) threat. Recently, a few approaches have been proposed to detect an XSS attack on SNSs. Due to the certain recent features of SNSs webpages such as JavaScript and AJAX, however, the existing approaches are not efficient in combating XSS attack on SNSs. In this paper, we propose a machine learning-based approach to detecting XSS attack on SNSs. In our approach, the detection of XSS attack is performed based on three features: URLs, webpage, and SNSs. A dataset is prepared by collecting 1,000 SNSs webpages and extracting the features from these webpages. Ten different machine learning classifiers are used on a prepared dataset to classify webpages into two categories: XSS or non-XSS. To validate the efficiency of the proposed approach, we evaluated and compared it with other existing approaches. The evaluation results show that our approach attains better performance in the SNS environment, recording the highest accuracy of 0.972 and lowest false positive rate of 0.87.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

A Study for Recent major Cyber incidents and preventive measures (최근 주요 침해사고 유형과 예방 대책)

  • Jung, Ye-bin;Ha, Seong-hyeon;Lee, Se-Ho;Choi, Sang-Yong;Kim, Jeung-Sam;Lee, Jong-Rak
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.99-102
    • /
    • 2020
  • 인터넷 사용 인구가 증가하면서 이제 사이버공간은 우리 생활에서 중요한 인프라가 되었다. 최근 인터넷 침해사고의 추세는 주로 금전적인 이익을 얻기 위하여 발생하고 있으며, 그 수법이 갈수록 지능적이고 복합적인 기법들을 사용하여 대응과 분석이 점점 어려워지고 있다. 인터넷 침해사고는 이제 특정 개인, 기업의 문제가 아닌 사회적, 국가적 이슈가 되고 있다. 이처럼 인터넷 등 정보통신의 발달에 따른 생활의 편리함 등 순기능과 함께 해킹 등과 같은 역기능도 피할 수 없는 상황이다. 침해사고에 대한 대응은 특정 계급에 국한되는 것이 아니라 사이버공간을 이용하든 모든 사용자가 대비를 해야한다. 사이버 위협에 지속적으로 대비하고, 침해사고 예방 및 대응 수준과 사용자들의 보안 인식을 높혀 개인, 기업, 국가의 안전을 보장해야 할 것이다. 이에 본 연구에서는 침해사고 사례를 바탕으로 분석해 개인 인터넷 이용자들에게 인터넷 침해사고 예방 및 대응요령을 제공한다.

  • PDF