• Title/Summary/Keyword: countermeasure method

Search Result 501, Processing Time 0.028 seconds

A study on the estimation of hydrologic function for ecological restoration at forested wetland (산지습지의 생태적 복원을 위한 수문학적 기능 평가에 관한 연구)

  • Jung, Yu-Gyeong;Kang, Won-Seok;Lee, Heon-Ho
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.25 no.3
    • /
    • pp.97-111
    • /
    • 2022
  • This study was conducted as restoration work to improve the discharge in forested wetlands where there is a concern of damage and observed changes in the discharge and groundwater level. The monthly changes showed that during the wet season, the amount of discharge decreased after restoration and GWL increased. It showed that during the dry season, the GWL and discharge increased. The increased discharge after restoration seems to be the difference in the number of days with no rainfall duration. The change in discharge for each unit of rainfall showed a tendency to increase the baseflow and decrease the direct discharge after restoration. The recharge ratio of GWL showed a decreasing tendency as rainfall was higher. After restoration, it showed a higher tendency under rainfall with less than 20mm. It has been confirmed that the restoration implemented by the study caused such an effect as the increased baseflow and increased GWL. It would be an effective restoration method to maintain water resources in forested wetlands. In the initial rainfall, it demonstrated a certain level of effect, but it is necessary to develop a restoration technology that can decrease the amount of water discharged after the end of rainfall or during the period of no rainfall to protect and maintain the forested wetlands. Streamflow should be identified by each type of terrain of wetlands and a proper restoration countermeasure should be devised for the site where the discharge frequently occurs.

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

Preminary analysis of performance of avionics equipment using worst case analysis (Worst Case 분석을 이용한 항공 전자장비 성능 사전분석)

  • Cheon, Young-ho;Woo, Hui-Seung;Seo, Inn-beom;Ahn, Tae-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.4
    • /
    • pp.185-194
    • /
    • 2022
  • Avionics equipment requires various environmental conditions and performance during development, and as a countermeasure against such development risk, the worst-case circuit analysis(WCCA) is applied to predict perform preliminary performance analysis. WCCA calculates the maximum and minimum values by combining the parameter values of the relevant circuit after deriving the parameter values in consideration of the aging of the temperature and operating period at the component level. In this paper, the necessary matters for WCCA application are described. Chapter 2 describes the differences and characteristics of the WCCA techniques EVA, RSS, and Monte Carlo.Chapter 3 introduces the analysis process through the example circuit to introduce the actual analysis procedure. Chapter 4 describes the method of selecting an analysis technique for each condition of the analysis target. As a result of applying the procedures and analysis methods introduced in this paper when open, it was confirmed that preliminary performance analysis and part optimization design verification are possible.

A Study on the Estimation Method of Carbon Storage Using Environmental Spatial Information and InVEST Carbon Model: Focusing on Sejong Special Self-Governing City - Using Ecological and Natural Map, Environmental Conservation Value Assessment Map, and Urban Ecological Map - (환경공간정보와 InVEST Carbon 모형을 활용한 탄소저장량 추정 방법에 관한 연구: 세종시를 중심으로 - 생태·자연도, 국토환경성평가지도, 도시생태현황지도를 대상으로 -)

  • Hwang, Jin-Hoo;Jang, Rae-ik;Jeon, Seong-Woo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.25 no.5
    • /
    • pp.15-27
    • /
    • 2022
  • Climate change is considered a severe global problem closely related to carbon storage. However, recent urbanization and land-use changes reduce carbon stocks in terrestrial ecosystems. Recently, the role of protected areas has been emphasized as a countermeasure to the climate change, and protected areas allow the area to continue to serve as a carbon sink due to legal restrictions. This study attempted to expand the scope of these protected areas to an evaluation-based environmental spatial information theme map. In this study, the area of each grade was compared, and the distribution of land cover for each grade was analyzed using the Ecological and Nature Map, Environmental Conservation Value Assessment Map and Urban Ecological Map of Sejong Special Self-Governing City. Based on this, the average carbon storage for each grade was derived using the InVEST Carbon model. As a result of the analysis, the high-grade area of the environmental spatial information generally showed a wide area of the natural area represented by the forest area, and accordingly, the carbon storage amount was evaluated to be high. However, there are differences in the purpose of production, evaluation items, and evaluation methods between each environmental spatial information, there are differences in area, land cover, and carbon storage. Through this study, environmental spatial information based on the evaluation map can be used for land use management in the carbon aspect, and it is expected that a management plan for each grade suitable for the characteristics of each environmental spatial information is required.

Analysis of Steganography and Countermeasures for Criminal Laws in National Security Offenses (안보사건에서 스테가노그라피 분석 및 형사법적 대응방안)

  • Oh, SoJung;Joo, JiYeon;Park, HyeonMin;Park, JungHwan;Shin, SangHyun;Jang, EungHyuk;Kim, GiBum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.4
    • /
    • pp.723-736
    • /
    • 2022
  • Steganography is being used as a means of secret communication for crimes that threaten national security such as terrorism and espionage. With the development of computers, steganography technologies develop and criminals produce and use their own programs. However, the research for steganography is not active because detailed information on national security cases is not disclosed. The development of investigation technologies and the responses of criminal law are insufficient. Therefore, in this paper, the detection and decoding process was examined for steganography investigation, and the method was analyzed for 'the spy case of Pastor Kim', who was convicted by the Supreme Court. Multiple security devices were prepared using symmetric steganography using the pre-promised stego key. Furthermore, the three criminal legal issues: (1) the relevance issue, (2) the right to participate, and (3) the public trial issue a countermeasure were considered in national security cases. Through this paper, we hope that the investigative agency will develop analysis techniques for steganography.

A Study on the Improvement of the Management System of Rockfall Risk Area Using the Rockfall Analysis Program (낙석 해석 프로그램을 이용한 낙석위험지역 관리체계 개선 방안에 대한 연구)

  • Bae Dong Kang;Jae Chae Jeong;Chang Deok Jang;Kye Won Jun
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.4
    • /
    • pp.79-86
    • /
    • 2022
  • The National Park Service is making efforts to create a safe environment by installing rockfall prevention facilities (rockfall prevention nets, fences, and Piam tunnels) in areas at risk of falling rocks. However, the occurrence of falling rocks is increasing every year due to torrential rains caused by climate change, abnormal temperatures in winter, and aging of the ground, and the need to improve the existing rock risk area management plan has emerged. In this study, a pilot area at risk of falling rocks was selected for the Hwanggol district of Chiaksan National Park among Korean national parks, and rockfall analysis was performed using the Rockfall program, and monitoring was conducted by applying a countermeasure method combined with the measurement system to the pilot area. Through this, a rockfall management plan was proposed for continuous management and monitoring of rockfall.

Current state of nationally secured or researched beneficial microorganisms for developing environment-friendly agriculture practice and exploration of alternative indication for sustaining freshness (친환경 농업을 위한 농업 분야 유용미생물 확보·연구 현황 및 이에 따른 농산물 선도관리 방안 탐색)

  • Park, Jong Myong;Park, Jong-Han;You, Young-Hyun
    • Journal of agriculture & life science
    • /
    • v.50 no.1
    • /
    • pp.1-22
    • /
    • 2016
  • In this study, the securing state of nationally indicated beneficial microbial resources was evaluated in an aspect of bio-diversity using their taxonomical information. Depending on the analysis result with the Margalef's richness or the Mehinick's index which are representative bio-diversity analytical indices, species diversity values was revealed as 8.537, 3.546 within bacterial resources, 3.349, 2.167 within fungal resources. Several developed or researched beneficial strains and spoilage microbes showed relative taxonomical relationship with comparation of their biological information. As a result, we propose the necessity or countermeasure method for preventing the microbial spoilage with the overhauling consideration of advanced research on agricultural microbiology covering crop endophyte beneficial/spoilage microorganisms.

Masking Exponential-Based Neural Network via Approximated Activation Function (활성화 함수 근사를 통한 지수함수 기반 신경망 마스킹 기법)

  • Joonsup Kim;GyuSang Kim;Dongjun Park;Sujin Park;HeeSeok Kim;Seokhie Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.761-773
    • /
    • 2023
  • This paper proposes a method to increase the power-analysis resistance of the neural network model's feedforward process by replacing the exponential-based activation function, used in the deep-learning field, with an approximated function especially at the multi-layer perceptron model. Due to its nature, the feedforward process of neural networks calculates secret weight and bias, which already trained, so it has risk of exposure of internal information by side-channel attacks. However, various functions are used as the activation function in neural network, so it's difficult to apply conventional side-channel countermeasure techniques, such as masking, to activation function(especially, to exponential-based activation functions). Therefore, this paper shows that even if an exponential-based activation function is replaced with approximated function of simple form, there is no fatal performance degradation of the model, and than suggests a power-analysis resistant feedforward neural network with exponential-based activation function, by masking approximated function and whole network.

The Developmental Device for 119 fire fighting helicopter use activations (119 소방헬기 이용 활성화를 위한 발전방안)

  • Koh, Jae-Moon;Kim, Tae-Min;Kim, Hyo-Sik;Lee, Young-Ah
    • The Korean Journal of Emergency Medical Services
    • /
    • v.11 no.3
    • /
    • pp.93-109
    • /
    • 2007
  • The pre-hospital care in site transportation care and site care will be divided, it will follow in site or evacuation it will enforce it will can evacuate in condition of the emergency patient of like this at the initial stage and emergency care from inside fire fighting helicopter back transfer means and the manpower security of the specialty emergency necessary personnel(nursing and 1st EMT's) as the medical treatment agency and modernization of first aid equipment necessity inside American securing and fire fighting helicopter and specialty first aid packet won about lower the emergency care which is appropriate cannot become accomplished are the actual condition in total lack of emergency care equipment. Consequently craving augmentation, in order to be adapted with the handling kind transfer whose specialty and is appropriate and present time of rapid increase and the citizen of emergency demand by fire fighting helicopter simplicity transfer compared to it is a condition where the countermeasure preparation is earnest. Must expand emergency care equipment first even in fire fighting helicopter and 1st EMT's which it follows in him become arrangement and quickly the execution and specialty temporary disposal(ALS) must be enforced a temporary disposal and must buy the life which is. Also it gets by experience a helicopter induction outline, a radio communication method and the patient helicopter on-board hour attention point back various attention fact back with the body and when where it stands but accurately there must be it will be able to induce the helicopter. Also every manuals anger it does a helicopter transfer method and the emergency care method back and that all processes must do fixed form anger, it becomes feed. Also it related with a helicopter transfer even from the relationship agency many research to lead, difference of the advanced foreign nation and the maximum it is the actual condition where the medical emergency system construction which it reduces is earnestly demanded. Also with emergency structure(crane) it confronts to an aviation transfer even from the establishment college and education it leads intensively and 1st EMT's of the good quality which relates with an aviation structure expects is cultivate at all.

  • PDF

The Evaluation Analysis of Competitiveness among Ports in ASEAN & Korea - An Application of HFP Model - (HFP방법을 적용한 ASEAN과 한국항만의 경쟁력 평가분석)

  • 김진구;전일수
    • Proceedings of the Korean Association for Survey Research Conference
    • /
    • 2003.06a
    • /
    • pp.140-160
    • /
    • 2003
  • The purpose of this study is to identify and evaluate the competitiveness of ports in ASEAN(Association of Southeast Asian Nations), which plays a leading role in basing the hub of international logistics strategies as a countermeasure in changes of international logistics environments. This region represents most severe competition among Mega hub ports in the world in terms of container cargo throughput at the onset of the 21st century. The research method in this study accounted for over lapping between attributes, and introduced the HFP method that can perform mathematical operations. The scope of this study was strictly confined to the ports of ASEAN, which cover the top 100 of 350 container ports that were presented in Containerization International Yearbook 2002 wi th reference to container throughput. The results of this study show Singapore in the number one position. Even compared with major ports in Korea (after getting comparative ratings and applying tile same data and evaluation structure), the number one position still goes to Singapore and then Busan(2) and Manila(2), followed by Port Klang(4), Tanjung Priok(5), Tanjung Perak(6), Bangkok(7), Inchon(8), Laem Chabang(9) and Penang(9). In terms of the main contributions of this study, it is the first empirical study to apply the combined at tributes of detailed and representative attributes into the advanced HFP model which was enhanced by the KJ method to evaluate the port competitiveness in ASEAN. Up-to-now, none have comprehensively conducted researches with sophisticated port methodology that has discussed a variety of changes in port development and terminal transfers of major shipping lines. Moreover, through the comparative evaluation among major ports in Korea and ASEAN, the presentation of comparative competitiveness for Korean ports is a great achievement in this study. In order to reinforce this study, it needs further compensative research, including cost factors which could not be applied to modeling the subject ports by lack of consistently qualified data in ASEAN.

  • PDF