• Title/Summary/Keyword: damage information

Search Result 3,039, Processing Time 0.028 seconds

E-commerce Food Purchases by Adult Women according to their Household Types (가구 형태별 성인 여성의 전자상거래 식품 구매 실태)

  • Park, Yu-Jin;Kim, Yu-Mi;Choi, Mi-Kyeong
    • Korean Journal of Community Nutrition
    • /
    • v.25 no.6
    • /
    • pp.464-473
    • /
    • 2020
  • Objectives: The purpose of this study was to compare and analyze e-commerce food purchase behavior and the perceptions of adult women according to their household types. Methods: The e-commerce food purchases of 318 adult women were surveyed and analyzed according to their household types (one-person or couple household (OCH); a household with children (HC); a household with parents (HP)). Results: The total amount of food purchases over 6 months through e-commerce according to household types was in the descending order of OCH (60.3%), HC (57%), and HP (55.1%) thus showing a significant difference (P < 0.05) in behavior between household types. The reasons for purchasing food through e-commerce included: a lower price than offline (30.8%), convenient delivery and transportation (30.2%), and food diversity (21.1%). When purchasing food online, the most important factor was price and quality, followed by quick and accurate delivery for OCH, exact information given about the product for HC, and recommendation from other consumers for HP (P < 0.01). The main foods purchased through e-commerce were coffee, tea (42.1%), instant and frozen foods (39.9%), water, beverages, dairy products (37.7%), snacks, bread, rice cakes (31.5%), and functional foods (27.4%). The percentage of respondents who were very satisfied or satisfied with their e-commerce food purchases was HP (84.1%), OCH (69.9%), and HC (65.6%) in that order (P < 0.05), and 96.5% of all subjects stated that they would be willing to purchase food through e-commerce in the future. The advantages of purchasing food through e-commerce were seen to be the highest in order and payment convenience with 4.1 points out of 5, followed by low price (4.0), variety of products (3.9), and ease of food purchase (3.9). Among the disadvantages listed, concerns about product damage and deterioration during delivery and differences between the displayed product and the delivered product were the highest with 3.7 points. Conclusions: The characteristics and perceptions of female consumers according to household types are important factors in enhancing the reach of e-commerce, and in preparing guidelines for food selection through e-commerce.

A Study on the Reduction of Flooding in Oncheon-Cheon through the Connection between Oncheon-Cheon and Hoedong-Reservoir Considering GIS (GIS를 고려한 온천천-회동저수지 연계를 통한 온천천 침수 저감 방안에 관한 연구)

  • Choo, Yeonmoon;Choe, Yeonwoong;Choo, Taiho;Jeon, Kunhak;Jeon, Haesung
    • Journal of Wetlands Research
    • /
    • v.23 no.1
    • /
    • pp.1-6
    • /
    • 2021
  • The average annual rainfall in Busan to increase, and in case of Oncheon-Chen in Busan, frequent flooding occurred frequently. The middle and lower reaches of the Oncheon-Chen are relatively flat and urban areas are developed. Therefore, due to the frequent flooding of rivers and the large flood damage, a method of effectively eliminating the flow rate of Oncheon-Chen in the event of heavy rain is needed. In this study, underground waterway was established in the east of Hoedong-Reservoir as a measure to reduce floods in hot springs and simulated with EPA-SWMM. The information needed to construct the basin was utilized by GIS. In middle part of the Suyeong-Gang, there is a Hoedong-Reservoir and a dam is installed and has better conditions than the Nakdong-Gang. It also analyzed the effect of the Oncheon-Chen flow through the underground waterway on the Suyeong-Gang when it was transferred to the Hoedong-Reservoir. It was analyzed that the flood reduction rate at the flood risk points set up in this study was reduced by 24.64% on average when the underground waterway was installed, and the inflow of the water into the Suyeong-Gang increased by 1% on average when the flow rate was excluded by the Suyeong-Gang.

A Study on the Design and Implementation of Multi-Disaster Drone System Using Deep Learning-Based Object Recognition and Optimal Path Planning (딥러닝 기반 객체 인식과 최적 경로 탐색을 통한 멀티 재난 드론 시스템 설계 및 구현에 대한 연구)

  • Kim, Jin-Hyeok;Lee, Tae-Hui;Han, Yamin;Byun, Heejung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.4
    • /
    • pp.117-122
    • /
    • 2021
  • In recent years, human damage and loss of money due to various disasters such as typhoons, earthquakes, forest fires, landslides, and wars are steadily occurring, and a lot of manpower and funds are required to prevent and recover them. In this paper, we designed and developed a disaster drone system based on artificial intelligence in order to monitor these various disaster situations in advance and to quickly recognize and respond to disaster occurrence. In this study, multiple disaster drones are used in areas where it is difficult for humans to monitor, and each drone performs an efficient search with an optimal path by applying a deep learning-based optimal path algorithm. In addition, in order to solve the problem of insufficient battery capacity, which is a fundamental problem of drones, the optimal route of each drone is determined using Ant Colony Optimization (ACO) technology. In order to implement the proposed system, it was applied to a forest fire situation among various disaster situations, and a forest fire map was created based on the transmitted data, and a forest fire map was visually shown to the fire fighters dispatched by a drone equipped with a beam projector. In the proposed system, multiple drones can detect a disaster situation in a short time by simultaneously performing optimal path search and object recognition. Based on this research, it can be used to build disaster drone infrastructure, search for victims (sea, mountain, jungle), self-extinguishing fire using drones, and security drones.

A Study on Analysis and Improvement of Contents of Domestic Disaster & Safety Education (국내 재난안전교육 컨텐츠 분석 및 개선방안 연구)

  • Chung, Hee-Soo;Song, Chang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.1
    • /
    • pp.76-82
    • /
    • 2022
  • Recently, natural and social disasters in Korea are increasing, and new disasters such as COVID 19 and sinkholes, and large-scale disasters that combine natural and social disasters are occurring frequently. In order to reduce damage caused by disasters and effectively respond to disasters, the importance of disaster safety education is emerging because it is necessary to understand the awareness of disaster situations and the functional response process. Ministry of Public Interior and Security is providing disaster safety education for emergency managers through 54 specialized disaster safety education institutions. There is also a lack of experience facilities. This has a problem in that it makes it difficult for disaster safety personnel to effectively respond to disasters due to lack of experience in actual disaster sites. Also, unlike other education fields, the connection between disaster safety education contents and new technologies such as AI is still lacking. In this study, focusing on natural disaster, the current status and problems of domestic disaster safety education institutions and their contents are investigated and analyzed, and based on this, this study suggested improvement plans for domestic disaster safety education contents such as establishment of a unified disaster safety standard curriculum, production and distribution of disaster safety education experience contents using virtual reality technology and infotainment technology, and development of mobile AI tutoring service.

A Study on the Policy Measures for the Prevention of Industrial Secret Leakage in the Metaverse (메타버스 내 산업기밀 유출 대응을 위한 정책 및 제도에 관한 연구)

  • Jeon, So-Eun;Oh, Ye-Sol;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.377-388
    • /
    • 2022
  • Metaverse, realistic virtual space technology has become a hot topic. However, due to the lack of an institutional system to the metaverse environment, concerns are rising over the leakage of industrial confidentiality, including digital assets produced, stored, processed, and transferred within the metaverse. Digital forensics, a technology to defend against hacking attacks in cyberspace, cannot be used in metaverse space, and there is no basis for calculating the extent of damage and tracking responsibility, making it difficult to respond to human resources leakage and cyberhacking effectively. In this paper, we define the scope of industrial confidentiality information and leakage scenario and propose policy and institutional measures based on problems in each metaverse scenario. As a result of the study, it was necessary to prepare a standardized law on Extra-territorial search and seizure issues and a system for collecting cryptocurrency evidence to respond to industrial confidentiality leaks in the metaverse. The study expects to contribute to industrial technology development by preparing in advance for problems that may arise in metaverse technology.

Study on Threshold Scheme based Secure Secret Sharing P2P System (임계 방식 기반 안전 비밀조각 공유 P2P 시스템 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.21-33
    • /
    • 2022
  • This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.

3D Reconstruction of Pipe-type Underground Facility Based on Stereo Images and Reference Data (스테레오 영상과 기준데이터를 활용한 관로형 지하시설물 3차원 형상 복원)

  • Cheon, Jangwoo;Lee, Impyeong
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.6_1
    • /
    • pp.1515-1526
    • /
    • 2022
  • Image-based 3D reconstruction is to restore the shape and color of real-world objects, and image sensors mounted on mobile platforms are used for positioning and mapping purposes in indoor and outdoor environments. Due to the increase in accidents in underground space, the location accuracy problem of underground spatial information has been raised. Image-based location estimation studies have been conducted with the advantage of being able to determine the 3D location and simultaneously identify internal damage from image data acquired from the inside of pipeline-type underground facilities. In this study, we studied 3D reconstruction based on the images acquired inside the pipe-type underground facility and reference data. An unmanned mobile system equipped with a stereo camera was used to acquire data and image data within a pipe-type underground facility where reference data were placed at the entrance and exit. Using the acquired image and reference data, the pipe-type underground facility is reconstructed to a geo-referenced 3D shape. The accuracy of the 3D reconstruction result was verified by location and length. It was confirmed that the location was determined with an accuracy of 20 to 60 cm and the length was estimated with an accuracy of about 20 cm. Using the image-based 3D reconstruction method, the position and line-shape of the pipe-type underground facility will be effectively updated.

A Study on the Blockchain-Based Access Control Using Random-List in Industrial Control System (산업제어시스템에서 랜덤리스트를 이용한 블록체인 기반 접근제어 방식에 관한 연구)

  • Kang, Myung Joe;Kim, Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.5
    • /
    • pp.147-156
    • /
    • 2022
  • Industrial control systems that manage and maintain various industries were mainly operated in closed environment without external connection, but with the recent development of the Internet and the introduction of ICT technology, the access to the industrial control system of external or attackers has become easier. Such incorrect approaches or attacks can undermine the availability, a major attribute of the industrial control system, and violation of availability can cause great damage. In this paper, when issuing commands in an industrial control system, a verification group is formed using a random list to verify and execute commands, and a trust score technique is introduced that applies feedback to the verification group that conducted verification using the command execution result. This technique can reduce overhead generated by random generation in the process of requesting command verification, give flexibility to the verification process, and ensure system availability. For the performance analysis of the system, we measured the time and gas usage when deploying a smart contract, gas usage when verifying a command. As a result, we confirmed that although the proposed system generates a random list compared to the legacy system, there was little difference in the time when it took to deploy smart contract and that the gas used to deploy smart contract increased by about 1.4 times in the process of generating a random list. However, the proposed system does not perform random operations even though the operation of command verification and confidence score technique is performed together during the command verification process, thus it uses about 9% less gas per verification, which ensures availability in the verification process.

A Study on the Framework for Analyzing the Effectiveness of Cyber Weapon Systems Associated with Cyberspace and Physical Space (사이버 공간과 물리 공간이 연계된 사이버 무기체계의 효과성 분석 프레임워크 연구)

  • Jang, Ji-su;Kim, Kook-jin;Yoon, Suk-joon;Park, Min-seo;Ahn, Myung-Kil;Shin, Dong-kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.111-126
    • /
    • 2022
  • As operations that were only conducted in physical space in the past change to operations that include cyberspace, it is necessary to analyze how cyber attacks affect weapon systems using cyber systems. For this purpose, it would be meaningful to analyze a tool that analyzes the effects of physical weapon systems in connection with cyber. The ROK military has secured and is operating the US JMEM, which contains the results of analyzing the effects of physical weapon systems. JMEM is applied only to conventional weapon systems, so it is impossible to analyze the impact of cyber weapon systems. In this study, based on the previously conducted cyber attack damage assessment framework, a framework for analyzing the impact of cyber attacks on physical missions was presented. To this end, based on the MOE and MOP of physical warfare, a cyber index for the analysis of cyber weapon system effectiveness was calculated. In addition, in conjunction with JMEM, which is used as a weapon system effect manual in physical operations, a framework was designed and tested to determine the mission impact by comparing and analyzing the results of the battle in cyberspace with the effects of physical operations. In order to prove the proposed framework, we analyzed and designed operational scenarios through domestic and foreign military manuals and previous studies, defined assets, and conducted experiments. As a result of the experiment, the larger the decrease in the cyber mission effect value, the greater the effect on physical operations. It can be used to predict the impact of physical operations caused by cyber attacks in various operations, and it will help the battlefield commander to make quick decisions.

Waterbody Detection Using UNet-based Sentinel-1 SAR Image: For the Seom-jin River Basin (UNet기반 Sentinel-1 SAR영상을 이용한 수체탐지: 섬진강유역 대상으로)

  • Lee, Doi;Park, Soryeon;Seo, Dongju;Kim, Jinsoo
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.5_3
    • /
    • pp.901-912
    • /
    • 2022
  • The frequency of disasters is increasing due to global climate change, and unusual heavy rains and rainy seasons are occurring in Korea. Periodic monitoring and rapid detection are important because these weather conditions can lead to drought and flooding, causing secondary damage. Although research using optical images is continuously being conducted to determine the waterbody, there is a limitation in that it is difficult to detect due to the influence of clouds in order to detect floods that accompany heavy rain. Therefore, there is a need for research using synthetic aperture radar (SAR) that can be observed regardless of day or night in all weather. In this study, using Sentinel-1 SAR images that can be collected in near-real time as open data, the UNet model among deep learning algorithms that have recently been used in various fields was applied. In previous studies, waterbody detection studies using SAR images and deep learning algorithms are being conducted, but only a small number of studies have been conducted in Korea. In this study, to determine the applicability of deep learning of SAR images, UNet and the existing algorithm thresholding method were compared, and five indices and Sentinel-2 normalized difference water index (NDWI) were evaluated. As a result of evaluating the accuracy with intersect of union (IoU), it was confirmed that UNet has high accuracy with 0.894 for UNet and 0.699 for threshold method. Through this study, the applicability of deep learning-based SAR images was confirmed, and if high-resolution SAR images and deep learning algorithms are applied, it is expected that periodic and accurate waterbody change detection will be possible in Korea.