• Title/Summary/Keyword: event collection

Search Result 166, Processing Time 0.027 seconds

Interactional Effects of Travel Experience and Traumatic Event on Subjective Well-Being (여행경험과 외상적 사건이 주관적 웰빙에 미치는 상호작용)

  • Hong, Sung-Kwon;An, Kyung-Jin;Jang, Ho-Chan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.45 no.2
    • /
    • pp.1-10
    • /
    • 2017
  • This study used a quasi-experimental method to investigate if both travel involvement and the degree of recall of a traumatic event affect subjective well-being. For this, independent variables such as positive affect, negative affect, and life satisfaction were established. Four waves of data collection were performed with two to three weeks intervals, then the collected longitudinal data were analysed by repeated measure ANOVA. The study results indicated that travel involvement increases positive affect and life satisfaction, with the effect lasting four weeks or more, which means that travel is an effective tool to boost subjective well-being. Respondents who thought about a traumatic event more frequently had a much higher negative affect following the disaster, and such increased negative affect was maintained over seven weeks or longer. Therefore, this study finds that negative events produce larger, more consistent, or more lasting effects than positive events. As well as travel participation, visiting an urban park is a pleasurable experience. Therefore, the study also finds that urban parks could be utilized for increasing and maintaining subjective well-being in the middle and long term as well as lessening personal stress.

A Study on the Discourse Regarding the Lineage Transmission to Haewol in the Eastern Learning: Focused on Document Verification (해월의 동학 도통전수 담론 연구 - 문헌 고증을 중심으로 -)

  • Park Sang-kyu
    • Journal of the Daesoon Academy of Sciences
    • /
    • v.48
    • /
    • pp.41-155
    • /
    • 2024
  • Among the records that attest to the period from July to August of 1863, when Suwun was believed to have transmitted the orthodox lineage to Haewol, the oldest documents are The Collection of Suwun's Literary Works (水雲文集), The Collection of Great Master Lord's Literary Works (大先生主文集), and The Records of Dao Origin of Master Choe's Literary Collection (崔先生文集道源記書, hereafter referred to as The Records of Dao Origin). The records regarding Suwun in these three documents are considered to have originated from the same context. The variances embedded in the three documents have led to arguments about which documents accurately reflect the fact of orthodox lineage transmission. Additionally, these variances highlight the necessity of a review regarding the characteristics of early Eastern Learning, such as its faith and organizational systems. Accordingly, by thoroughly examining these three documents, it is possible to elucidate the chronological order, establishment-date, accuracy, descriptive direction, and characteristics of the faith system of early Eastern Learning as these are reflected in each document. If successful, this examination would provide a clearer description of the developmental process of Eastern Learning from 1860 to 1880, facilitating a more in-depth analysis of the significance embedded in various forms of discourse on the movement's orthodox lineage transmission. In comparing the three documents and contrasting them with related sources, the results of the textual examination assert that the documents within the lineage of The Collection of Suwun's Literary Works, given they lack a clear record of the event regarding Haewol's orthodox lineage succession, may be the first draft of The Collection of Great Master Lord's Literary Works and The Records of Dao Origin, as these texts distinctly include that record. This reflects that Haewol's succession was not precisely recognized within and outside of the Eastern Learning order until the time when The Collection of Great Master Lord's Literary Works and The Records of Dao Origin were published. This is further attested to by the fact that during the late 1870s, when various Yeonwon (fountainhead) factions of Eastern Learning began to converge around Haewol, and his Yeonwon became the largest organization within Eastern Learning. At that point, the order's doctrine was reinterpreted, and its organization was reestablished. In this regard, it is necessary to view Eastern Learning after Suwun-especially the orthodox lineage transmission to Haewol-from a perspective that considers it more as competing forms of discourse than as a historical fact. This view enables a new perspective on Haewol's Eastern Learning, which forms a distinct layer from Suwun's, shedding light on the relationship between Haewol and the new religious movements in modern-day Korea.

A Study on ICS Security Information Collection Method Using CTI Model (CTI 모델 활용 제어시스템 보안정보 수집 방안 연구)

  • Choi, Jongwon;Kim, Yesol;Min, Byung-gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.471-484
    • /
    • 2018
  • Recently, cyber threats are frequently occurring in ICS(industrial control systems) of government agencies, infrastructure, and manufacturing companies. In order to cope with such cyber threats, it is necessary to apply CTI to ICS. For this purpose, a security information collection system is needed. However, it is difficult to install security solution in control devices such as PLC. Therefor, it is difficult to collect security information of ICS. In addition, there is a problem that the security information format generated in various assets is different. Therefore, in this paper, we propose an efficient method to collect ICS security information. We utilize CybOX/STIX/TAXII CTI models that are easy to apply to ICS. Using this model, we designed the formats to collect security information of ICS assets. We created formats for system logs, IDS logs, and EWS application logs of ICS assets using Windows and Linux. In addition, we designed and implemented a security information collection system that reflects the designed formats. This system can be used to apply monitoring system and CTI to future ICS.

A Study on the Derivation of the Unit Hydrograph using Multiple Regression Model (다중회귀모형으로 추정된 모수에 의한 최적단위유량도의 유도에 관한 연구)

  • 이종남;김채원;황창현
    • Water for future
    • /
    • v.25 no.1
    • /
    • pp.93-100
    • /
    • 1992
  • A study on the Derivation of the Unit Hydrograph using Multiple Regression Moe이. The purpose of this study is to deriver an optimal unit hydrograph suing the multiple regression model, particularly when only small amount of data is available. The presence of multicollinearity among the input data can cause serious oscillations in the derivation of the unit hydrograph. In this case, the oscillations in the unit hydrograph ordinate are eliminated by combining the data. The data used in this study are based upon the collection and arrangement of rainfall-runoff data(1977-1989) at the Soyang-river Dam site. When the matrix X is the rainfall series, the condition number and the reciprocal of the minimum eigenvalue of XTX are calculated by the Jacobi an method, and are compared with the oscillation in the unit hydrograph. The optimal unit hydrograph is derived by combining the numerous rainfall-runoff data. The conclusions are as follows; 1)The oscillations in the derived unit hydrograph are reduced by combining the data from each flood event. 2) The reciprocals of the minimum eigen\value of XTX, 1/k and the condition number CN are increased when the oscillations are active in the derived unit hydrograph. 3)The parameter estimates are validated by extending the model to the Soyang river Dam site with elimination of the autocorrelation in the disturbances. Finally, this paper illustrates the application of the multiple regression model to drive an optimal unit hydrograph dealing with the multicollinearity and the autocorrelation which cause some problems.

  • PDF

A Study on implementation model for security log analysis system using Big Data platform (빅데이터 플랫폼을 이용한 보안로그 분석 시스템 구현 모델 연구)

  • Han, Ki-Hyoung;Jeong, Hyung-Jong;Lee, Doog-Sik;Chae, Myung-Hui;Yoon, Cheol-Hee;Noh, Kyoo-Sung
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.351-359
    • /
    • 2014
  • The log data generated by security equipment have been synthetically analyzed on the ESM(Enterprise Security Management) base so far, but due to its limitations of the capacity and processing performance, it is not suited for big data processing. Therefore the another way of technology on the big data platform is necessary. Big Data platform can achieve a large amount of data collection, storage, processing, retrieval, analysis, and visualization by using Hadoop Ecosystem. Currently ESM technology has developed in the way of SIEM (Security Information & Event Management) technology, and to implement security technology in SIEM way, Big Data platform technology is essential that can handle large log data which occurs in the current security devices. In this paper, we have a big data platform Hadoop Ecosystem technology for analyzing the security log for sure how to implement the system model is studied.

An Application of RETE Algorithm for Improving the Inference Performance in the Coordination Architecture (연동 구조 내의 추론 성능 향상을 위한 RETE 알고리즘의 적용)

  • 서희석
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.12
    • /
    • pp.965-974
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSs agent and a firewall agent which coordinate by CNP (Contract Net Protocol). The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the knowledge-based network security model, each model of simulation environment is hierarchically designed by DEVS (Discrete Event system Specification) formalism. The purpose of this simulation is the application of rete pattern-matching algorithm speeding up the inference cycle phases of the intrusion detection expert system. we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Multiagent Enabled Modeling and Implementation of SCM (멀티에이전트 기반 SCM 모델링 및 구현)

  • Kim Tae Woon;Yang Seong Min;Seo Dae Hee
    • The Journal of Information Systems
    • /
    • v.12 no.2
    • /
    • pp.57-72
    • /
    • 2003
  • The purpose of this paper is to propose the modeling of multiagent based SCM and implement the prototype in the Internet environment. SCM process follows the supply chain operations reference (SCOR) model which has been suggested by Supply Chain Counsil. SCOR model has been positioned to become the industry standard for describing and improving operational process in SCM. Five basic processes, plan, source, matte, deliver and return are defined in the SCOR model, through which a company establishes its supply chain competitive objectives. A supply chain is a world wide network of suppliers, factories, warehouses, distribution centers and retailers through which raw materials are acquired, transformed or manufactured and delivered to customers by autonomous or semiautonomous process. With the pressure from the higher standard of customer compliance, a frequent model change, product complexity and globalization, the combination of supply chain process with an advanced infrastructure in terms of multiagent systems have been highly required. Since SCM is fundamentally concerned with coherence among multiple decision makers, a multiagent framework based on explicit communication between constituent agents such as suppliers, manufacturers, and distributors is a natural choice. Multiagent framework is defined to perform different activities within a supply chain. Dynamic and changing functions of supply chain can be dealt with multi-agent by cooperating with other agents. In the areas of inventory management, remote diagnostics, communications with field workers, order fulfillment including tracking and monitoring, stock visibility, real-time shop floor data collection, asset tracking and warehousing, customer-centric supply chain can be applied and implemented utilizing multiagent. In this paper, for the order processing event between the buyer and seller relationship, multiagent were defined corresponding to the SCOR process. A prototype system was developed and implemented on the actual TCP/IP environment for the purchase order processing event. The implementation result assures that multiagent based SCM enhances the speed, visibility, proactiveness and responsiveness of activities in the supply chain.

  • PDF

A Standard Time Management Scheme in the Internet of Things (사물인터넷에서 표준 시각 관리 방안)

  • Hwang, Soyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.929-934
    • /
    • 2018
  • The Internet of Things (IoT) is the network of devices embedded with electronics, software, sensors, actuators, and connectivity which enables these objects to connect and exchange data without any human intervention. The importance of time information is increased in order to impose order on scattered sensor data streams, resolving conflicts through time stamp information and so on. Time information and time synchronization are critical building blocks in the IoT. They allow devices to share a consistent notion of time and it is easier to build efficient and robust collaborative services. This paper proposes a standard time management scheme in the Internet of Things. Many IoT applications involve collection and forwarding of event data. It is useful to know when an event occurs for the purposes of triggering an action. In order to verify the feasibility of the proposed scheme, it is implemented and evaluated in the Arduino development environment.

An Application of Contract Net Protocol for The Distributed Intrusion Detection (분산 침입 탐지를 위한 계약망 프로토콜의 적용)

  • 서희석;김희완
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.4
    • /
    • pp.38-47
    • /
    • 2003
  • Distributed problem solving is the cooperative solution of problem by a decentralized and loosely couped collection of knowledge-sources (KS's), located in a number of distinct processor nodes. The contract net protocol has been developed to specify problem-solving communication and control for nodes in a distributed problem solver. Task distribution is affected by a negotiation process, a discussion carried on between nodes with tasks to be executed and nodes that may be able to execute tasks In this paper, we present the coordination method among distributed intrusion detection system and firewall by the contract net protocol. The method enhances the intrusion detection performance and provides the communication methods. To mode IDS and firewall, security models hue been hierarchically constructed based on the DEVS (Discrete Event system Specification) formalism. Each ID agent cooperates through the contract net protocol for detecting intrusions. The IDS which detects the intrusion informs to firewall, so the harmful network traffic is blocked. If an agent detects infusions, the agent transfers attacker's information to a firewall. Using this mechanism attacker's packets detected by In can be prevented from damaging the network.

  • PDF

A Study on the Collection Based on Personal History for the Archiving of Industrial Heritage (산업유산 아카이빙을 위한 개인 생애서사 기반 수집 연구)

  • Ryu, Hanjo
    • The Korean Journal of Archival Studies
    • /
    • no.66
    • /
    • pp.37-67
    • /
    • 2020
  • Recently, industrial heritages have been transformed into cultural facilities in the wake of urban Regeneration. This focus is mainly on appearance, and the explanation is often abbreviated as a master narrative, and the placeness is not sufficiently inherited. The placeness of industrial heritage contains not only historical but also personal memories. Place memory must be collected and managed in order for the placeness that can be the source of identity to be preserved and utilized. To this end, this study suggested collecting place memories based on personal life histories. Using the case of collecting Andong Station and Cheongju Tobacco Factory, the life narrative was broken down into an event and the process of reinterpreting it as a place memory was proposed to implement archiving of industrial heritage sites. This methodology means that it can be supplemented rather than replaced.