• Title/Summary/Keyword: event-based

Search Result 3,219, Processing Time 0.033 seconds

The Study of Key Elements to Establish Natural Disaster Preparedness Plan in Libraries and Archives (도서관과 기록관의 자연재난 대비 계획수립 핵심 요소 고찰)

  • Lee, Sangbaek
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.1
    • /
    • pp.101-119
    • /
    • 2019
  • This study reviewed important elements that should be considered in developing natural disaster plan in libraries and archives. In Korea, research on natural disaster planning in libraries and archives was rarely conducted. Therefore, it was necessary to study and analyse overseas literature for natural disaster preparedness planning. The key elements for establishing a natural disaster preparedness plan commonly identified in overseas research can be divided into six factors. 'The disaster preparedness committee and roles of staff' should be designated for starting disaster preparedness, and 'Risks' vulnerable to disaster should be assessed and managed in advance. A 'Handbook for immediate response' should be produced for all employees to respond promptly in the event of disaster, and 'Recovery and business continuity plan' should be reviewed for strategic recovery based on disaster scale and return to work after disaster. Also, in order to strengthen the capacity of all staff related to disaster preparedness and to improve plan for disaster, 'Training' is needed, and 'Cooperation activities' between related organisations should be taken into consideration in order to obtain various perspectives for disaster preparedness and to cope with and recover from large-scale disasters. This study can help Korean libraries and archives to establish natural disaster preparedness plan for serious natural disaster that can likely occur in the future.

A System Recovery using Hyper-Ledger Fabric BlockChain (하이퍼레저 패브릭 블록체인을 활용한 시스템 복구 기법)

  • Bae, Su-Hwan;Cho, Sun-Ok;Shin, Yong-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.2
    • /
    • pp.155-161
    • /
    • 2019
  • Currently, numerous companies and institutes provide services using the Internet, and establish and operate Information Systems to manage them efficiently and reliably. The Information System implies the possibility of losing the ability to provide normal services due to a disaster or disability. It is preparing for this by utilizing a disaster recovery system. However, existing disaster recovery systems cannot perform normal recovery if files for system recovery are corrupted. In this paper, we proposed a system that can verify the integrity of the system recovery file and proceed with recovery by utilizing hyper-ledger fabric blockchain. The PBFT consensus algorithm is used to generate the blocks and is performed by the leader node of the blockchain network. In the event of failure, verify the integrity of the recovery file by comparing the hash value of the recovery file with the hash value in the blockchain and proceed with recovery. For the evaluation of proposed techniques, a comparative analysis was conducted based on four items: existing system recovery techniques and data consistency, able to data retention, recovery file integrity, and using the proposed technique, the amount of traffic generated was analyzed to determine whether it was actually applicable.

Research Trends of Temperament and Character Inventory in Korean Journals Published from 1998 through 2018 (기질 및 성격 검사(Temperament and Character Inventory: TCI)의 국내 연구 동향: 1998-2018년 학술지 게재 논문을 중심으로)

  • Lee, Soo Jin;Kim, Min Jin;Shin, Hee Eun;Yeo, Jeong Mi;Jeong, Su Dong;Jung, Eun Jung;Chae, Han
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.10
    • /
    • pp.537-549
    • /
    • 2021
  • The purpose of the present study was to investigate the research trends of published articles in Korean journals dealing with Temperament and Character Inventory (TCI) from 1998 through 2018. A total of 185 papers were analyzed about an affiliation of corresponding author, type and dimension of TCI, and research contents considering the major publication regarding the Korean version of the TCI and major event in Korea. The results were as followed. First, most researchers belonged to university (53%) and hospital (44%). Second, both temperament and character dimensions (65%) were often used rather than temperament dimension only (34%). Third, regarding the subjects, adults (52%), children and adolescents (38%), and preschoolers (10%) appeared the most frequently used in the order. Fourth, we found that psychopathology (36%), personality (22%), health (16%), addiction (10%), assessment (8%) were the most popular areas of concern. Based on these results with the focus of analysis on the relationships between research subjects and research contents, implications and directions for future research and clinical settings regarding the treatment effect using the TCI character dimensions and diverse age groups were discussed.

AI Fire Detection & Notification System

  • Na, You-min;Hyun, Dong-hwan;Park, Do-hyun;Hwang, Se-hyun;Lee, Soo-hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.63-71
    • /
    • 2020
  • In this paper, we propose a fire detection technology using YOLOv3 and EfficientDet, the most reliable artificial intelligence detection algorithm recently, an alert service that simultaneously transmits four kinds of notifications: text, web, app and e-mail, and an AWS system that links fire detection and notification service. There are two types of our highly accurate fire detection algorithms; the fire detection model based on YOLOv3, which operates locally, used more than 2000 fire data and learned through data augmentation, and the EfficientDet, which operates in the cloud, has conducted transfer learning on the pretrained model. Four types of notification services were established using AWS service and FCM service; in the case of the web, app, and mail, notifications were received immediately after notification transmission, and in the case of the text messaging system through the base station, the delay time was fast enough within one second. We proved the accuracy of our fire detection technology through fire detection experiments using the fire video, and we also measured the time of fire detection and notification service to check detecting time and notification time. Our AI fire detection and notification service system in this paper is expected to be more accurate and faster than past fire detection systems, which will greatly help secure golden time in the event of fire accidents.

Study on the Research Trend of Overseas Elderly Occupational Therapy Using Text Mining (텍스트마이닝을 활용한 국외 노인작업치료의 연구동향 분석)

  • Kim, Ah-Ram;Lee, Tae kwon;Jeong, In Jae;Park, Hae Yean
    • Therapeutic Science for Rehabilitation
    • /
    • v.10 no.1
    • /
    • pp.7-17
    • /
    • 2021
  • Objective : The purpose of this study was to quantitatively analyze the quantitative changes in, and the status of, overseas occupational therapy using text mining. Methods : Using PubMed, research papers on Elderly, Health and Occupational therapy published between 2009 and 2019 were selected for analysis, Abstracts of the selected papers were analyzed. The number of annual papers, the key words, the key words by year, and the relationship between the words were analyzed. Results : The number of papers published from 2009 to 2019 was 9,941, there was a gradual increase from 2009 to the highest in 2017 or 2018, followed by a decreasing trend in 2019. Within the last five years, the most frequent words were Care, Group, Intervention, Pain, Treatment, and Work. There was a strong relationship between the words based on the average frequency over the last 11 years, function, health, event, and partition. Conclusion : This study is meaningful because it applied a new research method called text mining to the empirical and systematic analysis of trends in occupational therapy and presented macroscopic and comprehensive results. The findings are expected to help establish new research directions at clinical and research sites for occupational therapy related to older adults.

A Model for the Optimal Mission Allocation of Naval Warship Based on Absorbing Markov Chain Simulation (흡수 마코프 체인 시뮬레이션 기반 최적 함정 임무 할당 모형)

  • Kim, Seong-Woo;Choi, Kyung-Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.558-565
    • /
    • 2021
  • The Republic of Korea Navy has deployed naval fleets in the East, West, and South seas to effectively respond to threats from North Korea and its neighbors. However, it is difficult to allocate proper missions due to high uncertainties, such as the year of introduction for the ship, the number of mission days completed, arms capabilities, crew shift times, and the failure rate of the ship. For this reason, there is an increasing proportion of expenses, or mission alerts with high fatigue in the number of workers and traps. In this paper, we present a simulation model that can optimize the assignment of naval vessels' missions by using a continuous time absorbing Markov chain that is easy to model and that can analyze complex phenomena with varying event rates over time. A numerical analysis model allows us to determine the optimal mission durations and warship quantities to maintain the target operating rates, and we find that allocating optimal warships for each mission reduces unnecessary alerts and reduces crew fatigue and failures. This model is significant in that it can be expanded to various fields, not only for assignment of duties but also for calculation of appropriate requirements and for inventory analysis.

Comparative Analysis of News Big Data related to SARS-CoV, MERS-CoV, and SARS-CoV-2 (COVID-19)

  • Woo, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.8
    • /
    • pp.91-101
    • /
    • 2021
  • This paper intends to draw implications for preparing for Post-Corona in the health field and policy fields as the global pandemic is experienced due to COVID-19. The purpose of this study is to analyze the news and trends of media companies through temporal analysis of the three infectious diseases, SARS-CoV, MERS-CoV, and SARS-CoV-2 (COVID-19), in which the domestic infectious disease preventive system was active throughout the first year of the outbreak. To this end, by using the news analysis program of the Korea Press Foundation 'Big Kinds', the number of news articles per year was digitized based on the period when each infectious disease had an impact on Korea, and major trends were implemented and analyzed in a word cloud. As a result of the analysis, the number of articles related to infectious diseases peaked when the World Health Organization (WHO) declared a warning and (suspicious) confirmed cases occurred. According to keyword and word cloud analysis, 'infectious disease outbreak and major epidemic areas', 'prevention authorities', and 'disease information and confirmed patient information' were found to be the main common features, and differences were derived from the three infectious diseases. In addition, the current status of the infodemic was identified by performing word cloud analysis on information in uncertainty. The results of this study are significant in that they were able to derive the roles of the health authorities and the media that should be preceded in the event of a new disease epidemic through previously experienced infectious diseases, and areas to be rearranged.

Understanding and Evaluation of Spring Autumn-Hak by Academic Circle of the Early Qing Dynasty - Focused on 「Gyeongbu·Spring Autumn」,『Sagojeyo』 (청초(淸初) 학술계의 춘추학(春秋學)에 대한 이해와 평가 - 『사고제요(四庫提要)』 「경부(經部)·춘추류(春秋類)」를 중심으로)

  • Kim, Dong-Min
    • The Journal of Korean Philosophical History
    • /
    • no.32
    • /
    • pp.337-370
    • /
    • 2011
  • The academic circle of the Qing Dynasty has seen a new trend, mostly based on Han-Hak through the event of the publication of "Sagojeyo" and sought a new change in the sector of Spring Autumn-Hak as well. This study is focused on understanding and evaluation of the developmental process of especially the traditional Spring Autumn-Hak view, among some views of "Sagojeyo" by the book. "Sagojeyo" does a critical analysis of Gongyang-Hak and Gokryang-Hak and the interpretation of "Spring Autumn" made by Song-Hak scholars, and which seems a kind of preparatory step to build up a new research methodology for Spring Autumn-Hak. "Sagojeyo" emphasizes the importance of "Jwacijeon" and also points out its weaknesses and strongly demands the acceptance of strengths "Gongyangjeon" and "Gokryangjeon" have in order to compensate such demerits. Even further, it tries to evaluate Spring Autumn-Hak of the Song Dynasty objectively and reasonably as possible with no prejudice. Such analysis attitude made it possible for Spring Autumn-Hak to get a new turning point starting from the publication of "Sagojeyo". The new research methodology that comprehensively judges historical research and fidelity discourse could be one of important achievements discovered in the Han-Hak-centered academic circle in the early Qing Dynasty.

Source-Location Privacy in Wireless Sensor Networks (무선 센서 네트워크에서의 소스 위치 프라이버시)

  • Lee, Song-Woo;Park, Young-Hoon;Son, Ju-Hyung;Kang, Yu;Choe, Jin-Gi;Moon, Ho-Gun;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.125-137
    • /
    • 2007
  • This paper proposes a new scheme to provide the location privacy of sources in Wireless Sensor Networks (WSNs). Because the geographical location of a source sensor reveals contextual information on an 'event' in WSN, anonymizing the source location is an important issue. Despite abundant research efforts, however, about data confidentiality and authentication in WSN, privacy issues have not been researched well so far. Moreover, many schemes providing the anonymity of communication parties in Internet and Ad-hoc networks are not appropriate for WSN environments where sensors are very resource limited and messages are forwarded in a hop-by-hop manner through wireless channel. In this paper, we first categorize the type of eavesdroppers for WSN as Global Eavesdropper and Compromising Eavesdropper. Then we propose a novel scheme which provides the anonymity of a source according to the types of eavesdroppers. Furthermore, we analyze the degree of anonymity of WSN using the entropy-based modeling method. As a result, we show that the proposed scheme improves the degree of anonymity compared to a method without any provision of anonymity and also show that the transmission range plays a key role to hide the location of source sensors.

An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence (호스트 침해 발생 시점에서의 효율적 Forensics 증거 자료 수집 방안)

  • Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.69-81
    • /
    • 2006
  • The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focussed on how to collect the forensic evidence for both analysis and poofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.