• Title/Summary/Keyword: security

Search Result 25,222, Processing Time 0.046 seconds

A Survey of the Transmission-Power-Control Schemes in Wireless Body-Sensor Networks

  • Lee, Woosik;Kim, Heeyoul;Hong, Min;Kang, Min-Goo;Jeong, Seung Ryul;Kim, Namgi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1854-1868
    • /
    • 2018
  • A wireless body-sensor network (WBSN) refers to a network-configured environment in which sensors are placed on both the inside and outside of the human body. The sensors are much smaller and the energy is more constrained when compared to traditional wireless sensor network (WSN) environments. The critical nature of the energy-constraint issue in WBSN environments has led to numerous studies on the reduction of energy consumption of WBSN sensors. The transmission-power-control (TPC) technique adjusts the transmission-power level (TPL) of sensors in the WBSN and reduces the energy consumption that occurs during communications. To elaborate, when transmission sensors and reception sensors are placed in various parts of the human body, the transmission sensors regularly send sensor data to the reception sensors. As the reception sensors receive data from the transmission sensors, real-time measurements of the received signal-strength indication (RSSI), which is the value that indicates the channel status, are taken to determine the TPL that suits the current-channel status. This TPL information is then sent back to the transmission sensors. The transmission sensors adjust their current TPL based on the TPL that they receive from the reception sensors. The initial TPC algorithm made linear or binary adjustments using only the information of the current-channel status. However, because various data in the WBSN environment can be utilized to create a more efficient TPC algorithm, many different types of TPC algorithms that combine human movements or fuse TPC with other algorithms have emerged. This paper defines and discusses the design and development process of an efficient TPC algorithm for WBSNs. We will describe the WBSN characteristics, model, and closed-loop mechanism, followed by an examination of recent TPC studies.

A Study of the Reasonable Space for Each Person about Inner Evacuated Facility (대피시설의 1인당 적정 수용면적에 관한 연구)

  • Hong, Eunki;Kim, Minseok;Yeom, Taejun;Park, Mijin
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.1
    • /
    • pp.15-25
    • /
    • 2017
  • Since the late 19th century, the annual average temperature of the Earth has risen due to excessive emission of greenhouse gases, and abnormal weather phenomena such as heavy rain and heavy snowfall have been increasing frequently all over the world. In a city with high population growth due to high economic growth, fire and terrorist accidents can cause serious property damage and human casualties. The purpose of this study is to propose the need for evacuated facilities to protect victims, and suggest adequate shelters' size which can be protectable them. In spite of the Ministry of Public Safety and Security designated 3.3 square meters of per capita capacity, they does not specify the basis about setting this criterion.

The study of meanings and follow-up tasks for enactment of Assistive Technology Act in Korea (한국의 보조기기법 제정 의의와 후속과제에 대한 연구)

  • Nam, Se-hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.535-542
    • /
    • 2016
  • This study was to explore the meanings and follow-up tasks for enactment of Act on Supply and Utilization Promotion of Assistive Technology Devices for People with Disabilities and Seniors(Assistive Technology Act) in Korea. I conducted analysis about contents and establishment process of the Act. The study found meaningful effects ; it provided the basis for supporting assistive technology devices based on the social model, it led to an Implementation of the national obligations such as UN Convention on the Rights of Persons with Disabilities, it provided terms related to assistive technology. It is suggested to conduct follow-up studies and to put the efforts to strengthen additional laws for backing up the effective policy for extended support of assistive technology devices and for security of budget, for establishing regional service centers, for phasing of professional qualification, for controlling quality, for establishing an information system, and for promoting industries.

Farm to abattoir conditions, animal factors and their subsequent effects on cattle behavioural responses and beef quality - A review

  • Njisane, Yonela Zifikile;Muchenje, Voster
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.30 no.6
    • /
    • pp.755-764
    • /
    • 2017
  • The current review seeks to highlight the concerns that have been raised on pre-slaughter stress, contributing factors and its consequent effects on cattle behavioural responses and the quality of beef; inter-linking the activities involved from birth to slaughter. Such information is crucial in light of the consumer concerns on overall animal welfare, quality of meat and food security. Slaughter animals are exposed to different conditions during production and transportation to abattoirs on a daily basis. However; the majority of studies that have been done previously singled out different environments in the meat production chain, while conclusions have been made that the welfare of slaughter animals and the quality of meat harvested from them is dependent on the whole chain. Behaviour is a critical component used to evaluate the animals' wellbeing and it has been reported to have an effect on product quality. Apart from the influence of on-farm, transportation and abattoir conditions, the genetic background of the animal also affects how it perceives and responds to certain encounters. Stress activates the animals' hypothalamic-pituitary-adrenal activity, triggering release of various stress hormones such as catecholamines and cortisol, thus glycogen depletion prior slaughter, elevated ultimate pH and poor muscle-meat conversion. Pre-slaughter stress sometimes results to cattle attaining bruises, resulting to the affected parts of the carcass being trimmed and condemned for human consumption, downgrading of the carcass and thus profit losses.

SNS Big-data Analysis and Implication of the Marine and Fisheries Sector (해양수산 SNS 빅데이터 분석 결과 및 시사점)

  • Park, Kwangseo;Lee, Jeongmin;Lee, Sunryang
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.20 no.2
    • /
    • pp.117-125
    • /
    • 2017
  • SNS Big-data Analysis means to find potential value from big data which has produced by the social media. In this paper, SNS Big-data has been analysed to find Korean concerns by using 24 key words from the marine and fisheries sector. Among 24 key words, seafood, shipping and Dokdo Island are the most mentioned ones. Some key words such as ocean policies and marine security that have less concerns have bess mentioned less. Also, key words that are led by government are mostly mentioned by news media, but key words that are led by private sector and have intimate relationship with people's lives are mostly mentioned by Blogs and Twitters. Therefore, reflecting close national concerns by SNS Big-data Analysis and especially resolving negative factors are the most significant part of the policy establishment. Also, differentiated promotion methods need to be prepared because the frequency of key words mentioned from each type of media are different.

Analysis of Experience Knowledge of Shooting Simulation for Training Using the Text Mining and Network Analysis (Text Mining과 네트워크 분석을 활용한 교육훈련용 모의사격 시뮬레이션 경험지식 분석)

  • Kim, Sungkyu;Son, Changho;Kim, Jongman;Chung, Sehkyu;Park, Jaehyun;Jeon, Jeonghwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.5
    • /
    • pp.700-707
    • /
    • 2017
  • Recently, the military need more various education and training because of the increasing necessity of various operation. But the education and training of the military has the various difficulties such as the limitations of time, space and finance etc. In order to overcome the difficulties, the military use Defense Modeling and Simulation(DM&S). Although the participants in training has the empirical knowledge from education and training based on the simulation, the empirical knowledge is not shared because of particular characteristics of military such as security and the change of official. This situation obstructs the improving effectiveness of education and training. The purpose of this research is the systematizing and analysing the empirical knowledge using text mining and network analysis to assist the sharing of empirical knowledge. For analysing texts or documents as the empirical knowledge, we select the text mining and network analysis. We expect our research will improve the effectiveness of education and training based on simulation of DM&S.

Indicator-based Behavior Ontology for Detecting Insider Threats in Network Systems

  • Kauh, Janghyuk;Lim, Wongi;Kwon, Koohyung;Lee, Jong-Eon;Kim, Jung-Jae;Ryu, Minwoo;Cha, Si-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5062-5079
    • /
    • 2017
  • Malicious insider threats have increased recently, and methods of the threats are diversifying every day. These insider threats are becoming a significant problem in corporations and governments today. From a technology standpoint, detecting potential insider threats is difficult in early stage because it is unpredictable. In order to prevent insider threats in early stage, it is necessary to collect all of insiders' data which flow in network systems, and then analyze whether the data are potential threat or not. However, analyzing all of data makes us spend too much time and cost. In addition, we need a large repository in order to collect and manage these data. To resolve this problem, we develop an indicator-based behavior ontology (IB2O) that allows us to understand and interpret insiders' data packets, and then to detect potential threats in early stage in network systems including social networks and company networks. To show feasibility of the behavior ontology, we developed a prototype platform called Insider Threat Detecting Extractor (ITDE) for detecting potential insider threats in early stage based on the behavior ontology. Finally, we showed how the behavior ontology would help detect potential inside threats in network system. We expect that the behavior ontology will be able to contribute to detecting malicious insider threats in early stage.

Investigation of Research Trends in Information Systems Domain Using Topic Modeling and Time Series Regression Analysis (토픽모델링과 시계열회귀분석을 활용한 정보시스템분야 연구동향 분석)

  • Kim, Chang-Sik;Choi, Su-Jung;Kwahk, Kee-Young
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1143-1150
    • /
    • 2017
  • The objective of this study is to examine the trends in information systems research. The abstracts of 1,245 articles were extracted from three leading Korean journals published between 2002 and 2016: Asia Pacific Journal of Information Systems, Information Systems Review, and The Journal of Information Systems. Time series analysis and topic modeling methods were implemented. The topic modeling results showed that the research topics were mainly "systems implementation", "communication innovation", and "customer loyalty". The time series regression results indicated that "customer satisfaction", "communication innovation", "information security", and "personal privacy" were hot topics, and on the other hand, "system implementation" and "web site" were the least popular. This study also provided suggestions for future research.

Implementation of Real-time Video Surveillance System based on Multi-Screen in Mobile-phone Environment (스마트폰 환경에서의 멀티스크린 기반의 실시간 비디오 감시 시스템 개발)

  • Kim, Dae-Jin
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1009-1015
    • /
    • 2017
  • Recently, video surveillance is becoming more and more common as many camera are installed due to crime, terrorism, traffic and security. And systems that control cameras are becoming increasingly general. Video input from the installed camera is monitored by the multiscreen at the central control center, it is essential to simultaneously monitor multiscreen in real-time to quickly respond to situations or dangers. However, monitoring of multiscreen in a mobile environment such as a smart phone is not applied to hardware specifications or network bandwidth problems. For resolving these problems, in this paper, we propose a system that can monitor multiscreen in real-time in mobile-phone environment. We reconstruct the desired multiscreen through transcoding, it is possible to monitor continuously video streaming of multiple cameras, and to have the advantage of being mobile in mobile-phone environment.

Implementation Method of Insurance Object GIS DB for the Storm and Flood Hazard Risks Premium Rate Mapping (풍수해보험 관리지도를 위한 보험 목적물 GIS DB 구축)

  • Lee, Jun-Seok;Lee, In-Su
    • Journal of Cadastre & Land InformatiX
    • /
    • v.45 no.2
    • /
    • pp.87-100
    • /
    • 2015
  • Currently, Korea government has strongly recommended the storm and flood insurance system to reduce the damage caused by natural disasters. The storm and flood insurance operated by private insurance company is the type of policy insurance. and is supervised by Minister of Public Safety and Security. It is the advanced disaster management system which is able to protect the public interests through unexpected natural disaster by assisting some part of the insurance premium from a central or local government. The main purpose of the present investigation is to build the insurance object GIS DB which should be necessary to calculate the premium rate in the map for storm and flood insurance, and also, to perform GIS analysis. The service model in this study is aimed to general single house, apartment and green house. The service management plan targeting the whole country has been investigated in terms of building DB and service operation.