• Title/Summary/Keyword: self-protection technique

Search Result 21, Processing Time 0.02 seconds

An Improvement of Distance Relay Technique Reliability using Elman Network (Elman Network를 이용한 거리계전기법의 신뢰성 향상)

  • Jung, H.S.;Lee, J.J.;Shin, M.C.;Lee, B.K.;Park, C.W.;Jang, S.I.
    • Proceedings of the KIEE Conference
    • /
    • 2000.07a
    • /
    • pp.212-214
    • /
    • 2000
  • The distance relay technique used for transmission line protection operates overreach and underreach to the self protection region because the power system becomes complex and fault conditions are different. To solve these problems, this paper describes new technique to set the reliable self protection lesion. The trip region of the quadrilateral distance relay is set by training of multi layer recurrent elman network. The proposed network is able to reach the trip zone for the fault impedance, fault initial angle and source impedance variance correctly.

  • PDF

An Analysis Of The Importance Of The Evaluation Criteria Of The Real Estate Financial Consumer Protection System - Utilizing The AHP Technique (부동산 금융소비자 보호 체계의 평가 기준 간 중요도 분석: AHP 기법을 활용하여)

  • Lee, Yeon-Jae;Shin, Seung-Woo
    • Asia-Pacific Journal of Business
    • /
    • v.13 no.3
    • /
    • pp.227-243
    • /
    • 2022
  • Purpose - This study surveyed real estate financial consumers and financial company staff regarding the components of the financial consumer protection system to seek detailed improvement plans for the Financial Consumer Protection Act. Design/methodology/approach - The Analytic Hierarchy Process (AHP) technique is applied. Findings - Both consumers and staff highly evaluated the importance of the preventive measures in the main classification factors. Regarding the sub-classification factors of preventive measures, consumers emphasized the responsible management of investment staff and financial institutions; however, the staff stressed the principle of effectiveness and efficiency. Regarding the elements of ex-post remedies, consumers answered that fast remedy would have a significant effect. At the same time, staff believed that punitive measures hinder free trading and investment activities. Regarding the sub-sub classification factors of prevention measures, the consumers value responsible management of staff and financial companies, while the staff tend to prefer the importance of the self-regulatory governance. Research implications or Originality - Based on the above results, financial regulatory authorities should find a balance between preventive and ex-post components once focusing on preventative measures. Our paper is one of the first research findings in this field of financial consumer protection system in Korea.

Assessment for Efficiency of Two-Stage Randomized Response Technique

  • Park, Kyung-Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.7 no.2
    • /
    • pp.427-433
    • /
    • 2000
  • In this paper, we review several two-stage randomized response techniques for gathering self-report data when persons are asked sensitive question. Also efficiencies and privacy protections based on the two-stage randomized response procedures are compared. Finally, we find optimal parameter conditions.

  • PDF

A study of analysis and improvement of security vulnerability in Bluetooth for data transfer (블루투스 환경에서 데이터 전송 시 보안 취약점 분석 및 개선 방안 관련 연구)

  • Baek, Jong-Kyung;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.6
    • /
    • pp.2801-2806
    • /
    • 2011
  • During data transmissions via Bluetooth networks, data to be encrypted, or plain text between the application layer and the device layer, can be hacked similar to a key-logger by the major function hooking technique of Windows Kernel Driver. In this paper, we introduce an improved protection module which provides data encryption transmission by modifying the data transmission driver of the Bluetooth device layer, and also suggest a self-protecting scheme which prevents data exposure by various hacking tools. We implement the protection module to verify the confidentiality guarantee. Our protection module which provides data encryption with minimal latency can be expected the widespread utilization in Bluetooth data transmission.

Protection Motivation Theory and Rabies Protective Behaviors Among School Students in Chonburi Province, Thailand

  • Laorujisawat, Mayurin;Wattanaburanon, Aimutcha;Abdullakasim, Pajaree;Maharachpong, Nipa
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.6
    • /
    • pp.431-440
    • /
    • 2021
  • Objectives: The aim of this study was to predict rabies protective behaviors (RPB) based on protection motivation theory (PMT) among fourth-grade students at schools in Chonburi Province, Thailand. Methods: This cross-sectional study was conducted from December 2020 to February 2021. A multistage sampling technique was used for sample selection. The questionnaire was divided into socio-demographic data and questions related to PMT and RPB. Descriptive statistical analysis was conducted using the EpiData program and inferential statistics, and the results were tested using the partial least squares model with a significance level of less than 5%. Results: In total, 287 subjects were included, of whom 62.4% were girls and 40.4% reported that YouTube was their favorite media platform. Most participants had good perceived vulnerability, response efficacy, and self efficacy levels related to rabies (43.9, 68.6, and 73.2%, respectively). However, 54.5% had only fair perceived severity levels related to rabies. Significant positive correlations were found between RPB and the PMT constructs related to rabies (β, 0.298; p<0.001), and the school variable (S4) was also a predictor of RPB (β, -0.228; p<0.001). Among the PMT constructs, self efficacy was the strongest predictor of RPB (β, 0.741; p<0.001). Conclusions: PMT is a useful framework for predicting RPB. Future RPB or prevention/protection intervention studies based on PMT should focus on improving self efficacy and response efficacy, with a particular focus on teaching students not to intervene with fighting animals. The most influential PMT constructs can be used for designing tools and implementing and evaluating future educational interventions to prevent rabies in children.

Cost-effective method for reducing local failure of floodwalls verified by centrifuge tests

  • Chung R. Song;Binyam Bekele;Brian D. Sawyer;Ahmed Al-Ostaz;Alexander Cheng;Vanadit-Ellis Wipawi
    • Geomechanics and Engineering
    • /
    • v.33 no.2
    • /
    • pp.155-165
    • /
    • 2023
  • Hurricane Katrina swept New Orleans, Louisiana, USA, in 2005, causing more than 1,000 fatalities and severe damage to the flood protection system. Recovery activities are complete, however, clarifying failure mechanisms and devising resilient and cost-effective retrofitting techniques for the flood protection system are still of utmost importance to enhance the general structural integrity of water retaining structures. This study presents extensive centrifuge test results to find various failure mechanisms and effective retrofitting techniques for a levee system. The result confirmed the rotational failure and translational failure mechanisms for the London Ave. Canal levee and 17th St. Canal levee, respectively. In addition, it found that the floodwalls with fresh waterstop in their joints perform better than those with old/weathered waterstop by decreasing pore water pressure build-up in the levee. Structural caps placed on the top of the joints between I-walls could also prevent local failure by spreading the load to surrounding walls. At the same time, the self-sealing bentonite-sand mixture installed along the riverside of floodwalls could mitigate the failure of floodwalls by blocking the infiltration of seepage water into the gap formed between levee soils and floodwalls.

Digital Watermarking Technique using self-similarity (자기유사성을 이용한 디지털 워터마킹 기법)

  • Lee, Mun-Hee;Lee, Young-hee
    • The Journal of Korean Association of Computer Education
    • /
    • v.6 no.4
    • /
    • pp.37-47
    • /
    • 2003
  • In this paper. we propose a new digital watermarking technique which uses the self-similarity of OCT(Discrete Cosine Transform) coefficients for the ownership protection of an image, similar coefficients are classified by SOM(Self-Organizing Map) out of Neural Network. The watermark is inserted into the selected cluster among clusters which consist of coefficients. Generally, the inserted watermark in high frequency regions of an image is eliminated by the compression process such as JPEG compressions, and the inserted watermark in low frequency regions of an image causes the distortion of an image quality. Therefore, the watermark is inserted into the cluster that has many coefficients in the middle frequency regions. This algorithm reduces the distortion of an image quality because of inserting the watermark into an image according to the number of coefficients in selected cluster. To extract watermarks from the watermarked image, the selected cluster is used without an original image. In the experiment, the new proposed algorithm have a good quality and endure attacks(JPEG compressions, filtering. zoom in, zoom out, cropping, noises) very well.

  • PDF

Secure De-identification and Data Sovereignty Management of Decentralized SSI using Restructured ZKP (재구성된 영지식 증명을 활용한 탈중앙형 자기 주권 신원의 안전한 비식별화 및 데이터 주권 관리)

  • Cho, Kang-Woo;Jeon, Mi-Hyeon;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.205-217
    • /
    • 2021
  • Decentralized SSI(Self Sovereign Identity) has become an alternative to a new digital identity solution, but an efficient de-identification technique has not been proposed due to the unique algorithmic characteristics of data transactions. In this study, to ensure the decentralized operation of SSI, we propose a de-identification technique that does not remove identifiers by restructuring the verification results of ZKP (Zero Knowledge Proof) into a form that can be provided to the outside by the verifier. In addition, it is possible to provide restructured de-identification data without the consent of data subject by proposing the concept of differential sovereignty management for each entity participating in verification. As a result, the proposed model satisfies the domestic personal information protection law in a decnetralized SSI, in addition provides secure and efficient de-identification processing and sovereignty management.

The Comparative Study of The View about the Craftsmanship of Korean and Japanese (한국과 일본의 장인(匠人)정신 비교 연구)

  • Jeong, Su Hyun
    • Cross-Cultural Studies
    • /
    • v.35
    • /
    • pp.215-235
    • /
    • 2014
  • The purpose of this paper look at the basis of the cultural differences of Korean and Japan by comparing the craftsmanship. Korean craftsmanship and master craftsman making traditional handcrafts and artwork would die out at a critical moment. The craftsmanship and system could not be established because of discrimination in the traditional four classes of society( scholars, farmers, artisans and tradesmen), invasions of other countries and discontinuity of tradition from modernization. On the contrast, in Japan, it was possible to establish traditional handcrafts and artworks, technique and craftsmanship with apprentice system and various social privilege and treatment even in the same traditional four classes of society ( scholars, farmers, artisans and tradesmen). It was common to pass down the family business for a hundreds of years with self respect between Japanese master craftsmen and lots of people succeed the family business will now. Japanese craftsmanship is originated from 'worship to god' Medieval Japanese believed that the thing changes human mind, artistic talent, masterpieces and faith were connected to sacred power. Therefore, master craftsmen and their works were also made by the power of god. In this context, craftsmen were protected and treated in socially and nationally. It is that the social treatments and supports in national level and their own pride and continuous training of techniques and abilities as the main driving force to maintain the craftsmanship in Japan. Korea has the sale level of competitive tradition and technique in comparison any other countries. Japanese craftsmanship study will be a critical data in the protection and maintenance of Korean traditional and technique.

Modelling protection behaviour towards micronutrient deficiencies: Case of iodine biofortified vegetable legumes as health intervention for school-going children

  • Mogendi, Joseph Birundu;De Steur, Hans;Gellynck, Xavier;Makokha, Anselimo
    • Nutrition Research and Practice
    • /
    • v.10 no.1
    • /
    • pp.56-66
    • /
    • 2016
  • BACKGROUND/OBJECTIVES: Despite successes recorded in combating iodine deficiency, more than 2 billion people are still at risk of iodine deficiency disorders. Rural landlocked and mountainous areas of developing countries are the hardest hit, hence the need to explore and advance novel strategies such as biofortification. SUBJECTS/METHODS: We evaluated adoption, purchase, and consumption of iodine biofortified vegetable legumes (IBVL) using the theory of protection motivations (PMT) integrated with an economic valuation technique. A total of 1,200 participants from three land-locked locations in East Africa were recruited via multi-stage cluster sampling, and data were collected using two, slightly distinct, questionnaires incorporating PMT constructs. The survey also elicited preferences for iodine biofortified foods when offered at a premium or discount. Determinants of protection motivations and preferences for iodine biofortified foods were assessed using path analysis modelling and two-limit Tobit regression, respectively. RESULTS: Knowledge of iodine, iodine-health link, salt iodization, and biofortification was very low, albeit lower at the household level. Iodine and biofortification were not recognized as nutrient and novel approaches, respectively. On the other hand, severity, fear, occupation, knowledge, iodine status, household composition, and self-efficacy predicted the intention to consume biofortified foods at the household level; only vulnerability, self-efficacy, and location were the most crucial elements at the school level. In addition, results demonstrated a positive willingness-to-pay a premium or acceptance of a lesser discount for biofortification. Furthermore, preference towards iodine biofortified foods was a function of protection motivations, severity, vulnerability, fear, response efficacy, response cost, knowledge, iodine status, gender, age. and household head. CONCLUSIONS: Results lend support for prevention of iodine deficiency in unprotected populations through biofortification; however 'threat' appraisal and socio-economic predictors are decisive in designing nutrition interventions and stimulating uptake of biofortification. In principle, the contribution is threefold: 1) Successful application of the integrated model to guide policy formulation; 2) Offer guidance to stakeholders to identify and tap niche markets; 3) stimulation of rural economic growth around school feeding programmes.