• Title/Summary/Keyword: 능동 모델

Search Result 705, Processing Time 0.029 seconds

A step-by-step service encryption model based on routing pattern in case of IP spoofing attacks on clustering environment (클러스터링 환경에 대한 IP 스푸핑 공격 발생시 라우팅 패턴에 기반한 단계별 서비스 암호화 모델)

  • Baek, Yong-Jin;Jeong, Won-Chang;Hong, Suk-Won;Park, Jae-Hung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.6
    • /
    • pp.580-586
    • /
    • 2017
  • The establishment of big data service environment requires both cloud-based network technology and clustering technology to improve the efficiency of information access. These cloud-based networks and clustering environments can provide variety of valuable information in real-time, which can be an intensive target of attackers attempting illegal access. In particular, attackers attempting IP spoofing can analyze information of mutual trust hosts constituting clustering, and attempt to attack directly to system existing in the cluster. Therefore, it is necessary to detect and respond to illegal attacks quickly, and it is demanded that the security policy is stronger than the security system that is constructed and operated in the existing single system. In this paper, we investigate routing pattern changes and use them as detection information to enable active correspondence and efficient information service in illegal attacks at this network environment. In addition, through the step-by -step encryption based on the routing information generated during the detection process, it is possible to manage the stable service information without frequent disconnection of the information service for resetting.

Development of the Algorithm for Traffic Accident Auto-Detection in Signalized Intersection (신호교차로 내 실시간 교통사고 자동검지 알고리즘 개발)

  • O, Ju-Taek;Im, Jae-Geuk;Hwang, Bo-Hui
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.5
    • /
    • pp.97-111
    • /
    • 2009
  • Image-based traffic information collection systems have entered widespread adoption and use in many countries since these systems are not only capable of replacing existing loop-based detectors which have limitations in management and administration, but are also capable of providing and managing a wide variety of traffic related information. In addition, these systems are expanding rapidly in terms of purpose and scope of use. Currently, the utilization of image processing technology in the field of traffic accident management is limited to installing surveillance cameras on locations where traffic accidents are expected to occur and digitalizing of recorded data. Accurately recording the sequence of situations around a traffic accident in a signal intersection and then objectively and clearly analyzing how such accident occurred is more urgent and important than anything else in resolving a traffic accident. Therefore, in this research, we intend to present a technology capable of overcoming problems in which advanced existing technologies exhibited limitations in handling real-time due to large data capacity such as object separation of vehicles and tracking, which pose difficulties due to environmental diversities and changes at a signal intersection with complex traffic situations, as pointed out by many past researches while presenting and implementing an active and environmentally adaptive methodology capable of effectively reducing false detection situations which frequently occur even with the Gaussian complex model analytical method which has been considered the best among well-known environmental obstacle reduction methods. To prove that the technology developed by this research has performance advantage over existing automatic traffic accident recording systems, a test was performed by entering image data from an actually operating crossroad online in real-time. The test results were compared with the performance of other existing technologies.

Abnormal Crowd Behavior Detection via H.264 Compression and SVDD in Video Surveillance System (H.264 압축과 SVDD를 이용한 영상 감시 시스템에서의 비정상 집단행동 탐지)

  • Oh, Seung-Geun;Lee, Jong-Uk;Chung, Yongw-Ha;Park, Dai-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.183-190
    • /
    • 2011
  • In this paper, we propose a prototype system for abnormal sound detection and identification which detects and recognizes the abnormal situations by means of analyzing audio information coming in real time from CCTV cameras under surveillance environment. The proposed system is composed of two layers: The first layer is an one-class support vector machine, i.e., support vector data description (SVDD) that performs rapid detection of abnormal situations and alerts to the manager. The second layer classifies the detected abnormal sound into predefined class such as 'gun', 'scream', 'siren', 'crash', 'bomb' via a sparse representation classifier (SRC) to cope with emergency situations. The proposed system is designed in a hierarchical manner via a mixture of SVDD and SRC, which has desired characteristics as follows: 1) By fast detecting abnormal sound using SVDD trained with only normal sound, it does not perform the unnecessary classification for normal sound. 2) It ensures a reliable system performance via a SRC that has been successfully applied in the field of face recognition. 3) With the intrinsic incremental learning capability of SRC, it can actively adapt itself to the change of a sound database. The experimental results with the qualitative analysis illustrate the efficiency of the proposed method.

The Influence of Authentic Leadership on Intention to Share Knowledge Through Organization Identification and Organization Commitment: Analysis of the Moderating Effect of Reciprocal Feedback and Task Interdependence (진성 리더십이 조직 동일시와 조직 몰입을 통해 지식공유 의도에 미치는 영향: 상호피드백과 업무 상호의존성 조절효과 분석)

  • Hwang, Inho
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.6
    • /
    • pp.269-285
    • /
    • 2021
  • As the systematic management of knowledge within an organization is recognized as a core factor for the continuous growth of an organization, organizations are increasing their interest in knowledge management. Knowledge management requires the active sharing of knowledge by insiders of the organization, but there are cases of failure due to the lack of participation of leaders and employees of the organization. The purpose of this study is to suggest a mechanism by which the authentic leadership of leaders in small and medium-sized enterprises(SME), which are relatively lacking in knowledge production capacity, leads to intention to share knowledge of employees. In addition, the study confirms that reciprocal feedback and task interdependence moderate the relationship between antecedent factors and intention to share knowledge. In this study, a research model was derived based on precedent research, and 272 samples were obtained by conducting a questionnaire survey on employees of SME that introduced a knowledge management policy. And, the study verified the hypothesis by applying structural equation modeling based on AMOS 22.0. The results of the study proved that authentic leadership has a positive effect on the intention to share knowledge through organization identification and organization commitment, and confirmed that reciprocal feedback and work interdependence moderate the relationship between knowledge sharing intentions and antecedent factors. This study suggests the mechanism by which the authentic behavior of the leaders of SMEs affects the knowledge sharing behavior of employees, and suggests that work cooperation strengthens the influence of the mechanism.

Research and Application of Satellite Orbit Simulation for Analysis of Optimal Satellite Images by Disaster Type : Case of Typhoon MITAG (2019) (재난유형별 최적 위성영상 분석을 위한 위성 궤도 시뮬레이션 연구 및 적용 : 태풍 미탁(2019) 사례)

  • So-Mang, LIM;Ki-Mook, KANG;Eui-Ho, HWANG;Wan-Sik, YU
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.4
    • /
    • pp.210-221
    • /
    • 2022
  • In order to promptly respond to disasters, the era of new spaces has opened where satellite images with various characteristics can be used. As the number of satellites in operation at home and abroad increases and the characteristics of satellite sensors vary, it is necessary to find satellite images optimized for disaster types. Disaster types were divided into typhoons, heavy rains, droughts, forest fires, etc., and the optimal satellite images were selected for each type of disaster considering satellite orbits, active/passive sensors, spatial resolution, wavelength bands, and revisit cycles. Each satellite orbit TLE (Two Line Element) information was applied to the SGP4 (Simplified General Perturbations version 4) model to develop a satellite orbit simulation algorithm. The developed algorithm simulated the satellite orbit at 10-second intervals and selected an accurate observation area by considering the angle of incidence of each sensor. The satellite orbit simulation algorithm was applied to the case of Typhoon Mitag in 2019 and compared with the actual satellite list. Through the analyzed results, the time and area of the captured image and the image to be recorded were analyzed within a few seconds to select the optimal satellite image according to the type of disaster. In the future, it is intended to serve as a basis for building a system that can promptly request and secure satellite images in the event of a disaster.

A study on perceived interactivity of Dance video contents and intention to use: Focused on YouTube (무용영상콘텐츠의 정보서비스 이용에 대한 상호작용성 인식과 이용지속의도에 관한 연구- 유투브를 중심으로)

  • Jung, Sae-Bom;Won, Do-Yeon;Jang, Young-Jin
    • 한국체육학회지인문사회과학편
    • /
    • v.55 no.3
    • /
    • pp.349-363
    • /
    • 2016
  • The purpose of this study was to perceived interactivity about experience of using dance video contents and intention to use. This study was examine an adaptive model of Technology Acceptance Model and focused on YouTube. In order to achieve the purpose of this study, total 350 questionnaires were surveyed and 311 data were finally analyzed. All data were processed through SPSS for Windows 20.0 version and AMOS 18.0. For the analysis of data, frequency analysis, reliability analysis, confirmatory factor analysis, correlation analysis, model evaluation, and structural equation modeling techniques. The results were as follows. first. Perceived Interactivity had not affect on perceived usefulness but two-way communication, user control among the sub-factor in perceived Interactivity had a positive effect on perceived ease of use. second, perceived ease of use had a positive effect on perceived usefulness. Lastly, Perceived usefulness had not affect intention to use, but perceived ease of use had a positive effect on intention use.

A Study on Intelligent Self-Recovery Technologies for Cyber Assets to Actively Respond to Cyberattacks (사이버 공격에 능동대응하기 위한 사이버 자산의 지능형 자가복구기술 연구)

  • Se-ho Choi;Hang-sup Lim;Jung-young Choi;Oh-jin Kwon;Dong-kyoo Shin
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.137-144
    • /
    • 2023
  • Cyberattack technology is evolving to an unpredictable degree, and it is a situation that can happen 'at any time' rather than 'someday'. Infrastructure that is becoming hyper-connected and global due to cloud computing and the Internet of Things is an environment where cyberattacks can be more damaging than ever, and cyberattacks are still ongoing. Even if damage occurs due to external influences such as cyberattacks or natural disasters, intelligent self-recovery must evolve from a cyber resilience perspective to minimize downtime of cyber assets (OS, WEB, WAS, DB). In this paper, we propose an intelligent self-recovery technology to ensure sustainable cyber resilience when cyber assets fail to function properly due to a cyberattack. The original and updated history of cyber assets is managed in real-time using timeslot design and snapshot backup technology. It is necessary to secure technology that can automatically detect damage situations in conjunction with a commercialized file integrity monitoring program and minimize downtime of cyber assets by analyzing the correlation of backup data to damaged files on an intelligent basis to self-recover to an optimal state. In the future, we plan to research a pilot system that applies the unique functions of self-recovery technology and an operating model that can learn and analyze self-recovery strategies appropriate for cyber assets in damaged states.

Open Innovation in Car-Sharing Industry: Focusing on the Cooperation Case between Gongcar and Rental Car Company (카셰어링 산업의 개방형 혁신: (주)공카와 렌터카 업체간 개방형 혁신 사례를 중심으로)

  • Kiyeon Hwang;Jaehong Park;Youngwoo Sohn;Woosung Nam;Yeonhwa Cho
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.19 no.1
    • /
    • pp.93-105
    • /
    • 2024
  • Car-sharing is a representative model of the sharing economy, and it is a service that rents or uses a car for the necessary time without owning a car. This industry is growing due to various factors such as technological advances, increasing awareness of environmental protection, and increasing demand for solving traffic congestion problems in cities. Accordingly, there is a need for a strategic approach for companies providing car-sharing services to respond quickly to market changes in order to expand market share and differentiate services. Accordingly, this study conducted a case study on open innovation activities between Gongcar and existing rental car companies, focusing on the research question "What effects do open innovation activities between car-sharing companies and existing rental car companies cause?" As a result of the study, it was confirmed that Gongcar have (1) the ability to actively respond to market fluctuations by establishing a flexible vehicle supply chain based on demand, (2) have significantly reduced growth capital expenditure (Growth Capex), and both cafe and rental car companies have (3) performed successful open innovation by improving key KPI indicators and recording financial performance. This study reveals how open innovation acts as a key business growth engine in the car-sharing industry, and its significance is found in that it empirically confirmed the successful implementation conditions of open innovation based on resource dependence theory.

  • PDF

Fun of Animation-on the Correlation among the Perceptive fun, the Cognitive fun and the Psychological fun (애니메이션의 재미 - 감각적 재미, 인지적 재미, 심리적 재미의 상관관계)

  • Sung, Re-A
    • Cartoon and Animation Studies
    • /
    • s.33
    • /
    • pp.99-126
    • /
    • 2013
  • This study is meant to be seeing how fun of animation works by reviewing it theoretically and coordinating it to suggest the structure which integrates fun of animation and validates the proposed fun model. After reviewing fun theoretically, the fun of animation could be able to coordinate that fun of animation is consist of perceptive fun, cognitive fun, and psychological fun. Perceptive fun is induced by visual, auditory and other sensory information and it is directly affected the image, sound, and movement. Cognitive fun can be obtained by reasoning and interpretation to mobilize their knowledge with sensuously perceived stimulation and it is directly affected the story. Psychological fun occurs when the audience see the animation. The psychological fun is the psychological emotional state when the audience watches animation by relieving psychological congestion. It consists of fun of unfamiliarity or identification. By suggesting research model and validating it how the perceptive fun, cognitive fun, and psychological fun affects each other, perceptive fun enhances cognitive fun and psychological fun. Although cognitive fun enhances psychological fun, cognitive fun enhances psychological fun twice than perceptive fun. Also when perceptive fun affects psychological fun, cognitive fun shows the indirect effect as a parameter. In conclusion, perceptive fun affects psychological fun directly and be enhanced through cognitive fun. Fun of animation can be experienced when perceptive fun caused by accepting sensory information of animation instantly, cognitive fun caused by interpretation and understanding sensory information of animation, and psychological fun caused by relieving psychological identity through recognition fuses and acts as one. An animation emphasized a certain element is difficult to be loved by the audience. In this reason, an harmonical combination among the elements of story, image, sound and movement are important to combinate harmoniously for a successful animation to make the audiences fun by arising funny emotions.

Directions of Implementing Documentation Strategies for Local Regions (지역 기록화를 위한 도큐멘테이션 전략의 적용)

  • Seol, Moon-Won
    • The Korean Journal of Archival Studies
    • /
    • no.26
    • /
    • pp.103-149
    • /
    • 2010
  • Documentation strategy has been experimented in various subject areas and local regions since late 1980's when it was proposed as archival appraisal and selection methods by archival communities in the United States. Though it was criticized to be too ideal, it needs to shed new light on the potentialities of the strategy for documenting local regions in digital environment. The purpose of this study is to analyse the implementation issues of documentation strategy and to suggest the directions for documenting local regions of Korea through the application of the strategy. The documentation strategy which was developed more than twenty years ago in mostly western countries gives us some implications for documenting local regions even in current digital environments. They are as follows; Firstly, documentation strategy can enhance the value of archivists as well as archives in local regions because archivist should be active shaper of history rather than passive receiver of archives according to the strategy. It can also be a solution for overcoming poor conditions of local archives management in Korea. Secondly, the strategy can encourage cooperation between collecting institutions including museums, libraries, archives, cultural centers, history institutions, etc. in each local region. In the networked environment the cooperation can be achieved more effectively than in traditional environment where the heavy workload of cooperative institutions is needed. Thirdly, the strategy can facilitate solidarity of various groups in local region. According to the analysis of the strategy projects, it is essential to collect their knowledge, passion, and enthusiasm of related groups to effectively implement the strategy. It can also provide a methodology for minor groups of society to document their memories. This study suggests the directions of documenting local regions in consideration of current archival infrastructure of Korean as follows; Firstly, very selective and intensive documentation should be pursued rather than comprehensive one for documenting local regions. Though it is a very political problem to decide what subject has priority for documentation, interests of local community members as well as professional groups should be considered in the decision-making process seriously. Secondly, it is effective to plan integrated representation of local history in the distributed custody of local archives. It would be desirable to implement archival gateway for integrated search and representation of local archives regardless of the location of archives. Thirdly, it is necessary to try digital documentation using Web 2.0 technologies. Documentation strategy as the methodology of selecting and acquiring archives can not avoid subjectivity and prejudices of appraiser completely. To mitigate the problems, open documentation system should be prepared for reflecting different interests of different groups. Fourth, it is desirable to apply a conspectus model used in cooperative collection management of libraries to document local regions digitally. Conspectus can show existing documentation strength and future documentation intensity for each participating institution. Using this, documentation level of each subject area can be set up cooperatively and effectively in the local regions.