• Title/Summary/Keyword: 복구 기법

Search Result 669, Processing Time 0.024 seconds

Efficient Self-Healing Key Distribution Scheme (효율적인 Self-Healing키 분배 기법)

  • 홍도원;강주성;신상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.141-148
    • /
    • 2003
  • The self-healing key distribution scheme with revocation capability proposed by Staddon et al. enables a dynamic group of users to establish a group key over an unreliable network, and has the ability to revoke users from and add users to the group while being resistant to collusion attacks. In such a protocol, if some packet gets lost, users ale still capable of recovering the group key using the received packets without requesting additional transmission from the group manager. In this scheme, the storage overhead at each group member is O($m^2$1og p) and the broadcast message size of a group manager is O( ((m$t^2$+mt)log p), where m is the number of sessions, t is the maximum number of colluding group members, and p is a prime number that is large enough to accommodate a cryptographic key. In this paper we describe the more efficient self-healing key distribution scheme with revocation capability, which achieves the same goal with O(mlog p) storage overhead and O(($t^2$+mt)log p) communication overhead. We can reduce storage overhead at each group member and the broadcast message size of the group manager without adding additional computations at user's end and group manager's end.

Development of Web-GIS Pilot System for Supporting the Management of River Improvement Works (하천치수사업 관리를 위한 Web GIS 시범시스템 개발)

  • Choi, Hyun-Sang;Koo, Jee-Hee;Jang, Sung-Hyun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.12 no.4 s.31
    • /
    • pp.21-26
    • /
    • 2004
  • Annually repeated flood damage is bringing about the rapid increasement of the loss of human lives and properly, and the enormous social cost for the restoration work is required. The annual amount of flood damage caused by the abnormal climate is reached about 1% of GDP, so more effective management of the flood control operation is needed to prevent the repetitive flood occurred same region. Also, the systematic planning and management or river improvement works are keenly required for the more effective execution of government working budget that expense to recover or to prevent the flood damage. The several organizations of government - Ministry of Construction & Transportation, Ministry of Government Administration and Home Affair, Ministry of Agriculture and Forestry, Ministry of Environment, Ministry of Science & Technology, Korea Meteorological Adminstration and so on - are promoting the flood prevention operations, but those promotion system makes it difficult to maintain the consistency of works. In this study, we try to develop the Web-GIS system prototype that will be able to effectively manage the nationwide river improvement works and to establish a framework that will be able to maintain the consistency of river improvement works. To achieve the study goals, we analysed current system of flood prevention operations, gathered related documents, had interviews with many government employees, and developed the Web-GIS system prototype.

  • PDF

A Basic Study on The Seismic Capacity Evaluation and Repair Reinforcement in Cultural Assets : Focused on Wooden Structure Cultural Assets in Korea and Japan (문화재 내진진단과 보수·보강에 관한 기초적인 연구 -한국과 일본의 목조 건조물 문화재를 중심으로-)

  • Hong, Ji-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.488-495
    • /
    • 2016
  • The purpose of this study is to improve the repair and reinforcement of cultural construction assets made of wood and develop seismic countermeasures. The existing regulations for the earthquake proofing of cultural assets are termed 'Regulations concerning earthquake disasters affecting cultural assets' of the cultural heritage administration, which only specifies the reporting of damage to cultural assets after the occurrence of an earthquake. Since 2013, Korea has been studying the introduction of a seismic evaluation system consisting of experts by referring to the 'Guideline for the diagnosis and reinforcement of important cultural properties in Japan. The earthquake proofing of wooden cultural assets in Japan is assessed by experts using a scoring system similar to the one in Korea, but the system in Japan is managed in three steps, viz. before, during and after the occurrence of the earthquake. In order to extend the existing management system by focusing on the repair of the damage after the occurrence of an earthquake, it is necessary for Korea to cultivate experts for the regular management of cultural assets, establish seismic criteria for them, and introduce a regular management system through a civil organization related to construction. By examining the current status of wooden cultural assets, it is necessary to develop various seismic diagnosis techniques and produce guidelines for the repair and reinforcement of individual wooden cultural construction assets following their identification.

Data-driven event detection method for efficient management and recovery of water distribution system man-made disasters (상수도관망 재난관리 및 복구를 위한 데이터기반 이상탐지 방법론 개발)

  • Jung, Donghwi;Ahn, Jaehyun
    • Journal of Korea Water Resources Association
    • /
    • v.51 no.8
    • /
    • pp.703-711
    • /
    • 2018
  • Water distribution system (WDS) pipe bursts are caused from excessive pressure, pipe aging, and ground shift from temperature change and earthquake. Prompt detection of and response to the failure event help prevent large-scale service interruption and catastrophic sinkhole generation. To that end, this study proposes a improved Western Electric Company (WECO) method to improve the detection effectiveness and efficiency of the original WECO method. The original WECO method is an univariate Statistical Process Control (SPC) technique used for identifying any non-random patterns in system output data. The improved WECO method multiples a threshold modifier (w) to each threshold of WECO sub-rules in order to control the sensitivity of anomaly detection in a water distribution network of interest. The Austin network was used to demonstrated the proposed method in which normal random and abnormal pipe flow data were generated. The best w value was identified from a sensitivity analysis, and the impact of measurement frequency (dt = 5, 10, 15 min etc.) was also investigated. The proposed method was compared to the original WECO method with respect to detection probability, false alarm rate, and averaged detection time. Finally, this study provides a set of guidelines on the use of the WECO method for real-life WDS pipe burst detection.

Design for Deep Learning Configuration Management System using Block Chain (딥러닝 형상관리를 위한 블록체인 시스템 설계)

  • Bae, Su-Hwan;Shin, Yong-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.3
    • /
    • pp.201-207
    • /
    • 2021
  • Deep learning, a type of machine learning, performs learning while changing the weights as it progresses through each learning process. Tensor Flow and Keras provide the results of the end of the learning in graph form. Thus, If an error occurs, the result must be discarded. Consequently, existing technologies provide a function to roll back learning results, but the rollback function is limited to results up to five times. Moreover, they applied the concept of MLOps to track the deep learning process, but no rollback capability is provided. In this paper, we construct a system that manages the intermediate value of the learning process by blockchain to record the intermediate learning process and can rollback in the event of an error. To perform the functions of blockchain, the deep learning process and the rollback of learning results are designed to work by writing Smart Contracts. Performance evaluation shows that, when evaluating the rollback function of the existing deep learning method, the proposed method has a 100% recovery rate, compared to the existing technique, which reduces the recovery rate after 6 times, down to 10% when 50 times. In addition, when using Smart Contract in Ethereum blockchain, it is confirmed that 1.57 million won is continuously consumed per block creation.

Development of integrated disaster mapping method (II) : disaster mapping with risk analysis (통합 재해지도 작성 기법 개발(II) : 리스크 분석을 적용한 재해지도 작성)

  • Park, Jun Hyung;Kim, Byunghyun
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.1
    • /
    • pp.85-97
    • /
    • 2022
  • In this study, a method for an integrated flood risk mapping was proposed that simultaneously considers the flood inundation map indicating the degree of risk and the disaster vulnerability index. This method creates a new disaster map that can be used in actual situations by providing various and specific information on a single map. In order to consider the human, social and economic factors in the disaster map, the study area was divided into exposure, vulnerability, responsiveness, and recovery factors. Then, 7 indicators for each factor were extracted using the GIS tool. The data extracted by each indicator was classified into grades 1 to 5, and the data was selected as a disaster vulnerability index and used for integrated risk mapping by factor. The risk map for each factor, which overlaps the flood inundatoin map and the disaster vulnerability index factor, was used to establish an evacuation plan by considering regional conditions including population, assets, and buildings. In addition, an integrated risk analysis method that considers risks while converting to a single vulnerability through standardization of the disaster vulnerability index was proposed. This is expected to contribute to the establishment of preparedness, response and recovery plans for providing detailed and diverse information that simultaneously considers the flood risk including social, humanistic, and economic factors.

A Case Study on the Cause Analysis of Land creep Using Geophysical Exploration (물리탐사를 활용한 땅밀림 원인분석의 사례적 연구)

  • Jae Hyeon Park;Gyeong Mi Tak;Kook Mook Leem
    • Journal of Korean Society of Forest Science
    • /
    • v.112 no.3
    • /
    • pp.382-392
    • /
    • 2023
  • Recent reports have indicated a rapid increase in the frequency of sediment disasters due to climate change and other changes in the geological environment. Given this alarming situation and the recent increase in the frequency of land creep in Korea, systematic and efficient recovery and management of land creep areas is essential. The purpose of this study is to identify disaster vulnerability by conducting a physical exploration of land creep in San 4-1, Jayeon-ri, Gaegun-myeon, Yangpyeong-gun, Gyeonggi-do, and examine stability by identifying the overall geological structure of the affected ground. In addition, drilling surveys are conducted to verify the reliability of the measured data. The results of the study reveal that low specific resistance abnormalities are distributed in the upper part of the soil layer and weathering zone and that this section is a 50-120 m exploration line. It is also confirmed to be a low-hardness ground area where tensile cracks are observed. Therefore, there is a need for research focused on developing measures to reduce economic and social damage within the domestic context by continuously monitoring indicators of land creep and identifying land creep risks.

Dangerous Area Prediction Technique for Preventing Disaster based on Outside Sensor Network (실외 센서네트워크 기반 재해방지 시스템을 위한 위험지역 예측기법)

  • Jung, Young-Jin;Kim, Hak-Cheol;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.13D no.6 s.109
    • /
    • pp.775-788
    • /
    • 2006
  • Many disaster monitoring systems are constantly studied to prevent disasters such as environmental pollution, the breaking of a tunnel and a building, flooding, storm earthquake according to the progress of wireless telecommunication, the miniaturization of terminal devices, and the spread of sensor network. A disaster monitoring system can extract information of a remote place, process sensor data with rules to recognize disaster situation, and provide work for preventing disaster. However existing monitoring systems are not enough to predict and prevent disaster, because they can only process current sensor data through utilizing simple aggregation function and operators. In this paper, we design and implement a disaster prevention system to predict near future dangerous area through using outside sensor network and spatial Information. The provided prediction technique considers the change of spatial information over time with current sensor data, and indicates the place that could be dangerous in near future. The system can recognize which place would be dangerous and prepare the disaster prevention. Therefore, damage of disaster and cost of recovery would be reduced. The provided disaster prevention system and prediction technique could be applied to various disaster prevention systems and be utilized for preventing disaster and reducing damages.

The Study of quality measurement plan for software reliability (소프트웨어 신뢰도 품질측정 방안에 관한 연구)

  • Lim, Kwang-Hyeon;Ryu, Kwang-Sun;Shon, Ho-Sun;Ryu, Keun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.187-198
    • /
    • 2012
  • International standard for software quality evaluation, ISO/IEC 9126 defines the quality characteristics and sub-characteristics consisting of quality of the software. Also, in this standard, the quality assessment items are presented in metrics based on maturity, fault tolerance, recoverability and compliance which are sub-characteristics of reliability. However, this reliability assessment items which are presented are not applied now due to the mathematical difficulties and the problems caused by collection of data. In order to resolve these problems, this study introduces measures to develop a specific test technique by quality attributes and to measure the quality. In other words, the detailed guidelines are presented to be utilized as a standard by summarizing test activities and techniques by each development life the most commonly used. The SW quality results are derived by assigning weights to software in order of the most important quality characteristics of respective software using checklist that can be easily utilized and applying test technique that can be utilized for detailed evaluation items and checklist. This improves problems that include reliability assessment item of ISO/IEC 9126 as the measures to measure new reliability quality of software.

An Efficient Scheme of Performing Pending Actions for the Removal of Datavase Files (데이터베이스 파일의 삭제를 위한 미처리 연산의 효율적 수행 기법)

  • Park, Jun-Hyun;Park, Young-Chul
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.494-511
    • /
    • 2001
  • In the environment that database management systems manage disk spaces for storing databases directly, this paper proposes a correct and efficient scheme of performing pending actions for the removal of database files. As for performing pending actions, upon performing recovery, the recovery process must identify unperformed pending actions of not-yet-terminated transactions and then perform those actions completely. Making the recovery process identify those actions through the analysis of log records in the log file is the basic idea of this paper. This scheme, as an extension of the execution of transactions, fuzzy checkpoint, and recovery of ARIES, uses the following methods: First, to identify not-yet-terminated transactions during recovery, transactions perform pending actions after writing 'pa_start'log records that signify both the commit of transactions and the start of executing pending actions, and then write 'eng'log records. Second, to restore pending-actions-lists of not-yet-terminated transactions during recovery, each transaction records its pending-actions-list in 'pa_start'log record and the checkpoint process records pending-actions-lists of transactions that are decided to be committed in 'end_chkpt'log record. Third, to identify the next pending action to perform during recovery, whenever a page is updated during the execution of pending actions, transactions record the information that identifies the next pending action to perform in the log record that has the redo information against the page.

  • PDF