• Title/Summary/Keyword: 분석네트워크 프로세스

Search Result 249, Processing Time 0.026 seconds

Business Model for Intelligent Traffic Facility Management Service Based on Ubiquitous Technology (유비쿼터스 기술 기반의 지능형 교통시설물관리서비스를 위한 비즈니스 모델)

  • Yu, Sung-Yeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.41-53
    • /
    • 2009
  • In this paper, we propose the system structure and technologies to implement a business model for an intelligent traffic facility management system based on ubiquitous technology. The business model includes the service functions, service structure, business process, and demand and supply relationship among the participants in this model. We also propose an approach to implementing the model. This includes the network, infrastructure and platform to be used for system composition. We then present the results from an analysis by comparison of different technologies and an adequate technology structure. Finally, this paper may present guidelines to managing traffic facilities.

Researching the planning and implementation of an IT service desk automation system with a focus on customers. (고객관점의 IT 서비스데스크 자동화 시스템의 설계와 구현에 관한 연구)

  • Park, Sung-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.395-398
    • /
    • 2007
  • 오늘날 기업에서의 IT 는 급격한 비즈니스 환경의 변화와 다양한 비즈니스 모델의 출현으로 인해 점점 더 복잡해지고 있고, 비즈니스의 IT 의존도 또한 지속적으로 증가하고 있다. 이러한 상황에서 기업의 정보시스템을 운영하는 IT 운영조직은 사용자에게 IT 서비스의 품질향상과 비즈니스의 연속성을 보장할 수 있는 지원체계를 필요로 하고 있다. 1990년대 후반에 들어서 ITIL 을 기반으로 한 ITSM 개념이 국내에 도입 되면서 기존의 콜센터와 헬프데스크를 통한 IT 서비스지원 방식을 서비스데스크로 통합하게 되었고, 서비스데스크 자동화 시스템의 도입을 통해 기업의 모든 비즈니스 조직의 IT 와 관련된 요구사항을 관리하고 있다. 하지만 이러한 서비스데스크 자동화 시스템은 IT 서비스 제공자 관점에서 구축되었고 운영방향 또한 어플리케이션, 서버, 네트워크 등 기술적인 구성요소의 성능 향상에만 초점을 두었기 때문에 현업 사용자들이 만족 할 수 있는 실질적인 수준의 서비스 개선은 이루어지지 못하고 있다. 이에 본 연구에서는 고객관점에서의 요구사항 분석을 통해, 운영조직의 IT 서비스 요청에 대한 처리활동을 단순처리와 일반처리로 분류하고 이를 자동화 시스템에 반영 하였고, 실제 A 사(社)의 IT 운영조직에 적용하여, 비효율적인 저부가가치 활동과 고부가 가치의 활동이 시스템을 통해 분류가 가능함을 보였다. 아울러 IT 운영조직의 활동을 정량적으로 관리 할 수 있도록 관리지표를 발굴하고 자동화 시스템의 서비스요청관리 프로세스에 적용하여 IT 서비스를 제공받는 회사의 관리조직과 경영층이 IT 운영조직의 활동을 정량적으로 관리하고 측정할 수 있는 IT 서비스데스크 자동화 시스템의 개선모델을 제시 하였다.

Improving University Homepage FAQ Using Semantic Network Analysis (의미 연결망 분석을 활용한 대학 홈페이지 FAQ 개선방안)

  • Ahn, Su-Hyun;Lee, Sang-Jun
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.11-20
    • /
    • 2018
  • The Q&A board is widely used as a means of communicating service enquiries, and the need for efficient management of the enquiry system has risen because certain questions are being repeatedly and frequently registered. This study aims to construct a student-centered FAQ, centered on the unstructured data posted on the university homepage's Q&A board. We extracted major keywords from 690 postings registered in the recent 3 years, and conducted the semantic network analysis to find the relationship between the keywords and the centrality analysis in order to carry out network visualization. The most central keywords found through the analysis, in order of centrality, were application, curriculum, credit point, completion, graduation, approval, period, major, portal, department. Also, the major keywords were classified into 8 groups of course, register, student life, scholarship, library, dormitory, IT and commute. If the most frequent questions are organized into these areas to form the FAQ, based on the results above, it is expected to contribute to user convenience and the efficiency of administration by simplifying the service enquiry process for repeated questions, as well as enabling smooth two-way communication among the members of the university.

Reinforcement Mining Method for Anomaly Detection and Misuse Detection using Post-processing and Training Method (이상탐지(Anomaly Detection) 및 오용탐지(Misuse Detection) 분석의 정확도 향상을 위한 개선된 데이터마이닝 방법 연구)

  • Choi Yun-Jeong;Park Seung-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06b
    • /
    • pp.238-240
    • /
    • 2006
  • 네트워크상에서 발생하는 다양한 형태의 대량의 데이터를 정확하고 효율적으로 분석하기 위해 설계되고 있는 마이닝 시스템들은 목표지향적으로 훈련데이터들을 어떻게 구축하여 다룰 것인지에 대한 문제보다는 대부분 얼마나 많은 데이터 마이닝 기법을 지원하고 이를 적용할 수 있는지 등의 기법에 초점을 두고 있다. 따라서, 점점 더 에이전트화, 분산화, 자동화 및 은닉화 되는 최근의 보안공격기법을 정확하게 탐지하기 위한 방법은 미흡한 실정이다. 본 연구에서는 유비쿼터스 환경 내에서 발생 가능한 문제 중 복잡하고 지능화된 침입패턴의 탐지를 위해 데이터 마이닝 기법과 결함허용방법을 이용하는 개선된 학습알고리즘과 후처리 방법에 의한 RTPID(Refinement Training and Post-processing for Intrusion Detection)시스템을 제안한다. 본 논문에서의 RTPID 시스템은 active learning과 post-processing을 이용하여, 네트워크 내에서 발생 가능한 침입형태들을 정확하고 효율적으로 다루어 분석하고 있다. 이는 기법에만 초점을 맞춘 기존의 데이터마이닝 분석을 개선하고 있으며, 특히 제안된 분석 프로세스를 진행하는 동안 능동학습방법의 장점을 수용하여 학습효과는 높이며 비용을 감소시킬 수 있는 자가학습방법(self learning)방법의 효과를 기대할 수 있다. 이는 관리자의 개입을 최소화하는 학습방법이면서 동시에 False Positive와 False Negative 의 오류를 매우 효율적으로 개선하는 방법으로 기대된다. 본 논문의 제안방법은 분석도구나 시스템에 의존하지 않기 때문에, 유사한 문제를 안고 있는 여러 분야의 네트웍 환경에 적용될 수 있다.더욱 높은성능을 가짐을 알 수 있다.의 각 노드의 전력이 위험할 때 에러 패킷을 발생하는 기법을 추가하였다. NS-2 시뮬레이터를 이용하여 실험을 한 결과, 제안한 기법이 AOMDV에 비해 경로 탐색 횟수가 최대 36.57% 까지 감소되었음을 알 수 있었다.의 작용보다 더 강력함을 시사하고 있다.TEX>로 최고값을 나타내었으며 그 후 감소하여 담금 10일에는 $1.61{\sim}2.34%$였다. 시험구간에는 KKR, SKR이 비교적 높은 값을 나타내었다. 무기질 함량은 발효기간이 경과할수록 증하였고 Ca는 $2.95{\sim}36.76$, Cu는 $0.01{\sim}0.14$, Fe는 $0.71{\sim}3.23$, K는 $110.89{\sim}517.33$, Mg는 $34.78{\sim}122.40$, Mn은 $0.56{\sim}5.98$, Na는 $0.19{\sim}14.36$, Zn은 $0.90{\sim}5.71ppm$을 나타내었으며, 시험구별로 보면 WNR, BNR구가 Na만 제외한 다른 무기성분 함량이 가장 높았다.O to reduce I/O cost by reusing data already present in the memory of other nodes. Finally, chunking and on-line compression mechanisms are included in both models. We demonstrate that we can obtain significantly high-performanc

  • PDF

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

A Development of Analysis Tool and the Analysis of Vulnerabilities on the Program Source Code (프로그램 소스코드 취약성 분석 및 분석도구의 개발)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.27-34
    • /
    • 2004
  • The recent explosive use of the Internet and the development of computer communication technologies reveal serious computer security problem. Inspite of many studies on secure access to the system, generally, the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the Program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

A Study on Quality Assurance of Embedded Software Source Codes for Weapon Systems by Improving the Reliability Test Process (신뢰성 시험 프로세스 개선을 통한 무기체계 내장형 소프트웨어 소스코드 품질확보에 관한 연구)

  • Kwon, Kyeong Yong;Joo, Joon Seok;Kim, Tae Sik;Oh, Jin Woo;Baek, Ji Hyun
    • Journal of KIISE
    • /
    • v.42 no.7
    • /
    • pp.860-867
    • /
    • 2015
  • In the defense field, weapon systems are increasing in importance, as well as the weight of the weapon system embedded software development as an advanced technology. As the development of a network-centric warfare has become important to secure the reliability and quality of embedded software in modern weapons systems in battlefield situations. Also, embedded software problems are transferred to the production stage in the development phase and the problem gives rise to an enormous loss at the national level. Furthermore, development companies have not systematically constructed a software reliability test. This study suggests that approaches about a qualityverification- system establishment of embedded software, based on a variety of source code reliability test verification case analysis.

Research on The Implementation of Smart Factories through Bottleneck improvement on extrusion production sites using NFC (NFC를 활용한 압출생산현장의 Bottleneck 개선을 통한 스마트팩토리 구현 연구)

  • Lim, Dong-Jin;Kwon, Kyu-Sik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.104-112
    • /
    • 2021
  • For extrusion processes in the process industry, the need to build smart factories is increasing. However, in most extrusion production sites, the production method is continuous, and because the properties of the data are undeed, it is difficult to process the data. In order to solve this problem, we present a methodology utilizing a near field communication (NFC) sensor rather than water-based data entry. To this end, a wireless network environment was built, and a data management method was designed. A non-contact NFC method was studied for the production performance-data input method, and an analysis method was implemented using the pivot function of the Excel program. As a result, data input using NFC was automated, obtaining a quantitative effect from reducing the operator's data processing time. In addition, using the input data, we present a case where a bottleneck is improved due to quality problems.

Designing the Optimal Urban Distribution Network using GIS : Case of Milk Industry in Ulaanbaatar Mongolia (GIS를 이용한 최적 도심 유통 네트워크 설계 : 몽골 울란바타르 내 우유 산업 사례)

  • Enkhtuya, Daariimaa;Shin, KwangSup
    • The Journal of Bigdata
    • /
    • v.4 no.2
    • /
    • pp.159-173
    • /
    • 2019
  • Last-Mile delivery optimization plays a key role in the urban supply chain operation, which is the most expensive and time-consuming and most complicated part of the whole delivery process. The urban consolidation center (UCC) is regarded as a significant asset for supporting customer demand in the last-mile delivery service. It is the key benefit of UCC to improve the load balance of vehicles and to reduce the total traveling distance by finding the better route with the well-organized multi-leg vehicle journey in the urban area. This paper presents the model using multiple scenario analysis integrated with mathematical optimization techniques using Geographic Information System (GIS). The model aims to find the best solution for the distribution network consisted of DC and UCC, which is applied to the case of Ulaanbaatar Mongolia. The proposed methodology integrates two sub-models, location-allocation model and vehicle routing problem. The multiple scenarios devised by selecting locations of UCC are compared considering the general performance and delivery patterns together. It has been adopted to make better decisions the quantitative metrics such as the economic value of capital cost, operating cost, and balance of using available resources. The result of this research may help the manager or public authorities who should design the distribution network for the last mile delivery service optimization using UCC within the urban area.

  • PDF

A Study on the Analysis of Vulnerabilities in the Program Source Code (프로그램 소스코드 취약성 분석에 관한 연구)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.3-8
    • /
    • 2004
  • The majority of recent intrusions reveal that the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF