• Title/Summary/Keyword: 접근점제어

Search Result 215, Processing Time 0.032 seconds

Notes on Integrated Disaster Management for Resilient Response to Disaster (지역사회 재난 탄력적 대응 위한 통합 재난안전 관리체계 개선방향에 관한 소고)

  • Shin, Sangmin;Park, Heekyung
    • Journal of Korean Society of Disaster and Security
    • /
    • v.8 no.2
    • /
    • pp.11-20
    • /
    • 2015
  • Integrated disaster management system in Korea is recently concerned due to incompletion and inadequacy in establishment of the system. In this regards, this study aims to examine improvement of the domestic integrated disaster management system considering sustainability and resilience concept, which are recently considered in disaster and safety management. To do this, the authors examined the integrated disaster management system with representative principles to enhance sustainability and resilience in community based on diversity and redundancy, connectivity, slow variable, systematic approach, learning and feedback, and active participation. It is believed that the improvements and recommendations proposed by sustainability and resilience principles in this study can contribute to establishment of strategies, policies, and R&D for enhancing domestic integrated disaster management and sustainability and resilience in community.

Network based Anomaly Intrusion Detection using Bayesian Network Techniques (네트워크 서비스별 이상 탐지를 위한 베이지안 네트워크 기법의 정상 행위 프로파일링)

  • Cha ByungRae;Park KyoungWoo;Seo JaeHyun
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.27-38
    • /
    • 2005
  • Recently, the rapidly development of computing environments and the spread of Internet make possible to obtain and use of information easily. Immediately, by opposition function the Hacker's unlawful intrusion and threats rise for network environments as time goes on. Specially, the internet consists of Unix and TCP/IP had many vulnerability. the security techniques of authentication and access controls cannot adequate to solve security problem, thus IDS developed with 2nd defence line. In this paper, intrusion detection method using Bayesian Networks estimated probability values of behavior contexts based on Bayes theory. The contexts of behaviors or events represents Bayesian Networks of graphic types. We profiled concisely normal behaviors using behavior context. And this method be able to detect new intrusions or modificated intrusions. We had simulation using DARPA 2000 Intrusion Data.

  • PDF

A Study on Cloud Network and Security System Analysis for Enhanced Security of Legislative Authority (입법기관의 보안강화를 위한 Cloud 네트워크 분석 및 보안 시스템 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1320-1326
    • /
    • 2011
  • National institutions on the importance of information security is being recognized, information security laws are being discussed in Congress 3.4 DDoS incident and Nonghyup hacking, etc. However, National Assembly Secretariat when the results of the Information Security Consulting has been assessed very low 61.2 points, evaluation of hardware and software in secure areas were vulnerable. This paper, the legislative support agencies National Assembly and National Assembly Secretariat on the network and computer systems, and managerial, technical and physical security elements are analyzed for the status. And network should have the legislative support agencies and system for the physical network separation, DDoS attack response, Virus attack response, hacking attacks response, and Cyber Emergency Response Team/Coordination Center for Cyber infringing design and research through the confidentiality, integrity, availability, access control, authentication and security analysis is based on the evaluation criteria. Through this study, the legislative support agencies to strengthen the security of data and security laws enacted to provide the basis for.

Numerical Analysis of Urea Injection Conditions in the Selective Non-Catalytic Reduction(SNCR) Process (SNCR 공정에서 요소수 분무 조건에 관한 수치 해석)

  • Jung, Yu-Jin;Jeong, Moon-Heon;Park, Ki-Woo;Hong, Sung-Gil;Jung, Jong-Hyeon;Shon, Byung-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2012.05a
    • /
    • pp.356-359
    • /
    • 2012
  • SNCR 기술은 SCR에 비해 탈질 효율은 떨어지지만 촉매없이 고온 배출가스에 NH3 또는 요소수를 직접 분사하여 질소와 물로 환원시키는 방법이므로 초기 투자비 및 운영비가 적어 최근 국내 대다수의 소각장, 산업용 보일러 등에 널리 적용되고 있다. 단, SNCR 기술은 급격한 온도 강하나 접근의 불용이성, 불균일한 혼합, 액적의 증발시간 지연, 불균일한 운전 조건 등의 영향을 크게 받으며, 특히 반응 온도가 가장 중요한 변수로서 최적 반응 온도 영역대가 약 800~$1,000^{\circ}C$라는 점에서 이상적인 반응 온도 조건을 찾아서 환원제를 분무하는 것이 매우 중요하다. 이에 본 연구에서는 열유동 전산해석을 통해 스토커식 소각로의 폐기물 성상별 화염 온도 분포를 예측하고 적정 반응 온도 영역을 확인하여 요소수 주입 고도를 선정, 폐기물 성상별 분무 조건을 확립하고자 수치 해석적 연구를 수행하였다. 폐기물 성상(고질/중질/저질 폐기물)별로 화염 온도를 예측한 결과, 최적 반응 온도 영역대가 약 800~$1,000^{\circ}C$, 폐기물 성상의 심한 변화 때문에 소각로의 효율적인 연소 조건 제어에 어려움 등을 고려하여 약 700~$1,000^{\circ}C$ 온도 영역대를 환원제 분무 온도로 선정하였다. 폐기물별로 발열량에 따른 화염 온도가 모두 다르기 때문에 환원제 분무 위치를 3지점으로 선정하여 각 지점별로 분무 운전 조건을 확립하였다.

  • PDF

A Bio Edutainment Contents System based on Virtual Reality (가상현실 기반의 바이오 교육 콘텐츠)

  • Lee, Jun;Park, SungJun;Kim, HyungSeok;Kim, Jee-In
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.59-65
    • /
    • 2009
  • An Edutainment Contents help the learners to recognize the problems effectively, grasp and classify important information needed to solve the problems and convey the contents of what they have learned. Owing not only to this game-like fun but also to the educational effect, The Edutainment contents can be usefully applied to education and training in the areas of scientific technology and industrial technology. This study proposes the Edutainment that users can apply to biotechnology by using intuitive multi-modal interfaces. In this study, a stereoscopic monitor is used to make three dimensional molecular structures, and multi-modal interface is used to efficiently control. Based on the system, this study easily solved the docking simulation function, which is one of the important experiments, by applying these game factors. For this, we suggested the level-up concept as a game factor that depends on numbers of objects and users.

  • PDF

Study on Temperature Drop Rate during Pressurant Discharge (가압제 토출시 온도강하율에 대한 연구)

  • Chung, Yong-Gahp;Hong, Moon-Geun;Kwon, Oh-Sung;Kim, Young-Mog
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.116-121
    • /
    • 2006
  • The pressurization system in a liquid rocket propulsion system provides a controlled gas pressure in the ullage space of the vehicle propellant tanks. It is advantage to employ a hot gas heat exchanger in the pressurization system to increase the specific volume of the pressurant and thereby reduce over-all system weight. Therefore a significant improvement in pressurization system performance can be achieved, particularly in a cryogenic system. For this study air and $CN_2$ are employed as external fluid and pressurant respectively Numerical analysis on the pressurant discharging characteristics have been compared with the experimental results performed at the PTF(Propellant-feeding Test Facility). It is shown that the discrepancy of analytic and experimental results is within about ${\pm}15%$. It is estimated that the temperature drop rate of cryogenic pressurant immersed liquid oxygen can be predicted using this analytic approach method.

  • PDF

Research on Effective Use of A Serious Bio-Game (기능성 Bio-Game의 활용 방안에 관한 연구)

  • Park, Sung-Jun;Lee, Jun;Kim, Jee-In
    • Journal of Korea Game Society
    • /
    • v.9 no.1
    • /
    • pp.93-103
    • /
    • 2009
  • A Serious Game helps the learners to recognize the problems effectively, grasp and classify important information needed to solve the problems and convey the contents of what they have learned. Owing not only to this game-like fun but also to the educational effect, The Serious Game can be usefully applied to education and training in the areas of scientific technology and industrial technology. This study proposes the Serious Game that users can apply to biotechnology by using intuitive multi-modal interfaces. In this study, a stereoscopic monitor is used to make three dimensional molecular structures, and multi-modal interface is used to efficiently control. Based on a such system, this study easily solved the docking simulation function, which is one of the important experiments, by applying these game factors. For this, we suggested the level-up concept as a game factor that depends on numbers of objects and users. The proposed system was evaluated in performance comparison in result time of a new drug design process on AIDS virus with previous approach.

  • PDF

Assessing Infinite Failure Software Reliability Model Using SPC (Statistical Process Control) (통계적 공정관리(SPC)를 이용한 무한고장 소프트웨어 신뢰성 모형에 대한 접근방법 연구)

  • Kim, Hee Cheul;Shin, Hyun Cheul
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.85-92
    • /
    • 2012
  • There are many software reliability models that are based on the times of occurrences of errors in the debugging of software. It is shown that it is possible to do asymptotic likelihood inference for software reliability models based on infinite failure model and non-homogeneous Poisson Processes (NHPP). For someone making a decision about when to market software, the conditional failure rate is an important variables. The finite failure model are used in a wide variety of practical situations. Their use in characterization problems, detection of outliers, linear estimation, study of system reliability, life-testing, survival analysis, data compression and many other fields can be seen from the many study. Statistical Process Control (SPC) can monitor the forecasting of software failure and there by contribute significantly to the improvement of software reliability. Control charts are widely used for software process control in the software industry. In this paper, we proposed a control mechanism based on NHPP using mean value function of log Poission, log-linear and Parto distribution.

A Deterministic Access Protocol in WiMedia Wireless Personal Area Networks (WiMedia 초고속 근거리 무선 통신에서의 결정적 접근 프로토콜)

  • Park, Hyun-Hee;Pack, Sang-Heon;Kim, Yong-Sun;Kang, Chul-Hee
    • Journal of IKEEE
    • /
    • v.13 no.3
    • /
    • pp.7-17
    • /
    • 2009
  • WiMedia UWB technology is a fully distributed data communication technology developed for the application demanding a high data transmission rate in the wireless PAN area. In general, devices can send data either by reserving time slots or by using prioritized CSMA/CA. If the PCA protocol of prioritized CSMA/CA is used, they are suffered congestion as the number of devices increases. In this paper, we propose a Deterministic Access Protocol(DAP) in WiMedia WPANs. A DAP is a method to transmit data in the non-reserved DRP period without competition as each device informs the beacon order information in the beacon period and the queue information. In addition, the problem that the devices with a lower beacon slot number have more transmission opportunities is addressed by introducing the reference point. Simulation results are given to demonstrate that a DAP can improve the throughput and reduce the packet loss rate.

  • PDF

Two layered Secure Password Generation with Random Number Generator (난수 발생기를 이용한 이중화 구조의 안전한 비밀번호 생성 기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.867-875
    • /
    • 2014
  • Rapid development of internet service is enabling internet banking services in anywhere and anytime. However, service access through internet can be exposed to adversary easily. To prevent, current service providers execute authentication process with user's identification and password. However, majority of users use short and simple password and do not periodically change their password. As a result of this, user's password could be exposed to attacker's brute force attack. In this paper, we presented enhanced password system which guarantee higher security even though users do not change their current password. The method uses additional secret information to replace real password periodically without replacement of real password.