• Title/Summary/Keyword: 정보 네트워크

Search Result 19,303, Processing Time 0.05 seconds

Prioritization Analysis for Cyber Security Enhancement at Busan Port Container Terminal (부산항 컨테이너 터미널 사이버 보안 강화를 위한 우선순위 분석)

  • Ha, Do-Yeon;Kim, Chi-Yeol;Kim, Yul-Seong
    • Journal of Korea Port Economic Association
    • /
    • v.40 no.1
    • /
    • pp.1-14
    • /
    • 2024
  • The port industry has been actively adopting Fourth Industrial Revolution technologies, leading to transformations in port infrastructure, such as automated and smart ports. While these changes have improved port efficiency, they have also increased the potential for Cyber Security incidents, including data leaks and disruptions in terminal operations due to ransomware attacks. Recognizing the need to prioritize Cyber Security measures, a study was conducted, focusing on Busan Port's rapidly automating container terminal in South Korea. The results of the Eisenhower Matrix analysis identified legal and regulatory factors as a top priority in the first quadrant, with educational systems, workforce development, network infrastructure, and policy support in the third quadrant. Subsequently, a Borich Needs Analysis revealed that the highest priority was given to legal improvements in security management systems, while the development of Cyber Security professionals ranked lowest. This study provides foundational research for enhancing Cyber Security in domestic container terminals and offers valuable insights into their future direction.

An Analysis of Military Strategies in the Israel-Hamas War (2023): Asymmetric Tactics and Implications for International Politics (이스라엘-하마스 전쟁(2023)의 군사전략 분석: 비대칭 전술과 국제정치적 함의)

  • Seung-Hyun Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.389-395
    • /
    • 2024
  • This study aims to deeply analyze the military strategies and tactics used in the battles between Israel and Hamas, to understand the military approaches, technical capabilities, and their impact on the outcomes of the conflict. To achieve this, methodologies such as literature review, data analysis, and case studies were utilized. The research findings confirm that Hamas employed asymmetric tactics, such as rocket attacks and surprise attacks through underground tunnels, to counter Israel's military superiority. On the other hand, Israel responded to Hamas's attacks with the Iron Dome interception system and intelligence-gathering capabilities, but faced difficulties due to Hamas's underground tunnel network. After six months of fighting, the casualties in the Gaza Strip exceeded 30,000, and more than 1.7 million people became refugees. Israel also suffered over 1,200 deaths. Militarily, neither side achieved a decisive victory, resulting in a war of attrition. This study suggests that the Israel-Hamas war exemplifies the complexity of modern asymmetric warfare. Furthermore, it recommends that political compromise between the two sides and active mediation efforts by the international community are necessary for the peaceful resolution of the Israel-Palestine conflict.

Evaluation of the Contribution of Inflow by Water Sources into Hydropower Dam in the Han River basin through Water Balance Analysis (물수지 분석을 통한 한강유역 발전용댐 유입량의 수원별 기여도 평가)

  • Choi, Sijung;Kang, Seongkyu;Noh, Huiseong;Ahn, Jeonghwan
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.44 no.5
    • /
    • pp.649-661
    • /
    • 2024
  • Recently, the need for water supply from hydropower dams has been increasing due to drought. In order to supply water through hydropower dam, the inflow into hydropower dam should be evaluated first. Some of the hydropower dams in the Han River basin are located downstream of multipurpose dam, so it is important to analyze its own inflow of the hydropower dam. The purpose of this study is to evaluate the contribution of inflow by water source to the hydropower dam located in the Han River basin. Water use-related data provided by various domestic institutions were investigated and collected, and a location-based water supply and demand network was constructed. Unlike the existing domestic water balance analysis method, the simulation was conducted in consideration of the amount of transmission loss. The applicability of the analysis method was confirmed through the results of the fitness evaluation (NSE 0.95~0.99 and correlation coefficient 0.98~0.99) comparing the simulated flow with the observed flow at the representative point. Based on the water intake method of the facility and the release method of the remaining multipurpose dam water, a water balance analysis was performed assuming four cases, and the contribution of inflow by water sources into each hydropower dam was evaluated and presented. The research results are expected to provide various information for evaluating the water supply capacity of hydropower dams in the future.

A Study on the Application of Block Chain Technology on EVMS (EVMS 업무의 블록체인 기술 적용 방안 연구)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.39 no.2
    • /
    • pp.39-60
    • /
    • 2020
  • Block chain technology is one of the core elements for realizing the 4th industrial revolution, and many efforts have been made by government and companies to provide services based on block chain technology. In this study we analyzed the benefits of block chain technology for EVMS and designed EVMS block chain platform with increased data security and work efficiency for project management data, which are important assets in monitoring progress, foreseeing future events, and managing post-completion. We did the case studies on the benefits of block chain technology and then conducted the survey study on security, reliability, and efficiency of block chain technology, targeting 18 block chain experts and project developers. And then, we interviewed EVMS system operator on the compatibility between block chain technology and EVM Systems. The result of the case studies showed that block chain technology can be applied to financial, logistic, medical, and public services to simplify the insurance claim process and to improve reliability by distributing transaction data storage and applying security·encryption features. Also, our research on the characteristics and necessity of block chain technology in EVMS revealed the improvability of security, reliability, and efficiency of management and distribution of EVMS data. Finally, we designed a network model, a block structure, and a consensus algorithm model and combined them to construct a conceptual block chain model for EVM system. This study has the following contribution. First, we reviewed that the block chain technology is suitable for application in the defense sector and proposed a conceptual model. Second, the effect that can be obtained by applying block chain technology to EVMS was derived, and the possibility of improving the existing business process was derived.

A Study on the Determinants of Perceived Social Usefulness and Continuous Use Intention of the Internet of things in the Public Sector (공공부문 사물인터넷의 지각된 사회적 유용성 및 지속사용의도 향상을 위한 결정요인에 관한 연구)

  • Yoon, Seong-Jeong;Kim, Min-Yong
    • Management & Information Systems Review
    • /
    • v.36 no.1
    • /
    • pp.115-141
    • /
    • 2017
  • This study is to find the key factors of the Internet of Things for development in public sector. In previous studies, it is said that Internet of Things can work digital system without human operation and gives a lot of outputs(information) users. Generally, people are a subject of operating digital system in traditional way, while people are an object on the internet of things. In other words, it is possible to work digital system with only networking from things to things. After all, it is reported that these advantages of the Internet of Things make possible to reduce social costs significantly in public sector. However, despite the strengths of the Internet of Things, there is a specific user acceptance of the technology factor for the Internet of Things rarely. It means that developing of the Internet of Things only focuses on the final purpose. If the focus on development meet this purpose, the user is ignored for the specific reason that using a technique. As a result of this, many users gradually decrease the continuous using of the Internet of Things. Thus, in this study, we need to find what critical factors should reflect to the Internet of Things in public sector. To find this result, there is no choice to use Technology Acceptance Model(TAM). Many researchers have proved that Technology Acceptance Model is valid through the four process in model introduction, confirmation, expansion and refinement from 1986 to 2003. The results of this study showed that the result explanatory power of Internet of Things in public sector is the most important factor affecting only perceived social usefulness and ease of use. Finally, it can be seen that the user has a positive attitude toward use, which has a positive effect on the intention to use continuously. The implications of this study are summarized as follows: When the public Internet of Things service is provided, it means that the user can easily understand the result, and when the person and the object communicate the result to each other, they should be able to communicate with each other. This means that a lot of user effort is needed to understand the outcome of the public Internet of Things being provided.

  • PDF

The research of promotion plan about regional design innovation center - focusing on the establishment and roll - (지역디자인 혁신센터의 활성화 방안에 대한 연구 - 설립과 역할(활동)을 중심으로 -)

  • Yun, Young-Tae
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.85-94
    • /
    • 2005
  • The purpose of this research is the activation proposal about the local design innovation center that was established as a national design policy For this proposal, I have to research about the established process of local design innovation center and then, I analyzed the present condition of local design innovation center for the promoting plan. As a result, we must establish three basic elements to activate the local design center. the first, we have to know the local characteristic. the second, we have to make up the management direction of local design center the third, we have to get the sympathy from the local administration and local people for the positive support. With above conditions, the local design innovation center have to arrange infra elements. (1) design developing facilities for the lending to the local designer, (2) professional designer for the developing of design industry, (3) program development for various activities, (4) the trend research for supply to local company, (5) design one stop service support, (6) the network foundation construction between design administration and design company for the active communication, (7) the innovation of design center for the benefit model, (8) the local design policy establishment with local administration, (9) the independent management of responsibility for the fulfillment For the promotion of the local design innovation center have to make efforts continually with below listed elements. 1. Design supporting for the local industry 2. Various design campaign for the spreading of public recognition about design 3. The supporting for design company and local company with established facilities and expensive equipments. 4. The construction of design information infra for local company 5. The development of new program about the connection between industry and university. 6. The development of local characteristic and local image innovation to make new local where we are.

  • PDF

T-Cache: a Fast Cache Manager for Pipeline Time-Series Data (T-Cache: 시계열 배관 데이타를 위한 고성능 캐시 관리자)

  • Shin, Je-Yong;Lee, Jin-Soo;Kim, Won-Sik;Kim, Seon-Hyo;Yoon, Min-A;Han, Wook-Shin;Jung, Soon-Ki;Park, Se-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.5
    • /
    • pp.293-299
    • /
    • 2007
  • Intelligent pipeline inspection gauges (PIGs) are inspection vehicles that move along within a (gas or oil) pipeline and acquire signals (also called sensor data) from their surrounding rings of sensors. By analyzing the signals captured in intelligent PIGs, we can detect pipeline defects, such as holes and curvatures and other potential causes of gas explosions. There are two major data access patterns apparent when an analyzer accesses the pipeline signal data. The first is a sequential pattern where an analyst reads the sensor data one time only in a sequential fashion. The second is the repetitive pattern where an analyzer repeatedly reads the signal data within a fixed range; this is the dominant pattern in analyzing the signal data. The existing PIG software reads signal data directly from the server at every user#s request, requiring network transfer and disk access cost. It works well only for the sequential pattern, but not for the more dominant repetitive pattern. This problem becomes very serious in a client/server environment where several analysts analyze the signal data concurrently. To tackle this problem, we devise a fast in-memory cache manager, called T-Cache, by considering pipeline sensor data as multiple time-series data and by efficiently caching the time-series data at T-Cache. To the best of the authors# knowledge, this is the first research on caching pipeline signals on the client-side. We propose a new concept of the signal cache line as a caching unit, which is a set of time-series signal data for a fixed distance. We also provide the various data structures including smart cursors and algorithms used in T-Cache. Experimental results show that T-Cache performs much better for the repetitive pattern in terms of disk I/Os and the elapsed time. Even with the sequential pattern, T-Cache shows almost the same performance as a system that does not use any caching, indicating the caching overhead in T-Cache is negligible.

The Study on The Cyber Communities of Migrant Workers in Korea (한국 이주 노동자의 '사이버 공동체'에 관한 연구)

  • Lee, Jeong Hyang;Kim, Yeong Kyeong
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.2
    • /
    • pp.324-339
    • /
    • 2013
  • This study aims to investigate the characteristics of cyber communities composed of migrant workers from communities without propinquity in Korea. Its methods are both qualitative and quantitative. It further seeks to discover the relationship between the social capital formed and reproduced within these cyber communities and participants' cultural adaptation to Korean society. The study revealed that ethnic and non-ethnic communities differed in terms of strength of cohesion, space constraints, and links with the outside world. The former showed characteristics of a localized community type. The main motivations for migrant workers' participation in the ethnic cyber community were communication and friendship rather than cooperation and sharing among members. They usually used cyber communication media to communicate with one another. Conversely, the latter showed characteristics of an integrative type. Despite the difficulties in applying for membership and information provided in Korean, a high percentage of migrant workers participated in the community to obtain crucial information. The results did not show a significant correlation between social capital and migrant workers' traits within the cyber community, while a strong correlation emerged among four factors of social capital: faith, norms, networking, and political participation. The study showed that social capital in the cyber community was in direct proportion to an integrative type of cultural adaptation to Korean society. In particular, there was a strong connection between the cultural adaptation exhibited by members of the migrant subculture and their participation in discussions on political issues and human rights, with some migrants even functioning as agents of social change as participants in citizens' movements. The findings suggest that the cyber community facilitates the migrant subculture's communication with and integration into the indigenous Korean culture. Migrant workers' participation in the cyber community is therefore validated as an instrumental practice for members of this subculture to adapt to Korean society.

  • PDF

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Radiation Oncology Digital Image Chart 8nd Digital Radiotherapv Record System at Samsung Medical Center (디지털 화상 병력 시스템과 디지털 방사선치료 기록 시스템의 개발과 사용 경험)

  • Huh Seung Jae;Ahn Yong Chan;Lim Do Hoon;Cho Chung Keun;Kim Dae Yong;Yeo Inhwan;Kim Moon Kyung;Chang Seung Hee;Park Suk Won
    • Radiation Oncology Journal
    • /
    • v.18 no.1
    • /
    • pp.67-72
    • /
    • 2000
  • Background :The authors have developed a Digital image chart(DIC) and digital Radiotherapy Record System (DRRS). We have evaluated the DIC and DRRS for reliability, usefulness, ease of use, and efficiency. Materials and Methods :The basic design of the DIC and DRRS was to build an digital image database of radiation therapy Patient records for a more efficient and timely flow of critical image information throughout the department. This system is a submit of comprehensive radiation oncology management system (C-ROMS) and composed of a picture archiving and communication system (PACS), a radiotherapy information database, and a radiotherapy imaging database. The DIC and DRRS were programmed using Delphi under a Windows 95 environment and is capable of displaying the digital images of patients identification photos, simulation films, radiotherapy setup, diagnostic radiology images, gross lesion Photos, and radiotherapy Planning isodose charts with beam arrangements. Twenty-three clients in the department are connected by Ethernet (10 Mbps) to the central image server (Sun Ultra-sparc 1 workstation). Results :From the introduction of this system in February 1998 through December 1999, we have accumulated a total of 15,732 individual images for 2,556 patients. We can organize radiation therapy in a 'paperless' environment in 120 patients with breast cancer. Using this system, we have succeeded in the prompt, accurate, and simultaneous access to patient care information from multiple locations throughout the department. This coordination has resulted in improved operational efficiency within the department. Conclusion :The authors believe that the DIC and DRRS has contributed to the improvement of radiation oncology department efficacy as well as to time and resource savings by providing necessary visual information throughout the department conveniently and simultaneously. As a result, we can also achieve the 'paperless' and 'filmless' practice of radiation oncology with this system.

  • PDF