• Title/Summary/Keyword: 정책기반 네트워크 관리

Search Result 283, Processing Time 0.025 seconds

A Study on Zero Trust Technology Trends (제로 트러스트 기술 동향에 관한 연구)

  • Miyeon Kim;DaeGyeom Kim;Jong-Min Jang;Sang-Jun Park;Souhwan Jung;Jungsoo Park
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.15-26
    • /
    • 2023
  • Due to the global COVID-19 pandemic, which has led to a shift towards remote work, the frequency of external access to important internal resources by companies has increased exponentially, exposing them to various security threats. In order to address these access security issues, ZTA (Zero Trust Architecture) has gained attention. ZTA operates on the principle of not trusting external or internal users, and manages access authentication and authorization strictly according to pre-established policies. This paper analyzes the definition of ZTA and key research trends, and summarizes different ZTA solutions for each company.

Accurate dam inflow predictions using SWLSTM (정확한 댐유입량 예측을 위한 SWLSTM 개발)

  • Kim, Jongho;Tran, Trung Duc
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2021.06a
    • /
    • pp.292-292
    • /
    • 2021
  • 최근 데이터 과학의 획기적인 발전으로 딥러닝(Deep Learning) 알고리즘이 개발되어 다양한 분야에 널리 적용되고 있다. 본 연구에서는 인공신경망 중 하나인 LSTM(Long-Short Term Memory) 네트워크를 기반으로 정확한 댐유입량 예측을 수행하는 SWLSTM 모델을 제안하였다. SWLSM은 모델의 정확도를 개선하기 위해 세 가지 주요 아이디어를 채택하였다. (1) 통계적 속성 (PACF) 및 교차 상관 함수(CCF)를 사용하여 적절한 입력 변수와 시퀀스 길이를 결정하였다. (2) 선택된 입력 예측 변수 시계열을 웨이블릿 변환(WT)을 사용하여 하위 시계열로 분해한다. (3) k-folds cross validation 및 random search 기법을 사용하여 LSTM의 하이퍼 매개변수들을 효율적으로 최적화하고 검증한다. 제안된 SWLSTM의 효과는 한강 유역 5개 댐의 시단위/일단위/월단위 유입량을 예측하고 과거 자료와 비교함으로써 검증하였다. 모델의 정확도는 다양한 평가 메트릭(R2, NSE, MAE, PE)이 사용하였으며, SWLSTM은 모든 경우에서 LSTM 모델을 능가하였다. (평가 지표는 약 30 ~ 80 % 더 나은 성능을 보여줌). 본 연구의 결과로부터, 올바른 입력 변수와 시퀀스 길이의 선택이 모델 학습의 효율성을 높이고 노이즈를 줄이는 데 효과적임을 확인하였다. WT는 홍수 첨두와 같은 극단적인 값을 예측하는 데 도움이 된다. k-folds cross validation 및 random search 기법을 사용하면 모델의 하이퍼 매개변수를 효율적으로 설정할 수 있다. 본 연구로부터 댐 유입량을 정확하게 예측한다면 정책 입안자와 운영자가 저수지 운영, 계획 및 관리에 도움이 될 것이다.

  • PDF

A Comparative Study on the Characteristics of Cultural Heritage in China and Vietnam (중국과 베트남의 문화유산 특성 비교 연구)

  • Shin, Hyun-Sil;Jun, Da-Seul
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.40 no.2
    • /
    • pp.34-43
    • /
    • 2022
  • This study compared the characteristics of cultural heritage in China and Vietnam, which have developed in the relationship of mutual geopolitical and cultural influence in history, and the following conclusions were made. First, the definition of cultural heritage in China and Vietnam has similar meanings in both countries. In the case of cultural heritage classification, both countries introduced the legal concept of intangible cultural heritage through UNESCO, and have similarities in terms of intangible cultural heritage. Second, while China has separate laws for managing tangible and intangible cultural heritages, Vietnam integrally manages the two types of cultural heritages under a single law. Vietnam has a slower introduction of the concept of cultural heritage than China, but it shows high integration in terms of system. Third, cultural heritages in both China and Vietnam are graded, which is applied differently depending on the type of heritage. The designation method has a similarity in which the two countries have a vertical structure and pass through steps. By restoring the value of heritage and complementing integrity through such a step-by-step review, balanced development across the country is being sought through tourism to enjoy heritage and create economic effects. Fourth, it was confirmed that the cultural heritage management organization has a central government management agency in both countries, but in China, the authority of local governments is higher than that of Vietnam. In addition, unlike Vietnam, where tangible and intangible cultural heritage are managed by an integrated institution, China had a separate institution in charge of intangible cultural heritage. Fifth, China is establishing a conservation management policy focusing on sustainability that harmonizes the protection and utilization of heritage. Vietnam is making efforts to integrate the contents and spirit of the agreement into laws, programs, and projects related to cultural heritage, especially intangible heritage and economic and social as a whole. However, it is still dependent on the influence of international organizations. Sixth, China and Vietnam are now paying attention to intangible heritage recently introduced, breaking away from the cultural heritage protection policy centered on tangible heritage. In addition, they aim to unite the people through cultural heritage and achieve the nation's unified policy goals. The two countries need to use intangible heritage as an efficient means of preserving local communities or regions. A cultural heritage preservation network should be established for each subject that can integrate the components of intangible heritage into one unit to lay the foundation for the enjoyment of the people. This study has limitations as a research stage comparing the cultural heritage system and preservation management status in China and Vietnam, and the characteristic comparison of cultural heritage policies by type remains a future research task.

Architecture Description Model for Common IT Resource Identification in e-Government Systems (공동활용자원식별을 위한 전자정부 시스템 아키텍처 서술 방안)

  • Shin, Soo-Jeong;Choi, Young-Jin;Jung, Suk-Chun;Seo, Yong-Won
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.631-642
    • /
    • 2009
  • Although the Korean government is making great effort to prevent the redundancy in IT investment and efficiently allocate the IT budget, actual achievements are quite limited because of the variety of IT resources and different architecture description among organizations and projects. Thus, a standardized description model of the system architecture is strongly needed to identify the common resources and improve the efficiency of IT investment. Therefore, in this paper, we have developed the function-network matrix model which can be used as the basic template for a standard for architecture description of e-Government systems. The function-network matrix model integrates the function tiers and the network areas into a single unified framework, which enables the functionality of each component and the flow of information clearly visible. Moreover, we described the architectures of Korean e-government’s citizen service systems using our model, resulting in clear demonstration of the similarities and differences between different systems, and easy identification of the common resources. Using the architecture description model developed in this research, the consolidation of national IT resources can be promoted, and non-expert IT users can easily recognize the architecture of their systems. In addition, more efficient and systematic IT resource management can be achieved using our model.

Update Policy and Estimation of Uncertain Position Using Trajectory Information (위상 정보를 이용한 갱신 정책과 불확실한 위치 정보에 대한 추정 기법)

  • Sim, Tai-Jung;Kim, Jae-Hong;Jung, Won-Il;Jang, Yong-Il;Bae, Hae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1651-1654
    • /
    • 2003
  • 이동 단말의 보급이 보편화됨에 따라 이동 객체의 위치 정보를 기반으로 사용자에게 사람이나 사물, 차량 등과 같은 이동 객체의 위치를 파악하여 그에 대한 정보를 제공해 주는 시스템이 필요로 하게 되었나 이러만 이동 객체관리 시스템에서는 계속적으로 위치 정보가 변화하는 이동 객체의 특성상 데이터의 빈번한 갱신이 일어나게 되고 DBMS에 명시적으로 저장되지 않은 위치 정보에 대해서도 보다 정확한 위치를 사용자에게 제공해 주어야 한다. 그러나 차량의 위치 추적과 같이 적용 개체가 차량에 한정된 경우 이동 경로가 도로상으로 제한되어 있으므로 이동 경로를 예측하기 힘든 사람과 같은 객체와는 특성이 나르나 따라서 차량 객체에 대해 보다 효과적인 서비스를 제공해 주기 위해서는 사람에 대한 위치 추적과는 다른 갱신 정책과 불확실한 위치의 추정 기법이 필요하다. 본 논문에서는 공간 데이터에 저장된 도로의 위상 정보와 차량의 속도 속성을 이용한 갱신 정책을 정하여 갱신 빈도수로 줄이고 도로 레이어의 위상 정보를 통해 불확실한 과거 및 미래의 위치로 추정하는 기법을 제안한다. 제안한 갱신 정책은 차량의 속도를 고려하여 현재의 위치에서 도로상의 교차점에 도착하는 시점의 위치를 예측하여 데이터의 갱신 시점으로 결정한다. 또한 불확실한 위치에 대한 추정은 이동하는 도회와 대응되는 위상 정보를 기반으로 차량의 이동 방향을 예측하 여 불확실한 미래의 위치를 결정할 수 있으며 명시적으로 저장되지 않은 과거 위치 정보의 검색에 대한 요청이 발생했을 경우 위상 정보를 이용하여 위치를 보정하고 사용자에게 보나 높은 정확성을 지닌 정보를 제공해 줄 수 있다.다. SQL Server 2000 그리고 LSF를 이용하였다. 그리고 구현 환경과 구성요소에 대한 수행 화면을 보였다.ool)을 사용하더라도 단순 다중 쓰레드 모델보다 더 많은 수의 클라이언트를 수용할 수 있는 장점이 있다. 이러한 결과를 바탕으로 본 연구팀에서 수행중인 MoIM-Messge서버의 네트워크 모듈로 다중 쓰레드 소켓폴링 모델을 적용하였다.n rate compared with conventional face recognition algorithms. 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며

  • PDF

Blockchain Technology for Healthcare Big Data Sharing (헬스케어 빅데이터 유통을 위한 블록체인기술 활성화 방안)

  • Yu, Hyeong Won;Lee, Eunsol;Kho, Wookyun;Han, Ho-seong;Han, Hyun Wook
    • The Journal of Bigdata
    • /
    • v.3 no.1
    • /
    • pp.73-82
    • /
    • 2018
  • At the core of future medicine is the realization of Precision Medicine centered on individuals. For this, we need to have an open ecosystem that can view, manage and distribute healthcare data anytime, anywhere. However, since healthcare data deals with sensitive personal information, a significant level of reliability and security are required at the same time. In order to solve this problem, the healthcare industry is paying attention to the blockchain technology. Unlike the existing information communication infrastructure, which stores and manages transaction information in a central server, the block chain technology is a distributed operating network in which a data is distributed and managed by all users participating in the network. In this study, we not only discuss the technical and legal aspects necessary for demonstration of healthcare data distribution using blockchain technology but also introduce KOREN SDI Network-based Healthcare Big Data Distribution Demonstration Study. In addition, we discuss policy strategies for activating blockchain technology in healthcare.

Cryptanalysis and Remedy Scheme on Qiu et al.'s Enhanced Password Authentication Scheme for SIP (SIP를 위한 Qiu등의 개선된 패스워드 인증 기법에 대한 보안 분석 및 강화 기법)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.18 no.5
    • /
    • pp.249-256
    • /
    • 2020
  • The session initiation protocol (SIP) is a signaling protocol, which is used to controlling communication session creation, manage and finish over Internet protocol. Based on it, we can implement various services like voice based electronic commerce or instant messaging. Recently, Qiu et al. proposed an enhanced password authentication scheme for SIP. However, this paper withdraws that Qiu et al.'s scheme is weak against the off-line password guessing attack and has denial of service problem. Addition to this, we propose an improved password authentication scheme as a remedy scheme of Qiu et al.'s scheme. For this, the proposed scheme does not use server's verifier and is based on elliptic curve cryptography. Security validation is provided based on a formal validation tool ProVerif. Security analysis shows that the improved authentication scheme is strong against various attacks over SIP.

Container Transportation Models in Industrial Estate Area (산업단지내 효율적 컨테이너 운송을 위한 수송 모형)

  • Shin, Jae Young;Kim, Woong-Sub
    • Journal of Navigation and Port Research
    • /
    • v.38 no.2
    • /
    • pp.171-176
    • /
    • 2014
  • Companies are facing challenges to have high competitiveness because of continuous oil price rising and CO2 emissions regulations. Thus, companies are trying hard to construct effective logistics and operation system to achieve high customer service quality and saving cost. Also the ec-friendly idustrial complex is needed. Busan is in process to construct GILC(Global Industry Logistics City) in west Busan province to achieve high competitiveness and support lack of industrial complex. To construct this kind of logistics industrial complex, it needs logistics system through proper policy and freight transportation co-operation. Especially, efficient management through logistics hierarchy construction in industrial complex is very important for low cost and eco-friendly point of view. Therefore, this paper aims to analyze logistics system and suggest operation model to present logistics complex construction base data.

A MAC Parameter Optimization Scheme for IEEE 802.11e-based Multimedia Networks (IEEE 802.11e 기반 멀티미디어 네트워크를 위한 MAC 매개 변수 최적화 방법)

  • Sung, Min-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.2
    • /
    • pp.455-461
    • /
    • 2008
  • Enhanced Distributed Channel Access (EDCA) is a channel access scheme adopted by the IEEE 802.11e draft standard for QoS-enabled wireless local area networks. It classifies traffic into separate Access Categories (ACs) and achieves service differentiation by allowing each AC to have its own values of channel access parameters. This paper proposes a scheme to dynamically adapt the EDCA parameters to traffic environment so that they both maximize the throughput of non real-time traffics and meet the delay and throughput constraints of real-time traffics. For this purpose, we develop a design algorithm for efficient exploration of the EDCA parameter space. Using the algorithm, we derive a Pareto curve fur delay-throughput trade-off in each anticipated traffic environment. The Pareto database can then be used to optimally adjust the parameter according to the traffic environment and administrative policies. Simulation results show that compared with the default parameter configuration, the proposed scheme is better for delay, throughput guarantee and can improve the throughput of non real-time traffics by 12% on average.

Security Vulnerability and Countermeasures in Smart Farm (스마트 팜에서의 보안 취약점 및 대응 방안에 관한 연구)

  • Chae, Cheol-Joo;Han, Sang-Kyun;Cho, Han-Jin
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.313-318
    • /
    • 2016
  • Recently, the smart farm development using a PC and smart phone to manag the farm for improving competitiveness is in progress. In the smart farm, by using the various ICT technology including RFID, Wi-Fi, ZigBee, Wireless LAN, and etc., the growing environment of the crop and animals can be managed with the remote. By using the network including not only the TCP/IP based wired network but also ZigBee, Wireless LAN, and etc., each of the devices installed in the smart farm transmits the growing environment data to the server. So, smart farms have information and network security vulnerability. Therefore, we propose the method that analyzes the security vulnerability which can begenerated in the smart farm and user authentication method.