• Title/Summary/Keyword: 행위기법

Search Result 773, Processing Time 0.027 seconds

Design of Infringement Accidents Preventing System Using DNS Information Retrieval Integration Method (DNS 정보 검색 연동 기법을 이용한 침해 사고 예방 시스템 설계)

  • Kim, Kwang-Sup;Park, Young-Gil;Ro, Soong-Hwan;Kim, Bong-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.9
    • /
    • pp.1955-1962
    • /
    • 2012
  • Recently the flow of information security has become a user-centered change. This is mostly breach of security by the normal and abnormal entering harmful files during user internet. Therefore, we would like to design security system that breach of security can be prevented in advance to improve using the reliability of DNS and system control in this paper. In other words, we would like to suggest method can be block randomly to access the site which information security system of user-centric is breached harmful files infected in user computer.

Extending Technology Acceptance Model with Social Influence on Korean College Students' Social Commerce Context (한국 대학생의 소셜 커머스 이용행태 연구: 사회적 영향력으로 확장한 기술수용모형을 중심으로)

  • Joo, Jihyuk
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.107-115
    • /
    • 2015
  • The social commerce is an innovative and emerging transaction. It is the result of combination with transaction and social media technology. This study analyzes Korean college students' social commerce behavior through extending technology acceptance model(TAM) with social influence(SI). We confirmed all proposed hypotheses are significant and supported by the given data through PLS path modeling method with SmartPLS. It indicates that SI is an important factor influencing intention to use, so SI should be consider for theorists to enhance explanation and prediction of TAM and for practitioners to earn higher performances as well. Finally, based on the findings, suggestions for future studies are discussed.

A study of Airline Choice Behavior of Air Freight Forwarders (화물운송주선업자의 항공사 선택행위 연구)

  • Kim, M.S.;Lee, D.S.;Yoo, K.E.
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.13 no.3
    • /
    • pp.85-97
    • /
    • 2005
  • The objective of this study is to investigate freight forwarders' airline choice behaviors in the Korean air cargo transportation market. This study identifies the major factors affecting airline choice and their relative importance by analyzing the data gathered by the survey from freight forwarders in Seoul. The questionnaire of the survey is composed of two parts; the first part is to identify the significant variables of airline choice and the second part is to gather the data about airline choice using stated preference techniques. The relative importance of major variables considered in forwarders' airline choice is estimated by the logit models calibrated with stated preference data. To strength the reliability of the analysis, this study segments the market by three routes; Seoul-Los Angeles, Seoul-Amsterdam and Seoul-Hongkong. The five major variables that are considered seriously in airline choice are reliability, space availability, frequency, cost and flight schedule. The utility trade-offs between variables are estimated by the ratio analysis of coefficients of logit model of each route, and the results of ratio analysis is interpreted as reflecting the reality of market conditions.

  • PDF

A Study on Insider Behavior Scoring System to Prevent Data Leaks

  • Lim, Young-Hwan;Hong, Jun-Suk;Kook, Kwang Ho;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.77-86
    • /
    • 2015
  • The organization shall minimize business risks associated with customer information leaks. Enhance information security activities through voluntary pre-check and must find a way to detect the personal information leakage caused by carelessness and neglect accident. Recently, many companies have introduced an information leakage prevention solution. However, there is a possibility of internal data leakage by the internal user who has permission to access the data. By this thread it is necessary to have the environment to analyze the habit and activity of the internal user. In this study, we use the SFI analytical technique that applies RFM model to evaluate the insider activity levels were carried out case studies is applied to the actual business.

A Study on the Extension of TTCN using Object-Oriented Model (객체 지향 모형을 이용한 TTCN 확장에 관한 연구)

  • 최준규;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.12
    • /
    • pp.1423-1434
    • /
    • 1991
  • This paper extends TTCN, a conformance test notation, using object oriented concepts including object, class and inheritance. In distributed system environments, since test systems that should test the implementations for application protocols whether they conform to the standard protocol include protocol test behaviours executed in parallel, the converntional TTCN can't describe whole thest suites explicitly. ISO is working the extension of TTCN including parallel notations, but concurrently if TTCN could be applied by the object model that regards a parallel test component as a object, we would gain the advantages of reliability and software reusability, and make TTCN a test language.

  • PDF

A Study on Meal Time Estimation and Eating Behavior Recognition Considering Movement Using Wrist-Worn Accelerometer with Its Frequency (손목 움직임과 동작 빈도를 고려한 손목형 가속도계의 식사 행위 및 식사 시간 추론 기법)

  • Park, Kyeong Chan;Choe, Sun-Taag;Cho, We-duke
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.29-36
    • /
    • 2017
  • In this paper, we propose a method for recognizing eating behavior with almost no motion acceleration. First, by using the acceleration of gravity acting on the wrist direction, we calculate the angle between the gravity and the wrist direction. After that, detect wrist reciprocating motion when peak and vally exist in specific angle band. And then, when accumulate the number of wrist reciprocating motion occurrences are up to 10, then regard as the meal time 5 minutes before the detection time. Also, estimate the meal time only if its duration is more than 7 minutes. Using the data of 2128 minutes, which was collected from four graduate student, the result of the meal time estimation shows 95.63% accuracy.

An Intrusion Detection Technique Suitable for TICN (전술정보통신체계(TICN)에 적합한 침입탐지 기법)

  • Lee, Yun-Ho;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.6
    • /
    • pp.1097-1106
    • /
    • 2011
  • Tactical Information Communication Network(TICN), a concept-type integrated Military Communication system that enables precise command control and decision making, is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network works properly only if the participating nodes cooperate in routing and packet forwarding. However, if selfish nodes not forwarding packets of other nodes and malicious nodes making the false accusation are in the network, it is faced to many threats. Therefore, detection and management of these misbehaving nodes is necessary to make confident in Ad-hoc networks. To solve this problem, we propose an efficient intrusion detection technique to detect and manage those two types of attacks. The simulation-based performance analysis shows that our approach is highly effective and can reliably detect a multitude of misbehaving node.

Modeling of Real-Time System for TMO-Based Automatic Code Generator (TMO기반의 코드 자동 생성기 설계를 위한 실시간 시스템 모델링의 기법)

  • Seok, Mi-Heui;Shin, Young-Sul;Ryu, Ho-Dong;Lee, Woo-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06b
    • /
    • pp.136-139
    • /
    • 2010
  • 실시간 시스템에서는 계산 결과의 논리적 정확성과 결과가 산출되는 시간의 정확성을 요구한다. 이러한 요구사항을 지원하기 위해 UCI Dream Lab에서 제안한 적시 서비스 능력을 보장하는 실시간 객체인 TMO 객체를 토대로 자동 코드 생성기의 설계를 제시한다. 기존의 모델 기반 개발방법론은 시스템을 추상화하고 그 모델을 상세화 과정을 거쳐 구현에 필요한 정보를 갖게 되고, 이를 바탕으로 자동으로 코드를 생성 할 수 있게 된다. 기존의 도구들은 표준 UML을 사용하고, 표준 UML은 시간 제약 조건을 기술하는 방법을 제공하지 않기 때문에 이에 따라 개발된 실시간 시스템 코드 자동 생성기는 완전한 코드를 생성하지 못한다. 본 논문에서는 실시간 시스템 개발에 모델 기반 개발방법론을 적용하기 위해 TMO객체를 이용하여 기존 UML 모델의 구조 모델과 행위 모델에 실시간 특성을 추가해 확장하고 확장된 모델을 토대로 자동 코드 생성기의 설계를 제안한다.

  • PDF

Analysis of Inheritance Anomaly due to Integrated of Inheritance and Concurrency (상속성과 병행성 통합에서 오는 상속 변칙 분석)

  • 오승재
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.38-44
    • /
    • 2001
  • The integration of concurrency and object-oriented programming paradigm has been a goal of researchers for over a decade. The concurrent object-oriented programming languages used for various concurrent applications development. However, concurrency and inheritance have conflicting characteristics, thereby inhibiting their simultaneous use without heavy breakage of encapsulation. This conflicting phenomenon is known as inheritance anomalies, have been limited in applicability and have not addressed all the issues that synchronization raises. In this paper, the behavior description equation is introduced for the solution for the conflicting phenomenon, between inheritance and object-based concurrency. As a result, it can solve the several inheritance anomalies and is not necessary to redefine method. Therefor, it offers flexible concurrency model with an emphasis on the reuse of both synchronization and function code.

  • PDF