• Title/Summary/Keyword: Administrator

Search Result 576, Processing Time 0.025 seconds

A Study on Factor Evaluation for Risk Management of Hazardous Substance at Port (항만의 위험물 리스크 관리를 위한 요인평가에 관한 연구)

  • YOUN, Dong-ha;KIM, Sun-gu;CHOI, Young-suk
    • The Journal of shipping and logistics
    • /
    • v.34 no.4
    • /
    • pp.565-581
    • /
    • 2018
  • The purpose of this study is evaluate factor for risk management of hazardous substance at ports. The analysis was conducted by applying Fuzzy-AHP methodology, through a questionnaire for hazardous substance experts from Busan, Gwangyang, Incheon, and Ulsan, which are the major Korean ports. Three measurement areas and nine sub-factors were selected for the study. The results of this analysis showed that "human resource management" (HR) was the most important factor (0.445) in the three measurement areas. After applying the conversion weight, the sub-factors were ranked according to their priority as follows: "a secure of administrator skill" (0.158) had the first rank, "an improvement in administrator duty" (0.150) had the second, and "consolidation of safety education" (0.136) had the third rank.

Studies on the role of the system administrator according to the changing IT environment (IT환경변화에 따른 시스템 관리자의 역할에 관한 연구)

  • Choi, Dae-young;Kim, Myung-su;Seo, Won-woo;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.264-266
    • /
    • 2014
  • The current is quickly changed to a simple structure in the existing system architecture is complex and diverse structures. Especially due to the new cyber threat is growing more and more system risks. And many kinds of system monitoring and analysis tools are released in order to minimize the risk, but there is a limit to such a system depends on the Partially automated tools. Therefore, to present the role of a system administrator for effectively managing the system for the new changing environment out of the frame of the old system in order to minimize the systemic risk management system in this study.

  • PDF

Smart Vehicle Parking Management System using Image Processing

  • Waqas, Maria;Iftikhar, Umar;Safwan, Muhammad;Abidin, Zain Ul;Saud, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.161-166
    • /
    • 2021
  • The term parking management system usually refers to the custom built hardware intensive systems installed in building and malls. However, there are many places where such expensive solutions cannot be installed due to various reasons, like cost and urgent/temporary setup requirements. This project focuses on developing a parking management system based on image processing to detect vacant parking slot in an area where automated systems are not installed. Camera images of the parking area are subjected to image processing algorithm which marks virtual slots in the area and extracts occupancy information to guide the incoming drivers about availability and position of vacant spaces. The application consists of two interfaces: one for the guidance of the incoming drivers and the other one for the administrator. The later interface also informs the administrator if a car is not parked properly in the virtual slot. This parking system would reduce the stress and time wastage associated with car parking and would make the management of such areas less costly.

An Interactive Multi-Factor User Authentication Framework in Cloud Computing

  • Elsayed Mostafa;M.M. Hassan;Wael Said
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.63-76
    • /
    • 2023
  • Identity and access management in cloud computing is one of the leading significant issues that require various security countermeasures to preserve user privacy. An authentication mechanism is a leading solution to authenticate and verify the identities of cloud users while accessing cloud applications. Building a secured and flexible authentication mechanism in a cloud computing platform is challenging. Authentication techniques can be combined with other security techniques such as intrusion detection systems to maintain a verifiable layer of security. In this paper, we provide an interactive, flexible, and reliable multi-factor authentication mechanisms that are primarily based on a proposed Authentication Method Selector (AMS) technique. The basic idea of AMS is to rely on the user's previous authentication information and user behavior which can be embedded with additional authentication methods according to the organization's requirements. In AMS, the administrator has the ability to add the appropriate authentication method based on the requirements of the organization. Based on these requirements, the administrator will activate and initialize the authentication method that has been added to the authentication pool. An intrusion detection component has been added to apply the users' location and users' default web browser feature. The AMS and intrusion detection components provide a security enhancement to increase the accuracy and efficiency of cloud user identity verification.

The Construction of Multiform User Profiles Based on Transaction for Effective Recommendation and Segmentation (효과적인 추천과 세분화를 위한 트랜잭션 기반 여러 형태 사용자 프로파일의 구축)

  • Koh, Jae-Jin;An, Hyoung-Keun
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.661-670
    • /
    • 2006
  • With the development of e-Commerce and the proliferation of easily accessible information, information filtering systems such as recommender and SDI systems have become popular to prune large information spaces so that users are directed toward those items that best meet their needs and preferences. Until now, many information filtering methods have been proposed to support filtering systems. XML is emerging as a new standard for information. Recently, filtering systems need new approaches in dealing with XML documents. So, in this paper our system suggests a method to create multiform user profiles with XML's ability to represent structure. This system consists of two parts; one is an administrator profile definition part that an administrator defines to analyze users purchase pattern before a transaction such as purchase happens directly. an other is a user profile creation part module which is applied by the defined profile. Administrator profiles are made from DTD information and it is supposed to point the specific part of a document conforming to the DTD. Proposed system builds user's profile more accurately to get adaptability for user's behavior of buying and provide useful product information without inefficient searching based on such user's profile.

A Framework Development for Total Management of Various Embedded Devices (여러 임베디드 장치의 통합 관리를 위한 프레임워크 개발)

  • Bae, HyunChul;Kim, SangWook
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.1 no.2
    • /
    • pp.56-63
    • /
    • 2006
  • In this paper, we propose the integrated security management framework supporting the trust for the ubiquitous environments. The proposed framework provides the gathering and analysis of the security related information including the location of mobile device and then dynamically configures the security policy and adopts them. More specially, it supports the authentication and delegation service to support the trusted security management for the ubiquitous networks. This system also provides the visible management tools to give the convenient view for network administrator.

  • PDF

The Implementation of monitoring system for the attack of network service denial (네트워크상의 서비스 거부 공격 감시 시스템 설계)

  • 최민석;이종민;김용득
    • Proceedings of the IEEK Conference
    • /
    • 2002.06e
    • /
    • pp.43-46
    • /
    • 2002
  • This paper deals with a denial of service is about without permission knocking off service, for example through crashing the whole system. Another definition is that denial of service is seeing to that someone don't get what they paid for. The Network Denial of service Attack Detection System designed and implemented through suggested algorithm can detect attacking from the outside among denial of service attacks. It shown that designed system gives the system administrator the opportunity to detect denial of service attack.

  • PDF

The Development of ORED, a Web-Based Educational System for Operations Research (웹 기반 경영과학 교육 시스템 ORED의 개발)

  • 박순달;임성묵;도승용;이승석;김호동
    • Korean Management Science Review
    • /
    • v.19 no.1
    • /
    • pp.89-106
    • /
    • 2002
  • ORED is a Web-Based educational system for operations research. It consists of operations research theories, help system for theories, cases, application programs and management system. Users can study theories and cases through HTML documents and solve Problems with java applet and servelet programs. The help system provides users with detailed explanations of theories. And the management system provides the administrator with efficient tools necessary for managing the ORED In the Web.

Design for System Development Mothed with Extended user Participation (사용자의 참여를 확장한 시스템 개발 방법의 설계)

  • Lee, Seo-Jeong;Park, Jae-Nyeon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.5
    • /
    • pp.1272-1279
    • /
    • 1999
  • This paper suggests system development method with extended user participation. Context diagram, event diagram, information diagram, management diagram and interface STD are staple products. This method introduces interface STD, management diagram and context diagram with administrator as relator. We adapted to research business of professor and ATM(Automatic Teller machine), when it can be adaptable to business-oriented system.

  • PDF