• Title/Summary/Keyword: Communication Tool

Search Result 1,881, Processing Time 0.028 seconds

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

Study on the Obese Students' Stress and Coping Method in Middle and High Schools (비만 중.고등학생의 스트레스와 대처방법에 관한 연구)

  • Kim, Yi-Soon
    • Research in Community and Public Health Nursing
    • /
    • v.12 no.3
    • /
    • pp.732-745
    • /
    • 2001
  • This study attempted to identify obese students' stress and coping method in middle and high schools. The data were collected from the total of 600 obese students from middle and high schools in Pusan. The author used a convenience sampling method. The data collection was done from March 2 to April 30. 2001. The analysis of the data was done with SPSS Win(10.0) for descriptive statistics. t-test. and ANOVA. The instrument used for the obese students' stress and coping method was a questionnaire developed by Kim. Yi-Soon and Kim. Young-Hae(200l). The tool was composed of 65 items (33stress items: 32coping method items) with the five-point Likert scale. The results were as follow: 1. The average score of stress was 2.49 (SD = .86) points in the male students. and 2.83(SD= .86) points in the female students. The subcategories were: (outward appearance), (boyfriend/girlfriend), (occurrence of an outbreak of a disease), (relationship within the family), (an obese appearance), (difficulty in exercise). The highest degree of stress came from 'an obese appearance' for the male students (mean=2.64. SD=0.87) and (mean=2.64. SD=0.87) for the female students. 2. The subcategories of the coping method were: (be concerned about other matters), (recreation activities), (self-violence), (relaxation), (hobby activities), (avoid a situation), (communication), (music), (negative behavior), (positive thinking). The highest degree of coping method were (recreation activities) in the male students (mean=3.07. SD=0.86) and (music) in the female students (mean=3.47. SD=1.01). 3. The results comparing stress with demographic variables were significant for gender (t=7.010. p=0.000). grades at school (F=2.918. p=0.02l), degree of obesity (F=5.205. p=0.006). grades (F=2.550. p=0.027). standard of living(F=8.277. p=0.000). the state of health (F=2.882, p=0.022), relationship with the father (F=4.790, p=0.001), relationship with the mother (F=6.080, p=0.000), and the educational level of the father (F=3.192, p=0.013). 4. The results comparing the coping method with demographic variables were significant for gender (t=4.597. p=0.000). These findings contribute to the understanding of the degree of stress and the type of coping methods of obese students in middle and high schools. Therefore, the result of this study aids in an effective nursing intervention to improve the mental health program for the obese.

  • PDF

An Analysis of Best Practices for Efficient Utility Relocation and an Inquiry into the Applicability of SUE (효율적인 지하지장물 이설을 위한 모범사례분석 및 SUE 적용에 관한 연구)

  • Lee, Seung-Hyun;Baek, Seung-Ho;Tae, Yong-Ho;Ahn, Bang-Ryul;Park, Hyeon-Yong
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.971-976
    • /
    • 2007
  • In the U.S., utility damages or utility delay caused by conflicts during the underground utility relocation is one of the weighty problem in the construction industry. Also, in domestic case, delay and additional cost caused by underground utility(i.e, electricity, communication, gas, water supply and sewerage) relocation has been happened so that there is an increase of claims for responsibility between owners and contractors. However, there is insufficient survey for the recent circumstance of additional cost for delay and design changes caused by utility relocation and shortage of enough research for solving and analyzing of causes and their ripple effect. This research presents a result of the study about the best practices of FHWA(Federal Highway Administration), SHAs(State Highway Agencies) and the utility companies managing utility relocation. Also, it presents the basic concept of SUE(Subsurface Utility Engineering), the most reliable tool of FHWA presented, and investigates the developing status about SUE in Korea. At the end of this paper, this research proposes a practical and more applicable study about the efficient utility relocation focusing on local industry.

  • PDF

Facilitating Web Service Taxonomy Generation : An Artificial Neural Network based Framework, A Prototype Systems, and Evaluation (인공신경망 기반 웹서비스 분류체계 생성 프레임워크의 실증적 평가)

  • Hwang, You-Sub
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.2
    • /
    • pp.33-54
    • /
    • 2010
  • The World Wide Web is transitioning from being a mere collection of documents that contain useful information toward providing a collection of services that perform useful tasks. The emerging Web service technology has been envisioned as the next technological wave and is expected to play an important role in this recent transformation of the Web. By providing interoperable interface standards for application-to-application communication, Web services can be combined with component based software development to promote application interaction both within and across enterprises. To make Web services for service-oriented computing operational, it is important that Web service repositories not only be well-structured but also provide efficient tools for developers to find reusable Web service components that meet their needs. As the potential of Web services for service-oriented computing is being widely recognized, the demand for effective Web service discovery mechanisms is concomitantly growing. A number of public Web service repositories have been proposed, but the Web service taxonomy generation has not been satisfactorily addressed. Unfortunately, most existing Web service taxonomies are either too rudimentary to be useful or too hard to be maintained. In this paper, we propose a Web service taxonomy generation framework that combines an artificial neural network based clustering techniques with descriptive label generating and leverages the semantics of the XML-based service specification in WSDL documents. We believe that this is one of the first attempts at applying data mining techniques in the Web service discovery domain. We have developed a prototype system based on the proposed framework using an unsupervised artificial neural network and empirically evaluated the proposed approach and tool using real Web service descriptions drawn from operational Web service repositories. We report on some preliminary results demonstrating the efficacy of the proposed approach.

A Comparison Analysis among Structural Equation Modeling (AMOS, LISREL and PLS) Using the Same Data (동일 데이터를 이용한 구조방정식 툴 간의 비교분석)

  • Nam, Soo-tai;Kim, Do-goan;Jin, Chan-yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.7
    • /
    • pp.978-984
    • /
    • 2018
  • Structural equation modeling is pointing to statistical procedures that simultaneously perform path analysis and confirmatory factor analysis. Today, this statistical procedure is an essential tool for researchers in the social sciences. There are as AMOS, LISREL and PLS representative tools that can perform structural equation modeling analysis. AMOS provides a convenient graphical user interface for beginners to use. PLS has the advantage of not having a constraint on normal distribution as well as a graphical user interface. Therefore, we compared and analyzed the three most commonly used tools (applications) in social sciences. Based on structural equation modeling, confirmatory factor analysis was performed using the IBM AMOS Ver. 23, the LISREL 8.70 and the SmartPLS 2.0. The comparative results show that LISREL has the highest explanatory power of dependent variables than other analytical tools. The path coefficients and T-values presented by the analysis results showed similar results for all three analysis tools. This study suggests practical and theoretical implications based on the results.

Performance improvement on mobile devices using MVC+Prefetch Controller Pattern (MVC+Prefetch Controller 패턴을 사용한 모바일 기기의 성능향상 기법)

  • Im, Byung-Jai;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.18D no.3
    • /
    • pp.179-184
    • /
    • 2011
  • Current mobile devices have surpassed its boundaries as a more communication tool to a smart device which provides additional features. These features have supported the smart life of its users, but have reached its limit from low-performance processors and short-battery time. These issues can be resolved b implementing higher performing hardware, but they come with a burden of high cost. This paper introduces a new way of managing computing resources in a mobile device by enhancing the quality of human-computer interaction. The real-speed felt by users are mainly influenced by the time it takes form a user's input to the device to display the completed result on the screen. Since the size of the screen for mobile devices are small, if the processor only fetch data to be used for displaying on screen, the time can be significantly reduced. MVC+Prefetch Controller pattern accomplished this goal by using the minimum amount of data from DB to fetch display and still manages to support high-speed data transfer to achieve seamless display. This idea has been realized by practice using Samsung mobile phone S8500, which demonstrated the superior performance on user's perspective.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

New Paradigm in exhibition organization at the National Museum of Contemporary Art ('연구 업무 전담제'를 통해 살펴보는 국립현대미술관 전시 기획의 새로운 패러다임)

  • Choi, Eun-Ju
    • The Journal of Art Theory & Practice
    • /
    • no.3
    • /
    • pp.67-84
    • /
    • 2005
  • Since the evaluation of its intellectual activities and abilities is done by curator's capabilities, planning exhibition is very important as the final result achieved by their own knowledge, information, and research. ARPA(Advanced Research Project on Arts) is suggested as the system which enables curators responding simultaneously to the society in the times, based on its special characteristics. If this system settles well, which means that the curators at NMCA(National Museum of Contemporary Art, Korea) play their roles as the professionals in each of their fields, the goal of consolidating the status of museum as the representative national museum, and building up competent department of curators, will be achieved at the same time. To clarify above, the curators set up the various assignments of research about the types of arts such as painting, Korean painting, sculpture, installation, new-media, design, craft, photogarphy, architecture, etc. And they establish the art objects classified by the regions, such as the Northern American, Southern American, European, Asian, and other Third World countries. They elaborate art objects more on the history, the work, the artist, and the issue of contemporary art. Furthermore, when the curators devote deeper study to those research subjects, they can have the opportunities to design an exhibition upon the research. Today, the museum of art is 'The Place for Communication and Encounter', it is regarded important to share the aesthetical, creative values with current artists, and to understand mutually with the spectators. It is needed to improve the curator's work, in order to meet the demands of the times and even to advance. Because the form of 'exhibition' is the tool that reveals the identity NMCA aiming at, the motivation, the development, and the realization should be leaded by the curators, who are the mainstream of the museum. ARPA is a system for identifying the exhibition like mentioned above. The main purpose of this system is to produce synergy effect, having the researching, collecting work in liaison with planning exhibition. ARPA will be able to improve the quality of exhibition through the way of developing the exhibition, passing through the stable process in the long run. So far, I have referred to a new paradigm of the exhibition design at NMCA via ARPA. Yet, there still remain missions in reality, such as analyzing the previous exhibition and reshuffling personnel and system, which should be done. When these matters settled, these plans would be suggested practically. At this point, it is the most significant that NMCA is attempting to let others aware of the importance of exhibition planning based on research. when the ARPA and exhibition planning is conjoined together successfully, the competent exhibition will be achieved, which can offer a meaningful exhibition to the art world, strengthen infra structure thru exchanging with public museum in the region, and eventually, establish a network with museum in foreign countries.

  • PDF