• Title/Summary/Keyword: Convergence techniques

Search Result 1,700, Processing Time 0.031 seconds

A Study on New High-Technology Protection System Model Using The Social Engineering Techniques (사회공학 가법을 이용한 새로운 첨단기술보호시스템 모텔에 관한연구)

  • Park, Ji-Hyung
    • Convergence Security Journal
    • /
    • v.11 no.2
    • /
    • pp.3-11
    • /
    • 2011
  • Today the protection of high-tech is one of the most important requirements to survive in competition between companies or countries. In these circumstances, government's industrial security activities have been transformed into independent activities of the private center. So, Company has introduced a high-tech security system for the sake of Technology protect. But, Several Security Incident have occurred in recent years, and so New security measures became necessary. In this study, I will suggest a new high-technology protection system model Using the social engineering techniques to analyze security threats.

The Best Model to Optimize Security Investments with Considering a Corelation of Response Techniques Against Each Threat (위협별 대응기술들의 상관관계를 고려한 보안 투자 모델링)

  • Kim, Min-Sik;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.9 no.1
    • /
    • pp.39-44
    • /
    • 2009
  • To get legitimacy of a security investment, the analysis of ROI about the security investment is required. In this paper, we suggest a practical quantitative model with considering factors that do decision-making of optimized security investment difficult. This model makes use of the value of a residual risk to decide the best information security solution and considers a corelation of response techniques of the information security solution against each threat to do exact decision-making.

  • PDF

GLOBAL ATTRACTOR FOR A CLASS OF QUASILINEAR DEGENERATE PARABOLIC EQUATIONS WITH NONLINEARITY OF ARBITRARY ORDER

  • Tran, Thi Quynh Chi;Le, Thi Thuy;Nguyen, Xuan Tu
    • Communications of the Korean Mathematical Society
    • /
    • v.36 no.3
    • /
    • pp.447-463
    • /
    • 2021
  • In this paper we study the existence and long-time behavior of weak solutions to a class of quasilinear degenerate parabolic equations involving weighted p-Laplacian operators with a new class of nonlinearities. First, we prove the existence and uniqueness of weak solutions by combining the compactness and monotone methods and the weak convergence techniques in Orlicz spaces. Then, we prove the existence of global attractors by using the asymptotic a priori estimates method.

Proposing Effective Regularization Terms for Improvement of WGAN (WGAN의 성능개선을 위한 효과적인 정칙항 제안)

  • Hahn, Hee Il
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.1
    • /
    • pp.13-20
    • /
    • 2021
  • A Wasserstein GAN(WGAN), optimum in terms of minimizing Wasserstein distance, still suffers from inconsistent convergence or unexpected output due to inherent learning instability. It is widely known some kinds of restriction on the discriminative function should be considered to solve such problems, which implies the importance of Lipschitz continuity. Unfortunately, there are few known methods to satisfactorily maintain the Lipschitz continuity of the discriminative function. In this paper we propose techniques to stably maintain the Lipschitz continuity of the discriminative function by adding effective regularization terms to the objective function, which limit the magnitude of the gradient vectors of the discriminator to one or less. Extensive experiments are conducted to evaluate the performance of the proposed techniques, which shows the single-sided penalty improves convergence compared with the gradient penalty at the early learning process, while the proposed additional penalty increases inception scores by 0.18 after 100,000 number of learning.

The Impact of Franchise Education on Corporate Performance and CEO Competency

  • Jun-Young Lee;Gi-Hwan Ryu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.24-31
    • /
    • 2023
  • The purpose of this paper is to divide franchise education and restaurant education programs into three factors: educational content, educational techniques, and educational environment. After completing the franchise curriculum, we will identify what educational programs affect corporate performance and CEO's capabilities. A total of 99 copies were used as statistical analysis data by conducting a survey of those who completed the training from May 01 to May 15, 2023. The survey used the Likert 5-point scale, and for data analysis, hypothesis verification was conducted using frequency analysis, demographic analysis, and reliability analysis using SPSS23. As a result, it was confirmed that all three factors of franchise education are factors that affect performance and competency. Therefore, among franchise education programs, it is necessary to be faithful to the contents of education, use appropriate educational techniques, and prepare an educational environment well.

Blockchain-Enabled Decentralized Clustering for Enhanced Decision Support in the Coffee Supply Chain

  • Keo Ratanak;Muhammad Firdaus;Kyung-Hyune Rhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.260-263
    • /
    • 2023
  • Considering the growth of blockchain technology, the research aims to transform the efficiency of recommending optimal coffee suppliers within the complex supply chain network. This transformation relies on the extraction of vital transactional data and insights from stakeholders, facilitated by the dynamic interaction between the application interface (e.g., Rest API) and the blockchain network. These extracted data are then subjected to advanced data processing techniques and harnessed through machine learning methodologies to establish a robust recommendation system. This innovative approach seeks to empower users with informed decision-making abilities, thereby enhancing operational efficiency in identifying the most suitable coffee supplier for each customer. Furthermore, the research employs data visualization techniques to illustrate intricate clustering patterns generated by the K-Means algorithm, providing a visual dimension to the study's evaluation.

A Study proposal for URL anomaly detection model based on classification algorithm (분류 알고리즘 기반 URL 이상 탐지 모델 연구 제안)

  • Hyeon Wuu Kim;Hong-Ki Kim;DongHwi Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.101-106
    • /
    • 2023
  • Recently, cyberattacks are increasing in social engineering attacks using intelligent and continuous phishing sites and hacking techniques using malicious code. As personal security becomes important, there is a need for a method and a solution for determining whether a malicious URL exists using a web application. In this paper, we would like to find out each feature and limitation by comparing highly accurate techniques for detecting malicious URLs. Compared to classification algorithm models using features such as web flat panel DB and based URL detection sites, we propose an efficient URL anomaly detection technique.

Study on Trends of the Future Internet Security : FIA Work (미래 인터넷 보안 연구 동향 분석 : FIA를 중심으로)

  • Jun, Eun-A;Lee, Do-Geon;Lee, Sang-Woo;Seo, Dong-Il;Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.79-87
    • /
    • 2012
  • Future Internet has been designing and developing in the world because of overcoming limits of current Internet and accepting new requirements. Therefore it is totally different from architectures of current Internet and it is based on Clean-Slate. Future Internet already has been studying with enormous investment by advanced countries such as USA, EU etc. Technical characteristics of Future Internet can be categorized into Infra techniques, Architectures and Service techniques. Especially, our country is in a superior position in Infra techniques and Service techniques. We can have competitiveness to develop trust communication in Future Internet because we have advantages of various Services such as mobile communication, Machine to Machine and Sensor Networks. This paper aims to analysis reference model of trust communication in Future Internet. To achieve this, we studied analysis of security techniques in four Future Internet researches of NSF.

A Study of Forensic Techniques and Tools on Smart Phone OS Types (Smart Phone OS별 포렌식 기술과 도구에 관한 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.223-226
    • /
    • 2010
  • iPhone and Smart Phone domestic markets are activated with domestic coming out of galaxy S together and the users are increasing. It follows hereupon and with forensic techniques for the cellular phone relation criminal evidence collection of data of existing the mobile forensic engineering research is necessary in about Smart Phone where it has become new techniques and WiFi etc. Convergence. It respects Smart Phone OS star forensic technique and a tool research, iPhone Apple MAC OS X and it researches galaxy S Google Android from the present paper. Smart it uses SYN methods with Phone OS star forensic techniques and it researches in order mobile forensic description below it observes it sees and forensic application methods computer forensic methods and the tools and it researches forensic techniques. The present paper research as IT powerful country will contribute in Smart Phone forensic technical advances of Korea.

  • PDF

Analysis of Hairdressing Technique Patent Trends (헤어미용 기술에 대한 특허동향 연구)

  • Park, Jang-Soon;Lim, Sun-Nye
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.373-380
    • /
    • 2018
  • This study classified hairdressing techniques into hairdressing equipment, beauty/care, and styling and investigated current trends in patent applications. In addition, it analyzed what aspects should be concentrated on in terms of future hairdressing techniques and their growth potential. The results found the following: Hairdressing techniques have been on the rise since 1990 in terms of patent activities. In particular, they have been most active in 'electric hairdressing equipment such as hair dryers and hair straighteners. According to analysis of applicants' application trends, technique leaders were different by sector. In hairdressing techniques, in other words, expertise should be developed by sector. It is anticipated that this study would facilitate and expand the hairdressing market by analyzing hairdressing technique patent trends and establishing future directions for R&D in hairdressing techniques.