• Title/Summary/Keyword: DEA system

Search Result 464, Processing Time 0.024 seconds

The Study on Costume in Palhae and Shilla (발해와 신라의 복식 비교 연구)

  • 전현실;유송옥
    • Journal of the Korean Society of Costume
    • /
    • v.50 no.6
    • /
    • pp.109-125
    • /
    • 2000
  • As the result of the study of this thesis, the costume of Palhae and Shilla shows the many similarity. 1. The two centuries introduced the system of four-colored official uniform. This official uniforms are BokDoo(복두), DanLyung(團領) and Dae(帶). BanLyung of Palhae are GyulGoPo(결과포), leather belt and that of Shilla are GyulGoPo, YuLanPo(유란포), KwaDae(과대) Similarly BokDoo shows the long Gak(脚) in back. 2. Yu(유) and Ko(袴), the native costumes have worn even after the period of the three countries. 3. The two countries wore DanLyung. A man In Palhae wore GyulGoPo(결과포), leather belt and a man in Shilla wore GyulGoPo, YuLanPo(유란포), KwaDae(과대). 4. A woman in Palhae wore SangEui(上衣), Sang(裳), JikLyung(直領) one by one. And over Sang wrapped PoBaekDae(布帛帶) and covered the shoulder by UnGyun(雲肩). A woman in Shilla wore SangEui, Sang, PoBaekDea one by one and covered the shoulder by Pyo(표). 5. The two countries put on Rib(笠) and similary shoes. Rib insists of Moche(帽體), ChaYang(次養) and can classify the estate by decoration. A man wore Wha(靴), Li(履) and a woman wore KoDooLi(高頭履). This similarity is the result by the cultural interchange between Palhae and Shilla. There are the five reasons. Interchange by the envoy's visit. Interchange through Shillado(新羅道), Interchange in T'ang Dynasty, Interchange in Japan, Interchange of Buddhist culture. By the cultural interchange between Palhae(渤海) and Shilla(新羅), the shape of costume is similary. The meaning of this similarity of costume equals to the similarity of culture. We will approval Palhae is the co-subject of Korean history with Shilla and will name as "The period of NamBukKuk(南北國時代)" from the late 7th century to the early 10th century in the academy of the history of Korean Costume.

  • PDF

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.197-200
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LG) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

  • PDF

Design of Web application for Deep-sea fishing Sailing Information based by RIA (원양어선 항해정보를 위한 RIA기반의 웹 어플리케이션 설계 및 구현)

  • Jung, Hoe-Jun;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2272-2278
    • /
    • 2011
  • The company which have deep-sea fishing vessel have to improve their voyage dashboard that was operating by manually to grasp sailing information of fishing vessel. This thesis design sailing information that is ship location on the globe, a catch of fish, and line of longitude and latitude to display on the map more visually by using on-line PC or DID (Digital Information Display). Thesis considered about designing web application which is available to visualize sailing information of 37 deep-sea fishing vessels in operation by using Flash-based RIA technology. This system was improving operator's and administrator's satisfaction of using information because, It make possible not only to grasp status of many vessels in one display but also to monitoring situation and deciding process.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

A Study on N-IDS Detection and Packet Analysis regarding a DoS attack (DoS공격에 대한 N-IDS 탐지 및 패킷 분석 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.217-224
    • /
    • 2008
  • EThis paper is study regarding banking institution and DoS attack regarding government organization which occurred in 2008. We used a tool aggressive actual DoS You install the N-IDS which used Snort in networks in order to detect a DoS attack. Storages of Winpcap and a packet to detect a packet and MySQL, HSC, to analyze. We install NET Framework etc. E-Watch etc. analyzes Packet regarding a DoS attack of a hacker and TCP, UDP etc. information, Port, MAC and IP information etc. through packet analysis tools. There is a meaning you analyze data regarding the cyber DoS, DDoS attack that is dysfunction of Ubiquitous Information Society, and it generates forensics data regarding an invader and back-tracking analysis data, and to ensure safe Internet information system through this paper study.

  • PDF

Lava-calcification of the volcanic cave in Jeju-do island (제주도 화산동굴의 용암석회질화 -제주도 북제주군 협재리 건지굴 중심-)

  • Soh, Dea-Wha
    • Journal of the Speleological Society of Korea
    • /
    • no.67
    • /
    • pp.1-9
    • /
    • 2005
  • The lava-calcification which was found in Geunjisul located in Jeju-do (Korea) was investigated to analyse the cause of calcification through the internal factor of cave structure and surroundings in company with relevant ecological system. The volcanic cave is degenerated after formation from volcano lava extravasation, however, the cave became more stronger with solidification and petrification by the reinforced structure of calcification as the cement in concrete buildings unprecedentedly if the lava-calcification occurred in the cave. Such a Progressive Phenomena of lava-calcification was verified in progress first in Geonjigul located at Hyubjae-ri, but those would be found in other simiiar case of caves distributed and connected with seaside of shelly sand beach.

A Study on the Feasibility of Evaluating the Complexity of KTX Driving Tasks (KTX 운전직무에 대한 복잡도 평가 - 타당성 연구)

  • Park, Jin-Kyun;Jung, Won-Dea;Jang, Seung-Cheol;Ko, Jong-Hyun
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.5
    • /
    • pp.744-750
    • /
    • 2009
  • According to the result of related studies, the degradation of human performance has been revealed as one of the most significant causes resulting in the safety of any human-involved system. This means that preventing the occurrence of accidents/incidents through avoiding the degradation of human performance is prerequisite for their successive operation. To this end, it is necessary to develop a plausible tool to evaluate the complexity of a task, which has been known as one of the decisive factors affecting the human performance. For this reason, in this paper, the complexity of tasks to be conducted by KTX drivers was quantified by TACOM measure that is enable to quantify the complexity of proceduralized tasks being used in nuclear power plants. After that, TACOM scores about the tasks of KTX drivers were compared with NASA-TLX scores that are responsible for the level of a subjective workload to be felt by KTX drivers.

Effects of Chronic Disease Education for Hypertension, Diabetes Patients's Knowledge (만성질환 교육이 고혈압, 당뇨병 환자의 지식수준에 미치는 영향)

  • Lee, Joseph;Yim, Jun;Im, Jeong-Soo;Oh, Dea-Kyu;Han, Jin-Ok
    • Korean Journal of Health Education and Promotion
    • /
    • v.30 no.5
    • /
    • pp.79-90
    • /
    • 2013
  • Objectives: This study is based on Public Care Service for Chronic Diseases in Incheon Metropolitan City featuring Health-Point Service. It is objective to evaluate whether the service could improve self-management ability of hypertension and diabetes patients. Methods: The knowledge about diabetes and hypertension, which can be improved by educational intervention, is considered as one of the most important factor for self-management ability. While the education service have been conducted, 194 patients who have been diagnosed as hypertension and diabetes within 3 months were included. They completed questionnaires two times within 4 months period, which give information about the knowledge, service registration and education experiences. For further inspection, 396 patients who had been diagnosed formerly were studied by cross-sectional analysis. Results: Regardless of service registration or educational intervention, there wasn't statistically meaningful difference between the initial and the follow-up assessments on the knowledge. However, when investigating formerly diagnosed patients, educated patients had better knowledge on hypertension compared with non-educated patients and registered patients, educated patients had the better knowledge on diabetes compared with non-registered patients, non-educated patients. Additionally, analyzing each questions, educated patients got higher grades in questions about definition of hypertension, diabetes managements which they can practice in daily lives. Conclusions: It is probable that long-term service registration and education experiences could improve the knowledge and self-management ability.

The Analysis of the APT Prelude by Big Data Analytics (빅데이터 분석을 통한 APT공격 전조 현상 분석)

  • Choi, Chan-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.317-320
    • /
    • 2016
  • The NH-NongHyup network and servers were paralyzed in 2011, in the 2013 3.20 cyber attack happened and Classified documents of Korea Hydro & Nuclear Power Co. Ltd were leaked on December in 2015. All of them were conducted by a foreign country. These attacks were planned for a long time compared to the script kids attacks and the techniques used were very complex and sophisticated. However, no successful solution has been implemented to defend an APT attack thus far. Therefore, we will use big data analytics to analyze whether or not APT attack has occurred in order to defend against the manipulative attackers. This research is based on the data collected through ISAC monitoring among 3 hierarchical Korean defense system. First, we will introduce related research about big data analytics and machine learning. Then, we design two big data analytics models to detect an APT attack and evaluate the models' accuracy and other results. Lastly, we will present an effective response method to address a detected APT attack.

  • PDF

Risk Management and Telecommunications Research for customers of the accident location (사고선박의 고객위치파악용 위험관리 통신연구)

  • Kwak, Eun-young;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.331-335
    • /
    • 2016
  • When a boating accident, such as a January number three, the customer's risk management issues emerged. Ships and accident risk in confined spaces such as risk management to locate the customer and dangers of probation is available. In this paper, aboard after consent to obtain information for customers to wrist to customers, webbing or portable device embedded in devices and Wireless sensor information Input was attached, disposable consumer information. Customer on board the ship setting for location analysis and positioning according to information communication protocol, ships, each customer's real-time location information on the screen, 3 the foundation of d customers on the floor Can be designed to inform. Threshold designed to reduce the error of the information to analyze the position in current position and errors. Also, to system attacks would control the situation of accident and emergency jaenanguk server with real-time information transmission of information outside the emergency during a disaster, search and Disaster relief to be possible.

  • PDF