• Title/Summary/Keyword: ESM

Search Result 192, Processing Time 0.039 seconds

Study of Acoustic Holography using Equivalent Source Method with Continuation of Acoustic Near-field (근접음장 연속법과 등가 음원법을 이용한 음향홀로그래피 연구)

  • Kim, Sung-Hoon
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2011.10a
    • /
    • pp.643-648
    • /
    • 2011
  • This paper deals with the ESM(equivalent source method) with the continuation of acoustic near-field for NAH(near-field acoustic holography) to overcome the finite measurement aperture effect and reconstruct the normal velocity on an arbitrarily shaped structure surface. The continuation method is an extension of the measured sound field into a region outside and is based on the Green's function relating acoustic quantities on the two conformal surfaces. This algorithm is not limited to planar surfaces and can be applied to arbitrarily shaped surfaces. The ESM is an alternative approach of BEM-based NAH for the reconstruction on a general structure. In ESM the acoustic field is represented by a set of point sources located over a surface that is close to the structure surface. The simulation results of this study shows that the reconstruction error of particle velocity on the source surface is 11% and 16% for planar and cylindrical sources separately.

  • PDF

Research on Improving Schedule Forecasting Method for Delayed Defense Research & Development Project (지연된 국방 연구개발 프로젝트의 일정 예측방식 개선 연구)

  • Cho, Jungho;Lim, Jaesung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.3
    • /
    • pp.286-293
    • /
    • 2020
  • Since Dr. Lipke announces earned schedule management(ESM) in 2002, it has been used in project management to make up for the insufficient schedule management function of earned value management technique. However, it is difficult to accurately forecast the schedule of delayed defense research and development(R&D) projects with the ESM technique. Therefore, this paper proposes a new schedule forecasting method considering the progress of delayed work in ESM technique. This concept can also be adopted to the traditional project progress management (PPM) technique. We verify the effectiveness of the proposed concept through several defense R&D projects and prove that it is possible to supplement the schedule forecasting of the ESM and PPM technique.

Development of Evaluate Model of Enterprise Security Management (ESM) Product (기업보안관리(ESM) 제품의 평가모델 개발)

  • Kang, Sang-Won;Jeon, In-Oh;Ynag, Hae-Sool
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.408-411
    • /
    • 2010
  • 보안관리가 진화하고 있다. 보안의 중요성이 강조되면서 도입된 수많은 보안 솔루션은 관리의 어려움을 증가시키고 있고, 각기 다른 장비가 쏟아내는 수많은 정보들로 효율적인 전사적 보안 체계 마련의 필요성이 대두되고 있기 때문이다. 국내에서는 ESM(Enterprise Security Management)이 보안관리를 대표했지만, 이를 더욱 고도화해야 한다는 요구가 증가하고 있다. 본 연구에서는 기업보안관리(ESM) 제품의 질적인 면을 평가하고 품질수준을 파악하여 개선방향을 도출함으로써 품질향상을 지원할 수 있는 보안성 평가모델과 시험 방법론에 대해서 개발하였다.

  • PDF

Design of Security Management System

  • Kim Seok-Soo;Soh Woo-Young
    • International Journal of Contents
    • /
    • v.1 no.2
    • /
    • pp.22-25
    • /
    • 2005
  • Enterprise security management system: Enterprise Security Management (EMS) is centralized integrated management of other kind of security solutions such as intrusion cutoff system, intrusion detection system and virtual private network. With the system, it is possible to establish security policies for entire IT system through interlocking of solutions. A security system of company network is progressing as a ESM(Enterprise Security Management) in existing security solution foundation. The establishment of the security policy is occupying very important area in ESM of the security system. We tried to analyze existing ESM system for this and designed security solution structure for enhancing the inside security. We applied implementing directly IDS system and tested. This test set the focus about inside security

  • PDF

A Study on implementation model for security log analysis system using Big Data platform (빅데이터 플랫폼을 이용한 보안로그 분석 시스템 구현 모델 연구)

  • Han, Ki-Hyoung;Jeong, Hyung-Jong;Lee, Doog-Sik;Chae, Myung-Hui;Yoon, Cheol-Hee;Noh, Kyoo-Sung
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.351-359
    • /
    • 2014
  • The log data generated by security equipment have been synthetically analyzed on the ESM(Enterprise Security Management) base so far, but due to its limitations of the capacity and processing performance, it is not suited for big data processing. Therefore the another way of technology on the big data platform is necessary. Big Data platform can achieve a large amount of data collection, storage, processing, retrieval, analysis, and visualization by using Hadoop Ecosystem. Currently ESM technology has developed in the way of SIEM (Security Information & Event Management) technology, and to implement security technology in SIEM way, Big Data platform technology is essential that can handle large log data which occurs in the current security devices. In this paper, we have a big data platform Hadoop Ecosystem technology for analyzing the security log for sure how to implement the system model is studied.

The Influence of Intra-SNS on Knowledge Sharing Behavior: Social Psychology Perspective (기업 내 SNS가 지식공유 행위에 미치는 영향에 대한 연구: 사회심리학적 관점을 중심으로)

  • Lee, Seo Han;Lee, Ho;Kim, Kyung Kyu
    • Knowledge Management Research
    • /
    • v.15 no.4
    • /
    • pp.189-206
    • /
    • 2014
  • Knowledge management is considered an important factor for competitive advantage and sustainability for firms. As many knowledge management systems failed to achieve the desired results, enterprise social media (ESM) has received considerable attention as an alternative solution for knowledge sharing within a firm. This paper attempts to investigate the influence of various aspects of ESM on knowledge sharing. While previous literature mainly focused on structural aspects of ESM, this study focuses on social psychological aspects, such as social connectedness, social awareness, and social presence, along with reputational aspects (such as self-presentation). Further, in order to clarify knowledge sharing behavior, this study classifies knowledge sharing behavior into two categories, knowledge contribution and knowledge acquisition. The data used in this study was collected from 179 individuals who have experience in their own ESM. The results show that both social connectedness and self-presentation positively influence the two types of knowledge sharing behavior, i.e., acquisition and contribution. Meanwhile, social awareness turns out to be a significant determinant of knowledge contribution only. Contrary to our expectations, however, social presence does not significantly influence knowledge sharing behavior.

A Systematic Comparison of Time Use Instruments: Time Diary and Experience Sampling Method (생활시간 연구를 위한 측정도구의 비교 : 경험표집법과 시간일지)

  • Jeong, Jae-Ki
    • Survey Research
    • /
    • v.9 no.1
    • /
    • pp.43-68
    • /
    • 2008
  • This study compares two instruments for time use study: The time diary and the Experience Sampling Method (ESM), While previous studies show that the ESM and the full-diary are similar with respect to aggregate estimates, No previous study has examined the concordance rates of individual records from both instruments. Based on the subsamples who completed both instruments during the same time period from 500 family studies conducted by the Alfred P. Sloan Center on Parents, Children, and Work at the University of Chicago, we systematically compares the two instruments and evaluates their relative strengths. The results suggest that time diaries provide less biased time use estimates. and that compared to the time diary, the ESM provides a more detailed description of everyday life. The implications of further researches are discussed.

  • PDF

A Detection Rule Exchange Mechanism for the Collaborative Intrusion Detection in Defense-ESM (국방통합보안관제체계에서의 협업 침입탐지를 위한 탐지규칙 교환 기법)

  • Lee, Yun-Hwan;Lee, Soo-Jin
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.57-69
    • /
    • 2011
  • Many heterogeneous Intrusion Detection Systems(IDSs) based in misuse detection technique including the self-developed IDS are now operating in Defense-ESM(Enterprise Security Management System). IDS based on misuse detection may have different capability in the intrusion detection process according to the frequency and quality of its signature update. This makes the integration and collaboration with other IDSs more difficult. In this paper, with the purpose of creating the proper foundation for integration and collaboration between heterogeneous IDSs being operated in Defense-ESM, we propose an effective mechanism that can enable one IDS to propagate its new detection rules to other IDSs and receive updated rules from others. We also prove the performance of rule exchange and application possibility to defense environment through the implementation and experiment.

SnSA Design and Embodiment for ESM of Small Scale Network (소규모 네트워크의 통합보안관제를 위한 SnSA 설계 및 구현)

  • 이동휘;신영준;김귀남
    • Convergence Security Journal
    • /
    • v.3 no.2
    • /
    • pp.85-97
    • /
    • 2003
  • At the end of last January, 2003, a domestic top-level domain name server (DNS) shut down the server and it caused the wired and wireless internet services to be completely paralyzed in the aftermath of a virus attack incurring a various range of losses nationwide. The main reason of this event is the lack of our awareness of cyber security. In particular, in the small-scale network, there are few security administrators and no operating devices to protect information as well. Under this circumstance, using ESM center to service real-time security supervision and correspondence for network, it can be one option. However, due to the economic efficiency, most of security systems have been being developed focusing on the large-scale network first. Therefore, ESM centers which inspect security state of network concentrate on IDC or large-scale network services. This dissertation studies economical ESM service by designing exclusive SnSA for small-scale network for widespread use. Firstly, network invasion feeler function N_SnSA and host invasion feeler function H_SnSA are embodied to collect more informations in the small-scale network. Secondarily, the existing vulnerability is studied to find the solutions linked with a low cost to a Public center such as Kyonggi Univ ESM center.

  • PDF

The Policy Distribution Algorithm of Firewall in Integrated Security Management (통합보안관리시스템의 방화벽정책 분배를 위한 알고리즘 : FALCON)

  • Kim, Gwang-Hyeok;Gwon, Yun-Ju;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.467-472
    • /
    • 2002
  • Recently, Networks are required to adopt the security system and security consulting because of security threats and vulnerabilities of systems. Enterprise Security Management (ESM) is a system which establishes the security zone composed of security systems and Firewalls and applies the security policy to each security system. A relevant ESM is based on the effective policy and the proper security system. Particularly, multiple firewalls in ESM are concerned with the security policy about each traffic. In this paper, we describe the problems that can be occurred when we select the firewalls to apply security policy of access control in ESM composed of multiple firewalls and propose the FALCON algorithm, which is able to select the firewalis to apply the policy. We expect that FALCON algorithm offers stability, scalability and compactness for selecting firewall set.