• Title/Summary/Keyword: Kim's model

Search Result 15,609, Processing Time 0.053 seconds

DEVS-based Modeling Methodology for Cybersecurity Simulations from a Security Perspective

  • Kim, Jiyeon;Kim, Hyung-Jong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2186-2203
    • /
    • 2020
  • Security administrators of companies and organizations need to come up with proper countermeasures against cyber-attacks considering infrastructures and security policies in their possession. In order to develop and verify such countermeasures, the administrators should be able to reenact both cyber-attacks and defenses. Simulations can be useful for the reenactment by overcoming its limitations including high risk and cost. If the administrators are able to design various scenarios of cyber-attacks and to develop simulation models from their viewpoints, they can simulate desired situations and observe the results more easily. It is challenging to simulate cyber-security issues, because there is lack of theoretical basis for modeling a wide range of the security field as well as pre-defined basic components used to model cyber-attacks. In this paper, we propose a modeling method for cyber-security simulations by developing a basic component and a composite model, called Abstracted Cyber-Security Unit Model (ACSUM) and Abstracted Cyber-security SIMulation model (ACSIM), respectively. The proposed models are based on DEVS(Discrete Event systems Specification) formalism, a modeling theory for discrete event simulations. We develop attack scenarios by sequencing attack behaviors using ACSUMs and then model ACSIMs by combining and abstracting the ACSUMs from a security perspective. The concepts of ACSUM and ACSIM enable the security administrators to simulate numerous cyber-security issues from their viewpoints. As a case study, we model a worm scenario using ACSUM and simulate three types of simulation models based on ACSIM from a different security perspective.

Modeling Hemodialysis Patient's Quality of Life (혈액투석환자의 삶의 질에 관한 이론적 모형 구축)

  • Kim Joo-Hyun;Choi Hee-Jung;Kim Jeong-Soon
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.3 no.2
    • /
    • pp.183-199
    • /
    • 1996
  • The Purpose of this study is to develop and test a nursing model which can be applied to prediction of the quality of life for the patient receiving hemodialysis. A hypothetical model was constructed on Johns & Meleis's empowerment model framework which has 3 contsructs(stress, resource, empowerment). 6 Factors(perceived stress, self-esteem as personal resource, perceived social support as social resource, perceived fertigue, perceived health status & self efficacy as empowerment) were selected to pre dict the quality of life of receiving hemodialysis patients. 4 Factors(self-esteem, perceived social support, perceived health status & self efficacy) had direct effects on the quality of life significantly. Self-esteem had indirect effect on the quality of life via perceived heath status significantly. Perceived social support had indirect effect on the quality of life via self-effcacy significantly. Perceived stress had no direct and indirect effect on the quality of life significantly. Revised model from hypothetical model showed better fit to the data by eliminating unsignificant path. From results of this study we suggest that to improve quality of life of hemodialysis patient nurses provide nursing interventions which improve self-esteem, perceived social support, self-efficacy & perceived health status.

  • PDF

A Study on the Ship Wake Model under the Ocean Environment (해상 환경을 고려한 수상함 항적 모델 연구)

  • Bae, Ho Seuk;Kim, Won-Ki;Son, Su-Uk;Kim, Woo-Shik;Park, Joung-Soo
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.1
    • /
    • pp.22-30
    • /
    • 2021
  • The ship wake generated by rotation of the propeller yields changes of characteristics of sound wave such as attenuation and scattering. To develope a battle field environment simulator for military purposes, it is very important to understand acoustical properties of ship wake. Existing research results have limitations in direct application because they performed under simple conditions or model ships were applied. In this study, we developed a ship wake generation model based on the ship's geometric wake distribution theory. The model can provide spatial distribution and void fraction with various marine environments as well as ship size. Through the developed model, geometric distribution features of ship wake according to the ship's maneuvering conditions were successfully simulated. In addition, changes of the bubble void fraction with time at any location within the battle field environment were identified. Therefore, the developed model is expected to be used in the development of a simulator to measure the acoustic characteristics of the ship wake.

Development of Observational Environment Evaluation Model for Sunshine Duration at ASOSs Located in Urban Areas (도시지역 유인관측소 일조 관측환경 평가 모델 개발)

  • Kim, Do-Yong;Kim, Do-Hyoung;Kim, Jae-Jin
    • Atmosphere
    • /
    • v.23 no.3
    • /
    • pp.275-282
    • /
    • 2013
  • In this study, the numerical model was developed to evaluate the observational environment of sunshine duration and, for evaluating the accuracy and utility of the model, it was verified against the observational data measured at Dae-gu Automated Synoptic Observing System (ASOS) located in an urban area. Three-dimensional topography and building configuration as the surface input data of the model were constructed using a Geographic Information System (GIS) data. First, the accuracy of the computing planetary positions suggested by Paul Schlyter was verified against the data provided by Korea Astronomy and Space Science Institute (KASI) and the results showed that the numerical model predicted the Sun's position (the solar azimuth and altitude angles) quite precisely. Then, this model was applied to reproduce the sunshine duration at the Dae-gu ASOS. The observed and calculated sunshine durations were similar to each other. However, the observed and calculated sunrise (sunset) times were delayed (curtailed), compared to those provided by KASI that considered just the ASOS's position information such as latitude, longitude, and elevation height but did not consider the building and topography information. Further investigation showed that this was caused by not only the topographic characteristic (higher in the east and lower in the west) but also the buildings located in the southeast near the sunrise and the southwest near the sunset. It was found that higher building resolution increased the accuracy of the model. It was concluded that, for the accurate evaluation of the sunshine duration, detailed building and topography information around the observing sites was required and the numerical model developed in this study was successful to predict and/or the sunshine duration of the ASOS located in an urban area.

An Integrated Neural Network Model for Domain Action Determination in Goal-Oriented Dialogues

  • Lee, Hyunjung;Kim, Harksoo;Seo, Jungyun
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.259-270
    • /
    • 2013
  • A speaker's intentions can be represented by domain actions (domain-independent speech act and domain-dependent concept sequence pairs). Therefore, it is essential that domain actions be determined when implementing dialogue systems because a dialogue system should determine users' intentions from their utterances and should create counterpart intentions to the users' intentions. In this paper, a neural network model is proposed for classifying a user's domain actions and planning a system's domain actions. An integrated neural network model is proposed for simultaneously determining user and system domain actions using the same framework. The proposed model performed better than previous non-integrated models in an experiment using a goal-oriented dialogue corpus. This result shows that the proposed integration method contributes to improving domain action determination performance.

An Adaptive Probe Detection Model using Fuzzy Cognitive Maps

  • Lee, Se-Yul;Kim, Yong-Soo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.660-663
    • /
    • 2003
  • The advanced computer network technology enables connectivity of computers through an open network environment. There has been growing numbers of security threat to the networks. Therefore, it requires intrusion detection and prevention technologies. In this paper, we propose a network based intrusion detection model using Fuzzy Cognitive Maps(FCM) that can detect intrusion by the Denial of Service(DoS) attack detection method adopting the packet analyses. A DoS attack appears in the form of the Probe and Syn Flooding attack which is a typical example. The Sp flooding Preventer using Fuzzy cognitive maps(SPuF) model captures and analyzes the packet information to detect Syn flooding attack. Using the result of analysis of decision module, which utilized FCM, the decision module measures the degree of danger of the DoS and trains the response module to deal with attacks. The result of simulating the "KDD ′99 Competition Data Set" in the SPuF model shows that the Probe detection rates were over 97 percentages.

  • PDF

A Study on the Modelling of Combustion in a Small DI Diesel Engine (소형 DI 디젤 기관의 연소 모델링에 관한 연구)

  • Koh, D.K.;Kim, K.H.;Jang, S.H.;Ahn, S.K.
    • Journal of Power System Engineering
    • /
    • v.2 no.2
    • /
    • pp.20-26
    • /
    • 1998
  • Heat release data were obtained by analysis of cylinder diagrams from a test engine, naturally-aspirated small-size four-stroke DI diesel engine. These data were used to decide empirical coefficients of Whitehouse-Way's model, single zone combustion model. Finally, the comparison of calculated with experimental results was performed, and the accuracy of calculated versus experimental data of the model in predicting engine heat release and cylinder pressure was demonstrated.

  • PDF

The Identification of the Magnetic Bearing Control System's Parameters using RCGA (실수코딩 유전알고리즘을 이용한 자기베어링 제어시스템 파라미터의 동정)

  • Jeong, H.H.;Kim, Y.B.;Yang, J.H.
    • Journal of Power System Engineering
    • /
    • v.13 no.4
    • /
    • pp.68-73
    • /
    • 2009
  • The mathematical model has a different response character with the real system because this mathematical model has the modeling errors and the imprecise value of system's parameters. Therefore to find the value of system parameters as possible as near by real value in the model is necessary to design the controlled system. This study concern about the identification method to estimate the parameter for the magnetic bearing system with RCGA(Real Coded Genetic Algorithm). Firstly, we will get the mathematical model from the current amplifier circuit and the magnetic bearing system. Secondly we will get the step response data in this circuit and system. Finally, we will estimate the unknown parameter's value from the data.

  • PDF

A study on the AC and PMI model for the Defense computer network

  • Yoon, H.S.;Kim, S.C.;Song, J.S.
    • Annual Conference of KIPS
    • /
    • 2001.10b
    • /
    • pp.977-980
    • /
    • 2001
  • This paper is a study on the AC and PMI model for the defense computer network. It is suggested that the organization plan of PMI model is a proper model for the characteristics of military system and military defense network security demands based on defense PKI system. Futhermore, it will be presented both various types of defense AC and AC according to the role and clearance in PMI. Defense AC will provide strong users' authentication and Role Based Access Control to give more secured and trusted authentication service by using users' attribute such as role and clearance.

  • PDF

Development of Personal Information Protection Model using a Mobile Agent

  • Bae, Seong-Hee;Kim, Jae-Joon
    • Journal of Information Processing Systems
    • /
    • v.6 no.2
    • /
    • pp.185-196
    • /
    • 2010
  • This paper proposes a personal information protection model that allows a user to regulate his or her own personal information and privacy protection policies to receive services provided by a service provider without having to reveal personal information in a way that the user is opposed to. When the user needs to receive a service that requires personal information, the user will only reveal personal information that they find acceptable and for uses that they agree with. Users receive desired services from the service provider only when there is agreement between the user's and the service provider's security policies. Moreover, the proposed model utilizes a mobile agent that is transmitted from the user's personal space, providing the user with complete control over their privacy protection. In addition, the mobile agent is itself a self-destructing program that eliminates the possibility of personal information being leaked. The mobile agent described in this paper allows users to truly control access to their personal information.