• Title/Summary/Keyword: Security Evaluation Model

Search Result 391, Processing Time 0.036 seconds

Analysis on Effects of The Firewall on Networks (네트워크 상에서의 침입차단시스템 영향력 분석)

  • 정선이;박정은;유수연;장성은;채기준;노병규
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.95-105
    • /
    • 2000
  • The Firewall is needed in order to protect communication networks from ill effects of informatization such as information leakage, destruction, forgery and virus. To take an advantage of the firewall, the security manager must understand the effects that it can have on the network. There airs, however, no tools available to evaluate the performance of the firewall. In this paper, we study the effect of the firewall by putting various kinds of traffic into the actual network. Also, using COMNET- III, we model two networks with and without the firewall. And we analyze the effects under the various network envion-ments.

An analytical solution for buckling failure of rock slopes based on elastoplastic slab theory

  • Zhihong Zhang;Pengyu Wu;Fuchu Dai;Renjiang Li;Xiaoming Zhao;Shu Jiang
    • Geomechanics and Engineering
    • /
    • v.37 no.1
    • /
    • pp.1-8
    • /
    • 2024
  • Buckling failure is one of the classical types of catastrophic landslides developing on inclination-paralleled rock slopes, which is mainly governed by its self-weight, earthquake and ground water. However, nearly none of the existing studies fully consider the influence of slope self-weight, earthquake and ground water on the mechanical model of buckling failure. In this paper, based on energy equilibrium principle and elastoplastic slab theory, a thorough mechanical analysis on bucking slopes has been carried out. Furthermore, an analytical solution for slip bucking failure of rock slopes has been proposed, which fully considers the effect of slope self-weight, seismic force and hydrostatic pressure. Finally, the methodology is used to conduct comparative analysis with other analytical solutions for three practical buckling studies. The results show that the proposed approach is capable of providing a more accurate and reasonable evaluation for stability of rock slopes with potential buckling failure.

A Study of the Data Qualituy Evaluation (데이터 품질 평가에 관한 연구)

  • Jung, Hye-Jung
    • Journal of Internet Computing and Services
    • /
    • v.8 no.4
    • /
    • pp.119-128
    • /
    • 2007
  • In this paper, We study on the Data Quality Model of ISO/IEC 25012 among the Software product Quality Requirements and Evaluation(SQuaRE) in ISO/IEC 25000 Series. Because of the increasing data, user require the accuracy data, recent data, suitable data for used tools, complied security and not open to be public. We research the data quality management in the point of application of be affect influenced low quality in business. We propose the testing items and we propose the method of the evaluation proposed testing items. We study on the basis international Standards ISO/IEC 25012 and ISO/IEC 9126-2 and we proposed the testing method quantitatively on the basis of ISO/IEC 25000.

  • PDF

Facial Expression Recognition using 1D Transform Features and Hidden Markov Model

  • Jalal, Ahmad;Kamal, Shaharyar;Kim, Daijin
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.4
    • /
    • pp.1657-1662
    • /
    • 2017
  • Facial expression recognition systems using video devices have emerged as an important component of natural human-machine interfaces which contribute to various practical applications such as security systems, behavioral science and clinical practices. In this work, we present a new method to analyze, represent and recognize human facial expressions using a sequence of facial images. Under our proposed facial expression recognition framework, the overall procedure includes: accurate face detection to remove background and noise effects from the raw image sequences and align each image using vertex mask generation. Furthermore, these features are reduced by principal component analysis. Finally, these augmented features are trained and tested using Hidden Markov Model (HMM). The experimental evaluation demonstrated the proposed approach over two public datasets such as Cohn-Kanade and AT&T datasets of facial expression videos that achieved expression recognition results as 96.75% and 96.92%. Besides, the recognition results show the superiority of the proposed approach over the state of the art methods.

A Proposal on the personalized integrated Education Model Using the Blockchain (블록체인을 활용한 개인 맞춤형교육 통합모델 제안)

  • Yu, Kyoung-sung;Kwon, Mee-Rhan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.451-456
    • /
    • 2019
  • Our students are shocked by the results that there is an inverse proportion between academic achievement and life satisfaction. Recently, the Organization for Economic Cooperation and Development (OECD) published the PISA 2015 Student Well-Being Report. According to the report, Korean students' education is the highest among OECD countries, but their life satisfaction is the 47th ranked among the 48 OECD and non-OECD countries.[1] This is the cause of the unilateral education using collective achievement in evaluation methods. Therefore, I propose a personalized integrated model utilizing block chain technology. I suggest a personalized education and evaluation system model using selective education and personal approval rather than from teachers' unilateral education. This will no longer open the student's achievement grade system to the public. This change will be accomplished utilizing block chain technology. This technology is characterized by security, transparency and dispersion. The result of this work can be used to improve students' quality of living through a management system of personalized education and evaluation, based on the nature of education.

A Study on Evaluation System based on Characteristics of BcN (BcN 특성 관점의 평가체계 개발에 관한 연구)

  • Na, Yun-Ji;Ko, Il-Seok;Cho, Young-Suk
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.49-58
    • /
    • 2006
  • Currently there are many standards of network management. They are : SNMP (Simple Network Management Protocol-for Internet management), CMIP (Common Management Information Protocol-standardized by ITU-T and ISO), RMON (Remote network MONitoring-for distributed management of the LAN segment), and so on. Especially RMON has created the many concerns in order to manage subnetworks of a large network, but it has negative aspects. For instance, routers or hubs with RMON capability are expensive to a network manager because of adding heavy management cost. Moreover it imposes a heavier burden on network manager, because it must use a network management tool which will be additionally needed with RMON device. This paper proposes a model of PC based RMON Agent system. The RMON Agent system monitors the traffic on LAN segment through the use of a Virtual Device Driver (VxD), based on PC. In term of cost this model will replace the expensive RMON device, and eventually enable a network manager to manage LAN segment more efficiently, due to reduced cost.

  • PDF

Introducing Smart Learning Framework in the Digital World: Towards the Enhancement of Technology-Driven Innovation of Arabic Smart Learning

  • Alkhammash, Eman H.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.331-337
    • /
    • 2022
  • Smart learning is augmented with digital, context-aware, and adaptable technologies to encourage students to learn better and faster. To ensure that digital learning is successful and that implementation is efficient, it is critical that the dimensions of digital learning are arranged correctly and that interactions between the various elements are merged in an efficient and optimal manner. This paper builds and discusses a basic framework for smart learning in the digital age, aimed to improve students' abilities and performance in learning. The proposed framework consists of five dimensions: Teacher, Technology, Learner, Digital content, and Evaluation. The Teacher and Learner dimensions operate on two levels: (a) an abstract level to fit in knowledge and skills or interpersonal characteristics and (b) a concrete level in the form of digital devices used by teachers and learners. Moreover, this paper proposes asynchronous online course delivery model. An Arabic smart learning platform has been developed, based on these smart learning core dimensions and the asynchronous online course delivery model, because despite the official status of this language in many countries, there is a lack of Arabic platforms to teach Arabic. Moreover, many non-native Arabic speakers around the world have expressed an interest in learning it. The Arabic digital platform consists of over 70 lessons classified into three competence levels: beginner, intermediate, and advanced, delivered by Arabic experts and Arabic linguists from various Arab countries. The five dimensions are described for the Arabic platform in this paper. Learner dimension is the Arabic and non-Arabic speakers, Teacher dimension is Arabic experts and Arabic linguistics, Technology dimension consists of technology for Arabic platform that includes web design, cloud computing, big data, etc. The digital contents dimension consists of web-based video, records, etc. The evaluation dimension consists of Teachers rating, comments, and surveys.

Analysis of Operational Efficiency of Military Department of University Using Data Envelopment Analysis Method (자료포락분석법을 활용한 일반대학 군사학과의 운영 효율성 분석)

  • Young-Min Bae;Sweng-Kyu Lee
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.95-102
    • /
    • 2023
  • The purpose of this paper was to confirm the operational level of the military department of universities, which plays a key role in the officer training process, through empirical research and confirm meaningful results for improvement. There are 11 university military departments operated through the Army, agreements, and semi-agreement, and the Data Envelopment Analysis (DEA) was applied from the perspective of resource input and performance for each university's military department operation to analyze relative efficiency and confirm specific directions for improvement. As a result of operational efficiency analysis, 6 DMUs (Decsision Making Unit) were found to be efficient in the BCC model out of 11 DMUs, and the evaluation results could be confirmed through classification of efficient and inefficient groups through data capture analysis. This paper may be of practical value in that it checks the efficiency of the comparative university military departments and confirms specific information for development through the DEA-Additive model that reflects several evaluation factors at once. Through this, the operators of each university's military department are admitted.

Design and Evaluation of DRM Model with Strong Security Based on Smart Card (스마트카드 기반의 강한 보안을 갖는 DRM 모델의 설계 및 평가)

  • Park, Jong-Yong;Kim, Young-Hak;Choe, Tae-Young
    • Journal of Digital Contents Society
    • /
    • v.12 no.2
    • /
    • pp.165-176
    • /
    • 2011
  • Recently, digital rights management (DRM) related researches are widely spreading with prosperity of IT industries. The DRM technology protects proprietor of copyright by preventing mischanneling and illegal copy. In this paper, we propose a new DRM model that has an enhanced and efficient protocol based on certificate using smart card. The proposed model overcomes weaknesses of WCDRM model and has following additional advantages: first, copy protection is enhanced by hiding user's specific information from attacker by storing the information within smart card; second, server load for contents encryption is reduced by making clear protocols among author, distributer, certificate authority, and users; third, offline user authentication is guaranteed by combining partial secret values in media players and smart card. Exposure of core information also is minimized by storing them in smart card. In addition, we show that the proposed system is more secure than WCDRM model by comparing various factors of anonymous attackers.

A Modeling of Forensics for Mobile IP Spoofing Prevention (모바일 IP 스푸핑 방지를 위한 포렌식 설계)

  • Park, Sun-Hee;Yang, Dong-Il;Jin, Kwang-Youn;Choi, Hyung-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.2
    • /
    • pp.307-317
    • /
    • 2012
  • Rapid development of the IT technology and mobile communications has increasingly improved many kinds of digital devices arise, as well as the mobile technology. However, the attacks (virus, hacking and Ip spoofing etc) have also increasingly grown dogged on any region including the society security. As the visual data is prone to copy, delete and move etc, it is necessary that attesting to the integrity of forensics evidence is crucial, as well as data transmission security. This paper presents a framework model using digital forensics method and the results of its performance evaluation for mobile security. The results show that the integrity of the visual data can be obtain with high security and make a proposal refer to prevention of Mobile IP Spoofing attack using our hashing data.