• Title/Summary/Keyword: Security Evaluation Model

Search Result 389, Processing Time 0.025 seconds

Operation Plan of Big Data Prediction Model using Cut-off-Voting Classifier in Administrative Big Data Environment (행정 빅데이터 환경에서 컷오프-투표 분류기를 활용한 빅데이터 예측모형의 실험)

  • Woosik Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.145-154
    • /
    • 2024
  • In order to operate predictive models utilizing administrative big data, it is crucial to consider policy changes and the characteristics of highly volatile data. Considering this scenario, this study proposes the Cut-off Voting Classifier (CVC) algorithm. This proposed algorithm prevents a sharp decline in accuracy by utilizing multiple weak classifiers. The study validates the proposed algorithm's performance through experiments. The performance evaluation demonstrates the ability to maintain stable prediction rates even in situations with a sharp decline in predictive model accuracy.

Development of Web Credibility Evaluation Model Using AHP (AHP를 이용한 웹 사이트 신뢰성 평가 모델 개발)

  • Kim, Young-Kee
    • Journal of Korean Library and Information Science Society
    • /
    • v.39 no.4
    • /
    • pp.51-69
    • /
    • 2008
  • This study tired to develop the web credibility evaluation model by calculating weighted values and sensitivities of indicators which presented on preceding researches using Analytic Hierarchy Process. "Expert Choice 2000" was used as the tool for analysing AHP. 25 experts are answered for this questionnaire who are selected by judgement sampling method, one of the non-probability sampling method. Also, sensitivity analyses was performed to graphically see how the alternatives change with respect to the importance of the indicators or sub-indicators. The main results are summarized as followings; i) importance analysis in first level factors: trust-worthiness(0,606), expertness(0.222), safety(0.173), ii) importance analysis in second level factors: trustfulness (0.519), reputation(0.087), usefulness (0.102), timeliness(0,093), competency(0.027), security(0.115), reliability(0,058). iii) some of the importance analysis in third level factors: the site provides comprehensive information that is attributed to a specific source(0.252), the site has articles that list citations and references(0.153), the site contains user opinions and reviews(0.072), etc. iv) sensitivity analyses showed that the importance of the indicators or sub-indicators are slightly changed with respect to the alternatives change.

  • PDF

A Study on the educational program model for the citizens on patrol (시민자율방범 교육프로그램 개발에 관한 연구)

  • Kang, Yong-Gil
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.63-93
    • /
    • 2014
  • The importance of citizen as a key of community safety has increased, and the legislation to support the citizen's activities is continued. However systematic and detailed action plans are not enough to something. Thus, the purpose of this research is to develop the educational program model for the citizens on patrol for the improvement of practical use. The methods of this research are to make and suggest the educational program for citizens on patrol by literature review and cases analysis of educational program implemented one years ago. The findings are suggested as belows. First, the learners need the contents can be practically used in the field and sufficient time of education. Second, the subgoal to achieve the ultimate goal of education program model should be established as 'customer-centered, field-oriented, competence reinforcement', and driving strategy must be composed of four stages as plan-design-implementation-evaluation. Also, for strategy of each stage, detailed sub-strategies from preparation to execution of education have to be considered. Third, education program must be categorized by basic-intermediate-expert courses depending on the level of learners, and theoretically and practically oriented curriculum subjects are organized in balance by each course.

  • PDF

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.

Calculation Model for Function & Cost Score based on Normalization Method in Design VE (정규화 기법 기반의 설계VE 기능 및 비용 점수 산출 모델)

  • Lee, Jongsik
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.4
    • /
    • pp.98-106
    • /
    • 2015
  • VE aims at reduction in a budget, improvement of function, structural safety and quality security for public construction projects. However, there is possibility for the structural safety and quality security review to be insufficient because related regulations are mostly composed of analysis on economic efficiency of design. In addition, due to the misconception about VE as a cost saving methodology, an alternative is being presented which still focuses mainly on cost saving, but with no objective evaluation of function related to cost. In order to improve this, the government adopted the reduction of life cycle cost and proposal of value improvement, and let people specify the cost and function of the original plan versus the alternative plan, and the value changes between them. However, it is written mainly into practical convenience rather than theoretical basis since a specific way is not suggested. The current method sets a different starting point by applying the attributional difference of function and cost. Furthermore, an evaluation standard for correlating is an important element in rational decision making for assessing and choosing an alternative. This paper analyzes the process and method of function & cost scoring when performing VE and suggests a mathematical normalization model in order to support rational decision making when selecting an optimum plan.

An Analytical Evaluation on Buckling Resistance of Tapered H-Section Deep Beam (춤이 큰 웨브 변단면 H형 보의 휨내력에 대한 해석적 평가)

  • Lee, Seong Hui;Shim, Hyun Ju;Lee, Eun Taik;Hong, Soon Jo;Choi, Sung Mo
    • Journal of Korean Society of Steel Construction
    • /
    • v.19 no.5
    • /
    • pp.493-501
    • /
    • 2007
  • Recently, in the domestic amount of materials,curtailment and economic efficiency security by purpose, tapered beam application is achieved, but the architectural design technology of today based on the material non-linear method does not consider solutions to problems such as brittle fracture. So, geometric non-linear evaluation thatincludes initial deformation, width-thickness ratio, web stiffener and unbraced length is required. Therefore, in this study, we used ANSYS, a proven finite elementanalysis program,and material and geometric non-linear analysis to study existing and completed tapered H-section as deep beam's analysis model. Main parameters include the width-thickness ratio of web, stiffener, and flange brace, with the experimental result obtained by main variable buckling and limit strength evaluation. We made certain that a large width-thickness ratio of the web decreases the buckling strength and short unbraced web significantly improves ductility.

A Study on the Scale Optimization of the Korean-type Aircraft Carrier based on Efficiency Considering National Competency (국가 역량을 고려한 효율성 기반 한국형 항공모함 규모 최적화 연구)

  • Jung, Byungki;Kim, Kitae;Park, Sungje
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.3
    • /
    • pp.49-56
    • /
    • 2022
  • ROK Navy intends to secure the Korean-type aircraft carrier in order to effectively prepare for various future security threats. In general, the Korean national competency is considered to be at the level of having an aircraft carrier, but it is unclear what scale aircraft carrier would be appropriate. In this study, the efficiency was evaluated through the relative comparison between national competency(national power, economic power) and the scale of aircraft carriers, and the optimal scale of the Korean-type aircraft carrier that could be acquired was presented. A DEA(Data Envelopment Analysis) model was applied to aircraft carriers(19 aircraft carriers in 11 countries) currently in operation and scheduled to be possessed in the world. As input variables, CINC(Composite Index of National Capability) and GDP(Gross Domestic Product), which are the most widely used as indicators of national and economic power, and as output variables, the full-load displacement, length, and width of aircraft carriers were selected. ARIMA(short-term within 5 years) and simple regression(long-term over 5 years) were used to estimate the future national competency of each country at the time of aircraft carriers acquisition. The relative efficiency score of the Korean-type aircraft carrier currently being evaluated is 1.062, and it was evaluated as small-scale aircraft carrier compared to the national competency. Based on Korean national competency, the optimal scale of the Korean-type aircraft carrier calculated by aggregating benchmark groups, is 58,308.1 tons of full-load displacement, 279.4m in length, and 68.3m in width.

Trend of Physical Modelling For Ground Subsidence And Study of Its Application (지반함몰 모형실험 연구동향 및 적용방안 고찰)

  • Jeong, Seong-Yun;Jeong, Yeong-Hoon;Kim, Dong Soo
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.1
    • /
    • pp.1-10
    • /
    • 2017
  • Recently, increasing cases of ground subsidence in the urban area has become social issue, and related bill has been passed. Ground subsidence occurs through complex combination of various factors, and numerical analysis of this problem is limited thereby. This is why verification of ground subsidence mechanism has been conducted through physical modelling. Previous researches has been focused on modelling ground subsidence caused by utility pipe defects, and there has been insufficient physical modelling study on ground subsidence caused by various reasons such as groundwater flow and excavation activity. Also, most previous physical modelling studies were performed in 1g condition, which cannot take the in-situ stress condition into the evaluation of the ground subsidence mechanism. Therefore, in this study, physical modelling techniques to simulate various conditions is discussed by studying the previous researches on the ground subsidence mechanism through physical modelling. Also, centrifuge modelling test is suggested in this study as the technique to perform more reliable evaluation of ground subsidence mechanism. Lastly, this study suggests to apply the techniques used in the evaluation of ground subsidence mechanism into Ground Stability Assessment.

A Study on Biometric Model for Information Security (정보보안을 위한 생체 인식 모델에 관한 연구)

  • Jun-Yeong Kim;Se-Hoon Jung;Chun-Bo Sim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.317-326
    • /
    • 2024
  • Biometric recognition is a technology that determines whether a person is identified by extracting information on a person's biometric and behavioral characteristics with a specific device. Cyber threats such as forgery, duplication, and hacking of biometric characteristics are increasing in the field of biometrics. In response, the security system is strengthened and complex, and it is becoming difficult for individuals to use. To this end, multiple biometric models are being studied. Existing studies have suggested feature fusion methods, but comparisons between feature fusion methods are insufficient. Therefore, in this paper, we compared and evaluated the fusion method of multiple biometric models using fingerprint, face, and iris images. VGG-16, ResNet-50, EfficientNet-B1, EfficientNet-B4, EfficientNet-B7, and Inception-v3 were used for feature extraction, and the fusion methods of 'Sensor-Level', 'Feature-Level', 'Score-Level', and 'Rank-Level' were compared and evaluated for feature fusion. As a result of the comparative evaluation, the EfficientNet-B7 model showed 98.51% accuracy and high stability in the 'Feature-Level' fusion method. However, because the EfficietnNet-B7 model is large in size, model lightweight studies are needed for biocharacteristic fusion.

A Study on the Practice Model for Practical Education for Health and Medical Information Management (보건의료정보관리 실습교육을 위한 실습모델 연구)

  • Choi, Joon-Young
    • Journal of the Health Care and Life Science
    • /
    • v.8 no.2
    • /
    • pp.83-93
    • /
    • 2020
  • In this study, a practical model for health information management education using the EMR education system at universities for nurturing health care information managers was studied. Currently, there is no practical training course for health care information management in the standards for evaluation and certification of health care information management education introduced to strengthen the job competency of health care information managers. Accordingly, the program was constructed so that the practice program suggested as an educational environment in the Health and Medical Information Management Education Evaluation and Certification Manual can be practiced in the EMR education system. In addition, a practical model that can be performed according to the on-site practice guidelines for health and medical information management for each program was studied. Using the health care information management education EMR system, master data management, patient registration, doctor prescription, medical cost calculation, health insurance claim management, form management, discharge registration, cancer registration, unrecorded management, health care data management, health care statistics, A practice model was studied so that practice on information protection/security management can be performed. It will be possible to play a role as a health care information management expert by raising the quality level of health care information management education through systematic and standardized health care information management practice courses at universities. Accordingly, it is necessary to cultivate health care information management experts who develop and manage medical services based on medical data analysis through practical training of health care information managers.