• Title/Summary/Keyword: Security Evaluation System

Search Result 675, Processing Time 0.024 seconds

Buckling Sensitivity of CWR Tracks according to the Characteristics of the Probability Distribution of the Lateral Ballast Resistance (도상횡저항력의 확률분포 특성에 따른 CWR 궤도의 좌굴 민감도)

  • Yun, Kyung-Min;Bae, Hyun-Ung;Kang, Tae-Ku;Kim, Myoung-Su;Lim, Nam-Hyoung
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.423-426
    • /
    • 2011
  • The excessive axial load occurred in an immovable zone of continuous welded rail(CWR) tracks threatens the security of running trains due to the track buckling in extreme hot summer. The influence factors, such as rail temperature for compressive stress, ballast resistance for track stiffness and initial imperfection of track for tracks irregularity are uncertain track parameters that are randomly varied by climate conditions, operating conditions and maintenance of track etc. So, buckling of CWR tracks has very high uncertainties. Therefore, applying the probabilistic approach method is essential in order to rationally consider the uncertainty and randomness of the various parameters. In this study, buckling sensitivity analysis was carried out with respect to the characteristics of probability distribution of lateral ballast resistance using the buckling probability evaluation system of CWR tracks developed by our research team.

  • PDF

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering the Age of User Profiles

  • Bae, Ihn-Han
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1726-1732
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the used pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with the age of the user profile. The performance of the proposed scheme is evaluated by using a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed scheme that considers the age of user profiles.

  • PDF

A Study on the Baseline Load Estimation Method using Heating Degree Days and Cooling Degree Days Adjustment (냉난방도일을 이용한 기준부하추정 방법에 관한 연구)

  • Wi, Young-Min
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.5
    • /
    • pp.745-749
    • /
    • 2017
  • Climate change and energy security are major factors for future national energy policy. To resolve these issues, many countries are focusing on creating new growth industries and energy services such as smartgrid, renewable energy, microgrid, energy management system, and peer to peer energy trading. The financial and economic evaluation of new energy services basically requires energy savings estimation technologies. This paper presents the baseline load estimation method, which is used to calculate energy savings resulted from participating in the new energy program, using moving average model with heating degree days (HDD) and cooling degree days (CDD) adjustment. To demonstrate the improvement of baseline load estimation accuracy, the proposed method is tested. The results of case studies are presented to show the effectiveness of the proposed baseline load estimation method.

The Trends of Domestic SI Industry and Promotion Strategies for the CALS Model Projects (국내 SI업체의 동향 및 CALS 시범사업 추진전략)

  • 정기원;임춘성;정동길
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.131-151
    • /
    • 1997
  • The CALS/EC is the world-wide accepted concept and its application domain is being expanded continuously throughout the private and public sectors. One of the essential points for realization of CALS/EC is to promote the domestic system integration(SI) industry. This paper describes the present status of the domestic SI companies and the clues to solve their facing problems. In order to evaluate the status of the current SI technology, the MBNQA(Malcom Baldridge National Quality Award) is adopted. The surveyed results show that the average levels of 14 SI companies over 7 evaluation criteria turn out to be 30% through 40% point. The major projects' activities of the SI companies on the information systems over the areas of trade, science and technology, industrial manpower, health and welfare, national security, etc are explained. Also, the competitive power of the SI companies is also discussed. As a target sample, the Korea Telecom(KT) CALS model project is described in terms of its Progresses and Problems. Furthermore, the strategic plans and detailed research items are proposed to resolve on-going issues.

  • PDF

Design and Evaluation of a Dynamic Anomaly Detection Scheme Considering the Age of User Profiles

  • Lee, Hwa-Ju;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.18 no.2
    • /
    • pp.315-326
    • /
    • 2007
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the proposed dynamic scheme that considers the age of user profiles.

  • PDF

Price Earning Ratio And Firm Valuation (주가수익률과 기업평가)

  • 여동길
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.9 no.14
    • /
    • pp.49-58
    • /
    • 1986
  • Those facts I have studied on the theoretical characteristics of stock price earning ratio related with firm evaluation are as followings. First, I have investigated stock valuation analysis under certainty in view of Miller's, Modigliani's and Linter's theories in Chapter Ⅱ, and it is found that stock valuation under uncertainty to which the basic model of MM theory and the concept of capitalization ratio are applied is the same output, as in the case under certainty. And I have examined the stock valuation of growth corporations in which net investment, total capitals and operating profits are expected. Second, I have reexamined the fact that stock price profits are the erotical indices of firm valuation and the firm valuation on the basis of stock price earning ratio in Chapter III. As a whole, I have surveyed the stock price earning ratio theory of the growth stocks and there have been found some problems as such scholars as Malkiel and others have suggested focusing on the stock price structure of growth stocks. To conclude, there must be incessant efforts for the study of security analysis to make it develop ideally.

  • PDF

A study on the security analysis and evaluation of the web based metering/billing system for the value storage electricity meter (전력전자상거래(VSEM)를 위한 웹기반 미터링/과금 시스템의 보안성 분석 및 평가에 관한 연구)

  • Kang Hwan-Il;Song Young-Ki;Kang Hwan-Soo;Jo Jin-Hyung;Jang Woo-Seok
    • Proceedings of the KIPE Conference
    • /
    • 2006.06a
    • /
    • pp.462-464
    • /
    • 2006
  • 본 연구는 제4세대 미터링(Metering) 기술을 이용한 전력전자상거래 즉 VSEM(Value Storage Electricity Meter)을 위한 웹기반 미터링 시스템의 보안성 분석 및 평가에 관한 연구이다. 특히 수요자 측면에서 스마트카드(지불결제)를 이용한 본인 확인(SIM카드), 키 값 확인, VSEM서버에서의 각 수요자와 공급자 데이터 사이의 무결성 확인(Integrity)과 부인 방지(Non-repudiation)를 위한 기존 시스템의 보안 문제를 분석하고 이를 해결할 수 있는 보안 모델을 제안한다.

  • PDF

An Assessment and Policy Implication of Information Technology Convergence Programs in Korean Public Service Area (공공부문 IT신기술 적용사업의 추진현황 평가와 정책적 시사점)

  • Kim, SungHyun
    • Journal of Information Technology Services
    • /
    • v.11 no.sup
    • /
    • pp.1-16
    • /
    • 2012
  • Information technology is a useful strategic weapon that can create competitive advantage and new business opportunity by applying it in the organization' value chain. IT convergence can be understood as an attempt of industrial level IT adoption to facilitate the innovation of the industry and the birth of a new industry. This study provides the comprehensive review of the Korean government' three IT assimilation programs, ubiquitous technology diffusion program of the Ministry of Knowledge Economy, u-service program of the Ministry of Public Administration and Security, and u-Defence cooperation program of the Department of Defense. The analysis is done through the interpretation of the existing literature and the logic model. The result proposes inter-agency cooperation and building of new technology road-map in the planning stage, flexible management in the execution phase, and failure tolerant evaluation system. The proposal for developing competencies and institutional foundations for IT convergence also presented.

Design of Test Tool for Performance Evaluation of Information Security System (정보보호 시스템의 성능평가를 위한 시험 도구의 설계)

  • Jeon, Jun-Sang;Jeong, Youn-Seo;Soh, Woo-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.11a
    • /
    • pp.1083-1086
    • /
    • 2005
  • 최근 정보보호에 대한 관심이 점점 높아짐에 따라 정보보호시스템에 대한 다양한 요구가 발생하고 있으며, 정보보호시스템 개발 업체들은 관련된 정보보호시스템들을 개발하여 출시하고 있다. 또한 이러한 정보보호 시스템들을 평가하고 인증하기 위한 여러 가지 방법들이 제시되고 있다. 그러나 이러한 방법들은 많은 시간과 비용이 들며, 전문적인 지식이 없는 경우에는 별로 유용하지 못한 정보가 된다. 본 논문에서는 이를 해결하기 위해서 사용자가 직접 정보보호 시스템의 성능을 평가해 볼 수 있는 시험도구를 제안한다.

  • PDF

Developing A Quantitative Evaluation Model for Information System Security Auditing (정보시스템 보안감리평가의 정량화모델 개발)

  • Kim, Dong-Soo;Kim, Hyun-Soo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2003.05a
    • /
    • pp.363-370
    • /
    • 2003
  • 지금까지 국내 보안감리 평가는 정성적인 평가에 머물러 있어 평가를 담당하는 감리인마다 평가 결과가 서로 상이하여 피 평가자에게 신뢰를 심어주지 못하는 결과가 초래되고 있다. 본 연구에서는 보안감리에 대한 국내의 연구와 해외 사례를 참조하여 SI사업에서의 보안감리평가 효율성을 제고할 수 있는 방안 및 평가체계를 정량화하는 방안을 제시하였다. 이를 위해 SI사업의 소프트웨어 개발 및 개발 환경(네트워크, 서버 등)을 중심으로 한국전산원에서 제시하고 있는 보안감리 지침과 한국정보시스템감리인협회의 보안관련 세부 감리지침을 통합하고 세부 감리지침에 따른 평가를 정량화 하였다. 보안감리 평가의 정량화 방안에 대한 감리전문가의 인터뷰와 사례 프로젝트의 적용을 통하여 연구 모형에 대한 검증을 실시하였다.

  • PDF