• Title/Summary/Keyword: Security Evaluation System

Search Result 672, Processing Time 0.028 seconds

Ice Load Generation in Time Domain Based on Ice Load Spectrum for Arctic Offshore Structures (극지해양구조물 성능평가를 위한 스펙트럼 기반 시간역 빙하중 생성에 관한 연구)

  • Kim, Young-Shik;Kim, Jin-Ha;Kang, Kuk-Jin;Han, Solyoung;Kim, Jinwhan
    • Journal of Ocean Engineering and Technology
    • /
    • v.32 no.6
    • /
    • pp.411-418
    • /
    • 2018
  • This paper introduces a new method of ice load generation in the time domain for the station-keeping performance evaluation of Arctic offshore structures. This method is based on the ice load spectrum and mean ice load. Recently, there has been increasing interest in Arctic offshore technology for the exploration and exploitation of the Arctic region because of the better accessibility to the Arctic ocean provided by the global warming effect. It is essential to consider the ice load during the development of an Arctic offshore structure. In particular, when designing a station-keeping system for an Arctic offshore structure, a consideration of the ice load acting on the vessel in the time domain is essential to ensure its safety and security. Several methods have been developed to consider the ice load in the time domain. However, most of the developed methods are computationally heavy because they consider every ice floe in the sea ice field to calculate the ice load acting on the vessel. In this study, a new approach to generate the ice load in the time domain with computational efficiency was suggested, and its feasibility was examined. The ice load spectrum and mean ice load were acquired from a numerical analysis with GPU-event mechanics (GEM) software, and the ice load with the varying heading of a vessel was reconstructed to show the feasibility of the proposed method.

A Pre-processing Study to Solve the Problem of Rare Class Classification of Network Traffic Data (네트워크 트래픽 데이터의 희소 클래스 분류 문제 해결을 위한 전처리 연구)

  • Ryu, Kyung Joon;Shin, DongIl;Shin, DongKyoo;Park, JeongChan;Kim, JinGoog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.12
    • /
    • pp.411-418
    • /
    • 2020
  • In the field of information security, IDS(Intrusion Detection System) is normally classified in two different categories: signature-based IDS and anomaly-based IDS. Many studies in anomaly-based IDS have been conducted that analyze network traffic data generated in cyberspace by machine learning algorithms. In this paper, we studied pre-processing methods to overcome performance degradation problems cashed by rare classes. We experimented classification performance of a Machine Learning algorithm by reconstructing data set based on rare classes and semi rare classes. After reconstructing data into three different sets, wrapper and filter feature selection methods are applied continuously. Each data set is regularized by a quantile scaler. Depp neural network model is used for learning and validation. The evaluation results are compared by true positive values and false negative values. We acquired improved classification performances on all of three data sets.

A Comparative Analysis of Research Trends in the Information and Communication Technology Field of South and North Korea Using Data Mining

  • Jiwan Kim;Hyunkyoo Choi;Jeonghoon Mo
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.14-30
    • /
    • 2023
  • The purpose of this study is to compare research trends in the information and communication technology (ICT) field between North and South Korea and analyze the differences by using data mining. Frequency analysis, clustering, and network analysis were performed using keywords from seven South Korean and two North Korean ICT academic journals published for five years (2015-2019). In the case of South Korea (S. Korea), the frequency of research on image processing and wireless communication was high at 16.7% and 16.3%, respectively. North Korea (N. Korea) had a high frequency of research, in the order of 18.2% for image processing, 16.9% for computer/Internet applications/security, and 16.4% for industrial technology. N. Korea's natural language processing (NLP) sector was 11.9%, far higher than S. Korea's 0.7 percent. Student education is a unique subject that is not clustered in S. Korea. In order to promote exchanges between the two Koreas in the ICT field, the following specific policies are proposed. Joint research will be easily possible in the image processing sector, with the highest research rate in both Koreas. Technical cooperation of medical images is required. If S. Korea's high-quality image source is provided free of charge to N. Korea, research materials can be enriched. In the field of NLP, it calls for proposing exchanges such as holding a Korean language information conference, developing a Korean computer operating system. The field of student education encourages support for remote education contents and management know-how, as well as joint research on student remote evaluation.

Moisturizing and Dryness Reduction Effect of Face Cream Containing Persicaria Perfoliata (L.) Extract (며느리배꼽추출물을 함유하는 페이스 크림의 보습 및 건조함 감소 효과)

  • Kim, Seong-Yun;Yoon, Hyun-Seo;Hyun, Sook-Kyung;Park, Chung-Mu
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.10 no.3
    • /
    • pp.27-36
    • /
    • 2022
  • Purpose : This study was aimed to analyze the effects of cosmetics containing Persicaria perfoliata water extract (PPWE) on the skin moisturizing and improvement of skin condition in clinical trials. Methods : Clinical trial was conducted for five weeks after IRB approval at Dong-Eui University. Out of a total of 64 people, 15 people each were assigned to four groups as follows; control group A, B, C and the experimental group A that using cosmetic containing PPWE. Skin condition was measured two times, before and after clinical trial, by a professional skin analyzer, SDM (skin diagnosis system). Moisture and oil value of participants was analyzed twice, each morning and evening, using a portable device on their cheeks. In addition, the survey was investigated subjective satisfaction on change in skin condition and the satisfaction on the use of cosmetics. Result : The experimental group exhibited subjectively significant changes before and after clinical trials on skin its dryness (p=.039), blush (p=.017), and redness (p<.001). In addition, subjective evaluation was also the highest satisfaction in aspects of number of application (p=.003), amount of application (p=.002), moisture maintenance, and skin scratching frequency. The satisfaction on the use of cosmetics was the highest in the intention to repurchase (p=.045), recommendation willingness to others (p=.020), and intention to use various products (p=.001). Skin moisture of the clinical trial participants using the SDM, moisture level and elasticity of the experimental group increased by 12.94 and 10.28. Moisture level, which was measured by a portable device, was the most potently increased in the experimental group. Conclusion : Consequently, PPWE containg cosmetics exhibited the effects of moisturization and attenuated skin dryness in clinical trials, which might be utilized as a fundamental data to develop numerous lines of cosmetics.

Standard Model for Mobile Forensic Image Development

  • Sojung, Oh;Eunjin, Kim;Eunji, Lee;Yeongseong, Kim;Gibum, Kim
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.626-643
    • /
    • 2023
  • As mobile forensics has emerged as an essential technique, the demand for technology development, education and training is increasing, wherein images are used. Academic societies in South Korea and national institutions in the US and the UK are leading the Mobile Forensic Image development. However, compared with disks, images developed in a mobile environment are few cases and have less active research, causing a waste of time, money, and manpower. Mobile Forensic Images are also difficult to trust owing to insufficient verification processes. Additionally, in South Korea, there are legal issues involving the Telecommunications Business Act and the Act on the Protection and Use of Location Information. Therefore, in this study, we requested a review of a standard model for the development of Mobile Forensic Image from experts and designed an 11-step development model. The steps of the model are as follows: a. setting of design directions, b. scenario design, c. selection of analysis techniques, d. review of legal issues, e. creation of virtual information, f. configuring system settings, g. performing imaging as per scenarios, h. Developing a checklist, i. internal verification, j. external verification, and k. confirmation of validity. Finally, we identified the differences between the mobile and disk environments and discussed the institutional efforts of South Korea. This study will also provide a guideline for the development of professional quality verification and proficiency tests as well as technology and talent-nurturing tools. We propose a method that can be used as a guide to secure pan-national trust in forensic examiners and tools. We expect this study to strengthen the mobile forensics capabilities of forensic examiners and researchers. This research will be used for the verification and evaluation of individuals and institutions, contributing to national security, eventually.

Extending Role-based Access Control for Privacy Preservation in Academic Affairs System (교무업무시스템에서의 개인정보보호를 위한 역할기반 접근 제어 확장)

  • Kim, Bo-Seon;Hong, Eui-Kyeong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.171-179
    • /
    • 2008
  • RBAC(Role based Access Control) is effective way of managing user's access to information object in enterprise level and e-government system. The concept of RBAC is that the access right to object in a system is not directly assigned o users but assigned by being a member of a role which is defined in a organization. RBAC is utilized for controling access range of privacy but it does not support the personal legal right of control over information and right of limited access to the self. Nor it contains the way of observation of privacy flow that is guided in a legal level. In this paper, extended RBAC model for protecting privacy will be suggested and discussed. Two components of Data Right and Assigning Data Right are added to existed RBAC and the definition of each component is redefined in aspect of privacy preservation. Data Right in extended RBAC represents the access right to privacy data. This component provides the way of control over who can access which privacy and ensures limitation of access quantity of privacy. Based on this extended RBAC, implemented examples are presented and the evaluation is discussed by comparing existed RBAC with extended RBAC.

Development of an Imaging-DOAS System for 2-D Remote Sensing of Atmospheric Gases (대기가스오염물질의 이차원 원격 모니터링을 위한 Imaging-DOAS 개발)

  • Lee, Han-Lim;Lee, Chul-Kyu;Jung, Jin-Sang;Park, Jeong-Eun;Kim, Young-Joon
    • Journal of Korean Society of Environmental Engineers
    • /
    • v.28 no.2
    • /
    • pp.150-157
    • /
    • 2006
  • Spatially resolved remote identification and quantification of trace gases in the atmosphere is desirable in various fields of scientific research as well as in public security and industrial contexts. Environmental observations investigating causes, extent md consequences of air pollution are of fundamental interest. We present an Imaging-DOAS system, a ground based remote sensing instrument that allows spatially resolved mapping of atmospheric trace gases by a differential optical absorption spectroscopy(DOAS) with sun scattered light as the light source. A passive DOAS technique permits the identification and quantification of various gases, e.g., $NO_2,\;SO_2,\;and\;CH_2O$, from their differential absorption structures with high sensitivity. The Imaging-DOAS system consists of a scanning mirror, a focusing lens, a spectrometer, a 2-D CCD, ad the integral control software. An imaging spectrometer simultaneously acquires spectral information on the incident light in one spatial dimension(column) and sequentially scans the next spatial dimension with a motorized scanning mirror. The structure of the signal acquisition system is described in detail and the evaluation method is also briefly discussed. Applications of imaging of the $NO_2$ contents in the exhaust plumes from a power plant are presented.

An Evaluation of The Vital Registration System in Korea (한국 인구동태통계 작성에 대한 평가)

  • 김남일
    • Korea journal of population studies
    • /
    • v.20 no.1
    • /
    • pp.47-63
    • /
    • 1997
  • Problems concerning the vital registration system and its management, errors and methods to adjust them in the vital registration data in Korea have been studied. It is found that birth and death registration rates were above 95% in 1994. The registration rates rose rapidly since 1970 due to 1) simplification of registration form, 2) improving accessibility by allowing registration at the current residence, 3) enforcing fine against non-registration, and 4) improvements in social security system. However, there should be some continuing efforts for further improvement of the vital registration system. The content error in the data could be substantially reduced following the rapid rise of the registration rates in the 1980s, though this has never been actually studied. There are still substantial registrations with false date of death. The false date of events may affect the computed vital rates specially when the registration rates are rapidly rising. Especially the death rates of the young can be seriously affected. A study on the data in the 1970s shows that death of age between 3 to 19 has been over-registered up to 67% compared with the expected. It is a serious matter that some researchers analyze the registration data without adjusting the errors. It is strongly recommended for the Government Statistical Office to undertake a study on the registration behavior of the people.

  • PDF

A Study on Knowledge Management Vision and Implications of Ministry of Culture, Sports and Tourism (문화체육관광부의 지식관리 비전과 시사점에 대한 연구)

  • Lee, Hyangsoo;Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.29-36
    • /
    • 2019
  • In this study, we analyzed knowledge management cases of the Ministry of Culture, Sports and Tourism and examined knowledge management vision, promotion organization and knowledge management activity system. This study aims to clarify implications for successful knowledge management in government sector. In the case of the Ministry of Culture, Sports and Tourism, which was the subject of the study, it was evaluated as having performed well in the management activities of the government department in the evaluation of "Knowledge Target for 2018" jointly hosted by Maeil Economic Daily and the Ministry of Public Administration and Security. In this study, we conducted an in - depth interview with the knowledge management staff of the Ministry of Culture and Tourism and analyzed the success factors of knowledge management in the government sector. First, the vision of knowledge management and the role of dedicated organization were very important. In addition, knowledge management system was used to effectively acquire, share, and accumulate knowledge and utilize it. In addition, appropriate compensation systems for knowledge management activities are also important success factors. Therefore, in order to encourage knowledge management activities, it is necessary for public institutions to establish an incentive system such as an economic compensation system for personnel sharing activities and HR personnel.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.