• Title/Summary/Keyword: T'-system

Search Result 16,764, Processing Time 0.047 seconds

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

A Study on the Representations of an Bell Chamber in Namhansansung (남한산성 종(鐘)과 종각(鐘閣) 복원을 위한 연구)

  • Lee, Jin-Hyang;Kim, Dae-Ho;Lee, Jae-Keun
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.28 no.4
    • /
    • pp.120-126
    • /
    • 2010
  • As the importance of an historical area is getting increased in these days, the reconstruction of an bell chamber in Namhansansung has significant historial, educational and cultural meaning. The purpose of this study, as a study on an bell chamber in Namhansansung, is to assume an original location of the bell chamber and identify the size and shape of the original bell chamber through literature study, site inspection, and analysis on old maps. In addition, this study could provide useful information when new bell chamber is constructed. According to the literature study, site inspections(5 times) and analysis on old maps, the original bell chamber is assumed to locate near current Oroji tea house at the rotary, where was in the area of Hanggung. With regard to the traffic system, it is assume that there was an old road along with the current local road No.342 connecting the South Gate with North Gate and a Y or T shape intersection connecting the site of old bell chamber with the north. In addition, there was a government office street from the old bell chamber to Hanggung. The shape of old bell chamber is assumed to have Paljak or Woojingak roof. Samo roof was not found in all the five maps. Regarding the direction of bell chamber, three maps indicate that it faces the East and two maps show that it faces the South. Therefore, it is assumed that the length and width of the roof have similar size. However, a new bell chamber should face the East, which is the same direction with Hanggung. As there is a record which states that a bell in the Cheonheoungsa, Seonggeosan, Cheonan was used as a Namhansansung's bell when the Cheonheoungsa was closed, this study suggests that new Namansansung's bell should be built, considering histroical value and artistry of Cheonheoungsa's bell. This study is a basic research for the reconstruction of Namhansansung in 2009. However, as reconstruction of historical assets should be based on thorough historical evidences. Therefore, more detail researches by a indicator analysis are left for the topic of future studies.

The Effects of Environment-Friendly Diets on the Growth Performance, Nutrient Digestibility, Fecal Excretion, Nitrogen Excretion and Emission Gases in Manure for Growing Pigs (환경친화적인 사료의 급여가 육성돈의 성장 능력, 영양소 소화율, 분 배설량, 분뇨내 질소배설량 및 악취 가스에 미치는 영향)

  • Yoo, J.S.;Cho, J.H.;Chen, Y.G.;Kim, H.J.;Wang, Q.;Hyun, Y.;Ko, T.G.;Park, C.S.;Kim, I.H.
    • Journal of Animal Science and Technology
    • /
    • v.49 no.4
    • /
    • pp.491-500
    • /
    • 2007
  • Two experiments were used to determine the effects of environment-friendly diets on growth performance, fecal excretion, nitrogen excretion and emission gases in manure for growing pigs. In experiment 1, ninety six crossed pigs(Landrace×Yorkshire×Duroc) were allocated into four treatments. Treatments were AME(adequate ME diet, 3,265 kcal/kg), LME(lower ME diet, 3,100 kcal/kg), LME 0.05(lower ME diet+α- galactosidase & β-mannanase 0.05%) and LME 0.10(lower ME diet+α-galactosidase & β-mannanase 0.10%). Pigs fed AME diet had lower ADFI(Average Daily Feed Intake) than pigs fed other diets(p<0.05). DM(Dry Matter) digestibility in pigs fed AME and LME 0.10 diets had greater than pigs fed LME diet(p<0.05). Energy digestibility is higher in pigs fed AME and LME 0.10 diets than other treatments(p<0.05). In experiment 2, twenty four crossbred pigs(33.71 kg average BW) were used in a 14-d metabolism experiment. The pigs were housed in individual cages equipped with plastic bed flooring. Treatments were CP(Crude protein) 18% without Bacillus sp., CP 18% diet+Bacillus sp. 0.05%, CP 14% without Bacillus sp. and CP 14% diet+Bacillus sp. 0.05%. Nitrogen intake was higher for CP 18% diets than CP 14% diets(p<0.05). DM, N(Nitrogen) and energy digestibility were affected by probiotics(p<0.05). With the high CP in diets, Energy and N digestibility, urine N percent, urine N excretion and total N excretion were increased significantly compared to low CP in diets(p<0.05). Among the treatments, DM and N digestibilities, feces N excretion, N absorption were decreased significantly(p<0.05), however, feces excretion, feces N, urine N percent, urine N excretion and total N excretion were increased significantly(p<0.05) when pigs fed without probiotics diets compare to pigs fed with probiotics diets. DM and N digestibility, feces excretion, feces N excretion, urine N percent, urine N excretion, total N excretion, N absorption and N adsorption ratio were CP×probiotic interactions in p<0.05. Ammonia(p<0.01) and H2S(p<0.05) in manure were lower in CP 14% diets than CP 18% diets. Also, ammonia and H2S in manure were CP×probiotic interactions in p<0.05. In conclusion, low energy and reduction of CP dietary added enzyme and probiotics improved nutrient digestibility and reduced odors emission in manure for growing pigs.

Development of Customer Sentiment Pattern Map for Webtoon Content Recommendation (웹툰 콘텐츠 추천을 위한 소비자 감성 패턴 맵 개발)

  • Lee, Junsik;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.67-88
    • /
    • 2019
  • Webtoon is a Korean-style digital comics platform that distributes comics content produced using the characteristic elements of the Internet in a form that can be consumed online. With the recent rapid growth of the webtoon industry and the exponential increase in the supply of webtoon content, the need for effective webtoon content recommendation measures is growing. Webtoons are digital content products that combine pictorial, literary and digital elements. Therefore, webtoons stimulate consumer sentiment by making readers have fun and engaging and empathizing with the situations in which webtoons are produced. In this context, it can be expected that the sentiment that webtoons evoke to consumers will serve as an important criterion for consumers' choice of webtoons. However, there is a lack of research to improve webtoons' recommendation performance by utilizing consumer sentiment. This study is aimed at developing consumer sentiment pattern maps that can support effective recommendations of webtoon content, focusing on consumer sentiments that have not been fully discussed previously. Metadata and consumer sentiments data were collected for 200 works serviced on the Korean webtoon platform 'Naver Webtoon' to conduct this study. 488 sentiment terms were collected for 127 works, excluding those that did not meet the purpose of the analysis. Next, similar or duplicate terms were combined or abstracted in accordance with the bottom-up approach. As a result, we have built webtoons specialized sentiment-index, which are reduced to a total of 63 emotive adjectives. By performing exploratory factor analysis on the constructed sentiment-index, we have derived three important dimensions for classifying webtoon types. The exploratory factor analysis was performed through the Principal Component Analysis (PCA) using varimax factor rotation. The three dimensions were named 'Immersion', 'Touch' and 'Irritant' respectively. Based on this, K-Means clustering was performed and the entire webtoons were classified into four types. Each type was named 'Snack', 'Drama', 'Irritant', and 'Romance'. For each type of webtoon, we wrote webtoon-sentiment 2-Mode network graphs and looked at the characteristics of the sentiment pattern appearing for each type. In addition, through profiling analysis, we were able to derive meaningful strategic implications for each type of webtoon. First, The 'Snack' cluster is a collection of webtoons that are fast-paced and highly entertaining. Many consumers are interested in these webtoons, but they don't rate them well. Also, consumers mostly use simple expressions of sentiment when talking about these webtoons. Webtoons belonging to 'Snack' are expected to appeal to modern people who want to consume content easily and quickly during short travel time, such as commuting time. Secondly, webtoons belonging to 'Drama' are expected to evoke realistic and everyday sentiments rather than exaggerated and light comic ones. When consumers talk about webtoons belonging to a 'Drama' cluster in online, they are found to express a variety of sentiments. It is appropriate to establish an OSMU(One source multi-use) strategy to extend these webtoons to other content such as movies and TV series. Third, the sentiment pattern map of 'Irritant' shows the sentiments that discourage customer interest by stimulating discomfort. Webtoons that evoke these sentiments are hard to get public attention. Artists should pay attention to these sentiments that cause inconvenience to consumers in creating webtoons. Finally, Webtoons belonging to 'Romance' do not evoke a variety of consumer sentiments, but they are interpreted as touching consumers. They are expected to be consumed as 'healing content' targeted at consumers with high levels of stress or mental fatigue in their lives. The results of this study are meaningful in that it identifies the applicability of consumer sentiment in the areas of recommendation and classification of webtoons, and provides guidelines to help members of webtoons' ecosystem better understand consumers and formulate strategies.

Design and Implementation of Web Based Instruction Based on Constructivism for Self-Directed Learning Ablity (구성주의 이론에 기반한 자기주도적 웹 기반 교육의 설계와 구현)

  • Kim Gi-Nam;Kim Eui-Jeong;Kim Chang-Suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.855-858
    • /
    • 2006
  • First of all, Developing information technology makes it possible to change a paradigm of all kinds of areas, including an education. Students can choose learning goals and objects themselves and acquire not the accumulation of knowledge but the method of their learning. Moreover, Teachers get to be adviser, and students play a key role in teaming. That is, the subject of leaning is students. Constructivism emphasizes the student-oriented environment of education, which corresponds to the characteristics of hypeimedia. In addition, Internet allows us to make a practical plan for constructivism. Web Based Internet provides us with a proper environment to make constructivism practice md causes an education system to change. Sure Web Based Instruction makes them motivated to learn more, they can gain plenty of information regardless of places or time. Besides, they are able to consult more up-to-date information regarding their learning use hypermedia such as an image, audio, video, and test, and effectively communicate with their instructor through a board, an e-mail, a chatting etc. A school and instructors have been making effort to develop a new model of a teaching method to cope with a new environment change. In this thesis, with 'Design and Implementation of Web Based Instruction Based on Constructivism', providing online learner-oriented and indexed video lesson, learners can get chance of self-oriented learning. In addition, learners doesn't have to cover all contents of a lesson but can choose contents they want to have from a indexed list of a lesson, and they ran search contents they want to have with a 'Keyword Search' on a main page, which can make learners improve learner's achievement.

  • PDF

Effect of Microbial Phytase in Low Phosphorus and Calcium Level Diet on the Performance and Nutrient Digestibility in Laying Hens (인과 칼슘의 수준이 낮은 산란계 사료 내 미생물 Phytase의 첨가가 생산성 및 영양소 소화율에 미치는 영향)

  • Min B.J.;Kwon O.S.;Lee W.B.;Son K.S.;Hong J.W.;Yang S.J.;Moon T.H.;Kim I.H.
    • Korean Journal of Poultry Science
    • /
    • v.32 no.1
    • /
    • pp.15-21
    • /
    • 2005
  • This Study was conducted to investigate the effects of microbial phytase in low phosphirus and calcium level diet on the performance and nutrient digestibility in laying hens. One hundred ninety two, 50 wks old, ISA brown commerical layers were used for 12 weeks feeding trial after 7-d adjustment period. Four dietary treatments included CON(control; Co.), P2 ($0.06\%$ Natuphos, BASF) and P3 ($0.06\%$ PHOSMAX, GENOFOCUS). Ca and available P concentrations of P1, P2 and P3 were 90 and $50\%$ of NRC recommecdations to accentuate difference in response to phytase availability. In whole period, egg production was not affected by treatments. At 12 weeks, egg weight was significantly increased in adding phytase treatments (P<0.05). Egg shell thickness was increased in P1, P2 and P3 treatments compared with control (P<0.05) at 9 weeks. Ca concentration of serum tended to decrease in P1 treatment without significant difference (P>0.05). Ca and P concentrations of tibia were higher in layers fed dietary phyrase than those fed control diet without significant difference (P>0.05). Digestibilities of DM, N and ash were improved in P1 treatment compared with P2 and P3 treatments (P<0.05). Ca and P digestibilities were the highest in P2 treatment (P>0.05), but was not significant difference between control and P1 treatments.

The Impact of Service Level Management(SLM) Process Maturity on Information Systems Success in Total Outsourcing: An Analytical Case Study (토털 아웃소싱 환경 하에서 IT서비스 수준관리(Service Level Management) 프로세스 성숙도가 정보시스템 성공에 미치는 영향에 관한 분석적 사례연구)

  • Cho, Geun Su;An, Joon Mo;Min, Hyoung Jin
    • Asia pacific journal of information systems
    • /
    • v.23 no.2
    • /
    • pp.21-39
    • /
    • 2013
  • As the utilization of information technology and the turbulence of technological change increase in organizations, the adoption of IT outsourcing also grows to manage IT resource more effectively and efficiently. In this new way of IT management technique, service level management(SLM) process becomes critical to derive success from the outsourcing in the view of end users in organization. Even though much of the research on service level management or agreement have been done during last decades, the performance of the service level management process have not been evaluated in terms of final objectives of the management efforts or success from the view of end-users. This study explores the relationship between SLM maturity and IT outsourcing success from the users' point of view by a analytical case study in four client organizations under an IT outsourcing vendor, which is a member company of a major Korean conglomerate. For setting up a model for the analysis, previous researches on service level management process maturity and information systems success are reviewed. In particular, information systems success from users' point of view are reviewed based the DeLone and McLean's study, which is argued and accepted as a comprehensively tested model of information systems success currently. The model proposed in this study argues that SLM process maturity influences information systems success, which is evaluated in terms of information quality, systems quality, service quality, and net effect proposed by DeLone and McLean. SLM process maturity can be measured in planning process, implementation process and operation and evaluation process. Instruments for measuring the factors in the proposed constructs of information systems success and SL management process maturity were collected from previous researches and evaluated for securing reliability and validity, utilizing appropriate statistical methods and pilot tests before exploring the case study. Four cases from four different companies under one vendor company were utilized for the analysis. All of the cases had been contracted in SLA(Service Level Agreement) and had implemented ITIL(IT Infrastructure Library), Six Sigma and BSC(Balanced Scored Card) methods since last several years, which means that all the client organizations pursued concerted efforts to acquire quality services from IT outsourcing from the organization and users' point of view. For comparing the differences among the four organizations in IT out-sourcing sucess, T-test and non-parametric analysis have been applied on the data set collected from the organization using survey instruments. The process maturities of planning and implementation phases of SLM are found not to influence on any dimensions of information systems success from users' point of view. It was found that the SLM maturity in the phase of operations and evaluation could influence systems quality only from users' view. This result seems to be quite against the arguments in IT outsourcing practices in the fields, which emphasize usually the importance of planning and implementation processes upfront in IT outsourcing projects. According to after-the-fact observation by an expert in an organization participating in the study, their needs and motivations for outsourcing contracts had been quite familiar already to the vendors as long-term partners under a same conglomerate, so that the maturity in the phases of planning and implementation seems not to be differentiating factors for the success of IT outsourcing. This study will be the foundation for the future research in the area of IT outsourcing management and success, in particular in the service level management. And also, it could guide managers in practice in IT outsourcing management to focus on service level management process in operation and evaluation stage especially for long-term outsourcing contracts under very unique context like Korean IT outsourcing projects. This study has some limitations in generalization because the sample size is small and the context itself is confined in an unique environment. For future exploration, survey based research could be designed and implemented.

  • PDF

Assessing Productivity of Elementary School Lunch Foodservices in Daegu and Gyeongsangbuk-do Area (대구ㆍ경북지역 초등학교 급식소의 급식생산성 분석)

  • 박영숙
    • Korean journal of food and cookery science
    • /
    • v.19 no.3
    • /
    • pp.286-294
    • /
    • 2003
  • The purpose of this study was to analyze the food service management practices and productivity in 49 elementary schools in the Daegu and Gyeongsangbuk-do areas. Survey questionnaires were used to obtain a variety of quantitative and qualitative information, including general food service management and productivity, on elementary school food service systems. Descriptive analysis, $\div$2-test, t-test and one-way ANOVA analysis were used as the statistical methods in this study. Eighteen elementary schools were located in urban areas, 13 in provincial areas and 18 in isolated areas. The average number of meals was 565.1, with a significant difference (p=0.001) between the areas. The average cost per a meal was 1151.0 Won, with a significant difference (p=0.001) between the areas. The productivity Index (meal/hour) was 13.5, with a significant difference (p=0.001) between the areas. There was a significant positive correlation of the productivity Index between the total number of meal, the number of employees, the total food cost, meals per employee and the employee's working period. There was a significant negative correlation between the productivity Index and the number of side dishes, the lost per meal, the labor cost per meal and the employee's job satisfaction degree index (JDI).

Effect of reaction temperature on the particle size and crystal shape of precipitated calcium carbonate (반응온도가 침강성탄산칼슘의 입도 및 형상에 미치는 영향)

  • 송영준;박찬훈;조동성
    • Resources Recycling
    • /
    • v.4 no.1
    • /
    • pp.38-45
    • /
    • 1995
  • The objective of this study was to investigate the effect of temperature on the formation of CaCO, polymorphs(i.e.,calcite, aragonite, vaterite) and on the crystal shape of CaCO,.The reaction systems were rnvestigated at the temperature range of 2.0%-85.3r, at the fixed cmditions ofconcentration and pressure, 2X10-' M, atomospheric pressure, respectively.The reaction systems studied include a Ca(HCO.,),-Air bubble, O Ca(OH)s-CO,, @ Ca(OH),-H,CO, ,Ca(OH1,-Na>CO,, O Ca(OH),-K,CO,, @ Ca(OH),-(NH,),CO,, D CaC1,-Na,CO,, CaC1,-K3C03, 8 CaC1,-(NH,,),CO,, 0 Ca(N0,X-Na,CO,, 03 Ca(N0,X-QCO,. 0 Ca(NO,),-(NH,XCO,. The results obtained are summarizedas follows:Calcite is formed at the temperature range of 2t-80"C and the highest calcite yield was obtained at 30%.Aragonite begins to be formed at the temperature range of 41.0%-53.0%. and the higher temperature is thehigher yield is obtained. pH of the reaction system affect the yield of aragonite, and the yield reaches the highestpercentage at the pH range of 10.0-11.0, and at the conditions of pH 12.3 or over, aragonite is scarcely formed.Vaterlle is fnrmed at the temperature range of 40.0% or less, and transites utterly to calcite within 10-60mmutes in the case of bemg residenced in mother liqmd which C1 is not contained, and within 140hours inthe case of containing CI-.s in the case of containing CI-.

  • PDF

Deep Learning Architectures and Applications (딥러닝의 모형과 응용사례)

  • Ahn, SungMahn
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.2
    • /
    • pp.127-142
    • /
    • 2016
  • Deep learning model is a kind of neural networks that allows multiple hidden layers. There are various deep learning architectures such as convolutional neural networks, deep belief networks and recurrent neural networks. Those have been applied to fields like computer vision, automatic speech recognition, natural language processing, audio recognition and bioinformatics where they have been shown to produce state-of-the-art results on various tasks. Among those architectures, convolutional neural networks and recurrent neural networks are classified as the supervised learning model. And in recent years, those supervised learning models have gained more popularity than unsupervised learning models such as deep belief networks, because supervised learning models have shown fashionable applications in such fields mentioned above. Deep learning models can be trained with backpropagation algorithm. Backpropagation is an abbreviation for "backward propagation of errors" and a common method of training artificial neural networks used in conjunction with an optimization method such as gradient descent. The method calculates the gradient of an error function with respect to all the weights in the network. The gradient is fed to the optimization method which in turn uses it to update the weights, in an attempt to minimize the error function. Convolutional neural networks use a special architecture which is particularly well-adapted to classify images. Using this architecture makes convolutional networks fast to train. This, in turn, helps us train deep, muti-layer networks, which are very good at classifying images. These days, deep convolutional networks are used in most neural networks for image recognition. Convolutional neural networks use three basic ideas: local receptive fields, shared weights, and pooling. By local receptive fields, we mean that each neuron in the first(or any) hidden layer will be connected to a small region of the input(or previous layer's) neurons. Shared weights mean that we're going to use the same weights and bias for each of the local receptive field. This means that all the neurons in the hidden layer detect exactly the same feature, just at different locations in the input image. In addition to the convolutional layers just described, convolutional neural networks also contain pooling layers. Pooling layers are usually used immediately after convolutional layers. What the pooling layers do is to simplify the information in the output from the convolutional layer. Recent convolutional network architectures have 10 to 20 hidden layers and billions of connections between units. Training deep learning networks has taken weeks several years ago, but thanks to progress in GPU and algorithm enhancement, training time has reduced to several hours. Neural networks with time-varying behavior are known as recurrent neural networks or RNNs. A recurrent neural network is a class of artificial neural network where connections between units form a directed cycle. This creates an internal state of the network which allows it to exhibit dynamic temporal behavior. Unlike feedforward neural networks, RNNs can use their internal memory to process arbitrary sequences of inputs. Early RNN models turned out to be very difficult to train, harder even than deep feedforward networks. The reason is the unstable gradient problem such as vanishing gradient and exploding gradient. The gradient can get smaller and smaller as it is propagated back through layers. This makes learning in early layers extremely slow. The problem actually gets worse in RNNs, since gradients aren't just propagated backward through layers, they're propagated backward through time. If the network runs for a long time, that can make the gradient extremely unstable and hard to learn from. It has been possible to incorporate an idea known as long short-term memory units (LSTMs) into RNNs. LSTMs make it much easier to get good results when training RNNs, and many recent papers make use of LSTMs or related ideas.