• Title/Summary/Keyword: evaluation systems

Search Result 8,325, Processing Time 0.048 seconds

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

A Study on the Effect of Using Sentiment Lexicon in Opinion Classification (오피니언 분류의 감성사전 활용효과에 대한 연구)

  • Kim, Seungwoo;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.133-148
    • /
    • 2014
  • Recently, with the advent of various information channels, the number of has continued to grow. The main cause of this phenomenon can be found in the significant increase of unstructured data, as the use of smart devices enables users to create data in the form of text, audio, images, and video. In various types of unstructured data, the user's opinion and a variety of information is clearly expressed in text data such as news, reports, papers, and various articles. Thus, active attempts have been made to create new value by analyzing these texts. The representative techniques used in text analysis are text mining and opinion mining. These share certain important characteristics; for example, they not only use text documents as input data, but also use many natural language processing techniques such as filtering and parsing. Therefore, opinion mining is usually recognized as a sub-concept of text mining, or, in many cases, the two terms are used interchangeably in the literature. Suppose that the purpose of a certain classification analysis is to predict a positive or negative opinion contained in some documents. If we focus on the classification process, the analysis can be regarded as a traditional text mining case. However, if we observe that the target of the analysis is a positive or negative opinion, the analysis can be regarded as a typical example of opinion mining. In other words, two methods (i.e., text mining and opinion mining) are available for opinion classification. Thus, in order to distinguish between the two, a precise definition of each method is needed. In this paper, we found that it is very difficult to distinguish between the two methods clearly with respect to the purpose of analysis and the type of results. We conclude that the most definitive criterion to distinguish text mining from opinion mining is whether an analysis utilizes any kind of sentiment lexicon. We first established two prediction models, one based on opinion mining and the other on text mining. Next, we compared the main processes used by the two prediction models. Finally, we compared their prediction accuracy. We then analyzed 2,000 movie reviews. The results revealed that the prediction model based on opinion mining showed higher average prediction accuracy compared to the text mining model. Moreover, in the lift chart generated by the opinion mining based model, the prediction accuracy for the documents with strong certainty was higher than that for the documents with weak certainty. Most of all, opinion mining has a meaningful advantage in that it can reduce learning time dramatically, because a sentiment lexicon generated once can be reused in a similar application domain. Additionally, the classification results can be clearly explained by using a sentiment lexicon. This study has two limitations. First, the results of the experiments cannot be generalized, mainly because the experiment is limited to a small number of movie reviews. Additionally, various parameters in the parsing and filtering steps of the text mining may have affected the accuracy of the prediction models. However, this research contributes a performance and comparison of text mining analysis and opinion mining analysis for opinion classification. In future research, a more precise evaluation of the two methods should be made through intensive experiments.

Evaluation of Agronomic Characteristics and Fatty Acid Composition of Flax Germplasms (아마 유전자원의 농업적 특성 및 지방산 조성 평가)

  • Lee, Yong-Hwa;Bae, Sang-Mok;Park, Won;Kim, Kwang-Soo;Jang, Young-Seok;Lee, Kyeong-Bo
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.61 no.2
    • /
    • pp.124-130
    • /
    • 2016
  • In this study, agronomic characteristics and fatty acid composition of 121 flax (Linum usitatissimum L.) germplasms were analyzed. The flax germplasms had a fairly short growth period of 75-95 days. The plant height at maturity varied from 52 to 124 cm. The flower color varied from white to lilac and even purple. Early flowering flax germplasms had white flowers and were resistant to lodging. In early flowering flax germplasms, all agronomic characteristics, including growth period, plant height, branch number per plant, stem diameter, number of capsules per raceme, seed number per capsule, 1000-seed weight, and seed yield, were decreased. The average fatty acid composition of 121 flax germplasms comprised palmitic acid (5.3%), stearic acid (4.3%), oleic acid (29.7%), linoleic acid (13.1%) and linolenic acid (46.4%). The total content of unsaturated fatty acids ranged from 84~94% with an average of 88%. Among the fatty acids, linolenic acid (omega-3) content was the highest with a range of 36~54%. In five selected flax germplasms (Hollandia 1803, Red son, C & F Res Br 1767, Wiera, and Ireland 1657) with high linolenic acid (${\geq}51%$), total lipid and protein contents were 30~36% and 5.4~6.9%, respectively. Overall, flax can practically be adoptable into cropping systems in South Korea and utilized as a scenery crop, since flax has a short cultivation period with diverse flower colors.

Bankruptcy Type Prediction Using A Hybrid Artificial Neural Networks Model (하이브리드 인공신경망 모형을 이용한 부도 유형 예측)

  • Jo, Nam-ok;Kim, Hyun-jung;Shin, Kyung-shik
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.3
    • /
    • pp.79-99
    • /
    • 2015
  • The prediction of bankruptcy has been extensively studied in the accounting and finance field. It can have an important impact on lending decisions and the profitability of financial institutions in terms of risk management. Many researchers have focused on constructing a more robust bankruptcy prediction model. Early studies primarily used statistical techniques such as multiple discriminant analysis (MDA) and logit analysis for bankruptcy prediction. However, many studies have demonstrated that artificial intelligence (AI) approaches, such as artificial neural networks (ANN), decision trees, case-based reasoning (CBR), and support vector machine (SVM), have been outperforming statistical techniques since 1990s for business classification problems because statistical methods have some rigid assumptions in their application. In previous studies on corporate bankruptcy, many researchers have focused on developing a bankruptcy prediction model using financial ratios. However, there are few studies that suggest the specific types of bankruptcy. Previous bankruptcy prediction models have generally been interested in predicting whether or not firms will become bankrupt. Most of the studies on bankruptcy types have focused on reviewing the previous literature or performing a case study. Thus, this study develops a model using data mining techniques for predicting the specific types of bankruptcy as well as the occurrence of bankruptcy in Korean small- and medium-sized construction firms in terms of profitability, stability, and activity index. Thus, firms will be able to prevent it from occurring in advance. We propose a hybrid approach using two artificial neural networks (ANNs) for the prediction of bankruptcy types. The first is a back-propagation neural network (BPN) model using supervised learning for bankruptcy prediction and the second is a self-organizing map (SOM) model using unsupervised learning to classify bankruptcy data into several types. Based on the constructed model, we predict the bankruptcy of companies by applying the BPN model to a validation set that was not utilized in the development of the model. This allows for identifying the specific types of bankruptcy by using bankruptcy data predicted by the BPN model. We calculated the average of selected input variables through statistical test for each cluster to interpret characteristics of the derived clusters in the SOM model. Each cluster represents bankruptcy type classified through data of bankruptcy firms, and input variables indicate financial ratios in interpreting the meaning of each cluster. The experimental result shows that each of five bankruptcy types has different characteristics according to financial ratios. Type 1 (severe bankruptcy) has inferior financial statements except for EBITDA (earnings before interest, taxes, depreciation, and amortization) to sales based on the clustering results. Type 2 (lack of stability) has a low quick ratio, low stockholder's equity to total assets, and high total borrowings to total assets. Type 3 (lack of activity) has a slightly low total asset turnover and fixed asset turnover. Type 4 (lack of profitability) has low retained earnings to total assets and EBITDA to sales which represent the indices of profitability. Type 5 (recoverable bankruptcy) includes firms that have a relatively good financial condition as compared to other bankruptcy types even though they are bankrupt. Based on the findings, researchers and practitioners engaged in the credit evaluation field can obtain more useful information about the types of corporate bankruptcy. In this paper, we utilized the financial ratios of firms to classify bankruptcy types. It is important to select the input variables that correctly predict bankruptcy and meaningfully classify the type of bankruptcy. In a further study, we will include non-financial factors such as size, industry, and age of the firms. Thus, we can obtain realistic clustering results for bankruptcy types by combining qualitative factors and reflecting the domain knowledge of experts.

Conflicts between the Conservation and Removal of the Modern Historic Landscapes - A Case of the Demolition Controversy of the Japanese General Government Building in Seoul - (근대 역사 경관의 보존과 철거 - 구 조선총독부 철거 논쟁을 사례로 -)

  • Son, Eun-Shin;Pae, Jeong-Hann
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.46 no.4
    • /
    • pp.21-35
    • /
    • 2018
  • In recent years, there has been a tendency to reuse 'landscapes of memory,' including industrial heritages, modern cultural heritages, and post-industrial parks, as public spaces in many cities. Among the various types of landscapes, 'modern historic landscapes', which were formed in the 19th and 20th centuries, are landscapes where the debate between conservation and removal is most frequent, according to the change of evaluation and recognition of modern history. This study examines conflicts between conservation and removal around modern historic landscapes and explores the value judgment criteria and the process of formation of those landscapes, as highlighted in the case of the demolition controversy of the old Japanese general government building in Seoul, which was dismantled in 1995. First, this study reviews newspaper articles, television news and debate programs from 1980-1999 and some articles related to the controversy of the Japanese general government building. Then it draws the following six factors as the main issues of the demolition controversy of the building: symbolic location, discoveries and responses of new historical facts, reaction and intervention of a related country, financial conditions, function and usage of the landscape, changes of urban, historical and architectural policies. Based on these issues, this study examines the conflicts between symbolic values that play an important role in the formation of modern historic landscapes and determines conservation or removal, and the utility of functional values that solve the problems and respond to criticisms that arise in the process of forming the modern historic landscape. Especially, it is noted that the most important factor that makes the decision is the symbolic values, although the determination of the conservation or removal of modern historic landscapes has changed according to changes in historical perceptions of modern history. Today, the modern historic landscape is an important site for urban design, and still has historical issues to be agreed upon and addressed. Thi study has contemporary significance from the point that it divides the many values of modern historic landscapes into symbolic values and functional values, evaluates these, and reviews the background social context.

Development of $14"{\times}8.5"$ active matrix flat-panel digital x-ray detector system and Imaging performance (평판 디지털 X-ray 검출기의 개발과 성능 평가에 관한 연구)

  • Park, Ji-Koon;Choi, Jang-Yong;Kang, Sang-Sik;Lee, Dong-Gil;Seok, Dae-Woo;Nam, Sang Hee
    • Journal of radiological science and technology
    • /
    • v.26 no.4
    • /
    • pp.39-46
    • /
    • 2003
  • Digital radiographic systems based on solid-state detectors, commonly referred to as flat-panel detectors, are gaining popularity in clinical practice. Large area, flat panel solid state detectors are being investigated for digital radiography. The purpose of this work was to evaluate the active matrix flat panel digital x-ray detectors in terms of their modulation transfer function (MTF), noise power spectrum (NPS), and detective quantum efficiency (DQE). In this paper, development and evaluation of a selenium-based flat-panel digital x-ray detector are described. The prototype detector has a pixel pitch of $139\;{\mu}m$ and a total active imaging area of $14{\times}8.5\;inch^2$, giving a total 3.9 million pixels. This detector include a x-ray imaging layer of amorphous selenium as a photoconductor which is evaporated in vacuum state on a TFT flat panel, to make signals in proportion to incident x-ray. The film thickness was about $500\;{\mu}m$. To evaluate the imaging performance of the digital radiography(DR) system developed in our group, sensitivity, linearity, the modulation transfer function(MTF), noise power spectrum (NPS) and detective quantum efficiency(DQE) of detector was measured. The measured sensitivity was $4.16{\times}10^6\;ehp/pixel{\cdot}mR$ at the bias field of $10\;V/{\mu}m$ : The beam condition was 41.9\;KeV. Measured MTF at 2.5\;lp/mm was 52%, and the DQE at 1.5\;lp/mm was 75%. And the excellent linearity was showed where the coefficient of determination ($r^2$) is 0.9693.

  • PDF

Entrance Skin Dose According to Age and Body Size for Pediatric Chest Radiography (소아 흉부촬영 시 나이와 체격에 따른 입사피부선량)

  • Shin, Gwi-Soon;Min, Ki-Yeul;Kim, Doo-Han;Lee, Kwang-Jae;Park, Ji-Hwan;Lee, Gui-Won
    • Journal of radiological science and technology
    • /
    • v.33 no.4
    • /
    • pp.327-334
    • /
    • 2010
  • Exposure during childhood results in higher risk for certain detrimental cancers than exposure during adulthood. We measured entrance skin dose (ESD) under 7-year children undergoing chest imaging and compared the relationship between ESD and age, height, weight, chest thickness. Though it is important to measure chest thickness for setting up the exposure condition of chest examination, it is difficult to measure chest thickness of children. We set up exposure parameters according to age because chest thickness of children has correlation with age. In the exposure parameters, for chest A-P examination under 2 year-children, tube voltage (kVp) in hospital A was higher than that in hospital B while tube current (mAs) was higher in hospital B, thus the ESD values were about 1.7 times higher in hospital B. However, for chest P-A examination over 4 year-children, the tube voltage was 7 kVp higher in hospital B, the tube current were same in all two systems, and focus to image receptor distance (FID) in hospital B (180 cm) was longer than that in hospital A (130 cm), thus the ESD values were 1.4 times higher in hospital A. For same ages, the ESD values for chest A-P examinations were higher than those for chest P-A examinations. Comparing ESD according to age, ESD values were $154{\mu}Gy$, $194{\mu}Gy$ and $138{\mu}Gy$ for children under 1 year, 1 to under 4 years and 4 to under 7 years of age, respectively. These values were lower than reference level ($200{\mu}Gy$) recommended in JART (japan association of radiological technologists), however these were higher than reference values recommended by EC (european commission), NRPB (national radiological protection board) and NIFDS (national institute of food & drug safety evaluation). In conclusion, the values of ESD were affected by exposure parameters from radiographer's past experience more than x-ray system. ESD values for older children were not always higher than those for younger children. Therefore we need to establish our own DRLs (diagnostic reference levels) according to age of the children in order to optimize pediatric patient protection.

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

The Implementation and limits of Involuntary Detention of the Tuberculosis Prevention Act (결핵예방법의 격리명령의 실행과 한계에 관하여)

  • Kim, Jang Han
    • The Korean Society of Law and Medicine
    • /
    • v.16 no.2
    • /
    • pp.55-84
    • /
    • 2015
  • The tuberculosis is the infectious disease. Generally, the active tuberculosis patient can infect the 10 persons for one year within the daily activities like casual conversation and singing together. The infectivity of tuberculosis can continue for a life time, and infected persons can remain at risk for developing active tuberculosis. To control this contagious disease, along with the active tuberculosis patients, non-infectious but non-compliant patients who can be infectious if their immune systems become impaired have to be managed. To control the non-complaint patients, medical treatment order should be combined with the public order. Because tuberculosis is the risk of community health, the human rights like liberty and freedom of movement can be restricted for public welfare under the article 37(2) of constitution. Even when such restriction is imposed, no essential aspect of the freedom or right shall be violated. The degree of restriction on the rights of citizens is different what methods are chosen to non-complaint patients. For example, under the directly observed therapy program, the patients and medical staffs make an appointment and meet to confirm the drug intakes according to the schedule, which is the medical treatment combined with the mildest public order. If the patients break the appointments or have the history of disobedient, the involuntary detention can obtain the legitimate cause. The Tuberculosis Prevention Act has the two step programs on this involuntary detention, The admission order (Article 15) is issued when the patients are infectious. The quarantine order (Artle 15-2) is issued when the patients are infectious and non-complaint. The legal criteria for involuntary detention are discussed and published through the international conventions and covenants. For example, World Health Organization had made guidance on human rights and involuntary detention for tuberculosis control. The restrictions should be carried out in accordance with the our law and in the legitimate objective of public interest. And the restriction should be based on scientific evidence and not imposed in an unreasonable or discriminatory manner. We define and adopt these international criteria under our constitution and legal system. Least restrictive alternative principle, proportionality principle and the individual evaluation methods are explained through the reviews of United States court decisions. Habeas Corpus Act is reviewed and adopted as the procedural due process to protect the patient rights as a citizen. Along with that, what conditions and facilities which are needed to performed quarantine order are discussed.

  • PDF

Evaluation of Myocardial Oxygen Consumption with $^{11}C$-Acetate and 3D PET/CT: By Applying Recirculation Correction Method and Modified One-Compartmental Tracer Kinetic Modeling ($^{11}C$-Acetate와 3차원 PET/CT를 이용한 심근의 산소 소모량 평가: 재순환 교정법 및 수정 단일구획 추적자 동적 모델 적용)

  • Chun, In-Kook;Hwang, Kyung-Hoon;Lee, Sang-Yoon;Kim, Jin-Su;Lee, Jae-Sung;Shin, Hee-Won;Lee, Min-Kyung;Yoon, Min-Ki;Choe, Won-Sick
    • Nuclear Medicine and Molecular Imaging
    • /
    • v.42 no.4
    • /
    • pp.275-284
    • /
    • 2008
  • Purpose: We intended to evaluate myocardial oxygen consumption ($MVO_2)$ by applying recirculation correction and modified one-compartment model to have a reference range of $MVO_2$ in normal young population and to reveal the effect of recirculation on time-activity curve (TAC). Materials and Methods: In nine normal male volunteers with mean age of $26.3{\pm}4.0$, $MVO_2$ was estimated with 925 MBq (25mCi) of $^{11}C$-Acetate (Neuroscience Research Institute, Gachon University of Medicine and Science, Incheon, Korea) and PET/CT (Biograph 6, Siemens Medical Solution, Germany). Analysis software such as $MATLAB^{(R)}$ v7.1 (Mathworks, Inc., United States), $Excel^{(R)}$ 2007 (Microsoft, United States), and $SPSS^{(R)}$ v12.0 (Apache Software Foundation, United States) were used. Twenty three frames were of $12{\times}10$, $5{\times}60$, $3{\times}120$, $2{\times}300's$ duration, respectively. The modified one-compartmental model and the recirculation correction method were applied. Statistical analysis was performed by using Test of Normality, ANOVA and Post-Hoc (Scheffe's) analysis, and p-value less than 0.05 was considered as significant. Results: The normal reference ranges of $MVO_2$ were presented as $3.18-4.64\;{\times}\;10^{-4}\;ml/g/sec$, $1.91-3.94\;{\times}\;10^{-4}\;ml/g/sec$, $4.31-6.40\;{\times}\;10^{-4}\;ml/g/sec$, $2.84-4.53\;{\times}\;10^{-4}\;ml/g/sec$ and $3.42-5.00\;{\times}\;10^{-4}\;ml/g/sec$ in the septum, the inferior wall, the lateral wall, the anterior wall and the entire wall, respectively. In addition, it was noted that the dual exponentiality of the clearance curve is due to the recirculation effect and that the characteristic of the curve is essentially mono-exponential. Conclusion: $^{11}C$-Acetate is a radiotracer worthwhile to assess $MVO_2$. Re-circulated $^{11}C$ can influence TAC of $^{11}C$ in myocadia and so the recirculation correction must be considered when measuring $MVO_2$.