• Title/Summary/Keyword: fragility information

Search Result 76, Processing Time 0.03 seconds

A Study on Project Management System (프로젝트 관리 시스템에 관한 연구)

  • Park, Koo-Rack
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.305-311
    • /
    • 2015
  • Nowadays, because IT market expansion and complexity has been progressing and competition has intensified, there is a growth of information system building industries having difficulty through traditional business management methods. A survey was conducted among site personnel (Project Manager PM and Project Participants) to generate an institutional framework to efficiently manage this and project management process support. Through this, the importance of element technology and fragility of software development project management must be understood and an improvement of the element technology must be generated. By using this, a very relevant result that presented a logical basis was obtained in the decision making of the importance of project management and the role of overall project manager and core project management fields.

A New Image Authentication Method through Isolation of Invalid Blocks (무효 블록의 격리를 이용한 새로운 이미지 인증 방법)

  • Kim, Hyo-Chul;Kim, Hyun-Chul;Yoo, Ki-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.1
    • /
    • pp.17-24
    • /
    • 2002
  • In this paper, we propose a new watermarking method using isolation of invalid blocks for image authentication. We embed messages into the high frequency band in the DCT domain because of its imperceptibility and fragility. And we were able to inspect the identity of valid blocks between error corrected original images and watermarked images through experiments. As a result, we found that the watermarked image is enough to extract binary messages. Therefore, the extra information such as the original image or watermark was not necessary in our extracting process. Experiment results show that the proposed method can be used successfully for image authentication.

Long-term Preservation of Digital Heritage: Building a National Strategy (디지털유산의 장기적 보존: 국가정책 수립을 위한 제안)

  • Lee, Soo Yeon
    • The Korean Journal of Archival Studies
    • /
    • no.10
    • /
    • pp.27-62
    • /
    • 2004
  • As the penetration of information technology into everyday life is accelerated day by day, virtually all kinds of human representation of knowledge and arts are produced and distributed in the digital form. It is problematic, however, because digital objects are so volatile that it is not easy to keep them in fixed form. The fatal fragility makes it extremely tricky to preserve the digital heritage of our time for the next generation. The present paper aims to introduce current endeavors made at the international and the national levels and to provide with suggestions for Korean national strategy of digital preservation. It starts with reviewing the global trends of digital archiving and long-term preservation, focusing on standardization, preservation strategies and current experiments and projects being conducted for preserving various digital objects. It then sketches national strategies of several leading countries. Based on the sketch, twofold suggestions for Korean national strategy are proposed: establishing a central coordinating agency and accommodating the digital preservation issue in the legislative and regulatory framework for the information society. The paper concludes with the necessity of cooperation among heritage organizations, including libraries, archives, museums. They should cooperate with each other because they have traditionally been trusted with the custodianship of collective memory of humankind and the digital heritage cannot be passed onto the next generation without their endeavor. They should also work together because any single institution, or any single nation could cover what it takes to complete the task of long-term preservation of our digital heritage.

Multi-Watermarking for Image Authentication Based on DWT Coefficients (이미지 인증을 위한 DWT 계수기반 다중 워터마킹)

  • Lee Hye-Ran;Rhee Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.113-122
    • /
    • 2005
  • In this paper, we propose a multi-watermarking algorithm to satisfy two purposes: fragility against malicious attacks and robustness against non-malicious attacks. The algorithm can be used for image authentication using coefficients of Discrete Wavelet Transform(DWT). In the proposed method, watermarks are generated by combining binary image with some features extracted from the subband LL3, and then they are embedded into both the spatial and frequency domain. That is, on the spatial domain they are embedded into the Least Significant Bit(LSB) of all pixels of image blocks, and on the frequency domain the coefficients of the subband LH2 and HL2 are adjusted according to the watermarks. Thus the algorithm not only resists malicious attack but also permits non-malicious attacks such as blurring, sharpening, and JPEG compression.

Patent Analysis of Information Security Technology for Network-Centric Warfare (네트워크 중심전을 위한 정보보호기술의 특허동향 분석)

  • Kim, Do-Hoe;Park, Sang-Sung;Shin, Young-Geun;Jang, Dong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.355-364
    • /
    • 2007
  • The paradigm of war is basically changed by development of information and communication technologies. One of the paradigms in future war is NCW(Network-Centric Warfare) that is purposed of achievement in information-superiority. In this future war, the level of menace and fragility is rapidly increased in information-security according to the massive information and complex system. Therefore the Korean army is developing the information-security technologies for NCW. But, until now patent analysis concerning NCW has not performed. In this paper, we suggest a meaningful data for efficient R&D through patent analysis of information-security technologies on NCW.

Association Between Physical Activity and Quantitative Ultrasound in a Rural Population (신체활동과 골초음파지표와의 연관성)

  • Kim, Seung-Joon;Shin, Min-Ho;Kweon, Sun-Seog
    • Physical Therapy Korea
    • /
    • v.12 no.2
    • /
    • pp.20-27
    • /
    • 2005
  • Osteoporosis is characterized by low bone mass and the microarchitectural deterioration of bone tissue with a consequent increase in bone fragility and susceptibility to fracture. It has been suggested that speed of sound (SOS) and broadband ultrasound attenuation (BUA) of quantitative ultrasound sonography (QUS) may provide information about not only bone density but also the microarchitecture and elastic properties of bone. Physical inactivity reduced mechanical usage and it made process to the bone changes. This study aimed to association between the physical activity and the QUS parameters in 1305 (593 men, 712 women) aged 20 years over in a rural population. Two QUS parameters, BUA (p=.23) and SOS(p=.73) were measured at the right calcaneus of postmenopausal women, no significant associations were observed between sports index and SOS and BUA. These results suggest that work, non-sports leisure physical activity (p<.01) have a significant influence on QUS parameters in a rural population. Physical activity are meaningful predictor of QUS parameters of the calcaneus in a rural population.

  • PDF

Decentralized Stabilization for Uncertain Discrete-Time Large-Scale Systems with Delays in Interconnections and Controller Gain Perturbations (제어기의 이득 섭동을 갖는 이산 시간지연 대규모 시스템을 위한 강인 비약성 제어기)

  • Park, Ju-Hyun
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.39 no.5
    • /
    • pp.8-17
    • /
    • 2002
  • This paper considers the problems of robust decentralized control for uncertain discrete-time large-scale systems with delays in interconnections and state feedback gain perturbations. Based on the Lyapunov method, the state feedback control design for robust stability is given in terms of solutions to a linear matrix inequality (LMI), and the measure of non-fragility in controller is presented. The solutions of the LMI can be easily obtained using efficient convex optimization techniques. A numerical example is included to illustrate the design procedures.

A Study on the Validity of Image Block in a Public Watermarking (퍼블릭 워터마킹에서 영상 블록의 유효성에 대한 연구)

  • Kim, Hyo-Cheol;Kim, Hyeon-Cheol;Yu, Gi-Yeong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.4
    • /
    • pp.344-352
    • /
    • 2001
  • In this paper, we propose a cross-correlation property and a related technique based on the validity of image block in a public watermarking and we embed messages into the high frequency band in the DCT domain because of its imperceptibility and fragility. As a result, we were able to inspect the identity of valid block between error corrected original images and watermarked images through experiments. And we confirmed the viability of this cross-correlation as an application for future public watermarking.

  • PDF

HAZARD ANALYSIS OF TYPHOON-RELATED EXTERNAL EVENTS USING EXTREME VALUE THEORY

  • KIM, YOCHAN;JANG, SEUNG-CHEOL;LIM, TAE-JIN
    • Nuclear Engineering and Technology
    • /
    • v.47 no.1
    • /
    • pp.59-65
    • /
    • 2015
  • Background: After the Fukushima accident, the importance of hazard analysis for extreme external events was raised. Methods: To analyze typhoon-induced hazards, which are one of the significant disasters of East Asian countries, a statistical analysis using the extreme value theory, which is a method for estimating the annual exceedance frequency of a rare event, was conducted for an estimation of the occurrence intervals or hazard levels. For the four meteorological variables, maximum wind speed, instantaneous wind speed, hourly precipitation, and daily precipitation, the parameters of the predictive extreme value theory models were estimated. Results: The 100-year return levels for each variable were predicted using the developed models and compared with previously reported values. It was also found that there exist significant long-term climate changes of wind speed and precipitation. Conclusion: A fragility analysis should be conducted to ensure the safety levels of a nuclear power plant for high levels of wind speed and precipitation, which exceed the results of a previous analysis.

Application of GIS in Typhoon Risk Assessment (태풍 피해 예측을 위한 지리정보시스템의 활용)

  • Lee, Seung-Su;Jang, Eun-Mi
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2007.10a
    • /
    • pp.185-191
    • /
    • 2007
  • 최근 10년간 발생한 자연재해 중 태풍의 피해는 전체의 60%를 넘을 정도로 풍수해의 피해는 막대하며, 지속적 산업화와 개발로 인해 피해 규모 역시 매년1조원 이상을 상회하고 있어, 자연재해에 대한 피해 경감 노력이 매우 요구되고 있다. 이를 위하여 최근 풍수해의 피해 사전에 예측함으로써 예방 및 대비는 물론 재해 발생에 따른 응급 대응 및 복구의 효율성을 제고하고자하는 과학적 방법론에 대한 연구가 진행되고 있다. 태풍에 의한 피해 예측은 위험도(Hazard)의 추정, 피해 대상 자료의 구축(Inventory) 및 피해대상의 취약도(Fragility)의 세 가지 요소를 이용하여 수행되는 것이 일반적이다. 위험도는 자연재해의 특성인 강우, 풍속 등을 물리적으로 모델링함으로써 추정할 수 있으며, 피해 대상 자료는 공공 및 사유 시설물을 총 망라함으로써 피해의 사회, 경제적인 피해 규모 예측에 활용된다. 각각의 피해 대상이 위험도에 따라 갖는 취약도는 최종 피해 및 손실 규모의 평가 자료로 이용된다. 이때 위험도의 추정 및 피해 대상 자료의 구축을 위한 핵심적인 방법론으로서 지리정보시스템의 활용이 크게 요구된다. 따라서 본 연구에서는 태풍 피해 예측을 위한 자연재해 위험성 평가 방법론에 있어서 매우 중요한 요소인 자연 지형, 지표의 특성 및 활용도, 피해 대상인 인공 시설물 등의 자료항목을 분류하고 태풍 피해 예측 기술의 핵심 요소로서의 지리정보시스템 활용 방안을 제시하고자 한다.

  • PDF