• Title/Summary/Keyword: information Protection

Search Result 4,475, Processing Time 0.035 seconds

Development of the Data Communication based Future Air Base Defence Operation Model (데이터통신 기반 차세대 기지방어작전 모델 개발)

  • Pyo, Sang-Ho;Kim, Ki-Hyung;Lee, Tae-Gong
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.157-173
    • /
    • 2014
  • As Air Base Defence, Anti-Aircraft Defence and Nuclear-Biological-Chemical Protection model considered as ground operation models in Republic of Korea Air Force are designed as the voice-centered system between participant nodes, there is a problem communicating accurately. In recent years, the military is developing a command and control capability using data communication technology to solve the problem. Therefore, this paper proposes new model to maximize efficiency of performance improvement through the Data Communication-based Future Air Base Defence Model. We refer to a research paper that is related existing and developed new model. and then we really experimented under WiBro Network that is constructed to Air Base for maintenance control. Based on the analysis and the test result of new Air Base Defence Model, we have concluded that the performance improvement effect is reached.

A Three-Layered Ontology View Security Model for Access Control of RDF Ontology (RDF 온톨로지 접근 제어를 위한 3 계층 온톨로지 뷰 보안 모델)

  • Jeong, Dong-Won;Jing, Yixin;Baik, Dook-Kwon
    • Journal of KIISE:Databases
    • /
    • v.35 no.1
    • /
    • pp.29-43
    • /
    • 2008
  • Although RDF ontologies might be expressed in XML tree model, existing methods for protection of XML documents are not suitable for securing RDF ontologies. The graph style and inference feature of RDF demands a new security model development. Driven by this goal, this paper proposes a new query-oriented model for the RDF ontology access control. The proposed model rewrites a user query using a three-layered ontology view. The proposal resolves the problem that the existing approaches should generate inference models depending on inference rules. Accessible ontology concepts and instances which a user can visit are defined as ontology views, and the inference view defined for controling an inference query enables a controlled inference capability for the user. This paper defines the three-layered view and describes algorithms for query rewriting according to the views. An implemented prototype with its system architecture is shown. Finally, the experiment and comparative evaluation result of the proposal and the previous approach is described.

A Spatial Transformation Scheme Supporting Data Privacy and Query Integrity for Outsourced Databases (아웃소싱 데이터베이스에서 데이터 프라이버시 및 질의 무결성을 지원하는 공간 변환 기법)

  • Kim, Hyeong-Il;Song, Young-Ho;Chang, Jaewoo
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.652-663
    • /
    • 2015
  • Due to the popularity of location-based services, the amount of generated spatial data in daily life has been dramatically increasing. Therefore, spatial database outsourcing has become popular for data owners to reduce the spatial database management cost. The most important consideration in database outsourcing is meeting the privacy requirements and guarantying the integrity of the query result. However, most of existing database transformation techniques do not support both of the data privacy and integrity of the query result. To solve this problem, we propose a spatial data transformation scheme that utilizes the shearing transformation with rotation shifting. In addition, we described the attack models to measure the data privacy of database transformation schemes. Finally, we demonstrated through the experimental evaluations that our scheme provides high level of data protection against different kinds of attack models, compared to the existing schemes, while guaranteeing the integrity of the query result sets.

The Efficient Error Resilient Entropy Coding for Robust Transmission of Compressed Images (압축 영상의 강건한 전송을 위한 효과적인 에러 내성 엔트로피 부호화)

  • Cho, Seong-Hwan;Kim, Eung-Sung;Kim, Jeong-Sig
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.2
    • /
    • pp.206-212
    • /
    • 2006
  • Many image and video compression algorithms work by splitting the input image into blocks and producing variable-length coded bits for each block data. If variable-length coded data are transmitted consecutively, then the resulting coder is highly sensitive to channel errors. Therefore, most image and video techniques for providing some protection to the stream against channel errors usually involve adding a controlled amount of redundancy back into the stream. Such redundancy might take the form of resynchronization markers, which enable the decoder to restart the decoding process from the known state, in the event of transmission errors. The Error Resilient Entropy Code (EREC) is a well known method which can regain synchronization without any redundant information to convert from variable-length code to fixed-length code. This paper proposes an enhancement to EREC, which greatly improves its transmission ability for the compressed image quality without any redundant bits in the event of errors. The simulation result shows that the both objective and subjective quality of transmitted image is enhanced compared with the existing EREC at the same BER(Bit Error Rate).

  • PDF

DRM Enabled P2P Model for Contents Protection (콘텐츠 보호를 위한 DRM이 적용된 P2P 모델)

  • Sung Jae-Youn;Jeong Yeon-Jeong;Yoon Ki-Song
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.389-396
    • /
    • 2006
  • P2P(Peer To Peer) system, a most attractive file sharing system, is the largest channel of contents distribution and it takes 50% of network traffic. But P2P systems are infamous for used to illegal contents distribution channel not only in music industry, but also in movie industry. But, DRM(Digital Right Management) enabled P2P models are not suggested until now that interrupting illegal contents distribution and keeping advantage of P2P. So in this paper, we suggest a DRM enabled P2P model that can support distributed processing ability and high scalability with no modification in exist P2P model or architecture.

Design and Implementation of File protection system based on Windows 2000 system (Windows 2000기반의 파일 보호 시스템 설계 및 구현)

  • Lee, Nam-Hun;Yu, Sin-Geun;Sim, Yeong-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.741-756
    • /
    • 2001
  • With the development of computer systems, there has been a sharp increase in the threats on these systems including attacks by malicious programs such as virus, vandal, etc. Currently virus vaccines are widely used to thwart these threats, but they have many weaknesses. They cannot guard against unknown threats and sometimes, they also cannot detect the existence of malicious programs before these malicious programs make any destructive results. For lack of an efficient security model, the existing security programs have the problem that they raise many false-positive alarms in spite of normal action. So it becomes very important to develop the improved security program that can make up for the weakness of the existing computer security program and can detect many threats of malicious programs as early as possible. In this paper we describe the design of an improved security model and the implementation of a security program that can filter and handle the threats on computer systems at the kernel level in real time.

  • PDF

A Planning for Agricultural.Rural Communities Theme Park in Yesan County (예산군 농업.농촌 테마공원 계획)

  • Lee, Gyeong-Jin;Song, Byeong-Hwa
    • Journal of Korean Society of Rural Planning
    • /
    • v.15 no.1
    • /
    • pp.89-99
    • /
    • 2009
  • I wish to establish Kwang-shi Han-woo agriculture theme park furtherance plan that take advantage of unique area resource of homebred cattle meat sale restaurant of the Chungchong-namdo Yesan County Kwang-Shi Ran-woo village. Improve regional income that develops Kwang-shi Ran-woo area that is made up a rest and experience space that escapes in sightseeing of Ran-woo meat putting first that is food, and contribute in economy activation by promotes City-Farm exchange, and is behind present, and is expected that contributes in farm village area activation that is stagnated Ran-woo specialization area of whole country scale. Kwang-shi Han-woo agriculture-farm village theme park plan is thought that active participation of thorough environmental protection and local resident is necessary condition as plan that take advantage of peculiar latency resource of area. In plan process, reflected various opinion of local resident representatives to space but there is a little insufficient page, and sees that also thorough environment analysis should be preceded. Hereafter, see that correction' repletion need a little through thorough grasping of latency resource that put together thorough natural environment investigation. in Yesan County with analysis at final design step. But, see that plan of theme park that take advantage of characteristic resource in farm village, especially situation of Ran-woo farmhouses that is suffering now difficulty as plan that do appropriateness of city in area activation and economical income guarantee side of farmhouse inhabitants.

GIS based Water-pollutant Buffering Zone Management

  • Kim, Kye-Hyun;Yoon, Chun-Joo
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.506-506
    • /
    • 2002
  • S. Korean Government has accelerating its efforts to enhance the quality of the drinking water. The Ministry of Environment has declared the law of securing water-pollutant buffering zone to minimize the inflow of the point and nonpoint sources into the drinking water sources. As a first phase of installing nationa-wide water-pollutant buffering zone, approximately 300km buffering zone has been delineated along the South and North Han river, the major drinking water sources for the capital area of S. Korea, which has the population of more than 12 millions. The buffering zone has the width of 1,000 meter for the special protection area, and 500 meter for the remaining area from both ends of the river. The major works have been done in three stages. Firstly, the boundaries lines of the buffering zone was delineated on the digital topographic maps. Secondly, the maps were overlayed with the cadastral maps to identify individual land parcels, the street address of the major pollutant discharging facilities, and all different types of pollutants including livestocks. Thirdly, the field work has been done as a verification. Once the buffering zone was generated, all the information for the buffering gone were created or imported from other government agencies including official land price, details of the major manufacturing facilities discharging considerable amount of pollutants, major motels and resorts, not to mention of restaurants, etc. Also, major livestock houses were located to identify the path of the pollutant inflow to the drinking water source. Further works need to be continued such as purchasing private lands within the buffering zone and change the land use in the efforts to decrease the pollutant amount and to provide more environmentally friendly space. Also, high resolution satellite imagery should be utilized in the near future as a cost-effective data source to update all the landuse activities within buffering zone.

  • PDF

Application of Remote Sensing and GIS to Flood Monitoring and Mitigation

  • Petchprayoon, Pakorn;Chalermpong, Patiwet;Anan, Thanwarat;Polngam, Supapis;Simking, Ramphing
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.962-964
    • /
    • 2003
  • In 2002 Thailand was faced with severe flooding in the North, Northeast and Central parts of the country caused by heavy rainfall of the monsoonal depression which brought about significant damages. According to the report by the Ministry of Interior and the Ministry of Agricultural and Co-operatives, the total damages were estimated to be about 6 billion bath. More than 850,000 farmers and 10 million livestock were effected. An area of 1,450,000 ha of farmland in 59 Provinces were put under water for a prolonged period. Satellite imageries were employed for mapping and monitoring the flood-inundated areas, flood damage assessment, flood hazard zoning and post-flood survey of river configuration and protection works. By integrating satellite data with other updated spatial and non-spatial data, likely flood zones can be predicted beforehand. Some examples of satellite data application to flood dis aster mitigation in Thailand during 2002 using mostly Radarsat-1 data and Landsat-7 data were illustrated and discussed in the paper. The results showed that satellite data can clearly identify and give information on the status, flooding period, boundary and damage of flooding. For comprehensive flood mitigation planning, other geo-informatic data, such as the elevation of topography, hydrological data need to be integrated. Ground truth data of the watershed area, including the water level, velocity, drainage pattern and direction were also useful for flood forecasting in the future.

  • PDF

Feasible Management of Southern Corn Leaf Blight via Induction of Systemic Resistance by Bacillus cereus C1L in Combination with Reduced Use of Dithiocarbamate Fungicides

  • Lai, Yi-Ru;Lin, Pei-Yu;Chen, Chao-Ying;Huang, Chien-Jui
    • The Plant Pathology Journal
    • /
    • v.32 no.5
    • /
    • pp.481-488
    • /
    • 2016
  • Dithiocarbamate fungicides such as maneb and mancozeb are widely used nonsystemic protectant fungicides to control various plant fungal diseases. Dithiocarbamate fungicides should be frequently applied to achieve optimal efficacy of disease control and avoid either decline in effectiveness or wash-off from leaf surface. Dithiocarbamates are of low resistance risk but have the potential to cause human neurological diseases. The objective of this study was to develop a strategy to effectively control plant disease with reduced use of dithiocarbamtes. Southern corn leaf blight was the model pathosystem for the investigation. When corn plants were drench-treated with Bacillus cereus C1L, a rhizobacterium able to induce systemic resistance in corn plants against southern leaf blight, frequency of spraying dithiocarbamate fungicides could be decreased. The treatment of B. cereus C1L was able to protect maize from southern leaf blight while residues of dithiocarbamates on leaf surface were too low to provide sufficient protection. On the other hand, frequent sprays of mancozeb slightly but significantly reduced growth of corn plants under natural conditions. In contrast, application of B. cereus C1L can significantly promote growth of corn plants whether sprayed with mancozeb or not. Our results provide the information that plant disease can be well controlled by rhizobacteria-mediated induced systemic resistance in combination with reduced but appropriate application of dithiocarbamate fungicides just before a heavy infection period. An appropriate use of rhizobacteria can enhance plant growth and help plants overcome negative effects caused by dithiocarbamates.