• Title/Summary/Keyword: information analysis framework

Search Result 1,805, Processing Time 0.033 seconds

A Study on the Framework of Integrated Vulnerability Analysis of Domestic Nuclear Facilities (국내 원자력 시설 통합 취약점 분석 프레임워크 연구)

  • Mi-Joo Shin;Seong-su Yoon;Ieck-chae Euom
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.11-17
    • /
    • 2022
  • Cyber attacks on national infrastructure, including large-scale power outages in Ukraine, have continued in recent years. As a result, ICS-CERT vulnerabilities have doubled compared to last year, and vulnerabilities to industrial control systems are increasing day by day. Most control system operators develop vulnerability countermeasures based on the vulnerability information sources provided by ICS-CERT in the United States. However, it is not applicable to the security of domestic control systems because it does not provide weaknesses in Korean manufacturers' products. Therefore, this study presents a vulnerability analysis framework that integrates CVE, CWE, CAPE, and CPE information related to the vulnerability based on ICS-CERT information (1843 cases). It also identifies assets of nuclear facilities by using CPE information and analyzes vulnerabilities using CVE and ICS-CERT. In the past, only 8% of ICS-CERT's vulnerability information was searched for information on any domestic nuclear facility during vulnerability analysis, but more than 70% of the vulnerability information could be searched using the proposed methodology.

Application of National Framework Data for Matriculation Support (대학입학지원을 위한 기본지리정보의 활용)

  • Lee, Hyun-Jik;Park, Chang-Taek;Kwon, Young-Kook;Koo, Dae-Soung;Lee, Kyu-Man
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2007.04a
    • /
    • pp.269-272
    • /
    • 2007
  • As a number of new college students is gradually decreasing, each college is trying to find various solutions for gathering many students and operating a school. In specialty, information such as entrance examination and matriculation status data is very important for a college to decide a direction of admission and public relations policy, and increase welfare of the school. Therefore, it is seriously needed for a school to introduce a matriculation management system that can do the effective analysis through various entrance examination and matriculation status data and decision factors of school. In this study, I developed a matriculation management system which can analyze information of applicants, successful candidates and registrants based on national framework data. It is expected that the developed system can provide appropriate and rational information for public relations policy and operation to a college.

  • PDF

A suggestion of the research direction for older adults' ICT use behaviors: SILC (노인 정보통신기술 사용 행태에 대한 연구방향 제시: SILC)

  • Lee, Woong-Kyu
    • The Journal of Information Systems
    • /
    • v.22 no.3
    • /
    • pp.59-75
    • /
    • 2013
  • Although information communication technology (ICT) has been one of the most important infrastructures for our societies, it is still considered as a kind of black box having a barrier to be accepted and being not easily understood. Nevertheless, there are no proper research models or theories for explaining older adults' ICT uses. The objective of this study is to suggest a direction for studying older adults' ICT using behaviors. For this purpose, based on the review and analysis of current studies, main research issues are discussed and a new research framework for the research of older adults' ICT use, Silver ICT users Life Cycle(SILC), is suggested.

Efficient Authentication Framework in Ubiquitous Robotic Companion

  • Chae, Cheol-Joo;Cho, Han-Jin;Lee, Jae-Kwang
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.1
    • /
    • pp.13-18
    • /
    • 2009
  • The robotics industry, that is the major industry of the future and one of the new growth power, is actively studied around ETRI, that is the leading under state-run research institute of the advanced technique of U.S. and Japanese and knowledge economy part. And positive and negative and academic circles, the research institute, and the industrial circles communally pursue the intelligent service robot enterprise of a network-based called URC. This network-based intelligent robot does the RUPI2.0 platform and URC environment by the base. Therefore, a stability need to be enhanced in the through this near future when the research for the preexistence vulnerability analysis and security request is needed than the commercialized network-based intelligent robot in order to implement the network-based intelligent robot. Thus, in this paper, we propose the efficient authentication Framework which is suitable for the URC environment.

A GraphML-based Visualization Framework for Workflow-Performers' Closeness Centrality Measurements

  • Kim, Min-Joon;Ahn, Hyun;Park, Minjae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3216-3230
    • /
    • 2015
  • A hot-issued research topic in the workflow intelligence arena is the emerging topic of "workflow-supported organizational social networks." These specialized social networks have been proposed to primarily represent the process-driven work-sharing and work-collaborating relationships among the workflow-performers fulfilling a series of workflow-related operations in a workflow-supported organization. We can discover those organizational social networks, and visualize its analysis results as organizational knowledge. In this paper, we are particularly interested in how to visualize the degrees of closeness centralities among workflow-performers by proposing a graphical representation schema based on the Graph Markup Language, which is named to ccWSSN-GraphML. Additionally, we expatiate on the functional expansion of the closeness centralization formulas so as for the visualization framework to handle a group of workflow procedures (or a workflow package) with organizational workflow-performers.

Feature Extraction System for Land Cover Changes Based on Segmentation

  • Jung, Myung-Hee;Yun, Eui-Jung
    • Korean Journal of Remote Sensing
    • /
    • v.20 no.3
    • /
    • pp.207-214
    • /
    • 2004
  • This study focused on providing a methodology to utilize temporal information obtained from remotely sensed data for monitoring a wide variety of targets on the earth's surface. Generally, a methodology in understanding of global changes is composed of mapping, quantifying, and monitoring changes in the physical characteristics of land cover. The selected processing and analysis technique affects the quality of the obtained information. In this research, feature extraction methodology is proposed based on segmentation. It requires a series of processing of multitempotal images: preprocessing of geometric and radiometric correction, image subtraction/thresholding technique, and segmentation/thresholding. It results in the mapping of the change-detected areas. Here, the appropriate methods are studied for each step and especially, in segmentation process, a method to delineate the exact boundaries of features is investigated in multiresolution framework to reduce computational complexity for multitemporal images of large size.

Hierarchical Graph Based Segmentation and Consensus based Human Tracking Technique

  • Ramachandra, Sunitha Madasi;Jayanna, Haradagere Siddaramaiah;Ramegowda, Ramegowda
    • Journal of Information Processing Systems
    • /
    • v.15 no.1
    • /
    • pp.67-90
    • /
    • 2019
  • Accurate detection, tracking and analysis of human movement using robots and other visual surveillance systems is still a challenge. Efforts are on to make the system robust against constraints such as variation in shape, size, pose and occlusion. Traditional methods of detection used the sliding window approach which involved scanning of various sizes of windows across an image. This paper concentrates on employing a state-of-the-art, hierarchical graph based method for segmentation. It has two stages: part level segmentation for color-consistent segments and object level segmentation for category-consistent regions. The tracking phase is achieved by employing SIFT keypoint descriptor based technique in a combined matching and tracking scheme with validation phase. Localization of human region in each frame is performed by keypoints by casting votes for the center of the human detected region. As it is difficult to avoid incorrect keypoints, a consensus-based framework is used to detect voting behavior. The designed methodology is tested on the video sequences having 3 to 4 persons.

3D Simulation of Thin Film using Contour Analysis of Interference Fringe Image and Interpolation Method (간섭무늬 영상 등고선 해석과 보간법을 이용한 박막의 삼차원 정보 형상화)

  • Kim, Jin-Hyoung;Ko, Yun-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.2
    • /
    • pp.8-17
    • /
    • 2012
  • In this paper we proposes a new framework to obtain 3D shape information of thin film rapidly. The conventional equipments based on reflectometry are not suitable for obtaining 3D overall shape information of thin film rapidly since they require more than 30 minutes to measure the absolute thickness for 170 points. The proposed framework is based on an image analysis method that extracts contour lines from interference fringes images using Canny edge detector. The absolute thickness for contour lines are measured and then a height map from the contour lines is obtained by interpolation using Borgefors distance transformation. The extracted height map is visualized using the DirectX 3D terrain rendering method. The proposed framework can provide 3D overall shape information of thin film in about 5 minutes since relatively small number of real measurement for contour lines is required.

Computational Thinking Framework-based Analysis of Afterschool Scratch Team Project Experiences (컴퓨팅 사고 프레임워크 기반 방과후 스크래치 팀프로젝트 경험의 분석)

  • Choi, Hyungshin;Jeong, Inkee;So, Hyojeong
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.4
    • /
    • pp.549-558
    • /
    • 2014
  • This study aims to provide suggestions for software education in an afterschool program, deriving from the analysis of student experiences of working on Scratch team projects. This study reports on the implementation of the 12 week afterschool software education program in an elementary school, where students worked in pairs to learn Scratch programming from ideation to design and presentation. For an in-depth study of student-generated artifacts, we selected three groups' Scratch projects and conducted artifact-based interviews to unpack student experiences working on Scratch projects as a group. Adopting the computational thinking framework as an overarching analytical lens, we focused on examining student experiences from three dimensions of computational thinking (CT), namely, CT concepts, CT practices, and CT perspectives. The present study provides both theoretical and practical implications. Firstly, we demonstrate the feasibility of applying the CT framework for assessing student-generated artifacts in design-oriented software education. We also believe that this study provides important suggestions to future software education programs adopting CT as an overarching design and assessment framework.

A Framework for Visualizing Social Network Influence (사회연결망 영향력 시각화를 위한 프레임워크)

  • Jang, Sun-Hee;Jang, Seok-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.1
    • /
    • pp.139-146
    • /
    • 2009
  • This paper deals with visualization that can appropriately show the characteristics deduced from relationships between pieces of information. The visualization of influence, which is used as an important index in deducing the characteristics of relationships in social network analysis, was selected as research topic, and first, the elements that show relationships within the network and the index that show influence were classified and organized. Second, the links between relational elements that show influence in social network were examined, and an influence visualization network was created. Third, an influence visualization framework was proposed which explains the interaction between social network analysis and visualization process. The influence visualization network and framework being proposed in this paper can be used not only to understand and analyze the elements that influence social network but also to make it possible to have a rational and efficient approach to network visualization. Hopefully, they will become a new methodological approach to information design.

  • PDF