• Title/Summary/Keyword: information security system

Search Result 6,599, Processing Time 0.034 seconds

Due Date Determination on the MSD Problem with a Common Due Date Window (공통의 납기 구간을 가지는 MSD 문제에서의 납기 결정)

  • Han, Tae-Chang;Kim, Chae-Bogk;Lee, Dong-Hoon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.4
    • /
    • pp.1-9
    • /
    • 2008
  • JIT 생산시스템이 세계적으로 많은 회사에 적용됨에 따라 earliness와 tardiness의 페널티를 동시에 최소화하는 문제에 대한 많은 연구가 진행되어 왔다. 이 연구에서는 한정된 완료시간의 편차에 대해서는 페널티를 부과하지 않는, 즉 허용오차가 존재할 때, 공통의 납기로부터 평균제곱편차(MSD : Mean Squared Deviation)를 최소화하는 단일기계 문제를 다룬다. 허용오차가 존재하는 MSD 문제에서 최적의 공통 납기를 결정하는 방법을 개발한다. 스케줄과 허용 오차가 주어질 때, 최적의 납기를 찾는 두 개의 선형시간이 소요되는 알고리즘을 제시한다. 주어진 허용오차 중 하나는 가장 짧은 가공시간을 가지는 작업의 절반보다 작은 경우이며 다른 하나는 허용오차가 임의인 경우이다.

A Fundamental Research for Technology area of SCM in Korean Nuclear Power Plant Construction (원전건설 공급망관리 기술영역 도출을 위한 기초연구)

  • Park, Hang-Soon;Kim, Woo-Jung;Chong, Young-Whan;Won, Seo-Kyung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2013.05a
    • /
    • pp.268-270
    • /
    • 2013
  • The construction project can be defined as a network combined between elements which are engineering, procurement, construction, start-up, and has a plenty of subjects and partners. For the successful project management in construction industry, it is necessary to adopt various management methods, such as lean production, information network system, SCM(Supply Chain Management), which can increase the efficiency of project management. During recent years, even though various management techniques have been applied, the SCM system has not formulated in construction industry. Especially, the Nuclear Power Plant Construction which requires high regulations of the safety and security has not applied SCM. Therefore, this study aimed to propose technology area of SCM in Korean Nuclear Power Plant Construction.

  • PDF

Development of a Gateway System for Social Network Services

  • Kwon, Dongwoo;Jung, Insik;Lee, Shinho;Kim, Hyeonwoo;Ju, Hongtaek
    • Journal of Communications and Networks
    • /
    • v.17 no.2
    • /
    • pp.118-125
    • /
    • 2015
  • In this paper, we propose a method to reduce mobile social network services (SNSs) traffic using a mobile integrated SNS gateway (MISG) to improve network communication performance between the mobile client and SNS servers. The gateway connects the client and SNS servers using the contents adapter and the web service adapter and helps to improve communication performance using its cache engine. An integrated SNS application, the user's client, communicates with the gateway server using integrated SNS protocol. In addition, the gateway can alert the client to new SNS contents because of the broker server implemented by the message queuing telemetry transport protocol. We design and develop the modules of the gateway server and the integrated SNS application. We then measure the performance of MISG in terms of content response time and describe the result of the experiment.

Enhancing Method to make Cluster for Filtering-based Sensor Networks (여과기법 보안효율을 높이기 위한 센서네트워크 클러스터링 방법)

  • Kim, Byung-Hee;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.141-145
    • /
    • 2008
  • Wireless sensor network (WSN) is expected to be used in many applications. However, sensor nodes still have some secure problems to use them in the real applications. They are typically deployed on open, wide, and unattended environments. An adversary using these features can easily compromise the deployed sensor nodes and use compromised sensor nodes to inject fabricated data to the sensor network (false data injection attack). The injected fabricated data drains much energy of them and causes a false alarm. To detect and drop the injected fabricated data, a filtering-based security method and adaptive methods are proposed. The number of different partitions is important to make event report since they can make a correctness event report if the representative node does not receive message authentication codes made by the different partition keys. The proposed methods cannot guarantee the detection power since they do not consider the filtering scheme. We proposed clustering method for filtering-based secure methods. Our proposed method uses fuzzy system to enhance the detection power of a cluster.

  • PDF

Joint-transform Correlator Multiple-image Encryption System Based on Quick-response Code Key

  • Chen, Qi;Shen, Xueju;Cheng, Yue;Huang, Fuyu;Lin, Chao;Liu, HeXiong
    • Current Optics and Photonics
    • /
    • v.3 no.4
    • /
    • pp.320-328
    • /
    • 2019
  • A method for joint-transform correlator (JTC) multiple-image encryption based on a quick-response (QR) code key is proposed. The QR codes converted from different texts are used as key masks to encrypt and decrypt multiple images. Not only can Chinese text and English text be used as key text, but also symbols can be used. With this method, users have no need to transmit the whole key mask; they only need to transmit the text that is used to generate the key. The correlation coefficient is introduced to evaluate the decryption performance of our proposed cryptosystem, and we explore the sensitivity of the key mask and the capability for multiple-image encryption. Robustness analysis is also conducted in this paper. Computer simulations and experimental results verify the correctness of this method.

Investigation of the SPRT-Based Android Evasive Malware

  • Ho, Jun-Won
    • International journal of advanced smart convergence
    • /
    • v.11 no.3
    • /
    • pp.23-27
    • /
    • 2022
  • In this paper, we explore a new type of Android evasive malware based on the Sequential Probability Ratio Test (SPRT) that does not perform malicious task when it discerns that dynamic analyzer is input generator. More specifically, a new type of Android evasive malware leverages the intuition that dynamic analyzer provides as many inputs within a certain amount of time as possible to Android apps to be tested, while human users generally provide necessary inputs to Android apps to be used. Under this intuition, it harnesses the SPRT to discern whether dynamic analyzer runs in Android system or not in such a way that the number of inputs per time slot exceeding a preset threshold is regarded as evidence that inputs are provided by dynamic analyzer, expediting the SPRT to decide that dynamic analyzer operates in Android system and evasive malware does not carry out malicious task.

Comparison of the Difference in Response Time According to the Server Configuration Type of the Indoor Air Quality Improvement System (실내공기질 개선 시스템의 서버 구성 방식에 따른 응답 시간의 차이 비교)

  • Joongjin Kook
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.1
    • /
    • pp.59-63
    • /
    • 2023
  • Various devices have been emerging as a means of measuring indoor air quality, and among them, there are devices that support real-time remote monitoring through IoT technology and a cloud environment. To improve indoor air quality, based on the results determined by measuring devices, air purifiers or ventilation systems may need to be operated, and temperature and humidity control may be required. In this paper, we propose a design of indoor air quality measuring devices required for indoor air quality evaluation, and of the system needed to control relevant devices to improve indoor air quality through the interaction with the measuring devices. Currently, the servers for the interaction of indoor air quality devices and IoT devices are divided into conventional server type and serverless type, comparing the differences in response time of IoT devices to changes of indoor air quality.

  • PDF

Hierarchical Threads Generation-based Bypassing Attack on DLL Injection Monitoring System (계층화된 쓰레드 생성을 이용한 DLL 삽입 탐지기술 우회 공격 기법)

  • DaeYoub Kim
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.239-245
    • /
    • 2023
  • Whitelist-based ransomware solution is known as being vulnerable to false impersonation attack using DLL injection attack. To solve this problem, it is proposed to monitor DLL injection attack and to integrate the monitoring result to ransomware solutions. In this paper, we show that attackers can easily bypass the monitoring mechanism and then illegally access files of a target system. It means that whitelist-based ransomware solutions are still vulnerable.

Development of the Performance Measurement Model of Electronic Medical Record System - Focused on Balanced Score Card - (균형성과표를 활용한 전자의무기록시스템의 성과측정 모형개발)

  • Lee, Kyung Hee;Kim, Young Hoon;Boo, Yoo Kyung
    • Korea Journal of Hospital Management
    • /
    • v.21 no.4
    • /
    • pp.1-12
    • /
    • 2016
  • The purpose of this study are suggest to performance measurement model of Electronic Medical Record(EMR) and Key Performance Index(KPI). For data collection, 665 questionnaires were distributed to medical record administrators and insurance reviewers at 31 hospitals, and 580 questionnaires were collected(collection rate: 87.2%). Regarding methodology, Critical Success Factor(CSF) and index of the information system were derived based on previous studies, and these were set as performance measurement factors of EMR system. The performance measurement factors were constructed by perspective using BSC, and analysis on causal relationship between factors was conducted. A model of causal relationship was established, and performance measurement model of EMR system was proposed through model validation. Analysis on causal relationship between performance management factors revealed that utility cognition of the learning & growth perspective factor had causal relationship with job efficiency(${\beta}=0.20$) and decision support(${\beta}=0.66$) of the internal process perspective factors, and security had causal relationship with system satisfaction(${\beta}=0.31$) of the customer perspective factor. System quality had causal relationship with job efficiency(${\beta}=0.66$) and decision support(${\beta}=0.76$) of the internal process perspective factors, all of which were statistically significant(P<0.01). Job efficiency of the internal process perspective had causal relationship with system satisfaction(${\beta}=0.43$), and decision support had causal relationship with decision support satisfaction(${\beta}=0.91$) and job satisfaction (${\beta}=0.74$), all of which were statistically significant(P<0.01). System satisfaction of the customer perspective had causal relationship with job satisfaction(${\beta}=0.12$), job satisfaction had causal relationship with cost reduction(${\beta}=0.53$) of the financial perspective, and decision support satisfaction had causal relationship with productivity improvement(${\beta}=0.40$)of the financial perspective(P<0.01). Also, cost reduction of the financial perspective had causal relationship with productivity improvement(${\beta}=0.37$), all which were statistically significant(P<0.05). Suitability index verification of the performance measurement model whose causal relationship was found to be statistically significant revealed that $X^2/df=2.875$, RMR=0.036, GFI=0.831, AGFI=0.810, CFI=0.887, NFI=0.838, IFI=0.888, RMSEA=0.057, PNFI=0.781, and PCFI=0.827, all of which were in suitable levels. In conclusion, the performance measurement indices of EMR system include utility cognition, security, and system quality of the learning & growth perspective, decision support and job efficiency of the internal process perspective, system satisfaction, decision support satisfaction, and job satisfaction of the customer perspective, and productivity improvement and cost reduction of the financial perspective. In this study, it is expected that the performance measurement indices and model of EMR system which are suggested by the author, will be a measurement tool available for system performance measurement of EMR system in medical institutions.

A Study on the Possibility for Incident Investigation Using PLC Logs (PLC 로그의 사고조사 활용 가능성에 관한 연구)

  • Chang, Yeop;Kim, Taeyeon;Kim, Woo-Nyon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.745-756
    • /
    • 2020
  • An ICS(industrial control system) is a complex system that safely and efficiently monitors and controls industrial processes such as electric power, water treatment, transportation, automation plants and chemical plants. Because successful cyber attacks targeting ICS can lead to casualties or serious economic losses, it becomes a prime target of hacker groups sponsored by national state. Cyber campaigns such as Stuxnet, Industroyer and TRITON are real examples of successful ICS attacks, and were developed based on the deep knowledge of the target ICS. Therefore, for incident investigation of ICSs, inspectors also need knowledge of control processes and accident investigation techniques specialized for ICSs. Because there is no applicable technology, it is especially necessary to develop techniques and tools for embedded controllers located at cyber and physical boundaries. As the first step in this research, we reviewed logging capability of 4 PLC(Programmable Logic Controller)s widely used in an ICS area, and checked whether selected PLCs generate logs that can be used for digital investigation in the proposed cyber attack scenario.