• Title/Summary/Keyword: information security system

Search Result 6,598, Processing Time 0.037 seconds

Monitoring of Landslide in Kangwondo Area using 2-Pass DInSAR Technique (2-Pass DInSAR 기술을 활용한 강원도 지역 산사태 탐측)

  • Yoo, Su Hong;Sohn, Hong Gyoo;Jung, Jae Hoon;Choi, Si Kyong
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.2
    • /
    • pp.85-90
    • /
    • 2009
  • In recent days, climatic change cause abnormal weather all over the world and we have a great loss of life and property every year. In Korea, we suffer from landslide problem because large regions of Korea Peninsula are composed of mountain. In order to detect rapidly and to take follow-up measures of disaster, the remote sensing is being used actively as conventional field survey has many restrictions in accessibility because of more time and man power requirement. In additions interferometric SAR is one of the techniques that have our attention because it can provide many kinds of accurate surface information without restriction of atmospheric and ground conditions by using L-band. In this study, we aimed to monitor the displacement of mountain area in Kangwondo and this results will be used for detecting landslide. Also we build the web system for detecting and analyzing the landslide.

  • PDF

Ergonomic Designs of Car Navigation for Elderly Users (고령자를 고려한 내비게이션의 인간공학적 설계에 관한 연구)

  • Kim, Chang-Kyoon;Choe, Jae-Ho;Im, Young-Jae;Jung, Eui-S.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.5
    • /
    • pp.771-782
    • /
    • 2010
  • Today, the number of elderly drivers who use navigation is increasing with the growing number of elderly drivers. The purpose of this study is to provide guidelines on the interface of car navigation for elderly users. To extract significant factors which were distinguished between young and elderly users, both young and elderly users executed the driving test by installing two car navigation alternatives. The analysis was conducted through t-test. The results show that significantly different factors were the number and the meaning of the menu items in the initial screen, the location and the meaning of the menu icons in the map screen, the ease of search of the menu and the text size in the menu screen. Improvements for the factors of the initial screen and map screen were made with reference to ergonomic guidelines, and suggested through experiments comparing design alternatives for the menu screen. Design alternatives were made through a combination of investigative variables, and the analysis was conducted through ANOVA. The results show that Alternative 7 (the location of the tab was placed at the bottom, menu representation was done with the text font size of 18pt and the location of menu navigation icons was shown at the upper left) was preferred in terms of user's preference and the execution time. So if the suggested menu for elderly users are added to the existing design, both users will satisfy their desires. The guidelines suggested in this study will help the designer of car navigation take elderly users into consideration.

A Study on User Interface Design According to 3D Menu Type and Control Type for 3D Displays

  • Kim, Jae-Ho;Jung, Sung-Wook;Choe, Jae-Ho;Jung, Eui-S.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.4
    • /
    • pp.551-562
    • /
    • 2011
  • Objective: We proposed an effective 3D menu manipulation alternative with a usability test. This was performed in a 3D environment with 3D menu and control manipulation methods. Background: As 3D stereoscopic displays became generalized, various 3D applications were being used not just movies, games, but also mobile contents and advertisements. However, when a user interface was designed in a 3D environment, it was lacked that a clear standard and result of an efficiency and usability as like a 2D environment. Method: We implemented 9 kinds of 3D menu types based on 3D menu hierarchies, menu layouts and dimensions. And we extracted 3 representative control types in a 3D environment. We performed usability evaluation with full factorial design for 27 menu alternatives with 2 types of menu manipulation tasks. In this condition, we measured the performance time, subjective discomfort and eye-fatigue. Results: A control type had the significant effect, and the effect of menu types had the different result depending on given tasks. Conclusion: This experiment showed the interaction of menu and control types depended on 3D menu manipulation tasks were significant in a 3D user interface design. Therefore, as a purpose of a 3D menu manipulation task, 3D menu types and control types were should be considered. Application: We supposed this result was should be applied in a 3D menu contents design.

The Set of Performance Evaluation Index of Remodeling in Rural Housing for Residential Environments Improvement (주거환경개선을 위한 농촌주택 리모델링 성능평가지표 설정에 관한 연구)

  • Kim, Hye-Lan;Lim, Chang-Su;Kim, Eun-Ja;Hong, Kwang-Woo;Moon, Ho-Gyeong
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.1
    • /
    • pp.1-12
    • /
    • 2014
  • Living environments in rural area have become deteriorated rapidly. Increase of aging population, decline in agricultural income, polarization of wealth in rural community due to rural returners have caused severe decline and imbalance of living environments in rural area. Responding to this circumstances, governments currently develop projects for improving living environments focusing on individual housing which were excluded from governmental supports because those had been regarded as private property. Nevertheless, there are still some gaps and problems in evaluating the quality of living environment and suggesting effective solutions. It would be because standards and guidelines of the projects have been based on urban housing system. In order to support the implementation of the projects, this research has developed an index for evaluating and monitoring the quality of living environments in rural area. By applying Delphi method, the index has been created in four categories of 'security', 'convenience', 'comfortability', and 'durability' 'Security' consists of structural safety, crime, disaster, accident prevention. 'Convenience' includes three divisions of living, traffic, farm working. 'Comfortability' is divided into sanitation, indoor environments, and aesthetic appreciation. Lastly, 'durability' has four divisions of energy conservation, environmental friendliness, efficiency, and economics. Each sub-division also has different items from three to twelves. In the case of an index for performance evaluation, items have been derived from energy conservation(6-items), and environmental friendliness(7-items). Items developed as an index for evaluating rural living environments in this research might be good background information for remodeling project in rural housing development.

A Study on the Analysis of Vulnerabilities in the Program Source Code (프로그램 소스코드 취약성 분석에 관한 연구)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.3-8
    • /
    • 2004
  • The majority of recent intrusions reveal that the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF

A Data Sharing Algorithm of Micro Data Center in Distributed Cloud Networks (분산클라우드 환경에서 마이크로 데이터센터간 자료공유 알고리즘)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.15 no.2
    • /
    • pp.63-68
    • /
    • 2015
  • Current ICT(Information & Communication Technology) infrastructures (Internet and server/client communication) are struggling for a wide variety of devices, services, and business and technology evolution. Cloud computing originated simply to request and execute the desired operation from the network of clouds. It means that an IT resource that provides a service using the Internet technology. It is getting the most attention in today's IT trends. In the distributed cloud environments, management costs for the network and computing resources are solved fundamentally through the integrated management system. It can increase the cost savings to solve the traffic explosion problem of core network via a distributed Micro DC. However, traditional flooding methods may cause a lot of traffic due to transfer to all the neighbor DCs. Restricted Path Flooding algorithms have been proposed for this purpose. In large networks, there is still the disadvantage that may occur traffic. In this paper, we developed Lightweight Path Flooding algorithm to improve existing flooding algorithm using hop count restriction.

A Study on The Reinforcement Measures of First Investigation Capability (초동수사역량 강화방안에 관한 연구)

  • Park, Hyung Sik;Park, Ho Jeong
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.83-88
    • /
    • 2014
  • First investigation is urgent investigation activities to arrest and to obtain evidence at the beginning of the incident. If the first investigation is wrong, the crime will not be solved or a lot of evidence will be disappeared. Therefore, if the first investigation is wrong, Wasting a lot of manpower and budget, or the other victims are to occur. First investigation is the crime scene centered investigation, victim centered investigation and damaged goods centered investigation. The crime scene centered investigation is the investigation on the discovery of dropped objects, to confirm thd date of offense, on the discovery of witnesses. Victim centered investigation is the investigation of victim's personal information, the living conditions of the family, fellowship and home interior matter. Damaged goods centered investigation is the investigation on the place of crime damaged goods and the movement route of crime damaged goods. In order to reinforce the investigative capacity of police first investigation, It is needed to reinforce the education on the first investigation, to conduct continuously for FTX (field training), to product the manual for first investigation, to build a case analysis system, to develop of forensic techniques and the coordination of national. The police should be giving people faith from the first investigation.

Private Key Management Scheme Using Secret Sharing and Steganography (비밀 분산 및 스테가노그래피를 이용한 개인 키 보관 기법)

  • Lee, Jaeheung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.35-41
    • /
    • 2017
  • This paper introduces a new method for storing a private key. This method can be achieved by dividing the private key into "n" pieces by a (k, n) secret sharing method, and then storing each piece into photo files utilizing a steganography method. In this way, a user can restore a private key as long as he can remember the locations of "k" photos among the entire photo files. Attackers, meanwhile, will find it extremely difficult to extract the private key if a user has hidden the pieces of the private key into numerous photo files stored in the system. It also provides a high degree of user convenience, as the user can restore the private key from his memory of k positions among n photo files. Coupled with this, a certain level of security can be guaranteed because the attacker cannot restore a private key, even if he knows k-1 photo file locations.

Design and Implementation of the Sinkhole Traceback Protocol against DDoS attacks (DDoS 공격 대응을 위한 Sinkhole 역추적 프로토콜 설계 및 구현)

  • Lee, Hyung-Woo;Kim, Tae-Su
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.85-98
    • /
    • 2010
  • An advanced and proactive response mechanism against diverse attacks on All-IP network should be proposed for enhancing its security and reliability on open network. There are two main research works related to this study. First one is the SPIE system with hash function on Bloom filter and second one is the Sinkhole routing mechanism using BGP protocol for verifying its transmission path. Therefore, advanced traceback and network management mechanism also should be necessary on All-IP network environments against DDoS attacks. In this study, we studied and proposed a new IP traceback mechanism on All-IP network environments based on existing SPIE and Sinkhole routing model when diverse DDoS attacks would be happen. Proposed mechanism has a Manager module for controlling the regional router with using packet monitoring and filtering mechanism to trace and find the attack packet's real transmission path. Proposed mechanism uses simplified and optimized memory for storing and memorizing the packet's hash value on bloom filter, with which we can find and determine the attacker's real location on open network. Additionally, proposed mechanism provides advanced packet aggregation and monitoring/control module based on existing Sinkhole routing method. Therefore, we can provide an optimized one in All-IP network by combining the strength on existing two mechanisms. And the traceback performance also can be enhanced compared with previously suggested mechanism.

Design of Automatic Database Schema Generator Based on XML Schema (XML 스키마 기반의 데이터베이스 스키마 생성기 설계)

  • Lim, Jong-Seon;Kim, Kyung-Soo
    • Convergence Security Journal
    • /
    • v.7 no.3
    • /
    • pp.79-86
    • /
    • 2007
  • B2B e-business is an economic transaction formed between companies through various networks including internet. At present, e-business between companies partly applies information distribution between companies, but many enterprises expect that a corporate basic system will be gradually changed into XML basis if web service is earnestly materialized, so they are competing with each other in developing XML DBMS. Existing XML DBMS studies used XML DTD in order to represent the structure of XML document. Such XML DTD defines the expression of a simple type, so there are many difficulties in defining the structure of XML document. To cope with this, in this paper, the author will develop database schema generator utilizing relational database generally used in storing contents of data, on the basis of XML schema selected as a standard of W3C. Also, to store XML data, the author proposed the automatic conversion method of relational database schema that used XML schema.

  • PDF