• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.025 seconds

A Study on the Industrial SWOT Analysis and Benefits for the Successful RFID Implementation (성공적인 RFID 구현을 위한 산업별 SWOT 분석과 성과에 관한 연구)

  • Chang, Yun-Hee
    • The Journal of Information Systems
    • /
    • v.16 no.2
    • /
    • pp.93-122
    • /
    • 2007
  • RFID has fundamental influences on today's business management. This research seeks to formulate the opportunities and challenges, the strengths and weaknesses and the perceived benefits of RFID implementation in three industries: manufacturing, medical-service, and distribution. Ten companies of successful RFID deployment in Korea are presented. Field interview and panel discussion were used to explore the research purpose. The core challenges include RFID readability issues, lack of best practices, increasing prime cost, visible ROI, implementation cost, and employee's resistance. The strengths include IT infrastructure, system integration competency, RFID business model creation ability, executive's support. There is little weakness in Korea companies, there are many perceived benefits in three industries. The most distinctive finding is that the visible ROI was found out in the manufacturing industry, not in the distribution industry. The opportunities and challenges, the strengths and weaknesses and the perceived benefits are some different in three industries, which provide valuable guidance for Korean companies in seeking the RFID opportunities. This case study represents a pioneer research of RFID adoption in Korea.

  • PDF

Multi-agent System for Education Course Scheduling of Learner-oriented using Weakness Analysis Algorithm (취약성 분석 알고리즘을 이용한 학습자 중심의 교육 코스 스케쥴링 멀티 에이전트 시스템)

  • 김태석;이종희;이근왕;오해석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04b
    • /
    • pp.646-648
    • /
    • 2001
  • 전자도서관과 LOD 기술을 접목한 웹기반 교육 시스템의 연구는 몇 년 동안 활발히 진행되어 왔다. 특히, 멀티미디어 기술 및 컴퓨터 통신 기술 개발의 가속화 및 이을 응용한 컨텐츠 개발에 촉진제 역할을 하게된 웹의 탄생은 교수-학습 활동에서의 교육형태로 인식할 수 있는 전환점을 제공하게 되었고, 웹을 기반으로 한 교육(WBI: Web-Based Instruction)이라는 새로운 교수 모형이 제시되기에 이르렀다. 또한, 최근에 학습자의 요구에 맞는 코스웨어 주문이 증가되고 있는 추세이며 그에 따라 웹 기반 교육 시스템의 효율적이고 자동화된 교율 에이전트의 필요성이 인식되어 있다. 그러나 현재 연구되고 있는 많은 교육 시스템들은 학습자 성향에 맞는 코스를 적절히 서비스 해지 못할 뿐 아니라 지속적인 피드백과 학습자가 코스를 학습함에 있어서 취약한 부분을 재학습 할 수 있도록 도와주는 서비스를 제공하지 못하고 있다. 본 논문에서는 학습자의 학습 모니터링과 지속적인 학습평가에 의하여 개인 학습자의 학습 성취도를 계산하여 학습자에게 적합한 코스 스케쥴을 제공해 주는 코스 스케쥴링 멀티 에이전트를 제안하고자 한다.

  • PDF

Selection and Ranking of Common Attack Patterns for Developing Secure Web Applications (안전한 웹 애플리케이션 개발을 위한 공통 공격패턴의 선별 및 순위화)

  • Moon, Jae-Chan;Kim, Dae-Gyeong;Cho, Seong-Je
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.226-228
    • /
    • 2012
  • 최근 HTML5, AJAX(Asynchronous JavaScript XML) 등으로 구현된 웹 애플리케이션이 널리 이용됨에 따라 웹 애플리케이션에 존재하는 취약점을 악용하는 공격 사례가 증가하고 있다. 웹 애플리케이션의 안전한 개발과 유지보수를 위해, 설계/구현 단계에서의 취약점 완화를 통한 예방, 그리고 운영 단계에서의 공격 탐지 및 대응이 필요하다. 더불어, 위험한 취약점들 및 공격 패턴들을 분석하고 우선순위를 부여하여, 웹 애플리케이션 개발 단계 및 운영 단계에서 심각한 취약점과 공격들을 우선 고려해야 한다. 본 논문에서는 OWASP Top 10과 CWE(Common Weakness Enumeration)를 연동시켜 CAPEC(Common Attack Pattern Enumeration and Classification)에서 웹 관련 주요 공격 패턴을 선별하고 순위화하였다. CWE는 취약점 예방에 도움을 주며, 순위화된 공격 패턴은 웹 애플리케이션에서 주요 공격들을 효율적으로 방어할 수 있게 하여 준다.

Comparisons of Various Properties for Zero Suppression Algorithms (Zero Suppression 알고리듬들의 여러 가치 특성 비교)

  • 이훈재;박영호
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.6 no.1
    • /
    • pp.7-14
    • /
    • 2001
  • Among zero-suppression (ZS) algorithms proposed for synchronous stream cipher system, ZS-1 has the difficulty on the implementation of stream cipher system, ZS-2 has a weakness of channel error propagation, and ZS-3 has the complexity on the hardware. Because each algorithm must be chosen carefully to the application system, in this paper, we propose a criterion of the system adapted from the simulated results on the parameter changed.

  • PDF

A Study of a Korean Academic Journal Evaluation Model (국내 학술지 평가모형에 관한 연구)

  • Han, Sang Wan;Park, Hong Seok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.33 no.2
    • /
    • pp.90-90
    • /
    • 1999
  • The academic journal is a very important means for science communication, and it is critical for academic development. Most of Korean academic journals are not doing their fundamental roles because of the researchers' perception about their quality. A fundamental thing for Korean academic Journals to contribute effectively to science communication would be the effective evaluation on the journal. The purpose of this study is to develop an evaluation model for Korean academic Journals. This model will be effective for quality measurement, manifestation of the strength and weakness, and for the improvement of journal qualify. It was developed through analysis on evaluation activities of two institutions, and through interviews and surveys on Korean researchers.

Mixed Display Platform to Expand Comfortable Zone of Stereoscopic 3D Viewing

  • Yang, Ungyeon;Kim, Namkyu;Seo, Jinseok;Kim, Ki-Hong;Lee, Gil-Haeng
    • ETRI Journal
    • /
    • v.35 no.2
    • /
    • pp.352-355
    • /
    • 2013
  • Common stereoscopic three-dimensional (3D) display has a convergence and accommodation conflict that violates the natural human cognitive process of viewing. This weakness exposes the challenge in supporting fun factors while eliminating safety problems in the 3D viewing experience. Thus, human factors have become a major research topic. In this letter, we propose a 3D stereoscopic visualization platform that can expand the sense of a 3D space by fusing organically mixed stereoscopic displays to provide a continuous feeling of 3D depth. In addition, we present pilot test results to show the possibility of the technical implementation of the proposed platform and note ongoing research issues to be addressed.

A Study of Rheological Properties of Dough with Waxy Black Rice Flour (찰흑미분을 첨가한 밀가루 반죽의 물리적 특성에 관한 연구)

  • Kim, Woen-Mo;Kim, Tae-Hyung;Lee, Yoon-Shin
    • Culinary science and hospitality research
    • /
    • v.12 no.4 s.31
    • /
    • pp.236-246
    • /
    • 2006
  • The different rheological properties of wheat flour and waxy black rice flour dough were investigated in dough with 10, 20, 30 and 40% of waxy black rice flour(WBRF). Water absorption and weakness of dough was increased, but stability of dough, high initial pasting temperature, viscosity at peak point and the volume were decreased after 2nd fermentation as the addition of WBRF was increased. In the 10% addition of WBRF, the dough showed similar rheological properties with those of control group.

  • PDF

User Density Estimation System at Closed Space using High Frequency and Smart device

  • Chung, Myoungbeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.11
    • /
    • pp.49-55
    • /
    • 2017
  • Recently, for safety of people, there are proposed so many technologies which detect density of people at the specific place or space. The representative technology for crowd density estimation was using image analysis method from CCTV images. However, this method had a weakness which could not be used and which's accuracy was lower at the dark or smog space. Therefore, in this paper, to solve this problem, we proposed a user density estimation system at closed space using high frequency and smart device. The system send inaudible high frequencies to smart devices and it count the smart devices which detect the high frequencies on the space. We tested real-time user density with the proposed system and ten smart devices to evaluate performance. According to the testing results, we confirmed that the proposed system's accuracy was 95% and it was very useful. Thus, because the proposed system could estimate about user density at specific space exactly, it could be useful technology for safety of people and measurement of space use state at indoor space.

Text-Independent Speaker Verification Using Variational Gaussian Mixture Model

  • Moattar, Mohammad Hossein;Homayounpour, Mohammad Mehdi
    • ETRI Journal
    • /
    • v.33 no.6
    • /
    • pp.914-923
    • /
    • 2011
  • This paper concerns robust and reliable speaker model training for text-independent speaker verification. The baseline speaker modeling approach is the Gaussian mixture model (GMM). In text-independent speaker verification, the amount of speech data may be different for speakers. However, we still wish the modeling approach to perform equally well for all speakers. Besides, the modeling technique must be least vulnerable against unseen data. A traditional approach for GMM training is expectation maximization (EM) method, which is known for its overfitting problem and its weakness in handling insufficient training data. To tackle these problems, variational approximation is proposed. Variational approaches are known to be robust against overtraining and data insufficiency. We evaluated the proposed approach on two different databases, namely KING and TFarsdat. The experiments show that the proposed approach improves the performance on TFarsdat and KING databases by 0.56% and 4.81%, respectively. Also, the experiments show that the variationally optimized GMM is more robust against noise and the verification error rate in noisy environments for TFarsdat dataset decreases by 1.52%.

Biometric Certificate on Secure Group Communication

  • Han, Kun-Hee
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.25-29
    • /
    • 2014
  • Security is a primary concern in group communication, and secure authentication is essential to establishing a secure group communication. Most conventional authentications consist of knowledge-based and token-based methods. One of the token-based methods is a X.509 certificate, which is used under a Public Key Infrastructure (PKI); it is the most well-known authentication system in a distributed network environment. However, it has a well-known weakness, which only proves the belonging of a certificate. PKI cannot assure identity of a person. The conventional knowledge-based and token-based methods do not really provide positive personal identification because they rely on surrogate representations of the person's identity. Therefore, I propose a secure X.509 certificate with biometric information to assure the identity of the person who uses the X.509 certificate in a distributed computing environment.

  • PDF