• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.03 seconds

Design of Multi-agent System for Course Scheduling of Learner-oriented using Weakness Analysis Algorithm (취약성 분석 알고리즘을 이용한 학습자 중심의 코스 스케쥴링 멀티 에이전트 시스템의 설계)

  • Kim, Tae-Seog;Lee, Jong-Hee;Lee, Keun-Wang;Oh, Hae-Seok
    • The KIPS Transactions:PartA
    • /
    • v.8A no.4
    • /
    • pp.517-522
    • /
    • 2001
  • The appearance of web technology has accelerated a role of the development of the multimedia technology, the computer communication technology and the multimedia application contents. And serveral researches of WBI (Web-based Instruction) system have combined the technology of the digital library and LOD. Recently WBI (Web-based Instruction) model which is based on web has been proposed in the part of the new activity model of teaching-learning. And the demand of the customized coursewares which is required from the learners is increased, the needs of the efficient and automated education agents in the web-based instruction are recognized. But many education systems that had been studied recently did not service fluently the courses which learners had been wanting and could not provide the way for the learners to study the learning weakness which is observed in the continuous feedback of the course. In this paper we propose "Design of Multi-agent System for Course Scheduling of Learner-oriented using Weakness Analysis Algorithm". First proposed system monitors learner's behaviors constantly, evaluates them, and calculates his accomplishment. From this accomplishment the multi-agent schedules the suitable course for the learner. And the learner achieves a active and complete learning from the repeated and suitable course.le course.

  • PDF

An Improved Efficient Provable Secure Identity-Based Identification Scheme in the Standard Model

  • Tan, Syh-Yuan;Chin, Ji-Jian;Heng, Swee-Huay;Goi, Bok-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.910-922
    • /
    • 2013
  • In 2008, Chin et al. proposed an efficient and provable secure identity-based identification scheme in the standard model. However, we discovered a subtle flaw in the security proof which renders the proof of security useless. While no weakness has been found in the scheme itself, a scheme that is desired would be one with an accompanying proof of security. In this paper, we provide a fix to the scheme to overcome the problem without affecting the efficiency as well as a new proof of security. In particular, we show that only one extra pre-computable pairing operation should be added into the commitment phase of the identification protocol to fix the proof of security under the same hard problems.

A Study of Path Management to Efficient Traceback Technique for MANET (MANET에서 효율적 역추적을 위한 경로관리에 관한 연구)

  • Yang, Hwan Seok;Yang, Jeong Mo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.31-37
    • /
    • 2011
  • Recently, MANET(Mobile Ad-hoc Network) is developing increasingly in the wireless network. MANET has weakness because phases change frequently and MANET doesn't have middle management system. Every node which consists of MANET has to perform data forwarding, but traceback is not reliable if these nodes do malicious action owing to attack. It also is not easy to find location of attacker when it is attacked as moving of nodes. In this paper, we propose a hierarchical-based traceback method that reduce waste of memory and can manage path information efficiently. In order to manage trace path information and reduce using resource in the cluster head after network is formed to cluster, method which recomposes the path efficiently is proposed. Proposed method in this paper can reduce path trace failure rate remarkably due to moving of nodes. It can also reduce the cost for traceback and time it takes to collect information.

A plan research about a Ubiquitous RFID infringe private information (유비쿼터스 RFID 개인정보 침해에 대한 방안 연구)

  • Choi, Hee Sik;Park, Jae Pyo;Jun, Mun Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.143-151
    • /
    • 2010
  • RFID System of Ubiquitous which is one of problem that may occur in a process of replacing bar code in 21st century. Ubiquitous computer environment should be considered to be most important task to protect information. For introduction, this presentation going to discuss the background information, the purpose of Ubiquitous and potential problems in individual privacy in computer environment. In main part, the content will handle the practices and weakness in security of computer environment in Ubiquitous. Last part of presentation going to examine, futuristic views in solving existing problems with alternative solutions to prohibit invasion in privacy.

Development Strategy of Information Security Industry (정보보호산업 발전전략)

  • 박성욱;고성혁;이현우;김현종
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.439-442
    • /
    • 2002
  • As Information security businesses has just emerged in Korea, they have several weakness like small size, lack of resources, the urgent need of qualified R&D personnels to compete in global markets. The purpose of this study is to explore the present situation of Korean information security industry and develop supportive strategies of the government for the internationalization of them.

  • PDF

Spring Boot-based Web Application Development for providing information on Security Vulnerabilities and Patches for Open Source Software (Spring Boot 기반의 오픈소스 소프트웨어 보안 취약점 및 패치 정보 제공 웹 어플리케이션 개발)

  • Sim, Wan;Choi, WoongChul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.4
    • /
    • pp.77-83
    • /
    • 2021
  • As Open Source Software(OSS) recently invigorates, many companies actively use the OSSes in their business software. With such OSS invigoration, our web application is developed in order to provide the safety in using the OSSes, and update the information on the new vulnerabilities and the patches at all times by crawling the web pages of the relevant OSS home pages and the managing organizations of the vulnerabilities. By providing the updated information, our application helps the OSS users and developers to be aware of such security issues, and gives them to work in the safer environment from security risks. In addition, our application can be used as a security platform to greatly contribute to preventing potential security incidents not only for companies but also for individual developers.

High Performance of Induction Motor Drive using GAT (GAT를 이용한 유도전동기 드라이브의 고성능 제어)

  • Ko, Jae-Sub;Nam, Su-Myeong;Choi, Jung-Sik;Park, Bung-Sang;Chung, Dong-Hwa
    • Proceedings of the KIEE Conference
    • /
    • 2005.10c
    • /
    • pp.202-204
    • /
    • 2005
  • This paper is proposed genetic algorithm tuning(GAT) controller for high performance of induction motor drive. We employed GA to the classical PI controller. The approach having ability for global optimization and with good robustness, is expected to overcome some weakness of conventional approaches and to be more acceptable for industrial practices. The control performance of the GAT PI controller is evaluated by analysis for various operating conditions. The results of experiment prove that the proposed control system has strong high performance and robustness to parameter variation, and steady-state accuracy and transient response.

  • PDF

Life Cycle Assessment(LCA) of Rolling Stock (철도차량시스템의 전과정평가(LCA))

  • Kim Yong-Ki;Yoon Hee-Taek;Jung Woo-Sung
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.533-538
    • /
    • 2004
  • Rolling Stock life cycle can not provide weakness of environment due to the absence DB on about environment information for contaminant, expense analysis on each step which consists of raw material-design-manufacture-running-waste step. In order to estimate environmental impacts on LCA for rolling stock system, scientifically and internationally fair standards of assessment method for pursuing environmental friendly in environment regulation policy, application of LCA system is proposed and introduced in the present paper.

  • PDF

Remote speech recognition preprocessing system for intelligent robot in noisy environment (지능로봇에 적합한 잡음 환경에서의 원거리 음성인식 전처리 시스템)

  • Gwon, Se-Do;Jeong, Hong
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.365-366
    • /
    • 2006
  • This paper describes a pre-processing methodology which can apply to remote speech recognition system of service robot in noisy environment. By combining beamforming and blind source separation, we can overcome the weakness of beamforming (reverberation) and blind source separation (distributed noise, permutation ambiguity). As this method is designed to be implemented with hardware, we can achieve real-time execution with FPGA by using systolic array architecture.

  • PDF

IP Design of Corrected Block TEA Cipher with Variable-Length Message for Smart IoT

  • Yeo, Hyeopgoo;Sonh, Seungil;Kang, Mingoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.724-737
    • /
    • 2020
  • Corrected Block TEA(or XXTEA) is a block cipher designed to correct security weakness in the original block TEA in 1998. In this paper, XXTEA cipher hardware which can encrypt or decrypt between 64-bit and 256-bit messages using 128-bit master key is implemented. Minimum message block size is 64-bit wide and maximal message block size is 256-bit wide. The designed XXTEA can encrypt and decrypt variable-length message blocks which are some arbitrary multiple of 32 bits in message block sizes. XXTEA core of this paper is described using Verilog-HDL and downloaded on Vertex4. The operation frequency is 177MHz. The maximum throughput for 64-bit message blocks is 174Mbps and that of 256-bit message blocks is 467Mbps. The cryptographic IP of this paper is applicable as security module of the mobile areas such as smart card, internet banking, e-commerce and IoT.