• Title/Summary/Keyword: outflow of information

Search Result 142, Processing Time 0.027 seconds

Flood Hazard Management Using Mobile GIS (모바일 GIS에 의한 홍수재해관리)

  • 강택순;강성봉;손홍규;유환희
    • Proceedings of the Korean Society of Surveying, Geodesy, Photogrammetry, and Cartography Conference
    • /
    • 2003.10a
    • /
    • pp.297-302
    • /
    • 2003
  • Recently, Flood hazard has been increased frequently in urban area by rainfall and Typhoon. To manage flood hazard effectively, it needs to construction of flood information management system. Especially, run-off by flood in urban area must be considered not only surface outflow by topographic gradient and elevation but also conduits outflow along conduit network. This paper suggests the flood hazard management system for analyzing flood outflow in urban area using conduits outflow simulation by ILLUDAS model and providing quickly flood hazard information using WebGIS and MobileGIS.

  • PDF

Prevention of Outflow of Cadastral Technique and Protection Plan Subsequent to Environmental Change of Cadastral Surveying (지적측량 환경 변화에 따른 지적기술의 유출방지 및 보호방안)

  • Lee, Jae-Hyuk;Hong, Sung-Eon;Lee, Hyun-Joon
    • Spatial Information Research
    • /
    • v.16 no.1
    • /
    • pp.33-50
    • /
    • 2008
  • At present, the cadastral field, with the conversion into digital cadastral map management system, not the existing cadastral map management system, has gone through a lot of changes, such as the market opening of cadastral surveying and overseas launching of a cadastral field. Such an environmental change has brought on a lot of advantages, such as improvement in accuracy of surveying, efficient management system, and reinforcement of competitive power in cadastral surveying. However, the conversion into the advanced cadastral management system serves to relatively heightening the possibility of outflow of cadastral information and its technology in comparison with in the past. This research, with the aim to cope with indiscriminate outflow of cadastral technology, is aimed at suggesting the plan for the prevention of outflow of cadastral technique and its protection after examining and considering the contents of environmental changes in the currently going cadastral field.

  • PDF

A study on Average CN Estimation in River Basin using Satellite Data

  • Kwon, Bong-kyum;Jo, Myung-Hee;Ahn, Seung-Sep;Kiyoshi, Yamada
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.499-499
    • /
    • 2002
  • The goal of this study is to apply and evaluate the precipitation outflow in river basin using satellite data and GIS for proposing the efficient watershed management method. Not only precipitation outflow data but also various spatial data such as digital map, soil map, geologic map and multi-temporal TM images were used. Using landcover classification result and soil map were applied to estimate the average CN. The CN value of 63.37 by SCS method was produced in AMC-2 condition otherwise the result of direct estimation with observation method was 63 CN value. The relative error of two results was 0.59%. It can be possible to apply the satellite data for precipitation outflow analysis. For more accurate and credible analysis of this, the more multi-temporal satellite and real observation data will be needed.

  • PDF

Analysis of Non-Point Pollutants Outflow Pattern in Jinhae-Masan Basin (진해-마산만 유역에서 비점오염물의 유출양상 분석)

  • Lee, Beum-Hee
    • The Journal of Engineering Research
    • /
    • v.8 no.1
    • /
    • pp.107-118
    • /
    • 2006
  • The difficulties to build a 3-dimensional water quality model for the coastal water quality improvement and the environmental recovery estimation are the lack of periodic observed data and the many problems to observe continuously. I observed the rainfall and non-point pollutants outflow patterns in Jinhae-Masan basin as mid-step researches for the water quality simulation and management method development in a coastal area. I applied Landsat image system and Geographic Information System to analyze the runoff and non-point pollutants outflow patterns. A water quality simulation model (SWMM) applied to Jinhae-Masan basin with results of the land use distribution, non-point pollution loads, and watershed informations from GIS(IDRISI used). I proposed some improved survey and GIS application methods reflect upon the pollutant characteristics from the observed non-point pollutant outflow patterns.

  • PDF

Protecting Technique for the Executable File of Virtual Machines (가상기계 실행파일을 위한 보호 기법)

  • Park, Ji-Woo;Yi, Chang-Hwan;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.668-678
    • /
    • 2007
  • The development of a wire and wireless communication technologies might permit easily accessing on various information. But, the easiness of accessing information has basically the problem of an unintended information outflow. An executable file which has key algorithms, data and resources for itself has very weak point in the security. Because the various information such as algorithms, data and resources is included in an executable file on embedded systems or virtual machines, the information outflow problem may appear more seriously. In this paper, we propose a technique which can be protecting the executable file contents for resolving the outflow problem through the encryption. Experimentally, we applied the proposed technique to EVM-the virtual machine for embedded system and verified it. Also, we tried a benchmark test for the proposed technique and obtained reasonable performance overhead.

  • PDF

A Study of File Outflow Monitoring Process using the File System and NDIS Driver (파일시스템과 NDIS 드라이버를 이용한 파일 유출 감시프로세스)

  • Lee, Mintae
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.12
    • /
    • pp.632-639
    • /
    • 2014
  • In this paper, we propose a PC's self-monitoring system for protecting illegal outflow of important personal files, which are managed in the Windows environment PC. This paper is based on the idea that it should be a read (access) file operation in order to outflow files through the network. To compare the information (name, some content) obtained from all operations of the reading of the 'Windows File System Driver' and captured transmission packets of mini port of 'Windows NDIS (Network Driver Interface Specification) Driver', and, if two pieces of information match, this system will determine the transmission to user. In this paper, tentatively, we developed a function to gather file information about file read operation and developed a function for transmission packet capture. This demonstration implementation showed that the proposed process has validity and the proposed process verified that it does not significantly affect the PC's performance.

The Research on Security Cognition and Management Status of Technology Outflow about Small-medium Companies in New IT Environment (신정보화 환경에서 중소기업 기술유출에 대한 인식과 관리 실태에 관한 연구)

  • Kim, Ki Ho;Ha, Kyu Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.305-312
    • /
    • 2013
  • This research suggests the security countermeasures for solving technology outflow of small-medium companies in New IT Environment through level comparison of security cognition and security management between small-medium companies and major big companies. According to analysis results, it is poor for small-medium companies' level of security cognition and security management compared with major big companies. Small-medium companies need to manage technology outflow to major big companies' level in New IT Environment. Small-medium companies has started to build New IT Environment recently and it must build the appropriate security system for small-medium companies at the same time. Small-medium company has more problem with budget and proffessionals to maintain the security of technology outflow. Therefore government has to support systematic management for the security of technology outflow to Small-medium companies

A Study on Industrial Security Outflow Prevention System Based on Network Biometric Authentication (네트워크 바이오 인증 기반 산업기술 유출방지 시스템에 관한 연구)

  • Lee, Dae-Sung
    • Convergence Security Journal
    • /
    • v.11 no.4
    • /
    • pp.31-36
    • /
    • 2011
  • Enterprise which has a core technology or organization which manages a core information will be walking into a critical situation like a ruins when organization's confidential information is outflowed. In the past confidential information that was leaked to the off-line, recently the outflow made possible through a variety of equipment at any time via the network based on the ubiquitous communication environment. In this paper, we propose to authenticate and block all packets transmitted via the network at real-time in order to prevent confidentials outflow. Especially in or der to differentiate between users who attempt to disclose confidentials, we propose to insert user's biometric informaion transparently at per-packet basis, and also verify a performance by simulation.

Monitoring System of File Outflow through Storage Devices and Printers (저장매체와 프린터를 통한 파일유출 모니터링시스템)

  • Choi Joo-ho;Rhew Sung-yul
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.51-60
    • /
    • 2005
  • The riles or intellectual property on computer systems have increasingly been exposed to such threats that they can be flowed out by internal users or outer attacks through the network. The File Outflow Monitoring System monitors file outflows at server by making the toe when users copy files on client computers into storage devices or print them, The monitoring system filters I/O Request packet by I/O Manager in kernel level if files are flowed out by copying, while it uses Win32 API hooking if printed. As a result, it has exactly made the log and monitored file outflows, which is proved through testing in Windows 2000 and XP.

Controlling of Dam Gates with Outflow Control by Dynamic Fuzzy Inference (동적 퍼지 추론에 의한 방류량 조절 가능 댐 수문 제어)

  • Woo, Young-Woon;Lee, Soo-Jong;Kim, Kwang-Baek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.75-82
    • /
    • 2008
  • Control of dam gates is a complex, nonlinear, and non-stationary control process and is significantly affected by hydrological conditions which are not predictable beforehand. In this paper, we proposed control methods based on a fuzzy inference method for the operation of dam gates. The proposed methods are not only suitable for controlling gates but also able to maintain target water level in order to prepare a draught, and able to control the amount of the outfow from a reservoir in order to prevent floods in lower areas of a river. In the proposed methods, we used the dynamic fuzzy inference method that membership functions can be varied by changing environment conditions for keeping up the target water level instead of conventional static fuzzy inference methods, and used additional fuzzy rules and membership functions for restricting the amount of the outflow. Simulation results demonstrated that the proposed methods produce an efficient solution for both of maintaining target water level defined beforehand and controlling the amount of the outflow.

  • PDF