• 제목/요약/키워드: security architecture

검색결과 1,093건 처리시간 0.026초

유수지 공간을 활용한 주거지개발 사례연구 -일본 철학당 공원(테츠가쿠도 코우엔) 주거단지 사례를 중심으로- (A Case Study on the Housing Development by Using the Space of Retarding Basin - Focused on the Tetsugakudo Kouen Collective Housing Development Project -)

  • 백승관;김영훈
    • KIEAE Journal
    • /
    • 제15권1호
    • /
    • pp.129-137
    • /
    • 2015
  • The purpose of this study is to analyze the Tetsugakudo Kouen Collective Housing Development Project in Japan. Project implemented cooperatively by the Tokyo Metropolitan Government in charge of river management, Shinjuku and Nakano-ku responsible for park management, and the UR, a housing project developer. This project set a significant precedent for three-dimensional river use by realizing the three-dimensional integrated development of a flood control reservoir, a park, and collective housing. The major effectiveness of this project can be summarized into four points. 1) The costs borne by individual project developers were significantly reduced by realizing a high degree of application and multipurpose use of the land through a joint project. 2) This project, which was designed to accommodate rainfall of 30 to 40mm per hour, is expected to contribute to reducing flood damage and generating significant investment effects, in terms of asset value in downstream areas, thereby increasing flood control security. 3) Local disaster prevention function were enhanced by providing an evacuation site in the case of an earthquake. 4) The living environment was improved by adding the function of a park.

통합전산환경 구축$\cdot$운영을 위한 개념적 모형 개발 (Development of the Conceptual Model of Constructing and Operating the Integrated Computing Environment)

  • 정해용;김상훈
    • Journal of Information Technology Applications and Management
    • /
    • 제12권4호
    • /
    • pp.173-195
    • /
    • 2005
  • As the amount of informatization investment is rapidly increasing in many organizations, it becomes more inevitable to manage computing resources (information systems, computing facilities and manpower etc.) effectively. Specially, in public sector It is thought to be very important to achieve the economy of scale by integrating computing resources which are managed individually in many agencies. Also, our government have been recently making much efforts to raise the effectiveness of operating the information systems by promoting joint information use among many public agencies, enhancing the operating systems and the expertise of IS staff and applying the optimal information security systems. This study focuses on presenting the framework to effectively integrate omputing resources and proposing the ways of constructing and operating the integrated computing environment for the institutions and the affiliated groups under the Ministry of Culture & Tourism which are in charge of implementing cultural informatization. The main implications of this study are 1) building the ideal model of the integrated computing environment architecture suitable to cultural informatization area, 2) showing the criteria of deciding whether the organizations use the Integrated computing environment or not and how extensively they commit their computing resources to it, and 3) suggesting the ways of the phased integration and the change management to minimize confusion in the process of adopting the integrated computing environment and behavioral problems such as conflict and resistance of IS-related Personnel Influenced by Implementing the integrated computing environment.

  • PDF

거주자 구성유형 및 소득수준에 따른 주거용 건물 내 전력소비성향 (Characteristics of Electric-Power Use in Residential Building by Family Composition and Their Income Level)

  • 서현철;홍원화;남경목
    • 한국주거학회논문집
    • /
    • 제23권6호
    • /
    • pp.31-38
    • /
    • 2012
  • In this paper, we draws tendency of the electricity consumption in residential buildings according to inhabitants Composition types and the level of incomes. it is necessary to reduce energy cost and keep energy security through the electricity demand forecasting and management technology. Progressive social change such as increases of single household, the aging of society, increases in the income level will replace the existing residential electricity demand pattern. However, Only with conventional methods that using only the energy consumption per-unit area are based on Energy final consumption data can not respond to those social and environmental change. To develop electricity demand estimation model that can cope flexibly to changes in the social and environmental, In this paper researches propensity of electricity consumption according to the type of residents configuration, the level of income. First, we typed form of inhabitants in residential that existed in Korea. after that we calculated hourly electricity consumption for each type through National Time-Use Survey performed at the National Statistical Office with considering overlapping behavior. Household appliances and retention standards according to income level is also considered.

PIM-SM 정보 보안을 위한 멀티캐스트 그룹 키 관리 프로토콜 설계 (Design of Multicast Group Key Management Protocol for Information Security in PIM_SM)

  • 홍종준
    • 인터넷정보학회논문지
    • /
    • 제3권5호
    • /
    • pp.87-94
    • /
    • 2002
  • 본 논문에서는 PIM-SM 멀티캐스트 그룹 통신에서 사용자의 정보 보호를 위한 그룹 키 관리 프로토콜을 제안한다. 이는 PR에 멀티캐스트 그룹 키를 관리하는 키 관리자를 두어 송신사 고유의 그룹 키를 부여하고 데이터를 수신자에게 전송하기 이전에 RP는 인증된 수신자에게 송신자의 그룹 키를 전달한다. 송신자가 그룹 키로 암호화한 후 RP에게 전송을 하면 RP는 각 수신자에게 전송하고, 수신자는 미리 받은 송신자의 그룹 키로 데이터를 복호화 할 수 있다. 따라서 그룹 키에 의한 데이터 변환 작업이 불필요하여 데이터 전송 시간이 단축되며, 최소거리경로로의 변화에도 새로운 키 분배 없이 데이터 전송이 가능하다.

  • PDF

Classification of Leukemia Disease in Peripheral Blood Cell Images Using Convolutional Neural Network

  • Tran, Thanh;Park, Jin-Hyuk;Kwon, Oh-Heum;Moon, Kwang-Seok;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • 한국멀티미디어학회논문지
    • /
    • 제21권10호
    • /
    • pp.1150-1161
    • /
    • 2018
  • Classification is widely used in medical images to categorize patients and non-patients. However, conventional classification requires a complex procedure, including some rigid steps such as pre-processing, segmentation, feature extraction, detection, and classification. In this paper, we propose a novel convolutional neural network (CNN), called LeukemiaNet, to specifically classify two different types of leukemia, including acute lymphoblastic leukemia (ALL) and acute myeloid leukemia (AML), and non-cancerous patients. To extend the limited dataset, a PCA color augmentation process is utilized before images are input into the LeukemiaNet. This augmentation method enhances the accuracy of our proposed CNN architecture from 96.9% to 97.2% for distinguishing ALL, AML, and normal cell images.

Estimating the Validity of CPTED Guidelines on Residence Hall in University: Through the Comparison between CPTED Checklists and Space Syntax Analysis

  • Han, Dongho;Park, Changbae
    • Architectural research
    • /
    • 제17권4호
    • /
    • pp.117-126
    • /
    • 2015
  • University residence halls have become one of the most important issues for students when selecting their academic institutions. However, in South Korea, while universities maintain technologically up-to-date facilities, when it comes to safety or security, the management is unsatisfactory. As a result, the number of violent crime has been increasing. However, there are few researches in terms of practical validity of CPTED Guidelines even though a myriad of researchers study about CPTED Guidelines. Therefore, this study endeavours to investigate the validity of theoretical CPTED Guidelines that to what extent it might be adopted for design process. As a methodology, Space Syntax Convex map and Visibility Graph Analysis (VGA) are chosen. As a result, since the types of space which have a high level of Space Syntax Index are analogous with space treated on CPTED Guidelines, it roughly shows that the theoretical CPTED Guidelines could be adopted in practical architectural design process. Furthermore, it reveals that there is a close relationship between detail design guide stated in CPTED Guidelines and the result of VGA. That is, through the analysis, it is proved that the validity of CPTED Guidelines is quite enough to be adopted in practical design process.

AOP를 이용한 신뢰성 있는 서비스 어플리케이션의 SOA 기반 프레임워크 (A SOA based Framework Using AOP for Reliable Service Applications)

  • 김은선;이재정;이병정
    • 한국IT서비스학회지
    • /
    • 제10권2호
    • /
    • pp.223-234
    • /
    • 2011
  • Loosely coupled properties of SOA(Service Oriented Architecture) services do not guarantee that service applications always work properly. Service errors may also influence other services of SOA. These characteristics adversely affect software reliability. Therefore, it is a challenge to effectively manage system change and errors for operating services normally. In this study, we propose a SOA based framework using AOP(Aspect Oriented Programming) for reliable service applications. AOP provides a way to manipulate cross-cutting concerns such as logging, security and reliability and these concerns can be added to applications through weaving process. We define a service specification and an aspect specification for this framework. This framework also includes service provider, requester, repository, platform, manager, and aspect weaver to handle changes and exceptions of applications. Independent Exception Handler is stored to exhibited external Aspect Service Repository. When exception happened, Exception Handler is linked dynamically according to aspect rule that is defined in aspect specification and offer function that handle exception alternate suitable service in systematic error situation. By separating cross-cutting concerns independently, we expect that developer can concentrate on core service implementation and reusability, understanding, maintainability increase. Finally, we have implemented a prototype system to demonstrate the feasibility of our framework in case study.

Single Sign-On을 적용한 네트워크 보안 모델링 (A Study on Network Security Modeling using Single Sign-On)

  • 서희석;김희완
    • 한국컴퓨터산업학회논문지
    • /
    • 제5권1호
    • /
    • pp.49-56
    • /
    • 2004
  • 인터넷 사용의 급증에 따라 대부분의 사용자들은 여러 웹 서버의 서비스를 사용하고 있으며 각 서버의 접속 사용자 ID 및 패스워드의 상이함으로 인해 혼선을 초래하기도 한다. 이러한 문제를 해결하기 위한 방법이 SSO(Single Sign-On)이다. 본 논문은 네트워크에 존재하는 다양한 서버 및 호스트에 접근하기 위한 550를 적용하여 침입 탐지 시스템과 침입 차단 시스템 등과 같은 보안 시스템의 관리를 수월하게 하고 네트워크 사용 및 관리를 효과적으로 수행하기 위한 모델링 방법을 제안한다 본 연구진이 제안하는 방법은 소규모 네트워크에서 적용하여 사용하기 수월하도록 구성하였으며 조직의 여러 데이터를 효과적으로 처리할 수 있도록 구성되었다. SSO의 구성은 인증서 기반의 PKI (Public Key Infrastructure)를 사용하여 구성하였으며 인증 통신을 위한 데이터 암호화를 SSL (Secure Socket Layer) 기반의 SHTTP (Secure Hyper Text Transfer Protocol)을 적용한다.

  • PDF

초등학교 주변 보행환경에 대한 초등학생의 범죄 불안감 조사 연구 - 일산 다세대 주택지에 위치하는 5개 초등학교 주변 보행환경을 중심으로 - (The Study on the Elementary Schoolchild's the Fear of Crime in Pedestrian Environment around Elementary School in Detached Housing Area - Focused on the Pedestrian path around 5 Elementary School in Ilsan New Town -)

  • 이유미
    • KIEAE Journal
    • /
    • 제15권2호
    • /
    • pp.69-78
    • /
    • 2015
  • Purpose: The aim of this study was to analyze the elementary schoolchildren's the fear of crime in pedestrian environment of elementary school for providing the basic design resource. Method:In order to deal with that, the questionnaire survey on the elementary schoolchildren's the fear of crime were conducted in 5 elementary schools in Ilsan new town. The results of the 293 questionnaires survey were analyzed through SPSS program. Result: The main results were as follows. The level of fear of crime in pedestrian environment differed in these 5 elementary schools because of the width of pedestrian path, the concealed place around pedestrian path, the nearness of park, the height/shape/interval of trees, the number of car and the closure-watching in the school caused by fence and trees and so on. The level of fear of crime in pedestrian environment differed between that of boy groups and that of girls groups because of the number of emergency bell/telephon, the shape of pedestrian path, the number of security office, the number of car and the concealed place around pedestrian path and so on.

Predictive maintenance architecture development for nuclear infrastructure using machine learning

  • Gohel, Hardik A.;Upadhyay, Himanshu;Lagos, Leonel;Cooper, Kevin;Sanzetenea, Andrew
    • Nuclear Engineering and Technology
    • /
    • 제52권7호
    • /
    • pp.1436-1442
    • /
    • 2020
  • Nuclear infrastructure systems play an important role in national security. The functions and missions of nuclear infrastructure systems are vital to government, businesses, society and citizen's lives. It is crucial to design nuclear infrastructure for scalability, reliability and robustness. To do this, we can use machine learning, which is a state of the art technology used in various fields ranging from voice recognition, Internet of Things (IoT) device management and autonomous vehicles. In this paper, we propose to design and develop a machine learning algorithm to perform predictive maintenance of nuclear infrastructure. Support vector machine and logistic regression algorithms will be used to perform the prediction. These machine learning techniques have been used to explore and compare rare events that could occur in nuclear infrastructure. As per our literature review, support vector machines provide better performance metrics. In this paper, we have performed parameter optimization for both algorithms mentioned. Existing research has been done in conditions with a great volume of data, but this paper presents a novel approach to correlate nuclear infrastructure data samples where the density of probability is very low. This paper also identifies the respective motivations and distinguishes between benefits and drawbacks of the selected machine learning algorithms.