• 제목/요약/키워드: security component

검색결과 412건 처리시간 0.03초

국방 CALS 통합 데이터 환경을 위한 내용 기반의 표준 데이터 검색 기술 개발 (The content based standard data search technology under CALS integrated data environment)

  • 정승욱;우훈식
    • 안보군사학연구
    • /
    • 통권2호
    • /
    • pp.261-283
    • /
    • 2004
  • To build up the military strength based on information oriented armed forces, the Korean ministry of national defense (MND) promotes the defense CALS (Continuous Acquisition and Life cycle Support) initiative for the reductions of acquisition times, improvements of system qualities, and reductions of costs. These defense CALS activities are the major component of the underlying mid and long term defense digitization program and the ultimate goal of program is to bring a quick victory by providing real-time battlefield intelligence and the economical operations of the military. The concept of defense CALS is to automate the acquisition and disposition of defense systems throughout their life cycle. For implementing defense CALS, the technology for exchange and sharing CALS standard data that is created once and used many times should be considered. In order to develop an efficient CALS information exchange and sharing system, it is required to integrate distributed and heterogeneous data sources and provide systematic search tools for those data. In this study, we developed a content based search engine technology which is essential for the construction of integrated data environments. The developed technology provides the environment of sharing the CALS standard data such as SGML(Standard Generalized Markup Language) and STEP(Standard for The Exchange of Product model data). Utilizing this technology, users can find and access distributed and heterogeneous data sources without knowing its actual location.

  • PDF

미래형 예비군 훈련체제 정립에 관한 연구 (Thinking about the training system of R.O.K. reserved force in the future)

  • 정원영
    • 안보군사학연구
    • /
    • 통권5호
    • /
    • pp.47-85
    • /
    • 2007
  • Reserved force's training(RFT) is undoubtedly the critical component to increase the national capability in case of emergency. It is because RFT plays an important role in maintaining the peace for the Korean peninsula as the key deterrence force power for more than 40 years. Considering the reserved force reform linked with the goal and the plan of Korean Defense Reform 2020', we can expect the utility of the reserved force as the potential combat power to make national defense resources more efficient and useful. In that sense, this study suggests some solutions to promote the reserved force's competency to demonstrate the ROK Armed Force's combat power as the equivalent partner with the active force as well as the future deterrence power. This study also analyzes the present training system including law and regulation, identifies some implications through the literature review, and designs the future ROK reserved force's training system by extracting new variables forecasting the future environment for national defense. In addition, this study includes its concerned systems generally without limiting the scope into the reserved force. Therefore we try to seek to prepare for mobilization readiness and to promote regional hometown defense capability in order to cope with the enemy's threat in case of emergency.

  • PDF

감시정찰 센서네트워크에서 중요노드 탐색 연구 (A Study of Key Node Search in Reconnaissance Surveillance Sensor Networks)

  • 국윤주;강지원;김점구;김귀남
    • 한국정보통신학회논문지
    • /
    • 제13권7호
    • /
    • pp.1453-1458
    • /
    • 2009
  • 센서 네트워크는 인간이 접근하기 어려운 험난한 지역이나 광범위한 지역의 감시 및 경계 등의 임무를 수행하기 위한 목적으로 그 활용도는 상당히 크다. 본 논문에서는 감시정찰 센서네트워크에서 발생되는 가상의 데이터를 기반으로 네트워크 내의 중요 노드를 파악하고자 한다. 센서 노드로부터 전송되는 데이터는 센서의 측정 범위 내에서 임의로 정하였고, 이를 대상으로 주성분 분석 기법으로 중요한 노드들을 선정하였다. 중요 노드가 파악되면 해당 센서노드들에 대해 물리적으로 관리가 용이하게 되고, 문제 발생 시 보안 대책을 수립할 수 있다. 이것은 센서 네트 워크망에 대한 효용 및 수명과도 직결되며 비용 측면에서도 효과적이다.

Supplementary Event-Listener Injection Attack in Smart Phones

  • Hidhaya, S. Fouzul;Geetha, Angelina;Kumar, B. Nandha;Sravanth, Loganathan Venkat;Habeeb, A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4191-4203
    • /
    • 2015
  • WebView is a vital component in smartphone platforms like Android, Windows and iOS that enables smartphone applications (apps) to embed a simple yet powerful web browser inside them. WebView not only provides the same functionalities as web browser, it, more importantly, enables a rich interaction between apps and webpages loaded inside the WebView. However, the design and the features of WebView lays path to tamper the sandbox protection mechanism implemented by browsers. As a consequence, malicious attacks can be launched either against the apps or by the apps through the exploitation of WebView APIs. This paper presents a critical attack called Supplementary Event-Listener Injection (SEI) attack which adds auxiliary event listeners, for executing malicious activities, on the HTML elements in the webpage loaded by the WebView via JavaScript Injection. This paper also proposes an automated static analysis system for analyzing WebView embedded apps to classify the kind of vulnerability possessed by them and a solution for the mitigation of the attack.

Formation of Scenarios for The Development of The Tourism Industry of Ukraine With The Help of Cognitive Modeling

  • Shelemetieva, Tetiana;Zatsepina, Nataly;Barna, Marta;Topornytska, Mariia;Tuchkovska, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.8-16
    • /
    • 2021
  • The tourism industry is influenced by a large number of factors that affect the development scenarios of the tourism in different ways. At the same time, tourism is an important component of the national economy of any state, forms its image, investment attractiveness, is a source of income and a stimulus for business development. The aim of the article is to conduct an empirical study to identify the importance of cognitive determinants in the development of tourism. The study used general and special methods: systems analysis, synthesis, grouping, systematization, cognitive modeling, cognitive map, pulse method, predictive extrapolation. Target factors, indicators, and control factors influencing the development of tourism in Ukraine are determined and a cognitive model is built, which graphically reflects the nature of the influence of these factors. Four main scenarios of the Ukrainian tourism industry are established on the basis of creating a matrix of adjacency of an oriented graph and forecast modeling based on a scenario approach. The practical significance of the obtained results lies in the possibility of their use to forecast the prospects of tourism development in Ukraine, the definition of state policy to support the industry that will promote international and domestic tourism.

A Coherent Algorithm for Noise Revocation of Multispectral Images by Fast HD-NLM and its Method Noise Abatement

  • Hegde, Vijayalaxmi;Jagadale, Basavaraj N.;Naragund, Mukund N.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.556-564
    • /
    • 2021
  • Numerous spatial and transform-domain-based conventional denoising algorithms struggle to keep critical and minute structural features of the image, especially at high noise levels. Although neural network approaches are effective, they are not always reliable since they demand a large quantity of training data, are computationally complicated, and take a long time to construct the model. A new framework of enhanced hybrid filtering is developed for denoising color images tainted by additive white Gaussian Noise with the goal of reducing algorithmic complexity and improving performance. In the first stage of the proposed approach, the noisy image is refined using a high-dimensional non-local means filter based on Principal Component Analysis, followed by the extraction of the method noise. The wavelet transform and SURE Shrink techniques are used to further culture this method noise. The final denoised image is created by combining the results of these two steps. Experiments were carried out on a set of standard color images corrupted by Gaussian noise with multiple standard deviations. Comparative analysis of empirical outcome indicates that the proposed method outperforms leading-edge denoising strategies in terms of consistency and performance while maintaining the visual quality. This algorithm ensures homogeneous noise reduction, which is almost independent of noise variations. The power of both the spatial and transform domains is harnessed in this multi realm consolidation technique. Rather than processing individual colors, it works directly on the multispectral image. Uses minimal resources and produces superior quality output in the optimal execution time.

MACSec의 단말 이동성 성능평가 (Performance Evaluation of MACSec for Host Mobility)

  • 안상준;신동천
    • 한국전자거래학회지
    • /
    • 제24권2호
    • /
    • pp.55-70
    • /
    • 2019
  • 통신 인프라 구축과 최적화를 위해서는 각 구성 요소들의 연관성을 고려할 필요가 있다. 본 논문에서는 최적화된 통신 인프라 구축을 위해 필요한 주요 고려사항을 바탕으로 성능이 향상된 MACSec 기반의 통신 인프라 구성 방안을 제시한다. 제안된 MACSec 기반 기술은 통신 인프라를 처음부터 다시 설계하지 않고 IPSec 기술을 별도의 장비를 추가하지 않고 대체할 수 있다. 아울러, 구성 시 주요 고려사항인 메시지 오버헤드와 암호화 처리 성능, 그리고 이동성 측면에서 실험을 통해 IPSec과 성능을 평가한다. 시험 결과에 따르면 MACSec으로 구현된 암호화 네트워크에서 IPSec보다 Hop 지연과 메시지 오버헤드와 같은 일반적 성능뿐만 아니라 연결 지점 변경 시험을 통해 이동성 성능이 우위에 있다.

Health Care Optimization by Maximizing the Air-Ambulance Operation Time

  • Melhim, Loai Kayed B.
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.357-361
    • /
    • 2022
  • Employing the available technologies and utilizing the advanced means to improve the level of health care provided to citizens in their various locations. Citizens have the right to get a proper health care services despite the location of their residency or the distance from the health care delivery centers, a goal that can be achieved by utilizing air ambulance systems. In such systems, aircrafts and their life spans are the essential component, the flight duration of the aircraft during its life span is determined by the maintenance schedule. This research, enhances the air ambulance systems by presenting a proposal that maximizes the aircraft flight duration during its life span. The enhancement will be reached by developing a set of algorithms that handles the aircraft maintenance problem. The objective of these algorithms is to minimize the maximum completion time of all maintenance tasks, thus increasing the aircraft operation time. Practical experiments performed to these algorithms showed the ability of these algorithms to achieve the desired goal. The developed algorithms will manage the maintenance scheduling problem to maximize the uptime of the air ambulance which can be achieved by maximizing the minimum life of spare parts. The developed algorithms showed good performance measures during experimental tests. The 3LSL algorithm showed a higher performance compared to other algorithms during all performed experiments.

Evolutionary Computing Driven Extreme Learning Machine for Objected Oriented Software Aging Prediction

  • Ahamad, Shahanawaj
    • International Journal of Computer Science & Network Security
    • /
    • 제22권2호
    • /
    • pp.232-240
    • /
    • 2022
  • To fulfill user expectations, the rapid evolution of software techniques and approaches has necessitated reliable and flawless software operations. Aging prediction in the software under operation is becoming a basic and unavoidable requirement for ensuring the systems' availability, reliability, and operations. In this paper, an improved evolutionary computing-driven extreme learning scheme (ECD-ELM) has been suggested for object-oriented software aging prediction. To perform aging prediction, we employed a variety of metrics, including program size, McCube complexity metrics, Halstead metrics, runtime failure event metrics, and some unique aging-related metrics (ARM). In our suggested paradigm, extracting OOP software metrics is done after pre-processing, which includes outlier detection and normalization. This technique improved our proposed system's ability to deal with instances with unbalanced biases and metrics. Further, different dimensional reduction and feature selection algorithms such as principal component analysis (PCA), linear discriminant analysis (LDA), and T-Test analysis have been applied. We have suggested a single hidden layer multi-feed forward neural network (SL-MFNN) based ELM, where an adaptive genetic algorithm (AGA) has been applied to estimate the weight and bias parameters for ELM learning. Unlike the traditional neural networks model, the implementation of GA-based ELM with LDA feature selection has outperformed other aging prediction approaches in terms of prediction accuracy, precision, recall, and F-measure. The results affirm that the implementation of outlier detection, normalization of imbalanced metrics, LDA-based feature selection, and GA-based ELM can be the reliable solution for object-oriented software aging prediction.

Organization of Independent Work of Students of Higher Pedagogical Universities of Ukraine by Means of Moodle

  • Alla, Lukіianchuk;Dmytro, Yefimov;Oksana, Biletska;Andrii, Hrytsenko;Oxana, Hevko
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.421-426
    • /
    • 2022
  • This study aimed to determine the effectiveness of the Moodle system in the organization of independent work of students of pedagogical profile.The purpose of the article is to analyze the Moodle platform as an innovative element of educational and pedagogical strategies and a component of the educational and methodological content for the self-study of students.Methodology is divided into clusters: general scientific (analysis, classification), ICT methods (modeling, informatization), and philosophical (synergetics). The study revealed the reorientation of Moodle from an auxiliary element to an alternative format in the organization of independent work of student teachers. Prospects for further scientific research determined in the interest of all participants in the educational process in the further development of Moodle as an effective tool for self-education of future teachers.