• Title/Summary/Keyword: security window

Search Result 118, Processing Time 0.021 seconds

Development of Loss Prevention System WatchDog for Safe Saving and Management of Edited E-mail Attachment (전자 메일첨부 편집파일의 안전한 저장과 관리를 위한 분실 방지 시스템 WatchDog 개발)

  • Hong, Jun-Hu;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1059-1064
    • /
    • 2018
  • Many users feel a great pain owing to losing edited files. It is very serious loss in time and money. This problem occurs because email attachments are edited in 'Inbox' and the compute immediately shuts down with 'Save'. This is caused by the illusion that the 'save' in a temporary folder is saved to a secure hard disk. Our thesis proposes a loss-prevention system WatchDog for safe storage and folder management of the e-mail attachments. The proposed system operates a warning window pop-up when we 'Open(O)' and 'Save' the attachment. In addition, convenient folder management plans for safe copying and movement are shown through example programs.

The Relationship between the Stage of Exercise Behavior Change and Physical Self-Concept and Self-Efficacy of Casino Security Employees (카지노 시큐리티 종사자의 운동변화단계에 따른 신체적 자기개념과 자기 효능감의 관계)

  • Chun, Yong-Tae;Oh, Jung-Il
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.95-120
    • /
    • 2009
  • This study was designed to investigate the relationship between the stages of exercise behavior change and physical self-concept and self-efficacy of security employees in hotel casinos. The sampling was drawn from employees at 8 casinos which had more than 30 employees. Participants were selected by convenience sampling method and they completed questionnaires about Physical Self-Concept and Self- Efficacy by self-administration method under supervision of trained researchers SPSS 16.0 (Statistical Package for the Social Science) was used for data analysis in the present study. Reliability and validity were examined for the present study. The principle component factor analysis and varimax rotation were used for the present study. Eigen value 1.0 was the criterion for selecting factors. Chi-square (X) 2 test was utilized for measuring the difference in gender and types of job duties at the stages of exercise behavior change. One-way ANOVA was employed to examine the relationship between the stages of exercise behavior change as an independent variable and physical self-concept and self-efficacy as dependent variables. The Scheffe method was used to determine mean differences of groups as a follow-up test. Multiple regression analysis was utilized to test the difference of physical self-concept as dependent variable and self-efficacy as independent variable. To verify hypothesis for the study, a statistical significance level of $\alpha$=.05 was used. The results were as follow: first, there were differences found for gender and types of job responsibilities in the stages of exercise behavior change. Secondly, as security employees progressed through the stages of exercise behavior change, their physical self-concept and self-efficacy improved. Finally, physical activity and body fat had significant main effects on self-efficacy.

  • PDF

Design of the Network Computer Architecture based on a Web Browser (웹 브라우저 기반의 네트워크 컴퓨터 아키텍쳐 설계)

  • Song, Min-Gyu
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.607-616
    • /
    • 2008
  • By the advancement of computer & network technology, the paridigm of 'Network Computer' has been realizing`. In what is called network computer, computer system and computing resource is incomparably seem to be expanded compared with conventional network technology[1]. Network connected computer system consitute a massive virtual computer, it is possible for people to use an enourmous amout of computing resource distributed widely through the network. It is also possible that we make client lightweight by the use of computer system & all shared computing resources on the network in our computer processing and we call this type of client system as thin-client. Thin-client and network computer are on and the same network paradigm in that both paradigm featuring the active use of computer system and resource on the network[2]. In network computer paragem, network itself is regarded as a basic platform for the transfer of application, so it is possible that client access remote serve system to run remote applications through the network[3]. In this paper, we propose the system architecture for the implementation of network computer by the use of Web browser, X window system and Pyjamas. By the use of network computer proposed in this paper, it is possible for people to run application on the server system as if he run local application, and it is expected to improve the security and maintenance efficiency.

  • PDF

A Fast Moving Object Tracking Method by the Combination of Covariance Matrix and Kalman Filter Algorithm (공분산 행렬과 칼만 필터를 결합한 고속 이동 물체 추적 방법)

  • Lee, Geum-boon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1477-1484
    • /
    • 2015
  • This paper proposes a robust method for object tracking based on Kalman filters algorithm and covariance matrix. As a feature of the object to be tracked, covariance matrix ensures the continuity of the moving target tracking in the image frames because the covariance is addressed spatial and statistical properties as well as the correlation properties of the features, despite the changes of the form and shape of the target. However, if object moves faster than operation time, real time tracking is difficult. In order to solve the problem, Kalman filters are used to estimate the area of the moving object and covariance matrices as a feature vector are compared with candidate regions within the estimated Kalman window. The results show that the tracking rate of 96.3% achieved using the proposed method.

Qualitative Case Study on Theraplay Application of Children with Eating Disorder : Focusing on Polyvagal Theory (섭식장애아동의 치료놀이 적용에 대한 질적 사례 연구 : Polyvagal 이론을 중심으로)

  • Kim, Seyoung;Yoo, Meesook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.601-612
    • /
    • 2018
  • This study is a clinical single case study of the application of Theraplay approach for the treatment of children with eating disorder based on Polyvagal Theory. The first research question is how children with eating disorder change through Theraplay. The second research question is to analyze what the therapeutic factors are for changes in children with eating disorder. To do this, I used a qualitative case study method that explores a small number of cases closely and reveals the case deeply. As a result, the client has a sense of security in Theraplay session, expands the window of tolerance and develops a social engagement system. Through these, client become increasingly adaptable and overcome eating disorder. The results of this study can contribute to neuroscience validation of the counseling effect.

Landscape Design of KangWon Provincial Police Agency (강원도 지방경찰청 조경설계)

  • 이시영;김신원
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.30 no.2
    • /
    • pp.79-87
    • /
    • 2002
  • This landscape design proposal was presented to a design competition for the KangWon Province Police Agency(KPA). The site, about 27,711 $m^2$, is located at 293-4 Udu-dong, Chunchun, KangWon-Do. Design objectives of the KPA were to build a symbolic place which fall community members with pride, to elevate an identity and status of the KPA by creating a landscape correspondent to the concept of the building design, to provide community residents with a space to enjoy cultural and social activities, and to make environment friendly space. The main concept was developed by one of characteristics of the traditional spatial structure of Korea known as an, 'Open and Closed spatial structure.'By re-interpreting the traditional spatial structure and applying it to the site, the design met the various desires of the KPA. The site is primarily segmented into 6 sub spaces; entrance space Podori plaza, symbolic court, police billeting area, sports area, and rear rest area. The entrance space, Podori plaza, and symbolic court on the south-west part of the site represent the publicity of the site as the concept of ″open space.″ On the contrary, considering the specialty of police affairs, the north-east part of the site, which contains the police billeting area and rest area, were designed to maintain security by using the concept of ″closed space.″ To express an identity of the KPA, 'Podori', a police mascot, the plaza was designed and is suppose to function as the hub of the community. In the front section of the plaza, a symmetrical planting pattern, centering the strong axis, was introduced to strengthen its symbolic meaning. Traditional window frames such as the pattern of 'Pisal-jige'and 'Umulsal-jige' were used for the paving system which is applied as the environment friendly design. Site facilities and furnitrue were placed at every important spot in order to connect various spaces organically. As these well-tied spaces properly shared their function, spatial sequence and management would be promoted. The entire space was designed to allow free access of handicapped people. This proposal is meant to create a new image of KangWon province and to enhance the way of inhabitants' think about their community.

Design and Implementation of Internet Worm Spreading Prevention System (인터넷 웜 확산방지 시스템의 설계 및 구현)

  • 최양서;서동일
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.327-331
    • /
    • 2004
  • The new cyber world has created by Internet that is prosperous rapidly. But with the expansion of Internet the hacking and intrusion are also increased very much. Actually there were many incidents in Internet, but the damage was restricted within a local area and local system. However, the Great 1.25 Internet Disturbance has paralyzed the national wide Internet environment. It because the Slammer Worm. The worm is a malformed program that uses both of the hacking and computer virus techniques. It autonomously attacks the vulnerability of Windows system, duplicates and spreads by itself. Jus like the Slammer Worm, almost every worms attack the vulnerability of Windows systems that installed in personal PC. Therefore, the vulnerability in personal PC could destroy the whole Internet world. So, in this paper we propose a Internet Worm Expanding Prevention System that could be installed in personal PC to prevent from expanding the Internet Worm. And we will introduce the results of developed system.

  • PDF

Improvement of ITSM IT Service Efficiency in Military Electronic Service

  • Woo, Hanchul;Jeong, Suk-Jae;Huh, Jun-Ho
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.246-260
    • /
    • 2020
  • IT Service Management (ITSM) achieves consolidated management for the IT services supporting the acquisition system, and no outside connections can be established with such ITSM. Issues pertaining to the D2B can be addressed to System Q&A or a Call Center for problem-solving. In other words, internal staff can take the necessary measures for problems by directly connecting with ITSM. Currently, diverse innovative technologies are being used in electronics and ubiquitous computing environments. This allows us to create a better world by providing the backbone for remarkable development in our human society in the fields of electronics, devices, computer science, and engineering. Following the expansion of IT services in the military acquisition sector such as Defense Electronic Procurement, military export/import support system, etc., customers' dependence on IT for conducting business with the military or related companies is increasing, including the military's dependence on the same technology for services to the public. Nonetheless, issues pertaining to the simplified/integrated management of complex IT service management systems, including slow system recovery, lack of integrated customer service window, and insufficient information sharing, have become the priority problems that IT managers are required to solve. Therefore, this study conducted research on the integrated management of IT services provided by Korea's national defense acquisition system, which was developed based on the existing system IT Infrastructure Library (ITIL) v2, and investigated the level of satisfaction with services with focus on ensuring that it can be used for understanding the necessity of the system and its advancement in the future.

Design of Constellation Content for Children Applied to Car Glass Roof (승용차 글라스루프를 활용한 어린이용 별자리 콘텐츠 디자인)

  • Choe, Jong-Hoon;Jung, Su-Young;Choi, Yu-Mi;Kwon, Min-Jeong
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.7
    • /
    • pp.141-149
    • /
    • 2013
  • Recently, the time in which children moves by car become frequent, they stay longer in the car because leisure life including camping and etc. increased. Children whose physical activities are active were subject to restriction because of the limited car boarding visual space and on security. Because of limited space in cars, domestic and foreign automotive companies show the different glass roof applied in cars that exhibited wide clear view in order to remove tedious and stuffy of children while they stay for a long time inside the car. In addition, the potential probability in which the Smart Car that the IT technology is grafted research and research that it utilizes the door window glass as the display is progressed and which the glass roof can be used as the screen can be sufficient. In this study, the in-vehicle display application case and Smart Devices constellation application were benchmarked. The car glass roof application method of the constellation studying content which performed the user survey for the child by the car with the parents whose movement is frequent and considers the child and fundamental interaction way tried to be drawn and we try to propose.

Construction of Embedded Data Synchronization Gateway (임베디드 자료동기화 게이트웨이 구축)

  • Park, Ju-Geon;Park, Kee-Hyun;Woo, Jong-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.335-342
    • /
    • 2010
  • Nowadays, the major manufacturer of the mobile devices has offered its own solution for the data synchronization. But each manufacturer uses its proprietary data synchronization method so that the compatibility of data can not be guaranteed. To solve such problems, a gateway is needed to convert different forms of data into a unified form of data and vice versa. Some problems have been found in the experiments with the previously implemented gateway. First, a bottleneck state might arise if a number of mobile devices request data synchronization simultaneously. Second, the gateway itself would become a serious vulnerable point to an attack during the process of converting received data. The proposed gateway can solve this bottleneck state and security issue since it converts data and processes synchronization request in a mobile device. In this paper, the proposed gateway is constructed and the results of some experiments with the gateway are presented. According to the results, the proposed gateway operates properly and it is relatively insensitive to the bottleneck state.