• Title/Summary/Keyword: 네트워크 오용

Search Result 87, Processing Time 0.027 seconds

The Study on Reducing Voltage Sags Due to The Distribution System Faults (배전계통 사고에 의한 전압저하 저감방법에 관한 연구)

  • 김진성;오용택;노대석
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.4
    • /
    • pp.88-96
    • /
    • 2004
  • The sag is phenomenon that magnitude of load voltage temporarily decreases because of power system fault. If a certain equipment in industrial process have any trouble result from sag, it can cause utility to be charged for enormous economics loss. Therefore it need to analyze the characteristic of sag and then mitigation method for sags in distribution system in oder to increase reliability. This paper suggests a sags mitigation method with concentrating on mitigation-device interface method, especially FCL that is Fault Current Limiter. And this effect has been done using PDCAD/EMTDC computer simulation analysis.

A Construction of HA System that introduce Home Network of PLC base in existing environment (PLC 기반의 Home Network를 기존환경에 바로 도입 가능한 Home Automation System 연구)

  • Shin Kyung-Chul;Oh Young-Sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.05a
    • /
    • pp.320-328
    • /
    • 2005
  • Government is supporting development of home networking. But, this new system is much expensive to introduce in the home. And limit for establishment is so many in the home. Therefore, in this paper, Present direction of home automation system that can have high efficiency into low expense, induction of automation system is easied in the home. Also, install can be easy and do remote control in PC, HP, PDA because use PLC or HN RF, DB.

  • PDF

Design of Ubiquitous Home Automation System for 35-Pyung Apartment Based on USN Environment (USN 환경을 도입한 35평 아파트의 유비쿼터스 가정자동화 시스템의 설계)

  • Shin Kyoung-Chul;Oh Young-Sun;Kim Woo-Sung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.345-353
    • /
    • 2005
  • Government is supporting development of home networking. But, this new system is much expensive to introduce in the home. And limit for establishment is so many in the home. Therefore, in this paper, We escape from monotonic control of Home Automation and draw a plan Intelligent Home Automation to be developed. We reflect Home Network to the foundation and propose Home Automation on Ubiquitous Sensor Network, We Design of Ubiquitous Home Automation System for 35-Pyung Apartment Based on USN Environment. This becomes the Home Automatic Behavior System which is executed to the automatic to be improved.

  • PDF

Network Analysis on Herbal Combinations in Korean Medicine for Insomnia (불면 처방 활용 본초의 네트워크 분석)

  • Kim, An-na;Kim, Hong-jun;Song, Beom-yong;Lee, Seung-ho;Cho, Yong-ho;Oh, Yongtaek
    • Journal of Korean Medical classics
    • /
    • v.31 no.4
    • /
    • pp.69-78
    • /
    • 2018
  • Objectives : The aim of this study was to diversify the interpretation of formulas used for insomnia treatment by searching and analyzing herbal combinations in formulas used for insomnia treatment in Korean medicine. Methods : Frequency analysis was conducted on herbal combinations of 255 formulas related with insomnia, along with network analysis using Netminer 4.2.1. Results : This study has found herbal combinations used frequently in Korean medicine formulas used for insomnia treatment, and a result of network analysis composed of four communities. Each community consisted of herbs in affiliation of Yookmijihwangtang(六味地黃湯) and Samultang(四物湯), Bohyulchunghwatang(補血淸火湯) and Ondamtang(溫膽湯), Jungjihwan(定志丸) and Sanjointang(酸棗仁湯). Conclusions : This study could help in assisting researchers to diversify formula analysis in future studies. Moreover, the herbal combination in insomnia formulas could be used to search for insomnia formulas in other databases or creating a new prescription.

Treatment Information based Risk Evaluation Method in Medical Information Systems (의료정보시스템에서 치료정보 기반 위험도 평가 방법론)

  • Choi, Donghee;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.9
    • /
    • pp.441-448
    • /
    • 2016
  • RBAC(Role-Based Access Control), which is widely used in Medical Information Systems, is vulnerable to illegal access through abuse/misuse of permissions. In order to solve this problem, treatment based risk assessment of access requests is necessary. In this paper, we propose a risk evaluation method based on treatment information. We use network analysis to determine the correlation between treatment information and access objects. Risk evaluation can detect access that is unrelated to the treatment. It also provides indicators for information disclosure threats of insiders. We verify the validity using large amounts of data in real medical information systems.

금융 어플리케이션을 위한 효율적인 역할추출과 안전한 역할기반 접근통제 적용 방안

  • Jeong, Seong-Min
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.49-61
    • /
    • 2008
  • IT기술의 변화에 따라 금융기관의 정보보호 또한 안정성을 보장하면서도 새로운 비즈니스모델에 적합한 보안대책이 요구되고 있다. 금융 어플리케이션의 보안은 정보의 기밀성, 무결성, 가용성을 만족하는 안전하고 신뢰할 수 있는 시스템과 네트워크, 그리고 보안사고에 큰 비중을 차지하고 있는 내부 사용자에 대한 적절한 권한 부여와 접근통제가 요구되어진다. 정당한 사용자가 접근하여 발생하는 보안 문제, 즉 내부자에 의한 악의적인 행위나 오용, 실수 등에 의한 기업의 피해는 외부자에 의한 의도적인 공격보다 피해 규모가 크다. 따라서 정당한 사용자로 인증을 받았다고 할지라도 업무처리에 있어서 필요한 최소한의 권한만을 부여하는 것이 필요한 것이다. 이를 위해 금융기관에 적합한 접근통제가 필요하다. 역할기반 접근통제는 적용범위가 제한적인 강제적 접근통제와 분산된 보안관리로 중앙에서 통제가 어려운 자율적 접근통제의 단점을 보완하고, 실제 업무처리에 적합한 특성을 갖는다. 하지만 기존 역할기반 접근통제를 금융기관의 다양한 금융 어플리케이션에 적용하면 다음과 같은 문제가 발생할 수 있다. 첫째, 금융 어플리케이션에서 사용되는 역할 추출 및 관리가 어렵다. 둘째, 다양한 비즈니스모델이 원하는 직무분리가 복잡하고 어렵다. 셋째, 악의적인 내부 사용자가 역할을 변조하여 과도한 권한을 가질 수 있다. 따라서 본 논문에서는 기존의 역할기반 접근통제에 인사정보 연동을 통한 효율적인 역할 추출 및 분류방안과 역할관리, 직무분리의 세분화 그리고 역할의 안전한 관리를 위해 X.509기반의 권한관리 기반구조(PMI)를 이용한 권한관리 기술을 금융 어플리케이션 환경에 효율적으로 적용하는 방안을 제시한다.

Design of the Efficient Clock Recovery Circuit in the Communication Systems using the Manchester Encoding Scheme (맨체스터 부호를 사용하는 통신시스템에서 효율적인 클럭복원 회로의 설계)

  • 오용선;김한종;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.10
    • /
    • pp.1001-1008
    • /
    • 1991
  • .In this paper the efficient clock recovery algorithm is proposed to regenerate the manchester code at the system using the Manchester encoding scheme such as LAN. Mobile communication and digital communication systems. The proposed clock recovery circuit recovers the clock using the two times of the same original transmitted frequency can be completely recovered. The implementation of the proposed clock recovery circuit and the interpretation of test results prove the validity of the proposed algorithm.

  • PDF

Study of structural analysis on formulas from 『Onbyungjobyun』 using network analysis (네트워크 분석법을 이용한 『온병조변』 처방의 구조적 분석 연구)

  • Oh, Yongtaek;Kim, Hongjun;Kim, Anna
    • Herbal Formula Science
    • /
    • v.27 no.1
    • /
    • pp.65-71
    • /
    • 2019
  • Objective : This study aims to diversify interpretation of formulas from "Onbyungjobyun" by analyzing various formulas from "Onbyungjobyun" as basic formulas. Method : This study found herbal communities of combination by analyzing herbal combinations based on network analysis of formulas from "Onbyungjobyun", and has analyzed each community of combination as basic formulas. Result : The results of network analysis showed a total of 3 herbal communities of combination; first was medicinal herbs from Eungyo-san(銀翹散), Jeungaek-tang(增液湯), Bokmaek-tang(復脈湯), Gyeji-tang(桂枝湯), Sogeonjung-tang (小建中湯) series; second was medicinal herbs from Angungwoohwang-hwan(安宮牛黃丸); third was medicinal herbs from Baekho-tang(白虎湯), Jaseol-dan(紫雪丹), Sayeok-tang(四逆湯) series. Conclusion : The formulas from "Onbyungjobyun" are consisted of herbal communities of combination; that treat warm-heat pathogen and supplies yin essence or yang qi; treat reverse transmission to the pericardium(逆傳心包); and treat heat in the qi phase in Onbyeong and cold-dampness in the middle energizer.

The Bayesian Framework based on Graphics for the Behavior Profiling (행위 프로파일링을 위한 그래픽 기반의 베이지안 프레임워크)

  • 차병래
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.69-78
    • /
    • 2004
  • The change of attack techniques paradigm was begun by fast extension of the latest Internet and new attack form appearing. But, Most intrusion detection systems detect only known attack type as IDS is doing based on misuse detection, and active correspondence is difficult in new attack. Therefore, to heighten detection rate for new attack pattern, the experiments to apply various techniques of anomaly detection are appearing. In this paper, we propose an behavior profiling method using Bayesian framework based on graphics from audit data and visualize behavior profile to detect/analyze anomaly behavior. We achieve simulation to translate host/network audit data into BF-XML which is behavior profile of semi-structured data type for anomaly detection and to visualize BF-XML as SVG.

An Analysis of Intrusion Pattern Based on Backpropagation Algorithm (역전파 알고리즘 기반의 침입 패턴 분석)

  • Woo Chong-Woo;Kim Sang-Young
    • Journal of Internet Computing and Services
    • /
    • v.5 no.5
    • /
    • pp.93-103
    • /
    • 2004
  • The main function of the intrusion Detection System (IDS) usee to be more or less passive detection of the intrusion evidences, but recently it is developed with more diverse types and methodologies. Especially, it is required that the IDS should process large system audit data fast enough. Therefore the data mining or neural net algorithm is being focused on, since they could satisfy those situations. In this study, we first surveyed and analyzed the several recent intrusion trends and types. And then we designed and implemented an IDS using back-propagation algorithm of the neural net, which could provide more effective solution. The distinctive feature of our study could be stated as follows. First, we designed the system that allows both the Anomaly dection and the Misuse detection. Second, we carried out the intrusion analysis experiment by using the reliable KDD Cup ‘99 data, which would provide us similar results compared to the real data. Finally, we designed the system based on the object-oriented concept, which could adapt to the other algorithms easily.

  • PDF