• Title/Summary/Keyword: 실용적 관리

Search Result 277, Processing Time 0.03 seconds

The Design and Implementation for Practical Risk Analysis Method & Modules (실용적인 위험분석 방법론 설계와 모듈 구현)

  • 정윤정;김인중;이철원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.11C
    • /
    • pp.1081-1089
    • /
    • 2002
  • In these days many Organizations recognize risk of information asset by rapid change of information system environments, and need suitable management for that. Also many organization which operate important information-communication infrastructure take interest in threat, vulnerability and risk analysis of important asset by enforcement of Act on protection of information and communication infrastructure. But, it is most that methodology and tools that analyze risk for organization's information asset are developed in abroad up to now, domestic research of this field is insufficient stage. An research of this field is necessary in domestic because it can't reflect domestic actuality by depending on most foreign methodology or a tool. In this paper we proposed design and implementation for the risk analysis methodology, a prototype and important modules that considers the user convenience. We expect that the result of this paper will for step improvement of domestic risk analysis methodology and tool development.

Hetero-core Spliced Fiber Optic Sensing System for Environmental Monitoring (환경정보 모니터링을 위한 헤테로코어형 광파이버 센싱 시스템)

  • Kim, Young Bok;Kim, Young Bae;Lee, Hwan Woo
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.3
    • /
    • pp.77-81
    • /
    • 2008
  • In this paper, we introduce a multi purpose environmental monitoring system developed as a commercially available standard using the technique of hetero-core spliced fiber optic sensor. The monitoring system has been tested and evaluated in a possible outdoor condition in view of the full scaled operation at actual sites to be monitored. Additionally, the developed system in this work conveniently provides us with various options of sensor modules intended for monitoring such physical quantities as displacement, distortion, pressure, binary states, and liquid adhesion. Two channels of optical fiber line were monitored, in each of which three displacement sensor modules were connected in series, in order to examine the performance to a pseudo-cracking experiment in the outdoor situation, and to clarify temperature influences to the system in terms of the coupling of optical connectors and the OTDR stability. The pseudo-cracking experiment successfully observed the actually given cracks by means of calculation based on the detected displacement values and their geometrical arrangement of the used sensor modules. And the robustness to the temperature is verified in the various temperature change.

  • PDF

A Study on the Scale Effort Estimation Model based on Industry Characteristics (산업별 특성에 따른 소요공수 규모 산정 모델 연구)

  • Kwoak, Song-Hae;Park, Koo-Rack;Kim, Dong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.233-240
    • /
    • 2016
  • Information system development projects, have a mechanism for many of the costs generated by a variety of risk factors. In general, the probability that the software project of the information system is carried out successfully in the delivery time is very low. This prediction of a formal cost is needed as the most important factor since it can prevent the project from being failed. However, objectivity of most of the project scale calculation during the calculation criteria is insufficient. Further, it is the actual situation that the management of the base line is not properly made during the project. Therefore, in this paper, we propose a model to calculate the number of steps it takes to develop on the basis of a methodology in an attempt to overcome the limitation of being unpractical in the early stage of the information system development project. It is expected to be a tool to estimate the effort and cost required by the information system development business through these convergence proposals model.

A Study about Early Detection Techniques of Cyber Threats Based Honey-Net (허니넷 기반의 사이버위협 조기탐지기법 연구)

  • Lee, Dong-Hwi;Lee, Sang-Ho;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.67-72
    • /
    • 2005
  • The exponential increase of malicious and criminal activities in cyber space is posing serious threat which could destabilize the foundation of modern information society. In particular, unexpected network paralysis or break-down created by the spread of malicious traffic could cause confusion and disorder in a nationwide scale, and unless effective countermeasures against such unexpected attacks are formulated in time, this could develop into a catastrophic condition. In order to solve a same problem, this paper researched early detection techniques for only early warning of cyber threats with separate way the detection due to and existing security equipment from the large network. It researched the cyber example alert system which applies the module of based honeynet from the actual large network and this technique against the malignant traffic how many probably it will be able to dispose effectively from large network.

  • PDF

A Study on the Electronic Voting Scheme Suitable for Large Scale Election (대규모 선거에 적합한 전자 선거 기법에 관한 연구)

  • Yun, Seong-Hyeon;Kim, Tae-Yun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.543-551
    • /
    • 1997
  • Many areas of human activities are computerized with the wide spread use of computers and communication networks.Electrinic voting is an important social activity in democtatic society.The realization of electronic democracy is based on the sectrity of edectronic voting scheme.Therefore, it is necessary to use the cryto-graphic technique for secure electronic voting scheme.Therefore, it is necessary to use the cryto-graghic technique for secure election.In this stusy, an dedctronic voting scheme sutiable for large election is proposed.In order to make practi-cal volting scheme, we assume that the voting authorization center is trustful and the chaum's anonymous com-munication channel[6] prepared before the election day.The center authorizes the ballot of eligible voter by using the ID based digital signature scheme in the registeation stage.During the voting stage, undeniable chal-lenge/ response prorocol is performed between the center and the boters to ensure that the intemediate voting results should not affect the entire.The proprsed scheme fully conforms to the requirments of large scale election such as privacy of the voters, fairness, unresuability, unforgeability and eligbility.

  • PDF

A Method of Selecting Open Source Software by IFCS (IFCS에 의한 오픈소스 소프트웨어 선정기법)

  • Jeon, Hye-Young;Jin, Jing-Shu;Rhew, Sung-Yul
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.119-128
    • /
    • 2010
  • The application field of OSS is being expanded farther and the existing studies are well established theoretically but not actually widely used. Because so many criteria and complexity of selection methods result in low efficiency and not proper for use. In this master's thesis, to solve these problems I propose a selecting technique for OSS with less criteria, which is more effective and easy to use than before. Based on the existing studies, we identify assessment criteria which common used and redefine 14 evaluation attributes as well as 31 assessment criteria through elimination and grouping. And evaluate the criteria in four steps such as Initial assessment, Functional assessment, Characteristical assessment and Supplemental assessment. To evaluate the adequacy of suggested technique, 29 database management tools for MySQL are selected as candidates, and applied to the technique I proposed. As the result, time and effort for evaluation is reduced sharply and we can use this technique more easily.

Design of The Geographic Information Database Structure for Census Mapping (센서스 지도제작을 위한 지리정보데이타베이스 구조연구)

  • 김설희
    • Spatial Information Research
    • /
    • v.1 no.1
    • /
    • pp.17-28
    • /
    • 1993
  • In order to minimize vectorizing tasks, which require huge reso¬urces and time and to support the census mapping effectively, the geographic information databases structure has been studied. The steps of the new approach are as follows. : Step 1, Scanning the maps of the whole country and storing the image data in raster format. Step 2, Vectorizing the data of specific items for Census operation such as Enume¬ration District, and then linking to attribute data in the text format. Step 3, Designing the database with a Tile and Multi-layer structure to make a continuous map logically. Step 4, Implement Censlls Mapping System(CMS) for efficient mapping and retrieving. As a consequence of this study, the cost, manpower and time effectiveness was proved and it was confirmed to produce lIseful and high-qual ified maps for the Census. In the future, this system wi II be able to provide many organizations and individuals with the various data based on geographical statistical information.

  • PDF

Agent-based Service Composition in Multi-party Collaboration Environments (다자간 협업 환경에서 에이전트 기반 서비스 합성)

  • Han, Sang-Woo;Kim, Jong-Won
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.74-84
    • /
    • 2008
  • To support advanced collaboration among knowledge workers distributed geographically, there have been extensive researches under the scope of ubiquitous computing environments. Especially, to cope with several known problems in traditional room-based collaboration environments such as uncomfortable sharing of visuals and documents and difficult operation of collaboration tools, several conceptual frameworks are designed and prototyped. Focusing on practical and interactive collaboration with remote nodes, in this paper, we conceptually design an agent-based service composition model for multi-party collaboration environments. The proposed model is designed to automatically discover and combine services to achieve given tasks in a collaboration environment by using high-level user commands (without the knowledge of internal architecture). Based on the service composition model, we develop a multi-agent-based management toolkit for multi-party collaboration environments. It provides easy-to-use GUI to operate various services in an environment and perform service composition algorithm to discover appropriate services and combine them. To explore the possibility of the toolkit we implement collaboration services to support video conference by using the toolkit.

Reliability-Based Assessment of Safety and Load Carrying Capacity of Steel-Box Pedestrian Bridges (신뢰성에 기초한 강상형 보도육교의 안전도 및 내하력 평가)

  • 조효남;최영민;이은철
    • Computational Structural Engineering
    • /
    • v.10 no.2
    • /
    • pp.189-201
    • /
    • 1997
  • A number of standard type of steel-box pedestrian bridges are constructed in th metropolitan high way or heavy traffic urban area. Although it has the advantage of speedy construction because of its simple structural form and prefabricated erection method, it has been reported that many of these bridges are deteriorated or damaged and thus are in the state such that it would give unsafe and uncomfortable feeling to pedestrians. In the paper, for the realistic assessment of safety and load carrying capacity of deteriorated and/or damaged steel box pedestrian bridges, an interactive non-linear limit state model is formulated based on the von Mises' combined stress yield criterion. It has been demonstrated that the proposed model is effective for the reliability-based safety assessment and load carrying capacity evaluation of steel-box pedestrian bridges. In addition, this study suggests an effective and practical field load test method for pedestrian bridges.

  • PDF

Janus-FTL Adjusting the Size of Page and Block Mapping Areas using Reference Pattern (참조 패턴에 따라 페이지 및 블록 사상 영역의 크기를 조절하는 Janus-FTL)

  • Kwon, Hun-Ki;Kim, Eun-Sam;Choi, Jong-Moo;Lee, Dong-Hee;Noh, Sam-H.
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.918-922
    • /
    • 2009
  • Naturally, block mapping FTL works well for sequential writes while page mapping FTL does well for random writes. To exploit their advantages, a practical FTL should be able to selectively apply a suitable scheme between page and block mappings for each write pattern. To meet that requirement, we propose a hybrid mapping FTL, which we call Janus-FTL, that distributes data to either block or page mapping areas. Also, we propose the fusion operation to relocate the data from block mapping area to page mapping area and the defusion operation to relocate the data from page mapping area to block mapping area. And experimental results of Janus-FTL show performance improvement of maximum 50% than other hybrid mapping FTLs.