• Title/Summary/Keyword: 지식

Search Result 19,756, Processing Time 0.045 seconds

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

A Methodology for Translation of Operating System Calls in Legacy Real-time Software to Ada (Legacy 실시간 소프트웨어의 운영체제 호출을 Ada로 번역하기 위한 방법론)

  • Lee, Moon-Kun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2874-2890
    • /
    • 1997
  • This paper describes a methodology for translation of concurrent software expressed in operating system (OS) calls to Ada. Concurrency is expressed in some legacy software by OS calls that perform concurrent process/task control. Examples considered in this paper are calls in programs in C to Unix and calls in programs in CMS-2 to the Executive Service Routines of ATES or SDEX-20 other software re/reverse engineering research has focused on translating the OS calls in a legacy software to calls to another OS. In this approach, the understanding of software has required knowledge of the underlying OS, which is usually very complicated and informally documented. The research in this paper has focused on translating the OS calls in a legacy software into the equivalent protocols using the Ada facilities. In translation to Ada, these calls are represented by Ada equivalent code that follow the scheme of a message-based kernel oriented architecture. To facilitate translation, it utilizes templates placed in library for data structures, tasks, procedures, and messages. This methodology is a new approach to modeling OS in Ada in software re/reverse engineering. There is no need of knowledge of the underlying OS for software understanding in this approach, since the dependency on the OS in the legacy software is removed. It is portable and interoperable on Ada run-time environments. This approach can handle the OS calls in different legacy software systems.

  • PDF

The Role of Geography Education in Marine Education (해양 교육의 중요성과 지리 교육의 역할)

  • Yoon Ok-Kyong
    • Journal of the Korean Geographical Society
    • /
    • v.41 no.4 s.115
    • /
    • pp.491-506
    • /
    • 2006
  • In terms of the importance of ocean as a present and future resource and the Korean peninsular location, it is strongly urged to develop renewed recognition and educational programs on ocean, so as to respond properly to the newly emerging political changes surrounding the country. By setting up the purpose of marine education as engendering greater interests in and knowledge of ocean, this research suggests that the frame of marine education can be founded appropriately on four educational sub-categories: humanity education, territory education, economy education, and resources and environment education. At an operational scale, this paper particularly analyzed ocean- related contents in the 7th national curriculum in order to find substantial ways for strengthening marine education. The study simultaneously compared the result of content analysis with the curriculum of marine education in other countries, and founded that explicit ocean-related contents in the 7th curriculum were significantly limited. Yet, the study alternatively points out that it is possible to use a variety of teaching materials and apply them for writing textbooks or developing teaching-teaming curriculum. I provide some of the ways for strengthening marine education by using marine-related themes in the curriculum of geography education. Marine is not simply one of the key elements in the discipline of geography. But, more importantly, I suggest that geography is particularly useful in developing various and familiar themes such as swimming beach, fishing villages, ports, marine-bound industrial district and port cities into teaching materials.

자가 생성 지도 학습 알고리즘을 이용한 컨테이너 식별자 인식

  • Kim, Jae-Yong;Park, Chung-Sik;Kim, Gwang-Baek
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.500-506
    • /
    • 2005
  • 본 논문에서는 자가 생성 지도 학습 알고리즘을 이용한 운송 컨테이너 식별자 인식 시스템을 제안한다. 일반적으로 운송 컨테이너의 식별자들은 글자의 색이 검정색 또는 흰색으로 이루어져 있는 특정이 있다. 이러한 특성을 고려하여 원 컨테이너 영상에 대해 검은색과 흰색을 제외하고는 모든 부분을 잡음으로 처리하기 위해 퍼지 추론 방법을 이용하여 식별자 영역과 바탕영역을 구별한다. 식별자 영역으로 구분 된 영역은 그대로 두고, 바탕 영역으로 구분된 영역 은 전체 영상의 평균 픽셀 값으로 대체시킨다. 그리고 Sobel 마스크를 이용하여 에지를 검출하고, 추출된 에지를 이용하여 수직 블록과 수평 블록을 검출 하여 컨테이너의 식별자 영역을 추출하고 이진화한다. 이진화 된 식별자 영역에 대해 검정색의 빈도수를 이용하여 흰바탕과 민바탕을 구분하고 4 방향 윤곽선 추적 알고리즘을 적용하여 개별 식별자를 추출 한다. 개별 식별자 인식을 위해 자가 생성 지도 학습 알고리즘을 제안하여 개별 식별자 인식에 적용한다. 제안된 자가 생성 지도 학습 알고리즘은 입력층과 은닉층 사이의 구조를 ART-l을 개선하여 적용하고 은닉층과 출력층 사이에는 일반화된 델타 학습 방법과 Delta-bar-Delta 알고리즘을 적용하여 학습 및 인식 성능을 개선한다. 실제 80 개의 컨테이너 영상을 대상으로 실험한 결과, 제안된 식별자 추출 방법이 이전의 개별 추출 방법보다 추출률이 개선되었고 FCM 기반 자가 생성 지도 학습 알고리즘보다 제안된 자가 생성 지도 학습 알고리즘이 컨테이너 식별자의 학습 및 인식에 있어서 개선된 것을 확인하였다.색 문제를 해결하고자 하는 것이 연구의 목적이다. 정보추출은 사용자의 관심사에 적합한 문서들로부터 어떤 구체적인 사실이나 관계를 정확히 추출하는 작업을 가리킨다.앞으로 e-메일, 매신저, 전자결재, 지식관리시스템, 인터넷 방송 시스템의 기반 구조 역할을 할 수 있다. 현재 오픈웨어에 적용하기 위한 P2P 기반의 지능형 BPM(Business Process Management)에 관한 연구와 X인터넷 기술을 이용한 RIA (Rich Internet Application) 기반 웹인터페이스 연구를 진행하고 있다.태도와 유아의 창의성간에는 상관이 없는 것으로 나타났고, 일반 유아의 아버지 양육태도와 유아의 창의성간의 상관에서는 아버지 양육태도의 성취-비성취 요인에서와 창의성제목의 추상성요인에서 상관이 있는 것으로 나타났다. 따라서 창의성이 높은 아동의 아버지의 양육태도는 일반 유아의 아버지와 보다 더 애정적이며 자율성이 높지만 창의성이 높은 아동의 집단내에서 창의성에 특별한 영향을 더 미치는 아버지의 양육방식은 발견되지 않았다. 반면 일반 유아의 경우 아버지의 성취지향성이 낮을 때 자녀의 창의성을 향상시킬 수 있는 것으로 나타났다. 이상에서 자녀의 창의성을 향상시키는 중요한 양육차원은 애정성이나 비성취지향성으로 나타나고 있어 정서적인 측면의 지원인 것으로 밝혀졌다.징에서 나타나는 AD-SR맥락의 반성적 탐구가 자주 나타났다. 반성적 탐구 척도 두 그룹을 비교 했을 때 CON 상호작용의 특징이 낮게 나타나는 N그룹이 양적으로 그리고 내용적으로 더 의미 있는 반성적 탐구를 했다용을 지원하는 홈페이지를 만들어 자료

  • PDF

Comparisons of the Performance with Bayes Estimator and MLE for Control Charts Based on Geometric Distribution (기하분포에 기초한 관리도에서 베이즈추정량과 최대우도추정량 사용의 성능 비교)

  • Hong, Hwiju;Lee, Jaeheon
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.5
    • /
    • pp.907-920
    • /
    • 2015
  • Charts based on geometric distribution are effective to monitor the proportion of nonconforming items in high-quality processes where the in-control proportion nonconforming is low. The implementation of this chart is often based on the assumption that in-control proportion nonconforming is known or accurately estimated. However, accurate parameter estimation is very difficult and may require a larger sample size than that available in practice for high-quality process where the proportion of nonconforming items is very small. An inaccurate estimate of the parameter can result in estimated control limits that cause unreliability in the monitoring process. The maximum likelihood estimator (MLE) is often used to estimate in-control proportion nonconforming. In this paper, we recommend a Bayes estimator for the in-control proportion nonconforming to incorporate practitioner knowledge and avoid estimation issues when no nonconforming items are observed in the Phase I sample. The effects of parameter estimation on the geometric chart and the geometric CUSUM chart are considered when the MLE and the Bayes estimator are used. The results show that chart performance with estimated control limits based on the Bayes estimator is generally better than that based on the MLE.

A Study on the Competence of the Private Security Guards (민간경비원의 업무능력에 미치는 영향요인에 관한 연구)

  • Kim, Hak-Bum;Lee, Jae-Young
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.81-105
    • /
    • 2011
  • Lately, with the increase of the private security industry, individual quality improvement of the private security guards is rising. Especially, in accordance with competence of the private security guards, in the base of individual technical or knowledge, the confidence of own ability is essential for the improvement of the private security industry. In accordance with the private security guards, the study of their competence is rare. But through the study of teenagers or members of the public organization, we can know the influence of variables competence. The purpose of this study is to show how the self-esteem, need for Achievement, relation with co-worker and supervisor, and leadership effect on competence. Consequently this study will offer effective ways to develop the private security guards competence. We can show that self-esteem effects competence of the private security guards between the need for achievement and self-esteem which are adjusted as the individual characteristic. Namely, the higher the self-esteem of the private security guards is, the higher competence is. The study shows that the relation with co-worker and supervisor of the private security guards doesn't effect competence. Unlike the previous studies, this study proves that contingent reward has a positive effect on the Private Security Guards competence in the transactional leadership. That is, the higher the contingent reward of leader is, the higher the level of competence of the Private Security Guards is. Lastly, We can know individualized consideration effect the competence of the private security guards in the transformational leadership.

  • PDF

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

Explanatory Correction Notes for Lowell's Chosön Photographs in the Boston Museum of Fine Art (미국 보스턴미술관 소재 로웰의 조선 사진 설명문의 오류와 정정 방안)

  • Jeong, Youngjin
    • Korean Journal of Heritage: History & Science
    • /
    • v.53 no.2
    • /
    • pp.36-63
    • /
    • 2020
  • Percival Lowell took photographs of 80s during his stay in Korea in the winter of 1883 and 1884. The photographs are the first in the history of Korea and contain various and precious information about Korea of the day. As such, they could be used for purposes of studying late 19th century Chosōn society. The 61 photographs that are archived in Boston Museum of Fine Art were catalogued by National Research Institute of Cultural Heritage and have been posted online with incorrect explanations by Boston Museum of Fine Art. The explanations have been composed and revised at least four times on the basis of Lowell's writings and archivists' understandings of Korea. However these explanations contain many errors regarding the content of the photographs, yet have been cited by researchers and books concerning the history of Korea. I examined the explanations, analyzed Lowell's writings and diplomatic documents, and confirmed the locations where the photographs were taken. Accordingly, I suggest improved explanations of the photographs to prevent misuse of the Boston Museum of Fine Art's online archive. Lowell's photographs of Chosōn have very high historical value and could be used in various cultural fields because of their various contents and high definition. However, they belong to America and are not cared for sufficiently. Therefore, I suggest that high definition digital scans and prints of the photographs be generated for the sake of overseas Korean cultural heritage collection.

A Study of Proposing Standard for Traffic Signal Warrants Corresponding to Traffic Volumes (교통량에 따른 교통신호기 설치 기준 안에 관한 연구)

  • 박용진;장덕명;김기혁
    • Journal of Korean Society of Transportation
    • /
    • v.15 no.4
    • /
    • pp.73-90
    • /
    • 1997
  • The warrants to install traffic signals used in U.S.A. are well specified comparing to those in other countries. Among the eleven warrants of the U.S.A., the Warrant 9, 10, and 11 are especially fit in practice. The warrant relaxed to traffic volumes used presently in Korea have been adopted from the U.S.A. Those may not have been reliable in the traffic situation of Korea. The rules required passing through intersections are not kept well at intersections controlled without signals. The purposes of this study are to test and evaluate the reliability of the Warrant 9 and 11 adopted form U.S.A.n Korean traffic situation and to propose new traffic signal warrants related to traffic volumes fitted in here. The traffic volume warrants are proposed considering the situation of rules not being kept well(current situation) and that of vice versa(ideal situation). The results of this study are following; 1) The total volumes warranted to traffic signals are 1600vph, 1700vph, and 1800vph at 4-legs intersection having 1 by 1 lane, 1 by 2 lanes, and 2 by 2 lanes respectively. The total volumes warranted are 1400vph and 1600vph at 3-legs intersection haying 1 by 2 1anes, and 2 by 2 lanes respectively. 2) Another traffic warrants proposed are transformed from the currant warrants 9 and 11. These warrants are composed of the total volumes and the ratio of the volume of the minor street to that of the major street.

  • PDF

Conceptual Design of Automatic Control Algorithm for VMSs (VMS 자동제어 알고리즘 설계)

  • 박은미
    • Journal of Korean Society of Transportation
    • /
    • v.20 no.7
    • /
    • pp.177-183
    • /
    • 2002
  • Current state-of-the-art of VMS control is based upon simple knowledge-based inference engine with message set and each message's priority. And R&Ds of the VMS control are focused on the accurate detection and estimation of traffic condition of the subject roadways. However VMS display itself cannot achieve a desirable traffic allocation among alternative routes in the network In this context, VMS display strategy is the most crucial part in the VMS control. VMS itself has several limitations in its nature. It is generally known that VMS causes overreaction and concentration problems, which may be more serious in urban network than highway network because diversion should be more easily made in urban network. A feedback control algorithm is proposed in this paper to address the above-mentioned issues. It is generally true that feedback control approach requires low computational effort and is less sensitive to models inaccuracy and disturbance uncertainties. Major features of the proposed algorithm are as follows: Firstly, a regulator is designed to attain system optimal traffic allocation among alternative routes for each VMS in the network. Secondly, strategic messages should be prepared to realize the desirable traffic allocation, that is, output of the above regulator. VMS display strategy module is designed in this context. To evaluate Probable control benefit and to detect logical errors of the Proposed feedback algorithm, a offline simulation test is performed using real network in Daejon, Korea.