• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.02 seconds

Design of Health Warning Model on the Basis of CRM by use of Health Big Data (의료 빅데이터를 활용한 CRM 기반 건강예보모형 설계)

  • Lee, Sangwon;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1460-1465
    • /
    • 2016
  • Lots of costs threaten the sustainability of the national health-guarantee system. Despite research by the national center for disease control and prevention on health care dynamics with its auditing systems, there are still restrictions of time limitation, sample limitation, and, target diseases limitation. Against this backdrop, using huge volume of total data, many technologies could be fully adopted to the preliminary forecasting and its target-disease expanding of health. With structured data from the national health insurance and unstructured data from the social network service, we attempted to design a model to predict disease. The model can enhance national health and maximize social benefit by providing a health warning service. Also, the model can reduce the advent increase of national health cost and predict timely disease occurrence based on Big Data analysis. We researched related medical prediction cases and performed an experiment with a pilot project so as to verify the proposed model.

Scenario for sudden change in North Korea! : Comparing North Korea with countries of Jasmine Revolution (북한 급변사태 시나리오 I : 재스민혁명 국가들과 북한의 비교를 중심으로)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.63-68
    • /
    • 2017
  • The Jasmine Revolution started from Tunisia in January 2011 has brought many changes into countries in North Africa and Middle East. We need to study the causes of the revolution. First, the kings and dictators in those countries oppressed the opposition parties and the media aiming for long-term seizure of power. The power concentrated on specific people produced illegalities and corruption. Secondly, most of the national income of those countries belonged to kings and dictators producing problems during the distribution of the income. Especially, with the decrease of oil price in 1990s and the increase of the price of daily necessities in 2000s people lost their credits on their governments. Lastly, the number of people in those countries using the Internet has increased by 4,863% from 2000 to 2010. The expansion of social network services such as Facebook and Twitter was one of factors that made the information control by those countries difficult. We should think about the possibility of sudden change in North Korea. It is necessary to compare and analyze the political, economic and social characteristics between those countries and North Korea. It shouldn't be just a simple comparison or analysis. It should provide basic data for objective and quantified index development in relation to sudden change in North Korea.

A study on the entrepreneurial intention determinants of university students (대학생들의 창업의지 결정요인에 관한 연구)

  • Hong, Jeong-Pyo;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.12 no.11
    • /
    • pp.141-157
    • /
    • 2014
  • This study explored the entrepreneurial intention of university students by empirical study on them and studied the various variables, which have impact on their entrepreneurial intention. The result of examination on the impact factors of each independent variable on entrepreneurial intention was as following. There were significant relation with individual ability in individual characteristics and with safety orientation, autonomy orientation, technology orientation and business orientation in career orientation. The examination result on the impact of entrepreneurial environment on entrepreneurial intention was as following. There was significant relation between individual network and entrepreneurial policy. It was also possible to find that a student, who received entrepreneurial education as one of control variables, has higher entrepreneurial intention than a student who did not receive entrepreneurial education. Especially, business orientation was the most significant factor on entrepreneurial intention among multiple significant variables. Therefore, diverse entrepreneurial education programs should be developed and supplied so that university students can create business idea of own and reinforce the design ability related to the business.

Grid-based Location Service Spot scheme for optimized routing path on VANET (VANET 환경에서의 경로 최적화를 위한 그리드 기반 위치 정보 서비스 스팟 기법)

  • Kim, Jong-Hyun;Kim, Kee-Cheon;Jung, Woo-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.1
    • /
    • pp.76-90
    • /
    • 2010
  • Location Service is required in position-based routing for VANET to provide position information. We propose Grid-based Location service spot(GLSS) scheme for optimized routing path to improve accessibility and load balance in location service. Specific area is defined as Location service spot(LSS) on each grid in this scheme, and all nodes in the grid geocast its location update message and location request message to each LSS. Location request messages are flooded throughout LSSs, location reply messages establish optimized route from the source grid to the destination grid. We evaluated GLSS which establishes optimized route on the grid comparing GPSR in consideration of road condition and geographical features.

A Study of Security Certification and Accreditation for DNP3 linkage section in EMS/SCADA (EMS/SCADA의 DNP3 연계구간 보안성 평가·인증 기술 연구)

  • Kim, Jongwan;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.703-713
    • /
    • 2015
  • The linking system between the control system and the field devices in the existing EMS/SCADA, in order to increase the reliability of the data, and access control through the separation of external network. Currently, There is a tendency that the need for connection to an external network that takes into account the economic aspect, systematic management and efficiency of operations is increasing. Such is evolved linkage section, is to have more security vulnerabilities than in the past, Eventually communication EMS/SCADA linkage section requires special management method. In this paper, taking into account the domestic environment, were presented the security Certification and Accreditation technology that was applied to serial DNP3 and TCP/IP based DNP3 that are mainly used in EMS/SCADA linkage section. Presented to security of Certification and Accreditation technology, divided into Resource Robustness Test and Malicious Packet Test for evaluate the safety. Each of the security requirements and evaluation method in proposed technology, is an attempt to present the differentiation of the existing Certification and Accreditation technology.

A Research on Quality Improvement of Software-based Video Teleconferencing on the Tactical Communication Networks Less Than 1Mbps (1Mbps 이하 전술통신망에서의 소프트웨어 방식 화상회의 품질향상 연구)

  • Kim, Gwon-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.63-75
    • /
    • 2012
  • This paper researched the operation methods of software video teleconferencing on the tactical communication networks under 1Mbps. The tactical communication networks have limited bandwidths, frequent data losses and transmission delays due to the unstable networks. In addition, the bandwidth for video teleconferencing has to be much smaller since the Army Tactical Command Information System(ATCIS) has priority of using the bandwidth. This paper analyzed such restrictions of tactical communication networks, presented some methods to improve the quality of the software video teleconferencing on the tactical communication networks and their actual experiments as well. It is applied in the first place to re-transmit the lost packets and to reduce the image size for the data traffic. Nothing is better for the video teleconferencing than to provide the bandwidth enough for every user. However, on the tactical communication networks with the limited bandwidth, video teleconferencing can be improved by optimizing the compression rate of image data, the number of image frames, the audio codec and the usage of audio compensation data.

A Design of Internet-Based Safety Guarantee Global Integrated Logistics Management System Framework (인터넷 기반의 안전보장 글로벌 통합물류관리시스템 프레임워크 설계)

  • Hong, Ho-Seon;Hong, Ki-Sung;Lee, Chulung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.5
    • /
    • pp.103-111
    • /
    • 2013
  • This paper provide a framework for an IGILMS(internet-based global integrated logistics management system) which can access and mediate cargo transportations among small- and medium-sized domestic/international logistics corporations as regards cargo, registration and search for space, public tender and negotiation, contract, payment and safety-guarantee, transportation through the internet, wireless communication means, or smart phone etc. In addition, we describe a model to provide customized services in the B2B e-market for IGILMS and the structure and the control of its fulfillment process, and provide technical architecture of the IGILMS for an internet-based global logistics management system. To validate an efficiency of the proposed system, we develop a simulation model and analyze the performance of the proposed system.

The Study of Facebook Marketing Application Method: Facebook 'Likes' Feature and Predicting Demographic Information (페이스북 마케팅 활용 방안에 대한 연구: 페이스북 '좋아요' 기능과 인구통계학적 정보 추출)

  • Yu, Seong Jong;Ahn, Seun;Lee, Zoonky
    • The Journal of Bigdata
    • /
    • v.1 no.1
    • /
    • pp.61-66
    • /
    • 2016
  • With big data analysis, companies use the customized marketing strategy based on customer's information. However, because of the concerns about privacy issue and identity theft, people start erasing their personal information or changing the privacy settings on social network site. Facebook, the most used social networking site, has the feature called 'Likes' which can be used as a tool to predict user's demographic profiles, such as sex and age range. To make accurate analysis model for the study, 'Likes' data has been processed by using Gaussian RBF and nFactors for dimensionality reduction. With random Forest and 5-fold cross-validation, the result shows that sex has 75% and age has 97.85% accuracy rate. From this study, we expect to provide an useful guideline for companies and marketers who are suffering to collect customers' data.

  • PDF

A Secure Data Processing Using ID-Based Key Cryptography in Mobile Cloud Computing (모바일 클라우드 컴퓨팅 환경에서 ID-기반 키 암호화를 이용한 안전한 데이터 처리 기술)

  • Cheon, EunHong;Lee, YonSik
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.3-8
    • /
    • 2015
  • Most mobile cloud computing system use public key cryptography to provide data security and mutual authentication. A variant of traditional public key technologies called Identity-Based Cryptography(IBC) has recently received considerable attention. The certificate-free approach of IBC may well match the dynamic qualities of cloud environment. But, there is a need for a lightweight secure framework that provides security with minimum processing overhead on mobile devices. In this paper, we propose to use hierarchical ID-Based Encryption in mobile cloud computing. It is suitable for a mobile network since it can reduce the workload of root Public Key Generators by delegating the privilege of user authentication and private key generation. The Identity-Based Encryption and Identity-Based Signature are also proposed and an ID-Based Authentication scheme is presented to secure data processing. The proposed scheme is designed by one-way hash functions and XOR operations, thus has low computation costs for mobile users.

기업보안 강화를 위한 취약점 진단 통합관리 체계 구축

  • Mun, Ho-Geon;Park, Seong-Cheol
    • Information and Communications Magazine
    • /
    • v.31 no.5
    • /
    • pp.39-45
    • /
    • 2014
  • 기업활동에서 IT에 대한 의존도가 증가함에 따라 기업들은 다양한 소프트웨어 및 하드웨어 플랫폼에서 제공되는 서비스들을 운영하고 있다. 서비스들이 보급, 확대되는 과정에서 새로운 보안 취약점들이 나타나고, 이들 취약점을 악용한 기업정보의 유출 및 해킹 등 보안사고의 발생도 비례하여 증가하고 있다[1]. 특히 다양한 유형의 사업을 운영하는 지주회사 또는 대기업 그룹사의 경우, 사업영역별로 운영 중인 IT 인프라의 보안 취약점이 네트워크로 연결된 타 사업용 IT 인프라에 대한 사이버 침해의 통로로 악용될 가능성이 있다. 이 같은 문제의 해결을 위해 기업들은 사업영역 별로 보유한 IT 인프라의 보안 취약점 진단과 대응을 위한 솔루션들을 도입, 운영해 오고 있다. 하지만 기업의 보안 거버넌스 관점에서 보안 취약점 관리도 전사적인 보안 정책과의 연계 강화, 투자 중복의 방지, 효과적인 관리와 통제에 대한 필요성이 대두되기 시작했다. 보안 거버넌스 체계 강화에 대한 기업의 요구변화에 맞춰 보안 취약점의 통합관리를 지원하는 상용 솔루션들이 일부 출시되고 있으나 기업들이 기 운영하고 있는 개별 취약점 진단 솔루션과의 연동, 로그관리 및 기업이 요구하는 특화된 기능 구현 등의 어려움이 도입에 장애가 되고 있다. 따라서, 대기업을 중심으로 개별 보안 취약점 진단 솔루션들을 연동하여 기업보안 거버넌스를 효과적으로 지원할 수 있도록 취약점 관리업무 프로세스의 재설계와 함께 취약점 진단 통합관리 체계를 구축하고 있다[2][3][4]. 본고는 보안 취약점 관리업무의 문제점을 소개하고, 최근 대 기업을 중심으로 활발히 구축이 추진되고 있는 웹 기반의 취약 점 진단 통합관리 체계의 개념, 기능 및 운영 프로세스를 소개한다. 아울러, 기업 IT 인프라에 대한 보안 취약점 진단 데이터를 축적하여 기업 내부의 보안위험 요소를 사전예측하고, 정보보호의 투자 대비 효과(ROSI: Security Return on Investment)를 효과적으로 산정하는 인프라로서 활용 가치를 소개한다.