• Title/Summary/Keyword: 효율 성

Search Result 38,567, Processing Time 0.069 seconds

Adaptation Policy of ISO 27001 ISMS (Information Security Management System) for e-Government (전자정부 정보보호관리체계(G-ISMS) 적용 정책)

  • Han, Keun-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.119-130
    • /
    • 2009
  • Korea ranked 2nd in the UN Global e-Participation Index and ranked number one as the leader in e-Government for the third consecutive year. However, Korea ranked 51 in the level of information security published by WEF(World Economic Forum), relatively a low level comparing with its great number of users and excellent environments for the Internet service. A series of critical hacking accidents such as the information leak at Auction and GS Caltex emerged consecutively in 2008 year, resulting in the leak of personal & critical information. This led to a strong interest in the necessity and importance of information security and personal information so that demand for IT security is growing fast. In this paper, we survey to benchmark information security in the perspective of service level, system, investment and policy about major foreign countries. Then we research on an effective way to make the most of the benchmark result to Korea e-Government. In addition, the purpose of this paper is to improve national information security index by developing a policy for ISO 27001 ISMS, an international standard for Information Security Management System, and elevate safety and security of the e-Government serviced by central administrative organizations and local authorities.

Cooperative Architecture for Centralized Botnet Detection and Management (협업 기반의 중앙집중형 봇넷 탐지 및 관제 시스템 설계)

  • Kwon, Jong-Hoon;Im, Chae-Tae;Choi, Hyun-Sang;Ji, Seung-Goo;Oh, Joo-Hyung;Jeong, Hyun-Cheol;Lee, Hee-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.83-93
    • /
    • 2009
  • In recent years, cyber crimes were intended to get financial benefits through malicious attempts such as DDoS attacks, stealing financial information and spamming. Botnets, a network composed of large pool of infected hosts, lead such malicious attacks. The botnets have adopted several evasion techniques and variations. Therefore, it is difficult to detect and eliminate them. Current botnet solutions use a signature based detection mechanism. Furthermore, the solutions cannot cover broad areas enough to detect world-wide botnets. In this study, we suggest an architecture to detect and regulate botnets using cooperative design which includes modules of gathering network traffics and sharing botnet information between ISPs or nations. Proposed architecture is effective to reveal evasive and world-wide botnets, because it does not depend on specific systems or hardwares, and has broadband cooperative framework.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Design and Implementation of Mobile Medical Information System Based Radio Frequency IDentification (RFID 기반의 모바일 의료정보시스템의 설계 및 구현)

  • Kim, Chang-Soo;Kim, Hwa-Gon
    • Journal of radiological science and technology
    • /
    • v.28 no.4
    • /
    • pp.317-325
    • /
    • 2005
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. That is, with the new guidelines and technology, hospital business escapes simple fee calculation and insurance claim center. Moreover, MIS(Medical Information System), PACS(Picture Archiving and Communications System), OCS(Order Communicating System), EMR(Electronic Medical Record), DSS(Decision Support System) are also developing. Medical Information System is evolved toward integration of medical IT and situation si changing with increasing high speed in the ICT convergence. These changes and development of ubiquitous environment require fundamental change of medical information system. Mobile medical information system refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to Internet whenever and wherever. RFID is one of the technologies for Automatic Identification and Data Capture(AIDC). It is the core technology to implement Automatic processing system. This paper provides a comprehensive basic review of RFID model in Korea and suggests the evolution direction for further advanced RFID application services. In addition, designed and implemented DB server's agent program and Client program of Mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented medical information system that performed patient data based EMR, HIS, PACS DB environments, and so reduced delay time of requisition, medical treatment, lab.

  • PDF

Recent Advances in Metal Organic Framework based Thin Film Nanocomposite Membrane for Nanofiltration (나노여과를 위한 금속유기구조체 기반 박막 나노복합막의 최근 발전)

  • Kim, Esther;Patel, Rajkumar
    • Membrane Journal
    • /
    • v.31 no.1
    • /
    • pp.35-51
    • /
    • 2021
  • Advancements in thin-film nanocomposite (TFN) membrane technology for nanofiltration is crucial for removing pollutants from natural resources. In recent years, various metal-organic framework (MOF) modifications have been tested to overcome the drawbacks that are inevitable with conventional thin-film composite (TFC) and TFN membranes. In general, MIL-101(Cr), UiO-66, ZIF-8, and HKUST-1 [Cu3(BCT2)] are MOFs that were proven to exhibit excellent membrane performance in terms of solvent permeability and solute rejection; their respective studies are reviewed in this article. Other novelties, such as the simultaneous use of different MOFs and unique MOF layering techniques (e.g., dip-coating, spray pre-disposition, Langmuir-Schaefer film, etc.) are also discussed as they present alternate solutions for membrane enhancement and/or preparation convenience. Not only are these MOF-modified TFN membranes frequently shown to improve separation performance from their respective TFC and TFN membranes, but many reports also explain their potential for a cost-effective and environmentally friendly process. In this review the thin film nanocomposite nanofiltration membrane is discussed.

Integrated calibration weighting using complex auxiliary information (통합 칼리브레이션 가중치 산출 비교연구)

  • Park, Inho;Kim, Sujin
    • The Korean Journal of Applied Statistics
    • /
    • v.34 no.3
    • /
    • pp.427-438
    • /
    • 2021
  • Two-stage sampling allows us to estimate population characteristics by both unit and cluster level together. Given a complex auxiliary information, integrated calibration weighting would better reflect the level-wise characteristics as well as multivariate characteristics between levels. This paper explored the integrated calibration weighting methods by Estevao and Särndal (2006) and Kim (2019) through a simulation study, where the efficiency of those weighting methods was compared using an artificial population data. Two weighting methods among others are shown efficient: single step calibration at the unit level with stacked individualized auxiliary information and iterative integrated calibration at each level. Under both methods, cluster calibrated weights are defined as the average of the calibrated weights of the unit(s) within cluster. Both were very good in terms of the goodness-of-fit of estimating the population totals of mutual auxiliary information between clusters and units, and showed small relative bias and relative mean square root errors for estimating the population totals of survey variables that are not included in calibration adjustments.

Analysis of relative importance priority based on blockchain technology characteristics using AHP technique (AHP 기법을 이용한 블록체인 기술 특성 기반 상대적 중요도 우선순위 분석)

  • Oh, Kyoung-Sang;Lee, Dong-Myung
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.239-250
    • /
    • 2021
  • When considering the introduction of a new technology, it is important to accurately grasp and selectively apply the technical characteristics related to the technology in order to fully utilize the advantages of the technology. In this study, the technical characteristics of high relative importance were analyzed in order to increase the efficiency of new application of blockchain technology by companies. The technical characteristics of the blockchain identified through previous research were reclassified from the perspective of the system hierarchy, and sub-factors of the technical characteristics were derived. In addition, a questionnaire survey on the relative importance of technical characteristics was conducted for internal experts and SI experts using the Analytical Hierarchy Process (AHP) technique. As a result of the analysis, respondents evaluated data protection as the most important factor in the threat of hacking related to security. In addition, it was different that the comparison results of the importance of the technical characteristics between the experts in the company and the SI experts and the priority of the technical characteristics between the expert groups by industry. It is expected that the results of this study will be usefully utilized when using blockchain technology in enterprises in line with the upcoming changes of the 4th industrial revolution. An empirical analysis of the internal and external factors required for adoption of blockchain technology by industry and the effect of technology introduction will be a meaningful study.

A Learning Satisfaction in face-to-face/non-face-to-face Educational Environments of New Dental Hygiene Students (대면/비대면 교육환경에서의 학습만족도(일부 치위생과 신입생을 대상으로))

  • Shin, Ae-Ri;Shim, Hyung-Soon
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.804-813
    • /
    • 2021
  • The purpose of this study was on the learning satisfaction of dental hygiene students according to the face-to-face and non-face-to-face teaching methods in the COVID-19 educational environment. A self-reported questionnaire was completed by 122 dental hygiene students of G University located in Gwangju from October to November, 2020. The general characteristics, instructional characteristics, teaching methods, and learning satisfaction were investigated, and the collected data were analyzed using SPSS 18.0. The effective practical teaching method chosen by the students was face-to-face, and there was a significant difference according to the class choice. The learning satisfaction according to the general characteristics showed a significant difference in the preferred practice method for improving instrument technique. The face-to-face classes showed significantly higher learning satisfaction in terms of checking on doing well study during class and the convenience. In addition, as a result of analyzing the factors influencing learning satisfaction, the choice of face-to-face class was confirmed as a significant variable. Therefore, in order to increase the learning satisfaction of students, it is necessary to design a class that essentially includes face-to-face class when planning a practice class.

Suggestions for Enhancing Sampling-Based Approach of Seismic Probabilistic Risk Assessment (샘플링기반 지진 확률론적 리스크평가 접근법 개선을 위한 제언)

  • Kwag, Shinyoung;Eem, Seunghyun;Choi, Eujeong;Ha, Jeong Gon;Hahm, Daegi
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.34 no.2
    • /
    • pp.77-84
    • /
    • 2021
  • A sampling-based approach was devised as a nuclear seismic probabilistic risk assessment (SPRA) method to account for the partially correlated relationships between components. However, since this method is based on sampling, there is a limitation that a large number of samples must be extracted to estimate the results accurately. Thus, in this study, we suggest an effective approach to improve the existing sampling method. The main features of this approach are as follows. In place of the existing Monte Carlo sampling (MCS) approach, the Latin hypercube sampling (LHS) method that enables effective sampling in multiple dimensions is introduced to the SPRA method. In addition, the degree of segmentation of the seismic intensity is determined with respect to the final seismic risk result. By applying the suggested approach to an actual nuclear power plant as an example, the accuracy of the results were observed to be almost similar to those of the existing method, but the efficiency was increased by a factor of two in terms of the total number of samples extracted. In addition, it was confirmed that the LHS-based method improves the accuracy of the solution in a small sampling region.

Recharge Potential Assessment of Artificial Recharge System for Agricultural Drought Adaptation (농업가뭄대응을 위한 인공함양 시스템의 함양능력 평가)

  • Lee, Jae Young;Kim, Gyoo Bum
    • Journal of Korean Society of Disaster and Security
    • /
    • v.14 no.1
    • /
    • pp.61-72
    • /
    • 2021
  • There is an increasing need for water supply plan using sustainable groundwater to resolve water shortage problem caused by drought due to climate change and artificial aquifer recharge has recently emerged as an alternative. This study deals with recharge potential assessment for artificial recharge system and quantitative assessment for securing stable water and efficient agricultural water supply adapt to drought finding optimal operating condition by numerical modeling to reflect recharge scenarios considering climate condition, target water intake, injection rate, and injection duration. In order to assess recharge potential of injection well, numerical simulation was performed to predict groundwater level changes in injection and observation well respect to injection scenarios (Case 1~4) for a given total injection rate (10,000 m3). The results indicate that groundwater levels for each case are maintained for 25~42 days and optimal injection rate is 50 m3/day for Case 3 resulted in groundwater level rise less than 1 m below surface. The results also show that influential area of groundwater level rise due to injection was estimated at 113.5 m and groundwater storage and elapsed time were respectively increased by 6 times and 4 times after installation of low permeable barrier. The proposed assessment method can be contributed to sustainable agricultural water supply and stable water security for drought adaptation.