• Title/Summary/Keyword: Effectiveness secure

Search Result 287, Processing Time 0.023 seconds

A Study on the Performance Experiments of Lightweight Wall of Long-life Housing by Ceiling Infill System (천장 인필시스템에 따른 장수명주택 경량벽체의 성능실험에 관한 연구)

  • Seo, Dong-Goo;Lee, Jong-Ho;Kim, Eun-Young;Hwang, Eun-Kyoung
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2018.05a
    • /
    • pp.247-248
    • /
    • 2018
  • In order to secure the variability of long-life housing, dry walls are used. The composite gypsum board panel is the most frequently used infill system for the wall, and it is an excellent construction method in terms of constructability and economic feasibility. However, there are also problems such as the destruction of Ondol pipes at the bottom floor and being unable to fix the light weight steel frame (M-bar) when a variable composite gypsum board panel is used. To solve such problems, a wall with a method of fixing only the top part without fixing the bottom floor is developed, but it is difficult to identify the durability of ceiling frame according to the tensile force of stud and the safety according to the Stiffness and impact resistance (soft body) of ceiling frame. Therefore, this study verified the effectiveness of infill system for the wall by conducting experiment on the stiffness and impact resistance of composite gypsum board panel according to the reinforcement of ceiling frame (wooden frame, double saw-toothed bracket, Cross M-bar). As a result, it was possible to secure the safety of wooden frame while the impact resistance and the Stiffness of double saw-toothed bracket and cross M-bar were not secured.

  • PDF

Polymorphic Path Transferring for Secure Flow Delivery

  • Zhang, Rongbo;Li, Xin;Zhan, Yan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2805-2826
    • /
    • 2021
  • In most cases, the routing policy of networks shows a preference for a static one-to-one mapping of communication pairs to routing paths, which offers adversaries a great advantage to conduct thorough reconnaissance and organize an effective attack in a stress-free manner. With the evolution of network intelligence, some flexible and adaptive routing policies have already proposed to intensify the network defender to turn the situation. Routing mutation is an effective strategy that can invalidate the unvarying nature of routing information that attackers have collected from exploiting the static configuration of the network. However, three constraints execute press on routing mutation deployment in practical: insufficient route mutation space, expensive control costs, and incompatibility. To enhance the availability of route mutation, we propose an OpenFlow-based route mutation technique called Polymorphic Path Transferring (PPT), which adopts a physical and virtual path segment mixed construction technique to enlarge the routing path space for elevating the security of communication. Based on the Markov Decision Process, with considering flows distribution in the network, the PPT adopts an evolution routing path scheduling algorithm with a segment path update strategy, which relieves the press on the overhead of control and incompatibility. Our analysis demonstrates that PPT can secure data delivery in the worst network environment while countering sophisticated attacks in an evasion-free manner (e.g., advanced persistent threat). Case study and experiment results show its effectiveness in proactively defending against targeted attacks and its advantage compared with previous route mutation methods.

Identification of Vehicle Using Edge Detection (S/W 개발 보안의 필요성과 기대효과)

  • Shin, SY;Kim, DK;Lee, CW;Lee, HC;Lee, TW;Park, KH
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.741-742
    • /
    • 2016
  • Secure Coding is in the development phase, removing a potential security vulnerability that could lead to attacks such as hacking in advance, says the technique to develop secure software from external attacks. In this paper, we'll learn about the needs and expectations of the effectiveness of these security software development. Due to this, the threat to the safe software development project, and there is an effect to improve quality.

  • PDF

Privacy Information Protection Applying Digital Holography to Blockchain

  • Jeon, Seok Hee;Gil, Sang Keun
    • Current Optics and Photonics
    • /
    • v.6 no.5
    • /
    • pp.453-462
    • /
    • 2022
  • Blockchain technology provides a decentralized and peer-to-peer network, which has the advantages of transparency and immutability. In this paper, a novel secure authentication scheme applying digital holography to blockchain technology is proposed to protect privacy information in network nodes. The transactional information of the node is chained permanently and immutably in the blockchain to ensure network security. By designing a novel two-dimensional (2D) array data structure of the block, a proof of work (PoW) in the blockchain is executed through digital holography technology to verify true authentication and legal block linkage. A hash generated from the proposed algorithm reveals a random number of 2D array data. The real identity of each node in the network cannot be forged by a hacker's tampering because the privacy information of the node is encrypted using digital holography and stored in the blockchain. The reliability and feasibility of the proposed scheme are analyzed with the help of the research results, which evaluate the effectiveness of the proposed method. Forgery by a malicious node is impossible with the proposed method by rejecting a tampered transaction. The principal application is a secure anonymity system guaranteeing privacy information protection for handling of large information.

Terrestrial UHD activation strategy to strengthen global competitiveness (글로벌 콘텐츠 경쟁력 강화를 위한 UHD 활성화 전략)

  • Woo Jin Hyun
    • Smart Media Journal
    • /
    • v.12 no.1
    • /
    • pp.92-101
    • /
    • 2023
  • The importance of high-definition video has increased by increase in consumer demand for realistic content. Therefore, this study presented the UHD strategy of terrestrial broadcasters for global competitiveness. First, as a practical strategy, to secure domestic market, it should secure an ecosystem through cooperation among departments, create synergy, and prioritize the UHD field to gain global competitiveness with close cooperation with expertised countries in the field. Also, after securing the domestic market by developing UHDTV focusing on cost-effectiveness on socio-cultural situation of Korea, it should utilize the finance and technology for global market. government should support global competitiveness as a control tower, strengthening global content, composing a long-term roadmap, supporting related materials, and creating and exporting our own UHDTV model

Recognition of Efficiency and Effectiveness of the Experiences with Hand Acupuncture (수지침 경험자들의 수지침에 대한 효율성과 효과성 인식정도)

  • Lee, Yeon-Joo;Park, Kyung-Min
    • Research in Community and Public Health Nursing
    • /
    • v.12 no.1
    • /
    • pp.278-287
    • /
    • 2001
  • The purpose of this study is to provide with basic information on application of hand acupuncture as a complementary and alternative therapy by giving some recognition of efficiency and effectiveness of hand acupuncture. And so, answers for questionnaires of 290 respondents were used for this research and collected from June 5 through 13, 1999 from adults twenty and over who were participating in the hand acupuncture training program in Seoul and had some direct experiences with hand acupuncture therapy, whatever they had been treated and/or had treated. To secure reliability of measurement tool. Cronbach'a has been calculated and Factor Analysis was done as Validity Analysis of question classification. Demograprucal characteristics of hand acupuncture experienced people and factors related to hand acupuncture experiences are calculated based on the real number and percentage. The degree of recognition of efficiency and effectiveness of hand acupuncture is made as average and standard deviation, while the degree of recognition of efficiency and effectiveness based on general characteristics come from one-way ANOVA. 1. According to socio-demographical analysis. the questioned could be classified firstly as age (40-49 : 32.5%. 30-39 : 24.9%. 50-59 : 21.9%. 60-69 : 14.7%. 20-29 : 6.0%). secondly gender (male 36.6%. female 63.4%). thirdly occupation (housewife: 43.8%. self-employed: 15.5%. company-employee: 14.8%). fourthly education (high school graduate: 41.9%, college graduate: 37.9%), and lastly monthly-income (1 to 2 million: 51.4%. 2 to 3 million: 20,3%) 2, As for the general aspects related to hand acupuncture. 80,0% of the respondents answered almost zero for the monthly average number of visit to hospital and 15.5% responded 1 to 2 visits, 6,2% of the respondents is complaining of a disorder of digestive system. 19,0% circulatory disease, 10.7% bad nervous system. By utilizing hand acupuncture, 84% of the questioned have following experiences in curing diseases: digestive system 47.3%, circulatory system 9.3%, nervous system 8.3%, 54,1% are curing 1 to 2 and 10.3% 3 to 4 patients on a daily basis with hand acupuncture. Research on the demerits of giving medical treatment with hand acupuncture shows 23,8% are feeling economic burden. 16.6% difficulty of learning and 16.2% weak theoretical backgrounds. 3. Among the efficiency recognition, possibility of general application is average 4,29 and simple treatment is 4,19. economic merits 4.36. possibility of establishment with supplementary and alternative medicine 4.17, medical effectiveness 4.09. 4, As a result of demographical analysis on the efficiency and effectiveness of hand acupuncture therapy, it appears that the recognition of efficiency based on occupation and the recognition of effectiveness based on monthly income are most significant to be noticed. In an orderly fashion. government-employee, self-employed, company-employee. and then housewife have perceived hand acupuncture very efficiently, And those who recognize hand acupuncture to be most effective are people earn 1 million to 2 million won a month, 5. The efficiency(p = .003) and effectiveness (p= .049) of hand acupuncture therapy by number of visit to hospital were statiscally significant, and effectiveness of hand acupuncture therapy by disease exist was statiscally significant (p= .033).

  • PDF

Evaluation of Software Diagnostics for Secure Operational Environment in Nuclear I&C systems (원전 계측제어 시스템 보안성환경을 위한 진단기능 평가)

  • Yoo, Sung Goo;Seul, Namo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.107-112
    • /
    • 2016
  • Safety Critical Instrumentation and Control Systems perform those functions to maintain nuclear power plants' parameters within acceptable limits established for a design basis events and anticipated operating occurrence to ensure safety function. Those digitalized systems shall protect inadvertent and non-malicious behavior to ensure the reliable operation of systems, known as a Secure Development and Operational Environment(SDOE). SDOE would be established through managerial and technical controls. The objective of this paper is to evaluate the effectiveness of Cyclic Redundancy Checksum diagnostic, which is one of technical controls for SDOE, that can confirm the integrity of software of I&C systems to establish the secure environment. The results of this assessment would be the practical implementation of design and safety review of nuclear I&C systems.

Mutual Authentication Scheme between Multiple Instances for Secure Data Share of Virtualized Environment (가상화 환경의 안전한 데이터 공유를 위한 다중 인스턴스간 상호인증 기법)

  • Choi, Dohyeon;Kim, Sangkun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.83-94
    • /
    • 2016
  • Recent cloud, big data, there is a problem for the architectural security vulnerability to the server platforms of various fields such as artificial intelligence occurs consistently, but using the virtualization technology. In addition, most secure virtualization technology is known to be dependent on the type is limited and the platform provider. This paper presents a method for mutual authentication for secure data between multiple instances of a shared virtualized environment. The proposed method was designing a security architecture in consideration of the mutual authentication between multiple independent instances, and enhance the safety of a security protocol for sharing data by applying a key chain techniques. Performance analysis results and the existing security architecture demonstrated that protect each virtualized instances of the session and the other way, a compliance effectiveness for each instance of the mutual authentication process.

Security Technique using SSH Tunneling for CCTV Remote Access (SSH 터널링을 이용한 CCTV 원격접속 보안기법)

  • HWANG, GIJIN;PARK, JAEPYO;YANG, SEUNGMIN
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.148-154
    • /
    • 2016
  • Video security has recently emerged as an important issue owing to CCTV video image spill accidents over the Internet. KISA recommends the use of encryption protocols for remote access through its guidelines for CCTV personal video information protection. But still, many products do not adhere to the guidelines, and those products are easily exposed to security threats, such as hacking. To solve these security vulnerabilities, this paper proposes a CCTV system that connects from remote locations, and is implemented by using secure shell (SSH) tunneling techniques. The system enhances security by transmitting encrypted data by using SSH. By using the tunneling technique, it also solves the problem of not being able to access a CCTV recorder located inside a firewall. For evaluation of the system, this paper compares various CCTV remote access schemes and security. Experimental results on the effectiveness of the system show it is possible to obtain remote access without a significant difference in transmission quality and time. Applying the method proposed in this paper, you can configure a system secure from the threats of hacking.

A Secure Protocol for Location-Aware Services in VANETs (VANET에서 안전한 위치인지 서비스를 위한 보안 프로토콜)

  • Sur, Chul;Park, Youngho;Rhee, Kyung Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.495-502
    • /
    • 2013
  • In this paper, we present an anonymous authentication and location assurance protocol for secure location-aware services over vehicular ad hoc networks (VANETs). In other to achieve our goal, we propose the notion of a location-aware signing key so as to strongly bind geographic location information to cryptographic function while providing conditional privacy preservation which is a desirable property for secure vehicular communications. Furthermore, the proposed protocol provides an efficient procedure based on hash chain technique for revocation checking to effectively alleviate communication and computational costs on vehicles in VANETs. Finally, we demonstrate comprehensive analysis to confirm the fulfillment of the security objectives, and the efficiency and effectiveness of the proposed protocol.