• Title/Summary/Keyword: IS Development and Operations

Search Result 1,919, Processing Time 0.03 seconds

Trustworthy AI Framework for Malware Response (악성코드 대응을 위한 신뢰할 수 있는 AI 프레임워크)

  • Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1019-1034
    • /
    • 2022
  • Malware attacks become more prevalent in the hyper-connected society of the 4th industrial revolution. To respond to such malware, automation of malware detection using artificial intelligence technology is attracting attention as a new alternative. However, using artificial intelligence without collateral for its reliability poses greater risks and side effects. The EU and the United States are seeking ways to secure the reliability of artificial intelligence, and the government announced a reliable strategy for realizing artificial intelligence in 2021. The government's AI reliability has five attributes: Safety, Explainability, Transparency, Robustness and Fairness. We develop four elements of safety, explainable, transparent, and fairness, excluding robustness in the malware detection model. In particular, we demonstrated stable generalization performance, which is model accuracy, through the verification of external agencies, and developed focusing on explainability including transparency. The artificial intelligence model, of which learning is determined by changing data, requires life cycle management. As a result, demand for the MLops framework is increasing, which integrates data, model development, and service operations. EXE-executable malware and documented malware response services become data collector as well as service operation at the same time, and connect with data pipelines which obtain information for labeling and purification through external APIs. We have facilitated other security service associations or infrastructure scaling using cloud SaaS and standard APIs.

A study on competitiveness of small ports - Focus on the Ports of Jeollado - (국내 중소형 항만의 경쟁력 확보 방안에 관한 연구 - 전라도 항만을 중심으로 -)

  • Lee, Myoun-Soo;Choi, Hoon-Do;Lim, Dong-Seok;Kwak, Kyu-Seok
    • Journal of Navigation and Port Research
    • /
    • v.34 no.10
    • /
    • pp.817-821
    • /
    • 2010
  • As the environment of Logistics is changing rapidly, the environment of port is also changing. Accordingly, rapid change within port environment appears as the increase of the volume for world wide cargo, liner ship owners' strategy shift, globalization of terminals, heavy competitions to become a hub of Logistics, development of ship engineering. Therefore, the people who are responsible for the operations and managements of ports foresee such changes and accordingly react to ensure competitiveness. As the competition among ports generally goes international, a port needs to be sure that they become superior to any other port regardless of whether it's outside their country or not. Especially Korea is located in the most heavily competitive area which is Far-East. So if we fail to get competitiveness against the other ports, it goes without saying that our ports will be defeated by them. In brief, this paper will discuss the history of study regarding the factors by which a port is selected and also suggest some of elements which can be applied to small ports in the future of it.

Floating Point Unit Design for the IEEE754-2008 (IEEE754-2008을 위한 고속 부동소수점 연산기 설계)

  • Hwang, Jin-Ha;Kim, Hyun-Pil;Park, Sang-Su;Lee, Yong-Surk
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.48 no.10
    • /
    • pp.82-90
    • /
    • 2011
  • Because of the development of Smart phone devices, the demands of high performance FPU(Floating-point Unit) becomes increasing. Therefore, we propose the high-speed single-/double-precision FPU design that includes an elementary add/sub unit and improved multiplier and compare and convert units. The most commonly used add/sub unit is optimized by the parallel rounding unit. The matrix operation is used in complex calculation something like a graphic calculation. We designed the Multiply-Add Fused(MAF) instead of multiplier to calculate the matrix more quickly. The branch instruction that is decided by the compare operation is very frequently used in various programs. We bypassed the result of the compare operation before all the pipeline processes ended to decrease the total execution time. And we included additional convert operations that are added in IEEE754-2008 standard. To verify our RTL designs, we chose four hundred thousand test vectors by weighted random method and simulated each unit. The FPU that was synthesized by Samsung's 45-nm low-power process satisfied the 600-MHz operation frequency. And we confirm a reduction in area by comparing the improved FPU with the existing FPU.

A Study on Contact Center Evaluation Model Using AHP and Content Analysis (AHP와 내용분석을 이용한 컨택센터 평가 모델 연구)

  • Ryu, Ki-Dong;Kim, Woo-Je
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.5
    • /
    • pp.106-116
    • /
    • 2018
  • Recently, the role of the contact center for business-to-consumer (B2C) operations is becoming more and more important as the customer contact point. In particular, an Internet Protocol (IP)-based contact center system is made up of a complicated information system in order to accommodate various customer channels, in addition to the telephone, and to respond in real time. However, until now, evaluations of contact centers have focused on customer service-based research from inbound contact centers. We used the contact center as a measure of performance, focusing on indicators that have traditionally influenced customer satisfaction, such as response rates and service levels. There is insufficient research on the characteristics of the services that a contact center should have and on the evaluation models for information systems. The role of information systems is becoming important as the latest contact center, which has moved from the TDM-driven digital phone system center to the IP-based contact center, accommodates a variety of digital channels other than voice phones. In particular, as offline branches decrease due to the development of the Internet and mobile phones, non-facing responses to customers are important, so the contact center has influenced the enterprise. Therefore, we developed an evaluation model not only in terms of customer service, but also from information system and business aspects, using the AHP and verifying the evaluation model through empirical cases. In particular, content analysis was used to ensure objectivity of AHP evaluation items.

Study on the State Leadership's Safety Measures Regarding the North Korean Threat of Weapons of Mass Destruction - Focuses on the Threat of North Korean Nuclear Weapons (북한 대량살상무기 위협에 대한 국가지도부 안전대책에 관한 연구 - 북한 핵무기 위협을 중심으로)

  • Choi, Kee-Nam
    • Korean Security Journal
    • /
    • no.37
    • /
    • pp.325-354
    • /
    • 2013
  • The concept of national security and the fundamental system for crisis management have departed from traditional methods and the importance of a national critical infrastructure crisis management has been emphasized. A national critical infrastructure crisis means a situation where human resource, material and functional system that may have a material effect on the critical functions of the government, the vitality and integrity of society, national economy and the safety of the public becomes disabled due to causes such as terrorism or major disasters. Although North Korea had been subject to numerous rounds of negotiations and sanctions as it continually developed nuclear weapons since the 1960s, it has also showed off its nuclear armaments through successful nuclear testings and missile launches. As the development and threat of North Korea's weapons of mass destruction becomes more noticeable and the range of its risk expands, this study focuses on the potential for an absence of leadership for national crisis management where the country's leadership, which should serve the critical role and function of handling national crises, becomes completely destroyed by the unexpected initial attacks by North Korea. As a result, the purpose of this study is to propose safety measures for the country's leadership in preparation for North Korea's threat of nuclear weapons by examining the concept and degree of risk of weapons of mass destruction with a focus on nuclear weapons, analyzing the substance of the threat of North Korean nuclear weapons and evaluating such threat. In conclusion, first, to ensure the normal functioning of a national crisis management system in the event of a national crisis, we must seek safety measures that conform to the scope and succession order of the leadership of the national crisis management for an Enduring Constitutional Government (ECG) and the Continuity Of Operations (COOP). Second, in the event of a national ceremony, the gathering of the country's leadership all together in an open place should be avoided. In unavoidable circumstances, the next in rank that will act on behalf of the current leader should be designated and relevant safety measures should be taken. Third, during time of peace, in preparation for national crises, the scope of protection for the country's leadership should be prescribed and specific security and safety measures should be implemented. Fourth, the succession order for acting president in the case of the death of the president pursuant to Articles 71 and 26(1) of the National Government Organization Act should reconsidered to see whether it is a reasonable provision that takes into consideration a national crisis management that corresponds to the threat of North Korean nuclear weapons and weapons of mass destruction. Pursuant to the Basic Guidelines for National Crisis Management set out under Presidential Directive No. 229, the Korean government is currently operating a case-by-case "crisis management standard manual" and its sub-manuals and has also prepared the Presidential Security Service's security and safety measure regulations regarding the acting president. Therefore, the Korean government should actualize the above points in the case-by-case crisis management standard manual and security and safety measure regulations regarding the acting president to implement and legislate them.

  • PDF

Squall: A Real-time Big Data Processing Framework based on TMO Model for Real-time Events and Micro-batch Processing (Squall: 실시간 이벤트와 마이크로-배치의 동시 처리 지원을 위한 TMO 모델 기반의 실시간 빅데이터 처리 프레임워크)

  • Son, Jae Gi;Kim, Jung Guk
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.84-94
    • /
    • 2017
  • Recently, the importance of velocity, one of the characteristics of big data (5V: Volume, Variety, Velocity, Veracity, and Value), has been emphasized in the data processing, which has led to several studies on the real-time stream processing, a technology for quick and accurate processing and analyses of big data. In this paper, we propose a Squall framework using Time-triggered Message-triggered Object (TMO) technology, a model that is widely used for processing real-time big data. Moreover, we provide a description of Squall framework and its operations under a single node. TMO is an object model that supports the non-regular real-time processing method for certain conditions as well as regular periodic processing for certain amount of time. A Squall framework can support the real-time event stream of big data and micro-batch processing with outstanding performances, as compared to Apache storm and Spark Streaming. However, additional development for processing real-time stream under multiple nodes that is common under most frameworks is needed. In conclusion, the advantages of a TMO model can overcome the drawbacks of Apache storm or Spark Streaming in the processing of real-time big data. The TMO model has potential as a useful model in real-time big data processing.

Authentication and Key Management Techniques for Secure Communication in IP Camera (IoT 환경에서 IP카메라의 효율적 운용을 위한 키 관리 및 보안 설계 프로토콜)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.602-608
    • /
    • 2020
  • Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.

A Study on the Hazard Area of Bunkering for Ammonia Fueled Vessel (암모니아 연료추진 선박의 벙커링 누출 영향에 관한 연구)

  • Ilsup Shin;Jeongmin Cheon;Jihyun Lee
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.7
    • /
    • pp.964-970
    • /
    • 2023
  • As part of the International Maritime Organization ef orts to reduce greenhouse gas emissions, the maritime industry is exploring low-carbon fuels such as liquefied natural gas and methanol, as well as zero-carbon fuels such as hydrogen and ammonia, evaluating them as environmentally friendly alternatives. Particularly, ammonia has substantial operational experience as cargo on transport ships, and ammonia ship engines are expected to be available in the second half of 2024, making it relatively accessible for commercial use. However, overcoming the toxicity challenges associated with using ammonia as a fuel is imperative. Detection is possible at levels as low as 5 ppm through olfactory senses, and exposure to concentrations exceeding 300 ppm for more than 30 min can result in irreparable harm. Using the KORA program provided by the Chemical Safety Agency, an assessment of the potential risks arising from leaks during ammonia bunkering was conducted. A 1-min leak could lead to a 5 ppm impact within a radius of approximately 7.5 km, affecting key areas in Busan, a major city. Furthermore, the potentially lethal concentration of 300 ppm could have severe consequences in densely populated areas and schools near the bunkering site. Therefore, given the absence of regulations related to ammonia bunkering, the potential for widespread toxicity from even minor leaks highlights the requirement for the development of legislation. Establishing an integrated system involving local governments, fire departments, and environmental agencies is crucial for addressing the potential impacts and ensuring the safety of ammonia bunkering operations.

XML Schema Evolution Approach Assuring the Automatic Propagation to XML Documents (XML 문서에 자동 전파하는 XML 스키마 변경 접근법)

  • Ra, Young-Gook
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.641-650
    • /
    • 2006
  • XML has the characteristics of self-describing and uses DTD or XML schema in order to constraint its structure. Even though the XML schema is only at the stage of recommendation yet, it will be prevalently used because DTD is not itself XML and has the limitation on the expression power. The structure defined by the XML schema as well as the data of the XML documents can vary due to complex reasons. Those reasons are errors in the XML schema design, new requirements due to new applications, etc. Thus, we propose XML schema evolution operators that are extracted from the analysis of the XML schema updates. These schema evolution operators enable the XML schema updates that would have been impossible without supporting tools if there are a large number of XML documents complying the U schema. In addition, these operators includes the function of automatically finding the update place in the XML documents which are registered to the XSE system, and maintaining the XML documents valid to the XML schema rather than merely well-formed. This paper is the first attempt to update XML schemas of the XML documents and provides the comprehensive set of schema updating operations. Our work is necessary for the XML application development and maintenance in that it helps to update the structure of the XML documents as well as the data in the easy and precise manner.

Evaluation of hydropower dam water supply capacity (III): development and application of drought operation rule for hydropower dams in Han river (발전용댐 이수능력 평가 연구 (III): 한강수계 발전용댐 가뭄단계별 운영기준 개발 및 효과 분석)

  • Jeong, Gimoon;Kang, Doosun;Kim, Taesoon
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.7
    • /
    • pp.531-543
    • /
    • 2022
  • Integrated water resources management (IWRM) has focused on efficient response to various water related disasters by climate change. In particular, more flexible usage of conventional water resources infrastructures is expected to provide an eco-friendly water management. Multi-purpose dams and water supply dams are well known as water management facilities for securing and supplying water in drought season. Recently, based on the report '2021 multi-purpose use of hydropower dams in Han river', contribution of hydropower dams on water resources management is becoming more significant beyond the traditional role of hydropower generation. In drought conditions, the dams control water supply depending on the pre-defined drought stages. In the case of multi-purpose dams, an operation standard during drought has been already prepared and applied; however, for the hydropower dams, specific standards are not fully prepared yet in South Korea. In this study, a method for calculation of standard water storage and discharge reduction of hydropower dams according to drought stage is newly proposed reflecting the characteristics of hydropower dams. The proposed method was applied to the hydropower dams in Han river, where six hydropower dams are located. A case study of the historical droughts occurred in 2014-2017 demonstrated that the proposed hydropower dam operation rule could improve the water supply stability under severe drought conditions compared to the conventional operations. In the future, the role of hydropower dams for water resources management is expected to become more important, and this study can be widely used for water supply planning such as drought response using hydropower dams.