• Title/Summary/Keyword: IT전문지

Search Result 1,794, Processing Time 0.027 seconds

Foundation Establishment of Professional Evaluation Center for Convergence of Energy Storage System (ESS) (에너지저장장치(ESS) 융복합 전문평가센터 기반구축)

  • Yoon, Yongho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.165-170
    • /
    • 2020
  • In the rapidly growing new and renewable ESS parts and materials market, there is a limit for domestic SMEs to cope with the rapidly changing global new and renewable ESS market. There is a growing need to build a new and renewable ESS convergence commercialization support center. Therefore, through the establishment of a new and renewable ESS convergence professional evaluation center base, performance evaluation and standardization of new and renewable ESS products enhance product reliability. And By securing the reliability of new and renewable ESS, it is possible to promote domestic supply business and export activation. In addition, by supporting domestic research institutes and manufacturers to enhance their development capabilities and strengthen their competitiveness, and shortening the test cost and testing period according to the total-test evaluation system, it is possible anti-spill effect can be expected. Therefore, in this paper, we intend to study the establishment of a test certification center beyond the level of developed countries that can establish standardization for performance evaluation and demonstration.

A Study on the classification of quality attributes in culinary education based on the Kano model (Kano 모델을 기반으로 한 조리교육 품질속성 분류에 관한 연구 - 전문대학, 전문학교를 중심으로 -)

  • Kim, Tae-Hyun;Kim, Tae-Hee
    • Culinary science and hospitality research
    • /
    • v.19 no.5
    • /
    • pp.170-183
    • /
    • 2013
  • The purpose of this study is to classify the attributes of culinary educational quality by using the Kano model. This study carried out literary research and empirical analysis. Data were collected among 486 students whose major is culinary arts and analyzed with SPSS 19.0 and EXCEL 2007. It classified culinary educational quality by employing the Kano model and modified the Better and Worse quotients suggested by Timko. The results of the study are as follows. First, it was found that total 25 attributes could be classified into 17 Attractive quality attributes, 2 Must-be quality attributes and 6 Indifferent quality attributes, while One-dimensional quality, Reverse quality and Questionable quality attributes were not found. Second, according to the Better and Worse quotient by Timko, "Objective instructor's evaluation" item was the highest score in the Better quotient. On the other hand, the "Having foreign professors" item is the lowest in the Worse quotient. Third, marketing implications and limitations were discussed.

  • PDF

Satisfaction of Foreign Patients on Hospital Use (외국인 환자의 국내 병원 서비스 이용 만족도)

  • Lee, Hwang;Lee, WonJae;Choi, Kwang-Il
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.9
    • /
    • pp.322-333
    • /
    • 2013
  • This study aimed at analyzing and understanding medical tourism patients' pattern of different countries. For this purpose it followed up the international patients who visited W hospitals for spine treatment for last 3 years. In additon, it proposed key marketing strategies for attraction of more patients in the future. Satisfaction survey for 91 foreigner hospitalized patients were conducted from year 2010 to 2011. Each country of the patients showed slightly different motivations of visiting, consumer pattern and satisfaction of medical and non medical services. The current study analyzed factors, socio-demographic characteristics, purposes of visit, duration of stay in Korea, total number of visits to Korea, companions, plan of care, reasons for choice of W Hospital, expenses for medical care, total cost of staying in Korea. The results of this study showed that patients visited Korea more frequently were more satisfied with the medical care. Patients who planned to use medical care prior to visit Korea were more satisfied. Patients who thought he/she paid reasonable medical cost were more satisfied. Invitation to familiarization tour, clarification of medical cost, and provision of high quality medical care were recommended for the higher satisfaction of foreign patients. Fostering of specialized hospitals were recommended.

Secure RSA with CRT Protected Against Fault Attacks without using Checking Procedure (비교연산을 사용하지 않는 오류주입 공격에 안전한 CRT 기반의 RSA)

  • Kim, Sung-Kyoung;Kim, Tae-Hyun;Han, Dong-Guk;Park, Young-Ho;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.17-25
    • /
    • 2008
  • Because Chinese Remainder Theorem based RSA (RSA CRT) offers a faster version of modular exponentiation than ordinary repeated squaring, it is promoting with standard. Unfortunately there are major security issues associated with RSA CRT, since Bellcore announced a fault-based cryptanalysis against RSA CRT in 1996. In 1997, Shamir developed a countermeasure using error free immune checking procedure. And soon it became known that the this checking procedure can not effect as the countermeasures. Recently Yen proposed two hardware fault immune protocols for RSA CRT, and this two protocols do not assume the existence of checking procedure. However, in FDTC 2006, the method of attack against the Yen's two protocols was introduced. In this paper, the main purpose is to present a countermeasure against the method of attack from FDTC 2006 for CRT-RSA. The proposed countermeasure use a characteristic bit operation and dose not consider an additional operation.

An Efficient Method for Detecting Denial of Service Attacks Using Kernel Based Data (커널 기반 데이터를 이용한 효율적인 서비스 거부 공격 탐지 방법에 관한 연구)

  • Chung, Man-Hyun;Cho, Jae-Ik;Chae, Soo-Young;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.71-79
    • /
    • 2009
  • Currently much research is being done on host based intrusion detection using system calls which is a portion of kernel based data. Sequence based and frequency based preprocessing methods are mostly used in research for intrusion detection using system calls. Due to the large amount of data and system call types, it requires a significant amount of preprocessing time. Therefore, it is difficult to implement real-time intrusion detection systems. Despite this disadvantage, the frequency based method which requires a relatively small amount of preprocessing time is usually used. This paper proposes an effective method for detecting denial of service attacks using the frequency based method. Principal Component Analysis(PCA) will be used to select the principle system calls and a bayesian network will be composed and the bayesian classifier will be used for the classification.

A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services (국가 전산망 보안관제업무의 효율적 수행방안에 관한 연구)

  • Kim, Young-Jin;Lee, Su-Yeon;Kwon, Hun-Yeong;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.103-111
    • /
    • 2009
  • Recently, cyber attacks against public communications networks are getting more complicated and varied. Moreover, in some cases, one country could make systematic attacks at a national level against another country to steal its confidential information and intellectual property. Therefore, the issue of cyber attacks is now regarded as a new major threat to national security. The conventional way of operating individual information security systems such as IDS and IPS may not be sufficient to cope with those attacks committed by highly-motivated attackers with significant resources. As a result, the monitoring and control of cyber security, which enables attack detection, analysis and response on a real-time basis has become of paramount importance. This paper discusses how to improve efficiency and effectiveness of national cyber security monitoring and control services. It first reviews major threats to the public communications network and how the responses to these threats are made and then it proposes a new approach to improve the national cyber security monitoring and control services.

Statistical Analysis of High-Order Power Analysis (고차 전력 분석에 대한 통계적 수식의 일반화)

  • Kim, Min-Su;Kim, Hee-Seok;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.27-37
    • /
    • 2011
  • dth-order power analysis can safely be defended by dth-order masking method. However, as the degree of applied masking method increases, it can significantly decrease effectiveness of cryptosystem. The existing statistical analysis on high-order power analysis contains only analysis on second power analysis. However, this means absent of safety standards when crypto engineers apply 3rd or more order masking. this absent of standards can lead to insignificant usage of masking method which can significantly decrease effectiveness of cryptosystem. In this dissertation, we have generalize statistical values on high-order power analysis to establish these standards. In other words, we have generalized the value of a correlation coefficient when calculation of high-order power analysis methods are performed. That is to say, it can greatly be used to indicate a degrees that can be applied on further usage of masking method.

Carving deleted voice data in mobile (삭제된 휴대폰 음성 데이터 복원 방법론)

  • Kim, Sang-Dae;Byun, Keun-Duck;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.1
    • /
    • pp.57-65
    • /
    • 2012
  • People leave voicemails or record phone conversations in their daily cell phone use. Sometimes important voice data is deleted by the user accidently, or purposely to cover up criminal activity. In these cases, deleted voice data must be able to be recovered for forensics, since the voice data can be used as evidence in a criminal case. Because cell phones store data that is easily fragmented in flash memory, voice data recovery is very difficult. However, if there are identifiable patterns for the deleted voice data, we can recover a significant amount of it by researching images of it. There are several types of voice data, such as QCP, AMR, MP4, etc.. This study researches the data recovery solutions for EVRC codec and AMR codec in QCP file, Qualcumm's voice data format in cell phone.

A Study on Generic Unpacking using Entropy Variation Analysis (엔트로피 값 변화 분석을 이용한 실행 압축 해제 방법 연구)

  • Lee, Young-Hoon;Chung, Man-Hyun;Jeong, Hyun-Cheol;Shon, Tae-Shik;Moon, Jong-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.179-188
    • /
    • 2012
  • Packing techniques, one of malicious code detection and analysis avoidance techniques, change code to reduce size and make analysts confused. Therefore, malwares have more time to spread out and it takes longer time to analyze them. Thus, these kind of unpacking techniques have been studied to deal with packed malicious code lately. Packed programs are unpacked during execution. When it is unpacked, the data inside of the packed program are changed. Because of these changes, the entropy value of packed program is changed. After unpacking, there will be no data changes; thus, the entropy value is not changed anymore. Therefore, packed programs could be unpacked finding the unpacking point using this characteristic regardless of packing algorithms. This paper suggests the generic unpacking mechanism using the method estimating the unpacking point through the variation of entropy values.

The Threat Analysis and Security Guide for Private Information in Web Log (웹 로그 데이터에 대한 개인정보 위협분석 및 보안 가이드)

  • Ryeo, Sung-Koo;Shim, Mi-Na;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.135-144
    • /
    • 2009
  • This paper discusses an issue of serious security risks at web log which contains private information, and suggests solutions to protect them. These days privacy is core information to produce value-added in information society. Its scope and type is expanded and is more important along with the growth of information society. Web log is a privacy information file enacted as law in South Korea. Web log is not protected properly in spite of that has private information It just is treated as residual product of web services. Many malicious people could gain private information in web log. This problem is occurred by no classified data and improper development of web application. This paper suggests the technical solutions which control data in development phase and minimizes that the private information stored in web log, and applies in operation environment. It is very efficient method to protect private information and to observe the law.