• Title/Summary/Keyword: IT security

Search Result 11,587, Processing Time 0.035 seconds

The Evaluation Research of Weihai Fishery Production Efficiency Based on DEA Model (基于DEA模型的威海渔业生产效率评价研究)

  • Wu, Yinuo
    • Journal of East Asia Management
    • /
    • v.3 no.1
    • /
    • pp.11-23
    • /
    • 2022
  • Under the circumstances of China's slower economic growth, the first document ofthe central committee of the CPC continue to focus on "three agricultures" problems, agriculture play a basic role on China's economic. Since 2007, the first document directly stresses the important role of agricultural and fisheries every year. Central Government Working Report of 2015 also stresses that under the new normal of economy, it is important to improve quality and efficiency of agriculture. Agricultural focus going forward will be on improving capacity of competitiveness, innovation and sustainable development.The fishery as an important part of agriculture plays a vital role in the protection of national food security, the prosperity of the rural economy and the optimization of national food structure. However, the situation faced on accelerating the speed of Chinese fisheries is still grim. As an important fishery breeding city in my country, Weihai has achieved remarkable results in the development of fisheries. Based on the input-output indicators of Weihai City from 2010 to 2020, this article uses the DEA model method to conduct a comprehensive analysis of the factors affecting the fishery production efficiency in Weihai City. This paper calculates the two stages of comprehensive efficiency, pure technical efficiency and scale efficiency, and comprehensive compares the two stages. The research results show that: From 2010 to 2020, the average comprehensive technical efficiency of Weihai fishery was 0.928, the average scale efficiency was 0.963, and the average pure technical efficiency was 0.963. The comprehensive technical efficiency of Weihai fishery production showed an upward and downward trend, the pure technical efficiency showed a downward and then upward trend, and the pure technical efficiency showed a fluctuating trend.

The Specification of Air-to-Air Combat Tactics Using UML Sequence Diagram (UML Sequence Diagram을 활용한 공대공 교전 전술 명세)

  • Park, Myunghwan;Oh, Jihyun;Kim, Cheonyoung;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.6
    • /
    • pp.664-675
    • /
    • 2021
  • Air force air-to-air combat tactics are occurring at a high speed in three-dimensional space. The specification of the tactics requires dealing with a quite amount of information, which makes it a challenge to accurately describe the maneuvering procedure of the tactics. The specification of air-to-air tactics using natural languages is not suitable because of the intrinsic ambiguity of natural languages. Therefore, this paper proposes an approach of using UML Sequence Diagram to describe air-to-air combat tactics. Since the current Sequence Diagram notation is not sufficient to express all aspects of the tactics, we extend the syntax of the Sequence Diagram to accommodate the required features of air-to-air combat tactics. We evaluate the applicability of the extended Sequence Diagram to air-to-air combat tactics using a case example, that is the manned-unmanned teaming combat tactic. The result shows that Sequence Diagram specification is more advantageous than natural language specification in terms of readability, conciseness, and accuracy. However, the expressiveness of the Sequence Diagram is evaluated to be less powerful than natural language, requiring further study to address this issue.

Mark XIIA(Mode 5) IFF System Integration and Certification Test for Surface to Air Missile System (유도무기체계 모드 5 피아식별 체계통합 및 인증시험)

  • Kim, Woo-Hyun;Jung, Se-Young;Lee, Yun-Soo;Chang, Se-Myong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.2
    • /
    • pp.160-168
    • /
    • 2022
  • The new IFF mode, Mode-5 replacing Mode-4, has already been established by the US DoD for its allies and NATO forces. A IFF retrofit program for replacing the Mark XII Mode-4 with Mark XIIA Mode-5 is in progress in order to overcome the security limitations of the former in R.O.K. IFF certification test for the new mode, Mode-5, has been performed on medium range surface to air missile platform of the Korean armed forces for the first time in R.O.K and this is regarded as a monumental event in Korean defense industry. The present paper is a discussion on the procedures applied to the IFF system retrofit and integration, lessons learned from AIMS test with the US AIMS PO as observer. The minimum modification from the existing Mark XII Mode-4 to Mark XIIA Mode-5 and evolutional adaption from previous design including interoperability are required for the system retrofit. Letter of Certification was received from the US AIMS PO after the tests. The authors propose that the lessons learned and know-how acquired during the tests are managed by the R.O.K Government as the standard structure of a database. It is expected that the use of the database will reduce the developmental difficulties and risk, also increase efficiency in future developments and other projects.

A Study on the Importance of Measures for Improving PLM System Usage (PLM 시스템 활용도 향상 방안의 중요도에 관한 연구)

  • Yoo, Jong Kwang;Rim, Seong Taek;Min, Dai Hwan
    • The Journal of Information Systems
    • /
    • v.31 no.1
    • /
    • pp.239-269
    • /
    • 2022
  • Purpose This paper attempts to identify items for improving the usage of PLM(Product Lifecycle Management) systems and suggests ways to prioritize improvement items on the basis of importance. It also tries to find out differences in the importance of improvement items due to the company size, the industry, the job, or the PLM solution. Design/methodology/approach Through a survey from participants to a PLM System Conference, data were collected from a sample of 181 users who had the previous experience in using a PLM system. In order to figure out the differences in the importance among user groups, the F-test with the Scheffe test as a post-hoc analysis was used in case of equal variances and the Welch test with the Dunnett T3 test was used in case of unequal variances. Findings This study sorted out 25 improvement ideas according to their importance assessed by the PLM system users. The top five ideas are improving data consistency, error minimization, fast system response time, enhancing user recognition, and business process improvement. The support group puts higher importance than the general user group in data consistency, fast system response time, enhancing user recognition, business process improvement, dedicated team for data consistency, continuous support from management, hardware performance upgrade, output linkage to other systems, and shortening problem solving duration. The largest company group attaches significantly higher weights than the smallest company group to data consistency, error minimization, fast system response time, business process improvement, dedicated team for data consistency, security with proper access management, output linkage to other systems, and better user interface.

Analysis of the financial products for supporting financing of small and medium-sized construction companies (중소건설기업의 자금조달 지원을 위한 금융상품 분석)

  • Lee, Chijoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.23 no.4
    • /
    • pp.36-46
    • /
    • 2022
  • It takes a relatively long time for construction companies that lack the ability to finance to adapt to construction policy in the construction industry. However, financial institutions rarely provide financial products to construction companies, particularly small and medium-sized construction companies, because their security capacity and credit rating are low. This study investigates the financial products needed for small and medium construction companies to adapt to policy changes. The demand of small and medium construction companies for financial products is analyzed by experts' advise and survey. And, when the investigated financial products for the construction industry are introduced, the legal systems in need of revision are analyzed. Based on the analyzed demand and the number of legal systems needing revision, the priority for the introduction of financial products to the construction industry is analyzed. Among the financial products investigated, the priority of "Expert consultation, such as accountant, tax accountant, lawyer, etc." is the highest. In future studies, the criteria and method of financial product development for high-priority financial products could be researched.

A Study on the Current Status and Responses System of Child Abuse

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.109-114
    • /
    • 2022
  • Recently, child abuse cases such as the "16-month death of adopted children" have occurred one after another in our society and have emerged as a serious social problem. Child abuse not only significantly violates children's human rights, but also leaves scars on the child's body and sometimes threatens their lives. As a result, laws related to child abuse have been revised several times and related systems have been reorganized to protect the affected children safely and grow healthy, but child abuse cases continue to occur. Therefore, it is urgent to come up with effective measures to prevent child abuse crimes and protect affected children. Therefore, this study examines the concept and related laws of child abuse, the current status of child abuse, and suggests countermeasures to effectively respond to child abuse compared to the US child abuse legislation and child protection system.

A Study on the Blockchain-Based Bill of Lading System to Improve Usability (사용성 개선을 위한 블록체인 기반 선하증권 거래 시스템 연구)

  • Lee, Ju-young;Kim, Hyun-a;Sung, Chae-min;Kim, Joung-min;Kim, Sungwook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.7
    • /
    • pp.283-290
    • /
    • 2022
  • Blockchain is a technology that secures integrity and transparency by distributing and storing transaction details within multiple node networks. Recently, research is being conducted to secure integrity by applying blockchain to Bill of Lading (B/L documents) of monetary value. In this paper, we study a blockchain-based bill of lading system to improve usability. The shippers register the issued bill of lading on the blockchain, and banks in each country read it to conduct L/C transactions. The consignees receive the goods after completing certification with a quick response code (QR) containing the bill of lading information. Through this, shippers enjoy merits in that they can shorten the time and cost of sending shipping documents by mail and prove the integrity of the documents. The consignees have the advantage of being able to check the documents at the same time as they are registered and trust the transaction. Finally, on the bank side, the security of shipping documents is ensured and verification can be done quickly.

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

A Study on the Criminal Justice Rehabilitation System of Sweden (스웨덴 법무보호복지제도 연구)

  • Kwon, Joon-Sung;Gong, Jung-Sik;Hyun, Mun-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.506-514
    • /
    • 2022
  • The method of suppressing recidivism through punishment centered on punishment is showing limitations through criminal policy research in many countries. As an alternative to this, a restorative judicial law aimed at returning criminals to members of society through reconciliation and coordination of community members, victims, and perpetrators is emerging as a paradigm for crime prevention and recidivism. Sweden is a representative welfare state and is confirming positive effects through correction of criminals based on restorative justice. In addition, it has a stable system related to the legal protection welfare system, and maintains a low recidivism rate and social security through scientific and reasonable operation using evidence-based principles in the evaluation and certification process of operating programs. However, research on the legal protection system implemented in advanced welfare and correctional countries, including Sweden, is still insufficient in Korea. Therefore, this study aims to explore the direction of the domestic legal protection system through a review of Swedish criminal policy and legal protection system, and to identify insufficient areas and complementary points of the domestic system to lay the foundation for improving the domestic legal protection welfare system and expanding business.

Impact of Fourth Industrial Revolution on Airport Management System: Moderator Effect of Convergence and Leadership (4차 산업혁명이 공항경영시스템에 미치는 영향 : 융합 및 리더십의 조절효과)

  • Lee, Yung-Kil;Baek, Jeong-Sun;Park, Sung-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.289-303
    • /
    • 2022
  • The purpose of this study verify to influence the effect of the 4th industrial revolution recognized by airport operators on the airport management system and the moderator effects of convergence and leadership between these influence relationships. Data collected through a survey of airport operators using simple random sampling at six international airports in Korea. Data analysis performed using Structural Equation Modeling. The research results found that the 4th industrial revolution had a positive effect on the airport management system. Also, moderator effects of convergence and leadership found significant statistically. In this paper, we asserts that it should be reconstructed the airport management system as a system suitable for the era of the 4th industrial revolution. This paper provide theoretical data and directions for empirical research to airport researchers, and implications for airport enterprise managers and airport policy planners. The findings of this study are particularly helpful for international airports that have adopted the technologies of the Fourth Industrial Revolution.