• Title/Summary/Keyword: Internal Network Information

Search Result 502, Processing Time 0.022 seconds

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.

The Use of Open Global Network System Interconnection in E-Trading (전자무역의 글로벌 네트워크 개방시스템 상호연결 활용에 관한 연구)

  • Jeong, Boon-Do;Yun, Bong-Ju
    • International Commerce and Information Review
    • /
    • v.16 no.1
    • /
    • pp.207-226
    • /
    • 2014
  • A trade logistic informatization system under Open Systems Interconnection(OSI) includes a Port Management Information System, a Maritime Information System, and an Export and Import Batch Processing System. These have made a great contribution in the creation of more convenient and efficient management for the logistics industries in our country. However, this management is exposed to the technological problems of networks due to the explosive use in the sending and receiving of e-documents. For our country to grow as a center for port and logistic information, we should make the best use of the control systems using networks and further advance the export and import logistic systems. Therefore, this study aims to propose management systems for a composite network and an invasion detection system for efficient management of an e-trade network under OSI. Methods to rationalize the internal organizations such as coordination of organizations and human resources according to alloted network functions, commissions and arbitrary decisions, and reorganization of relevant regulations are not discussed here. This study looked at trade network under OSI from the aspect of practical business affairs and presented a basis for further interpretation.

  • PDF

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

A Purchase Pattern Analysis Using Bayesian Network and Neural Network (베이지안 네트워크와 신경망을 이용한 구매패턴 분석)

  • Hwang Jeong-Sik;Pi Su-Young;Son Chang-Sik;Chung Hwan-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.306-311
    • /
    • 2005
  • To analyze the consumer's purchase pattern, we must consider a factor which is a cultural, social, individual, psychological and so on. If we consider the internal state by the consumer's purchase, Both the consumer's purchase action and the purchase factor can be predicted, so the corporation can use effectively in suitable goods development in a consumer's preference. These factors need a technology that treat uncertain information, because it is difficult to analyze by directly information processing. Therefore, bayesian network manages elements those the observation of inner state such as consumer's purchase is difficult. In addition, it is interpretable about data that the observation is impossible. In this paper, we examine the seller's know-how and the way of consumer's purchase to analyze consumer's purchase action pattern through goods purchase. Also, we compose the bayesian network based on the examined data, and propose the method that predicts purchase patterns. Finally, we remove the data including unnecessary attribute using the bayesian network, and analyze the consumer's Purchase pattern using Kohonen's SOM method.

The Management Strategy of Network Competitiveness by Korean Enterprises in local Turkey (터키 현지 진출 한국 기업의 네트워크 경쟁 전략)

  • Bae, Kyung-Won;Park, Myung-Chan
    • International Commerce and Information Review
    • /
    • v.13 no.4
    • /
    • pp.101-124
    • /
    • 2011
  • This paper is framed for analyzing what the most significant factors are in Turkey, where the Korean investing enterprises should overcome and accomodate to the various barriers of management, especially in terms of network construction. The main purpose of this research is to test empirically some connections of between the managing strategy of network competitiveness by Korean enterprises and the management performances of Korean ones in Turkey while this is composed of two stages. First, the study model is planned by discussing relevant theories, previous studies and the current investment circumstances in local Turkey. Second, the survey of Korean enterprises participated in investment activities in there is practiced by gathering questionnaires. The strategic method of structural equation modeling is implemented to testing some hypotheses. Summing up partially, to maximize profits growth, Korean enterprises have been making application of the internal worker controlling as the means of network competitive advantages.

  • PDF

The Estimation of the Target Position and Size Using Multi-layer Neural Network in Electrical Impedance Tomography (전기 임피던스 단층촬영법에서 다층 신경회로망을 이용한 표적의 위치와 크기 추정)

  • Kim, Ji-Hoon;Kim, Chan-Yong;Cho, Tae-Hyun;Lee, In-Soo
    • The Journal of Korean Institute of Information Technology
    • /
    • v.16 no.11
    • /
    • pp.35-41
    • /
    • 2018
  • Electrical impedance tomography (EIT) is a kind of nondestructive testing technique that obtains the internal resistivity distribution from the voltages measured at the electrodes located outside the area of interest. However, an image reconstruction problem in EIT has innate non-linearity and ill-posedness, so that it is difficult to obtain satisfactory reconstructed results. In general, a neural network can efficiently model the input and output relationships of a non-linear system. This paper proposes a method for estimating the position and size of a circular target using a multi-layer neural network. To verify the performance of the proposed method, neural network was trained and various computer simulations were performed and satisfactory performance was verified.

Ovarian Papillary Adenocarcinoma in a Yorkshire Terrier Dog (요크셔테리어에서 발생한 난소 유두모양샘암종)

  • Cho, Sue-Kyung;Kang, Byeong-Teck;Park, Chul;Yoo, Jong-Hyun;Jung, Dong-In;Lim, Chae-Young;Lee, Jong-Hwan;Woo, Eung-Je;Park, Hee-Myung
    • Journal of Veterinary Clinics
    • /
    • v.24 no.2
    • /
    • pp.251-254
    • /
    • 2007
  • A 10-year-old intact female Yorkshire terrier dog was referred for evaluation of marked abdominal distension and hemorrhagic effusion. Abdominal radiography and ultrasonography demonstrated abdominal effusion and intraabdominal mass with anechoic cystic components. On ascites cytology, neoplastic epithelial cells with vacuolated cytoplasm and prominent nucleoli were identified. Magnetic resonance imaging (MRI) showed the well-defined, heterogeneous, and large mass filled the intraabdominal cavity. At necropsy, a large mass arising from the right ovary was observed. Histopathologically, the mass was composed of papillary structures lined by neoplastic epithelial cells. The dog was definitively diagnosed as malignant ovarian adenocarcinoma with papillary pattern based on clinical and histopathological findings.

An Empirical Study on R&D Effectiveness of IT SMEs (IT중소기업의 R&D시스템 효과성에 관한 실증연구 : 대구경북지역을 중심으로)

  • Shin, Jin-Kyo;Hwang, Su-Jung
    • Management & Information Systems Review
    • /
    • v.28 no.4
    • /
    • pp.109-129
    • /
    • 2009
  • This study aims at investigating the effectiveness of SME's R&D system empirically. Specifically, this study analyze the relationships among R&D inputs(R&D investment, R&D human resource management), process(R&D planning, external network, internal cooperation), and output(technological innovation). A questionnaire was developed to measure the above variables. To test these relations, data were collected from the small and medium-sized IT firms located in Daegu-Kyungbuk region. The survey data of 154 firms were integrated as the empirical base for testing the relations. Most respondents were from the managers. Structural equation modeling analyses were used to examine the relations. Major results are as follows: Firstly, R&D HRM was positively and significantly influenced on the R&D planning. Secondly, R&D planning was positively and significantly affected on the external network, internal cooperation, and technological innovation. Thirdly, the both relations between R&D investment and R&D planning, and external network and technological innovation were not significant statistically. These results suggest the following implications. First, R&D human resource management is very important for IT SMEs. Secondly, internal cooperation mediates R&D inputs and technological innovation by approaching the other department's unique resources and by sharing the cost of new resource development. Several future researches need to overcome the limitations of this research. First, this study's sample was based on the small and medium-sized IT firms just located in Daegu-Kyungbuk region. This limitation may imply that empirical results can not represent overall small and medium-sized firm's situations. Therefore, future research needs to include different samples. Secondly, this study depends on the latitudinal study.

  • PDF

Analysis on the herbal combinations in Korean medicine for atopic dermatitis (아토피 치료 처방의 본초 활용 분석)

  • Kim, An-Na;Kim, Sang-Kyun;Seo, Jin-Soon;Kim, Sang-Hyun;Kim, Young-Eun;Jang, Hyun-Chul
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.29 no.2
    • /
    • pp.82-97
    • /
    • 2016
  • Objective : The aim of this study was to search and analyze the herbal combinations in formulas used to treat atopic dermatitis in Korean medicine. Methods : Articles on the atopy were searched for from among those registered on the OASIS up to December, 2015. After the articles were reviewed, information on both internal and external formulas for atopy was constructed. Then, the herbal combination in the formulas was analyzed by using frequency distribution, network analysis, and data mining. Results : The combination of 'Saposhnikovia Radix - Schizonepetae Spica' and 'Scutellariae Radix - Phellodendri Cortex ' was mostly used in both internal and external formulas to treat atopy in articles. By using the network analysis and data mining, twelve combinations including ' (Saposhnikovia Radix, Ponciri Fructus Pericarpium) - (Platycodi Radix, Schizonepetae Spica) ' were discovered. Five effective combinations were also searched for external formulas.Conclusions : This study could help researchers to analyze the formulas in various ways. Moreover, the herbal combination in atopy formulas could be used to search for atopy formulas in other databases or make a new prescription.

CDMA-Based Ubiquitous $SaO_2$ Monitoring System for Oxygen Therapy Patients

  • Lee, Seung-Yup;Kang, Jae-Min;Shin, Il-Hyeung;Lee, Jae-Ho;Lee, Choon-Taek;Kim, Hee-Chan
    • Journal of Biomedical Engineering Research
    • /
    • v.27 no.5
    • /
    • pp.274-281
    • /
    • 2006
  • In this paper, we propose a ubiquitous $SaO_2$ monitoring system for patients using oxygen therapy. For these patients, the ability to monitor oxygen saturation ubiquitously is very important fur accurate adjustment of ventilator's flow rate to match the patient's time-varying requirements with the shortest lag time possible. We have developed a portable device to measure $SaO_2$ and transmit it to hospital in real-time or in store-and-forward mode through the integration of $Bluetooth^{TM}$ technology and the code division multiple access (CDMA) cellular network. We also developed software for doctors to receive and manage the patients' $SaO_2$ information. Performance of the developed system was evaluated as acceptable by assessing the accuracy of the measured oxygen saturation value and the stability of communication network. Test results in real clinical setting demonstrate that our system is feasible for immediate use in home oxygen therapy.