• Title/Summary/Keyword: Internal Network Information

Search Result 508, Processing Time 0.026 seconds

A Study on the Management Strategy of a National Library for the Policy Information Service: with a Special Reference to the National Sejong Library (정책정보서비스 활성화를 위한 국립도서관 운영전략 연구 - 국립세종도서관을 중심으로 -)

  • Kwak, Seung-Jin;Lee, Eung-Bong;Chang, Durk-Hyun;Bae, Kyung-Jae;Kim, Jeong-Taek
    • Journal of Korean Library and Information Science Society
    • /
    • v.42 no.3
    • /
    • pp.311-330
    • /
    • 2011
  • In line with the establishment of the National Sejong Library, the main objective of this study is to construct a basic management plan to enable smooth operations of the library from its opening. To follow through with this goal, this paper analyzes the environment surrounding the National Sejong Library, puts forth new strategies to reinforce the policy information service, and suggests new development plans for the library's collection. This study examines the internal and external environment of the library through face-to-face interviews with library staff, while conducting surveys on public officials transferred to the city for suggestions on how to reinforce the policy information service. The vision of the National Sejong Library is to become a specialized resource institution in administrative policy, while also fulfilling the day-to-day needs of the community and serving as a supplementary record storage facility to the National Library. In order to reinforce the policy information service, it is crucial to digitize all policy-related theses, reports, and trend research, while establishing a firm network with other libraries in Korea and abroad to provide a wider range of policy files, local government policy documents, and other resources.

BLE Beacon Based Online Offline Tourism and Solutions for Regional Tourism Activation (지역관광 활성화를 위한 비콘 기반의 온오프라인 관광 솔루션)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.2
    • /
    • pp.21-26
    • /
    • 2016
  • In this paper, it is possible to update the tourist information in real time, on/off-line tour proposes a solution(BBTS) based on a bluetooth beacon can provide tourist information without the need for wireless data network. BBTS consists of a bluetooth based data of the low-power supply system and the beacons and interoperable smart applications. Data supply system consists of the BLE & Beacon Pairing-based / non-pairing data transmission module with integral hardware. Smart application modules that provide indoor location of users information, internal server module and tourist information collection and information guide around comprised of applications. The proposed BBTS is possible that indoor service tourism tourist demand due to utilizing the beacon technology. Outdoor tourist information is designed to be downloaded to the smartphone receives the information received from the beacon APK file to provide services. BBTS system is expected to make a big impact on the smart tourism services industry.

A System for SSL/TLS Vulnerability Detection of Servers (서버 SSL/TLS 취약점 자동 탐지를 위한 시스템 개발)

  • Cho, Sungwon;Choi, Hyunsang;Heo, Gyu;Cho, Sanghyun;Kim, Young-Gab
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.145-153
    • /
    • 2018
  • SSL (Secure Socket Layer) and TLS (Transport Layer Security) are widely used protocols for secure and encrypted communication over a computer network. However, there have been reported several security vulnerabilities of SSL/TLS over the years. The vulnerabilities can let an adversary carry out critical attacks on SSL/TLS enabled servers. In this paper, we have developed a system which can periodically scan SSL/TLS vulnerabilities on internal network servers and quickly detects, reports and visualizes the vulnerabilities. We have evaluated the system on working servers of Naver services and analyzed detected vulnerabilities. 816 vulnerabilities are found on 213 internal server domains (4.2 vulnerabilities on average) and most vulnerable servers are not opened to public. However, 46 server domains have old vulnerabilites which were found 2016. We could patch and response to SSL/TLS vulnerabilites of servers by leveraging the proposed system.

A Study on Security Management Methods for Information System of Educational Institutions (교육기관의 정보시스템 보안관리 방안 연구)

  • Choi, JinMyung;Kim, DooYeon
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.6
    • /
    • pp.95-104
    • /
    • 2017
  • The damage caused by information spill, forgery, falsification, and deletion by cyber infringement in educational institutions and universities is very large. In this study, we analyzed the types, causes, and problems of cyber infringement in educational administrative institutions and universities. As a result, administrative, physical and technical information protection activities were weak. In this paper, we propose a security enhancement method for each domain by dividing them into Internet zone, network-neutral zone (DMZ: Demilitarized Zone), general server zone, internal server zone (Server Farm), and user zone so that these vulnerabilities can be easily identified, supplemented or security enhanced. In addition, we have proposed a method to apply security information system architecture and information protection technology correctly for educational administration institutions and universities. This study is meaningful not to provide conceptual guidance but to suggest specific action and procedure oriented security management plan.

A Multimedia Presentation Authoring System based on Conceptual Temporal Relations (개념적 시간관계 기반의 멀티미디어 프레젠테이션 저작 시스템)

  • 노승진;장진희;성미영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.266-277
    • /
    • 2003
  • Every conceptual temporal rat relationship can be described using one of seven relations (before, meets, overlaps, during, starts, finishes, and equals ). The conceptual representation provides an efficient means for our multimedia authoring system to automatically fill in the necessary timing details. We developed a multimedia Presentation authoring system that supports a mechanism for conceptually representing the temporal relations of different media. Among the many editors that make up our system, the temporal relation editor provides users with an intuitive mechanism for representing the conceptual flow of a presentation by simple and direct graphical manipulations. Our system is based on the SMIL(Synchronized Multimedia Integration Language). The conceptual temporal relation editor and other editors of our system exchange their information in real-time and automatically generate SMIL codes through the SMIL Object Manager. Our system uses TRN(Temporal Relation Network) as its internal multimedia presentation representation. The TRN corresponds exactly to the structure seen in the graphical representation of the presentation. A parallel relationship found in a TRN can be collapsed into a single synchronization block. This facilitates the determination of the playing time of each component and can be the basic unit for reusability of already prepared blocks of presentation code.

Behavioral motivation-based Action Selection Mechanism with Bayesian Affordance Models (베이지안 행동유발성 모델을 이용한 행동동기 기반 행동 선택 메커니즘)

  • Lee, Sang-Hyoung;Suh, Il-Hong
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.46 no.4
    • /
    • pp.7-16
    • /
    • 2009
  • A robot must be able to generate various skills to achieve given tasks intelligently and reasonably. The robot must first learn affordances to generate the skills. An affordance is defined as qualities of objects or environments that induce actions. Affordances can be usefully used to generate skills. Most tasks require sequential and goal-oriented behaviors. However, it is usually difficult to accomplish such tasks with affordances alone. To accomplish such tasks, a skill is constructed with an affordance and a soft behavioral motivation switch for reflecting goal-oriented elements. A skill calculates a behavioral motivation as a combination of both presently perceived information and goal-oriented elements. Here, a behavioral motivation is the internal condition that activates a goal-oriented behavior. In addition, a robot must be able to execute sequential behaviors. We construct skill networks by using generated skills that make action selection feasible to accomplish a task. A robot can select sequential and a goal-oriented behaviors using the skill network. For this, we will first propose a method for modeling and learning Bayesian networks that are used to generate affordances. To select sequential and goal-oriented behaviors, we construct skills using affordances and soft behavioral motivation switches. We also propose a method to generate the skill networks using the skills to execute given tasks. Finally, we will propose action-selection-mechanism to select sequential and goal-oriented behaviors using the skill network. To demonstrate the validity of our proposed methods, "Searching-for-a-target-object", "Approaching-a-target-object", "Sniffing-a-target-object", and "Kicking-a-target-object" affordances have been learned with GENIBO (pet robot) based on the human teaching method. Some experiments have also been performed with GENIBO using the skills and the skill networks.

An Effective Microcalcification Detection in Digitized Mammograms Using Morphological Analysis and Multi-stage Neural Network (디지털 마모그램에서 형태적 분석과 다단 신경 회로망을 이용한 효율적인 미소석회질 검출)

  • Shin, Jin-Wook;Yoon, Sook;Park, Dong-Sun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.374-386
    • /
    • 2004
  • The mammogram provides the way to observe detailed internal organization of breasts to radiologists for the early detection. This paper is mainly focused on efficiently detecting the Microcalcification's Region Of Interest(ROI)s. Breast cancers can be caused from either microcalcifications or masses. Microcalcifications are appeared in a digital mammogram as tiny dots that have a little higher gray levels than their surrounding pixels. We can roughly determine the area which possibly contain microcalifications. In general, it is very challenging to find all the microcalcifications in a digital mammogram, because they are similar to some tissue parts of a breast. To efficiently detect microcalcifications ROI, we used four sequential processes; preprocessing for breast area detection, modified multilevel thresholding, ROI selection using simple thresholding filters and final ROI selection with two stages of neural networks. The filtering process with boundary conditions removes easily-distinguishable tissues while keeping all microcalcifications so that it cleans the thresholded mammogram images and speeds up the later processing by the average of 86%. The first neural network shows the average of 96.66% recognition rate. The second neural network performs better by showing the average recognition rate 98.26%. By removing all tissues while keeping microcalcifications as much as possible, the next parts of a CAD system for detecting breast cancers can become much simpler.

Study on Detection Technique of Privacy Distribution Route based on Interconnection of Security Documents and Transaction ID (보안문서와 트랜잭션ID 연계기반 개인정보유통경로 탐지기법 연구)

  • Shin, Jae-ho;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1435-1447
    • /
    • 2015
  • Finance Companies are operating a security solution such as E-DRM(Enterprise-Digital Right Management), Personal information search, DLP(Data Loss Prevention), Security of printed paper, Internet network separation system, Privacy monitoring system for privacy leakage prevention by insiders. However, privacy leakages are occurring continuously and it is difficult to the association analysis about relating to the company's internal and external distribution of private document. Because log system operated in the separate and independent security solutions. This paper propose a systematic chains that can correlatively analyze business systems and log among heterogeneous security solutions organically and consistently based on security documents. Also, we suggest methods of efficient detection for Life-Cycle management plan about security documents that are created in the personal computer or by individual through the business system and distribution channel tracking about security documents contained privacy.

A Hybrid Forecasting Framework based on Case-based Reasoning and Artificial Neural Network (사례기반 추론기법과 인공신경망을 이용한 서비스 수요예측 프레임워크)

  • Hwang, Yousub
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.43-57
    • /
    • 2012
  • To enhance the competitive advantage in a constantly changing business environment, an enterprise management must make the right decision in many business activities based on both internal and external information. Thus, providing accurate information plays a prominent role in management's decision making. Intuitively, historical data can provide a feasible estimate through the forecasting models. Therefore, if the service department can estimate the service quantity for the next period, the service department can then effectively control the inventory of service related resources such as human, parts, and other facilities. In addition, the production department can make load map for improving its product quality. Therefore, obtaining an accurate service forecast most likely appears to be critical to manufacturing companies. Numerous investigations addressing this problem have generally employed statistical methods, such as regression or autoregressive and moving average simulation. However, these methods are only efficient for data with are seasonal or cyclical. If the data are influenced by the special characteristics of product, they are not feasible. In our research, we propose a forecasting framework that predicts service demand of manufacturing organization by combining Case-based reasoning (CBR) and leveraging an unsupervised artificial neural network based clustering analysis (i.e., Self-Organizing Maps; SOM). We believe that this is one of the first attempts at applying unsupervised artificial neural network-based machine-learning techniques in the service forecasting domain. Our proposed approach has several appealing features : (1) We applied CBR and SOM in a new forecasting domain such as service demand forecasting. (2) We proposed our combined approach between CBR and SOM in order to overcome limitations of traditional statistical forecasting methods and We have developed a service forecasting tool based on the proposed approach using an unsupervised artificial neural network and Case-based reasoning. In this research, we conducted an empirical study on a real digital TV manufacturer (i.e., Company A). In addition, we have empirically evaluated the proposed approach and tool using real sales and service related data from digital TV manufacturer. In our empirical experiments, we intend to explore the performance of our proposed service forecasting framework when compared to the performances predicted by other two service forecasting methods; one is traditional CBR based forecasting model and the other is the existing service forecasting model used by Company A. We ran each service forecasting 144 times; each time, input data were randomly sampled for each service forecasting framework. To evaluate accuracy of forecasting results, we used Mean Absolute Percentage Error (MAPE) as primary performance measure in our experiments. We conducted one-way ANOVA test with the 144 measurements of MAPE for three different service forecasting approaches. For example, the F-ratio of MAPE for three different service forecasting approaches is 67.25 and the p-value is 0.000. This means that the difference between the MAPE of the three different service forecasting approaches is significant at the level of 0.000. Since there is a significant difference among the different service forecasting approaches, we conducted Tukey's HSD post hoc test to determine exactly which means of MAPE are significantly different from which other ones. In terms of MAPE, Tukey's HSD post hoc test grouped the three different service forecasting approaches into three different subsets in the following order: our proposed approach > traditional CBR-based service forecasting approach > the existing forecasting approach used by Company A. Consequently, our empirical experiments show that our proposed approach outperformed the traditional CBR based forecasting model and the existing service forecasting model used by Company A. The rest of this paper is organized as follows. Section 2 provides some research background information such as summary of CBR and SOM. Section 3 presents a hybrid service forecasting framework based on Case-based Reasoning and Self-Organizing Maps, while the empirical evaluation results are summarized in Section 4. Conclusion and future research directions are finally discussed in Section 5.

Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control (데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현)

  • Lee, Byoung-Yup;Park, Jun-Ho;Kim, Mi-Kyoung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.61-68
    • /
    • 2011
  • Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.