• Title/Summary/Keyword: L2 Security

Search Result 152, Processing Time 0.029 seconds

PDF Publication Solution based on Web (웹을 기반으로 한 PDF 출판 솔류션에 관한 연구)

  • Lee Jae-Deuk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.28 no.2
    • /
    • pp.109-116
    • /
    • 2005
  • In the previous C/S publishing system, the editor or contributor can arbitrarily modify the document created by the author, in which case it is difficult to identify the changes made in the document. Another shortcoming is in that when the document is in need of tracking or editing, the client must have the respective editing system. To solve this problem, the gist of the document must be preserved along with the document itself, and the process of handling the document must be standardized. Publishing on the web ensures a more stable and accurate result in processing documents. The significance of web publishing is made clear, when we consider the importance of information per se and the growing demand for immediate publication in the present day. The need for a simple and straightforward apache-based PDF publishing system, in which HTML and CSS are supported, and a converting engine provides PDF standard security application support, is prominent. This provides a library in which one can directly create a PDF via Windows, Linux, or Unix without having to rely on a client, allowing high-speed PDF creation. The development of a web-accessed PDF converting engine forms the basis for e-transactions, online brochures, electronic B/L, and many other industrial sectors.

A Study on Process of Change and Assumption of Archetype of Winsborough Hall at Speer Girls' School in Gwangju (광주구수피아여학교 윈스브로우홀의 변화와 원형추정 연구)

  • Shin, Woong-Ju;Sung, Dae-Chul
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.14 no.4
    • /
    • pp.97-105
    • /
    • 2012
  • Winsborough Hall built by Martin L. Winehart who was the missionary of the Presbyterian Church of America in 1927 was built by Mrs. Winsborough's birthday contribution. Winsborough Hall was clearly divided into the original form built in 1927 and remodelled form by extension. Most of walls were constructed with several kinds of bricks for both sides and opening in the original form and remodelled form. Each room divided by inner wall was kept with original form because it is difficult to remodel it on the characteristics of building. But, it was confirmed through the related literatures that security of opening at some rooms and annexation of rooms through removal of the wall on the 2nd floor which was relatively easy to transform wall compared to the first floor were made. Variability of the wall affected the truss structure of roof and it created rare double truss structure. Architectural value of Winsborough Hall was in its first architectural trial using red brick in Gwangju region since 1920s. It suggested that it was differential architectural trial from Korean-Western mixed building constructed by the missionaries from 1940 to 1910 and buildings made of gray bricks prevailed from 1911 to 1920 and it showed the advancement in the architectural structure and materials.

Design and Fabrication of Low Power Sensor Network Platform for Ubiquitous Health Care

  • Lee, Young-Dong;Jeong, Do-Un;Chung, Wan-Young
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1826-1829
    • /
    • 2005
  • Recent advancement in wireless communications and electronics has enabled the development of low power sensor network. Wireless sensor network are often used in remote monitoring control applications, health care, security and environmental monitoring. Wireless sensor networks are an emerging technology consisting of small, low-power, and low-cost devices that integrate limited computation, sensing, and radio communication capabilities. Sensor network platform for health care has been designed, fabricated and tested. This system consists of an embedded micro-controller, Radio Frequency (RF) transceiver, power management, I/O expansion, and serial communication (RS-232). The hardware platform uses Atmel ATmega128L 8-bit ultra low power RISC processor with 128KB flash memory as the program memory and 4KB SRAM as the data memory. The radio transceiver (Chipcon CC1000) operates in the ISM band at 433MHz or 916MHz with a maximum data rate of 76.8kbps. Also, the indoor radio range is approximately 20-30m. When many sensors have to communicate with the controller, standard communication interfaces such as Serial Peripheral Interface (SPI) or Integrated Circuit ($I^{2}C$) allow sharing a single communication bus. With its low power, the smallest and low cost design, the wireless sensor network system and wireless sensing electronics to collect health-related information of human vitality and main physiological parameters (ECG, Temperature, Perspiration, Blood Pressure and some more vitality parameters, etc.)

  • PDF

A Content Analysis of Web sites from a Perspective of Children's Online Privacy Protection (아동 대상 인터넷 사이트의 개인정보보호 실태와 개선 방향)

  • Kim, So-Ra;Rhee, Kee-Choon
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.8
    • /
    • pp.127-142
    • /
    • 2007
  • The objective of this study was to discuss child privacy issues at Web sites targeting children, Specifically, the study examined l)types of information required for join the membership, 2)whether privacy policies at Web sites for children abide by privacy guideline, and 3)specific examples of recommendable privacy policy and problematic privacy policy from Web sites, Total of 305 Web sites targeting children were used for content analysis, Selected Web sites included recommended sites by Korea Council of Children's Organizations and food business Web sites, The results showed that more than 70% of Web sites required private information when children join the membership. Most of these Web sites provided mailing service for children. Generally, Web sites showed problems in parents' approval procedures. Also, privacy policies at Web sites frequently omitted purpose specification principle and the security safeguard principle. Regulating online service provides and marketers targeting children would be necessary for protecting child privacy. Further, education program targeting parents and children could help them make right choices to protect children's online privacy.

How to Implement Successful Virtual Desktop Infrastructure (VDI) in the Manufacturing Sector

  • KIM, Tae-Hi
    • The Journal of Industrial Distribution & Business
    • /
    • v.13 no.10
    • /
    • pp.15-22
    • /
    • 2022
  • Purpose: In the manufacturing sector, VDI (Virtual Desktop Infrastructure) offers advantages to the organizations, such as allowing manufacturers access to the system from any location. The most important things are understanding what the user needs, avoiding under-provisioning, network preparation. This research is to provide useful practical l implementations of VDI in manufacturing industry based on numerous prior studies. Research design, data and methodology: This research has conducted the qualitative content analysis (QCA). When conducting this research, the present author assumed that it is crucial to create the procedures and processes that will be used to acquire the text data needed to structure or solve problems. Results: According to the prior literature analysis, there are five suggestions to implement successful VDI for manufacturing sector. The five solutions are (1) Creation of the machines, (2) Direct users to an available 'Virtual Machine', (3) 'Virtual Machine Power Management', (4) Performance monitoring, and (5) Review security. Conclusions: The research clearly details how VDI can be implemented on a manufacturer platform and how it can be connected to hundreds of users. The author can conclude that connecting hundreds of users can be done using the remote connection of devices and encourage manufacturers to work from different areas.

A study for Internal Accounting Control Based on Computerized Accounting Information System (전산화된 회계정보시스템의 내부회계통제의 운영방안에 관한 연구)

  • 손명철
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.10
    • /
    • pp.1355-1364
    • /
    • 2001
  • Internal control comprises the plan of Organization and all of the coordinate methods and measure adopted within a business to safeguard its assets. check the accuracy and reliability of its accounting data, promote operation efficiency, and encourage adherence to prescribed managerial policies. Internal accounting control is classified into General Control and Application Control. Essential elements of internal accounting control as follows : 1. General Control $\circled1$ Organization and operation controls. $\circled2$ System development and Documentation controls. $\circled3$ Hardware controls. $\circled4$ Software and hardware Accessibility controls. $\circled5$ General systems security and protection 2. Application control $\circled1$Input control. $\circled2$ Processing control. $\circled3$ Output control. Internal accounting control can establish a total management information system by connecting with mana-gement control of a company, and enable decision makers to establish decision support system(DSS), is so vital today.

  • PDF

Effect of Intercropping Ratio on the Cherry Tomato with Basil on the Growth, Physiological, and Productivity Parameters on the Rooftop in Urban Agriculture (옥상 도시농업에서 방울토마토(Lycopersicon esculentum)와 바질(Ocimum basilicum)간의 공영식재가 생육, 생리, 생산성에 미치는 영향)

  • Ju, Jin-Hee;Song, Hee-Yeon;Oh, Deuk-Kyun;Park, Sun-Yeong;Yoon, Yong-Han
    • Journal of Environmental Science International
    • /
    • v.30 no.9
    • /
    • pp.709-717
    • /
    • 2021
  • This study evaluated the growth, physiological responses and productivity based on the intercropping ratio of cherry tomato (Lycopersicon esculentum L.) with basil (Ocimum basilicum L.). on the rooftops to determine out the efficient ratio in urban agriculture. From April to September 2019, an experiment was conducted on the rooftop of Konkuk University Glocal Campus. Cherry tomato and basil were selected as companion plants for eco-friendly urban agriculture on the rooftops. Each plot was created with a width of 100 cm, length of 100 cm, and height of 25 cm. After installing drainage and waterproof layers from bottom to top, substrate was laid out with a height of 20 cm. Intercropping ratio was consisted of a single tomato plant (TC), 2:1 tomato to basil (T2B1), 1:1 tomato to basil (T1B1), 1:2 tomato to basil 2 (T1B2), and a single basil plant (BC), were conducted using a randomized complete plot design with five treatments and three replication (a total 15 plots). Measurements were divided into growth, physiological responses, and productivity parameters, and detailed items were investigated and analyzed by classifying them into plant height, leaf length, leaf width, number of leaves, root length, root collar caliper, chlorophyll contents, fresh weight, dry weight, number of fruit, fruit caliper, fruit weight, and sugar content. Comparative analyses of cherry tomato with basil plants by intercropping ratio, growth, physiological, and productivity responses are determined to be efficient when the ratio of cherry tomato to basil ratio is 2:1 or 1:1.

A Small-Area Hardware Implementation of Hash Algorithm Standard HAS-160 (해쉬 알고리듬 표준 HAS-l60의 저면적 하드웨어 구현)

  • Kim, Hae-Ju;Jeon, Heung-Woo;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.715-722
    • /
    • 2010
  • This paper describes a hardware design of hash function processor which implements Korean Hash Algorithm Standard HAS-160. The HAS-160 processor compresses a message with arbitrary lengths into a hash code with a fixed length of 160-bit. To achieve high-speed operation with small-area, arithmetic operation for step-operation is implemented by using a hybrid structure of 5:3 and 3:2 carry-save adders and carry-select adder. It computes a 160-bit hash code from a message block of 512 bits in 82 clock cycles, and has 312 Mbps throughput at 50 MHz@3.3-V clock frequency. The designed HAS-160 processor is verified by FPGA implementation, and it has 17,600 gates on a layout area of about $1\;mm^2$ using a 0.35-${\mu}m$ CMOS cell library.

Studies on Pulping of Sponge Gourd Net Fiber - Analysis of Morphology and Characteristics of Pulps - (수세미외 섬유의 펄프화에 관한 연구-섬유의 구조와 펄프화별 특징 분석-)

  • Kim, Jong-Gyu;Rho, Jae-Seong;Lee, Jong-Shin
    • Applied Chemistry for Engineering
    • /
    • v.8 no.6
    • /
    • pp.1014-1021
    • /
    • 1997
  • Studies were carried out on the preparation of several kinds of pulps from Sponge gourd fiber by KP, ASP, SP PAP, AP and addition of AQ pulping process. These unbeaten and beaten pulping fibers were observed their characteristics and fiber structure by SEM, FQA, Image analyzer and Micro projector. The results were summarized as follows; 1) The cooking condition which is the possible defibrilation of Shives are KP base($160^{\circ}C$, 2hr.), ASP base($155^{\circ}C$, 4hr.), PAP base($160^{\circ}C$, 1hr.). From the results, the kappa no. had the range of 12, 25, 10 each other. 2) The pulp yields of sponge gourd fiber obtained the range of KP 50~55%, ASP&60~70% and PAP 45~50%. SP base have the highest and contnets of KP&PAP base are much the same as woods. 3) Increasing amount of NaOH on Pulping was accelerated the defibrilation of Shives and was changed a morphology of pulping fiber quality such as fiber length, curl and kink index. 4) Addition of AQ on pulping process of sponge gourd fiber had a affect to raise the rate of delignification while protecting cellullosic components against degradation, especially defibrilation was very excellent, beated pulp much more easily and increased the fibrilation. 5) ASP system have higher bulk density, fiber bonding and protecting cellullosic components against degradation than KP or PAP. 6) The color reactions of the "C" stain solution showed blue or blue-gray with clean and transparency thin cell wall.

  • PDF

A Research on Network Intrusion Detection based on Discrete Preprocessing Method and Convolution Neural Network (이산화 전처리 방식 및 컨볼루션 신경망을 활용한 네트워크 침입 탐지에 대한 연구)

  • Yoo, JiHoon;Min, Byeongjun;Kim, Sangsoo;Shin, Dongil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.29-39
    • /
    • 2021
  • As damages to individuals, private sectors, and businesses increase due to newly occurring cyber attacks, the underlying network security problem has emerged as a major problem in computer systems. Therefore, NIDS using machine learning and deep learning is being studied to improve the limitations that occur in the existing Network Intrusion Detection System. In this study, a deep learning-based NIDS model study is conducted using the Convolution Neural Network (CNN) algorithm. For the image classification-based CNN algorithm learning, a discrete algorithm for continuity variables was added in the preprocessing stage used previously, and the predicted variables were expressed in a linear relationship and converted into easy-to-interpret data. Finally, the network packet processed through the above process is mapped to a square matrix structure and converted into a pixel image. For the performance evaluation of the proposed model, NSL-KDD, a representative network packet data, was used, and accuracy, precision, recall, and f1-score were used as performance indicators. As a result of the experiment, the proposed model showed the highest performance with an accuracy of 85%, and the harmonic mean (F1-Score) of the R2L class with a small number of training samples was 71%, showing very good performance compared to other models.