• Title/Summary/Keyword: Organization code

Search Result 185, Processing Time 0.031 seconds

Efficient method for finding patched vulnerability with code filtering in Apple iOS (코드 필터링 기법을 이용한 iOS 환경에서의 패치 분석 방법론)

  • Jo, Je-gyeong;Ryou, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1021-1026
    • /
    • 2015
  • Increasing of damage by phishing, government and organization response more rapidly. So phishing use malware and vulnerability for attack. Recently attack that use patch analysis is increased when Microsoft announce patches. Cause of that, researcher for security on defense need technology of patch analysis. But most patch analysis are develop for Microsoft's product. Increasing of mobile environment, necessary of patch analysis on mobile is increased. But ordinary patch analysis can not use mobile environment that there is many file and small size. So we suggest this research that use code filtering instead of Control Flow Graph and Abstract Syntax Tree.

Implementation of the Classification system for Dental Behavior using Multi-Axial Classification System (다축분류체계를 이용한 치과용 의료행위 분류체계 구축)

  • Ahn, S.H.;Chun, M.C.;Kim, M.S.;Hong, J.Y.;Kim, K.T.;Jun, K.R.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1998 no.11
    • /
    • pp.255-256
    • /
    • 1998
  • In this paper, we propose the multi-axial classification system using parallel coding method that is systemic and flexible properties for representing dental clinical behavior. The methodology and organization of this thesis as follows. First, an analysis of other classification systems. Second, the domain of medical behavior and axises using selected elements was were determined. Third, the new code system is constructed of these common factors in properties of prediction of hierarchy, brevity, simplicity, flexibility and mnemonic usage. Finally, the framework of classification system for dental was made using multi-axial code system. The result of the this study, the eight bases axis of multi-axial code system is composed and can be basic information of research for construction of classification system of all medical domain.

  • PDF

A Study on the Development of Curriculum of Polar safety training (극지기초안전교육과정 개발에 관한 연구)

  • LEE, Jin-Woo;KIM, E-Wan;WOO, Young-Jin;LEE, Chang-Hee
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.28 no.4
    • /
    • pp.1031-1041
    • /
    • 2016
  • Interests in the Polar Regions have been growing due to various factors such as depletion of natural resources and advanced resource development technologies, accelerated rate of polar ice melting as a result of global warming, etc. In particular, demand for the workforce related to vessel passage using the Northern Sea Route and polar studies is still expanding. The International Maritime Organization adopted the Polar Code in 2015 for the safety of ship operation in polar waters and it will enter into force from 2017. But education and training section in the code has been prescribed only for the safe navigation in the ice covered waters intended for navigational offices. There is no basic safety training requirement that applies commonly for all personnel exposed to the risk of the polar regions and the relevant study or discussion has not been made so far. Therefore, this study provides basic data for developing safety training courses for crew and other personnel by analyzing relevant regulations on polar safety training and the contents of relevant safety training in offshore industry required by the costal states adjacent to arctic ocean.

Computational study of the Nitrogen-16 source term in the ITER vacuum vessel cooling circuit through the coupling of system-level analysis code and CFD

  • M. De Pietri;C. Fiorina;Y. Le Tonqueze;R. Juarez
    • Nuclear Engineering and Technology
    • /
    • v.56 no.8
    • /
    • pp.2990-2998
    • /
    • 2024
  • In ITER, the evaluation of the activated water radiation source and its impact on the radiological levels is necessary to demonstrate compliance with the safety requirements. The use of simplified or conservative approaches often results in the application of expensive constraints on the installation that impact its economics, operations, and construction schedule. In this work, we propose a novel methodology to calculate the activated water source term with a higher degree of realism. The methodology is based on the coupling of a system-level code with a Computational Fluid Dynamics (CFD) code in an explicit, one-way approach. We apply this methodology to the evaluation of the16N radioisotope within the ITER Vacuum Vessel Primary Heat Transfer System (VV-PHTS) cooling circuit in a steady-state and transient scenarios. We chose this system since previous analyses of the VV-PHTS were done with simple, ad-hoc calculations that yielded results that differed by up to a factor of five, underscoring a higher level of uncertainty. As a result, we generate a computational model of the source term that can be used to evaluate the radiological condition surrounding the cooling systems during the operations.

Integrative Analysis of Microarray Data with Gene Ontology to Select Perturbed Molecular Functions using Gene Ontology Functional Code

  • Kim, Chang-Sik;Choi, Ji-Won;Yoon, Suk-Joon
    • Genomics & Informatics
    • /
    • v.7 no.2
    • /
    • pp.122-130
    • /
    • 2009
  • A systems biology approach for the identification of perturbed molecular functions is required to understand the complex progressive disease such as breast cancer. In this study, we analyze the microarray data with Gene Ontology terms of molecular functions to select perturbed molecular functional modules in breast cancer tissues based on the definition of Gene ontology Functional Code. The Gene Ontology is three structured vocabularies describing genes and its products in terms of their associated biological processes, cellular components and molecular functions. The Gene Ontology is hierarchically classified as a directed acyclic graph. However, it is difficult to visualize Gene Ontology as a directed tree since a Gene Ontology term may have more than one parent by providing multiple paths from the root. Therefore, we applied the definition of Gene Ontology codes by defining one or more GO code(s) to each GO term to visualize the hierarchical classification of GO terms as a network. The selected molecular functions could be considered as perturbed molecular functional modules that putatively contributes to the progression of disease. We evaluated the method by analyzing microarray dataset of breast cancer tissues; i.e., normal and invasive breast cancer tissues. Based on the integration approach, we selected several interesting perturbed molecular functions that are implicated in the progression of breast cancers. Moreover, these selected molecular functions include several known breast cancer-related genes. It is concluded from this study that the present strategy is capable of selecting perturbed molecular functions that putatively play roles in the progression of diseases and provides an improved interpretability of GO terms based on the definition of Gene Ontology codes.

IaC-VIMF: IaC-Based Virtual Infrastructure Mutagenesis Framework for Cyber Defense Training (IaC-VIMF: 사이버 공방훈련을 위한 IaC 기반 가상 인프라 변이 생성 프레임워크)

  • Joo-Young Roh;Se-Han Lee;Ki-Woong Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.527-535
    • /
    • 2023
  • To develop experts capable of responding to cyber security incidents, numerous institutions have established cyber training facilities to cultivate security professionals equipped with effective defense strategies. However, these challenges such as limited resources, scenario-based content development, and cost constraints. To address these issues, this paper proposes a virtual infrastructure variation generation framework. It provides customized, diverse IT infrastructure environments for each organization, allowing cyber defense trainers to accumulate a wide range of experiences. By leveraging Infrastructure-as-Code (IaC) containers and employing Word2Vec, a natural language processing model, mutable code elements are extracted and trained, enabling the generation of new code and presenting novel container environments.

The effect of the ISM Code revision in the shipping industry - Focusing on ship price and hull insurance - (ISM Code 개정이 해운산업에 미치는 영향에 관한 연구 - 선가 및 선박보험에 대한 영향을 중심으로 -)

  • Lim, Sung-Yong;Woo, Su-Han
    • Journal of Navigation and Port Research
    • /
    • v.37 no.1
    • /
    • pp.113-121
    • /
    • 2013
  • IMO(International Maritime Organization) is existed the movement for revising ISM Code so that the maintenance history and the trouble information given trading in a ship can be transferred. An empirical analysis was made on the influence that will have upon shipping industry through surveying on the recognition on ISM Code revision in employees of the relevant field and on the expected problems given being amended ISM Code as the above. In conclusion, the positive effect is judged to be more in the aspect of ship safety, which is the aim of ISM Code, rather than the negative effect, which may take place given being revised ISM Code. In other words, the clean market can be formed through this because fairness is maintained on both sides given trading in a ship by which opening the maintenance record and the trouble history is applied equally to a buyer and a seller. Ships can be reduced a loss of time and cost in preventing similar problems and seeking solution that may appear in important equipments, through this maintenance record. Also, based on these materials, it comes to be available for analyzing a risk of ship and preventing and managing a risk, thereby being increased ability of maintenance and repair in a ship, resulting in being judged to likely contributing to ship safety and environmental-pollution prevention.

A Study on perception of effects about ISM Code amendments (ISM Code 개정 시 미치는 영향 인식에 관한 연구)

  • Lim, Sung-Yong;Jo, Min-Chul
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.06a
    • /
    • pp.163-165
    • /
    • 2013
  • IMO(International Maritime Organization) is existed the movement for revising ISM Code so that the maintenance history and the trouble information given trading in a ship can be transferred. An empirical analysis was made on the influence that will have upon shipping industry through surveying on the recognition on ISM Code revision in employees of the relevant field and on the expected problems given being amended ISM Code as the above. In conclusion, the positive effect is judged to be more in the aspect of ship safety, which is the aim of ISM Code, rather than the negative effect, which may take place given being revised ISM Code. In other words, the clean market can be formed through this because fairness is maintained on both sides given trading in a ship by which opening the maintenance record and the trouble history is applied equally to a buyer and a seller. Ships can be reduced a loss of time and cost in preventing similar problems and seeking solution that may appear in important equipments, through this maintenance record. Also, based on these materials, it comes to be available for analyzing a risk of ship and preventing and managing a risk, thereby being increased ability of maintenance and repair in a ship, resulting in being judged to likely contributing to ship safety and environmental-pollution prevention.

  • PDF

A Study on Enterprise and Government Information Security Enhancement with Information Security Management System (정보보호관리체계를 통한 기업 및 정부 정보보안 강화 방안에 관한 연구)

  • Park, Chung-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1220-1227
    • /
    • 2011
  • According to the development of IT technology, life itself is becoming the change to Knowledge-based systems or information-based systems. However, the development of IT technology, the cyber attack techniques are improving. And DDoS a crisis occurs frequently, such as cyber terrorism has become a major data leakage. In addition, the various paths of attack from malicious code entering information in the system to work for your company for loss and damage to information assets is increasing. In this environment, the need to preserve the organization and users of information assets to perform ongoing inspections risk management processes within the organization should be established. Processes and managerial, technical, and physical systems by establishing an information security management system should be based. Also, we should be introduced information security product for protecting internal assets from the threat of malicious code incoming to inside except system and process establishment. Therefore we proposed enterprise and government information security enhancement scheme through the introduction of information security management system and information security product in this paper.

The Study on RFID Traceability System for Animal Identification (동물식별 개체이력정보 추적을 위한 RFID 검색 시스템 구현에 관한 연구)

  • Paek, Min-Ho;Ko, Sung-Seok
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.1
    • /
    • pp.116-123
    • /
    • 2008
  • Food and Agriculture Organization (FAO) and many countries make an effort to conserve and utilization of animal genetic resources to prepare for our unpredictable future. In order to protect the customer and the producer from the animal diseases and unjust distribution, many country seek to appropriate solution. Among the solutions, RFID technology can be used as a basic technology, since this technology can be applied in the conservancy and utilization of animal genetic resources, object management for improved animal and traceability of animal's distribution flow. There are two main issues in making the efficient RFID environment. The first issue is the standardization of code system for object identification. International Organization for Standard (ISO) published the standard which regulates RFID of animal (ISO 11784 and ISO 11785). Based on these standards, many countries have tried to establish their national standard. In Korea, National Institute of Animal Science (NIAS) playa main role in establishing the standard of object identification code based on ISO 11784. Even though the standard format of object's identification is well established, the RFID system may not be operated well without the standardization of RFID network and related equipment. In Korea, National Internet Development Agency of Korea (NIDA) has proposed the RFID Network at 2006, which can be applied in the different kind of system at each phase. But, the implementation case of this RFID Network does not reported yet, since many company or agency who introduce RFID technology, implemented as an isolated individual system. In our study, we show that RFID network can be utilized for any kind of system at each phase, and propose the improvement point in order to be widely used.