• 제목/요약/키워드: Security ability

Search Result 580, Processing Time 0.021 seconds

A Study on the Early-Age Strength Property of Concrete Using Liquid Admixture (액상형 조강제를 사용한 콘크리트의 초기강도 특성에 관한 연구)

  • Song, Tae-Hyeob;Lee, Sea-Hyun;Ryu, Deug-Hyun;Park, Cho-Bum
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2006.05b
    • /
    • pp.469-472
    • /
    • 2006
  • Amount used of admixture fare is increasing for concrete economic efficiency and ability security. Security of economic efficiency and ability can expect by use of this admixture fare but is displaying a lot of problems on early age strength hold by hydrate delay relatively. Specially, in the case of construction site, concrete strength can speak that interrelation is high with mold removal of forms time. Therefore, is economical and need examination of plan that can secure robber within 3 days using admixture fare such as fly ash and blast furnace slage differential speech to secure function. In this study, adding liquid admixture within 1% of a binding agent quantity to examine these problem with physical characteristic after hardening ago specially, strength change at standard and air dry curing of observed change in priority. Air dried and water curing total strength enhancement effects appeared by thing which is in case of add test result liquid admixture by below 1% and strength deputy by passage of age could know is not big.

  • PDF

The Effect of Methods of Estimating the Ability on The Accuracy and Items Parameters According to 3PL Model

  • Almaleki, Deyab A.;Alomrany, Ahoud Ghazi
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.93-102
    • /
    • 2021
  • This study aimed to test method on the accuracy of estimating the items parameters and ability, using the Three Parameter Logistic. To achieve the objectives of the study, an achievement test in chemistry was constructed for third-year secondary school students in the course of "natural sciences". A descriptive approach was employed to conduct the study. The test was applied to a sample of (507) students of the third year of secondary school in the "Natural Sciences Course". The study's results revealed that the (EAP) method showed a higher degree of accuracy in the estimation of the difficulty parameter and the abilities of persons higher than the MML method. There were no statistically significant differences in the accuracy of the parameter estimation of discrimination and guessing regarding the difference of the two methods: (MML) and (EAP).

Modeling and Control of Integrated STATCOM-SMES System to Improve Power System Oscillations Damping

  • Molina, Marcelo G.;Mercado, Pedro E.
    • Journal of Electrical Engineering and Technology
    • /
    • v.3 no.4
    • /
    • pp.528-537
    • /
    • 2008
  • Primary frequency control(PFC) has the ability to regulate short period random variations of frequency during normal operation conditions and also to respond rapidly to emergencies. However, during the past decade, numerous significant sized blackouts occurred worldwide that resulted in serious economic losses. Therefore, the conclusion has been reached that the ability of the current PFC to meet an emergency is poor, and security of power systems should be improved. An alternative to enhance the PFC and thus security is to store excessive amounts of energy during off-peak load periods in efficient energy storage systems for substituting the primary control reserve. In this sense, superconducting magnetic energy storage(SMES) in combination with a static synchronous compensator(STATCOM) is capable of supplying power systems with both active and reactive powers simultaneously and very rapidly, and thus is able to enhance the security dramatically. In this paper, a new concept of PFC based on incorporating a STATCOM-SMES is presented. A complete detailed model is proposed and a new control scheme is designed, comprising an enhanced frequency control scheme, and a fully decoupled current control strategy in d-q coordinates with a novel controller to prevent dc bus capacitors voltage drift/imbalance. The performance of the proposed control schemes is validated through digital simulation carried out using MATLAB/Simulink.

Software Security Supplementation Guide Line Based on ISO 27001 for the SP Certified Organization (SP 인증 조직의 소프트웨어 보안 향상을 위한 ISO 27001 적용방안 연구)

  • Yoon, Eun-Ji;Park, Young B.
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.11
    • /
    • pp.465-470
    • /
    • 2014
  • The SP quality assessments from national IT industry promotion agency of Korea(NIPA) assesses ability of software development process. And the SP quality assessments is getting popular over the nation. But, in the SP quality assessments, there is no concern about security attribute. In this paper new secure process base on ISO 27001 is proposed for the organization that is already passed SP quality assessments. This process can detect security threatening factors and gives chance to protect those factors. Furthermore, since detected security weaknesses can be used as a measurement, the system can be managed in aspect to security attribute.

A Design and Analysis of PKCS #11 supporting the KCDSA mechanism (KCDSA 메커니즘을 제공하는 PKCS #11 설계 및 분석)

  • 김명희;김은환;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.141-151
    • /
    • 2004
  • According to the improvemnent of electronic commerce, the requirements of security devices are becoming increasingly pervasive. The security API must design easily and securely to support a compatibility feature between security devices. It is chosen the PKCS #11 interface by RSA Labs that shows the compatibility and extensibility standards of many application product and implementation, and supported KCDSA mechanism which is a korean digital signature standard. And the PKCS #11 security API defines new key management function which provides more secure key management ability. We suggest the object attributes and templates of KCDSA private and public key object, generate and verify digital signature using KCDSA mechanism. The PKCS #11 supporting KCDSA mechanism is designed, implemented using C-Language, tested a performance, and analyzed the security and compatibiltiy feature.

A Study on the Effect of System Characteristics of Online Lectures on Lecture Satisfaction in the COVID-19 Crisis: Focused on the Moderating Effect of ICT Utilization Ability (코로나19 사태에 온라인 강의의 시스템 특성이 강의만족도에 미치는 영향연구: ICT 활용능력의 조절효과를 중심으로)

  • Mo, Ya-Ting;Xu, Yu-Jia;Lee, Yoon-koo
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.43-57
    • /
    • 2021
  • The purpose of this study is to find the relationship between Online Lecture System, Motivation for Use, ICT Utilization Ability, and Lectures Satisfaction as online lectures continue. For that, conducted survey of students at Woosong University, secured 330 valid samples, and conducted with analysis of actual proof with using SPSS 25.0. The results of the study confirmed that the system's Convenience, Simplicity, Security and Motivation for Use have significantly affected to Lecture Satisfaction, and also confirmed that ICT Utilization Ability, the variable of Moderating Effect, also has meaningful correlation between System Characteristics(Simplicity and Security) and Lecture Satisfaction. Therefore, the need for development and operation of additional education programs to improve ICT Utilization Ability as well as development of new online system are presented in order to enhance online Lecture Satisfaction of students. Lastly, various sample surveys and researches are seems to be needed in the future in order to increase the Lecture Satisfaction.

The Influence of Shared Goal and Value of Information Security Policy: The Role of Demand-ability Fit and Person-organization Fit (정보보안 정책 목표 공유 및 가치의 영향: 요구-능력 적합성 및 개인-조직 적합성의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.3
    • /
    • pp.609-618
    • /
    • 2024
  • The escalating demand for organized information resource management within organizations necessitates increased investment in information security (IS), as a single error can lead to information exposure incidents, underscoring the importance of IS compliance by insiders. The research aims to elevate IS compliance within the organization by examining the influence of the shared goal of information security policy (ISP), perceived ISP value and individual's fits on an insider's intention to comply with the ISP. Antecedent research in organizational behavior and IS led to a proposed hypothesis, tested using 366 obtained samples. The ISP shared goal's positive influence on ISP compliance intentions was evident from the test results, primarily through the perceived ISP value. Furthermore, the person-organization and demand-ability fit moderated the antecedent factors associated with ISP compliance intentions. Our findings suggest the methods for sustaining organizational IS levels by examining the requisite conditions from the viewpoints of the organizational environment, ISP values, and fits.

Anti-crisis Communications in Legal Discourse in Terms of Ensuring Information Security

  • Gorai, Oleg;Ohar, Emiliya;Snitsarchuk, Lidiya;Polulyah, Ruslan;Druzhynin, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.103-108
    • /
    • 2022
  • Mass media in the digital age are not only one of the most important elements of the information society but also a strategic resource for its development. Effectively implemented communication makes it possible to build connections not only between individuals, but also between social institutions and representatives of various generational groups of the mass audience, as well as ensure information security in a crisis period. At the same time, in the context of a constantly increasing amount of information flows, more and more often "a person loses the ability to independently think, analyze, and critically perceive information." At the same time, "imposing" on the representatives of this or that society, through the content of multi-format mass media or active authors of social networks, a certain point of view on the problem becomes a completely realizable task. Thus, the main task of the study is to analyze the anti-crisis communications in legal discourse in terms of ensuring information security. As a result of the study, current trends and prerequisites of anti-crisis communications in legal discourse in terms of ensuring information security were revealed.

Ensuring Information Security in the System of Public Management of Sustainable Development of the Region: EU Experience

  • Zahorskyi, Volodymyr;Bobrovskyi, Oleksii;Bondarenko, Dmytro;Karpa, Marta;Akimov, Oleksandr;Akimova, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.163-168
    • /
    • 2022
  • The main purpose of the study is to analyze the features of ensuring information security in the system of public administration of the constant development of the region. The actualization of the research topic is because the information has become a powerful means of manipulating the public and individual consciousness, as well as a real weapon used in new types of conflicts, confrontations, and confrontations. Creating opportunities for everyone to access information sources, developing the ability to use it, and at the same time protecting people from dirty information flows create a kind of subject-research field, one of the most relevant aspects of which is the problem of forming and implementing information security policy at the state, public and civil levels. The research methodology involved the use of theoretical and scientific methods. As a result of the study, the key features of ensuring information security in the system of public management of the continuous development of the region of the EU countries were identified.

A Study on the Effectual Operating Device for Private Security Service (민간경호업무의 효율적인 운영방안에 관한 연구)

  • Song, Sang-Wook;Lee, Min-Hyung
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.133-153
    • /
    • 2005
  • The suggestions that follow are about the effectual operating device for private security service. First, in legal and institutional policy, new establishment by law for private security and more support from government is asked. Moreover, the restructuring or M&A between petty companies and the pricing for security service should be performed. Second, in the structural aspect of private security industry, the professional education center for private security guards should be established and the terms of payment and welfare should be improved to the level above standard. In addition, it should be achieved to change the public to have a new and correct understanding of private security and develop the specialized parts suited to the characteristic and ability of each companies. Third, the construction of operating system for private security service should be achieved; recruit system for competent security guards, marketing strategy and enforcement system, widely known confidence to client, normal training system for security guards and post management system for client. This is also to be suited to the characteristic of each companies.

  • PDF