• Title/Summary/Keyword: Structure management

Search Result 6,986, Processing Time 0.035 seconds

Research on the Image Encryption Method using a Linear-structure Chaos System (선형구조 혼돈계를 이용한 이미지 암호와 방법 연구)

  • Cho, Chang Ho;Yim, Geo Su
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.4
    • /
    • pp.75-79
    • /
    • 2011
  • With the rapid growth of digital communication and the internet, the importance of conducting research on data encryption methods is increasing. Some of the pertinent researches that have been conducted so far introduced data encryption methods using chaos systems, and numerous researches are currently being conducted on such methods. The signals produced by the chaos systems are called "determined noise," and if this is applied to data encryption, very effective results can be obtained. Using the Henon map, the relationship between the non-linearity of the chaos system and the strength of encryption was analyzed, and a linear-structure chaos system that uses non-linearity as a variable for encryption strength was constructed. Using the constructed chaos system, an image was encrypted and decoded, and the correlation coefficient of the linear-structure chaos system's performance was calculated and then analyzed.

A Digital Forensic Method for File Creation using Journal File of NTFS File System (NTFS 파일 시스템의 저널 파일을 이용한 파일 생성에 대한 디지털 포렌식 방법)

  • Kim, Tae Han;Cho, Gyu Sang
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.107-118
    • /
    • 2010
  • This paper proposes a digital forensic method to a file creation transaction using a journal file($LogFile) on NTFS File System. The journal file contains lots of information which can help recovering the file system when system failure happens, so knowledge of the structure is very helpful for a forensic analysis. The structure of the journal file, however, is not officially opened. We find out the journal file structure with analyzing the structure of log records by using reverse engineering. We show the digital forensic procedure extracting information from the log records of a sample file created on a NTFS volume. The related log records are as follows: bitmap and segment allocation information of MFT entry, index entry allocation information, resident value update information($FILE_NAME, $STANDARD_INFORMATION, and INDEX_ALLOCATION attribute etc.).

Design of Management Structure Measuring Integrated Monitoring System Based on Linked Open Data

  • Min, Byung-Won;Okazaki, Yasuhisa;Oh, Yong-Sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2016.05a
    • /
    • pp.255-256
    • /
    • 2016
  • In this paper, we analyze the operations and/or status of our structure which builds the management structure measuring integrated monitoring system based on linked open data in a short term or long term bases. We have applied a novel analyzing method of linked open data to expect what movements can be occurred in the structure, and we improve the monitoring system using an integrated design to solve the drawbacks of conventional types of monitoring. And collecting data through cloud and their reliability can be proved by evaluation of soundness of data amount and their confidence.

  • PDF

A STRUCTURAL ANALYSIS OF INTER-LIBRARY NETWORKS: A REGIONAL ILL NETWORK IN THE WESTERN NEW YORK 3Rs REGION (도서관 네트워크의 구조적 분석)

  • 유사라
    • Journal of the Korean Society for information Management
    • /
    • v.6 no.1
    • /
    • pp.37-56
    • /
    • 1989
  • This study is a structural analysis of a multi-type and multi-level library network within the framework of a regional interlibrary loan (ILL) system. The study monitored to information network structure for resource sharing of academic and research library materials transmitted through the ILL. The local flow of academic and research information was measured by a survey of the filled ILL transactions by individual libraries in the Western 3Rs region. The major findings were as follows: 1) the regional ILL network showed less than half of participation of the total subject libraries, 2) existing structure surveyed was identified as a composite centralized network with three communication groups, 3) depending on the types of materials transacted, the structure were changed, 4) statewide and multi-state library cooperatives had direct interactions with some of the local libraries, 5) individual libraries participated in the ILL network more for periodicals than book materials, 6) academic libraries throughout the total six structure analyzed showed the highest percentage of participation.

  • PDF

RESEARCH ON LOAD-BEARING PROPERTY AND DESIGN OF CABLE DOMES

  • Shen Cao;Zi Zhu
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.596-605
    • /
    • 2005
  • The cable dome, proposed by Geiger after developing Fuller's idea of tensegrity and improved by Levy, is a new type of large span space structures. In this paper, formulations of the initial forces distribution in members of two main systems of cable dome, which are Geiger dome and Levy dome, are presented. By analyzing the static performance of Levy dome and the variation of internal forces in members of the structure, four groups of design parameters in cable dome structure are represented in terms of: (1) the numbers of rings and the spaces between the rings; (2) the slopes of ridge cables; (3) the lengths of struts; (4) the initial force in one member of the structure.

  • PDF

Ownership Structure and Labor Investment Efficiency

  • Jungeun Cho
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.103-109
    • /
    • 2023
  • This study examines the association between ownership structure and labor investment efficiency. Specifically, this study investigates whether owner-manager firms, where managers own a large percentage of shares in the firm, involve in more efficient labor investment. Based on the management entrenchment hypothesis, managers are more likely to make labor investment decisions to maximize their private benefits rather than creating value for shareholders, resulting in lower efficiency in labor investment. On the other hand, according to the incentive alignment hypothesis, managers tend to make labor investment decisions that will improve future firm performance as their interests are aligned with those of shareholders. In this situation, owner-manager firms are expected to have higher efficiency in labor investment. Our empirical results show that owner-manager firms engage in more efficient labor investment, which contributes to long-term firm value. This study provides empirical evidence that firms' labor investment behavior can vary depending on the characteristics of the ownership structure.

A Study on Location-based Routing Technique for Improving the Performance of P2P in MANET (MANET에서 P2P 성능 향상을 위한 위치기반 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.37-45
    • /
    • 2015
  • The technology development of MANET and dissemination of P2P services has been made very widely. In particular, the development of many application services for the integration of P2P services in MANET has been made actively. P2P networks are commonly used because of the advantages of efficient use of network bandwidth and rapid information exchange. In P2P network, the infrastructure managing each node in the middle does not exist and each node is a structure playing a role as the sender and receiver. Such a structure is very similar to the structure of the MANET. However, it is difficult to provide reliable P2P service due to the high mobility of mobile nodes. In this paper, we propose location-based routing technique in order to provide efficient file sharing and management between nodes. GMN managing the group is elected after network is configured to the area of a certain size. Each node is assigned an identifier of 12 bit dynamically to provide routing which uses location information to the identifier. ZGT is managed in the GMN in order to provide management of group nodes and distributed cache information. The distributed cache technique is applied to provide a rapid retrieval of the sharing files in the each node. The excellent performance of the proposed technique was confirmed through experiments.

An Effective Push Fault Management Algorithm for Distributed Object Replica based on Standard Middleware (표준 미들웨어 기반 분산 객체 리플리카를 위한 효과적 푸쉬 결함 관리 알고리즘)

  • Kim Boon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.37-46
    • /
    • 2005
  • In Processing many operations based on distributed environment, it is very important to support the reliability of resources. Providers of resources generally adapt the structure of server-replication to support the reliability of services. Tn server side, it maintains replicas. duplicated server objects. In the structure of this replication, service of stable replica is very important. Therefore the structure to diagnosis the fault of such replica is required. In this Paper, we suggested an effective PUSH fault management algorithm based on PUSH monitoring style of CORBAto overcome weak points of the PULL monitoring style of the replication management system in the distributed object system. Outcomes of the suggested PUSH fault monitoring style were better than other system. We confirmed valuable result in the workloads and timeout-rates.

  • PDF

Urban Thermo-profiles and Community Structure of Quercus mongolica Forests along an Urban-rural Land Use Gradient: Implications for Management and Restoration of Urban Ecosystems

  • Cho, Yong-Chan;Cho, Hyun-Je;Lee, Chang-Seok
    • Journal of Ecology and Environment
    • /
    • v.32 no.3
    • /
    • pp.167-176
    • /
    • 2009
  • Land cover changes associated with urbanization have driven climate change and pollution, which alter properties of ecosystems at local, regional, and continental scales. Thus, the relationships among urban ecological variables such as community composition, structure, health, soil and functioning need to be better understood to restore and improve urban ecosystems. In this study, we discuss urban ecosystem management and research from a futuristic perspective based on analyses of vegetation structure, composition, and successional trends, as well as the chemical properties of soils and the distribution of heat along an urban-rural gradient. Urban thermo-profile analysis using satellite images showed an obvious mitigating effect of vegetation on the Seoul heat island. Community attributes of Quercus mongolica stands reflected the effects of urbanization, such as pronounced increases in disturbance-related and pollution-tolerant species, such as Styrax japonica and Sorbus alnifolia. Retrogressive successional trends were detected in urban sites relative to those in rural sites. Changes in the urban climate and biotic environment have the potential to significantly influence the practice and outcomes of ecological management, restoration and forecasting because of the associated changes in future bio-physical settings. Thus, for management (i.e., creation and restoration) of urban green spaces, forward-thinking perspectives supported by historical information are necessary.

Structure and Challenges of a Security Policy on Small and Medium Enterprises

  • Almeida, Fernando;Carvalho, Ines;Cruz, Fabio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.747-763
    • /
    • 2018
  • Information Technology (IT) plays an increasingly important role for small and medium-sized enterprises. It has become fundamental for these companies to protect information and IT assets in relation to risks and threats that have grown in recent years. This study aims to understand the importance and structure of an information security policy, using a quantitative study that intends to identify the most important and least relevant elements of an information security policy document. The findings of this study reveal that the top three most important elements in the structure of a security policy are the asset management, security risk management and define the scope of the policy. On the other side, the three least relevant elements include the executive summary, contacts and manual inspection. Additionally, the study reveals that the importance given to each element of the security policy is slightly changed according to the sectors of activity. The elements that show the greatest variability are the review process, executive summary and penalties. On the other side, the purpose of the policy and the asset management present a stable importance for all sectors of activity.