• Title/Summary/Keyword: Submission

Search Result 301, Processing Time 0.026 seconds

Convergence Security Provider Self-Conformity System (융합보안 공급자 자기 적합성 제도)

  • Baik, Namkyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.53-61
    • /
    • 2019
  • In this paper, we propose 'a self - conformance system of convergence security provider' to provide basic data for security and reliability of convergence industrial technology, system and service. It is difficult to evaluate convergence security systems, limited to information and communication service providers, unable to check convergence security items, burden of submission documents, difficulty in measuring convergence security service level and we will summarize product and service-based requirements that can be integrated and systematically measure the level of convergence security and define renewed life cycle-based convergence security information and content security and assurance requirements. On the basis of this, each convergence security company declares conformity with the standard itself without the certification of the certification body, and introduces the provider conformity certification system which can manufacture and sell. This will enable the company to strengthen its competitiveness through timely launch and implementation of products and services and cost reduction.

Systematic Review of Bug Report Processing Techniques to Improve Software Management Performance

  • Lee, Dong-Gun;Seo, Yeong-Seok
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.967-985
    • /
    • 2019
  • Bug report processing is a key element of bug fixing in modern software maintenance. Bug reports are not processed immediately after submission and involve several processes such as bug report deduplication and bug report triage before bug fixing is initiated; however, this method of bug fixing is very inefficient because all these processes are performed manually. Software engineers have persistently highlighted the need to automate these processes, and as a result, many automation techniques have been proposed for bug report processing; however, the accuracy of the existing methods is not satisfactory. Therefore, this study focuses on surveying to improve the accuracy of existing techniques for bug report processing. Reviews of each method proposed in this study consist of a description, used techniques, experiments, and comparison results. The results of this study indicate that research in the field of bug deduplication still lacks and therefore requires numerous studies that integrate clustering and natural language processing. This study further indicates that although all studies in the field of triage are based on machine learning, results of studies on deep learning are still insufficient.

Constructing Women's Voices: Approaching Ernest Hemingway's The Sun Also Rises and Bảo Ninh's The Sorrow of War from Feminist Criticism

  • Dang, Thi Bich Hong
    • SUVANNABHUMI
    • /
    • v.14 no.1
    • /
    • pp.71-87
    • /
    • 2022
  • This article explores how women's voices are constructed in The Sun Also Rises by Ernest Hemingway and Nỗi buồn chiến tranh (The Sorrow of War) by Bảo Ninh. Specifically, this article approaches presentations of women's personalities and positions in the two novels that do not have obvious historical and geographical connections. The women's voices in the two novels, as this article suggests, are characterized by women's desire for self-determination, where they are able to free themselves from domination, and even influence men's psychology and actions. In comparing the characteristics of women's voices in the two works, the article aims to highlight different ways in which women assert their agency. The article affirms the potential contribution of cultural contexts in examining feminist voices and understanding how female figures are made to overcome default passivity and submission to male domination.

The 30th Anniversary of the Korean Journal of Aerospace and Environmental Medicine: History, Development, and Vision (항공우주의학회지 창간 30주년을 맞아: 학회지의 역사, 발전, 그리고 비전)

  • Kim, Young Hyo
    • Korean journal of aerospace and environmental medicine
    • /
    • v.31 no.1
    • /
    • pp.4-8
    • /
    • 2021
  • The year 2021 is a significant year in which the Korean Journal of Aerospace and Environmental Medicine (KJAsEM) celebrates its 30th anniversary. Therefore, in this review, we look back on the history and development of KJAsEM and suggest the direction we should go forward. In particular, the recent development of KJAsEM was described in more detail, such as opening the KJAsEM journal homepage, an online submission system, and adopting an open access policy.

Blockchain-based DID Problem Analysis Research (블록체인 기반의 DID 문제점 분석 연구)

  • Lee, Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • DID(Decentralized Identity Identification) is a system in which users voluntarily manage their identity, etc., and control the scope and subject of submission of identity information based on a block chain. In the era of the 4th industrial revolution, where the importance of protecting personal information is increasing day by day, DID will surely be positioned as the industrial center of the Internet and e-business. However, when managing personal information, DID is highly likely to cause a large amount of personal information leakage due to electronic infringement, such as hacking and invasion of privacy caused by the concentration of user's identity information on global service users. Therefore, there are a number of challenges to be solved before DID settles into a stable standardization. Therefore, in this paper, we try to examine what problems exist in order to positively apply the development of DID technology, and analyze the improvement plan to become a stable service in the future.

Criminal And Legal Protection Of Information Relations

  • Manzhai, Oleksandr;Kuryliuk, Yurii;Miroshnykov, Ivan;Syiploki, Mykola;Vazhynskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.284-288
    • /
    • 2022
  • The article analyzes the regulations of current criminal law, which ensures the protection and protection of information relations, offers the optimal model of the system of norms of the Criminal Code of Ukraine, which establishes liability for violation of information. The subject of the article is protected information, which should include information or data, the procedure for access to and distribution of which, regardless of the method of submission, storage or organization, are subject to legal regulation in accordance with laws and regulations. For the purposes of criminal law, information as an object of criminal law protection should be classified on the following grounds: depending on the content: personal or family secrets; information constituting a state secret; data included in the official secret; information that constitutes a professional secret; information that constitutes a commercial, tax, banking secret, and, depending on the medium - documented and undocumented.

DEVELOPMENT OF LEGALITY SYSTEM FOR BUILDING ADMINISTRATION PERMISSION SERVICE BASED ON BIM

  • Inhan Kim;Jungsik Choi
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.593-600
    • /
    • 2009
  • In Korea, the government has developed SEUMTER, an administration system for building related public service, to facilitate and promote the electronic submission and permission activities. SEUMTER is progressing legality system based on 2D drawing for building administration permission service. However, there are a lot of problems related to legality system owing to complexity of Korea regulation relation and structure, inefficiency of legality system based on 2D drawing, duplication examination of document (soliciting forms for civil affairs) and drawing. Therefore, the purpose of this study is to develop legality system for building administration permission service based on BIM in Korea. To achieve this purpose, the authors have investigated permission procedure and regulation structure that is used in current building administration permission and suggested permission procedure and regulation structure for legality system based on BIM. In addition, the authors have investigated element technologies (for examples, method of structured regulation, BIM model checker, Viewer, etc) for legality system based on BIM. Finally, the authors have suggested strategy and hereafter direction for application of legality system based on BIM.

  • PDF

Institutional Information Management and Automation System

  • M.Ahmad Nawaz Ul Ghani;Taimour Nazar;Syed Zeeshan Hussain Shah Gellani;Zaman Ashraf
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.107-112
    • /
    • 2023
  • World is moving towards digitization at a rapid pace, so the enterprises have developed information systems for management of their business. Empowering educational institutes with information systems are become very important and vital. Doing everything manually is very difficult for students, teachers and staff. Information system can enhance their efficiency and save a lot of time; this research proposed system will solve this issue by providing services like class room reservation, e-library facility, online submission etc. in a secured environment. Up till now limited attention has been paid to utilize robots and drones for automation inside educational institutes. Our proposed system incorporates robots and drones to fill this gap in automation being used in institutes. Through this research, the aim is to improve the efficiency of learning and services in educational institutions or universities.

Design and Implementation of a Paper Submission and Review System Using Spring Framework (스프링 프레임워크를 활용한 논문 투고 및 심사 시스템의 설계 및 구현)

  • Yang, Dong-sun;Han, Youn-Hee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1350-1353
    • /
    • 2011
  • 최근 웹 기반 엔터프라이즈 애플리케이션들의 규모나 복잡도가 고도화 되어감에 따라 웹 애플리케이션 마다 공통적으로 사용되는 기반 요소들의 설계나 구현은 관련 프레임워크를 사용하고 복잡한 비즈니스 로직에 좀 더 집중하는 것이 최근 웹 애플리케이션 개발의 추세이다. 이에 따라 본 논문에서는 대부분의 학회에서 필수적으로 구축하는 논문 편집 시스템을 예로 들어 스프링 프레임워크와 관련 기술 등을 사용한 설계 및 구현 사례를 제시하고자 한다.

COLORNET: Importance of Color Spaces in Content based Image Retrieval

  • Judy Gateri;Richard Rimiru;Micheal Kimwele
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.33-40
    • /
    • 2023
  • The mainstay of current image recovery frameworks is Content-Based Image Retrieval (CBIR). The most distinctive retrieval method involves the submission of an image query, after which the system extracts visual characteristics such as shape, color, and texture from the images. Most of the techniques use RGB color space to extract and classify images as it is the default color space of the images when those techniques fail to change the color space of the images. To determine the most effective color space for retrieving images, this research discusses the transformation of RGB to different color spaces, feature extraction, and usage of Convolutional Neural Networks for retrieval.