• Title/Summary/Keyword: System security

Search Result 9,710, Processing Time 0.039 seconds

The Evaluation of Effectiveness on RFID system based Logistics process (RFID 시스템 기반 물류프로세스 유효성 평가)

  • Choi, Yong-Jung;Han, Dae-Hee;Jeong, Hae-June;Han, Woo-Chul;Kim, Hyun-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.111-120
    • /
    • 2010
  • Looking at the application examples related to RFID systems around the world, it is easy to find that RFID systems are introduced in various industries, such as retail and consumer goods sectors, financial and security sectors, automotive and transport sector, leisure and sports sector, logistics, and health-related fields. This is because they can get their operational efficiency and competitiveness by means of product's visibility and transparency of information through RFID systems. However, it is required that evaluation of effectiveness on introducing RFID systems should be performed to strengthen construction willingness of RFID systems before actual introduction of the RFID systems in the process. This activity affects to introduction of RFID systems in industry-wide and then, will be able to create a synergy effect such as national industrial competitiveness improvement. The purpose of this study is to offer rational method on effectiveness analysis before and after RFID based process. Accordingly, the proposed Choquet fuzzy integral-based model will be allowed rational analysis by integrating quantitative and qualitative analysis. Through the effectiveness analysis of C company's RFID based process using the proposed evaluation model, we could identify that RFID-based logistics process was more effective than existing process.

Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks (무선 단말기의 계산 효율성을 고려한 유.무선 통합 네트워크 환경에서의 안전한 그룹 통신)

  • Chang Woo-Suk;Kim Hyun-Jue;Nam Jung-Hyun;Cho Seok-Hyang;Won Dong-Ho;Kim Seung-Joo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.60-71
    • /
    • 2006
  • Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely and efficiently establish a common secret key, Over the years, a number of solutions to the group key agreement protocol have been proposed with varying degrees of complexity, and the research relating to group key agreement to securely communicate among a group of members in integrated wired and wireless networks has been recently proceeded. Both features of wired computing machines with the high-performance and those of wireless devices with the low-power are considered to design a group key agreement protocol suited for integrated wired and wireless networks. Especially, it is important to reduce computational costs of mobile devices which have the limited system resources. In this paper, we present an efficient group key agreement scheme which minimizes the computational costs of mobile devices and is well suited for this network environment and prove its security.

An Analysis of the Situation and Training Plan of Forestry Labor (임업노동력 현황 및 양성방안 분석)

  • Park, Sang-Jun;Kim, Dong-Geun
    • Journal of Forest and Environmental Science
    • /
    • v.23 no.2
    • /
    • pp.109-118
    • /
    • 2007
  • This study was conducted to provide the fundamental data of the policy plan for the security of forestry labour and the revitalization of forestry mechanization by analysing the status of forestry labor and the training plan. In forestry, the total number of employer and the labour cost have slightly increased annually, but the number of employer for timber harvesting has decreased. Therefore, the organization of expert forestry mechanization unit and the training of operator will be necessary. The number and person of forest management unit, the working days of the year and income have increased in Korea. However, the working days per month of forest management unit were only 15 days, which are only 180 days per year. In the results of the calculated number and person of forest management unit for the Korean forest tending volumes, about 349 forest management units are required. In case of adjusting 12 persons per 1 unit, 4,185 persons are required. In calculated results of the optimum forestry mechanization unit and member's number by the adjusting of tower yarder harvesting system for annual timber harvesting production volume, it was known to necessary the 250 forestry mechanization unit and the 1,250 members which are calculated at 5 persons per 1 group.

  • PDF

A Basic Survey for Management of Elderly Day Care Centers (노인주간보호시설의 운영을 위한 기초조사)

  • Nam, Ki-Seok;Hwang, Ok-Nam;Hwang, Hye-Yeon;Yoon, Sook-Rye
    • The Korean Journal of Rehabilitation Nursing
    • /
    • v.5 no.2
    • /
    • pp.180-192
    • /
    • 2002
  • The purpose of this study was to survey basic data for management of elderly day care centers. In this study, occupation, leisure life, and food, clothing and habituation, as well as social relationship, health state and behavior, and general characteristics of subjects were examined to identify the factors affecting their cognition, need and preference of the day care centers. The subjects of this study were 392 elderly, aged 60 years or over, living in Gangnung and neighboring districts. Data were collected by educated interviewers from November 4 through November 22, 2002. The subjects were interviewed face to face, one for one after the interviewee's agreements on the survey. The collected data were analysed with logistic regression analysis by SAS (statistical analysis system). Logistic regression analysis was done to identify affecting factors for cognition, need and preference of the elderly day care centers. The major findings are as follows: 1. The factors affecting cognition for the day care centers were analysed. The subjects with an occupation and a lower satisfaction level of living environment and friendship, who were economically secure enough to manage a sudden accident, showed a higher level of cognition of the day care centers. The subjects with a higher level of mental health state and a lower level of IADL also showed a higher level of cognition. On the general characteristics younger female subjects showed a higher level of cognition. 2. The subjects with a lower level of perceived economic condition who did not own their housing and were not economically safe enough to manage a sudden accident, had showed a higher level of need for the day care centers. It showed that the subjects with a high level of mental health state, a bad eye sight and dental condition, a good perceived health condition, and a lower level of IADL, needed the centers. 3. The subjects who had an occupation, however, not capable of making their own daily expenses, and a low occupation satisfaction level, and who did not own their housing, and were economically poor not enough to manage a sudden accident, showed a higher preference for the day care centers. The subjects with higher levels of friendship satisfaction and perceived health condition, not living with their spouse, and a higher education level, showed a higher preference for the centers. In conclusion, the common factors affecting their cognition, need and preference of the day care centers were occupation, economic security enough to manage accidents, and friendship satisfaction level. Especially, the subjects who had an occupation, however, not economically secure enough to manage accidents, and who did not live in their own housing with a good perceived health condition, showed high levels of need and preference for the day care centers. These results can be used as basic data to develop the efficient elderly day care centers, thus contribute to the elderly welfare in a local community.

  • PDF

Willingness to Pay for Residential Water on Drought Conditions (가뭄시 가정용수에 대한 소비자 지불의사)

  • Park, Doo-Ho;Park, Yoon-Shin
    • Journal of Korea Water Resources Association
    • /
    • v.40 no.11
    • /
    • pp.861-867
    • /
    • 2007
  • This Research analyzes the consumers' willingness to pay(WTP) for residential water on severe drought condition. The 7 large cities and 32 chronicle drought regions have been selected for this research survey. Results show that the consumers of large cities, which are relatively rich, think water quality is more important than quantity, but the consumers of 32 chronicle drought regions expressed just opposite. Dichotomous choice and open-ended questionnaire are mixed for the survey and Tobit model is applied in the analysis. As we expected, the higher the education level, the number of household member, and the income, the higher the WTP. When there is 25% reduction of supply, the WTP is about $2 per month. Contrary to the expectation, WTP is just slightly increased for 50% of water supply reduction. This is because of the resistance of tax as well as the limited actual experiences of water shortage so, they underestimated it. In any cases, actual WTP for actual water shortage is much higher than this result. More effective water supply and distribution schedule must be ready as a national and local level to prepare severe drought in the near future. Consumers are willing to pay higher price than the current level for water security. Water distributional system should be reconsidered and alternative source of water also be prepared.

A Fast String Matching Scheme without using Buffer for Linux Netfilter based Internet Worm Detection (리눅스 넷필터 기반의 인터넷 웜 탐지에서 버퍼를 이용하지 않는 빠른 스트링 매칭 방법)

  • Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.821-830
    • /
    • 2006
  • As internet worms are spread out worldwide, the detection and filtering of worms becomes one of hot issues in the internet security. As one of implementation methods to detect worms, the Linux Netfilter kernel module can be used. Its basic operation for worm detection is a string matching where coming packet(s) on the network is/are compared with predefined worm signatures(patterns). A worm can appear in a packet or in two (or more) succeeding packets where some part of worm is in the first packet and its remaining part is in its succeeding packet(s). Assuming that the maximum length of a worm pattern is less than 1024 bytes, we need to perform a string matching up to two succeeding packets of 2048 bytes. To do so, Linux Netfilter keeps the previous packet in buffer and performs matching with a combined 2048 byte string of the buffered packet and current packet. As the number of concurrent connections to be handled in the worm detection system increases, the total size of buffer (memory) increases and string matching speed becomes low In this paper, to reduce the memory buffer size and get higher speed of string matching, we propose a string matching scheme without using buffer. The proposed scheme keeps the partial matching result of the previous packet with signatures and has no buffering for previous packet. The partial matching information is used to detect a worm in the two succeeding packets. We implemented the proposed scheme by modifying the Linux Netfilter. Then we compared the modified Linux Netfilter module with the original Linux Netfilter module. Experimental results show that the proposed scheme has 25% lower memory usage and 54% higher speed compared to the original scheme.

A Study on Issues and Improvements Plan for National Safety Assessment (국가안전대진단의 문제점과 개선방안)

  • Shin, Jae-Hun;Kim, Sang-Woon
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.334-342
    • /
    • 2018
  • Purpose: The purpose of this study is to examine and improve the issues related to National Safety Inspection currently operation and reform the system for response to various disasters. Method: For the completion, this study established theoretical background using materials related to National Safety Inspection and identified the issues using the open statistical data for National Safety Inspection to suggest the improvement plans. Results: National Safety Inspection has been operating a complete large-scale inspection on risk factors in cooperation with the central government, local governments, and citizens since 2015 to remove various disaster factors neglected in people's daily lives. Operation of National Safety Inspection had positive influence in preventing major disasters. However, inefficient activity is pointed out due to issues related to cooperation with other institutes, limitation for citizen's positional role, and superficial inspection. Conclution: To solve this issue, this study proposed strengthening of communication activity with disaster institutes, strengthening of efficiency through citizen participation by type, and actualization of checklist used in National Safety Inspection.

Personal Information Detection by Using Na$\ddot{i}$ve Bayes Methodology (Na$\ddot{i}$ve Bayes 방법론을 이용한 개인정보 분류)

  • Kim, Nam-Won;Park, Jin-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.91-107
    • /
    • 2012
  • As the Internet becomes more popular, many people use it to communicate. With the increasing number of personal homepages, blogs, and social network services, people often expose their personal information online. Although the necessity of those services cannot be denied, we should be concerned about the negative aspects such as personal information leakage. Because it is impossible to review all of the past records posted by all of the people, an automatic personal information detection method is strongly required. This study proposes a method to detect or classify online documents that contain personal information by analyzing features that are common to personal information related documents and learning that information based on the Na$\ddot{i}$ve Bayes algorithm. To select the document classification algorithm, the Na$\ddot{i}$ve Bayes classification algorithm was compared with the Vector Space classification algorithm. The result showed that Na$\ddot{i}$ve Bayes reveals more excellent precision, recall, F-measure, and accuracy than Vector Space does. However, the measurement level of the Na$\ddot{i}$ve Bayes classification algorithm is still insufficient to apply to the real world. Lewis, a learning algorithm researcher, states that it is important to improve the quality of category features while applying learning algorithms to some specific domain. He proposes a way to incrementally add features that are dependent on related documents and in a step-wise manner. In another experiment, the algorithm learns the additional dependent features thereby reducing the noise of the features. As a result, the latter experiment shows better performance in terms of measurement than the former experiment does.

Analysis of Factors for Korean Women's Cancer Screening through Hadoop-Based Public Medical Information Big Data Analysis (Hadoop기반의 공개의료정보 빅 데이터 분석을 통한 한국여성암 검진 요인분석 서비스)

  • Park, Min-hee;Cho, Young-bok;Kim, So Young;Park, Jong-bae;Park, Jong-hyock
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1277-1286
    • /
    • 2018
  • In this paper, we provide flexible scalability of computing resources in cloud environment and Apache Hadoop based cloud environment for analysis of public medical information big data. In fact, it includes the ability to quickly and flexibly extend storage, memory, and other resources in a situation where log data accumulates or grows over time. In addition, when real-time analysis of accumulated unstructured log data is required, the system adopts Hadoop-based analysis module to overcome the processing limit of existing analysis tools. Therefore, it provides a function to perform parallel distributed processing of a large amount of log data quickly and reliably. Perform frequency analysis and chi-square test for big data analysis. In addition, multivariate logistic regression analysis of significance level 0.05 and multivariate logistic regression analysis of meaningful variables (p<0.05) were performed. Multivariate logistic regression analysis was performed for each model 3.

A Technique to Specify and Generate .NET Components in MDA/PSM for Pervasive Service (MDA/PSM상에서 퍼베이시브 서비스를 지원하는 닷넷 컴포넌트의 명세 및 생성 기법)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.635-645
    • /
    • 2007
  • Component technology has been widely accepted as an effective way for building software systems with reusable components, and Microsoft (MS) .NET is one of the recent representative component technologies. Model Driven Architecture (MDA) is a new development paradigm which generates software by transforming design models automatically and incrementally. Transformation of structural models in MDA has been successfully applied. However, transformation of dynamic models and pervasive services, such as transaction service, security service, synchronization service and object pooling are largely remains as an area for further research. The recent enterprise system has multi tier distributed architecture, and the functionality of early mentioned pervasive services is essential for this architecture. .NET platform can implement Component Object Model+ (COM+) component for supporting pervasive services by specify Attribute code. In this paper, we specify the functionalities of the COM+ component offering pervasive services, and then those functionalities are defined by UML profile. By using the profile, the Platform Specific Model (PSM) for .NET/C# is specified, and .NET components are automatically generated through our tool. The development productivity, extensibility, portability, and maintenance of software can be dramatically improved by using of the proposed methods.