• Title/Summary/Keyword: System security

Search Result 9,746, Processing Time 0.037 seconds

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.

Studies on the Current Ideas and Institution of Natural Environmental Conservation in Japan -Policy and Institution of Open Space and Forest - (일본의 자연환경보전사조 및 관련제도의 변천에 관한 연구)

  • 김승환
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.17 no.1
    • /
    • pp.1-16
    • /
    • 1989
  • ^x As mentioned above, I consider the change of role that is related with Japanese thought of Natural Environmental Conservation, and I divide each part of periods into forest, farmland, open space, urban planning, environmental conservation etc. To summary the content of each period of Natural Environmental Conservation thought is as follows. 1) Previous period before formation(before 1919) In the previous period of Meiji, it could be said that the consciousness of the Natural Environmental Conservation was coming to existence. In this, so called, Natural Environmental Conservation, the thought of Forest Preservation was the main current and it was the thought of territorial integrity for the security of resource, the forestry conservancy and flood control in the forestry farmland. Since the age of Meiji, the theory of Natural Conservation appears from the theory of Japanese landscaping and systematic management about public parks was enforced, but the regular theory of Natural Environmental Conservation did not attain full growth. 2) The period of formation(1919~ 1954) In the period of formation, the base of Natural Environmental Conservation had been established. Parks and Open spaces were admitted as a public facilities in each city, and legislations which supported it had been continuously enacted and so on. In this period, the afforestation counter plan was emphasized on the side of territorial integrity. In the mountainous district. tree planting was emphasized to recover the forest which had been destroied by war. 3) The period of development(1955~ 1974) In the period of development, varied policies was institutionalized for the Natural Environmental Conservation. However, all sorts of development policy had performed simultaneously, thus development had complicated relation with preservation. But after 1970's the framework of system of Natural Environmental Conservation improvement was constituted to control the many kinds of development, and the spontaneous campaign of nature preservation by private lead was being taken root. This is the more progressive period. 4) The pried of root(after 1975) After the latter of 1970's, the role of Natural Environmental Conservation began to take root not in the direction of control but inducement, and, getting out of development - oriented policy, aimed at relation between human being and natural environment and the side of amenity of human environment. Besides, the current of Natural Environmental Conservation had been seperately progressed in the cities and forests. Since this period, it was the character that cities and forests began to be unified as 'amenity'space of man.

  • PDF

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

The Evaluation of Effectiveness on RFID system based Logistics process (RFID 시스템 기반 물류프로세스 유효성 평가)

  • Choi, Yong-Jung;Han, Dae-Hee;Jeong, Hae-June;Han, Woo-Chul;Kim, Hyun-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.6
    • /
    • pp.111-120
    • /
    • 2010
  • Looking at the application examples related to RFID systems around the world, it is easy to find that RFID systems are introduced in various industries, such as retail and consumer goods sectors, financial and security sectors, automotive and transport sector, leisure and sports sector, logistics, and health-related fields. This is because they can get their operational efficiency and competitiveness by means of product's visibility and transparency of information through RFID systems. However, it is required that evaluation of effectiveness on introducing RFID systems should be performed to strengthen construction willingness of RFID systems before actual introduction of the RFID systems in the process. This activity affects to introduction of RFID systems in industry-wide and then, will be able to create a synergy effect such as national industrial competitiveness improvement. The purpose of this study is to offer rational method on effectiveness analysis before and after RFID based process. Accordingly, the proposed Choquet fuzzy integral-based model will be allowed rational analysis by integrating quantitative and qualitative analysis. Through the effectiveness analysis of C company's RFID based process using the proposed evaluation model, we could identify that RFID-based logistics process was more effective than existing process.

Secure Group Communications Considering Computational Efficiency of Mobile Devices in Integrated Wired and Wireless Networks (무선 단말기의 계산 효율성을 고려한 유.무선 통합 네트워크 환경에서의 안전한 그룹 통신)

  • Chang Woo-Suk;Kim Hyun-Jue;Nam Jung-Hyun;Cho Seok-Hyang;Won Dong-Ho;Kim Seung-Joo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.60-71
    • /
    • 2006
  • Group key agreement protocols are designed to allow a group of parties communicating over a public network to securely and efficiently establish a common secret key, Over the years, a number of solutions to the group key agreement protocol have been proposed with varying degrees of complexity, and the research relating to group key agreement to securely communicate among a group of members in integrated wired and wireless networks has been recently proceeded. Both features of wired computing machines with the high-performance and those of wireless devices with the low-power are considered to design a group key agreement protocol suited for integrated wired and wireless networks. Especially, it is important to reduce computational costs of mobile devices which have the limited system resources. In this paper, we present an efficient group key agreement scheme which minimizes the computational costs of mobile devices and is well suited for this network environment and prove its security.

An Analysis of the Situation and Training Plan of Forestry Labor (임업노동력 현황 및 양성방안 분석)

  • Park, Sang-Jun;Kim, Dong-Geun
    • Journal of Forest and Environmental Science
    • /
    • v.23 no.2
    • /
    • pp.109-118
    • /
    • 2007
  • This study was conducted to provide the fundamental data of the policy plan for the security of forestry labour and the revitalization of forestry mechanization by analysing the status of forestry labor and the training plan. In forestry, the total number of employer and the labour cost have slightly increased annually, but the number of employer for timber harvesting has decreased. Therefore, the organization of expert forestry mechanization unit and the training of operator will be necessary. The number and person of forest management unit, the working days of the year and income have increased in Korea. However, the working days per month of forest management unit were only 15 days, which are only 180 days per year. In the results of the calculated number and person of forest management unit for the Korean forest tending volumes, about 349 forest management units are required. In case of adjusting 12 persons per 1 unit, 4,185 persons are required. In calculated results of the optimum forestry mechanization unit and member's number by the adjusting of tower yarder harvesting system for annual timber harvesting production volume, it was known to necessary the 250 forestry mechanization unit and the 1,250 members which are calculated at 5 persons per 1 group.

  • PDF

A Basic Survey for Management of Elderly Day Care Centers (노인주간보호시설의 운영을 위한 기초조사)

  • Nam, Ki-Seok;Hwang, Ok-Nam;Hwang, Hye-Yeon;Yoon, Sook-Rye
    • The Korean Journal of Rehabilitation Nursing
    • /
    • v.5 no.2
    • /
    • pp.180-192
    • /
    • 2002
  • The purpose of this study was to survey basic data for management of elderly day care centers. In this study, occupation, leisure life, and food, clothing and habituation, as well as social relationship, health state and behavior, and general characteristics of subjects were examined to identify the factors affecting their cognition, need and preference of the day care centers. The subjects of this study were 392 elderly, aged 60 years or over, living in Gangnung and neighboring districts. Data were collected by educated interviewers from November 4 through November 22, 2002. The subjects were interviewed face to face, one for one after the interviewee's agreements on the survey. The collected data were analysed with logistic regression analysis by SAS (statistical analysis system). Logistic regression analysis was done to identify affecting factors for cognition, need and preference of the elderly day care centers. The major findings are as follows: 1. The factors affecting cognition for the day care centers were analysed. The subjects with an occupation and a lower satisfaction level of living environment and friendship, who were economically secure enough to manage a sudden accident, showed a higher level of cognition of the day care centers. The subjects with a higher level of mental health state and a lower level of IADL also showed a higher level of cognition. On the general characteristics younger female subjects showed a higher level of cognition. 2. The subjects with a lower level of perceived economic condition who did not own their housing and were not economically safe enough to manage a sudden accident, had showed a higher level of need for the day care centers. It showed that the subjects with a high level of mental health state, a bad eye sight and dental condition, a good perceived health condition, and a lower level of IADL, needed the centers. 3. The subjects who had an occupation, however, not capable of making their own daily expenses, and a low occupation satisfaction level, and who did not own their housing, and were economically poor not enough to manage a sudden accident, showed a higher preference for the day care centers. The subjects with higher levels of friendship satisfaction and perceived health condition, not living with their spouse, and a higher education level, showed a higher preference for the centers. In conclusion, the common factors affecting their cognition, need and preference of the day care centers were occupation, economic security enough to manage accidents, and friendship satisfaction level. Especially, the subjects who had an occupation, however, not economically secure enough to manage accidents, and who did not live in their own housing with a good perceived health condition, showed high levels of need and preference for the day care centers. These results can be used as basic data to develop the efficient elderly day care centers, thus contribute to the elderly welfare in a local community.

  • PDF

Willingness to Pay for Residential Water on Drought Conditions (가뭄시 가정용수에 대한 소비자 지불의사)

  • Park, Doo-Ho;Park, Yoon-Shin
    • Journal of Korea Water Resources Association
    • /
    • v.40 no.11
    • /
    • pp.861-867
    • /
    • 2007
  • This Research analyzes the consumers' willingness to pay(WTP) for residential water on severe drought condition. The 7 large cities and 32 chronicle drought regions have been selected for this research survey. Results show that the consumers of large cities, which are relatively rich, think water quality is more important than quantity, but the consumers of 32 chronicle drought regions expressed just opposite. Dichotomous choice and open-ended questionnaire are mixed for the survey and Tobit model is applied in the analysis. As we expected, the higher the education level, the number of household member, and the income, the higher the WTP. When there is 25% reduction of supply, the WTP is about $2 per month. Contrary to the expectation, WTP is just slightly increased for 50% of water supply reduction. This is because of the resistance of tax as well as the limited actual experiences of water shortage so, they underestimated it. In any cases, actual WTP for actual water shortage is much higher than this result. More effective water supply and distribution schedule must be ready as a national and local level to prepare severe drought in the near future. Consumers are willing to pay higher price than the current level for water security. Water distributional system should be reconsidered and alternative source of water also be prepared.

A Fast String Matching Scheme without using Buffer for Linux Netfilter based Internet Worm Detection (리눅스 넷필터 기반의 인터넷 웜 탐지에서 버퍼를 이용하지 않는 빠른 스트링 매칭 방법)

  • Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.821-830
    • /
    • 2006
  • As internet worms are spread out worldwide, the detection and filtering of worms becomes one of hot issues in the internet security. As one of implementation methods to detect worms, the Linux Netfilter kernel module can be used. Its basic operation for worm detection is a string matching where coming packet(s) on the network is/are compared with predefined worm signatures(patterns). A worm can appear in a packet or in two (or more) succeeding packets where some part of worm is in the first packet and its remaining part is in its succeeding packet(s). Assuming that the maximum length of a worm pattern is less than 1024 bytes, we need to perform a string matching up to two succeeding packets of 2048 bytes. To do so, Linux Netfilter keeps the previous packet in buffer and performs matching with a combined 2048 byte string of the buffered packet and current packet. As the number of concurrent connections to be handled in the worm detection system increases, the total size of buffer (memory) increases and string matching speed becomes low In this paper, to reduce the memory buffer size and get higher speed of string matching, we propose a string matching scheme without using buffer. The proposed scheme keeps the partial matching result of the previous packet with signatures and has no buffering for previous packet. The partial matching information is used to detect a worm in the two succeeding packets. We implemented the proposed scheme by modifying the Linux Netfilter. Then we compared the modified Linux Netfilter module with the original Linux Netfilter module. Experimental results show that the proposed scheme has 25% lower memory usage and 54% higher speed compared to the original scheme.