• Title/Summary/Keyword: Systems approach

Search Result 10,031, Processing Time 0.042 seconds

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

Two Fold Aspects of Mind and the Rise of Cultivation in Xunzi's Thought, treated mainly through Xiūshēnpiān, Jiěbìpiān and Zhèngmíng of his Writings (순자에 보이는 마음의 중층적 양상과 수양 문제의 대두 ­- 「수신편」, 「해폐편」 그리고 「정명편」을 중심으로 ­-)

  • Rhee, Myung-Su
    • (The)Study of the Eastern Classic
    • /
    • no.73
    • /
    • pp.281-302
    • /
    • 2018
  • The role of mind is very important in Xunzi's thought. The way is permanent rule of politics that is under the control of mind which is recognizing organ for both thinking and acknowledging things in his thought. Nevertheless the mind in Xunzi's thought has desire as an organ of body to be controlled. On the other hand, the mind has conflicting two fold aspects in the course of its recognition of things like storage and vacancy, movement and calmness, and two kinds of recognizing opinion against one object. And there are various evils in thinking system of mind. In a sense, the mind of human is to be cleaned and cultivated. Xunzi proposed managing energy and cultivating mind as a thinking system. Mengzi proposed to enliven vast-flowing energy and to cultivate mind through shortening desire, while Xunzi did managing energy and caring about mind for controlling other body systems and publicly recognizing things. In Xunzi's idea the mind in the recognition of things is similar to the water in bowl as a mirror for looking at any things, and thus it is imperative for us to sink grounds in mind for becoming good water mirror. In this need the grounds of human mind would be to be sunk and also the cultivation of it would be to be demanded. Ultimately there should need the recognition of mind that is cleaned and cultivated for brightly discovering the great principle and recovering the unchangeable way with a view to preparing the condition for national peace. This thesis, in this context, to approach the meaning of mind, its two fold aspects, and the necessity of it.

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

Technology Development for Non-Contact Interface of Multi-Region Classifier based on Context-Aware (상황 인식 기반 다중 영역 분류기 비접촉 인터페이스기술 개발)

  • Jin, Songguo;Rhee, Phill-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.175-182
    • /
    • 2020
  • The non-contact eye tracking is a nonintrusive human-computer interface providing hands-free communications for people with severe disabilities. Recently. it is expected to do an important role in non-contact systems due to the recent coronavirus COVID-19, etc. This paper proposes a novel approach for an eye mouse using an eye tracking method based on a context-aware based AdaBoost multi-region classifier and ASSL algorithm. The conventional AdaBoost algorithm, however, cannot provide sufficiently reliable performance in face tracking for eye cursor pointing estimation, because it cannot take advantage of the spatial context relations among facial features. Therefore, we propose the eye-region context based AdaBoost multiple classifier for the efficient non-contact gaze tracking and mouse implementation. The proposed method detects, tracks, and aggregates various eye features to evaluate the gaze and adjusts active and semi-supervised learning based on the on-screen cursor. The proposed system has been successfully employed in eye location, and it can also be used to detect and track eye features. This system controls the computer cursor along the user's gaze and it was postprocessing by applying Gaussian modeling to prevent shaking during the real-time tracking using Kalman filter. In this system, target objects were randomly generated and the eye tracking performance was analyzed according to the Fits law in real time. It is expected that the utilization of non-contact interfaces.

Exploring Potential Application Industry for Fintech Technology by Expanding its Terminology: Network Analysis and Topic Modelling Approach (용어 확장을 통한 핀테크 기술 적용가능 산업의 탐색 :네트워크 분석 및 토픽 모델링 접근)

  • Park, Mingyu;Jeon, Byeongmin;Kim, Jongwoo;Geum, Youngjung
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.1
    • /
    • pp.1-28
    • /
    • 2021
  • FinTech has been discussed as an important business area towards technology-driven financial innovation. The term fintech is a combination of finance and technology, which means ICT technology currently associated with all finance areas. The popularity of the fintech industry has significantly increased over time, with full investment and support for numerous startups. Therefore, both academia and practice tried to analyze the trend of the fintech area. Despite the fact, however, previous research has limitations in terms of collecting relevant databases for fintech and identifying proper application areas. In response, this study proposed a new method for analyzing the trend of Fintech fields by expanding Fintech's terminology and using network analysis and topic modeling. A new Fintech terminology list was created and a total of 18,341 patents were collected from USPTO for 10 years. The co-classification analysis and network analysis was conducted to identify the technological trends of patent classification. In addition, topic modeling was conducted to identify the trends of fintech in order to analyze the contents of fintech. This study is expected to help both managers and investors who want to be involved in technology-driven financial services seize new FinTech technology opportunities.

Effects on equity in mathematics education: Multilevel analysis via the PISA 2015 (수학교육 형평성에 미치는 학교 영향: PISA 2015를 이용한 다수준 분석)

  • Hwang, Jihyun;Shin, Dong Hoon
    • The Mathematical Education
    • /
    • v.60 no.4
    • /
    • pp.451-466
    • /
    • 2021
  • The interaction between student and school levels should be considered to understand and examine equity in education. For this reason, we included the socioeconomic composition of schools to scrutinize the equity related to students' socioeconomic status and mathematical literacy in Korea. We applied the hierarchical linear modeling approach to the Programme for International Student Assessment (PISA) 2015 data for binational comparison between Korea (5,548 students from 168 schools) and the U.S. (5,217 students from 161 schools). The findings show that school-level achievement and the socioeconomic composition of schools cannot be ignored to understand Korean students' achievement gap between high and low socioeconomic status. In addition, U.S. students from low socioeconomic status were likely to have similar mathematics literacy scores. These findings indicated that inequity in Korean mathematics education could be intertwined with the characteristics of Korean students like high demands for supplementary private education and school characteristics like curriculum selection. This research also reminds mathematics educators that people should not simply mimic other education systems to resolve education issues in their own system.

A Deep Learning Method for Cost-Effective Feed Weight Prediction of Automatic Feeder for Companion Animals (반려동물용 자동 사료급식기의 비용효율적 사료 중량 예측을 위한 딥러닝 방법)

  • Kim, Hoejung;Jeon, Yejin;Yi, Seunghyun;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.2
    • /
    • pp.263-278
    • /
    • 2022
  • With the recent advent of IoT technology, automatic pet feeders are being distributed so that owners can feed their companion animals while they are out. However, due to behaviors of pets, the method of measuring weight, which is important in automatic feeding, can be easily damaged and broken when using the scale. The 3D camera method has disadvantages due to its cost, and the 2D camera method has relatively poor accuracy when compared to 3D camera method. Hence, the purpose of this study is to propose a deep learning approach that can accurately estimate weight while simply using a 2D camera. For this, various convolutional neural networks were used, and among them, the ResNet101-based model showed the best performance: an average absolute error of 3.06 grams and an average absolute ratio error of 3.40%, which could be used commercially in terms of technical and financial viability. The result of this study can be useful for the practitioners to predict the weight of a standardized object such as feed only through an easy 2D image.

A Numerical Analysis Study on the Influence of the Fire Protection System on Evacuation Safety in Apartment Houses (공동주택 건축물 내 화재방호시스템이 피난안전성에 미치는 영향에 대한 수치해석적 연구)

  • Kim, Hak Kyung;Choi, Doo Chan;Lee, Doo Hee;Hwang, Hyun Soo;Kim, Hee Moon
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.1
    • /
    • pp.38-50
    • /
    • 2022
  • Purpose: The goal of this research is to create a numerical analytic database that may assist fire prevention managers and building officials in prioritizing items that need to be addressed in order to improve evacuation safety performance while working within a constrained budget and time frame. Method: It was carried out utilizing the CFD Tool, a quantitative evaluation approach, to assess evacuation safety. One direct staircase-type apartment houses and one corridor-type apartment were chosen to make it. Result: In the fire compartment category, Apartment A's evacuation time was around 130 percent longer than that of sprinkler facilities. Conclusion: Fire prevention managers and building officials feel that starting with a single level and implementing "dwelling unit separations" will increase evacuation safety, and that maintaining fire compartments and sprinkler systems at all times will be effective. Because of the limited characteristics of smoke propagation in corridor-type apartments compared to direct staircase-type flats, it is thought that fire extinguishing equipment should be addressed.

Evaluation of hydropower dam water supply capacity (I): individual and integrated operation of hydropower dams in Bukhan river (발전용댐 이수능력 평가 연구(I): 북한강수계 개별 댐 및 댐군 용수공급능력 분석)

  • Jeong, Gimoon;Choi, Jeongwook;Kang, Doosun;Ahn, Jeonghwan;Kim, Taesoon
    • Journal of Korea Water Resources Association
    • /
    • v.55 no.7
    • /
    • pp.505-513
    • /
    • 2022
  • Recently, uncertainty in predicting available water resources is gradually increasing due to climate change and extreme weather conditions. Social interest in water management such as flood and drought prevention is also increasing, and after the unification of water management implemented in 2018, domestic water management is facing a major turning point. As part of such strengthening of water management capabilities, various studies are being conducted to utilize a hydropower dam for flood control and water supply purposes, which was mainly operated for hydroelectric power generation. However, since the dam evaluation methods developed based on a multi-purpose dam are being applied to hydropower dams, an additional evaluation approach that can consider the characteristics of hydropower dams is required. In this study, a new water supply capacity evaluation method is presented in consideration of the operational characteristics of hydropower dams in terms of water supply, and a connected reservoir simulation method is proposed to evaluate the comprehensive water supply capacity of a dam group operating in a river basin. The presented method was applied to the hydropower dams located in the Bukhan River basin, and the results of the water supply yield of individual dams and multi-reservoir systems were compared and analyzed. In the future, the role of hydropower dams for water supply during drought is expected to become more important, and this study can be used for sustainable domestic water management research using hydropower dams.

Appropriate Technology and Field Application of Non-powered Water Purification System Using Nanofiber Membrane (나노섬유 멤브레인 기반 무동력 정수 시스템의 적정기술 및 현장 적용)

  • Lee, Jin;Yun, Byeong Gweon;Han, Kyoung Gu;Lee, Seung Hoon;Kim, Cheol Hyeon;Kim, Chan;Lee, Yunho;Lee, Dongwhi;Lee, Seunghyeok;Kim, Kyoung-Woong
    • Journal of Appropriate Technology
    • /
    • v.7 no.1
    • /
    • pp.72-81
    • /
    • 2021
  • Gravity-driven membrane (GDM) filtration system based on the nanofiber membrane was investigated. This system can be operated with little energy demand due to a gravitational pressure-driven filtration and biological fouling control strategy. Moreover, the optimal module configuration based on the high permeance of nanofiber membrane can provide a significantly high water productivity. In order to evaluate its applicability potential, the pilot-scale (3000-5000 L/day) systems with nanofiber membranes were operated in developing countries (Kiribati and Tuvalu). Our results showed that the 14-92 L/(m2×h) of the permeate flux was determined indicating a stabilized water productivity. In addition, the permeate water indicated a high removal rate (more than 99.99%) of turbidity and bacteria. Consequently, the system can provide a stabilized water production with safe permeate water quality during long-term operation. These findings exemplify an effective approach to decentralized drinking water treatment for developing countries.