• Title/Summary/Keyword: Urgent Data

Search Result 676, Processing Time 0.025 seconds

ILVA: Integrated audit-log analysis tool and its application. (시스템 보안 강화를 위한 로그 분석 도구 ILVA와 실제 적용 사례)

  • 차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.3
    • /
    • pp.13-26
    • /
    • 1999
  • Widespread use of Internet despite numerous positive aspects resulted in increased number of system intrusions and the need for enhanced security mechanisms is urgent. Systematic collection and analysis of log data are essential in intrusion investigation. Unfortunately existing logs are stored in diverse and incompatible format thus making an automated intrusion investigation practically impossible. We examined the types of log data essential in intrusion investigation and implemented a tool to enable systematic collection and efficient analysis of voluminous log data. Our tool based on RBDMS and SQL provides graphical and user-friendly interface. We describe our experience of using the tool in actual intrusion investigation and explain how our tool can be further enhanced.

Performance Comparison of Wavelet Transform Based Watermarking and DCT Transform Based Watermarking (Wavelet 변환과 DCT 변환을 이용한 워터마킹에 관한 연구)

  • 장용원;한승수;김인택
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.85-88
    • /
    • 2000
  • With the rapid growth of network distributions of digitized media(audio, image, and video), there is an urgent need for copyright protection. For now watermarking is a well-known technique for copyright protection of digital data. To embed a digital watermark to the image, discrete cosine transform(DCT) and wavelet transform are commonly used. In this paper, the performance of the DCT based watermarking technique and wavelet based watermarking technique were compared and the influences of the parameter a that decides the strength of the watermarking data were considered.

  • PDF

Automatic Algorithm for Cleaning Asset Data of Overhead Transmission Line (가공송전 전선 자산데이터의 정제 자동화 알고리즘 개발 연구)

  • Mun, Sung-Duk;Kim, Tae-Joon;Kim, Kang-Sik;Hwang, Jae-Sang
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.7 no.1
    • /
    • pp.73-77
    • /
    • 2021
  • As the big data analysis technologies has been developed worldwide, the importance of asset management for electric power facilities based data analysis is increasing. It is essential to secure quality of data that will determine the performance of the RISK evaluation algorithm for asset management. To improve reliability of asset management, asset data must be preprocessed. In particular, the process of cleaning dirty data is required, and it is also urgent to develop an algorithm to reduce time and improve accuracy for data treatment. In this paper, the result of the development of an automatic cleaning algorithm specialized in overhead transmission asset data is presented. A data cleaning algorithm was developed to enable data clean by analyzing quality and overall pattern of raw data.

Designing Flexible Packets for Multi-Satellite Data Transmission in a Physical Network Separation Environment

  • Baek, Hyun Chul;Lee, Sang Jeong
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.6
    • /
    • pp.26-35
    • /
    • 2020
  • The national satellite operation network, which supports multiple satellites, was designated as a Critical Information Infrastructure (CII) in 2017. The network was designed independently from the control network and the information network to enhance physical security. Planning is underway to establish a bidirectional data interface between networks. The data transmission system allows data flow only to the physical layer and the data link layer; hence, only one file can be transferred at any one time. This means that when large amounts of data are being transmitted, no other data can be sent simultaneously in urgent situations. Thus, this paper discusses the design of flexible packets for the transmission of data between networks in an environment where physical security has been enhanced through network separation and based on this, presents a method for transmitting data effectively.

Strategies for Activating BIM-data Sharing in Construction - Based on cases of defining practical data and a survey of practitioners - (건설분야 BIM 데이터 공유 활성화 전략 - 건설 실무분야의 데이터 연계방법과 실무자 설문을 기반으로-)

  • Kim, Do-Young;Lee, Sung-Woo;Nam, Ju-Hyun;Kim, Bum-Soo;Kim, Sung-Jin
    • Journal of KIBIM
    • /
    • v.12 no.1
    • /
    • pp.72-80
    • /
    • 2022
  • It has become mandatory to designs by BIM in construction. It is urgent to make accurate decisions through the linkage between complex and various types of data in projects. In particular, block-chain based data sharing process (using BIM files, general construction submitted files) is essential to support reliable decision making in complex data flood systems. Prior to developing data sharing system based on block-chain, in this paper, a data linkage method is proposed so that practitioners can simultaneously utilize existing construction information and BIM data. Examples are shown based on the construction classification system and file expression, and incentive strategies are explored through a survey so that heterogeneous information can be used at the same time in overall projects.

Surgical Outcomes for Native Valve Endocarditis

  • Park, Bong Suk;Lee, Won Yong;Ra, Yong Joon;Lee, Hong Kyu;Gu, Byung Mo;Yang, Jun Tae
    • Journal of Chest Surgery
    • /
    • v.53 no.1
    • /
    • pp.1-7
    • /
    • 2020
  • Background: The aim of this study was to evaluate the short-term and long-term results of surgical treatment for native valve endocarditis (NVE) and to investigate the risk factors associated with mortality. Methods: Data including patients' characteristics, operative findings, postoperative results, and survival indices were retrospectively obtained from Hallym University Sacred Heart Hospital. Results: A total of 29 patients underwent surgery for NVE (affecting the mitral valve in 20 patients and the aortic valve in 9) between 2003 and 2017. During the follow-up period (median, 46.9 months; interquartile range, 19.1-107.0 months), the 5-year survival rate was 77.2%. In logistic regression analysis, body mass index (p=0.031; odds ratio [OR], 0.574; 95% confidence interval [CI], 0.346-0.951), end-stage renal disease (ESRD) (p=0.026; OR, 24.0; 95% CI, 1.459-394.8), and urgent surgery (p=0.010; OR, 34.5; 95% CI, 2.353-505.7) were significantly associated with in-hospital mortality. Based on Cox proportional hazard regression analysis, the statistically significant predictors of long-term outcomes were hypertension, ESRD, and urgent surgery. Conclusion: Surgical treatment for NVE is associated with considerable mortality. The in-hospital mortality and 5-year survival rates of this study were 13.8% and 77.2%, respectively. Underlying conditions, including hypertension and ESRD, and urgent surgery were independent risk factors for unfavorable outcomes.

Prioritisation of Medical Procedure for Health Technology Assessment (전문의 대상 설문조사를 이용한 보건의료 기술평가 대상 시술의 우선 순위 선정 - 이비인후과와 흉부외과를 중심으로 -)

  • 안형식;김선민;신영수;김차엽;김선미;이순형
    • Health Policy and Management
    • /
    • v.7 no.2
    • /
    • pp.46-64
    • /
    • 1997
  • Background & Objectives : Korea is face with the social need for health care technology assessment so that it is urgently needed to found principles and methodology in technology assessment in health care. As a groundwork for health care technology assessment, we tried to prioritize medical technology for assessment. Among medical technologies, procedure is somewhat difficult to assess, compared to drug or equipment. In this study, we aimed at the prioritisation of medical procedure to be assessed, in terms of efficay, safety, and adequacy. Method : For the standardized classification of medical procedure, ICD-9-CM(International Classification of Diseases 9th edition - Clinical Modification) was used. Among the list the procedures coming under otorhinolaringjology and thoracic surgery were selected by three family physicians. The list of procedure was mailed to the board certified surgeons of both disciplines, with the question asking about the necessity for assessment in terms of efficay, safety, and adequacy. Replied questionnaires were analyzed in each procedure. Results : Of 560 otorhinolaryngologist and 480 thoracic surgeon, 114 surgeons replied. Of otorhinolaryngological procedure, incision, excision, and destruction of inner ear : fenestration of inner ear : stapedectomy and its revision were the most urgent technology to assess in the aspect of safety. For adequacy, operations on Eustachian tube: fenestration of inner ear: incision, excision, and destruction of inner ear were highly ranked in necessity, and for efficary, operations on Eustachian tube; external maxillary antrotomy; fenestration of inner ear. Thoracic surgeons replied thoracic procedures, lung transplantation; heart transplantation; implantation of heart assist system [pump] are most important for evaluation in terms of safety; and heart transplantation; Lung transplantation; Implantation of heart assist system [pump] in terms of adequacy, and surgical collapse of lung [Artificia니 pnemothorax or pnuexoperitoeum]; lung transplantation; periarterial sympathectomy in terms of efficacy. As a whole, surgeons regard safety evaluation is more urgent than adequacy or efficary. In addition, otorhinolaryngological surgeons regard evaluation of their procedures more urgent than thoracic surgeons regard theirs. Conclusion : By the questionnaire to board certified physicians, we get some preliminary data for prioritisation of technologies to assess. Through the questionnaire like this, much information would be gathered for technology assessment, especially for medical procedure, if not enough. In the near future, well structured expert opinion gathering research, such as modified Delphi or nominal group technique, should be done succeedingly.

  • PDF

Analysis of a Communication Network for Control Systems in Nuclear Power Plants and a Case Study

  • Lee, Sung-Woo;Gwak, Kwi?Yil
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.338-341
    • /
    • 2005
  • In this paper, a real-time communication method using a PICNET-NP(Plant Instrumentation and Control Network for Nuclear Power Plant) is proposed with an analysis of the control network requirements of DCS (Distributed Control System) in nuclear power plants. The method satisfies deadline in case of worst data traffics by considering aperiodic and periodic real-time data and others. In addition, the method was used to analyze the data characteristics of the DCS in existing nuclear power plant. The result shows that use of this method meets the response time requirement(100ms).

  • PDF

Quantitative Analysis for Plasma Etch Modeling Using Optical Emission Spectroscopy: Prediction of Plasma Etch Responses

  • Jeong, Young-Seon;Hwang, Sangheum;Ko, Young-Don
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.4
    • /
    • pp.392-400
    • /
    • 2015
  • Monitoring of plasma etch processes for fault detection is one of the hallmark procedures in semiconductor manufacturing. Optical emission spectroscopy (OES) has been considered as a gold standard for modeling plasma etching processes for on-line diagnosis and monitoring. However, statistical quantitative methods for processing the OES data are still lacking. There is an urgent need for a statistical quantitative method to deal with high-dimensional OES data for improving the quality of etched wafers. Therefore, we propose a robust relevance vector machine (RRVM) for regression with statistical quantitative features for modeling etch rate and uniformity in plasma etch processes by using OES data. For effectively dealing with the OES data complexity, we identify seven statistical features for extraction from raw OES data by reducing the data dimensionality. The experimental results demonstrate that the proposed approach is more suitable for high-accuracy monitoring of plasma etch responses obtained from OES.

Improving the Efficiency and Scalability of Standard Methods for Data Cryptography

  • Abu-Faraj, Mua'ad M.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.451-458
    • /
    • 2021
  • Providing a secure and effective way to protect confidential and private data is an urgent process, and accordingly, we will present in this research paper a new method, which is called multiple rounds variable block method (MRVB) which depends on the use of a colored image that is kept secret to generate needed work and round keys. This method can be used to encrypt-decrypt data using various lengths private key and data blocks with various sizes. The number of rounds also will be variable starting from one round. MRVB will be implemented and compared with the encryption-decryption standards DES and AES to show the improvements provided by the proposed method in increasing the security level and in increasing the throughput of the process of data cryptography. The generated private key contents will depend on the used image_key and on the selected number of rounds and the selected number of bytes in each block of data.