• Title/Summary/Keyword: Weaknesses

Search Result 1,178, Processing Time 0.033 seconds

Identification and risk management related to construction projects

  • Boughaba, Amina;Bouabaz, Mohamed
    • Advances in Computational Design
    • /
    • v.5 no.4
    • /
    • pp.445-465
    • /
    • 2020
  • This paper presents a study conducted with the aim of developing a model of tendering based on a technique of artificial intelligence by managing and controlling the factors of success or failure of construction projects through the evaluation of the process of invitation to tender. Aiming to solve this problem, analysis of the current environment based on SWOT (Strengths, Weaknesses, Opportunities, and Threats) is first carried out. Analysis was evaluated through a case study of the construction projects in Algeria, to bring about the internal and external factors which affect the process of invitation to tender related to the construction projects. This paper aims to develop a mean to identify threats-opportunities and strength-weaknesses related to the environment of various national construction projects, leading to the decision on whether to continue the project or not. Following a SWOT analysis, novel artificial intelligence models in forecasting the project status are proposed. The basic principal consists in interconnecting the different factors to model this phenomenon. An artificial neural network model is first proposed, followed by a model based on fuzzy logic. A third model resulting from the combination of the two previous ones is developed as a hybrid model. A simulation study is carried out to assess performance of the three models showing that the hybrid model is better suited in forecasting the construction project status than RNN (recurrent neural network) and FL (fuzzy logic) models.

A Study of Android Launcher based on Application Virtualization (어플리케이션 가상화를 적용한 안드로이드 런처 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.115-120
    • /
    • 2013
  • Recently, Virtualization technology is moving the desktop environment from its place a mobile platform environment, personal and businesses, academia, and lacked security and in a team environment brought about many changes are coming. In this environment, a representative of VMware's MVP solution and Enterporid Divide. But, another issue is that these mobile virtualization technologies in an environment of limited resources and performance constraints, have become its application virtualization technology to improve the weaknesses of the mobile platform. In this paper, proposed for client-based desktop application virtualization infrastructure, bring it to the Android environment, weaknesses of the existing paper was user area limitations of the desktop environment with application virtualization, program execution android application virtualization launcher was improved through increased resource allocation.

A New and Flexible Mdlti-signcryption Protocol (유연성을 가진 새로운 멀티-사인크립션 프로토콜)

  • Seo Seung-Hyun;Lee Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.6
    • /
    • pp.288-295
    • /
    • 2005
  • Multi-signcryption scheme is an extension of signcryption scheme for multi-signers performing together the signcryption operation on messages, and it provides useful cryptographic functions such as confidentiality and authenticity for the sound circulation of messages through the Internet. In this paper, we show the weaknesses of the previous multi-signcryption schemes. And then we propose a new multi-signcryption scheme that improves the weaknesses and the efficiency of the previous schemes. Our scheme efficiently provides message flexibility, order flexibility, message verifiability, order verifiability, message confidentiality, message unforgeability, non-repudiation and robustness. Therefore, it is suitable for protecting messages and multi-signers from malicious attacks in the Internet.

Trellis Encoding of 6/8 Balanced Code for Holographic Data Storage Systems (홀로그래픽 저장장치를 위한 2차원 6/8 균형부호의 트렐리스 인코딩)

  • Kim, Byungsun;Lee, Jaejin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.10
    • /
    • pp.569-573
    • /
    • 2014
  • Holographic data storage is a strong contender to become the next-generation data storage method. Its major weaknesses are two-dimensional intersymbol interference between neighboring pixels and interpage interference caused by storing multiple pages in a single volume of hologram. In this paper, we present a trellis encoding scheme of 6/8 balanced modulation code, to address the two weaknesses. The proposed modulation coding scheme captures on characteristics of the balanced code: the scheme relaxes IPI and enables error correction by exploiting the trellis structure. The proposed method showed improved SNR over the conventional 6/8 modulation code.

A Study on the Semantic Web enabled Knowledge Management System Architecture (시맨틱 웹 기술을 적용한 지식관리시스템 아키텍처에 관한 연구)

  • 전종홍;이원석;이강찬
    • The Journal of Society for e-Business Studies
    • /
    • v.8 no.4
    • /
    • pp.183-205
    • /
    • 2003
  • There have been various attempts of Knowledge Management System in order to effectively support Knowledge Process and to manage a wide variety of unstructured knowledge. However, Knowledge Management System basically has some significant weakness for searching knowledge, extracting information and maintenance, and some difficulties to integrate such various knowledge resources. Several studies had been conducted to overcome these weaknesses and to improve the method of knowledge management. The purpose of this study is 1) to examine the effectiveness of Semantic Web Technology that has a great attention lately; whether it is useful to overcome the weaknesses, and 2) to review its strong points and some future uses. Further, differences of Semantic Web Technology compared to existing Knowledge Management System Architecture are reviewed. Finally, a new Semantic Web Enabled KMS Architecture is proposed. Also some prospects for future market direction are suggested.

  • PDF

Design and Implement of Authentication System for Secure User Management for Secure on Medical ICT Convergence Environment (의료 ICT융합 환경에서 안전한 사용자 관리를 위한 인증시스템 설계 및 구현: 중소형 의료기관을 중심으로)

  • Kim, Yanghoon;Choi, Yean Jung
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.29-36
    • /
    • 2019
  • The convergence of traditional industry and ICT is a combination of security threats and vulnerabilities in ICT and specific industry-specific problems of existing industries, and new security threats and vulnerabilities are emerging. In particular, in the medical ICT convergence industry, various problems regarding user authentication are derived from the medical information system, which is being used for abuse and security weaknesses. According, this study designed and implemented a user authentication system for secure user management in medical ICT convergence environment. Specifically, we design and implement measures to solve the abuse and security weaknesses of ID sharing and to solve the inconvenience of individual ID / PW authentication by performing user authentication using personalized devices based on medical information systems.

Level 1 probabilistic safety assessment of supercritical-CO2-cooled micro modular reactor in conceptual design phase

  • So, Eunseo;Kim, Man Cheol
    • Nuclear Engineering and Technology
    • /
    • v.53 no.2
    • /
    • pp.498-508
    • /
    • 2021
  • Micro reactors are increasingly being considered for utilization as distributed power sources. Hence, the probabilistic safety assessment (PSA) of a direct supercritical-CO2-cooled fast reactor, called micro modular reactor (MMR), was performed in this study; this reactor was developed using innovative design concepts. It adopted a modular design and passive safety systems to minimize site constraints. As the MMR is in its conceptual design phase, design weaknesses and valuable safety insights could be identified during PSA. Level 1 internal event PSA was carried out involving literature survey, system characterization, identification of initiating events, transient analyses, development of event trees and fault trees, and quantification. The initiating events and scenarios significantly contributing to core damage frequency (CDF) were determined to identify design weaknesses in MMR. The most significant initiating event category contributing to CDF was the transients with the power conversion system initially available category, owing to its relatively high occurrence frequency. Further, an importance analysis revealed that the safety of MMR can be significantly improved by improving the reliability of reactor trip and passive decay heat removal system operation. The findings presented in this paper are expected to contribute toward future applications of PSA for assessing unconventional nuclear reactors in their conceptual design phases.

The Windows Physical Memory Dump Explorer for Live Forensics (라이브 포렌식을 위한 윈도우즈 물리 메모리 분석 도구)

  • Han, Ji-Sung;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.2
    • /
    • pp.71-82
    • /
    • 2011
  • Live data in physical memory can be acquired by live forensics but not by harddisk file-system analysis. Therefore, in case of forensic investigation, live forensics is widely used these days. But, existing live forensic methods, that use command line tools in live system, have many weaknesses; for instance, it is not easy to re-analyze and results can be modified by malicious code. For these reasons, in this paper we explain the Windows kernel architecture and how to analyze physical memory dump files to complement weaknesses of traditional live forensics. And then, we design and implement the Physical Memory Dump Explorer, and prove the effectiveness of our tool through test results.

DABC: A dynamic ARX-based lightweight block cipher with high diffusion

  • Wen, Chen;Lang, Li;Ying, Guo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.165-184
    • /
    • 2023
  • The ARX-based lightweight block cipher is widely used in resource-constrained IoT devices due to fast and simple operation of software and hardware platforms. However, there are three weaknesses to ARX-based lightweight block ciphers. Firstly, only half of the data can be changed in one round. Secondly, traditional ARX-based lightweight block ciphers are static structures, which provide limited security. Thirdly, it has poor diffusion when the initial plaintext and key are all 0 or all 1. This paper proposes a new dynamic ARX-based lightweight block cipher to overcome these weaknesses, called DABC. DABC can change all data in one round, which overcomes the first weakness. This paper combines the key and the generalized two-dimensional cat map to construct a dynamic permutation layer P1, which improves the uncertainty between different rounds of DABC. The non-linear component of the round function alternately uses NAND gate and AND gate to increase the complexity of the attack, which overcomes the third weakness. Meanwhile, this paper proposes the round-based architecture of DABC and conducted ASIC and FPGA implementation. The hardware results show that DABC has less hardware resource and high throughput. Finally, the safety evaluation results show that DABC has a good avalanche effect and security.

Comparative Evaluation of Reproducibility for Spatio-temporal Rainfall Distribution Downscaled Using Different Statistical Methods (통계적 공간상세화 기법의 시공간적 강우분포 재현성 비교평가)

  • Jung, Imgook;Hwang, Syewoon;Cho, Jaepil
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.65 no.1
    • /
    • pp.1-13
    • /
    • 2023
  • Various techniques for bias correction and statistical downscaling have been developed to overcome the limitations related to the spatial and temporal resolution and error of climate change scenario data required in various applied research fields including agriculture and water resources. In this study, the characteristics of three different statistical dowscaling methods (i.e., SQM, SDQDM, and BCSA) provided by AIMS were summarized, and climate change scenarios produced by applying each method were comparatively evaluated. In order to compare the average rainfall characteristics of the past period, an index representing the average rainfall characteristics was used, and the reproducibility of extreme weather conditions was evaluated through the abnormal climate-related index. The reproducibility comparison of spatial distribution and variability was compared through variogram and pattern identification of spatial distribution using the average value of the index of the past period. For temporal reproducibility comparison, the raw data and each detailing technique were compared using the transition probability. The results of the study are presented by quantitatively evaluating the strengths and weaknesses of each method. Through comparison of statistical techniques, we expect that the strengths and weaknesses of each detailing technique can be represented, and the most appropriate statistical detailing technique can be advised for the relevant research.