• Title/Summary/Keyword: application security

Search Result 2,552, Processing Time 0.026 seconds

A Study on Normal Project Duration for Water Resource Project (수자원시설 건설공사 표준공기 산정을 위한 기초연구)

  • Lee, Bongsu;Kim, Kinam;Lee, Minjae
    • Korean Journal of Construction Engineering and Management
    • /
    • v.16 no.1
    • /
    • pp.35-43
    • /
    • 2015
  • It is important to have enough design and construction duration for infrastructure projects. However, recent water resource project in Korea shows several problems caused by their fast-tract schedule. National Audit Committee report several water resource projects have quality problems caused by insufficient project duration. Especially, water resource projects such as dam and water pipeline construction should have proper time to secure their structure quality. Normal project duration for these projects should be estimated based on previous similar projects' historical data analysis. However there is no standard model which can estimate normal project duration for water resource projects in Korea. There are several normal project duration estimation models for building project developed by public(LH) and private construction companies. However, there is no proper model for water resource projects. So, this study developed normal project duration model for dam and water pipeline projects using historical data and show application of models.

A Service Identification Scheme for the Convergence of Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크 융합을 위한 서비스 식별 체계)

  • Uhm, Huy-Jung;Eun, Seong-Bae;Jun, Jung-Ho;Kang, Gwon-U;Ju, Yong-Wan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.104-113
    • /
    • 2011
  • While converging USN Services, a single physical infrastructure can be used in several services and in several physical infrastructures can make up a single service. Therefore the physical infrastructure and service have to manage separately for effective convergence of USN Services. However, established Identification Scheme is not suitable to distinguish various services that USN provides. This paper suggests USN Service Identification Scheme that can be separated and managed. Through USN Service Identification Scheme suggested, firstly, it is possible to obtain Service Identification Scheme utilizing various technology such as RFID TAG, QR Code, radio broadcasting, etc. because it is possible to process USN Service Identification Scheme. Secondly, it is easy to mange the service, develope the user application program and interlock with established USN Standard technique as view from service provider. Thirdly, it is possible to manage systematically USN Service. Fourthly, users can search USN Service easily, so it can contribute actively for invigoration of USN service. This thesis, firstly, has analyzed about standard related USN Service and USN Identification Scheme. Secondly, this has suggested brand-new USN Service Identification Scheme based on established USN Identification Scheme.

The Effect of the on the purchase behavior of the Software Quality (소프트웨어 품질이 소비자 구매 행동에 미치는 영향)

  • Kim, Dae-Sung;Oh, Sung-Bae
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.4 no.1
    • /
    • pp.29-65
    • /
    • 2009
  • This study is The Effect of the on the purchase behavior of the Software Quality. To have purchased the software in a Consumer surveys were conducted. The following is a summary of results of this research. First, the software quality and significant consumer purchasing behavior (+) of influence. Functionality, usability, portability of software quality attributes the impulse buying and buy more of both the (+) showed the influence. Second, software quality is urge consumers to purchase significant (+) of influence. Functionality, reliability, usability, portability of software quality (+) showed the influence. Third, the software quality In the consumer buy more significant Chung (+) showed the influence. Software quality, functionality, usability, portability name (+) influence. In conclusion, the quality of the software in consumer purchasing behavior (+) were of significant influence. In particular, factors that functionality, usability factors, portability factor in the relatively large influence on the purchasing behavior. Software technology development, planning, development, testing, and in each step must keep in mind the following. First, the software, when used in certain conditions, Inherent ability to meet the needs and requirements set forth to provide the appropriate functionality and accuracy as the ability of software products each other with the capabilities to the effective and thorough security features should be required. Second, software, a user-specified criteria to use in understanding and learning, and must, and the ability to prefer. Software for users to understand and easy to use, whether the check. In particular, understanding the interface, Help understanding, understand the input and output data, and interface consistency, the user information, the message must be equipped and easy to understand. In addition, ease of learning to be self-learning, and help ease of access shall be required. Third, in certain circumstances, a different environment to transfer be equipped with the functionality of the software. Applying data structures and application environment, helping transplant convenience must keep in mind sex.

  • PDF

A Study on the Application of Cross-Certification Technology for the Automatic Authentication of Charging Users in ISO 15118 Standard (ISO 15118 충전 사용자 자동인증을 위한 교차인증서 기술의 적용에 관한 연구)

  • Lee, Sujeong;Shin, Minho;Jang, Hyuk-soo
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.2
    • /
    • pp.1-14
    • /
    • 2020
  • ISO 15118 is an international standard that defines communication between electric vehicles and electric vehicle chargers. Plug & Charge (PnC) was also defined as a technology to automatically authenticate users when using charging services. PnC indicates automatic authentication technology where all processes such as electric vehicle user authentication, charging and billing are automatically processed. According to the standard, certificates for chargers and CPSs (Certificate Provisioning Services) should be under the V2G (Vehicle to Grid) Root certificate. In Korea, the utility company operates its own PKI (Public Key Infrastructure), making it difficult to provide chargers under the V2G Root Certificate. Therefore, a method that can be authenticated is necessary even when you have different Root Certificates. This paper proposes to apply cross-certificate technology to PnC authentication. Automatic authentication of Cross Certification is to issue a cross-certificate of the Root CA and include it in the certificate chain to proceed with automatic authentication, even if you have different Root certificates. Applying cross-certificate technology enables verification of certificates under other Root certificates. In this paper, the PnC automatic authentication and cross certificate automatic authentication is implemented, so as to proceed with proof of concept proving that both methods are available. Define development requirements, certificate profiles, and user authentication sequences, and implement and execute them accordingly. This experiment confirms that two automatic authentication are practicable, especially the scalability of automatic authentication using cross-certificate PnC.

Plant Immunity against Viruses: Moving from the Lab to the Field (식물바이러스 면역반응 최신 연구 동향 및 전망)

  • Kim, Nam-Yeon;Hong, Jin-Sung;Jeong, Rae-Dong
    • Research in Plant Disease
    • /
    • v.24 no.1
    • /
    • pp.9-25
    • /
    • 2018
  • Plant viruses cause significant yield losses and continuously threaten crop production, representing a serious threat to global food security. Studies on plant-virus interactions have contributed to increase our knowledge on plant immunity mechanism, providing new strategies for crop improvement. The prophylactic managements consist mainly following international legislations, eradication of infected plants, and application of pesticide to decrease the population of vectors. Hence, putting together the pieces of knowledge related to molecular plant immunity to viruses is critical for the control of virus disease in fields. Over the last several decades, the outstanding outcomes of extensive research have been achieved on comprehension of plant immunity to viruses. Although most dominant R genes have been used as natural resistance genes, recessive resistance genes have been deployed in several crops as another efficient strategy to control viruses. In addition, RNA interference also regulates plant immunity and contribute a very efficient antiviral system at the nucleic acid level. This review aims at describing virus disease on crops and summarizes current resistance mechanisms. Furthermore, we will discuss the current biotechnological approaches to control viral diseases and the future questions that are to be addressed to secure crop production against viruses.

Numerical studies on approximate option prices (근사적 옵션 가격의 수치적 비교)

  • Yoon, Jeongyoen;Seung, Jisu;Song, Seongjoo
    • The Korean Journal of Applied Statistics
    • /
    • v.30 no.2
    • /
    • pp.243-257
    • /
    • 2017
  • In this paper, we compare several methods to approximate option prices: Edgeworth expansion, A-type and C-type Gram-Charlier expansions, a method using normal inverse gaussian (NIG) distribution, and an asymptotic method using nonlinear regression. We used two different types of approximation. The first (called the RNM method) approximates the risk neutral probability density function of the log return of the underlying asset and computes the option price. The second (called the OPTIM method) finds the approximate option pricing formula and then estimates parameters to compute the option price. For simulation experiments, we generated underlying asset data from the Heston model and NIG model, a well-known stochastic volatility model and a well-known Levy model, respectively. We also applied the above approximating methods to the KOSPI200 call option price as a real data application. We then found that the OPTIM method shows better performance on average than the RNM method. Among the OPTIM, A-type Gram-Charlier expansion and the asymptotic method that uses nonlinear regression showed relatively better performance; in addition, among RNM, the method of using NIG distribution was relatively better than others.

Adaptive Blind Watermarking Technique by Biased-Shift of Quantizer (양자화기의 편의이동에 의한 적응적인 블라인드 워터마킹 기술)

  • Seo Young-Ho;Choi Hyun-Joon;Choi Soon-Young;Lee Chang-Yeul;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.2 s.302
    • /
    • pp.49-58
    • /
    • 2005
  • In this paper, we proposed a blind watermarking algerian to use characteristics of a scalar quantizer which is the recommended in the JPEG2000 and JPEG. The proposed algorithm shifts a quantization index according to the value of each watermark bit to prevent losing the watermark information during the compression by quantization. Therefore, the watermark is embedded during the process of quantization, not an additional process for watermarking, and is adaptively applied as a assigned quantizer according application areas. Before embedding process, a LFSR(Linear feedback shift register) rearranged the watermark for the security of the watermark itself and in the embedding process, a LFSR is used to hide the watermarking positions. Therefore the embedded watermark can he extracted by only the owner who knows the initial value of LFSR without the original image. The visual recognizable pattern such as a binary image was used as the watermark. The experimental results showed that the proposed algerian satisfies the robustness and imperceptibility corresponding to the major requirement of watermarking. The results showed the largest error rate to be $5.7\%$ for attack. The experimental result which compares the proposed algorithm with the Mohamed algorithm showed that the proposed algorithm was better than it, exactly $4\~5$ times for the attacks of JPEG and JPEG2000.

Fingerprint Recognition Algorithm using Clique (클릭 구조를 이용한 지문 인식 알고리즘)

  • Ahn, Do-Sung;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.2
    • /
    • pp.69-80
    • /
    • 1999
  • Recently, social requirements of personal identification techniques are rapidly expanding in a number of new application ares. Especially fingerprint recognition is the most important technology. Fingerprint recognition technologies are well established, proven, cost and legally accepted. Therefore, it has more spot lighted among the any other biometrics technologies. In this paper we propose a new on-line fingerprint recognition algorithm for non-inked type live scanner to fit their increasing of security level under the computing environment. Fingerprint recognition system consists of two distinct structural blocks: feature extraction and feature matching. The main topic in this paper focuses on the feature matching using the fingerprint minutiae (ridge ending and bifurcation). Minutiae matching is composed in the alignment stage and matching stage. Success of optimizing the alignment stage is the key of real-time (on-line) fingerprint recognition. Proposed alignment algorithm using clique shows the strength in the search space optimization and partially incomplete image. We make our own database to get the generality. Using the traditional statistical discriminant analysis, 0.05% false acceptance rate (FAR) at 8.83% false rejection rate (FRR) in 1.55 second average matching speed on a Pentium system have been achieved. This makes it possible to construct high performance fingerprint recognition system.

  • PDF

Models of Database Assets Valuation and their Life-cycle Determination (데이터베이스 자산 가치평가 모형과 수명주기 결정)

  • Sung, Tae-Eung;Byun, Jeongeun;Park, Hyun-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.3
    • /
    • pp.676-693
    • /
    • 2016
  • Although the methodology and models to assess the economic value of technology assets such as patents are being presented in various ways, there does not exist a structured assessment model which enables to objectively assess a database property's value, and thus there is a need to enhance the application feasibility of practical purposes such as licensing of DB assets, commercialization transfer, security, etc., through the establishment of the valuation model and the life-cycle decision logic. In this study, during the valuation process of DB assets, the size of customer demand group expected and the amount of demand, the size and importance of data sets, the approximate degree of database' contribution to the sales performance of a company, the life-cycle of database assets, etc. will be analyzed whether they are appropriate as input variables or not. As for most of DB assets, due to irregular updates there are hardly cases their life-cycle expires, and thus software package's persisting period, ie. 5 years, is often considered the standard. We herein propose the life-cycle estimation logic and valuation models of DB assets based on the concept of half life for DB usage frequency under the condition that DB assets' value decays and there occurs no data update over time.

Fintech Trends and Mobile Payment Service Anlaysis in Korea: Application of Text Mining Techniques (국내 핀테크 동향 및 모바일 결제 서비스 분석: 텍스트 마이닝 기법 활용)

  • An, JungKook;Lee, So-Hyun;An, Eun-Hee;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.23 no.3
    • /
    • pp.26-42
    • /
    • 2016
  • Recently, with the rapid growth of the O2O market, Fintech combining the finance and ICT technology is drawing attention as innovation to lead "O2O of finance", along with Fintech-based payment, authentication, security technology and related services. For new technology industries such as Fintech, technical sources, related systems and regulations are important but previous studies on Fintech lack in-depth research about systems and technological trends of the domestic Fintech industry. Therefore, this study aims to analyze domestic Fintech trends and find the insights for the direction of technology and systems of the future domestic Fintech industry by comparing Kakao Pay and Samsung Pay, the two domestic representative mobile payment services. By conducting a complete enumeration survey about the tweets mentioning Fintech until June 2016, this study visualized topics extraction, sensitivity analysis and keyword analyses. According to the analysis results, it was found that various topics have been created in the technologies and systems between 2014 and 2016 and different keywords and reactions were extracted between topics of Samsung Pay based on "devices" such as Galaxy and Kakao Pay based on "service" such as KakaoTalk. This study contributes to analyzing the unstructured data of social media by period by using social media mining and quantifying the expectations and reactions of consumers to services through the sentiment analysis. It is expected to be the foundation of Fintech industry development by presenting a strategic direction to Fintech related practitioners.