• Title/Summary/Keyword: destroy data

Search Result 45, Processing Time 0.027 seconds

A Study for Feature Selection in the Intrusion Detection System (침입탐지시스템에서의 특징 선택에 대한 연구)

  • Han, Myung-Mook
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.87-95
    • /
    • 2006
  • An intrusion can be defined as any set of actors that attempt to compromise the integrity, confidentiality and availability of computer resource and destroy the security policy of computer system. The Intrusion Detection System that detects the intrusion consists of data collection, data reduction, analysis and detection, and report and response. It is important for feature selection to detect the intrusion efficiently after collecting the large set of data of Intrusion Detection System. In this paper, the feature selection method using Genetic Algorithm and Decision Tree is proposed. Also the method is verified by the simulation with KDD data.

  • PDF

Stratification related to Heat Flux in Deukryang Bay during Summer (여름철 득량만의 열속과 관련한 성층)

  • 최용규;홍성근
    • Journal of Environmental Science International
    • /
    • v.6 no.6
    • /
    • pp.579-588
    • /
    • 1997
  • In order to see the stratification related to the heat flux In Deukryang Bay, the oceanographic data on July 12, 1994 and the meteorological data of Kohung and Kwangju meteorological stations were analysed. The temperature durerences between the sea surface and the near bottom were 1~3 ton spring tide (July 12, 1994) In Deukryang Bay. The temperature anomalies were high about 3t during summer In 1994. These mean that the non mixing was not effective In destroying the stratification due to the sea surface heating by the solar radition, even though it was on spring tide. The maximum solar radiation was about 600 ly/day, which was the value of the same date of oceanographic observation. The sensible and the latent heat flux which are 0~100 ly/day were not so varied during summer. The absorbed heat flux through the sea surface was mostly lost by the back radiation. which ranges are about 0~-400 ly/day. The dimensionless mixing parameter related to the buoyancy flux was 5~150$\times$$10^{-5}$. The efficiency of tidal mixing to destroy the stratecation was 0.4~0.6%.

  • PDF

A Study on the Improvement of the Batch-means Method in Simulation Analysis (모의실험 분석중 구간평균기법의 개선을 위한 연구)

  • 천영수
    • Journal of the Korea Society for Simulation
    • /
    • v.5 no.2
    • /
    • pp.59-72
    • /
    • 1996
  • The purpose of this study is to make an improvement to the batch-means method, which is a procedure to construct a confidence interval(c.i.) for the steady-state process mean of a stationary simulation output process. In the batch-means method, the data in the output process are grouped into batches. The sequence of means of the data included in individual batches is called a batch-menas process and can be treated as an independently and identically distributed set of variables if each batch includes sufficiently large number of observations. The traditional batch-means method, therefore, uses a batch size as large as possible in order to. destroy the autocovariance remaining in the batch-means process. The c.i. prodedure developed and empirically tested in this study uses a small batch size which can be well fitted by a simple ARMA model, and then utilizes the dependence structure in the fitted model to correct for bias in the variance estimator of the sample mean.

  • PDF

Fault Diagnostics Algorithm of Rotating Machinery Using ART-Kohonen Neural Network

  • An, Jing-Long;Han, Tian;Yang, Bo-Suk;Jeon, Jae-Jin;Kim, Won-Cheol
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.12 no.10
    • /
    • pp.799-807
    • /
    • 2002
  • The vibration signal can give an indication of the condition of rotating machinery, highlighting potential faults such as unbalance, misalignment and bearing defects. The features in the vibration signal provide an important source of information for the faults diagnosis of rotating machinery. When additional training data become available after the initial training is completed, the conventional neural networks (NNs) must be retrained by applying total data including additional training data. This paper proposes the fault diagnostics algorithm using the ART-Kohonen network which does not destroy the initial training and can adapt additional training data that is suitable for the classification of machine condition. The results of the experiments confirm that the proposed algorithm performs better than other NNs as the self-organizing feature maps (SOFM) , learning vector quantization (LYQ) and radial basis function (RBF) NNs with respect to classification quality. The classification success rate for the ART-Kohonen network was 94 o/o and for the SOFM, LYQ and RBF network were 93 %, 93 % and 89 % respectively.

Compressing Method of NetCDF Files Based on Sparse Matrix (희소행렬 기반 NetCDF 파일의 압축 방법)

  • Choi, Gyuyeun;Heo, Daeyoung;Hwang, Suntae
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.11
    • /
    • pp.610-614
    • /
    • 2014
  • Like many types of scientific data, results from simulations of volcanic ash diffusion are of a clustered sparse matrix in the netCDF format. Since these data sets are large in size, they generate high storage and transmission costs. In this paper, we suggest a new method that reduces the size of the data of volcanic ash diffusion simulations by converting the multi-dimensional index to a single dimension and keeping only the starting point and length of the consecutive zeros. This method presents performance that is almost as good as that of ZIP format compression, but does not destroy the netCDF structure. The suggested method is expected to allow for storage space to be efficiently used by reducing both the data size and the network transmission time.

Integration of Business Process Modeling Methodologies: IDEF0, IDEF3, and Petri Net (비즈니스 프로세스 모델링 연계 방법론: IDEF0, IDEF3, Petri Net)

  • 임동순;김철한;우훈식;김중인
    • The Journal of Society for e-Business Studies
    • /
    • v.3 no.2
    • /
    • pp.141-160
    • /
    • 1998
  • In order to achieve a successful introduction of CALS, an enterprise model which is a concise description of what an enterprise does is required. The enterprise model mainly consists of a process model and a data model. The process model describes processes that create, change, combine, or destroy the entities within the enterprise. Several process modeling methodologies have been proposed. Each modeling methodology requires its own modeling view point, elements, and syntax. In developing a process model for CALS, these models created at different view points are required to analyze and design a system in a broad view. This paper aims at proposing an integration methodology for a process model. Specifically, IDEF0, IDEF3, and Petri Net are considered to be integrated. An IDEF0 model describing static functions of enterprise is transformed to an IDEF3 model describing behaviour of a system with additional information. Also, the IDEF3 model is transformed to a Petri Net model. These transformations will be automatically accomplished once the additional information for the transformation is provided.

  • PDF

RELIABLE OPERATION IN COMS GROUND CENTERS

  • Lim, Hyun-Su;Ahn, Sang-Il
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.496-499
    • /
    • 2007
  • The COMS ground segment will operate the geostationary satellite continuously 24h/7days and deliver processed data to end-users with respect to the predefined schedule without delay. For reliable operation, each COMS ground center has internally dual-configuration for critical systems but impossible to every components. Any unexpected failure or regular maintenance to the single configured antenna system may lead the interruption of COMS service and operation. The natural disaster or external attack can destroy one ground center and the operation will be stopped. Therefore COMS program implements backup system remotely located in other centers. Even considering foreign geostationary systems, it's the best solution guaranteeing consistent system operation against internal failure or external disaster.

  • PDF

A Study on the Social Workers' Attitude Toward Social Activism and Their Actual Behavior (사회복지사들의 사회행동에 대한 태도 및 행위 조사연구)

  • Lee, Tae-Young
    • Korean Journal of Social Welfare
    • /
    • v.49
    • /
    • pp.62-94
    • /
    • 2002
  • The purpose of this study is to understand the current state of social activist behavior of social workers, and to confirm the historic concern within social work that the continued striving to become more professionalized will decrease or destroy its commitment to social activism and to serve for the poor. Concerned with first question, this study, based on survey data, finds that social worker's activist orientation is not low, but their level of actual participation is not high, and they favor a consensus strategy rather than conflict one. In regard to the relationship between professionalization and social activism, it is found that professionalization variables are not a consistent predictor in explaining social workers' activist behavior. Rather social workers' socio-economic characteristics variables and the kinds of agency and client they are working for are found to be more important factors. So it cannot be said that professionalization is not compatible with social activism as far as this study is concerned.

  • PDF

A Case Study on the Conflict Between an Incumbent CEO and a Successor

  • Yunseok Lee;Giseob Yu;Namjae Cho
    • Journal of Information Technology Applications and Management
    • /
    • v.30 no.2
    • /
    • pp.31-44
    • /
    • 2023
  • Family businesses play a significant role in the overall economy of all countries, and the importance and weight of family businesses are increasing in various fields. Many factors are essential for a family business to grow into a long-lived business, that is, a sustainable business, but the most important one is succession. TRUST Lab at Hanyang University studied the importance of factors influencing the succession of the family business from the standpoint of the successor. As a result, it was confirmed that mutual trust is the most crucial factor, and conflict can destroy that trust. Therefore, in this study, we research conflict as a central topic for successful succession, which is the most fundamental reason for family businesses. This study was conducted as a qualitative research case study. By setting criteria suitable for the purpose of the study, we conducted interviews with ten successors who either worked or planned to work in a family-related company. Through this study, conflict management of key players is the most important to achieve a continuous succession of family businesses.

Research on SecureOS Module Based on File System for Data Protection (데이터 보호를 위한 파일시스템 기반의 SecureOS Module에 관한 연구)

  • Yonggu JANG;Inchul KIM;Jisong RYU
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.4
    • /
    • pp.67-79
    • /
    • 2023
  • Service environments through laptops, smart devices, and various IoT devices are developing very rapidly. Recent security measures in these Internet environments mainly consist of network application level solutions such as firewall(Intrusion Prevention Systems) and IDS (intrusion detection system). In addition, various security data have recently been used on-site, and issues regarding the management and destruction of such security data have been raised. Products such as DRM(Digital Rights Management) and DLP(Data Loss Prevention) are being used to manage these security data. However despite these security measures, data security measures taken out to be used in the field are operated to the extent that the data is encrypted, delivered, and stored in many environments, and measures for encryption key management or data destruction are insufficient. Based on these issues we aim to propose a SecureOS Module, an OS-based security module. With this module users can manage and operate security data through a consistent interface, addressing the problems mentioned above.