• 제목/요약/키워드: destroy data

검색결과 45건 처리시간 0.024초

침입탐지시스템에서의 특징 선택에 대한 연구 (A Study for Feature Selection in the Intrusion Detection System)

  • 한명묵
    • 융합보안논문지
    • /
    • 제6권3호
    • /
    • pp.87-95
    • /
    • 2006
  • 침입은 컴퓨터 자원의 무결성, 기밀성, 유효성을 저해하고 컴퓨터 시스템의 보안정책을 파괴하는 일련의 행위의 집합이다. 이러한 침입을 탐지하는 침입탐지시스템은 데이터 수집, 데이터의 가공 및 축약, 침입 분석 및 탐지 그리고 보고 및 대응의 4 단계로 구성되어진다. 침입탐지시스템의 방대한 데이터가 수집된 후, 침입을 효율적으로 탐지하기 위해서는 특징 선택이 중요하다. 이 논문에서 유전자 알고리즘과 결정트리를 활용한 특징 선택 방법을 제안한다. 또한 KDD 데이터에서 실험을 통해 방법의 유효성을 검증한다.

  • PDF

여름철 득량만의 열속과 관련한 성층 (Stratification related to Heat Flux in Deukryang Bay during Summer)

  • 최용규;홍성근
    • 한국환경과학회지
    • /
    • 제6권6호
    • /
    • pp.579-588
    • /
    • 1997
  • In order to see the stratification related to the heat flux In Deukryang Bay, the oceanographic data on July 12, 1994 and the meteorological data of Kohung and Kwangju meteorological stations were analysed. The temperature durerences between the sea surface and the near bottom were 1~3 ton spring tide (July 12, 1994) In Deukryang Bay. The temperature anomalies were high about 3t during summer In 1994. These mean that the non mixing was not effective In destroying the stratification due to the sea surface heating by the solar radition, even though it was on spring tide. The maximum solar radiation was about 600 ly/day, which was the value of the same date of oceanographic observation. The sensible and the latent heat flux which are 0~100 ly/day were not so varied during summer. The absorbed heat flux through the sea surface was mostly lost by the back radiation. which ranges are about 0~-400 ly/day. The dimensionless mixing parameter related to the buoyancy flux was 5~150$\times$$10^{-5}$. The efficiency of tidal mixing to destroy the stratecation was 0.4~0.6%.

  • PDF

모의실험 분석중 구간평균기법의 개선을 위한 연구 (A Study on the Improvement of the Batch-means Method in Simulation Analysis)

  • 천영수
    • 한국시뮬레이션학회논문지
    • /
    • 제5권2호
    • /
    • pp.59-72
    • /
    • 1996
  • The purpose of this study is to make an improvement to the batch-means method, which is a procedure to construct a confidence interval(c.i.) for the steady-state process mean of a stationary simulation output process. In the batch-means method, the data in the output process are grouped into batches. The sequence of means of the data included in individual batches is called a batch-menas process and can be treated as an independently and identically distributed set of variables if each batch includes sufficiently large number of observations. The traditional batch-means method, therefore, uses a batch size as large as possible in order to. destroy the autocovariance remaining in the batch-means process. The c.i. prodedure developed and empirically tested in this study uses a small batch size which can be well fitted by a simple ARMA model, and then utilizes the dependence structure in the fitted model to correct for bias in the variance estimator of the sample mean.

  • PDF

Fault Diagnostics Algorithm of Rotating Machinery Using ART-Kohonen Neural Network

  • 안경룡;한천;양보석;전재진;김원철
    • 한국소음진동공학회논문집
    • /
    • 제12권10호
    • /
    • pp.799-807
    • /
    • 2002
  • The vibration signal can give an indication of the condition of rotating machinery, highlighting potential faults such as unbalance, misalignment and bearing defects. The features in the vibration signal provide an important source of information for the faults diagnosis of rotating machinery. When additional training data become available after the initial training is completed, the conventional neural networks (NNs) must be retrained by applying total data including additional training data. This paper proposes the fault diagnostics algorithm using the ART-Kohonen network which does not destroy the initial training and can adapt additional training data that is suitable for the classification of machine condition. The results of the experiments confirm that the proposed algorithm performs better than other NNs as the self-organizing feature maps (SOFM) , learning vector quantization (LYQ) and radial basis function (RBF) NNs with respect to classification quality. The classification success rate for the ART-Kohonen network was 94 o/o and for the SOFM, LYQ and RBF network were 93 %, 93 % and 89 % respectively.

희소행렬 기반 NetCDF 파일의 압축 방법 (Compressing Method of NetCDF Files Based on Sparse Matrix)

  • 최규연;허대영;황선태
    • 정보과학회 컴퓨팅의 실제 논문지
    • /
    • 제20권11호
    • /
    • pp.610-614
    • /
    • 2014
  • 많은 과학 데이타처럼 화산재 확산 시뮬레이션 결과는 NetCDF 형식의 군집화된 희소행렬이다. 그리고 크기가 커서 저장과 전송에 많은 비용이 발생한다. 본 논문에서는 다차원 인덱스를 일차원으로 바꾸고 연속된 0을 그 시작점과 길이만을 기록하여 화산재 확산 시뮬레이션 데이터의 크기를 줄이는 방법을 제안한다. 이 방법은 기존의 ZIP 형식으로 압축한 것과 거의 같은 성능을 보이나 NetCDF의 구조는 손상하지 않는다. 제안된 방법에 의하면 데이터 크기가 줄어들어 저장공간의 효율이 높아지고 네트워크 전송시간이 줄어드는 효과를 기대할 수 있을 것이라 사료된다.

비즈니스 프로세스 모델링 연계 방법론: IDEF0, IDEF3, Petri Net (Integration of Business Process Modeling Methodologies: IDEF0, IDEF3, and Petri Net)

  • 임동순;김철한;우훈식;김중인
    • 한국전자거래학회지
    • /
    • 제3권2호
    • /
    • pp.141-160
    • /
    • 1998
  • In order to achieve a successful introduction of CALS, an enterprise model which is a concise description of what an enterprise does is required. The enterprise model mainly consists of a process model and a data model. The process model describes processes that create, change, combine, or destroy the entities within the enterprise. Several process modeling methodologies have been proposed. Each modeling methodology requires its own modeling view point, elements, and syntax. In developing a process model for CALS, these models created at different view points are required to analyze and design a system in a broad view. This paper aims at proposing an integration methodology for a process model. Specifically, IDEF0, IDEF3, and Petri Net are considered to be integrated. An IDEF0 model describing static functions of enterprise is transformed to an IDEF3 model describing behaviour of a system with additional information. Also, the IDEF3 model is transformed to a Petri Net model. These transformations will be automatically accomplished once the additional information for the transformation is provided.

  • PDF

RELIABLE OPERATION IN COMS GROUND CENTERS

  • Lim, Hyun-Su;Ahn, Sang-Il
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2007년도 Proceedings of ISRS 2007
    • /
    • pp.496-499
    • /
    • 2007
  • The COMS ground segment will operate the geostationary satellite continuously 24h/7days and deliver processed data to end-users with respect to the predefined schedule without delay. For reliable operation, each COMS ground center has internally dual-configuration for critical systems but impossible to every components. Any unexpected failure or regular maintenance to the single configured antenna system may lead the interruption of COMS service and operation. The natural disaster or external attack can destroy one ground center and the operation will be stopped. Therefore COMS program implements backup system remotely located in other centers. Even considering foreign geostationary systems, it's the best solution guaranteeing consistent system operation against internal failure or external disaster.

  • PDF

사회복지사들의 사회행동에 대한 태도 및 행위 조사연구 (A Study on the Social Workers' Attitude Toward Social Activism and Their Actual Behavior)

  • 이태영
    • 한국사회복지학
    • /
    • 제49권
    • /
    • pp.62-94
    • /
    • 2002
  • The purpose of this study is to understand the current state of social activist behavior of social workers, and to confirm the historic concern within social work that the continued striving to become more professionalized will decrease or destroy its commitment to social activism and to serve for the poor. Concerned with first question, this study, based on survey data, finds that social worker's activist orientation is not low, but their level of actual participation is not high, and they favor a consensus strategy rather than conflict one. In regard to the relationship between professionalization and social activism, it is found that professionalization variables are not a consistent predictor in explaining social workers' activist behavior. Rather social workers' socio-economic characteristics variables and the kinds of agency and client they are working for are found to be more important factors. So it cannot be said that professionalization is not compatible with social activism as far as this study is concerned.

  • PDF

A Case Study on the Conflict Between an Incumbent CEO and a Successor

  • Yunseok Lee;Giseob Yu;Namjae Cho
    • Journal of Information Technology Applications and Management
    • /
    • 제30권2호
    • /
    • pp.31-44
    • /
    • 2023
  • Family businesses play a significant role in the overall economy of all countries, and the importance and weight of family businesses are increasing in various fields. Many factors are essential for a family business to grow into a long-lived business, that is, a sustainable business, but the most important one is succession. TRUST Lab at Hanyang University studied the importance of factors influencing the succession of the family business from the standpoint of the successor. As a result, it was confirmed that mutual trust is the most crucial factor, and conflict can destroy that trust. Therefore, in this study, we research conflict as a central topic for successful succession, which is the most fundamental reason for family businesses. This study was conducted as a qualitative research case study. By setting criteria suitable for the purpose of the study, we conducted interviews with ten successors who either worked or planned to work in a family-related company. Through this study, conflict management of key players is the most important to achieve a continuous succession of family businesses.

데이터 보호를 위한 파일시스템 기반의 SecureOS Module에 관한 연구 (Research on SecureOS Module Based on File System for Data Protection)

  • 장용구;김인철;류지송
    • 한국지리정보학회지
    • /
    • 제26권4호
    • /
    • pp.67-79
    • /
    • 2023
  • 노트북, 스마트 기기 및 다양한 IoT 장비를 통한 서비스 환경은 매우 빠르게 발달하고 있다. 이러한 인터넷 환경에서 최근의 보안 대책은 주로 네트워크 응용 수준의 보안 대책인 방화벽(침입 차단 시스템-Firewall)과 IDS(침입 탐지 시스템-Intrusion Detection System)으로 이루어지고 있다. 또한, 최근에는 다양한 보안 데이터의 현장 활용이 이루어지고 있고 이런 보안 데이터의 관리와 파기에 대한 이슈 소요가 제기되고 있다. 이러한 보안 데이터의 관리를 위해 문서보안(DRM:Digital Rights Management)이나 데이터 손실 방지 솔루션(DLP:Data Loss Prevention)과 같은 제품이 사용되고 있다. 그러나 이런 보안 대책에도 사용성 문제로 인해 현장에서 사용하기 위해 반출된 데이터 보안 대책은 대부분 환경에서 해당 데이터를 암호화하여 전달하고 저장하는 정도로 운영되고 있으며, 암호키 관리나 데이터의 파기에 관한 대책이 미흡한 것이 현실이다. 이러한 문제점을 기반하여 OS 기반의 보안 모듈을 제공함으로써 사용자는 동일한 인터페이스로 보안 데이터를 관리 운영할 수 있는 SecureOS Module을 제시하고자 한다.