• Title/Summary/Keyword: requirement model

Search Result 1,438, Processing Time 0.03 seconds

Quantitative Cyber Security Scoring System Based on Risk Assessment Model (위험 평가 모델 기반의 정량적 사이버 보안 평가 체계)

  • Kim, Inkyung;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1179-1189
    • /
    • 2019
  • Cyber security evaluation is a series of processes that estimate the level of risk of assets and systems through asset analysis, threat analysis and vulnerability analysis and apply appropriate security measures. In order to prepare for increasing cyber attacks, systematic cyber security evaluation is required. Various indicators for measuring cyber security level such as CWSS and CVSS have been developed, but the quantitative method to apply appropriate security measures according to the risk priority through the standardized security evaluation result is insufficient. It is needed that an Scoring system taking into consideration the characteristics of the target assets, the applied environment, and the impact on the assets. In this paper, we propose a quantitative risk assessment model based on the analysis of existing cyber security scoring system and a method for quantification of assessment factors to apply to the established model. The level of qualitative attribute elements required for cyber security evaluation is expressed as a value through security requirement weight by AHP, threat influence, and vulnerability element applying probability. It is expected that the standardized cyber security evaluation system will be established by supplementing the limitations of the quantitative method of applying the statistical data through the proposed method.

A Study on the Design of Data Model for Route Information based on S-100 (S-100 기반의 항로정보 데이터 모델 설계에 관한 연구)

  • PARK, Byung-Moon;KIM, Jae-Myeong;CHOI, Yun-Soo;OH, Se-Woong;JUNG, Min
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.2
    • /
    • pp.50-64
    • /
    • 2019
  • According to the Maritime Safety Act, there are all 34 routes including 5 traffic safety zones, 3 traffic separation schemes, 26 routes designated by regional maritime affairs departments in the Republic of Korea. In the SOLAS convention, the route information should be is effectively used for the safe navigation. However, the route information is complicatedly composed of the location of the route, the navigation rule by each route, the restriction of the navigation, and the anchorages. Moreover, the present method of providing information using the navigational chart and other publications is not effective for users to grasp the navigational information. Therefore, it was conducted to study the design of the S-100 based routing information data model developed by the International Hydrographic Organization to find ways to more effectively provide route information. To do this, the analysis of route requirement, selection of items, encoding test and users' review were carried out. Through expert user review, it was evaluated that the study on the design of the route information data model can be utilized as a good basic data for the route information integration service. Future research on the development of route information data models is expected to provide integrated route information services.

Development of Evaluation Indicators for Job Capability Strengthening Program for Vocational High School with application of CIPP Evaluation Model (CIPP 평가모형을 적용한 특성화고 취업역량강화 프로그램 평가지표 개발)

  • Shin, Yeon-Ju;Kim, Sun-Tae;Song, Hae-Deok
    • Journal of vocational education research
    • /
    • v.37 no.3
    • /
    • pp.1-23
    • /
    • 2018
  • The purpose of this study was to develop evaluation indicators which can help decision making in the quality control and improvement of the job capability strengthening program for the vocational high school depending on the situation, input, process and output of CIPP evaluation model. For this purpose, through the literature review and the research of expert opinions, the evaluation indicators for the job capability strengthening program in the vocational high school was designed. In addition, the Delphi research was conducted to 15 teachers in charge of job searching in specialized high schools and education related experts to validate it. The CVR value which indicates the value of validity was analyzed through the findings of the collected Delphi questionnaires and the degree of opinion consistency was analyzed through the degrees of agreement and convergence. Through the correction and complementation, the final evaluation criteria and evaluation indicators was decided. The evaluation criteria developed from the findings include 7 references such as requirement analysis, objective setting, implementation plan, implementation contents, program activities, program control & evaluation and program performance. Each Criteria has 41 evaluation indicators. It is expected that the finally decided evaluation indicators would be used by the people concerned with the job capability strengthening program at the vocational high schools and contribute to the quality improvement of the job capability strengthening program at the vocational high schools as well as its future directions.

An Analysis on the Preference and Use-Demand Forecasting of Bus Information (버스정보의 선호도 및 이용수요 예측에 관한 연구)

  • Lee, Won Gyu;Jung, Hun Young
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.6D
    • /
    • pp.791-799
    • /
    • 2008
  • To build the system which has high utilization and usefulness for users, it is necessary to know the information type and use-demand that the use want. The purpose of this study is to forecast the preference and demand of utilization for bus information when bus information is offered through cellular phon. The accomplishments of this research are as follow : Firstly, importance on the level of individual factor and the value of change's figure can be evaluated, using preference analysis on bus information by conjoint analysis. Secondly, by establishing the use-demand model bus information using binary logit model, influence factor on whether or not the use of the user. Finally, ordered probit model was built by use behavior model in payment per call or per month of potential user of bus information. Through call times and sensitive analysis by payment methods, elasticity point, optimal payment fee, and use probability was analyzed. This study make application as basic to efficient bus information policy and to improve use rate of bus information in future because this study make it possible to get preference analysis, use-demand analysis and estimation of optimal payment fee which is reflecting various requirement in use of bus information user.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

A Generalized Adaptive Deep Latent Factor Recommendation Model (일반화 적응 심층 잠재요인 추천모형)

  • Kim, Jeongha;Lee, Jipyeong;Jang, Seonghyun;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.249-263
    • /
    • 2023
  • Collaborative Filtering, a representative recommendation system methodology, consists of two approaches: neighbor methods and latent factor models. Among these, the latent factor model using matrix factorization decomposes the user-item interaction matrix into two lower-dimensional rectangular matrices, predicting the item's rating through the product of these matrices. Due to the factor vectors inferred from rating patterns capturing user and item characteristics, this method is superior in scalability, accuracy, and flexibility compared to neighbor-based methods. However, it has a fundamental drawback: the need to reflect the diversity of preferences of different individuals for items with no ratings. This limitation leads to repetitive and inaccurate recommendations. The Adaptive Deep Latent Factor Model (ADLFM) was developed to address this issue. This model adaptively learns the preferences for each item by using the item description, which provides a detailed summary and explanation of the item. ADLFM takes in item description as input, calculates latent vectors of the user and item, and presents a method that can reflect personal diversity using an attention score. However, due to the requirement of a dataset that includes item descriptions, the domain that can apply ADLFM is limited, resulting in generalization limitations. This study proposes a Generalized Adaptive Deep Latent Factor Recommendation Model, G-ADLFRM, to improve the limitations of ADLFM. Firstly, we use item ID, commonly used in recommendation systems, as input instead of the item description. Additionally, we apply improved deep learning model structures such as Self-Attention, Multi-head Attention, and Multi-Conv1D. We conducted experiments on various datasets with input and model structure changes. The results showed that when only the input was changed, MAE increased slightly compared to ADLFM due to accompanying information loss, resulting in decreased recommendation performance. However, the average learning speed per epoch significantly improved as the amount of information to be processed decreased. When both the input and the model structure were changed, the best-performing Multi-Conv1d structure showed similar performance to ADLFM, sufficiently counteracting the information loss caused by the input change. We conclude that G-ADLFRM is a new, lightweight, and generalizable model that maintains the performance of the existing ADLFM while enabling fast learning and inference.

A COMPARATIVE STUDY ON RADIOPACITY OF CANAL FILLING AND RETROGRADE ROOT-END FILLING MATERIALS (근관 충전재 및 치근단 역충전재의 방사선 불투과성에 관한 비교 연구)

  • Kim, Yong-Sang;Kim, Seo-Kyong;Hwang, Yun-Chan;Hwang, In-Nam;Oh, Won-Mann
    • Restorative Dentistry and Endodontics
    • /
    • v.33 no.2
    • /
    • pp.107-114
    • /
    • 2008
  • This study was performed to assess the radiopacity of a variety of canal filling and retrograde root-end filling materials according to the specification concerning root canal obturation materials. Ten materials including Gutta-percha pellets, amalgam, Fuji II LC, $Dyract^{(R)}$ AP, Super $EBA^{(R)}$, $IRM^{(R)}$, AH $26^{(R)}$, $Sealapex^{TM}$, Tubli-$Seal^{TM}$, and dentin were evaluated in this study. In the first part, densitometric reading of an each step of aluminum step wedge on occlusal film were performed at 60 kVp (0.2, 0.3, 0.4 s), 70 kVp (0.2, 0.3, 0.33 s) to decide appropriate voltage and exposure time. In the second part, ten specimens which are 5 mm in diameter and 0.5, 1.0, 1.5, 2.0, 2.5, 3.0 mm in thickness, were fabricated from each material studied. The specimens were radiographed simultaneously with an aluminum step wedge under decided condition (60 kVp, 0.2 s). The mean radiographic density values of the materials were transformed into radiopacity expressed equivalent thickness of aluminum (mm Al). The following results were obtained. 1. Among the various conditions including 0.2 s, 0.3 s, 0.4 s at 60 kVp and 0.2 s, 0.3 s, 0.33 s at 70 kVp, the appropriate voltage and exposure time that meet the requirement of density from 0.5 to 2.0 was 0.2 s at 60 kVp. 2. All of the materials in this study had greater radiopacity than the minimun level recommended by ISO No. 4049 standards. 3. Most of the materials had greater radiopacity than 3 mm Al requirement of ANSI/ADA specification No. 57 (2000) and ISO No. 6876 (2001) standards except for Fuji II LC and Dyract. It suggests that all experimental canal filling and retrograde root-end filling materials have a sufficient radiopacity that meet the requirement concerning root canal obturation materials except for Fuji II LC and Dyract.

Context and Input Evaluation of the 7th Technology.Home Economics Curriculum in the Middle Schools focusing on Home Economics (제7차 중학교 기술.가정 교육과정 상황과 투입 평가 -가정영역을 중심으로-)

  • Kwon Ji-Young;Chae Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.18 no.3 s.41
    • /
    • pp.61-79
    • /
    • 2006
  • The purpose of this research was to evaluate concretely how the 7th Technology Home Economics(HE) curriculum was operated In school fields by using context evaluation, input evaluation using the CIPP model focusing HE. In this research. a questionnaire survey was done targeting HE teachers in charge of technology and home economics subject for the 7th curriculum implementation at 250 randomly selected middle schools in Gpoungsangnamdo, and 109 returned questionnaire papers were used for the final analysis. The frequency, percent, mean and standard deviation of these data were obtained by using the SPSS 10.0 for Windows Program. The results of this research were outlined below: First, with a regard to the context evaluation (evaluating educational contexts), the requirement degree of seeking for career appeared to be the highest at the requirement survey of the education goal and character of HE area, and the requirement degree of elevating understanding home living' were very low. Interest and concern of students towards these subject as well as the self-confidence of HE teachers in charge were low. Second, as for the input evaluation (evaluating education plans), time allocation, content level, and content amount were not regarded to be not proper, and the composition of HE educational curriculums and the class guideline of teachers also were not so faithful from the aspect of school level. Among surveyed items, establishing plans in school level towards evaluation was relatively sincere, but discussions about curriculums were not so faithful, suggesting various kinds of content are not fully discussed. As shown by the results above, it is difficult to say that the operation of the 7th HE educational curriculums has secured its position perfectly. It is necessary to examine systematically the educational goals. character of the 7th HE educational curriculum and the appropriateness of curriculum content, and to seek various methods to elevate the self confidence of teachers and the interests of students. Because how to operate national level educational curriculums in school levels with self-regulation and elasticity will be an important variable in realizing educational goals, teachers, the main body of educational curriculums and direct performers, should establish and perform educational plans in school levels to elevated the satisfaction of teachers and educational effects for normally operating educational curriculums. In addition, educational curriculums should be operated and evaluated mainly by teachers at school fields to make it possible to confirm and check the achievement of the goals of educational curriculums qualitatively.

  • PDF

A Study on the Establishment of Course evaluation model in the Cadastral Field (지적분야 과정평가모형 구축에 관한 연구)

  • Seo, Yong-Su;Choi, Seung-Young
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.297-312
    • /
    • 2016
  • The current government strives to train those supposed to drive the national economy, and bridge the gap between qualification and industrial sites through competency-based qualification systems, not the educational background. In this regards, the government is planning to adopt the course evaluation qualification system. The course evaluation qualification system, on a basis of the NCS, is a system to qualify certain people completing the education and training fulling a specific requirement for a national technical qualification in case they meet the internally and externally assessed criteria. This can be seen as an attempt to practically link between job training and qualifications. The NCS model and learning module in the cadastral field are already utilized as the training and eduction in the specialized school and colleges. However, the current national technical qualification system is considered as a main system because the course evaluation qualification system has not been introduced yet. This study analyzed the process of the course evaluation qualification system, and conducted a survey to solicit feedback on introduction of course evaluation qualification system, Besides, the NCS evaluation model is presented in order for the introduction of course evaluation qualification system in the cadastral fields.

Assessment of Composite Material Flaws on the Type III Cylinders for Compressed Natural Gas Vehicles (압축천연가스자동차용 Type III 용기의 복합재 결함 평가)

  • Kim, Young-Seob;Kim, Lae-Hyun;Yang, Dong-Ju
    • Journal of Energy Engineering
    • /
    • v.20 no.2
    • /
    • pp.90-95
    • /
    • 2011
  • This study was conducted to judge requalification of cylinders by assessing composite flaws such as scratches, cuts, and gouges damaging on the composite of Type III cylinders for compressed natural gas vehicles. As a result of the flaw tolerance test, all specimens have satisfied with minimum requirement cycles according to damage levels based on ISO 19078 and cyclic performance for pressure showed beyond twenty thousands in damage level 1 and 2, and did eighteen thousands to twenty-one thousands in damage level 3. Eight of twelve specimens failed the test due to composite flaws and the rest of the cylinders failed regardless of flaws. The results of Finite Element Method followed by the computer simulation indicated that the stress of 79.5 MPa calculated on the flaw model of $1.25\;mm{\times}200\;mm$ and the stress of 66.6 MPa on the non-flaw model when the service pressure applied to inside of cylinder. The difference between the models is about 19.37%. We concluded that this difference influences fatigue life and this flaw model is a critical value affecting cyclic performance of cylinders.