• Title/Summary/Keyword: venture network

Search Result 239, Processing Time 0.027 seconds

The Pattern Search and Complete Elimination Method of Important Private Data in PC (PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.213-216
    • /
    • 2013
  • Big data, the use of privacy has been increasing to the development of wireless network infrastructure or technology development and wired Internet. By the way, Enforcement of private data preservation law the infringement accident which is still caused by despite with private data outflow occurs. The private data outflow avoids finance and to become the fire tube. Analyzes the pattern of private data from search of private data and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private data which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private data protection and it did the pattern extraction and a complete elimination experiment of private data.

  • PDF

The Research for cyber security experts (사이버보안 전문가 양성을 위한 연구)

  • Kim, Seul-gi;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.301-304
    • /
    • 2016
  • Cyber world constitute the infrastructure of the country and its people and control. Cyber attacks and leakage of personal information are being threatened damage to the national economy and national security. December 2014 had been cyber hacking attacks on Korea Hydro & Nuclear Power Nuclear cooling system design drawings of a spill, and Cheong Wa Dae website hacked, KBS stations occurred in cyber hacking accidents. As a result, ICT-based Protection Act, Promotion of Information and Communications Network Utilization and Information Act on Protection, etc., privacy laws are being enforced, personal information in the form of requirements from leading high-tech eoryeowoona is to prevent the attacks of armed hackers Internet information society It proposes positive measures to keep your personal information officer and laws.

  • PDF

Information Security Research for Smartwork System (Smartwork System을 위한 정보보호연구)

  • Cheon, Jae-Hong;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.323-325
    • /
    • 2016
  • Computing loud arrival times were, important data Clouding and, without being limited to the device, may process the information. Recently, work environment and improved access to Cloud and Mobile, this decision has been made to take effect immediately. However, when such important decisions of the government, the security is required. In this paper, we study the network access and control in IoT, Cloud, Bigdata, Smartwork System applied to Mobile. Study the authentication, authorization, and security for each security level Level of Service to connect to the DB information. Research of this paper will be used as the basis for the information processing and decision-making system design and construction of public institutions and agencies as important information for the protection Smartwork System.

  • PDF

Development of ResNet-based WBC Classification Algorithm Using Super-pixel Image Segmentation

  • Lee, Kyu-Man;Kang, Soon-Ah
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.4
    • /
    • pp.147-153
    • /
    • 2018
  • In this paper, we propose an efficient WBC 14-Diff classification which performs using the WBC-ResNet-152, a type of CNN model. The main point of view is to use Super-pixel for the segmentation of the image of WBC, and to use ResNet for the classification of WBC. A total of 136,164 blood image samples (224x224) were grouped for image segmentation, training, training verification, and final test performance analysis. Image segmentation using super-pixels have different number of images for each classes, so weighted average was applied and therefore image segmentation error was low at 7.23%. Using the training data-set for training 50 times, and using soft-max classifier, TPR average of 80.3% for the training set of 8,827 images was achieved. Based on this, using verification data-set of 21,437 images, 14-Diff classification TPR average of normal WBCs were at 93.4% and TPR average of abnormal WBCs were at 83.3%. The result and methodology of this research demonstrates the usefulness of artificial intelligence technology in the blood cell image classification field. WBC-ResNet-152 based morphology approach is shown to be meaningful and worthwhile method. And based on stored medical data, in-depth diagnosis and early detection of curable diseases is expected to improve the quality of treatment.

A Study of Communications Security by Using Key Generation and File Encryption (파일 암호화와 키 생성을 이용한 통신보안 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.316-319
    • /
    • 2010
  • File security is typically protected by encryption methods. The development of a network environment, such as the Internet according to the sharing of information between systems become commonplace, while providing convenience to users, individuals or organizations that facilitate access to sensitive information caused by hacking the system to attack the rapidly growing is a trend. This paper is the latest generation file system caused by the hacking attacks on the Sniffing for users using file encryption and key generation, Packet Sniffing Tool IP and data through the analysis are discussed. Through this study, the importance of protecting personal information by imprinting Proactive in the hacking incident, and what users will contribute to increase the level of security awareness.

  • PDF

IT SME Ventures' External Information Network Diversity and Productivity Improvement : The Mediating Role of the Production Period Reduction (IT 중소벤처기업의 외부 정보 네트워크의 다양성과 생산성 향상 : 생산 기간 단축의 매개적 역할)

  • Hau, Yong Sauk
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.1
    • /
    • pp.144-149
    • /
    • 2017
  • This study empirically analyzes the effect of IT SME ventures' external information network diversity on their production period reduction and productivity improvement generated from technology development. This research constructs a mediating model based on the open innovation perspective and tests it with the 138 samples of South Korean IT SME ventures based on the ordinary least squares regression. This research is expected to make a good contribution by shedding a new light on the following three points about the critical role of IT SME ventures' external information network diversity in increasing their production period reduction and productivity improvement generated from technology development which has scarcely been illuminated in the extant studies in the field of the management of technology for SMEs. First, IT SME ventures' external information network diversity positively influences their production period reduction. Second, the external information network diversity positively influences IT SMEs' ventures' productivity improvement. Third, IT SME ventures' production period reduction partially mediates the influence of IT SME ventures' external network diversity on their productivity improvement. These three fresh points are expected to provide useful theoretical and practical implications. Related to the theoretical implication, this research provides a fresh implication that IT SME ventures' external information network diversity positively influences not only their production period reduction but also productivity improvement generated from technology development. Concerning the practical implication, this study suggests that the CEOs in IT SME ventures make strategic efforts to use more diverse external information sources in order to increase their production period reduction and productivity improvement generated from technology development.

Development of Security Metric of Network Access Control (네트워크 접근제어 시스템의 보안성 메트릭 개발)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.219-227
    • /
    • 2017
  • Network access control should be able to effectively block security threats to the IT infrastructure, such as unauthorized access of unauthorized users and terminals, and illegal access of employees to internal servers. From this perspective, it is necessary to build metrics based on relevant standards to ensure that security is being met. Therefore, it is necessary to organize the method for security evaluation of NAC according to the related standards. Therefore, this study builds a model that combines the security evaluation part of ISO / IEC 15408 (CC: Common Criteria) and ISO 25000 series to develop security metric of network access control system. For this purpose, we analyzed the quality requirements of the network access control system and developed the convergence evaluation metric for security of the two international standards. It can be applied to standardization of evaluation method for network access control system in the future by constructing evaluation model of security quality level of network access control system.

On the Consideration of Logistics Network Establishment and Priority Evaluation between Korea and China Using AHP method (AHP법을 이용한 한중간 물류네트워크 구축에 따른 우선과제 평가에 관한 연구)

  • Yeo, Gi-Tae;Park, Chang-Ho;Seo, Su-Wan
    • Journal of Korea Port Economic Association
    • /
    • v.20 no.2
    • /
    • pp.169-185
    • /
    • 2004
  • It is an urgent problem that Korea logistics enteprises' expansion of advance into China market and the logistics network establishment between Korea and China to back up the former are to be solved. Accordingly, the purpose of this study is to deduce the subjects to establish the logistics network between Korea and China, and to evaluate the priority order. The results of this research are as follows: First, we conducted face-to-face interviews on the advisery group in China and Korean enterprises which advanced into China, and drew out 6 promoting subjects to build the logistics network between the two. Second, the AHP model was adopted, which is a multi-criteria?multi-hierarchical decision making method, to draw out the weight and priority order of the deduced 6 promoting items. Third, the resultant priority order of the promoting subjects is as follows: No.1 - to establish the distribution & logistics support center by region(0.3900); No.2 - to support various taxes in investing the logistics business abroad(0.1980) ; No.3 - to improve the management of CIQ(0.1958); No.4 - to back up the joint-venture of logistics firms(0.1169); No.5 - to enhance trade and foreign policies to deregulate the entry into logistics markets(0.0536); No.6 - to construct the logistics information system of China(Northest Ssia)(0.0458). This paper resulted in finding out Korea logistics enterprises that have not secured their own inland-transport network in China and the actual difficulties of Korean enterprises with using the inferior network that advanced into China. These problems were developed into the analysis adopting the AHP method, and the significancy of this paper is to present the priority order of promoting problems using a sophisticated technique.

  • PDF

Efficiency Evaluation Convergence Model of Virtual Private Network based on CC and ISO Standard (CC와 ISO 표준을 기반으로 한 가상사설망의 효율성 평가 융합 모델)

  • Lee, Ha-Young;Kim, Jung-Gyu
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.169-176
    • /
    • 2015
  • Virtual Private Network is a method which can use as a private network using private line. The quality of security of virtual private network is influenced by security auditability, cryptographic support, user data protection, access control, etc., and efficiency is influenced by throughput, latency, the number of cession, etc. In this paper, we constructed a evaluation model based on CC(ISO/IEC 15408) and the quality evaluation standard ISO/IEC 25000 series to evaluate the quality level about efficiency with security performance of virtual private network. We think that this study will contribute to construct the system which can evaluate the quality of virtual private network based on CC and ISO quality evaluation standard.

A Study on the Effects of Adoption and Application of Platform Strategy for Social Ventures in Early Stage of Start-up: A Case Study of JUMP! (소셜벤처 창업초기에 플랫폼 전략의 도입과 영향에 관한 연구: 점프!의 사례를 중심으로)

  • Park, Jaehong;Hwang, Kumju
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.4
    • /
    • pp.133-144
    • /
    • 2017
  • For a social venture in early stage, it is very difficult to set up a strategy as it has to pursue two contradictory goals; economic value and social value. The platform strategy can be good alternative solution for social ventures as it seeks building-up connections with other businesses to co-create value despite of limited resources. A Korean social venture, JUMP! which adopted platform strategy in the early stage, and successfully applied 4 key factors of platform strategy; core competency, value creation ability, efficiency and network effect, has been able to develop sustainable growth for itself and induce innovation and growth among the participants within the platform. This study was intended to research effect of adoption and successful application of platform strategy for social ventures in the early stage of start-up and draw conclusion through case study that platform strategy works for sustainable growth of social ventures.

  • PDF