• Title/Summary/Keyword: 기술 프로세스

Search Result 2,700, Processing Time 0.029 seconds

Threat Diagnostic Checklists of Security Service in 5G Communication Network Virtualization Environment (5G 통신 네트워크 가상화 환경에서 보안 서비스의 위협 진단 체크리스트)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.10
    • /
    • pp.144-150
    • /
    • 2021
  • The purpose of this paper is to review the direction of the slicing security policy, which is a major consideration in the context of standardization in 5G communication network security, to derive security vulnerability diagnosis items, and to present about analyzing and presenting the issues of discussion for 5G communication network virtualization. As for the research method, the direction of virtualization security policy of 5G communication network of ENISA (European Union Agency for Cybersecurity), a European core security research institute, and research contents such as virtualization security policy and vulnerability analysis of 5G communication network from related journals were used for analysis. In the research result of this paper, the security structure in virtualization security of 5G communication network is arranged, and security threats and risk management factors are derived. In addition, vulnerability diagnosis items were derived for each security service in the risk management area. The contribution of this study is to summarize the security threat items in 5G communication network virtualization security that is still being discussed, to be able to gain insights of the direction of European 5G communication network cybersecurity, and to derive vulnerabilities diagnosis items to be considered for virtualization security of 5G communication network. In addition, the results of this study can be used as basic data to develop vulnerability diagnosis items for virtualization security of domestic 5G communication networks. In the future, it is necessary to study the detailed diagnosis process for the vulnerability diagnosis items of 5G communication network virtualization security.

Case Analysis and Applicability Review of Parametric Design in Landscape Architectural Design (조경 설계 분야에서 파라메트릭 디자인의 사례 분석과 활용 가능성)

  • Na, Sungjin
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.49 no.2
    • /
    • pp.1-16
    • /
    • 2021
  • The act of design in landscape architecture consists of a concept within a designer's mind, technical representations, and finally, a process of construction. In the 4th Industrial Revolution, the design process is facing many changes due to the rapid development of computer technology and the IT ecosystem. Computer technology was initially developed for simple functions, such as mathematical calculation and graphic representation. However, after the spread of Personal Computers, starting with IBM and Macintosh, programming languages and hardware rapidly developed, algorithms and applications became specialized, and the purpose of using computers became very diverse. This study diagnoses issues concerning the functions and roles that new design methods, such as computational design, parametric design, and algorithmic design, can play in landscape architecture based on changes in the digital society. The study focused on the design methodology using parametric technology, which has recently received the most attention. First, the basis for discussion was developed by examining the main concepts and characteristics of parametric design in modern landscape architecture. Prior research on the use of parametric design in landscape architecture was analyzed, as were the case studies conducted by landscape design firms. As a result, it was confirmed that parametric design has not been sufficiently discussed in terms of the number and diversity of studies compared to other techniques investigated by landscape design firms. Finally, based on the discussion, the study examined specific cases and future possibilities of the parametric design in landscape architecture.

Token-Based IoT Access Control Using Distributed Ledger (분산 원장을 이용한 토큰 기반 사물 인터넷 접근 제어 기술)

  • Park, Hwan;Kim, Mi-sun;Seo, Jae-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.377-391
    • /
    • 2019
  • Recently, system studies using tokens and block chains for authentication, access control, etc in IoT environment have been going on at home and abroad. However, existing token-based systems are not suitable for IoT environments in terms of security, reliability, and scalability because they have centralized characteristics. In addition, the system using the block chain has to overload the IoT device because it has to repeatedly perform the calculation of the hash et to hold the block chain and store all the blocks. In this paper, we intend to manage the access rights through tokens for proper access control in the IoT. In addition, we apply the Tangle to configure the P2P distributed ledger network environment to solve the problem of the centralized structure and to manage the token. The authentication process and the access right grant process are performed to issue a token and share a transaction for issuing the token so that all the nodes can verify the validity of the token. And we intent to reduce the access control process by reducing the repeated authentication process and the access authorization process by reusing the already issued token.

Flight Test Safety Risk Assessment and Mitigation (비행시험 안전 리스크 평가 및 완화 연구)

  • Kim, Mu-Geun;Yoo, Beong-Seon;Han, Jeongho;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.6
    • /
    • pp.537-544
    • /
    • 2018
  • A national comprehensive aviation test center is being constructed for the purpose of flight tests for development and modification of aircraft or flight inspections for the development of navaids. Flight testing is a high-risk task, so strict risk management processes are required prior to operation. In addition, since the flight test center is subject to the airdrome regulations under the current law, the introduction of the safety management system will enhance safety as usual in ordinary airports. The establishment of a safety management system based on ICAO criteria is an optimal means of ensuring safe and effective operation of the test center and may mitigate the risks that may arise during flight testing. This paper focuses on risk assessment and mitigation required for safety management at the flight test center. We conducted risk assessments on the flight hazards identified in the previous study. Then the high risk group of hazards were selected and risk mitigation techniques such as avoidance, reduction, acceptance, and control were applied.

A Study on the Element Technologies in Flame Arrester of End Line (선박의 엔드라인 폭연방지기의 요소기술에 관한 연구)

  • Pham, Minh-Ngoc;Choi, Min-Seon;Kim, Bu-Gi
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.4
    • /
    • pp.468-475
    • /
    • 2019
  • An end-line flame arrester allows free venting in combination with flame protection for vertical vent applications. End-line flame arresters are employed in various fields, especially in shipping. In flame arresters, springs are essential parts because the spring load and the spring's elasticity determine the hood opening moment. In addition, the spring has to work under a high-temperature condition because of the burning gas flame. Therefore, it is necessary to analyze the mechanical load and elasticity of the spring when the flame starts to appear. Based on simulations of the working process of a specific end-line flame arrester, a thermal and structural analysis of the spring is performed. A three-dimensional model of a burned spring is built using computational fluid dynamics (CFD) simulation. Results of the CFD analysis are input into a finite element method simulation to analyze the spring structure. The research team focused on three cases of spring loads: 43, 93, and 56 kg, correspondingly, at 150 mm of spring deflection. Consequently, the spring load was reduced by 10 kg after 5 min under a $1,000^{\circ}C$ heat condition. The simulation results can be used to predict and estimate the spring's load and elasticity at the burning time variation. Moreover, the obtained outcome can provide the industry with references to optimize the design of the spring as well as that of the flame arrester.

A Study on Site Evaluation Process for Thalassotherapy Complex (해양치유단지 조성을 위한 입지평가프로세스에 관한 연구)

  • Lee, Han-Seok;Doe, Guen-Young;Kang, Young-Hun
    • Journal of Navigation and Port Research
    • /
    • v.43 no.3
    • /
    • pp.219-230
    • /
    • 2019
  • The objective of this study is to suggest the evaluation method, the evaluation index and items, and evaluation criteria for rational and systematic evaluation of the thalassotherapy complex site. Evaluation items and indicators are determined based on overseas cases of thalassotherapy complex, the central governments' thalassotherapy business policy, and the local governments business plan. 3 major evaluation items, 8 middle evaluation items, 5 small evaluation items and 26 evaluation indexes are selected as evaluation items. The evaluation criterion for each evaluation index is then determined. As per the evaluation process, first, weights are assigned to the evaluation items by an evaluation committee composed of experts. Secondly, each committee member assigns a weight and a score to each evaluation indicator for evaluation score calculation. This score is then multiplied by the weight of the evaluation item to determine the final score for each evaluation index. The ultimate scores of all the evaluation indexes are then added to the evaluation score of each committee member. Lastly, the arithmetic mean of the evaluation scores of all committee members becomes the final evaluation result of a site.

Designing the Record Management Functions for Record Content Using Advantages of Cloud Storage (클라우드 저장소 장점을 활용한 기록 콘텐츠 관리기능 설계)

  • Yim, Jin-Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.3
    • /
    • pp.271-292
    • /
    • 2019
  • Recently, the central administrative agency changed its business management system to cloud-based On-nara 2.0. To transfer and manage the records of the cloud business management system, the National Archives Service has developed and distributed a cloud-based records management system. It serves as an opportunity to maximize the benefits of cloud computing and redesign the records management to be more effective and efficient. The process and method of electronic record management can be transformed through digital technologies. First, we can change the transfer method for electronic records. When the business and the records management systems share the same cloud storage, it is possible to transfer the content files between the two systems without moving the contents files physically, thus copying only the metadata and reducing the cost and the risk of integrity damage. Second, the strategy for allocating storage space for contents can be conceived. Assuming that the cloud storage is shared by the business and the record management systems, it is advantageous to distinguish the storage location based on the retention period of the content files. Third, systems that access content files, such as records creation, records management, and information disclosure systems, can share the cloud storage and minimize the duplication of content files.

Development of a Web-based User Experience Certification System based on User-centered System Design Approach (사용자 중심의 웹 기반 제품 사용경험 인증·평가 시스템 개발)

  • Na, Ju Yeoun;Kim, Jihee;Jung, Sungwook;Lee, Dong Hyun;Lee, Cheol;Bahn, Sangwoo
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.29-48
    • /
    • 2019
  • Recently, product design innovation to improve user experience has been perceived as a core element of enterprise competitiveness due to the fierce market competition and decrease of the technological gap between companies, but there is insufficient services to support the product experience evaluation of small and medium-sized companies (SMCs). The aim of this study is to develop a web-based product user experience evaluation and certification system supporting product design practices for SMCs. For system interface design, we conducted systematic functional requirement elicitation methods such as user survey, workflow analysis, user task definition, and function definition. Then main functions, information structure, navigation method, and detailed graphic user interfaces were developed with consideration of user interactions and requirements. In particular, it provides the databases for evaluation efficiency to support the evaluation process above a certain level of performance and efficiency, and knowledge databases to utilize in the evaluation and product design improvement. With help of the developed service platform, It is expected that the service platform would enhance SMCs' product development capability with regard to the user experience evaluation by connecting the consulting firms with SMCs.

Evaluation of Appraisal and Disposal Function of the Standard Records Management System (표준기록관리시스템 평가·폐기 기능 평가)

  • Lee, Bo-Ram
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.37-73
    • /
    • 2013
  • Legislative stability of the production and management of electronic records and the enhancement of infrastructure have reached significant levels through relentless efforts of academic and public institutions in the field. In addition, appraisal and disposal of records also have to be done by retention periods, business functions, administrational and historical values, and certain procedures. The law specifies that public institutions must assign record managers. The underlying reason is for record managers to arbitrate the review process when records are to be evaluated and discarded and to prevent unauthorized disuses. It is also for just evaluations with the professionalism. Evaluation and discard of records have significant meanings in record management. Thus, these processes need to be handled properly in the standard record management system. Evaluation should be proceeded by the law enacted under the task functional and social agreement. Since, the record discard is decided through the technical and logical process, the support for evaluation and discard works are important above all things. In this paper, I deducted functional requirements of standard record management system by analyzing methods including the analysis of legislation and standard related to electronic records and the examination of the user's manual of record management system. I researched through the interviews of the record managers in public institutions. Based on this research, I deducted the implications for the evaluation of standard record management system and the estimation of functional requirements for discard. I also discussed future directions of improvements and follow-up studies.

Multi-modal Image Processing for Improving Recognition Accuracy of Text Data in Images (이미지 내의 텍스트 데이터 인식 정확도 향상을 위한 멀티 모달 이미지 처리 프로세스)

  • Park, Jungeun;Joo, Gyeongdon;Kim, Chulyun
    • Database Research
    • /
    • v.34 no.3
    • /
    • pp.148-158
    • /
    • 2018
  • The optical character recognition (OCR) is a technique to extract and recognize texts from images. It is an important preprocessing step in data analysis since most actual text information is embedded in images. Many OCR engines have high recognition accuracy for images where texts are clearly separable from background, such as white background and black lettering. However, they have low recognition accuracy for images where texts are not easily separable from complex background. To improve this low accuracy problem with complex images, it is necessary to transform the input image to make texts more noticeable. In this paper, we propose a method to segment an input image into text lines to enable OCR engines to recognize each line more efficiently, and to determine the final output by comparing the recognition rates of CLAHE module and Two-step module which distinguish texts from background regions based on image processing techniques. Through thorough experiments comparing with well-known OCR engines, Tesseract and Abbyy, we show that our proposed method have the best recognition accuracy with complex background images.