• Title/Summary/Keyword: 등록관리시스템

Search Result 574, Processing Time 0.024 seconds

Design and Prototype Implementation of Geo-browser Linked to Open Source-based DBMS and Middleware (공개소스 DBMS 미들웨어 연동 공간정보 브라우저 설계 및 프로토타입 구현)

  • Park, Yong-Jae;Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.26 no.2
    • /
    • pp.99-108
    • /
    • 2010
  • According to the recent trend on advancement of web computing technologies and diversification of spatial data types to be processed, designing and implementing of web-based applications using open sources has been regarded as one of important users-needs. In this study, a kind of geo-browser model composed of client-middleware-DBMS stack is suggested, and the prototype implementation are performed. Especially, modularization of user interfaces is contributed to increase both applicability for a certain target system and accessibility for web users. In middleware, it has functions to decrease erroneous factors on spatial data registration processes, and provides spatial data the form of OGC WxS standards. It is thought that this system is helpful to utilize as basic architecture and the related implementation model for web-based geo-spatial services and their applications.

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

Assessment of Hwapo riverine wetland function using Hydrogeomorphic Approach (HGM을 이용한 화포천 습지의 기능평가)

  • Yin, Shanhua;Kim, Duck Gil;Kim, Hung Soo;Kwak, Jae Won
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.30 no.1B
    • /
    • pp.53-60
    • /
    • 2010
  • A wetland is an ecosystem which has high species diversity, rich nutritional substances and high productivity. In this study we used the HGM(Hydrogeomorphic) approach among various evaluation models for the assessment of the Hwapo riverine wetland function. HGM is a method which estimates the functional index of a study wetland by comparing it with a reference wetland. In this study the Woopo wetland which is registered in the Ramsar Convention was selected as a reference wetland to assess the functional index of the Hwapo wetland. As the results, we obtained the functional index values over 0.6 for most indices of the Hwapo riverine wetland. Therefore we found that the Hwapo riverine wetland shows relatively high functional index values comparing with the Woopo wetland and it has valuable hydrological, biochemical, plant habitat, and animal habitat functions.

Pseudonym Management in Autonomous Driving Environment (자율주행환경에서 가명성 관리)

  • Hong, Jin Keun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.29-35
    • /
    • 2017
  • In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.

A Study on the Improvement of University Institutional Repositories (dCollection) based on its Current State (대학 기관 리포지토리의 운영 현황 분석 및 개선 방안에 관한 연구 - dCollection을 중심으로 -)

  • Kim, Hyun-Hee;Joung, Kyoung-Hee;Kim, Yong-Ho
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.4 s.62
    • /
    • pp.17-39
    • /
    • 2006
  • Building institutional repositories is known as one of powerful methods for realizing the open access movement. The Korean Education and Research Information Service(KERIS) proposed to organize institutional repositories into a consortium, called 'dCollection (Digital Collection),' composed of 62 universities since 2003. The purpose of this study is to investigate the current state of 40 member universities of dCollection using the evaluation model including 4 categories and 39 indicators , and, based on the survey outcomes, to pinpoint the procedural or performance weak points of the dCollection systems in order to find its customized solutions focusing on the improvement of use and self-archiving rates.

A Study on Job creation Using PMP in ISE development process (산업보안관리사 개발과정에서 PMP를 활용한 단계별 창직 연구)

  • Yim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.79-86
    • /
    • 2019
  • In a small sense Job creation is the making of certificate and In the big sense the government will create new industries and create jobs accordingly. therefore We used the most similar ISE as an example and linked it with the PMP of PMBOK. And I tried to standardize this process by deriving the detailed knowledge required for the foundation. As a result, eleven stages such as creation of (1) Job creation making plan (2) Offer on registration of private qualification (3) business process analysis (4) Confirmation of test criterion (5) Reception system development (6) Educational book development (7) Assist open lecture (8) TEST notice plan making (9) Implement training for certification (10) Operation of qualifying examination and Never ending training. Afterwards It will become the data for the development of the Professional making a job in the future.

Education Platform for Real Estate Industry on the Fourth Industrial Revolution : Proposing the Smart Space EduPlatform (4차 산업혁명시대 부동산 산업을 위한 교육플랫폼 연구: Smart Space EduPlatform 제안)

  • Lee, Jin-Kyung
    • Informatization Policy
    • /
    • v.26 no.1
    • /
    • pp.46-61
    • /
    • 2019
  • The Fourth Industrial Revolution has been revolutionizing industry and education. This paper proposes an education platform, Smart Space EduPlatform (SSEP), for the real estate industry, aimed at educating the basic real estate technology (RETech) for workers in the real estate industry so they can achieve the highest and best use of the real estate in the smart environment. The habitat of SSEP is driven by the donation system ensuring sustainability, various technical functions such as tools for content production and learning participation, and learning behavior frameworks each in form of a learner, a teacher, and a helper. Services of SSEP consist of 17 important RETech lectures under 6 categories-planning and design, decision-making, management, economics, construction, and equipment-and project-based learning (PBL) curriculums. The lectures are provided along with video contents, additional learning materials and learning management service, while teachers' workshops, learner invitation and registration management, curriculum operation services are offered for the PBL curriculums.

Survey on the Insect Smart Farm Breeding Farm (곤충 스마트팜 사육농가 실태조사)

  • Kwak, Kang-Su;Rho, Si-Young;Won, Jin-Ho;Kim, Tae-Hyun;Baek, Jeong-Hyun;Lee, Sang-Gyu;Lee, Jae-Su;Seok, Young-Seek;Choi, In-Chan
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2020.07a
    • /
    • pp.577-578
    • /
    • 2020
  • 본 연구의 목적은 흰점박이꽃무지 사육농가 및 사육환경에 대해 일반농가의 실태를 조사·분석하여 식용곤충 사육시설에 대한 기초 연구자료를 수집하기 위한 것이다. 전국에 곤충사육 농가로 등록한 업체 중에서 흰점박이꽃무지를 사육하는 농가 17농가를 대상으로 설문조사를 실시하여 농장운영 및 시설·장치 현황 등을 조사하였으며, 주요 결과는 다음과 같다. 일반적으로 곤충사육 농가는 대부분 농가형으로 운영되고 있지만, 생산업, 유통업 및 가공업 등으로 신고하여 곤충사육 농가에서 직접 생산, 가공 및 제품 개발 등을 하고 있는 것으로 나타났다. 그리고 대부분의 곤충사육 농가는 판넬 형식의 건축물 내에서 냉·난방기를 가동하여 곤충의 생육환경을 조성하고 있으며, 필요에 따라 IoT 기반의 사양관리 장치 및 운영관리 시스템을 활용하고 있는 것으로 파악되었는데, 식용곤충 대량생산을 위한 사양관리 장치 및 생산 기반시설 구축은 여전히 부족한 상황으로 개선이 필요해 보인다.

  • PDF

Design and Implementation of Visitor Access Control System using Deep learning Face Recognition (딥러닝 얼굴인식 기술을 활용한 방문자 출입관리 시스템 설계와 구현)

  • Heo, Seok-Yeol;Kim, Kang Min;Lee, Wan-Jik
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.245-251
    • /
    • 2021
  • As the trend of steadily increasing the number of single or double household, there is a growing demand to see who is the outsider visiting the home during the free time. Various models of face recognition technology have been proposed through many studies, and Harr Cascade of OpenCV and Hog of Dlib are representative open source models. Among the two modes, Dlib's Hog has strengths in front of the indoor and at a limited distance, which is the focus of this study. In this paper, a face recognition visitor access system based on Dlib was designed and implemented. The whole system consists of a front module, a server module, and a mobile module, and in detail, it includes face registration, face recognition, real-time visitor verification and remote control, and video storage functions. The Precision, Specificity, and Accuracy according to the change of the distance threshold value were calculated using the error matrix with the photos published on the Internet, and compared with the results of previous studies. As a result of the experiment, it was confirmed that the implemented system was operating normally, and the result was confirmed to be similar to that reported by Dlib.

Tool for Supporting Design Pattern-Oriented Software Development (디자인 패턴지향 소프트웨어 개발 지원 도구)

  • Kim, Woon-Yong;Choi, Young-Keun
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.8
    • /
    • pp.555-564
    • /
    • 2002
  • Design patterns are used to utilize well-defined design information. As using these design patterns, we can get re-use in object-oriented paradigm, decrease the time of development and improvement the quality of software. Although these design patterns are widely used among practice, most of design patterns information is manually used, inconsistent and its utilization could be very low. Because the design patterns information that a designer applies does not appear in software, it is sometimes difficult to track them. In this paper, we propose a tool support for design pattern-oriented software development. This tool supports design pattern management, software design and automatic source code generation. The design pattern management has the function for storing, managing and analyzing the existing design pattern and registering new design pattern. The software design has the function for software design with UML and automatically generate design pattern elements. By using this design information, this system can automatically generate source code. In the result to include the tracking design pattern element that is not Included In the existing CASE tools into design information, we can build the stable and efficient system that provides to analyse software, manage design pattern and automatically generate source code.