• Title/Summary/Keyword: 상세완화

Search Result 62, Processing Time 0.026 seconds

Implementation and Performance Analysis of Network Access Control Based on 802.1X for Effective Access Control on BYOD (효율적인 BYOD 접근통제를 위한 802.1X 네트워크 접근통제 구현과 성능 해석)

  • Lee, Min Choul;Kim, Jeongho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.9
    • /
    • pp.271-282
    • /
    • 2015
  • In the business environment BYOD(Bring Your Own Device) is used and being expanded continuously. According to a survey conducted by Cisco in 2012 on 600 companies, 95% of them are already permitting the use of BYOD in their work environments so that productivity of their employees has improved as a result. Gartner predicted that the use of BYOD will be caused new security threat. They also suggested to introduce NAC(Network Access Control) to resolve this threat, to separate network zone based on importance of their business, to establish the policy to consider user authority and device type, and to enforce the policy. The purpose of this paper is to design and implement the NAC for granular access control based on IEEE(Institute of Electrical and Electronics Engineers) 802.1X and DHCP(Dynamic Host Configuration Protocol) fingerprinting, and to analyze the performance on BYOD environment.

A Study on Fire Protection in Nuclear Power Plants and Application of the Code and Standards for Fire Protection Systems (원자력발전소 화재방호와 소방시설 기술기준 적용에 대한 고찰)

  • Kim, Wee-Kyong;Jeong, Kee-Sin
    • Fire Science and Engineering
    • /
    • v.26 no.6
    • /
    • pp.38-44
    • /
    • 2012
  • The purpose of fire protection for the nuclear power plants (NPPs) is to ensure safe shutdown state of the reactor, to minimize the release of radioactive materials to the environment, to provide physical safety of the on-site personnel, and to limit the property damage. Fire protection and extinguishing equipments are one of the important protection measures based on the defense-in-depth concept, which can promptly detect and control and extinguish those fires that do occur, thereby limiting fire damage. However, a separate evaluation process might be additionally necessary for the construction permit and operating license because the fire protection laws of the NEMA for installation standards of the fire protection systems is not fully characterized for the NPPs. It is also not easy to implement the regulations such as the performance based design concept for fire protection system of the NPPs which are characterized for a relatively low density of employee. This study suggests a guideline for the improvement of the technical standards for fire protection systems of the NPPs by evaluating the fundamental problems drawn by reviewing laws and regulatory guides relevant to fire protection and by evaluating the applicability of the KEPIC FPN in domestic nuclear power plants.

Relief Hole for Improvement of Fatigue Strength in Welded Intersections of Transverse and Longitudinal Ribs in Orthotropic Deck (가로리브와 U리브 용접부의 피로강도 향상을 위한 응력완화홀)

  • Jung, Kyoung Sup;Nam, Seung Hoon;Yang, Keon Bong;Kim, Kyoung Nam
    • Journal of Korean Society of Steel Construction
    • /
    • v.26 no.5
    • /
    • pp.419-430
    • /
    • 2014
  • On going researches which are being made on the welded joints at the intersections of closed ribs such as U-ribs with floor-beams in ortho-tropic steel decks still have been used the shape of scallops with or with not diaphragm inside. Stress Relief Hole(SRH) being presented in this study was investigated in order to reduce the fatigue damage in the intersections of U-rib with floor-beam. Finally, it is verified that circular SRHs sufficiently relief the concentration stress at the intersections of U-rib with floor-beam and shows that SRH can be offer one of the methods that can prevent the fatigue damage in these structural details.

A Case Study of Fluid Simulation in the Film 'Sector 7' (사례연구: 영화 '7광구'의 유체 시뮬레이션)

  • Kim, Sun-Tae;Lee, Jeong-Hyun;Kim, Dae-yeong;Park, Yeong-Su;Jang, Seong-Ho;Hong, Jeong-Mo
    • Journal of the Korea Computer Graphics Society
    • /
    • v.18 no.3
    • /
    • pp.17-27
    • /
    • 2012
  • In this paper, we describe a case study of the film 'Sector 7' which was produced by technologies applied fluid simulation. For the CG scenes in the movie which include highly detailed fluid motions, we used smoothed particle hydrodynamics(SPH) technique to express subtle movements of seawater from a crashed huge tank, and used hybrid simulation method of particles and levelsets to describe bursting water from a submarine's broken canopy. We also used detonation shock dynamics(DSD) technique for detailed flame simulations to produce a burning monster, the film"s main character. At this point, the divergence-free vortex particle method was applied to conserve the incompressible property of fluids. In addition, we used an upsampling method to achieve more efficient video production. Consequently, we could produce the high-quality visual effects by using the domestic technologies.

Control of Plume Interference Effects on a Missile Body Using a Porous Extension (다공확장벽을 이용한 미사일 동체에 대한 플룸간섭 현상의 제어)

  • Young-Ki Lee;Heuy-Dong Kim
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2003
  • The Physics of the Plume-induced shock and separation Particularly at a high Plume to exit pressure ratio and supersonic speeds up to Mach 3.0 with and without a passive control method, porous extension, were studied using computational techniques. Mass-averaged Navier-Stokes equations with the RNG $\kappa$-$\varepsilon$ turbulence model were solved using a fully implicit finite volume scheme and a 4-stage Runge-Kutta method. The control methodology for plume-afterbody interactions is to use a perforated wall attached at either the nozzle exit or the edge of the missile base. The Effect of porous wall length on plume interference is also investigated The computational results show the main effect of the porous extension on plume-afterbody interactions is to restrain the plume from strongly underexpanding during a change in flight conditions. With control, a change in porous extension length has no significant effect rut plume interference.

A Study of the Control of Plume-Induced Flow over a Missile Afterbody (Missile Afterbody에서 Plume-Induced Flow의 제어에 관한 연구)

  • ;Young-Ki Lee
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2003.05a
    • /
    • pp.45-48
    • /
    • 2003
  • The plume interference is a complex phenomenon, consisting of plume-induced boundary layer separation, separated shear layer, multiple shock waves, and their interactions. The base knowledge of plume interference effect on powered missiles and flight vehicles is not yet adequate to get an overall insight of the flow physics in plume-freestream flow field. Computational studies are performed to better understand the flow physics of the plume-induced shock and separation for Simple, Rounded, Porous-extension test model configurations. The present study simulates highly underexpanded exhaust plume effect on missile body at the transoni $c^ersonic speeds. In order to investigate the plume-induced separation phenomenon, Simple, Rounded and Porous-extension plate are attacked to the missile afterbody. The computational result shows that the rounded afterbody and the porous-extension wall attached at the missile base can alleviate the plume-induced shock wave and separation phenomenon and improve the control of the missile body.dy.

  • PDF

Intensive Care Nurses' Experiences of Death of Patients with DNR Orders (중환자실 간호사가 경험한 DNR 환자의 임종)

  • Lee, Ji Yun;Lee, Yong Mi;Jang, Jae In
    • Journal of Hospice and Palliative Care
    • /
    • v.20 no.2
    • /
    • pp.122-130
    • /
    • 2017
  • Purpose: The purpose of this study is to describe and understand the meaning and the structure of subjective experiences of intensive care nurses with death of patients with do-not-resuscitate (DNR) orders. Methods: Data were collected from eight intensive care nurses at general hospitals using individual in-depth interviews and analyzed by phenomenological research method. Results: The nurses' experiences were grouped into four theme clusters: 1) ambiguity of death without correct answer, 2) a dilemma experienced at the border between death and work, 3) the weight of death that is difficult to carry and 4) death-triggered reflection of life. Conclusion: It is necessary to develop accurate judgment criteria for DNR, detailed regulations on the DNR decision process, guidelines and education on DNR patient care for nurses. It is also needed to develop an intervention program for DNR patients' families.

A Study on the Development of the Korean Internet Banks (한국 인터넷은행의 발전 방안에 관한 연구)

  • Ok, S.H.;Hwang, K.T.
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.111-126
    • /
    • 2017
  • Korea came to see its first internet bank as 'K bank' obtained the digital-only banking license in December 2016. This paper suggests ways to foster internet banks of Korea in their early stage by analyzing the successful cases of overseas internet banks. The followings are the key success factors identified from those cases across Europe, Japan, China, and USA: Support from the related government authorities; Stable governance structure; Distinct business capabilities based on information & communications technology(ICT). These points lead to the following implications for Korean internet banks. Regulatory restrictions on owning and running internet banks should be lifted to facilitate innovation. Policies to support internet bank industry should be introduced as it is a vital part of the 4th industrial revolution. Finally, internet banks should strive to differentiate themselves by utilizing their ICT capabilities. Subjects of the further research hereafter should include the following: Analyzing the ongoing performance and developments of digital banks in Korea; Deriving success factors from the analysis; Assessing the influence and effects on financial market and economic environment.

Drought Outlook using APCC MME Seasonal Prediction Information (APCC MME 계절예측정보를 이용한 가뭄전망)

  • Kang, Boo-Sik;Moon, Su-Jin;Sohn, Soo-Jin;Lee, Woo-Jin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.1784-1788
    • /
    • 2010
  • APEC 기후센터(APEC Climate Center, APCC)에서 제공하는 다중모형앙상블(Multi-model Ensemble, MME) 형태의 계절예측정보를 이용하여 3개월 가뭄전망을 수행하였다. APCC MME는 기후예측모형이 가지는 불확실성을 최소화하기 위한 방법으로, 아시아 태평양 지역 내 9개 회원국 16개 기관 21개 기후모형의 계절예측정보를 활용하여, 개별 모형이 가지는 계통오차(Systematic error)를 앙상블 기법을 통하여 상쇄함으로써 최적의 예측자료를 도출한다. 또한, 기후예측 모형이 예측한 대기순환장은 관측 지점변수와 경험적 통계적 관련성을 가지므로, 이를 바탕으로 상세지역의 이상기후에 대한 정보를 도출할 수 있다. 본 연구에서는 가뭄 관리 및 전망을 위한 입력 자료로서, 기상전문 기관인 APEC 기후센터 (APEC Climate Center, APCC)에서 제공하는 전구 규모의 기온 및 강수 전망자료를 기상청 산하 59개 지점의 전망자료로 통계적 규모 축소화 기법을 통해 3개월 예보를 실시하였다. APCC 계절예측자료를 가뭄모니터링시스템의 자료입력 포맷에 따라 적절히 가공한 뒤, 가뭄 관리 및 전망을 위하여 SPI(Standard Precipitation Index) 및 PDSI(Palmer Drought Severity Index)지수의 입력자료로 사용하여 SPI 및 PDSI 지수를 산정하였다. 또한 분위사상법(Quantile Mapping)을 이용하여 총 59개 지점의 과거 월평균 관측값과 최근 2009년에 대한 모의값의 누적확률분포값을 계산하고 모의값의 확률분포를 관측값의 확률분포에 사상시켜 가뭄 전망을 위한 기상변수의 오차를 보정하고자 하였다. 이러한 계절예측정보를 이용하여 가뭄 전망에 대한 신뢰도가 높아진다면, 사전예방 및 피해완화로 가뭄상황에 대한 신속한 대처 및 피해의 경감이 이루어질 수 있을 것이다.

  • PDF

A Study on Method for Bypassing Verification Function by Manipulating Return Value of Android Payment Application's Security Solution (안드로이드 간편결제 애플리케이션 보안 솔루션 결과값 변조를 통한 검증기능 우회 방법에 대한 연구)

  • You, Jaewook;Han, Mijeong;Kim, Kyuheon;Jang, Junyoung;Jin, Hoyong;Ji, Hanbyeol;Shin, Jeonghoon;Kim, Kyounggon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.827-838
    • /
    • 2018
  • Since 2014, ease of regulations on financial institutions expanded the mobile payment market based on simple authentication, and this resulted in the emergence of various simple payment services. Although several security solutions have been used to mitigate possible security threats to payment applications, there are vulnerabilities which can still be found due to the structure in which the security solution is applied to the payment service. In this paper, we analyze the payment application and security solution from the process perspective, and prove through experimentation that verification functions of security solutions can be bypassed without detailed analysis of each security function, but by simply manipulating the verification result value. Finally, we propose methods to mitigate the bypass method presented in this paper from three different perspectives, and thereby contribute to the improvement of security level of the payment service.