• Title/Summary/Keyword: 설계관리 시스템

Search Result 7,124, Processing Time 0.038 seconds

Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs (프로그램의 오염 정보 추적을 위한 동적 오염 분석의 이론 및 구현)

  • Lim, Hyun-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.7
    • /
    • pp.303-310
    • /
    • 2013
  • As the role of software increases in computing environments, issues in software security become more important problems. Dynamic taint analysis is a technique to trace and manage tainted data originated from unreliable sources during the execution of a program. This analysis can be applied to software security verification as well as software behavior understanding, testing unexpected errors, or debugging. In the previous researches, they focussed only to show the analysis results of dynamic taint analysis, and they did not logically describe propagation process of tainted data and analysis procedures. So, there were difficulties in understanding the analysis procedures or applying to other analysis. In this paper, by theoretically describing the analysis procedure, we logically show how the propagation process of tainted data can be traced, and present a theoretical model for dynamic taint analysis. In addition, we verify the correctness of the proposed model by implementing an analyser, and show that propagation of tainted data can be traced by the model. The proposed model can be applied to understand the analysis procedures of data flows in dynamic taint analysis, and can be used as an base knowledge for designing and implementing analysis method, which applies such analysis method.

Development of ICT-based road safety integrated facilities for pedestrian crossing (ICT기반 횡단보도용 교통안전 통합시설물 개발)

  • Cho, Choong-Yuen;Yim, Hong-Kyu;Lee, Min-Jae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.12
    • /
    • pp.93-99
    • /
    • 2017
  • The rate of traffic accidents that occurred in Korea last year is 10 out of every 100,000 people, ranking it 6th among the 35 OECD member countries. The accident rate of children with disabilities and elderly people is also high. The purpose of this study is to introduce traffic safety facilities which have been developed for the reduction of traffic accidents in non-urban areas in Korea through an analysis of the related literature, the accident factors using traffic accident analysis system data and traffic accident characteristics. Traffic safety integrated facilities for ICT-based pedestrian crossings are subject to cross-sectional coverage of child protection zones. The smart safety fence prevents vehicles from parking illegally and informs pedestrians that there is an access vehicle on the pedestrian crossing. The smart bump is designed to warn drivers who are not aware of the pedestrians. In order to standardize the appropriate form and size of the traffic safety facilities for pedestrian crossings, we constructed a standard model for each type, considering the road function, press classification, power, lane number, geometric form, etc. As a result, the rate of traffic accidents involving vulnerable people was reduced. In addition, it is anticipated that the maintenance costs will be reduced by the use of a solar power supply and their compatibility with the existing installed safety fences.

Use Strategies of CPTED for the Safety of University Campus (대학 캠퍼스의 안전을 위한 CPTED 운용전략)

  • Park, Dong-Kyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.340-347
    • /
    • 2010
  • Though there are many crimes on and out university campus in Korea, no one knows anything about the size or the types of campus crime. But, there are many theft crimes and sex assault in the library and one-room village near the university campus. This study suggested the establish ways and means needed to improve the campus security system, with the focus on the CPTED(Crime Prevention Through Environmental Design). Various types of crime prevention methods are being considered instead of conventional crime suppression measures. Among them, CPTED is drawing global attention. Crime prevention through environmental design is a multi-disciplinary approach to deterring criminal behavior through environmental design. CPTED strategies rely upon the ability to influence offender decisions that precede criminal acts. A truly safe campus can be achieved only through the cooperation of all students, faculty, staff and visitors. The cooperation and involvement of the entire campus community in campus crime prevention is absolutely necessary. University should adopt a series of policies and procedures designed to ensure that every possible precaution is taken to protect persons and property on campus.

High Frequency Noise Reduction in ECG using a Time-Varying Variable Cutoff Frequency Lowpass Filter (시변 가변차단주파수 저역통과필터를 이용한 심전도 고주파 잡음의 제거)

  • 최안식;우응제;박승훈;윤영로
    • Journal of Biomedical Engineering Research
    • /
    • v.25 no.2
    • /
    • pp.137-144
    • /
    • 2004
  • ECG signals are often contaminated with high-frequency noise such as muscle artifact, power line interference, and others. In the ECG signal processing, especially during a pre-processing stage, numerous noise removal techniques have been used to reduce these high-frequency noise without much distorting the original signal. This paper proposes a new type of digital filter with a continuously variable cutoff frequency to improve the signal quality This filter consists of a cutoff frequency controller (CFC) and variable cutoff frequency lowpass filter (VCF-LPF). From the noisy input ECG signal, CFC produces a cutoff frequency control signal using the signal slew rate. We implemented VCF-LPF based on two new filter design methods called convex combination filter (CCF) and weight interpolation fille. (WIF). These two methods allow us to change the cutoff frequency of a lowpass filter In an arbitrary fine step. VCF-LPF shows an excellent noise reduction capability for the entire time segment of ECG excluding the rising and falling edge of a very sharp QRS complex. We found VCF-LPF very useful and practical for better signal visualization and probably for better ECG interpretation. We expect this new digital filter will find its applications especially in a home health management system where the measured ECG signals are easily contaminated with high-frequency noises .

Development of an SWRL-based Backward Chaining Inference Engine SMART-B for the Next Generation Web (차세대 웹을 위한 SWRL 기반 역방향 추론엔진 SMART-B의 개발)

  • Song Yong-Uk;Hong June-Seok;Kim Woo-Ju;Lee Sung-Kyu;Youn Suk-Hee
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.2
    • /
    • pp.67-81
    • /
    • 2006
  • While the existing Web focuses on the interface with human users based on HTML, the next generation Web will focus on the interaction among software agents by using XML and XML-based standards and technologies. The inference engine, which will serve as brains of software agents in the next generation Web, should thoroughly understand the Semantic Web, the standard language of the next generation Web. As abasis for the service, the W3C (World Wide Web Consortium) has recommended SWRL (Semantic Web Rule Language) which had been made by compounding OWL (Web Ontology Language) and RuleML (Rule Markup Language). In this research, we develop a backward chaining inference engine SMART-B (SeMantic web Agent Reasoning Tools -Backward chaining inference engine), which uses SWRL and OWL to represent rules and facts respectively. We analyze the requirements for the SWRL-based backward chaining inference and design analgorithm for the backward chaining inference which reflects the traditional backward chaining inference algorithm and the requirements of the next generation Semantic Web. We also implement the backward chaining inference engine and the administrative tools for fact and rule bases into Java components to insure the independence and portability among different platforms under the environment of Ubiquitous Computing.

  • PDF

A Coding Packet Group-Based ARQ Scheme for File Delivery Services in a Multi-Hop Wireless Network (다중 홉 MANET에서의 파일 전송 응용을 위한 코딩 패킷 그룹 기반 ARQ 기법)

  • Kim, Youngsil;Kang, Kyungran;Cho, Young-Jong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.7
    • /
    • pp.612-622
    • /
    • 2013
  • In this paper, we propose a coding packet group-based ARQ scheme (rNC) for file delivery in wireless networks. rNC assumes multiple network coding points between the source and the destination. Each network coding point gathers and codes a group of packets according to the queue polling system. A queue polling system makes a few or several packets available for coding in a queue while polling the other queues in the system. Thus, we assuem a queue polling system at each network coding point. We call this group of packets as coded packet group. Each coding point acknowledges the reception of every code packet group to its previous coding point for reliable delivery. Thus, the intermediate coding points including the source can release its buffer before the packet is delivered to the destination. To guarantee the ultimate file delivery to the destination, the destination sends acknowledgement to the sender. We evaluate our proposed scheme using ns-2 and compare the performance with CodeCast. The results show that rNC works better than CodeCast in terms of packet delivery ratio and control overhead in unreliable wireless networks.

A Study on the Performance of Design Services in the Export Voucher (수출지원기반활용사업에서 디자인 서비스의 성과에 관한 연구)

  • Lee, Sungsu;Ahn, Jinho;Kim, Injun
    • Journal of Service Research and Studies
    • /
    • v.10 no.2
    • /
    • pp.31-42
    • /
    • 2020
  • This study is a study on the performance of design services among export voucher projects. In particular, we have identified the actual state of use of design services from the perspective of participating companies and the corresponding problems. The purpose of the study is to provide basic data for the preparation of successful support plans in the field of design services. This study designed a quantitative survey to measure accurate performance of design services using archive records, and the survey was sent three times in total to 135 participating companies. A significant achievement of design services the study found is that the role of design were important in the export of the nation's main industries such as medical/biological/healthcare and electrical/electronic products. In addition, we could see that all participating companies were using design services regardless of the difference in sales. In particular, 96% of participating companies answered that the design service effect was the most effective service. As a result, it proved the importance of design services in export voucher projects, and suggested the importance of introducing a management system as a direction for the development of design services in future export voucher projects. He majored in advertising design at Hongik University's Graduate School of Industrial Art and at the Korea Institute of Design Promotion. It carries out the government's design policy such as design research, design education, and corporate design support. He is currently working as an Invited Designer by Korea Design Exhibition.

A Study of Quality Metrics Process Design Methodology for Field Application Encryption under Network Security Environment (네트워크 보안 환경에서의 현장적용 중심 암호품질 만족도 평가 메트릭스 설계 프로세스)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.29-35
    • /
    • 2015
  • The network security encryption type is divided into two, one is point-to-point, second method is link type. The level of security quality attributes are a system security quality requirements in a networked environment. Quality attributes can be observed and should be able to be measured. If the quality requirements can be presented as exact figures, quality requirements are defined specifically setting quality objectives. Functional requirements in the quality attribute is a requirement for a service function which can be obtained through the encryption. Non-functional requirements are requirements of the service quality that can be obtained through the encryption. Encryption quality evaluation system proposed in this study is to derive functional requirements and non-functional requirements 2 groups. Of the calculating measure of the evaluation index in the same category, the associated indication of the quality measure of each surface should be created. The quality matrix uses 2-factor analysis of the evaluation for the associated surface quality measurements. The quality requirements are calculated based on two different functional requirements and non-functional requirements. The results are calculated by analyzing the trend of the average value assessment. When used this way, it is possible to configure the network security encryption based on quality management.

Development of the Calorimeter to Measure Heat Rate Generated from Battery for EV & HEV (전기자동차용 축전지의 발열량 측정을 위한 열용량계 개발)

  • Yang Cheol-Nam;Park Seong-Yong
    • Journal of the Korean Electrochemical Society
    • /
    • v.2 no.4
    • /
    • pp.218-220
    • /
    • 1999
  • The performance of the Electric Vehicle and Hybrid Electric Vehicle depends on that of the battery pack composed of series connected batteries. And thermal property is one of the main factors which decide the performance of the battery pack. So heat generation rate from the battery under the various driving mode must be measured as precise as possible because thermal characteristics of the battery affect the driving performance and battery pack's life cycle. Besides, to design and develop the battery thermal management system for the EV and HEV, the measurements of the thermal properties of the batteries are needed. However, the established calorimeter is not adequate to test an EV's battery because its cavity is too small to accommodate the EV's battery. Therefore we developed the calorimeter to test the thermal property of the EV's battery. Its cavity size is 120mm long, 75mm wide and 200mm high. The calorimeter is calibrated by the dummy cell which generates the heat rate from zero to 200W. The measuring accuracy of the calorimeter is within $2\%$ and its voltage stability is 2.5mV in the constant temperature bath.

A Study on the Radiation Source Effect to the Radiation Shielding Analysis for a Spent-Fuel Cask Design with Burnup-Credit (연소도이득효과를 적용한 사용후핵연료 수송용기의 방사선원별 차폐영향 분석)

  • Kim, Kyung-O;Kim, Soon-Young;Ko, Jae-Hoon;Lee, Gang-Ug;Kim, Tae-Man;Yoon, Jeong-Hyun
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.9 no.2
    • /
    • pp.73-80
    • /
    • 2011
  • The radiation shielding analysis for a Burnup-credit (BUC) cask designed under the management of Korea Radioactive Waste Management Corporation (KRMC) was performed to examine the contribution of each radiation source affecting dose rate distribution around the cask. Various radiation sources, which contain neutron and gamma-ray sources placed in active fuel region and the activation source, and imaginary nuclear fuel were all considered in the MCNP calculation model to realistically simulate the actual situations. It was found that the maximum external and surface dose rates of the spent fuel cask were satisfied with the domestic standards both in normal and accident conditions. In normal condition, the radiation dose rate distribution around the cask was mainly influenced by activation source ($^{60}Co$ radioisotope); in another case, the neutron emitted in active fuel region contributed about 90% to external dose rate at 1m distance from side surface of the cask. Besides, the contribution level of activation source was dramatically increased to the dose rates in top and bottom regions of the cask. From this study, it was recognized that the detailed investigation on the radiation sources should be performed conservatively and accurately in the process of radiation shielding analysis for a BUC cask.