• Title/Summary/Keyword: 소프트웨어개발프로세스

Search Result 749, Processing Time 0.022 seconds

Development of Plug-n-Play Automation System for Machine Tending through Digital Twin (디지털 트윈을 활용한 Plug-n-Play 머신텐딩 자동화 시스템 개발)

  • Park, Yong-Keun;Kim, Sujong;Um, Jumyung
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.4
    • /
    • pp.143-154
    • /
    • 2020
  • With the increasing trend of making manufacturing system intelligent and autonomous, the introduction of robot-assist automation, like machine tending system for automated operation of CNC machine tools, is being actively carried out at many industrial sites. Most important part of this intelligent system to install machine tending system, is interface programming between the CNC machine tools and the industrial robot. Despite this importance, however, the machine tending system has many setup problems. it is necessary for difficult re-program of both controllers whenever a new CNC machine tool or robot is introduced. And, the helps of external engineers is required even though trivial changes due to the complex structure of the machine tending system. Authors of this paper introduces the integrated system of the interface between heterogeneous CNC machine tools and industrial robots. In addition, the digital twin implemented inside the machine tool controller enable shop-floor operators to change the interface programming easily. To implement this system, an integrated development environment for 1) an intelligent HMI platform that provide standardized interfaces to heterogeneous CNC machine tools and 2) a robot platform developing application software of various robots, was established. For easy un-tact environment, this paper explain the development of 3) a game-engine based web program of controlling and monitoring machine tending system remotely.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

소아의 음성장애 및 치료 : 사례연구

  • 정옥란
    • Journal of the Korean Society of Laryngology, Phoniatrics and Logopedics
    • /
    • v.7 no.1
    • /
    • pp.128-131
    • /
    • 1996
  • 소아들의 음성장애의 대부분은 음성과 기능에 의한 성대의 오용 및 남용으로부터 기인한다. 그러나 음성장애에 대한 인식의 부족으로 인하여 소아의 음성장애 발견율은 극히 낮은 수준에 머므르고 있다. 치료에 있어서도 행동의 통제가 그다지 쉽지 않기 때문에 많은 어려움이 따른다. 본 연구는 소아의 음성장애의 발생경위와 문제의 설명과 차팅에 의한 남용의 감소에 초점을 둔 치료사례이다. 5세 아동의 심한 음성장애로 의뢰되어졌다. 음성증후는 목쉰소리, 기식화된 소리, 일시적인 발성일탈(phonation break) 등이 두드러졌다. 이비인후과 전문의의 스트로보스코프(stroboscope) 검진결과 초기 양측성 성대결절이 성대 앞쪽으로부터 1/3 지점에서 발견되었으며 비지피치(Visi-Pitch)로 측정된 퍼터베이션(perturbation 수치가 16.8이었다. 사례사 조사 과정에서 아동이 활동적이며 자주 고함을 지르고 자동차놀이를 주로하며 많은 시간을 보낸다는 것이 밝혀졌다. 중재 프로그램은 우선 문제를 설명하고 인식시키는 것과 고함을 지르거나 자동차놀이를 하면서 자동차 소음을 흉내내는 등의 음성남용 회수를 감소시키는 것에 초점을 두었다 17회의 치료로 성대결절이 감소되었고 퍼터베이션은 3.8로 저하되었으며 아동 스스로 음성남용을 통제할 수 있다는 임상적 판단하에 치료를 종결하였다. 1개월 후 추후 검사에서 남용적인 습관이 여전히 나타나지 않았으며 음성상태도 양호하였다. 소아 음성장애의 치료는 소아가 이해할 수 있는 용어로 문제의 인식을 확실히 시키고 행동을 체계적으로 통제할 수 있는 치료프로그램을 실행시키는 임상가의 자질이 대단히 중요하다. 그러나 그에 못지 않게, 많은 시간을 아동과 함께 보내는 부모나 교사의 협력이 치료의 성패를 좌우할 수 있다.조구와 처리구간에 차이가 없었다. 그러나 유지방 함량의 경우 대조구가 3.22%, 처리구가 3.37%로 처리구가 0.15% point 증가했으나 유의차는 없었다. Fan + sprinkler가 설치된 시설에서 사육된 젖소에서 생산된 우유내 체세포수는 대조구에 비해 26.63%가 감소되었으나 유의차는 발견할 수 없었다. 이상의 시험 결과에서 볼 때 fan + sprinkler를 이용한 방서 방법은 고온 stress를 완화시켜 유생산성의 증가에 기여할 수 있는 하나의 방법이라고 본다.을 알 수가 있었다.없다. 본 논문의 대상은 바로 이러한 합성 동사성명사의 논항구조와 동사성명사에 의해 하위범주화된 논항들의 문법적 실현양상이다..그 결과 심리적 특성과 사용자 수용 특성은 아바타 수용도에 부분적으로 영향을 미친다는 것 결과가 나타났다.웨어 프로세스 평가와 개선 모델의 개발을 위한 기초적인 자료를 제공할 것으로 예상된다 또한, 본 연구 결과는, 우리나라 소프트웨어 조직들이 실제로 무엇을 필요로 하는지를 밝힘으로써, 우리나라의 소프트웨어 산업을 육성하기 위한 실효성 있는 정책 입안을 위한 기초 자료를 제공할 것으로 예상된다.다.를 검증하려고 한다. 협력체계 확립, ${\circled}3$ 전문인력 확보 및 인력구성 조정, 그리고 ${\circled}4$ 방문보건사업의 강화 등이다., 대사(代謝)와 관계(關係)있음을 시사(示唆)해 주고 있다.ble nutrient (TDN) was highest in booting stage (59.7%); however no significant difference was found among other stages. The concentrations of Ca and P were not

  • PDF

A Methodology for Consistent Design of User Interaction (일관성 있는 사용자 인터랙션 설계를 위한 방법론 개발)

  • Kim, Dong-San;Yoon, Wan-Chul
    • 한국HCI학회:학술대회논문집
    • /
    • 2009.02a
    • /
    • pp.961-970
    • /
    • 2009
  • Over the last decade, interactive devices such as mobile phones have become complicated drastically mainly because of feature creep, the tendency for the number of features in a product to rise with each release of the product. One of the ways to reduce the complexity of a multi-functional device is to design it consistently. Although the definition of consistency is elusive and it is sometimes beneficial to be inconsistent, in general, consistently designed systems are easier to learn, easier to remember, and causing less errors. In practice, however, it is often not easy to design the user interaction or interface of a multi-functional device consistently. Since the interaction design of a multi-functional device should deal with a large number of design variables and relations among them, solving this problem might be very time-consuming and error-prone. Therefore, there is a strong need for a well-developed methodology that supports the complex design process. This study has developed an effective and efficient methodology, called CUID (Consistent Design of User Interaction), which focuses on logical consistency rather than physical or visual consistency. CUID deals with three main problems in interaction design: procedure design for each task, decisions of available operations(or functions) for each system state, and the mapping of available operations(functions) and interface controls. It includes a process for interaction design and a software tool for supporting the process. This paper also demonstrates how CUID supports the consistent design of user interaction by presenting a case study. It shows that the logical inconsistencies of a multi-functional device can be resolved by using the CUID methodology.

  • PDF

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

Development of Mean Stand Height Module Using Image-Based Point Cloud and FUSION S/W (영상 기반 3차원 점군과 FUSION S/W 기반의 임분고 분석 모듈 개발)

  • KIM, Kyoung-Min
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.4
    • /
    • pp.169-185
    • /
    • 2016
  • Recently mean stand height has been added as new attribute to forest type maps, but it is often too costly and time consuming to manually measure 9,100,000 points from countrywide stereo aerial photos. In addition, tree heights are frequently measured around tombs and forest edges, which are poor representations of the interior tree stand. This work proposes an estimation of mean stand height using an image-based point cloud, which was extracted from stereo aerial photo with FUSION S/W. Then, a digital terrain model was created by filtering the DSM point cloud and subtracting the DTM from DSM, resulting in nDSM, which represents object heights (buildings, trees, etc.). The RMSE was calculated to compare differences in tree heights between those observed and extracted from the nDSM. The resulting RMSE of average total plot height was 0.96 m. Individual tree heights of the whole study site area were extracted using the USDA Forest Service's FUSION S/W. Finally, mean stand height was produced by averaging individual tree heights in a stand polygon of the forest type map. In order to automate the mean stand height extraction using photogrammetric methods, a module was developed as an ArcGIS add-in toolbox.

Service Identification of Component-Based System for Service-Oriented Architecture (서비스 지향 아키텍처를 위한 컴포넌트기반 시스템의 서비스 식별)

  • Lee, Hyeon-Joo;Choi, Byoung-Ju;Lee, Jung-Won
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.2
    • /
    • pp.70-80
    • /
    • 2008
  • Today, businesses have to respond with flexibility and speed to ever-changing customer demand and market opportunities. Service-oriented architecture (SOA) is the best methodology for minimizing the complexity and the cost of enterprise-level infrastructure and for maximizing the productivity and the flexibility of an enterprise. Most of the enterprise-level SOA delivery strategies deal with the top-down approach, which organization has to define the business processes, to model business services, and to find the required services or to develop new services. However, a lot of peoples want to maximally reuse legacy component-based systems as well as to deliver SOA into their organizations. In this paper, we propose a bottom-up approach for identifying business services with proper granularity. It can improve the reusability and maintenance of services by considering not data I/O of components of legacy applications but GUI event patterns. Our proposed method is applied to MIS with 129 GUIs and 13 components. As a result, the valiance of the coupling value of components is increased five times and three business services are distinctly exposed. It also provides a 49% improvement in reducing the relationship problems between services over a service identification method using only partitioning information of components.

A Case Study on SK Telecom's Next Generation Marketing System Development (SK텔레콤의 차세대 마케팅 시스템 개발사례 연구)

  • Lee, Sang-Goo;Jang, Si-Young;Yang, Jung-Yeon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.158-170
    • /
    • 2008
  • In response to the changing demands of ever competitive market, SK Telecom has built a new marketing system that can support dynamic marketing campaigns and, at the same time, scale up to the large volumes of data and transactions for the next decade. The system which employs Unix-based client-server (using Web browser interfaces) architecture will replace the current mainframe-based COIS system. The project, named NGM (Next Generation Marketing ), is unprecedentedly large in scale. However, both managerial and technical problems led the project into a crisis. The application framework that depended on a software solution from a major global vendor could not support the dynamic functionalities required for the new system. In March 2005, SK telecom declared the suspension of the NGM project. The second phase of the project started in May 2005 following a comprehensive replanning. It was decided that no single existing solution could cope with the complexity of the new system and hence the new system would be custom-built. As such. a number of technical challenges emerged. In this paper, we report on the three key dimensions of technical challenges - middleware and application framework, database architecture and tuning, and system performance. The processes and approaches, adopted in building NGM system, may be viewed as "best practices" in the telecom industry. The completed NGM system, now called "U.key System," successfully came into operation on the ninth of October, 2006. This new infrastructure is expected to give birth to a series of innovative, fruitful, and customer-oriented applications in the near future.

A Framework and Patterns for Efficient Service Monitoring (효율적인 서비스 모니터링 프레임워크 및 전송패턴)

  • Lee, Hyun-Min;Cheun, Du-Wan;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.11
    • /
    • pp.812-825
    • /
    • 2010
  • Service-Oriented Computing (SOC) is a reuse paradigm for developing business processes by dynamic service composition. Service consumers subscribe services deployed by service providers only through service interfaces. Therefore, services on server-side are perceived as black box to service consumers. Due to this nature of services, service consumers have limited knowledge on the quality of services. This limits utilizing of services in critical domains hard. Therefore, there is an increasing demand for effective methods for monitoring services. Current monitoring techniques generally depend on specific vendor's middleware without direct access to services due to the technical hardship of monitoring. However, these approaches have limitations including low data comprehensibility and data accuracy. And, this results in a demand for effective service monitoring framework. In this paper, we propose a framework for efficiently monitoring services. We first define requirements for designing monitoring framework. Based on the requirements, we propose architecture for monitoring framework and define generic patterns for efficiently acquiring monitored data from services. We present the detailed design of monitoring framework and its implementation. We finally implement a prototype of the monitor, and present the functionality of the framework as well as the results of experiments to verify efficiency of patterns for transmitting monitoring data.