• Title/Summary/Keyword: 신뢰도 기반 설계

Search Result 1,303, Processing Time 0.033 seconds

A Method and Application of Vulnerability Analysis for Combat Systems Considering Threats and Defense Ability : Focused on PKM Model (위협의 특성과 장갑의 방호 성능을 고려한 전투 시스템의 취약성 분석 방법 및 활용 : 고속정 모델을 대상으로)

  • Hwang, Hun-Gyu;Kim, Bae-Sung;Kang, Ji-Won;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1623-1631
    • /
    • 2016
  • There are many researches which analyze vulnerability for combat systems, have been progressing, and apply the analyzed result to reflect on design phase. Recently, there have been requirements for integrating the previous module based researches which conducted independently. In this paper, we propose an integrated vulnerability analysis method for the combat system considering characteristics of threats and protection performance of armors through an analysis of the advanced research. In addition, by applying the proposed method improves the existing hit probability analysis program and we are verified based on scenarios for improving survivability of PKM (Petrol Killer Medium) for vulnerability analysis confirmed the results. The proposed method improves reliability of vulnerability analysis by considering threats and defense ability. Also it able to satisfied with the integration requirements. Furthermore, we became buildup for the development of applied system and the method and integrated vulnerability analysis method for combat systems.

Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs (프로그램의 오염 정보 추적을 위한 동적 오염 분석의 이론 및 구현)

  • Lim, Hyun-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.7
    • /
    • pp.303-310
    • /
    • 2013
  • As the role of software increases in computing environments, issues in software security become more important problems. Dynamic taint analysis is a technique to trace and manage tainted data originated from unreliable sources during the execution of a program. This analysis can be applied to software security verification as well as software behavior understanding, testing unexpected errors, or debugging. In the previous researches, they focussed only to show the analysis results of dynamic taint analysis, and they did not logically describe propagation process of tainted data and analysis procedures. So, there were difficulties in understanding the analysis procedures or applying to other analysis. In this paper, by theoretically describing the analysis procedure, we logically show how the propagation process of tainted data can be traced, and present a theoretical model for dynamic taint analysis. In addition, we verify the correctness of the proposed model by implementing an analyser, and show that propagation of tainted data can be traced by the model. The proposed model can be applied to understand the analysis procedures of data flows in dynamic taint analysis, and can be used as an base knowledge for designing and implementing analysis method, which applies such analysis method.

Implementation and Performance Analysis of the Group Communication Using CORBA-ORB, JAVA-RMI and Socket (CORBA-ORB, JAVA-RMI, 소켓을 이용한 그룹 통신의 구현 및 성능 분석)

  • 한윤기;구용완
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.81-90
    • /
    • 2002
  • Large-scale distributed applications based on Internet and client/server applications have to deal with series of problems. Load balancing, unpredictable communication delays, and networking failures can be the example of the series of problems. Therefore. sophisticated applications such as teleconferencing, video-on-demand, and concurrent software engineering require an abstracted group communication, CORBA does not address these paradigms adequately. It mainly deals with point-to-point communication and does not support the development of reliable applications that include predictable behavior in distributed systems. In this paper, we present our design, implementation and performance analysis of the group communication using the CORBA-ORB. JAVA-RML and Socket based on distributed computing Performance analysis will be estimated latency-lime according to object increment, in case of group communication using ORB of CORBA the average is 14.5172msec, in case of group communication using RMI of Java the average is 21.4085msec, in case of group communication using socket the average is becoming 18.0714msec. Each group communication using multicast and UDP can be estimated 0.2735msec and 0.2157msec. The performance of the CORBA-ORB group communication is increased because of the increased object by the result of this research. This study can be applied to the fault-tolerant client/server system, group-ware. text retrieval system, and financial information systems.

  • PDF

Framework for Improving Mobile Embedded Software Process (모바일 임베디드 소프트웨어 프로세스 개선 프레임워크)

  • Shin, Seung-Woo;Kim, Haeng-Kon;Kim, Soung-Won
    • Journal of Internet Computing and Services
    • /
    • v.10 no.5
    • /
    • pp.195-209
    • /
    • 2009
  • The embedded software has been become more important than the hardware in mobile systems in ubiquitous society. The improvement models such as CMMI(Capability Maturity Model Integration) and SPICE(Software Process Improvement and Capability dEtermination) are used to improve the quality of software in general systems. Software process improvement is also necessary for mobile embedded software development to improve its quality. It is not easy to apply the general software improvement model to the mobile embedded software development due to the high cost effectiveness and heavy process. On the other hand, XP has the characteristics on focused communications with customers and iteration development. It is specially suitable for mobile embedded software development as depending on customer's frequent requirement changes and hardware attributes. In this paper, we propose a framework for development small process improvement based XP(eXtreme Programming)'s practice in order to accomplish CMMI level 2 or 3 in mobile embedded software development at the small organizations. We design and implement the Mobile Embedded Software Process Improvement System(MESPIS) to support process improvement. We also suggest the evaluation method for the mobile embedded software development process improvement framework with CMMI coverage check by comparing other process improvement model. In the future, we need to apply this proposed framework to real project for practical effectiveness and the real cases quantitative. It also include the enhance the functionality of MESPIS.

  • PDF

Development of Backward Safety Analysis Tool for CPN Models (CPN 모델의 역방향 안전성 분석 도구 개발)

  • Lee, U-Jin;Chae, Heung-Seok;Cha, Seong-Deok;Lee, Jang-Su;Gwon, Yong-Rae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.457-466
    • /
    • 1999
  • 원자력 발전소 계측 제어 시스템, 의료 관련 시스템, 항공 관련 시스템 등 실생활과 밀접한 시스템에 소프트웨어의 사용이 점차 증가하고 있다. 이러한 시스템에서 소프트웨어의 오류는 예기치 않는 사고를 유발하여 인명, 재산상의 심각한 타격을 줄 수 있다. 그러므로 고신뢰도 소프트웨어의 개발 시에는 반드시 시스템의 안전성을 보장해 주어야 한다. 역방향 안전성 분석 방법은 시스템의 안전성을 분석하는 한가지 방법으로서 시스템의 위험 상태를 정의하고 그 위험의 원인들을 추적, 분석함으로써 안전성에 대한 효율적인 분석을 수행할 수 있는 장점을 갖는다. 이 논문에서는 소프트웨어 개발 초기 단계에서 안전성을 분석할 수 있는 방법으로 Colored Petri Nets(CPN)에 기반을 둔 역방향 안전성 분석 방법을 제시한다. 또한 CPN 역방향 안전성 분석 도구인 SAC(Safety Analyzer for CPN)의 설계 및 구현에 대해 언급한다. SAC은 기존의 상용 CPN 모델링 도구인 Design/CPN과 연계하여 사용될 수 있으므로 CPN으로 모델링된 시스템의 안전성을 분석할 수 있다는 장점이 있다. 이 논문에서는 예제로 자동 교통 제어 시스템의 일부를 CPN으로 모델링하고 SAC을 이용한 분석 과정을 기술한다.Abstract In safety-critical systems such as nuclear power plants, medical machines, and avionic systems which are closely related with our livings, the usage of software in the controlling part is growing rapidly. Since software errors in safety-critical systems may cause serious accidents leading to financial or human damages, system safety should be ensured during and after development of a system. A backward safety analysis technique defines system hazards and tries to trace their causes by analyzing system states backward. In this paper, we provide a backward safety analysis technique based on Colored Petri Nets(CPN), which is applicable to the early software development phase. Also Safety Analyzer for CPN(SAC), the supporting tool, is designed and implemented. Since SAC is compatible with Design/CPN, a commercial tool for supporting CPN, it can be applicable to analyze safety in practical problems. As an example, we model a part of the traffic light control system using CPN and analyze safety properties of the model using the SAC tool.

KSTAR 토카막 플라즈마 가열을 위한 중성 입자빔 입사장치용 이온원 개발 현황

  • Kim, Tae-Seong;Jeong, Seung-Ho;Jang, Du-Hui;Lee, Gwang-Won;In, Sang-Yeol;O, Byeong-Hun;Jang, Dae-Sik;Jin, Jeong-Tae;Song, U-Seop
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.02a
    • /
    • pp.559-559
    • /
    • 2013
  • KSTAR (Korea Superconducting Tokamak Advanced Research) 장치는 차세대 에너지원 중의 하나인 핵융합로를 위한 과학기술 기반을 마련하기 위해 개발된 중형급 토카막 실험장치로서 토카막 운전 영역의 확장과 안정성 확보, 정상상태 운전 도달을 위한 방법 연구, 최적화된 플라즈마 상태와 연속 운전 실현 등을 주요 목표로 하고 있다. 이를 위해 핵융합 반응에 의한 점화조건과 가까운 상태로 플라즈마를 가열해주어야 하며, 토카막 장치의 저항가열 이외에도 외부에서 추가 가열이 반드시 필요하다. 중성 입자빔 입사 장치는 현재 토카막에서 사용되고 있는 가열장치 중 가장 신뢰성있는 추가 가열 장치라 할 수 있으며 한국 원자력연구원에서는 1997년부터 KSTAR 토카막 실험 장치에 사용될 중성 입자빔 입사 장치를 개발해왔었다. 중성빔 입사 장치는 크게 이온원, 진공함, 열량계, 진공 펌프, 중성화 장치, 이온덤프와 전자석으로 이루어져 있으며, 이중 이온원은 중성빔의 성능을 좌우하는 핵심적인 장치라 할 수 있다. 최근 한국원자력연구원에서는 2 MW 중성 입자빔 입사장치용 이온원 개발을 완료하여 KSTAR 토카막 장치에 설치하였으며, 2013년 현재 KSTAR에는 총 두 개의 이온원이 장착되어 최대 약 3 MW 이상의 중수소 중성 입자빔을 입사하여 KSTAR 토카막 실험의 H-mode 달성과 운전 시나리오 연구에 많은 기여를 하고 있다. 한국원자력연구원에서 최초로 개발된 이온원은 미국 TFTR 장치에서 사용되었던 US LPIS (Long Pulse Ion Source)를 기본으로 하여 국내 개발을 수행하였다. 이 온원은 크게 플라즈마를 발생시키는 플라즈마 발생부와 발생된 이온을 인출 및 가속시키는 가속부로 구성되는데, 개발과정에서 가장 먼저 KSTAR의 장주기 운전에 적합하도록 플라즈마 방전부와 가속부의 냉각회로를 요구되는 열부하에 맞게 설계 수정하였다. 그 후 플라즈마 방전부는 방전 시간과 안정성, 플라즈마 밀도의 균일도, 정격 운전, 방전 효율 등을 고려하여 수정 보완하며 개발을 진행하여왔다. 가속부의 경우 국내 제작기술의 한계를 극복하기 위해 빔 인출그리드를 TFTR의 US LPIS 모델의 슬릿형 그리드 타입에서 원형 인출구 타입으로 변경하였으며, 이후 가속 전극의 고전압 내전력 문제, 빔 인출 전류와 전력, 인출 빔의 광학적 질(quality), 빔 인출 시간 동안의 안정성 등을 위해 그리드의 크기와 간격, 모양 등을 변경하여 개발을 수 행하여 왔다. 이 논문은 한국원자력연구원에서 개발이 진행되어 왔던 이온원들을 시간적으로 되짚어 보면서 현재까지의 성과와 문제점, 그리고 앞으로의 개발 방향에 대해 논의하고자 한다.

  • PDF

Analysis on the Performance and Temperature of the 3D Quad-core Processor according to Cache Organization (캐쉬 구성에 따른 3차원 쿼드코어 프로세서의 성능 및 온도 분석)

  • Son, Dong-Oh;Ahn, Jin-Woo;Choi, Hong-Jun;Kim, Jong-Myon;Kim, Cheol-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.1-11
    • /
    • 2012
  • As the process technology scales down, multi-core processors cause serious problems such as increased interconnection delay, high power consumption and thermal problems. To solve the problems in 2D multi-core processors, researchers have focused on the 3D multi-core processor architecture. Compared to the 2D multi-core processor, the 3D multi-core processor decreases interconnection delay by reducing wire length significantly, since each core on different layers is connected using vertical through-silicon via(TSV). However, the power density in the 3D multi-core processor is increased dramatically compared to that in the 2D multi-core processor, because multiple cores are stacked vertically. Unfortunately, increased power density causes thermal problems, resulting in high cooling cost, negative impact on the reliability. Therefore, temperature should be considered together with performance in designing 3D multi-core processors. In this work, we analyze the temperature of the cache in quad-core processors varying cache organization. Then, we propose the low-temperature cache organization to overcome the thermal problems. Our evaluation shows that peak temperature of the instruction cache is lower than threshold. The peak temperature of the data cache is higher than threshold when the cache is composed of many ways. According to the results, our proposed cache organization not only efficiently reduces the peak temperature but also reduces the performance degradation for 3D quad-core processors.

Underwater Channel Environment Analysis Using 10Khz Carrier Frequency at the Shore of West Sea (10kHz 반송파를 사용한 서해안 수중 채널환경 분석)

  • Kim, Min-sang;Ko, Hak-lim;Kim, Kye-won;Lee, Tae-seok;Im, Tae-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.1
    • /
    • pp.132-139
    • /
    • 2016
  • This study was carried out near the waters of Jango port, Dangjin-gun, Chungcheongnam-do by utilizing 10kHz carrier frequency, for the purpose of measurement and analysis of underwater channel environment of the Western sea. For the measurement of horizontal channel environment, the separation distance between transmitter and receiver is made differently in the range between 10m and 4000m. Meanwhile, for the measurement of vertical channel environment, transmission and receiving side ships are fixed as contacted each other and measured differently depending on their depth of submergence. In this study, the Coherence Bandwidth and the Coherence Time were estimated by analyzing the Power delay profile of the real sea based on the measured data, and analyzing the doppler frequency through frequency conversion of received tone-signal, respectively. This study is expected to become a base study in carrying out the frame design for underwater communication to improve the communication and secure the reliability of communication in future underwater channel environment.

A Study on Influence Factors for Tunnel Collapse Risk Analysis using Delphi Method (델파이 기법을 활용한 터널 붕괴 위험도 분석을 위한 영향인자 도출에 관한 연구)

  • Kim, Jeong Heum;Kim, Chang Yong;Lee, Seung Soo;Lee, Jun Hwan
    • The Journal of Engineering Geology
    • /
    • v.27 no.2
    • /
    • pp.165-172
    • /
    • 2017
  • This research aims to define influence factors to perform an optimized section design and evaluate tunnel collapse risk during construction using Delphi technique. A total of five upper classification systems were constructed through literature review, pervious research analysis, and brainstorming of expert group for establishing influence factors. The $1^{st}$, $2^{nd}$, and $3^{rd}$ Delphi survey process was proceeded by panel group which is consisted 21 experts to prevent errors and bias in the expert judgement process. In Delphi $1^{st}$ survey, a total of 22 influence factors candidates were derived through open-ended questionnaire. In Delphi $2^{nd}$ survey, questionnaire was proceeded based on 7-point Likert scale method. In order to verify the validity, CVR (Content Validity Ration) analysis was performed to exclude inappropriate candidates. In the $3^{rd}$ survey, verification of influence factors was proceeded once more with the result of $2^{nd}$ survey, and lastly, a total of 14 influence factors was derived by CVR and COV (Content Validity Ration) analysis for response of experts.

A Mobile Application Model for Local and Tour Information Services (향토관광정보서비스를 위한 모바일 앱 모형)

  • Yi, Yong Jeong;Yi, Dajeong;Lee, Changho;Yoon, Sohyun
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.1
    • /
    • pp.247-267
    • /
    • 2019
  • There has been low use of local information services that public libraries provide, and most of those services are limited only through in-house reading or checkout. Motivated by these issues, the study has developed a mobile application (app, hereafter) entitled as LibPass (a combination of Library and Pass) to propose new local information services that reflect the information needs of users. Regarding the design of LibPass, contents of LibPass are composed of the characteristics of local resources so that users can easily search for information about local culture and tour resources through mobile app. That is, it aims to provide efficient information services on local resources by providing information on accommodations, outdoor programs, and specialized libraries, as well as introducing tour resources. Above all, the services are provided with a single card issued by the National Library of Korea and is convenient to use anywhere in the country. It not only secures reliability and currency by utilizing various contents developed by public institutions, but also provides functions to facilitate specialized services for the local information of libraries. Based on the previous research, the present study derives the factors of quality evaluation of mobile tour information services; it constructs objects of LibPass application by analyzing existing applications and develops the prototype based on logical entity relationship model. This model can contribute to the increased use of local information services and, promotes the public's positive perception of the libraries through user-friendly applications.