• Title/Summary/Keyword: 연동 방안

Search Result 833, Processing Time 0.027 seconds

An Implementation of Product Data Management System for Design of Ship Propulsion System (선박 추진시스템 설계를 위한 PDM 구현)

  • Suh, Sung-Bu
    • Journal of Navigation and Port Research
    • /
    • v.35 no.6
    • /
    • pp.489-494
    • /
    • 2011
  • Present study introduces an implementation of product data management (PDM) that can be applied to the design of ship propulsion system. The PDM system is developed based on both object oriented software development environment and Open Scene Graph (OSG) library while the system architecture is modeled by the unified modeling language (UML). Suggested PDM system also integrates the modeling & simulation components required to estimate the performance of ship propulsion system as the product information is represented based on the 3-dimensional digital mock-up (DMU). Finally, functions of the implemented PDM system that is integrated with the M&S softwares are illustrated in order to suggest a practical guidance for the efficient design of ship propulsion system.

Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice (구글 보이스 취약점을 통한 안드로이드 서드 파티 어플리케이션의 사용자 인증 개선방안 연구)

  • Lee, Seyeong;Park, Jaekyun;Hong, Sungdae;Choi, Hyoungki
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.23-32
    • /
    • 2015
  • In the Android market, a large portion of the market share consists of third party applications, but not much research has been performed in this respect. Of these applications, mobile Voice Over IP (VoIP) applications are one of the types of applications that are used the most. In this paper, we focus on user authentication methods for three representative applications of the Google Voice service, which is a famous mobile VoIP application. Then, with respect to the Android file system, we developed a method to store and to send user information for authentication. Finally, we demonstrate a vulnerability in the mechanism and propose an improved mechanism for user authentication by using hash chaining and an elliptic curve Diffie-Hellman key exchange.

Verification Test for Web service of River Geospatial Information (하천공간정보 웹 서비스에 관한 검증 테스트 방안)

  • Hong, Sung Soo;Shin, Hyung Jin;Hwang, Eui Ho;Chae, Hyo Suk
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.548-548
    • /
    • 2015
  • 과거 1990년대에 인터넷 이용이 전 세계로 확산되면서 World Wide Web를 이용하여 다양한 웹 서비스 기술의 구현 및 유통은 현재에도 개발되고 있다. 일반적으로 오늘날의 서비스는 XML 및 인터넷을 통하여 웹 서비스로 구현한 응용프로그램간의 연동을 가능하게 하는 기반기술이다. 이는 단순 객체 접근 프로토콜(SOAP), 웹 서비스 기술 언어(WSDL), 전역 비즈니스 레지스트리(UDDI) 등의 표준 기술을 사용하여 네트워크에 연결된 다른 컴퓨터 간의 분산 컴퓨팅을 지원하는 소프트웨어 및 기술이다. 이러한 웹 서비스의 발전으로 웹 서비스의 성능이 웹 서비스 제공자의 성패를 좌우하게 되고, 제공하고 있는 웹 서비스에 대한 검증이 필요하게 되었다. 웹 서비스에 대한 검증은 미국 Bloor NA(Bloor Research-North America)에서 웹 서비스 아키텍처의 단점을 발표하여 서비스의 품질과 신뢰성 및 개선점에 대하여 제시되어 활발한 연구가 진행 중에 있다. 그러나 사용자 관점에서 웹 서비스의 성능을 측정하고, 단순한 서비스 제공자의 서비스 검증 목적만이 아닌 서비스 제공자의 성능을 서비스 사용자에게 제공하는 검증 방법에 관한 연구가 많지 않은 실정이다. 하천공간정보에 대하여 웹 서비스 방식 중 통신 프로토콜인 HTTP 등을 이용한 인터넷상의 메시지 교환을 가능하게 하는 통신 프로토콜인 SOAP 및 WWW와 같은 분산 하이퍼미디어 시스템을 위한 소프트웨어 아키텍처의 한 형식인 REST(Representational State Transfer)를 실행하여 이에 따른 검증 프로세스를 수립하였다. 하천공간정보 웹 서비스에 대한 테스트 시나리오는 응답시간, 임계성능, 이용가능성, 신뢰성 및 접근성에 대하여 검증하며 하나 이상의 웹 서비스들 간의 호환성 표준의 준수 여부와 상호 운용 가능 여부를 테스트 하는 상호운용성 테스트, 신뢰성 메시징 및 분산 환경에서의 트랜잭션 처리 성능을 검증하는 웹 서비스 프로세스 품질 테스트를 실시하는 방안을 도출하고자 한다.

  • PDF

Network Configuration Study for Multi-Satellite Operations (다중위성운영을 위한 네트워크 구성 방안 연구)

  • Baek, Hyun Chul;Jang, In Sik;Lee, Sang Jeong;Kim, Byung Chul;Lee, Jae Yong
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.4
    • /
    • pp.1-9
    • /
    • 2019
  • Integration of satellites with diverse missions, such as broadcast-communication, earth, meteorologicaland marine observations, and navigation, is vulnerable. The problems of the currently constructed ground station network were analyzed by constructing the test environment. Based on this, we designed a network that was capable of operating multiple satellites by one ground station. In addition, we proposed an interface and network configuration method with domestic and foreign ground stations. The network linking the domestic and foreign ground stations was composed of KREONET (Korea Research Environment Open Network) and GLORIAD (Global Ring Network for Advanced Application Development) of the KISTI(Korea Institute of Science and Technology Information). The internal network consists of VPN (Virtual Private Network), DMZ(De-Militarized Zone), and 1-way USB and so forth. By constructing the network by using the proposed method, harmful data, such as virus inflow and infection, can be blocked.

Defense software test procedure improvement measure reflecting the TMMi (TMMi를 반영한 국방 소프트웨어 테스트 절차 발전방안)

  • Park, Yeon-Dong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.1
    • /
    • pp.87-93
    • /
    • 2021
  • As the portion of modern weapons systems equipped with electronic components increases, the presence of embedded software has also increased, subsequently drawing interest in quality management and development methods. Unlike mechanical systems, software is logically intangible, hard to troubleshoot, and hard to reuse, making it hard to utilize limited resources when exposed to failures. The United States had successful results in establishing the Capability Maturity Model (CMM) by studying and applying separate processes for development and quality management of defense software. South Korea has also established, and utilizes, a standard of development and quality management for defense software based on international standards. However, some say those standards still remain at a basic level, and should be modified along with the progress in software. If the standard stays at a basic level, compared to software progression, the cost to reuse and restore resources will increase exponentially. This paper discusses improvement in the test processes for defense software through the Test Maturity Model-integration (TMMi)-derived from the CMM-and presents a blueprint for defense software quality management.

A Study on the Utilization of BIM Model using Vertex Data-based Division Method (정점데이터기반 분할기법을 활용한 BIM모델의 활용 방안 연구)

  • Jae-Yeong, Hwang;Jae-Hee, Lee;Leen-Seok, Kang
    • Land and Housing Review
    • /
    • v.14 no.1
    • /
    • pp.123-134
    • /
    • 2023
  • The BIM (Building Information Modeling) model created in the design stage can be used for prior review and schedule management for the construction stage. However, in the case of actual BIM application cases, additional work is required, such as creating a new model suitable for the construction stage, rather than using the 3D model in the design stage, due to the difference in the purpose of use between the design stage and the construction stage. Therefore, in this study, a division function of BIM model is proposed as a method of recycling it in the construction stage without a remodeling process. In addition, the application to the actual BIM model and the 4D CAD system linkage of the divided object and the comparison with the existing division method are used to verify the usability.

A study on the three-dimensional display of onboard training for Naval Combat System. (함정 전투체계 모의훈련 시나리오 3차원 전시방안 연구)

  • Lee, SuHoon;Ahn, JinSu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.62-65
    • /
    • 2022
  • NCS(Naval Combat System) is a system that maximizes the combat effectiveness for the naval ships by providing track detection, tracking, thereat analysis, engagement, hit assessment and many other capabilities using ship integrated heterogeneous sensor and weapon systems. In order to achieve the purpose of the NCS, every crew is require to be proficient in the operation of NCS. In accordance with the goal, NCS provides a onboard training function, and the crew conducts system operation proficiency and teamwork training on the ship. Training instructors for control training should have a high standard of training environment control and monitoring capabilities, which need to be studied. This paper studies a 3D display method for visualizing the training situation of training instructors.

  • PDF

A study on modularization of public data that can be used universally in the field of big data education (빅데이터교육 현장에서 범용적으로 활용 가능한 공공데이터 모듈화 연구)

  • Su-Youn Choi;Jong-Youel Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.655-661
    • /
    • 2023
  • Big data, an important element of the 4th industrial revolution, is actively opening public data in public institutions and local governments. In the public data portal, everyone can conveniently search for data and check related data, but only those in ICT-related fields are using public data. Although data held by public institutions is open to citizens, it is difficult for anyone to easily utilize public data to develop applications. In this paper, data provided in open API format from public data portals has XML and JSON formats. In this study, we are a method of modularizing public data in XML format into a part that can be easily developed by linking it to a GUI interface. Based on the necessary public data, we propose a way to easily develop mobile programs and promote the use of public data.

Efficiency Analysis of Integrated Defense System Using Artificial Intelligence (인공지능을 활용한 통합방위체계의 효율성 분석)

  • Yoo Byung Duk;Shin Jin
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.147-159
    • /
    • 2023
  • Recently, Chat GPT artificial intelligence (AI) is of keen interest to all governments, companies, and military sectors around the world. In the existing era of literacy AI, it has entered an era in which communication with humans is possible with generative AI that creates words, writings, and pictures. Due to the complexity of the current laws and ordinances issued during the recent national crisis in Korea and the ambiguity of the timing of application of laws and ordinances, the golden time of situational measures was often missed. For these reasons, it was not able to respond properly to every major disaster and military conflict with North Korea. Therefore, the purpose of this study was to revise the National Crisis Management Basic Act, which can act as a national tower in the event of a national crisis, and to promote artificial intelligence governance by linking artificial intelligence technology with the civil, government, military, and police.

BIM-based visualization technology for blasting in Underground Space (지하공간 BIM 기반 발파진동 영향 시각화 기술)

  • Myoung Bae Seo;Soo Mi Choi;Seong Jong Oh;Seong Uk Kim;Jeong Hoon Shin
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.67-76
    • /
    • 2023
  • We propose a visualization method to respond to civil complaints through an analysis of the impact of blasting. In order to analyze the impact of blasting on tunnel excavation, we propose a simulation visualization method considering the mutual influence of the construction infrastructure by linking measurement data and 3D BIM model. First, the level of BIM modeling required for simulation was defined. In addition, vibration measurement data were collected for the GTX-A construction site, terrain and structure BIM were created, and a method for visualizing measurement data using blast vibration estimation was developed. Next, a spherical blasting influence source library was developed for visualization of the blasting influence source, and a specification table that could be linked with Revit Dynamo automation logic was constructed. Using this result, a method for easily visualizing the impact analysis of blasting vibration in 3D was proposed.