• Title/Summary/Keyword: 오픈리스크

Search Result 9, Processing Time 0.025 seconds

Development of Automatic Conversion Tool for Establishing Inventory Database Exposed to Natural Disaster (자연재난 위험 인벤토리 데이터베이스 구축을 위한 자동변환 툴 개발)

  • Kim, Gilho;Kim, Kyungtak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2020.06a
    • /
    • pp.403-403
    • /
    • 2020
  • 국외에서 잘 알려진 Hazus-MH, RiskScape와 같은 자연재난 리스크 모델은 위험지역 내 노출된 자산과 인구의 공간적 분포 및 그 특성을 설명하는 지형공간자료 형태의 자산정보(인벤토리)를 필요로 한다. 본 연구는 이러한 자연재난 리스크 모델 운용에 필요한 건물, 인구, 농업, 차량 인벤토리 데이터 구조를 국내에서 가용가능한 자료를 기반으로 설계하고, 이들을 연계, 변환하기 위한 툴을 개발하였다. 본 연구에서 개발된 자동변환 툴은 오픈소스로 제공되는 QGIS를 기반으로 하였고, 개발 툴을 이용하여 2018년 말 기준의 인벤토리를 전국에 대해 구축하였다. 본 연구의 성과는 현재 시범운용 중인 행정안전부 풍수해 피해예측시스템을 비롯한 자연재난 리스크 모델링 과정에 활용될 것으로 기대된다.

  • PDF

Virtual Platform based on OpenRISC (OpenRISC 기반의 버츄얼 플랫폼)

  • Jang, HyeongUk;Lee, Jae-Jin;Byun, Kyungjun;Eum, Nakwoong;Jeong, Sangbae
    • Smart Media Journal
    • /
    • v.3 no.4
    • /
    • pp.9-15
    • /
    • 2014
  • A virtual platform models a processor core and the peripheral devices constituting the SoC in software. Major companies utilize a variety of platforms for product development with optimal SW+SoC integrated system architecture design and IP reuse based Top-Down design flow using a virtual platform. In this paper, we propose a virtual platform based on OpenRISC, an open source RISC based core. The proposed virtual platform supports high speed emulation of approximately 20 MIPS using DBT (Dynamic Binary Translation).

Global Network Verification Test for Docker-based Secured mobile VoIP (Docker 기반의 Secured mobile VoIP를 위한 글로벌 네트워크 실증 테스트)

  • Cha, ByungRae;Kang, EunJu
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the computing paradigm has been changing and VoIP technology is being revisited to support various services in ICT field. In this paper, we have designed and implemented the systems of software PBX open source Asterisk using light-weighted virtualization Docker technique, hardware platform, and mobile devices to support voice service based on secured mobile VoIP. And we verified the delay test of network traffics and the secured voice communication test in global real network environment.

The Impact of Consumer Characteristics Upon Trust and Purchase Intentions in B2C E-marketplaces (오픈마켓에서 개인특성이 신뢰 및 구매의도에 미치는 영향에 관한 실증연구)

  • Cho, Hwi-Hyung;Hong, Il-Yoo
    • Information Systems Review
    • /
    • v.12 no.3
    • /
    • pp.49-73
    • /
    • 2010
  • The lack of customer satisfaction and trust remains a key barrier to electronic commerce. From the standpoint of online merchants, it is critical to build consumer trust by lessening sources of apprehensions and uneasiness associated with online transactions. This paper explores the relationships between customer satisfaction and intermediary's trustworthiness factors in B2C e-marketplaces. It also aims at examining the effects of consumer characteristics, including propensity to trust and Internet shopping self-efficacy, upon trust and purchase intentions. To meet the research objectives, an empirical study has been conducted by surveying 223 active e-marketplace buyers in Korea. The findings of the present research indicate that customer satisfaction positively affects all the three attributes of trustworthiness (i.e., competence, benevolence, and integrity), and more specifically it has a quite strong association with benevolence. In addition, propensity to trust has no significant influence on trust or purchasing intentions, and only affects benevolence and integrity with no direct effect on competence. Finally, Internet shopping self-efficacy was found to affect both trust and purchasing intentions, suggesting that e-marketplaces seek an online strategy designed to strengthen loyalty for customers with high self-efficacy, while they use a strategy to improve the usability and usefulness of their website to attract customers with low self-efficacy. The paper concludes with implications and directions for future research.

Open Markets and FDS(Fraud Detection System) (오픈마켓과 부당거래 방지 시스템)

  • Yoo, Soon-Duck;Kim, Jung-Ihl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.113-130
    • /
    • 2011
  • Due to the development of information and communication technology, the global influence on politics, economics, society, and culture has grown. A major example of this impact on the economic sector is the growth of e-commerce, which increases both the speed and efficiency of businesses. In light of these new developments, businesses need to shift away from the misconception that information overwhelms to embrace the enhanced competitiveness that e-commerce provides. However, concern about fraudulent transactions through e-commerce is pertinent because of the loss in both critical revenue and consumer confidence in open markets. Current solutions for fraudulent transactions include real-time monitoring and processing, payment pending, and confirmation through SMS, E-mail, and other wired means. Our research focuses on the management of Fraud Detection Systems (FDS) to safeguard online electronic payment systems. With effective implementation of our research we hope to foster an honorable online trading culture and protect consumers. Future comparative research in domestic and abroad markets would provide further insight into preventing fraudulent transactions.

RAKTA: Automation of Exploratory Testing Based on Keyword (RAKTA: 키워드 기반 탐색적 테스팅 자동화)

  • Hwang, Jun-Sun;Choi, Eun Man
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.331-334
    • /
    • 2019
  • 일반적인 키워드 기반 테스트는 기능 위주의 키워드를 작성하여 테스트를 자동화하여 비용은 적게 들지만 활용도가 높은 테스트를 자동화기 어렵다. 한편 탐색적 테스트는 리스크 기반으로 차터를 작성하여 짧은 시간동안 많은 에러를 탐지하는 장점이 있으나, 문서화가 미흡하다는 단점이 있다. 위와 같은 단점을 보완하기 위하여 탐색적 테스트의 기본 원리를 고수하면서 효율적 키워드 기반 자동화가 가능한 RAKTA(Record And Keyword-based Test Automation) 방법론을 제안한다. RAKTA는 오픈 소스 키워드 기반 자동화 프레임워크인 로봇 프레임워크의 기술을 사용하여, 키워드 기반과, 탐색적 테스트의 장점을 뽑아 효율적으로 테스트 자동화하여 비용을 줄이고 많은 에러를 탐지할 수 있다. 또한 본 논문에서는 RAKTA 방법론을 활용한 여러 가지 키워드 재사용 사례와 기존 조직에서 사용하던 테스트 스크립트를 혼합하여 통합 테스트, 인수 테스트, 설치 테스트를 자동화하는 방법을 제안한다.

Design of Crossbar Switch On-chip Bus for Performance Improvement of SoC (SoC의 성능 향상을 위한 크로스바 스위치 온칩 버스 설계)

  • Heo, Jung-Burn;Ryoo, Kwang-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.3
    • /
    • pp.684-690
    • /
    • 2010
  • Most of the existing SoCs have shared bus architecture which always has a bottleneck state. The more IPs are in an SOC, the less performance it is of the SOC, Therefore, its performance is effected by the entire communication rather than CPU speed. In this paper, we propose cross-bar switch bus architecture for the reduction of the bottleneck state and the improvement of the performance. The cross-bar switch bus supports up to 8 masters and 16 slaves and parallel communication with architecture of multiple channel bus. Each slave has an arbiter which stores priority information about masters. So, it prevents only one master occupying one slave and supports efficient communication. We compared WISHBONE on-chip shared bus architecture with crossbar switch bus architecture of the SOC platform, which consists of an OpenRISC processor, a VGA/LCD controller, an AC97 controller, a debug interface, a memory interface, and the performance improved by 26.58% than the previous shared bus.

Which country's end devices are most sharing vulnerabilities in East Asia? (거시적인 관점에서 바라본 취약점 공유 정도를 측정하는 방법에 대한 연구)

  • Kim, Kwangwon;Won, Yoon Ji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1281-1291
    • /
    • 2015
  • Compared to the past, people can control end devices via open channel. Although this open channel provides convenience to users, it frequently turns into a security hole. In this paper, we propose a new human-centered security risk analysis method that puts weight on the relationship between end devices. The measure derives from the concept of entropy rate, which is known as the uncertainty per a node in a network. As there are some limitations to use entropy rate as a measure in comparing different size of networks, we divide the entropy rate of a network by the maximum entropy rate of the network. Also, we show how to avoid the violation of irreducible, which is a precondition of the entropy rate of a random walk on a graph.

Design and Verification Test of Virtualized VoIP to support Secured Voice Communication (음성 보안을 제공하기 위한 가상화 기반의 VoIP 설계 및 검증 테스트)

  • Cha, Byung-Rae;Park, Sun;Kim, Jong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2462-2472
    • /
    • 2014
  • Recently, the computing paradigm has been changing and VoIP technology is being revisited to support various services. In this paper, we have designed and implemented the system of software PBX open source Asterisk, hardware platform, and mobile devices to support secured voice service based on VoIP. Specially, we designed the various platform from single board to servers based on XenServer in hardware platform. And we verified the delay test of network traffics and the secured voice communication test based on this platform.