• Title/Summary/Keyword: 요구기반 중복

Search Result 189, Processing Time 0.026 seconds

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Smart Media Journal
    • /
    • v.4 no.4
    • /
    • pp.80-85
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

Proposal of Bus-stop Information Design Guideline Based on User Experience Design -The Case of Seoul Metropolitan City- (사용자 경험 디자인을 기반으로 한 버스정류장 정보 디자인 가이드라인 제안 연구 -서울시를 중심으로-)

  • Kim, Tae-Hee;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.351-356
    • /
    • 2018
  • The aim of this study is to propose guidelines for bus-stop information design that is more congested with the advent of U-Shelter, via case studies and focus group interviews. First, the literature research explored the concept of information design and correlation of information design and route map. Second, raising problems and consider improvement plans through case study in korea, overseas. Finally, current information design was evaluated and user's requests were derived through focus group interview. The current information design had problems with lack of priority, information overlaying, and hard recognition. Priority shall be selected by bus route, direction of bus, arrival time, interval, and operating time, and information overlay can be reduced into one. Also visualize the connection and direction between the lines using schematic and two-dimensional lines and shapes for recognition. Through this study, it will be used as a reference material to help improve and develop the bus-stop information design.

Design of Push Agent Model for transmission of the Efficient Information (효율적인 정보 전송을 위한 푸시 에이전트 모델 설계)

  • 최은실;김광종;이연식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.545-549
    • /
    • 2002
  • For the efficient method for acquisition of informations suitable to user's preferences and objectives in distributed environment, various researches on push agent which automatically processes its roles and sends the results to users are continued. The existing push agent models have induced increasing network overheads and traffics by continuous transmission of informations in the network environment of limitative bandwidth. In this paper, for the solution of the problems on these existing push agent systems and their interoperability, we design a push agent model based on CORBA event service. The proposed model solves the above problems and provides the retrieved results which are more suitable for user's requirement more fast and stably through the optimal path searching and controling method. And, it also supports the filtering technique for processing the duplicated or useless data that comes from the various distributed information systems.

  • PDF

Context cognition technology through integrated cyber security context analysis (통합 사이버 보안 상황분석을 통한 관제 상황인지 기술)

  • Nam, Seung-Soo;Seo, Chang-Ho;Lee, Joo-Young;Kim, Jong-Hyun;Kim, Ik-Kyun
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.313-319
    • /
    • 2015
  • As the number of applications using the internet the rapidly increasing incidence of cyber attacks made on the internet has been increasing. In the equipment of L3 DDoS attack detection equipment in the world and incomplete detection of application layer based intelligent. Next-generation networks domestic product in high-performance wired and wireless network threat response techniques to meet the diverse requirements of the security solution is to close one performance is insufficient compared to the situation in terms of functionality foreign products, malicious code detection and signature generation research primarily related to has progressed malware detection and analysis of the research center operating in Window OS. In this paper, we describe the current status survey and analysis of the latest variety of new attack techniques and analytical skills with the latest cyber-attack analysis prejudice the security situation.

An Efficient Flooding Algorithm with Adaptive Retransmission Node Selection for Wireless Sensor Networks (무선 센서 네트워크에서의 적응적 재전송 노드 선택에 의한 효율적인 Flooding 알고리즘)

  • Choi, Seung-Joon;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.11B
    • /
    • pp.673-684
    • /
    • 2007
  • In this paper, we introduce an FARNS (Flooding algorithm with Adaptive Retransmission Nodes Selection). It is an efficient cross layer-based flooding technique to solve broadcast storm problem that is produced by simple flooding of nodes in wireless sensor network. FARNS can decrease waste of unnecessary energy by preventing retransmission action of whole network node by deciding retransmission candidate nodes that are selected by identification in MAC and distance with neighborhood node through received signal strength information in PHY. In simulation part, we show the results that FARNS has excellent performance than the other flooding schemes in terms of broadcast forwarding ratio, broadcast delivery ratio, number of redundancy packets and overhead. And FARNS can adjust of node ratio for retransmission operation, it can solve broadcast storm problem as well as meet the requirements of various network environments.

A Low-latency L2 Handoff Scheme between WiBro and cdma2000 Mobile Networks (WiBro와 cdma2000 이동통신망간 적은 지연을 위한 L2 핸드오프 방안)

  • Lee, Geon-Baik;Cho, Jin-Sung
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.873-880
    • /
    • 2006
  • Since various networks are deployed and the most of users request higher mobility, there are many researches about the interworking between widely deployed 3G network and rapidly boarded WLAN. On the other side, WiBro is focused on as a next generation network, because many people expect that WiBro gives satisfaction about the enough mobility and mass data transmission. So the study of the integration between WiBro and cdma2000 will show better effects than the present study of the integration between WLAN and cdma2000. The L2 handoff proposed in this paper takes advantages over the existing L3 handoff scheme because it does not require the L3 procedure for the mobility unlike the L3 handoff. Through extensive computer simulations, the efficiency of the proposed scheme has been validated.

HDL Codes Generator for Cyclic Redundancy Check Codes (순환중복검사 부호용 하드웨어 HDL 코드 생성기)

  • Kim, Hyeon-kyu;Yoo, Ho-young
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.896-900
    • /
    • 2018
  • Traditionally, Linear Shift Feedback Register (LFSR) has been widely employed to implement Cyclic Redundant Check (CRC) codes for a serial input. Since many applications including network and storage systems demand as high throughput as ever, various efforts have been made to implement CRC hardware to support parallel inputs. Among various parallel schemes, the look-ahead scheme is one of the most widely used schemes due to its short critical path. However, it is very cumbersome to design HDL codes for parallel CRC codes since the look-ahead scheme is inevitable to consider how register and input values move in the next cycles. Thus, this paper proposes a novel CRC hardware generator, which automatically produces HDL codes given a CRC polynomial and parallel factor. The experimental results verify the applicability to use the proposed generator by analyzing the synthesis results from the generated HDL code.

Elderly Speech Signal Processing: A Systematic Review for Analysis of Gender Innovation (노인음성신호처리: 젠더혁신 분석에 대한 체계적 문헌고찰)

  • Lee, JiYeoun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.148-154
    • /
    • 2019
  • The purpose of this study is to review systematically the literatures on the research of the elderly speech signal processing based on the domestic gender innovation and to introduce the utility and innovation of the gender analysis methods. From 2000 to present, among the 37 research papers published in the Korean Journal, 25 papers were selected according to the inclusion and exclusion criteria. And gender analysis methods were applied to gender research subject and design. Research results show diversity of research field and high gender recognition of R & D team are needed in research and development of engineering of gender innovation perspective. In addition, government-level regulation and research funding should be systematically applied to gender innovation research processes in the elderly voice signal processing and various gender innovation projects. In the future gender innovation in the elderly speech signal processing can contribute to the creation of a new market by developing a voice recognition system and service that reflects the needs of both men and women.

A Method to Provide Context from Massive Data Processing in Context-Aware System (상황인지 시스템에서 대용량의 데이터 처리결과를 컨텍스트 정보로 제공하기 위한 방법)

  • Park, Yoo Sang;Choi, Jong Sun;Choi, Jae Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.4
    • /
    • pp.145-152
    • /
    • 2019
  • Unlike a single value from a sensor device, a massive data set has characteristics for various processing aspects; input data may be formed in a different format, the size of input data varies, and the processing time of analyzing input data is not predictable. Therefore, context aware systems may contain complex modules, and these modules can be implemented and used in different ways. In order to solve these problems, we propose a method to handle context information from the result of analyzing massive data. The proposed method considers analysis work as a different type of abstracting context and suggests the way of representing context information. In experiment, we demonstrate how the context processing engine works properly in a couple of steps with healthcare services.

A Study on Improvement in Quality System Evaluation for Production Approval of Aircraft and Parts (항공기 및 부품 생산승인을 위한 품질시스템 평가기준 개선 연구)

  • Kang-Yi Lee;Jae-Hoon Han;Jung-Sam Lee
    • Journal of Aerospace System Engineering
    • /
    • v.17 no.6
    • /
    • pp.118-126
    • /
    • 2023
  • Most of the aerospace industries establish the SAE AS9100 Quality Management System, and acquire commercial certification by the 3rd party. Nevertheless, they repeatably have to cope with similar quality system evaluation by the airworthiness authority for the production certificate, parts manufacturer approval, and technical standard order authorization in accordance with the applicable regulations. The current quality system evaluation criteria of the airworthiness authority could be recommended for reforms in order to reduce duplication and correspond to the industrial development and environmental changes. In this paper, we propose measures to reform the authority's evaluation criteria through comparative analysis among the IAQG SAE AS9100, the FAA quality system codes, and the MOLIT ACSEP requirements.