• Title/Summary/Keyword: 이중 인증

Search Result 138, Processing Time 0.026 seconds

A Study on the Chattering under Cryogenic Flow Test of a Oxidizer Shutoff Valve (산화제 개폐밸브의 극저온 유동시험에서 채터링의 고찰)

  • Lee, JoongYoup;Han, SangYeop;Lee, SooYong
    • Aerospace Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.108-117
    • /
    • 2013
  • The oxidizer shutoff valve of a gas generator controls the mass flow rate of the propellant of a rocket engine using pilot pressure and spring the force of the valve. The developing oxidizer shutoff valve can be shut off if the pilot pressure is removed from the actuator. Therefore, force balancing is necessary to analyze the characteristics of the forces with respect to the opening and closing of the valve in order to evaluate its performance. In light of this, the valve has been designed to adjust the control pressure required to open the poppet and to determine the working fluid pressure at which the valve starts to close. Under cryogenic flow test as a tests level of C.R.T(Control Random Test), the chattering phenomena occurred due to much leakage of a metal seat section. The pressure for chattering of the oxidizer valve is predicted at about 11 bar using force balancing analysis.

Study of Document Distribution System Architecture for Digital Secret Document Leakage Prevention (전자기밀문서 유출봉쇄 유통시스템 구조 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.143-158
    • /
    • 2010
  • The illegal leakage of enterprise digital confidential information will threaten the enterprise with bankruptcy. Today since most small-and-medium companies have no capability to fight against illegally compromising their critically confidential documents in spite of knowing the leakage of them, strongly safe distribution system of the digital confidential documents should be designed so in secure as to prevent any malicious intent of embezzlement from accessing the critical information. Current DRM-based protection system is not always perfect to protect the digital secrets, even seems to leave the secrets open. Therefore our study has analyzed the illegal leakage paths that hackers attack against and the vulnerability of the current protection systems. As result, we study the group communication based system architecture satisfying the security conditions to make even legitimate working employee keep out of the confidential documents, without performance degradation. The main idea of this architecture is to stay every secrets in encrypted form; to isolate the encrypted documents from the crypto-key; to associate every entity with one activity and to authenticate every entity with DSA-based public key system; multiple authentication method make hackers too busy to get a privilege to access the secrets with too many puzzle pieces. This paper deal with the basic architectural structure for the above issues.

A Study on Quadcopter Consisting of Dual Li-Po Battery Charging by Solar Cell in the Engineering Education Completed a Senier Project Work at the University (공학교육 이수체계에서 대학 졸업 작품용 이중 Li-Po 전원 사용 태양전지 충전 쿼드콥터 구성에 관한 연구)

  • Yoon, Seong-Geun;Kim, Kyung-Bin;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.8 no.1
    • /
    • pp.9-14
    • /
    • 2016
  • Depending on the college graduation project and graduation thesis regulations for the certification and graduation requirements, the quadcopter acting as a Li-Po battery that charges by solar energy are proposed a design method and improvements in theory. Quadcopter posture is balanced and confirmed by the position sensor, through a PID (Proportional Integral Differential) control. Battery switching circuit is composed of two Li-Po battery. Driving the quadcopter as one battery, and does not use other battery is charged by solar energy. A battery switching circuit is fabricated in a manner that uses two types of relays. Even if completely not charged to the battery is being driven a certain switch by the battery charging voltage from time to time, it proposes a method for increasing the endurance time and range.

Non-Interactive Oblivious Transfer Protocol based on EIGamal in WAP (WAP에서 사용 가능한 ElGamal 기반의 비대화형 불확정 전송 프로토콜)

  • 정경숙;홍석미;정태충
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.11-18
    • /
    • 2003
  • As the Internet moves to mobile environment, one of the most serious problems for the security is to required a new security Protocol with safety and efficiency. To solve the problem. we Propose a new Protocol that reduces the communication franc and solves the problem associated with the private security keys supplied by the trusted third party. The protocol is a non-Interactive oblivious transfer protocol, based on the EIGamal public-key algorithm. Due to its Non-Interactive oblivious transfer protocol, it can effectively reduce communication traffic in server-client environment. And it is also possible to increase the efficiency of protocol through the mechanism that authentication probability becomes lower utilizing a challenge selection bit. The protocol complexity becomes higher because it utilizes double exponentiation. This means that the protocol is difficult rather than the existing discrete logarithm or factorization in prime factors. Therefore this can raise the stability of protocol.

A Study on the Army Tactical C4I System Information Security Plan for Future Information Warfare (미래 정보전에 대비한 육군전술지휘정보체계(C4I) 정보보호대책 연구)

  • Woo, Hee-Choul
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.1-13
    • /
    • 2012
  • This study aims to analyze actual conditions of the present national defense information network operation, the structure and management of the system, communication lines, security equipments for the lines, the management of network and software, stored data and transferred data and even general vulnerable factors of our army tactical C4I system. Out of them, by carrying out an extensive analysis of the army tactical C4I system, likely to be the core of future information warfare, this study suggested plans adaptive to better information security, based on the vulnerable factors provided. Firstly, by suggesting various information security factor technologies, such as VPN (virtual private network), IPDS (intrusion prevention & detection system) and firewall system against virus and malicious software as well as security operation systems and validation programs, this study provided plans to improve the network, hardware (computer security), communication lines (communication security). Secondly, to prepare against hacking warfare which has been a social issue recently, this study suggested plans to establish countermeasures to increase the efficiency of the army tactical C4I system by investigating possible threats through an analysis of hacking techniques. Thirdly, to establish a more rational and efficient national defense information security system, this study provided a foundation by suggesting several priority factors, such as information security-related institutions and regulations and organization alignment and supplementation. On the basis of the results above, this study came to the following conclusion. To establish a successful information security system, it is essential to compose and operate an efficient 'Integrated Security System' that can detect and promptly cope with intrusion behaviors in real time through various different-type security systems and sustain the component information properly by analyzing intrusion-related information.

Comparative Assessment of Good Agricultural Practices Standards in Agricultural Product Quality Control Act with respect to Produce Safety Rule in Food Safety Modernization Act (식품안전현대화법의 농산물안전규칙과 농산물품질관리법의 농산물우수관리기준 비교평가)

  • Yoon, Deok-Hoon
    • Journal of Food Hygiene and Safety
    • /
    • v.33 no.1
    • /
    • pp.12-22
    • /
    • 2018
  • The US government has enacted the Food Safety Modernization Act (FSMA) in 2011, which is being phased in and planned. The final Rules of Produce Safety focus on biological hazards related to agricultural production, harvesting, packaging and storage, which are being phased in since 2017 depending on farm scale. As a result of comparison with the Korean-GAP (Good Agricultural Practices) standards, it is difficult to compare the two standards to be compared with each other by 1:1. However, many of the Korean-GAP standards are similar to FSMA Produce Safety rules. However, the Korean-GAP standards can be judged differently according to the evaluator as a comprehensive standard, so the details of the standards need to be reinforced. In terms of the provisions, the Korean-GAP standards are the most appropriate for the safety of workers (FSMA Subpart D), followed by livestock and wild animals (FSMA Subpart I), buildings, equipment and tools (FSMA Subpart L) and harvesting activities (FSMA Sub-part K). However, there are some weaknesses in the field of agricultural water management (FSMA Subpart E) and farm manager's qualifications and training (FSMA Subpart C), and the response to the biological soil amendments of animal origin and human waste (FSMA Subpart F) is weak. The FSMA regulation is not a certification standard, but it is expected that the marbling effect, which is the standard laid down by the United States leading the world food safety standards, is expected to be considerable. Therefore, we hope that the review of the Korean-GAP standards will help improve the quality of agricultural products and expand our exports, since the standard for responding to microbiological safety emphasized in the FSMA regulations is the Korean-GAP standard.

Improvement of the Soil Pollution Investigation in South Korea and Gyeonggi-do (전국 및 경기도를 대상으로 한 토양오염실태조사의 효율성 제고방안)

  • Na, Kyung-Ho;Kim, Jong-Chan
    • Journal of Soil and Groundwater Environment
    • /
    • v.13 no.6
    • /
    • pp.31-39
    • /
    • 2008
  • The purpose of this research is to evaluate the efficiency of soil pollution investigation conducted at South Korea and Gyeonggi-do, and to drive the way to improve its efficiency. The average pollution discovery rates in the soil pollution investigation were 2,7% in South Korea and 1.9% in Gyeonggi-do respectively during the last six years (2002${\sim}$2007), which the discovery rates were lower than those of Japan and United States of America. The exceeding rate of the Korea soil pollution standard of the heavy metal and petroleum compounds in the soil pollution investigation were 89.8% and 8.9%, respectively in the whole country. The investigation rate of topsoil for heavy metal and deepsoil analysis for petroleum compounds analysis were 38% and 62% respectively. This show contradictory result which is demanded the improvement of investigation method on the deep soil. The main steps affecting the discovery rate of soil pollution were site selection step, sampling step and analysis step. We suggested the the guideline of priority on the site selection step which was the most important step. Also, the certificate need to be provided to the companies which have lower soil pollution degree after conducting the soil pollution investigation.

A Study on Validation of OCLI for Evaluating of Life-Long Learning Ability (평생학습능력 평가를 위한 계속학습조사도구(OCLI: Oddi Continuing Learning Inventory) 타당화 연구)

  • Han, Ji-Young;Lee, Min-Young
    • Journal of Engineering Education Research
    • /
    • v.12 no.4
    • /
    • pp.75-83
    • /
    • 2009
  • The purpose of this study was to verify factor structure and validation of Oddi Continuing Learning Inventory (OCLI) and prove up possibility of usage as an evaluation tool for evaluating life-long learning. 330 students in school of engineering of I university at Incheon province were responded for OCLI. Data were analyzed using descriptive statistics, exploratory factor analysis and confirmatory factor analysis. As the exploratory factor analysis results, 24 items in original version were converted to 19 items. The total reliability was .774 and the total covariance was 40.57%. As the confirmatory factor analysis results, four items were removed and GFI .938, AGFI .915, CFI .908 appeared to fit all the criteria. The RMSEA index 0.054 also appeared to fit significantly higher.

A Study on Model Development for SW Human Resources Development using Supply Chain Management Model (SCM 모델을 이용한 SW인력양성 모형개발 연구)

  • Lee, Jung-Mann;Om, Ki-Yong;Song, Chan-Hoo;Kim, Kwan-Young
    • Journal of Korea Technology Innovation Society
    • /
    • v.10 no.1
    • /
    • pp.22-46
    • /
    • 2007
  • This article introduces a recent innovation in Korea's human resources development policy in the SW sector. Facing serious problems in cultivating SW engineers such as a mismatch in supply and demand of SW workers, shortage of globally competitive SW professionals, and insufficient education and training of university graduates, the Korean government has decided to adopt a new paradigm in national SW engineering education, based on supply chain management (SCM) in manufacturing. SCM has been a major component of the corporate competitive strategy, enhancing organizational productiveness and responsiveness in a highly competitive environment. It weighs improving competitiveness of the supply chain as a whole via long-term commitment to supply chain relationships and a cooperative, integrated approach to business processes. These characteristics of SCM are believed to provide insight into a more effective IT education and university-industry collaboration. On the basis of the SCM literature, a framework for industry-oriented SW human resources development is designed, and then applied in the case of nurturing computer-software engineers in Korea. This approach is expected to fumish valuable implications not only to Korean policy makers, but also to other countries making similar efforts to enhance the effectiveness and flexibility in human resources development. The construction of SCM-based SW HRD model is first trial to apply SCM into SW HRD field. The model is divided into three kinds of primary activities and two kinds of supportive activities in the field of value chain such as SW HRD Council, SW demand and supply plan establishment and the integration of SW engineering capabilities that contribute the reduction of the skill and job matching through SW HR demand and supply collaboration.

  • PDF

Integrating Portable Internet with cdma2000 Mobile Communication Networks for Seamless Service (연속적인 서비스를 위한 휴대 인터넷과 cdma2000 이동통신망의 연동 방안)

  • Cho Jinsung;Kim Jeong Gem
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11B
    • /
    • pp.920-929
    • /
    • 2004
  • Nowadays, wireless packet data services are provided over cdma2000 1x/1xEV-DO mobile communication network and Portable Internet are being standardized for users demanding higher data rate services. Portable Internet can provide high data rate services, but its service coverage is relatively small. If Portable Internet may be integrated with cdma2000 mobile networks, users are able to choose the best service according to service areas and get seamless services while they are moving around. At the same time, it is cost-effective for operators to construct and maintain the integrated network. For the purpose of effectively integrating Portable Internet into cdma2000 networks, we propose an integration scheme including network architecture, protocol architecture, functions in network elements, interfaces between them, and call-flow procedures. The integration scheme proposed in this paper adopts a tightly-coupled architecture for unified authentication/accounting and seamless services. In addition, the scheme can be implemented without modifying the existing cdma2000 mobile communication networks. It is also simple to develop the dual-mode mobile station. Through the simulation results based on the performance model for handoffs between cdma2000 and Portable Internet, it has teen validated that the proposed scheme diminishes packet losses compared with the loosely-coupled architecture.