• Title/Summary/Keyword: 통합 관리 소프트웨어

Search Result 503, Processing Time 0.027 seconds

Implementation of a DCS Terminal Remote Monitoring Middleware using RF Communication (RF 통신을 이용한 DCS 터미널 원격 감시 미들웨어 구현)

  • Ha, Jong-Hyun;Choi, Seong-Kyou;Rho, Ju-Yong;Jung, Heon-Man;Lee, Se-Hoon
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.129-134
    • /
    • 2006
  • In this paper, we designed and implemented DCS terminal remote monitoring middleware for real-time auditor and management terminal status signal with relay and fuse status at power management room. The middleware consist of four component as event analyzer, event manager, service manager and user interface. We expected economic effects extend relay life-time that pre-detected errors and prevented relay fault.

  • PDF

Design of Standby Power Shut-off Client Based on Near Field Communication (근거리 무선통신(NFC) 기반의 대기전력 차단 클라이언트 설계)

  • Chun, Joong-Chang;Rho, Jin-Song;Choi, Kyung-Sun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.978-980
    • /
    • 2013
  • In this paper, we have presented a basic idea of a power shut-off client based on NFC (near field communication). For the first step of the system design, we have shown the conceptual diagrams of the hardware configuration and the software logic flow. This system can be applied to the integrated power control in home, office, school, factory, and apartment. The standby power shut-off system will bring saving in electrical energy and cost.

  • PDF

Design of Ubiquitous Healthcare Service Development Framework for Ubiquitous Hospital (유비쿼터스 병원 구축을 위한 유비쿼터스 헬스케어 서비스 개발 프레임워크 설계)

  • Yang, Won-Seob;Lee, Seung-Hee;Lee, Keon-Myung;Kim, Wun-Jae;Yun, Seok-Jung
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2006.11a
    • /
    • pp.57-60
    • /
    • 2006
  • 최근 유비쿼터스 헬스케어 서비스를 이용한 시간과 공간의 제약 없이 각종 의료서비스와 건강관리를 제공받는 유비쿼터스 헬스케어에 대한 관심이 증대되고 있다. 유비쿼터스 헬스케어 산업은 특성상 단일 제품이나 서비스로만 존재하지 않고, 의료정보, 장비, 소프트웨어, 네트워크, 전자상거래 등의 보건 의료를 구성하는 모든 산업이 IT에 기반 하여 집약된 새로운 산업분야이다. 이러한 산업 특성상 유비쿼터스 헬스케어 서비스는 다양한 기술들을 이용하기 때문에 이들을 서비스의 개발, 이용 단계에서 통합된 환경을 제공받아 이용하는 것이 효과적이다. 본 논문에서는 유비쿼터스 헬스케어 서비스 이용을 위한 서비스 시스템 아키텍쳐를 제안하고, 제안된 시스템에서 이용할 수 있는 서비스들을 개발하기 위한 유비쿼터스 헬스케어 서비스 개발 Framework을 설계한다. 제안된 시스템 아키텍쳐와 개발 Framework을 이용하면 헬스케어 서비스 이용자에게 적절한 인터페이스의 제공과 질환에 대한 추적 관찰, 증상의 판단, 진료 지원, 건강관리, 외부 기관과의 정보 교환 등의 서비스를 개발할 수 있다.

  • PDF

Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL) (취약성 점검 코드를 자동으로 생성하는 에이전트를 통한 통합 취약성 분석 시스템)

  • 김수용;서정석;조상현;김한성;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.111-122
    • /
    • 2002
  • Malicious attackers generally attempt to intrude the target systems by taking advantage of existing system vulnerabilities and executing readily available code designed to exploit blown vulnerabilities. To the network security administrators, the rat and minimal step in providing adequate network security is to identify existing system vulnerabilities and patch them as soon as possible. Network-based vulnerability analysis scanners (NVAS), although widely used by network security engineers, have shortcomings in that they depend on limited information that is available and generally do not have access to hast-specific information. Host-based vulnerability analysis scanner (HVAS) can serve as an effective complement to NVAS. However, implementations of HVAS differ from one platform to another and from one version to another. Therefore, to security engineers who often have to maintain a large number of heterogeneous network of hosts, it is impractical to develop and manage a large number of HVAS. In this paper, we propose an agent-based architecture named ISMAEL and describe its prototype implementation. Manager process provides various agent processes with descriptiom on vulnerabilities to check, and an agent process automatically generates, compiles, and executes an Java code to determine if the target system is vulnerable or not. The result is sent back to the manager process, and data exchange occurs in % format. Such architecture provides maximal portability when managing a group of heterogeneous hosts and vulnerability database needs to be kept current because the manager process need not be modified, and much of agent process remains unchanged. We have applied the prototype implementation of ISMAEL and found it to be effective.

Development of Integrated TCU for Multimedia Communication Devices Control (멀티미디어 통신기기 제어를 위한 통합 TCU 개발)

  • Lim, Yangmi;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.1-6
    • /
    • 2014
  • Companies almost don't use an integrated control system using expensive network system in multimedia like TV and DID, despite IP-Broadcasting and communication equipment have expanded rapidly. The proposed integrated TCU(terminal control unit) is a control device that supports TV power On/Off check and remote control, power control reservation function, TV channel change, a variety of interface supports of input/output AC power & Lan port, RS-232C and IR using existing IP network after there is installed the Wake-on -Lan in the set-top box. The TCU can control and monitor 24 hours unlike existing low-cost control system RF method. In existing control equipment markets without expandability and low price, the TCU development including 24 hours monitoring and automatic control functions is expected to secure a wide range of companies.

Hierarchy Interface System for a Data Management of VLSI/CAD Software (VLSI /CAD 소프트웨어의 데이타 관리를 위한 계층적 인터페이스 시스템)

  • Ahn, Sung-Ohk
    • The Journal of Natural Sciences
    • /
    • v.8 no.1
    • /
    • pp.115-121
    • /
    • 1995
  • The Conventional database management system is not applicable because of their inadequate performance and difficulty of CAD database that is dependant to hierarchical structure and to repeat accesses of large data. For effective management and easy tool integration of CAD database, hierarchy Interface System(HIS) is designed and GROCO(Graph Representation fOr Complex Objects) Model is presented. Hierarchy Interface System which is composed of two subsystems of a configurator and a converter is designed for the interface between a conventional database management system and CAD tools. GROCO Model is a directed cyclic graph having five node-types for representing semantics and supports efficiently CAD database characters having a hierarchical structure of complex objects.

  • PDF

IACS UR E26 - Analysis of the Cyber Resilience of Ships (국제선급협회 공통 규칙 - 선박의 사이버 복원력에 대한 기술적 분석)

  • Nam-seon Kang;Gum-jun Son;Rae-Chon Park;Chang-sik Lee;Seong-sang Yu
    • Journal of Advanced Navigation Technology
    • /
    • v.28 no.1
    • /
    • pp.27-36
    • /
    • 2024
  • In this paper, we analyze the unified requirements of international association of classification societies - cyber resilience of ships, ahead of implementation of the agreement on July 1, 2024, and respond to ship cyber security and resilience programs based on 5 requirements, 17 details, and documents that must be submitted or maintained according to the ship's cyber resilience,. Measures include document management such as classification certification documents and design documents, configuration of a network with enhanced security, establishment of processes for accident response, configuration management using software tools, integrated network management, malware protection, and detection of ship network security threats with security management solutions. proposed a technology capable of real-time response.

A Study on the Army Tactical C4I System Information Security Plan for Future Information Warfare (미래 정보전에 대비한 육군전술지휘정보체계(C4I) 정보보호대책 연구)

  • Woo, Hee-Choul
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.1-13
    • /
    • 2012
  • This study aims to analyze actual conditions of the present national defense information network operation, the structure and management of the system, communication lines, security equipments for the lines, the management of network and software, stored data and transferred data and even general vulnerable factors of our army tactical C4I system. Out of them, by carrying out an extensive analysis of the army tactical C4I system, likely to be the core of future information warfare, this study suggested plans adaptive to better information security, based on the vulnerable factors provided. Firstly, by suggesting various information security factor technologies, such as VPN (virtual private network), IPDS (intrusion prevention & detection system) and firewall system against virus and malicious software as well as security operation systems and validation programs, this study provided plans to improve the network, hardware (computer security), communication lines (communication security). Secondly, to prepare against hacking warfare which has been a social issue recently, this study suggested plans to establish countermeasures to increase the efficiency of the army tactical C4I system by investigating possible threats through an analysis of hacking techniques. Thirdly, to establish a more rational and efficient national defense information security system, this study provided a foundation by suggesting several priority factors, such as information security-related institutions and regulations and organization alignment and supplementation. On the basis of the results above, this study came to the following conclusion. To establish a successful information security system, it is essential to compose and operate an efficient 'Integrated Security System' that can detect and promptly cope with intrusion behaviors in real time through various different-type security systems and sustain the component information properly by analyzing intrusion-related information.

Design and Evaluation of an Agent-based Intelligent System Modeling Architecture for Cockpit Agenda Management (항공시스템 아젠다 관리를 위한 에이젼트 모델의 설계 및 평가)

  • Cha, Woo-Chang
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.6
    • /
    • pp.642-650
    • /
    • 2000
  • The pilot (human actor) involved in the control loop of the highly automated aircraft systems (machine actor) must be able to monitor these systems just as the machine actor must also be able to monitor the human actor. For its safety and better performance of the human machine system, each of the two elements must be knowledgeable about the other's intentions or goals. In fact, several recent accidents occurred due to goal conflicts between human and machines in a modern avionic system. To facilitate the coordination of these actors, a computational aid was developed. The aid, which operates in a part-task simulator environment, attempts to facilitate the management of the goals and functions being performed to accomplish them. To provide an accurate knowledge of both actors' goals and their function statuses, the aid uses agent-based objects representing the elements of the cockpit operations. This paper describes the development of the flightdeck goals and functions called Agenda Management.

  • PDF

Implementation of a Mobile Agent Platform for Handheld Devices to Access the SNMP MIB (SNMP MIB 액세스를 위한 휴대단말기용 이동에이전트 플랫폼)

  • 전병국;김영철
    • Journal of Internet Computing and Services
    • /
    • v.3 no.2
    • /
    • pp.87-95
    • /
    • 2002
  • Due to rapid development of high speed wire/wireless internet technologies, at the current age, it cares into being one phenomenon that the internet business is able to work on anyplace and anytime. In this environment, a technology of mobile agent provides very useful mechanism for personal handheld devices because of supporting migration as autonomously executable software object Instead of users. Therefore, this paper focuses on Implementing a mobile agent platform for personal handheld devices, which supports mobile agents in wire/wireless internet environment. To do this, we construct the system with modified JAMAS, based on Java, in our previous research. Based on our proposed system, we implement the browsing application in personal handheld devices to access the MIB(Management Information Base) on SNMP(Simple Network Management Protocol), which supervises network environment on wire/wireless internet. This proposed application system is easily to access the MIB managed by SNMP agent. then provides network map viewer and updates the MIB through the browser to network administrator. As a result, we can support application area of mobile agents such as hare network management. M-Commerce, integration of remote database systems, active message and active network with personal handheld devices.

  • PDF