• Title/Summary/Keyword: 표적 서비스

Search Result 82, Processing Time 0.023 seconds

A Study of Platform for Management and Real-Time Service of Distributed Objects (분산 객체들의 관리와 실시간 서비스를 위한 플랫폼의 연구)

  • Kim, Myung-Hee;Joo, Su-Chong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.297-300
    • /
    • 2001
  • 최근의 컴퓨팅 환경은 이질적인 클라이언트와 서버들간의 상호 운용성을 요구하는 분산 어플리케이션을 위한 프로그래밍 파라다임을 지원하기 위한 분산 객체 컴퓨팅 환경으로 발전되고 있다. 여기에는 복잡한 네트워킹과 다양한 멀티미디어 응용 서비스를 위한 객체지향 기술들이 접목되고 있다. 이러한 분산 컴퓨팅 환경에서 처리되는 어플리케이션들의 실시간 서비스 지원을 위해 요구되는 실시간 특성과 분산 객체들의 관리의 어려움을 해결하기 위하여 본 논문에서는 실시간 객체그룹 플랫폼을 구축한다. 기존의 연구들은 실시간 CORBA를 사용하거나 또는 ORB를 수정하거나 실시간 운영체제상에 특정 CORBA 제품군을 사용하여 분산 환경의 특정 영역의 성능향상만을 도모하고 있다. 그러므로, 본 논문은 ORB의 수정 없이 표준 CORBA상에서 실시간 특성을 지원한 수 있는 실시간 객체그룹 플랫폼을 설계한다. 본 논문의 실시간 객체그룹 구조는 객체들의 관리적인 측면과 실시간 어플리케이션 서비스 지원 측면에 대한 요구사항들을 분석하여 정립한 모델이며, 구성요소들의 기능을 관리와 서비스로 분리하여 각각의 기능수행시에 발생하는 객체간의 상호작용이 다른 기능에 영향을 미치지 않도록 한다. 또한, 구축된 플랫폼은 실시간 어플리케이션 개발자에게 실시간 특성 파라미터의 표현과 처리에 대한 투명성을 부여하여 어플리케이션에 유연성과 확장성을 제공하기가 용이하도록 한다. 따라서, 본 논문은 실시간 객체그룹 플랫폼의 구성요소들에 대한 역할을 정의하고 기능을 정립하며, 각 구성요소들을 설계하고 구현하였으며, 구현되어진 실시간 객체그룹 플랫폼의 기능과 수행 성능을 검증한다.가지 유기화합물 중에서는 35.6%를 차지하였다. BTEX 각각 개별물질은 미국 환경보호청이 제시하는 일일 노출 기준량(Reference Concentration; RfC) 보다는 현저히 낮았다. 총 휘발성 유기화합물읜 농도는 실내가 실외 보다 높았다(I/O ratio 2.5). BTEX의 상대적 함량도 실내가 실외보다 높아 실내에도 발생원이 있음을 암시하고 있다. 자료 분석결과 유치원 실내의 벤젠은 실외로부터 유입되고 있었고, 톨루엔, 에틸벤젠, 크실렌은 실외뿐 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타

  • PDF

The Design of Authentication Model based on Symmetric Key Encryption for Improving Network Availability in Cloud Environment (클라우드 환경에서 네트워크 가용성 개선을 위한 대칭키 암호화 기반 인증 모델 설계)

  • Baek, Yong-Jin;Hong, Suk-Won;Kim, Sang-Bok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.47-53
    • /
    • 2019
  • Network-based sharing of information has evolved into a cloud service environment today, increasing its number of users rapidly, but has become a major target for network-based illegal attackers.. In addition, IP spoofing among attackers' various attack techniques generally involves resource exhaustion attacks. Therefore, fast detection and response techniques are required. The existing detection method for IP spoofing attack performs the final authentication process according to the analysis and matching of traceback information of the client who attempted the connection request. However, the simple comparison method of traceback information may require excessive OTP due to frequent false positives in an environment requiring service transparency. In this paper, symmetric key cryptography based on traceback information is used as mutual authentication information to improve this problem. That is, after generating a traceback-based encryption key, mutual authentication is possible by performing a normal decryption process. In addition, this process could improve the overhead caused by false positives.

Suggestion of a Digital Curation Framework for Historical Contents (역사콘텐츠 활용을 위한 디지털 큐레이션 프레임워크 제안)

  • Lee, Hyewon
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.16 no.3
    • /
    • pp.235-256
    • /
    • 2016
  • This study suggested a digital curation framework for supporting the digital policy of institutes that collect memory. As such, it conducted a literature review and an analysis of digital curation models, as well as a focus-group interview of historians and graduate students majoring in historical studies. In this study, digital curation framework refers to an abstract model for supporting policy development and the planning for a high-level view of the archival information service. This implications of this framework are as follows: (1) to emphasize the data life cycle and connection between stages and actions; (2) to make an infra-schema for understanding institutes that create, arrange, or store specific data as the same history contents have to be provided by different institutes and as there are differences in the data's value; (3) to check the present conditions of information services and their systems; (4) to consider the practical applications of contents that have been collected and stored; and (5) to converge all data in one system through the framework and activate diverse works in the context of the framework.

A Study on College Students' Use of Library Blogs: Focus on D Academic Library (대학생의 도서관 블로그 사용에 관한 연구 - D 대학교 도서관을 중심으로 -)

  • Lee, Lan-Ju
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.25 no.1
    • /
    • pp.319-342
    • /
    • 2014
  • This study investigates the evaluations, preferences, and opinions of students' experiences with their academic library blog and to identify student suggestions on how to improve the utilization such blogs. For this study, the D academic library blog was selected for study, while employing survey and focus group research methods. The results include the students' subjective evaluations of the library blog's operations, suggestions on how to improve the operation, and how to stimulate the utilization of the blog. This study may provide insights on how to improve academic library blog operations with access, updates, content, and marketing strategies.

Analysis of the Factors Influencing Quality Assurance of Smart Learning using IPA (IPA를 이용한 스마트러닝 품질관리 요인분석)

  • Lee, Jun-Hee
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.1
    • /
    • pp.81-89
    • /
    • 2012
  • Quality in smart learning is composed of many factors, and it is more complicated than the traditional education. This study put emphasis on three aspects of the smart learning quality(contents, systems, services). This study depended mostly on literature review, supplemented by FGI(Focus Group Interview) for classification of the smart learning quality factors. On a 5 point Likert scale, the survey enables the users to rate the relative importance of factors, followed by another factor performance rating. The questionnaire were composed of 39 questions. 8 questionnaire sheets were excluded which were not properly filled in or unsuitable for the analysis, and therefore, a total of 112 questionnaires were used for the final analysis. Collected data was statistically analyzed using the SPSS 18.0 for Windows statistical package. Importance-performance analysis(IPA; gap between importance and performance) is used for the empirical test.

  • PDF

Applications and Strategies on Defense Acquisition based CPS & IoT Technology (사이버물리시스템(CPS)과 사물인터넷(loT) 기술의 군사적 활용방안 및 추진전략)

  • Kye, J.E.;Park, P.J.;Kim, W.T.;Lim, C.D.
    • Electronics and Telecommunications Trends
    • /
    • v.30 no.4
    • /
    • pp.92-101
    • /
    • 2015
  • 미래 전장은 정보 지식 기반의 첨단 전력체계를 확충하기 위해 향후 전력구조를 통합, 지휘통제통신(C4I) 체계와 생존성과 통합성이 향상된 전장의 네트워크중심전(NCW) 수행능력을 향상시킬 것이다. 사이버물리시스템(Cyber-Physical Systems: CPS)은 함정전투체계에 적용되고 있는 DDS를 포함하여 국방 M&S의 근간인 Live, Virture, Constructive(L-V-C) 체계의 큰 축을 형성하고 있다. 사물인터넷(Internet of Things: IoT) 기술은 센서네트워크, 통신, Radio Frequency Identification(RFID), Ubiquitous Sensor Network(USN), Machine to Machine(M2M), D2D 기술 및 상황인지, 지능서비스를 위한 정보수집/가공/융합/분석/예측기술을 포괄적으로 포함한 기술로서 미래산업을 이끌어 갈 차세대 선도 기술이며, 특히 군사적으로도 감시정찰 센서네트워크(USN), 견마형로봇, 경전투로봇과 무인기 기술 및 전술정보통신망체계(TICN) 등 첨단 통신네트워크 기술의 전력화 추세는 IoT 기술의 적용영역을 넓혀주고 있다. 감시정찰체계(Sensor)에서는 감시정찰 분야 영상정보 처리, 표적탐지 등과 관련된 IoT 기술 소요와 지휘통제통신(C4I) 체계의 상호운용성, 데이터링크, 지능형 통신체계 등 C4I 관련 IoT 기술 소요 및 타격체계(Shooter)의 내장형 SW 등 유 무인 무기체계 관련 IoT 기술의 소요가 증대될 것으로 예상된다. 본고는 CPS 및 IoT 기술의 군사적 활용방안 및 획득전략에 대한 적용기술 및 발전방향을 살펴본다.

  • PDF

DDoS Security Considerations When proposing a protocol for CoAP (CoAP을 위한 프로토콜 제안 시 DDoS 보안 고려사항)

  • Jo, Seoyeon;Gong, Seonghyeon;Seok, Byoung-jin;Lee, Changhoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.204-207
    • /
    • 2019
  • DDoS(Distributed Denial of Service) 공격은 네트워크상에서 다수의 시스템 협업으로 하나의 표적 시스템을 공격하여 서비스의 가용성을 침해하는 공격이다. 이는 점차 지능적인 방법으로 진화하고 있으며 특히 IoT를 대상으로 한 DDoS 공격이 증가하고 있다. 이기종의 기기들이 연결된 IoT는 기존 IT디바이스와 비교하여 제한된 자원을 가지고 있어 IoT 네트워크 특성을 고려한 DDoS 보안 기법이 요구된다. 국제 인터넷 표준화 기구 IETF에서 IoT를 지원하기 위해 제정한 CoAP(Constrained Application Protocol)은 기존 IT 네트워크와 호환성을 가진 응용 계층 프로토콜이다. 본 논문은 CoAP의 DDoS 공격 취약점과 대응 방안을 정리하고 새로운 프로토콜을 추가할 시 고려해야 할 사항을 제시한다.

Cluster-Based Similarity Calculation of IT Assets: Method of Attacker's Next Targets Detection

  • Dongsung Kim;Seon-Gyoung Shon;Dan Dongseong Kim;Huy-Kang Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.1-10
    • /
    • 2024
  • Attackers tend to use similar vulnerabilities when finding their next target IT assets. They also continuously search for new attack targets. Therefore, it is essential to find the potential targets of attackers in advance. Our method proposes a novel approach for efficient vulnerable asset management and zero-day response. In this paper, we propose the ability to detect the IT assets that are potentially infected by the recently discovered vulnerability based on clustering and similarity results. As the experiment results, 86% of all collected assets are clustered within the same clustering. In addition, as a result of conducting a similarity calculation experiment by randomly selecting vulnerable assets, assets using the same OS and service were listed.

A Customized Cancer Radiation Treatment Planning Simulation (ccRTPs) System via Web and Network (웹과 네트워크 기술을 이용한 환자 맞춤식 암치료 계획 시뮬레이션 시스템)

  • Khm, O-Yeon
    • Progress in Medical Physics
    • /
    • v.17 no.3
    • /
    • pp.144-152
    • /
    • 2006
  • The telemedicine using independent client-server system via networks can provide high quality normalized services to many hospitals, specifically to local/rural area hospitals. This will eventually lead to a decreased medical cost because the centralized institute can handle big computer hardware systems and complicated software systems efficiently and economically, Customized cancer radiation treatment planning for each patient Is very useful for both a patient and a doctor because it makes possible for the most effective treatment with the least possible dose to patient. Radiation planners know that too small a dose to the tumor can result in recurrence of the cancer, while too large a dose to healthy tissue can cause complications or even death. The best solution is to build an accurate planning simulation system to provide better treatment strategies based on each patient's computerized tomography (CT) image. We are developing a web-based and a network-based customized cancer radiation therapy simulation system consisting of four Important computer codes; a CT managing code for preparing the patients target data from their CT image files, a parallel Monte Carlo high-energy beam code (PMCEPT code) for calculating doses against the target generated from the patient CT image, a parallel linear programming code for optimizing the treatment plan, and scientific data visualization code for efficient pre/post evaluation of the results. The whole softwares will run on a high performance Beowulf PC cluster of about 100-200 CPUs. Efficient management of the hardware and software systems is not an easy task for a hospital. Therefore, we integrated our system into the client-sewer system via network or web and provide high quality normalized services to many hospitals. Seamless communication with doctors is maintained via messenger function of the server-client system.

  • PDF

Current Status and Future Directions of the Dream Start Program in Korea (드림스타트, 지난 10년의 성장과 향후 10년을 위한 과제)

  • Lee, Sang-Gyun
    • Journal of the Korean Society of Child Welfare
    • /
    • no.59
    • /
    • pp.115-150
    • /
    • 2017
  • The purpose of this study was to examine the current status of the Dream Start program from the perspective of social investment strategy, and as well as to suggest future directions. The program has become a major government welfare program in korea since it was introduced in 2007 as a demonstration project, following research evidence and a sound rationale about the extensive success of Head Start in the U.S. and Sure Start Programme in the UK. The aim of Dream Start is to provide integrated services for the vulnerable children, aged 0 to 12, and their families who are identified using a national administration data record of disadvantaged families with children. In order to promote the vulnerable child's well-being, to overcome inequalities, and to give every child the best start in life, Dream Start adopted a local, "whole family" approach. Case management services form an essential part of the Dream Start to customize and integrate comprehensive services such as counseling, health care, parenting advice and education, academic tutoring, and after-school activities. Although there has been a general improvement in key factors since its inception, Dream Start has not yet sufficiently shown the strong and hoped-for impact. In the meantime, Dream Start must be given financial expansion and extensive policy supports to get the chance of realizing and evaluating long-term gains for children and their families. More work need to be done to overcome inequalities and to make Dream Start service more accessible for the most disadvantaged families with children in Korea. Practical and policy suggestions for future directions of the Dream Start programs were discussed.