• Title/Summary/Keyword: 협력제어

Search Result 227, Processing Time 0.024 seconds

Research on User-Centric Inter-Organizational Collaboration (UCICOIn) framework (사용자 제어 기반 다중 도메인 접근 제어에 대한 연구)

  • Sunghyuck Hong
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.37-43
    • /
    • 2023
  • In today's business landscape, collaboration and interoperability are crucial for organizational success and profitability. However, integrating operations across multiple organizations is challenging due to differing roles and policies in Identity and Access Management (IAM). User-centric identity (UCI) adopts a personalized approach to digital identity management, centering on the end-user for authentication and access control. It provides a decentralized system that ensures secure and customized access for each user. UCI aims to address complex security challenges by aligning access privileges with individual user requirements. This research delves into UCI's ability to streamline resource access amidst conflicting IAM roles and protocols across various organizations. The study presents a UCI-based multi-domain access control (MDAC) framework, which encompasses an ontology, a unified method for articulating access roles and policies across domains, and software services melding with UCI infrastructure. The goal is to enhance organizational resource management and decision-making by offering clear guidelines on access roles and policy management across diverse domains, ultimately boosting companies' return on investment.

시 최적화 제어기구의 설계방법에 관한 비교연구

  • 이양범
    • 전기의세계
    • /
    • v.29 no.3
    • /
    • pp.170-176
    • /
    • 1980
  • 이 논문은 제어신호가 이상적인 포화특성을 갖은 제작조건하의 시불변, 선형 제어계의 시최적화 제어기구의 설계이론을 비교 연구하는데 목적을 두었다. 어떤 초기상태에 있는 계를 특정된 최종상태로, 최단시간내에 이행시켜 가는데 요구되는 제어기구의 설계문제는 여러해 동안 흥미있는 연구과제로 학계에 등장되었고 이러한 문제를 처리하는데에는 여러가지의 설계방법이 제안되어 왔다. 이 논문에서는 이러한 최적화 제어기구의 설계 이론중, 상태천이법에 의한 방법, 최대원리의 적용에 의한 방법 및 동적 프로그래밍기법에 의한 방법들을 서로 비교하여 2차계의 시최적화 설계사례에 이들을 적용시킴으로써 그 설계법상의 문제점을 비교 검토하여 보려는데 목적을 두었다. 설계사례 2차계는 시불변, 선형인 것으로 가정하였으며, 초기상태벡터 및 최종상태벡터는 모두 특정된 값으로 지정되고 제어신호는 이상적인 포화특성으로 제약받으며 스윗칭 시간이 유한크기가 아닌 정규형인 경우에 한정시켜 다루었다. 어느 설계이론을 적용시키나 시최적화를 위한 제어측은 단속제어방식으로 결과되었으나, 시최적화 문제의 특수성때문에 최대원리 및 동적 프로그래밍기법의 적용사례에서는 자연경계조건 및 Transversality 조건 등이 스윗칭시간 또는 최종시간을 직접 결정하여 주는 관건은 되지 못하였으며 계통의 상태방정식 또는 보조상태방정식을 구속제약된 양단상태량을 만족하도록 최적에어측을 적용하여 풀므로써 스윗칭시간과 최종시간이 얻어진다. 따라서 어느 한가지 방법의 적용만으로는 수학적인 처리상의 애로는 피할길이 없었으며 Hamiltonian함수의 변화성질을 보조적으로 활용하여 가면 이러한 번거로움이 덜하여 지긴하나, 다루는 계통의 차수가 높을 수록 이러한 수치해를 얻기위한 번거로움은 여간한 험로가 아닌 것으로 생각된다. 결론적으로 이러한 시최적화문제의 설계에는 몇가지의 혼용적용이 바람직하다고 결론된다. 이의 개발에 박차를 가하지 않을 수 없는 것이다.고, 우선 여기서는 당면문제로서 대처하지 않으면 안될 자동주파수제어문제및 계통의 경제운용문제만에 한정하여, 이것을 우리나라의 현상과 관련시켜 개설하고, 이들의 자동화에 관한 기본적인 문제를 간단히 적어 보겠다. 가능하다. 제작완료된 ASIC은 기능시험을 완료했으며 실제 line-of-sight(LOS) 시스템 구현에 적용중이다. 시대를 살아 갈 회원들이다. '컨텐츠의 시대'가 개막되는 것이며, 신세기통신과 SK텔레콤은 선의의 경쟁 과 협력을 통해 이동인터넷 서비스의 컨텐츠를 개발해 나가게 될 것이다. 3배가 높았다. 효소 활성에 필수적인 물의 양에 따른 DIAION WA30의 라세미화 효율에 관하여 실험한 결과, 물의 양이 증가할수록 그 효율은 감소하였다. DIAION WA30을 라세미화 촉매로 사용하여 아이소옥탄 내에서 라세믹 나프록센 2,2,2-트리플로로에틸 씨오에스터의 효소적 DKR 반응을 수행해 보았다. 그 결과 DIAION WA30을 사용하지 않은 경우에 비해 반응 전환율과 생성물의 광학 순도는 급격히 향상되었다. 전통적 광학분할 반응의 최대 50%라는 전환율의 제한이 본 연구에서 찾은 DIAION WA30을 첨가함으로써 성공적으로 극복되었다. 또한 고체 염기촉매인 DIAION WA30의 사용은 라세미화 촉매의 회수 및 재사용이 가능하게 해준다.해준다.다. TN5 세포주를 0.2 L 규모 (1 L spinner flask)oJl에서 세포간의 응집현상 없이 부유배양에 적응,배양시킨 후 세포성장 시기에 따른 발현을 조사한 결과 1 MOI의 감염조건 하에서는 $0.6\times10^6$cell/mL의 early exponential시기의 세포밀도에서 72시간 배양하였을 대 최대 발현양을 나타내었다. 나타내었다. $\beta$4 integrin의

  • PDF

Development Success of the Secondary Mirror Prototype for Giant Magellan Telescope

  • Koh, Ju Heon;Kim, Young-Soo;Jung, Ho June;Jung, Hwa Kyoung;Yang, Ho-Soon;Kim, Ho-Sang;Lee, Kyoung-Don;Cho, Myung;Park, Won Hyun;Ahn, Hyo-Sung;Hwang, Narae;Yuk, In-Soo;Park, Byeong-Gon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.38 no.2
    • /
    • pp.85.1-85.1
    • /
    • 2013
  • GMT(Giant Magellan Telescope)는 25.4m의 주경과 3.2m의 부경으로 이루어진 거대망원경이다. 3.2m의 부경은 빠른 tip-tilt로 망원경을 제어하는 Fast Steering Mirror(FSM)와 적응광학계로 이루어진 Adaptive Secondary Mirror (ASM)로 구분된다. 한국천문연구원은 국내외 협력기관들과 함께 부경 FSM의 시험모델개발을 수행하고 있다. 부경은 1.06m의 반사경 일곱 개로 이루어져 있는데, 한 개의 광축 반사경 주위로 여섯개의 비축 반사경이 둘러싸여서 하나의 3.2m 반사경과 같은 기능을 하고 있다. 비축 비구면 반사경에 대한 시험모델의 반사면을 가공한 결과 표면가공 정밀도가 11.7nm rms의 정밀도를 갖는 반사경을 가공하였다(target : <20nm rms). 또한 test-bed를 제작하여 tip-tilt 정밀도를 제어한 결과 성능요구 조건 값인 0.03arcsec 제어에 성공하였고, 더 나아가 0.01arcsec의 tip-tilt 제어도 가능한 것으로 판단된다.

  • PDF

A Case Study on the Framework Development of the Metal 3D Printing Control & Monitoring System (금속 3D프린팅 통합 제어 및 모니터링 시스템 개발을 위한 프레임워크에 관한 연구)

  • Jeon, Byung-Ju;Lee, Sun-Kyu;Lee, Seung-Hee;Jang, Sung-Ho;Jung, Goo-sang
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.187-194
    • /
    • 2020
  • This study present to Framework & R&D direction of the 3d printing Integrated Control & Monitoring System. To ensure this purpose, we developed integrated 3d printing control system Framework for DED & PBF and we introduce 4 monitoring system include photo diode, gas flow, acoustic and spectrometer sensors. For this study, we utilize metal 3d printing system from Conception., OKE Tech and DE&T who are still developing Metal 3D Printing Technology since 2017. In the result, we represent the latest 3D Printing Control and Monitoring System for the next 3D Printing researcher and we hope this study will be used as a basic reference and data for Cooperation between mechanic, electronic and material fields.

Distributed Relay Power Control Scheme for Multi-cell OFDM-TDD Based Mobile Relay System (OFDM-TDD 기반 이동 릴레이 시스템을 위한 다중 셀 분산형 릴레이 전력 제어 방법)

  • Cho, Young-Min;Park, Jeong-Hun;Hwang, Seung-Gye;Kim, Dong-Ku
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.562-570
    • /
    • 2011
  • In this paper, a distributed mobile relay power control (DMRPC) scheme for maximizing individual cell throughput is proposed for mobile relay aided multi-cell orthogonal frequency division multiplexing (OFDM)-time division duplex (TDD) system. In the system with DMRPC, the power levels of relay's are controlled by individual cell without cell cooperation and signalling overhead. It is demonstrated by numerical simulation that DMRPC provides the better cell throughput performance than either the full power relay aided system or conventional system without relay does. Moreover, it is also shown that relay aided systems with DMRPC, and the conventional system have almost identical cell edge throughput, while full power relay aided systems show worse performance in cell edge throughput.

A Node Scheduling Control Scheme in Wireless Sensor Networks Inspired by Inter-Cell Signaling (생체 내 셀 간 신호 전달 체계를 모사한 지역적 협력 및 시스템 요구 성능 보장을 위한 무선 센서망의 노드 스케쥴링 제어)

  • Byun, Heejung;Son, Sugook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.3
    • /
    • pp.143-150
    • /
    • 2014
  • In this paper, we propose an energy efficient and delay guaranteed node scheduling scheme inspired by biological systems, which have gained considerable attention as a computing and problem solving technique. With the identification of analogies between cellular signaling systems and WSN systems, we formulate a new mathematical model that considers the networking challenges of WSNs. The proposed bio-inspired algorithm determines the state of the sensor node, as required by each application and as determined by the local environmental conditions and the states of the adjacent nodes. A control analysis shows that the proposed bio-inspired scheme guarantees the system stability by controlling the parameters of each node. Simulation results also indicate that the proposed scheme provides significant energy savings, as well as reliable delay guarantees by controlling the states of the sensor nodes.

Cyber-Threat Detection of ICS Using Sysmon and ELK (Sysmon과 ELK를 이용한 산업제어시스템 사이버 위협 탐지)

  • Kim, Yongjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.331-346
    • /
    • 2019
  • Global cyber threats to industrial control systems are increasing. As a result, related research and cooperation are actively underway. However, we are focusing on strengthening security for physical network separation and perimeter. Internal threats are still vulnerable. This is because the easiest and strongest countermeasure is to enhance border security, and solutions for enhancing internal security are not easy to apply due to system availability problems. In particular, there are many vulnerabilities due to the large number of legacy systems remaining throughout industrial control systems. Unless these vulnerable systems are newly built according to the security framework, it is necessary to respond to these vulnerable systems, and therefore, a security solution considering availability has been verified and suggested. Using Sysmon and ELK, security solutions can detect Cyber-threat that are difficult to detect in unstructured ICS.

Development of Message Broker-Based Real-Time Control Method for Road Traffic Safety Facilities Equipment and Devices Integrated Management System

  • JeongHo Kho;Eum Han
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.195-209
    • /
    • 2024
  • The current road traffic signal controller developed in the 1990s has limitations in flexibility and scalability due to power supply problems, various communication methods, and hierarchical black box structures for various equipment and devices installed to improve traffic safety for road users and autonomous cooperative driving. In this paper, we designed a road traffic safety facilities equipment and devices integrated management system that can cope with the rapidly changing future traffic environment by solving the using direct current(DC) and power supply problem through the power over ethernet(PoE) technology and centralized data-driven control through message broker technology. In addition, a data-driven real-time control method for road traffic safety facilities equipment and devices operating based on time series data was implemented and verified.

Shared Vehicle Teleoperation using a Virtual Driving Interface (가상 운전 인터페이스를 활용한 자동차 협력 원격조종)

  • Kim, Jae-Seok;Lee, Kwang-Hyun;Ryu, Jee-Hwan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.3
    • /
    • pp.243-249
    • /
    • 2015
  • In direct vehicle teleoperation, a human operator drives a vehicle at a distance through a pair of master and slave device. However, if there is time delay, it is difficult to remotely drive the vehicle due to slow response. In order to address this problem, we introduced a novel methodology of shared vehicle teleoperation using a virtual driving interface. The methodology was developed with four components: 1) virtual driving environment, 2) interface for virtual driving environment, 3) path generator based on virtual driving trajectory, 4) path following controller. Experimental results showed the effectiveness of the proposed approach in simple and cluttered driving environment as well. In the experiments, we compared two sampling methods, fixed sampling time and user defined instant, and finally merged method showed best remote driving performance in term of completion time and number of collision.

Design of A Spammail Control Model Based on Hierarchical Policy (정책기반의 계층적 스팸메일 제어모델 설계)

  • Lee Yong-Zhen;Baek Seung-Ho;Park Nam-Kyu;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.143-151
    • /
    • 2005
  • As the internet and I-commerce have been developing. a novel method for marketing is needed. A new advertisement using E-mail is becoming popular, because it has characteristics with low costs and relative efficiency. However. as the spam mails are increasing rapidly, mail service companies and users are deeply damaged in their mind and economically. In this paper, we design a hierarchical spam mail blocking policy through cooperation of all the participants-user, administrator, ISP to cut off the spam mail efficiently and Propose an efficient model to block and manage the spam mails based on the Policy. Also we prove the efficiencies and effectiveness of the proposed model through evaluation process .

  • PDF