• Title/Summary/Keyword: 효율성 향상

Search Result 7,944, Processing Time 0.036 seconds

Intrusion Artifact Acquisition Method based on IoT Botnet Malware (IoT 봇넷 악성코드 기반 침해사고 흔적 수집 방법)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid increase in the use of IoT and mobile devices, cyber criminals targeting IoT devices are also on the rise. Among IoT devices, when using a wireless access point (AP), problems such as packets being exposed to the outside due to their own security vulnerabilities or easily infected with malicious codes such as bots, causing DDoS attack traffic, are being discovered. Therefore, in this study, in order to actively respond to cyber attacks targeting IoT devices that are rapidly increasing in recent years, we proposed a method to collect traces of intrusion incidents artifacts from IoT devices, and to improve the validity of intrusion analysis data. Specifically, we presented a method to acquire and analyze digital forensics artifacts in the compromised system after identifying the causes of vulnerabilities by reproducing the behavior of the sample IoT malware. Accordingly, it is expected that it will be possible to establish a system that can efficiently detect intrusion incidents on targeting large-scale IoT devices.

Selection of Self-Fertilization Stevia and Development of Multiple Propagation Method using Hypocotyl Explants (자가수정 스테비아의 선발과 배축절편체를 이용한 대량증식 방법 개발)

  • Seo, Seung Min;Bae, Shin-Chul;Kim, Kyung-Min
    • Korean Journal of Breeding Science
    • /
    • v.43 no.5
    • /
    • pp.442-447
    • /
    • 2011
  • This study was carried out to assess the potential of hypocotyl explants for multiple-propagation by intensive sweetener variety with high yielding in stevia of self-fertilization. Agronomical character of self-fertilization shown a height range 72.0~120.7 cm, branch's 4.9~56.6 in stevia. Selection of high content of Rebaudioside A (RA) from segregating population in mixing variety have a variety, 'DA1' (55.2%) from HPLC analysis. On a developing of multiple-propagation in stevia, hypocotyl explants used to select for reasonable medium under the influence of each plant growth regulators concentrations. In a Mix treatment of plant growth regulators, as Murashige and Skoog medium with 1.5 mg/L BA and 0.5 mg/L Kinetin showed the most favorable. We got the multiple-propagation of 30 shoots from one inoculated hypocotyl explants as the result of these bases. Rooting induced superbly on MS medium with 0.1 mg/L IBA with inoculated shoots. All of the rooting plants were adapted to a normal seedling. This method of multi-propagation is used effectively in Rebaudioside A productivity elevation.

Optimization of the Tool Life Prediction Using Genetic Algorithm (유전 알고리즘을 이용한 공구 수명 예측 최적화)

  • Kong, Jung-Shik
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.338-343
    • /
    • 2018
  • Recently, a computer numerical control (CNC) machine is used widely for mold making in various industries. In the operation of a CNC machine, the production quality and safety of workers are becoming increasingly important as the product process increases. A variety of tool life prediction studies has been conducted to standardize the quality of production and improve reproducibility. When the tool life is predicted using the conventional tool life equation, there is a large error between the experimental result and result by the conventional tool life equation. In this paper, an algorithm that can predict the precise tool life was implemented using a genetic algorithm.

Development of IoT Device Management System Using Blockchain DPoS Consensus Algorithm (블록체인 DPoS 합의 알고리즘을 활용한 IoT 장치 관리 시스템 개발)

  • Kim, Mihui;Kim, Youngmin
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.508-516
    • /
    • 2019
  • Smart home with various IoT devices provides convenient and efficient services. However, security is important because sensitive information such as private video and audio can be collected and processed, as well as shared over the Internet. To manage such smart home IoT devices, we use blockchain technology that provides data integrity and secure management. In this paper, we utilize a PoS(Proof of Stake) method that verifies the block through the accumulated stake in the network rather than the computation power, out of the PoW(Proof of Work) block chain, in which the computation for the existing verification must be continuously performed. Among them, we propose a blockchain based system with DPoS(Delegated Proof of Stake) method to actively solve the scalability part, for security that is suitable for smart home IoT environment. We implement the proposed system with DPoS based EOSIO to show realization, and we show performance improvement in terms of transaction processing speed.

R&D Trends of Thermoelectrochemical Cells (전기화학 열전지의 연구 개발 동향)

  • Kang, Junsik;Kim, Kyunggu;Lee, Hochun
    • Journal of the Korean Electrochemical Society
    • /
    • v.22 no.3
    • /
    • pp.79-86
    • /
    • 2019
  • Most of low-grad heat (< $200^{\circ}C$) generated from industrial process and human body, is abandoned as waste heat. To harvest the waste heat, the thermoelectrics (TE) technology has been widely investigated so far. However, TE suffers from poor performance and high material cost. As an alternative to the TE device, the thermoelectrical cell (TEC) is gaining growing attention these days. The TEC features several advantages such as high Seebeck coefficient, low cost and design flexibility compared to TE, but its commercial viability was limited by its low heat-to-electricity conversion efficiency. However, recent reports have demonstrated that the performance of TEC can be markedly improved by employing novel electrode/electrolyte materials and by optimizing cell design. This article summarizes the recent progress of TECs in terms of the redox couples, electrolyte solvents and additives, electrode materials and cell design.

A Study on the Electronic Records Element for Full Text Opening Information Service (원문정보공개서비스를 위한 전자기록구성요소에 관한 연구)

  • Heo, Jun Seok;Hong, Deok Yong
    • The Korean Journal of Archival Studies
    • /
    • no.50
    • /
    • pp.351-388
    • /
    • 2016
  • The purpose of this study was to survey the electronic records for professionals on the effectiveness of the government's 3.0 full-text open information service (FOIS). By using Authenticity, Reliability, Integrity, and Usability as criteria, the management conditions of electronic records on InterPARES were analyzed in the public sector. Through this analysis, this study provided some suggestions on how management conditions for electronic records for the government 3.0 FOIS may be improved. A direction to ensure effective electronic records management was also suggested. Based on the literature review, a questionnaire was developed. The study results were as follows. First, Authenticity and Reliability were lower than the other criteria scores. In particular, Integrity had a higher score while Authenticity, Reliability, and Usability showed average scores. Second, there were various perspectives on electronic records management depending on the individuals' backgrounds and no statistically significant differences were found. In particular, administrators who are in their thirties and archivists with two to four years of experience showed higher scores in the four criteria. Based on these results, this study suggested systematic improvement plans for functions and services based on the four criteria in the Korean government's 3.0 FOIS.

UAV Path Planning for ISR Mission and Survivability (무인항공기의 생존성을 고려한 감시정찰 임무 경로 계획)

  • Bae, Min-Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.211-217
    • /
    • 2019
  • In an complicated battlefield environment, information from enemy's camp is an important factor in carrying out military operations. For obtaining this information, the number of UAVs that can be deployed to the mission without our forces' loss and at low cost is increasing. Because the mission environment has anti-aircraft weapons, mission space is needed for UAV to guarantee survivability without being killed. The concept of Configuration Space is used to define the mission space considering with range of weapons and detect range of UAV. UAV must visit whole given area to obtain the information and perform Coverage Path Planning for this. Based on threats to UAV and importance of information that will be obtained, area that UAV should visit first is defined. Grid Map is generated and mapping threat information to each grid for UAV path planning. On this study, coverage conditions and path planning procedures are presented based on the threat information on Grid Map, and mission space is expanded to improve detection efficiency. Finally, simulations are performed, and results are presented using the suggested UAV path planning method in this study.

Prototype Design and Security Association Mechanism for Policy-based on Security Management Model (정책기반 보안관리 모델을 위한 프로토타입과 정책 협상 메커니즘)

  • 황윤철;현정식;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.131-138
    • /
    • 2003
  • With the Internet winning a huge popularity, there rise urgent problems which are related to Network Security Managements such as Protecting Network and Communication from un-authorized user. Accordingly, Using Security equipments have been common lately such as Intrusion Detection Systems, Firewalls and VPNs. Those systems. however, operate in individual system which are independent to me another. Their usage are so limited according to their vendors that they can not provide a corporate Security Solution. In this paper, we present a Hierarchical Security Management Model which can be applicable to a Network Security Policies consistently. We also propose a Policy Negotiation Mechanism and a Prototype which help us to manage Security Policies and Negotiations easier. The results of this research also can be one of the useful guides to developing a Security Policy Server or Security Techniques which can be useful in different environments. This study also shows that it is also possible to improve a Security Characteristics as a whole network and also to support Policy Associations among hosts using our mechanisms.

Implementation of Test Automation Agent for DO-330 Tool Qualified of ARINC-661 Development Tool (ARINC-661 개발 도구의 DO-330 도구 자격 획득을 위한 시험 자동화 에이전트 구현)

  • Kim, Do Gyun;Kim, Younggon
    • Journal of Platform Technology
    • /
    • v.8 no.4
    • /
    • pp.47-58
    • /
    • 2020
  • DO-330 Software Tool Qualification Considerations is a guideline for development of tools used to develop/verify software and hardware installed on aircraft. And among several processes, the verification process is very crucial as it occupies a large proportion for DO-330. Especially, in order to qualify tool with high safety level, test objectives must be performed with independence, accordingly, more time, cost, and manpower are required than other objectives. In addition, even if the test cases or test procedures are well defined, the higher the complexity of the test the higher probability of human error occurs. In this paper, we propose Script-based Test Automation Agent software structure for efficient DO-330 verification process of A661UAGEN tool developed by Hanwha Systems. Compared to the test performed manually by the test engineer, testing time of the Script-based Test Automation Agent is reduced by 87.5% and testing productivity is increased by 43.75%.

  • PDF

Metadata Log Management for Full Stripe Parity in Flash Storage Systems (플래시 저장 시스템의 Full Stripe Parity를 위한 메타데이터 로그 관리 방법)

  • Lim, Seung-Ho
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.11
    • /
    • pp.17-26
    • /
    • 2019
  • RAID-5 technology is one of the choice for flash storage device to enhance its reliability. However, RAID-5 has inherent parity update overhead, especially, parity overhead for partial stripe write is one of the crucial issues for flash-based RAID-5 technologies. In this paper, we design efficient parity log architecture for RAID-5 to eliminate runtime partial parity overhead. During runtime, partial parity is retained in buffer memory until full stripe write completed, and the parity is written with full strip write. In addition, parity log is maintained in memory until whole the stripe group is used for data write. With this parity log, partial parity can be recovered from the power loss. In the experiments, the parity log method can eliminate partial parity writes overhead with a little parity log writes. Hence it can reduce write amplification at the same reliability.