• Title/Summary/Keyword: Backup Software

Search Result 49, Processing Time 0.025 seconds

Importance-Performance Analysis (IPA) of Cyber Security Management: Focused on ECDIS User Experience

  • Park, Sangwon;Chang, Yeeun;Park, Youngsoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.3
    • /
    • pp.429-438
    • /
    • 2021
  • The mandatory installation of the ECDIS (Electronic Chart Display and Information System) became an important navigational equipment for navigation officer. In addition, ECDIS is a key component of the ship's digitalization in conjunction with various navigational equipment. Meanwhile, cyber-attacks emerge as a new threat along with digitalization. Damage caused by cyber-attacks is also reported in the shipping sector, and IMO recommends that cybersecurity guidelines be developed and included in International Security Management (ISM). This study analyzed the cybersecurity hazards of ECDIS, where various navigational equipment are connected. To this end, Importance-Performance Analysis (IPA) was conducted on navigation officer using ECDIS. As a result, the development of technologies for cyber-attack detection and prevention should be priority. In addition, policies related to 'Hardware and Software upgrade', 'network access control', and 'data backup and recovery' were analyzed as contents to be maintained. This paper is significant in deriving risk factors from the perspective of ECDIS users and analyzing their priorities, and it is necessary to analyze various cyber-attacks that may occur on ships in the future.

Operation and Command of Virtual Router Redundancy Protocol in Open N2OS (Open N2OS를 활용한 가상 라우터 이중화 프로토콜의 기능 동작과 명령어)

  • Lee, ChangSik;Ryu, HoYong;Park, Jaehyung
    • Journal of Digital Contents Society
    • /
    • v.19 no.4
    • /
    • pp.693-700
    • /
    • 2018
  • Virtual router redundancy protocol (VRRP) was designed as a solution to support fast fail-over in case of network failure. There exists virtual router which acts as default gateway in LAN, and the virtual router is dynamically elected between master and backup router. Through this protocol, end-hosts can be provided seamless network service. However, it needs expensive license fees and maintenance costs to adopt current commercial network operating systems. Furthermore, they are commonly enterprise proprietary software and inherently closed source. In order to tackle these problem, Open N2OS which is open source based open network software platform was developed. It has no dependency on hardware equipment, and provides high availability, scalability, various networking functions. In this paper, we handle VRRP operation and mechanism with related command line interface (CLI).

ON-BOARD COMPUTER SYSTEM FOR KITSAT-1 AND 2 (우리별 1, 2호 주 컴퓨터부)

  • 김형신;이홍규;최순달
    • Journal of Astronomy and Space Sciences
    • /
    • v.13 no.2
    • /
    • pp.41-51
    • /
    • 1996
  • KITSAT-1 and 2 are microsatellites weighting 50kg and all the on-board data are processed by the on-board computer system. Hence, these on-board computers require to be highly reliable and be designed with tight power consumption, mass and size constraints. On-board computer(OBC) systems for KITSAT-1 and 2 are also designed with a simple flexible hardware for reliability and software takes more responsibility than hardware. KITSAT-1 and 2 on-board computer system consist of OBC 186 as the primary OBC and OBC80 as its backup. OBC186 runs spacecraft operating system (SCOS) which has real-time multi-tasking capability. Since their launch, OBC186 and OBC80 have been operating successfully until today. In this paper, we describe the development of OBC186 hardware and software and analyze its in-orbit operation performance.

  • PDF

Safe Adaptive Headlight Controller with Symmetric Angle Sensor Compensator Using Steering-swivel Angle Lookup Table (조향각-회전각 룩업테이블을 이용한 대칭형 각도센서 보상기를 가지는 안전한 적응형 전조등 제어기의 설계)

  • Youn, Jiae;An, Joonghyun;Yin, Meng Di;Cho, Jeonghun;Park, Daejin
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.24 no.1
    • /
    • pp.112-121
    • /
    • 2016
  • AFLS (Adaptive front lighting system) is being applied to improve safety in driving automotive at night. Safe embedded system design for controlling head-lamps is required to improve noise robust ECU hardware and software simultaneously by considering safety requirement of hardware-dependent software under severe environmental noise. In this paper, we propose an adaptive headlight controller with a newly-designed symmetric angle sensor compensator, especially based on the proposed steering-swivel angle lookup table to determine whether the current controlling target is safe. The proposed system includes an additional backup hardware to compare the system status and provides safe swivel-angle management using a controlling algorithm based on the pre-defined lookup table (LUT), which is a symmetric mapping relationship between the requested steering angle and expected swivel angle target. The implemented system model shows that the proposed architecture effectively detects abnormal situations and restores safe status of controlling the light-angle in AFLS operations under severe noisy environment.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

Proposal on Guideline for Quality Assurance of Radiation Treatment Planning System

  • Oh, Yoonjin;Shin, Dong Oh;Kim, Juhye;Kwon, Nahye;Lee, Soon Sung;Choi, Sang Hyoun;Ahn, Sohyun;Park, Dong-wook;Kim, Dong Wook
    • Progress in Medical Physics
    • /
    • v.28 no.4
    • /
    • pp.197-206
    • /
    • 2017
  • We develop guidelines for the quality assurance of radiation treatment planning systems (TPS) by comparing and reviewing recommendations from major countries and organizations, as well as by analyzing the AAPM, ESTRO, and IAEA TPS quality assurance guidelines. We establish quality assurance items for acceptance testing, commissioning, periodic testing, system management, and security, and propose methods to perform each item within acceptable standards. Acceptance includes tests of hardware and network environments, data transmission, software, and benchmarking as specified by the system supplier, and apply the IAEA classification criteria. Commissioning includes dosimetric and non-dosimetric items for assessing TPS performance by applying the AAPM classification criteria and the latest technical items from the IAEA. Periodic quality assurance tests include daily, weekly, monthly, yearly, and occasional items by applying the AAPM classification criteria. System management and security items include the state and network connectivity of TPS, periodic data backup, and data access security. The guidelines for TPS quality assurance proposed in this study will help to improve the safety and quality of radiotherapy by preventing incidents related to radiotherapy.

An analysis on the Earth geoid surface variation effect for use of the tilt sensor in celestial navigation system

  • Suk, Byong-Suk;Yoon, Jae-Cheol;Lyou, Joon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1867-1870
    • /
    • 2005
  • The celestial navigation is one of alternatives to GPS system and can be used as a backup of GPS. In the celestial navigation system using more than two star trackers, the vehicle's ground position can be solved based on the star trackers' attitude information if the vehicle's local vertical or horizontal angle is given. In order to determine accurate ground position of flight vehicle, the high accurate local vertical angle measurement is one of the most important factors for navigation performance. In this paper, the Earth geophysical deflection was analyzed in the assumption of using the modern electrolyte tilt sensor as a local vertical sensor for celestial navigation system. According to the tilt sensor principle, the sensor measures the tilt angle from gravity direction which depends on the Earth geoid surface at a given position. In order to determine the local vertical angle from tilt sensor measurement, the relationship between the direction of gravity and the direction of the Earth center should be analyzed. Using a precision orbit determination software which includes the JGM-3 Earth geoid model, the direction of the Earth center and the direction of gravity are extracted and analyzed. Appling vector inner product and cross product to the both extracted vectors, the magnitude and phase of deflection angle between the direction of gravity and the direction of the Earth center are achieved successfully. And the result shows that the angle differences vary as a function of latitude and altitude. The maximum 0.094$^{circ}$angle difference occurs at 45$^{circ}$latitude in case of 1000 Km altitude condition.

  • PDF

Application of MicroPACS Using the Open Source (Open Source를 이용한 MicroPACS의 구성과 활용)

  • You, Yeon-Wook;Kim, Yong-Keun;Kim, Yeong-Seok;Won, Woo-Jae;Kim, Tae-Sung;Kim, Seok-Ki
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.13 no.1
    • /
    • pp.51-56
    • /
    • 2009
  • Purpose: Recently, most hospitals are introducing the PACS system and use of the system continues to expand. But small-scaled PACS called MicroPACS has already been in use through open source programs. The aim of this study is to prove utility of operating a MicroPACS, as a substitute back-up device for conventional storage media like CDs and DVDs, in addition to the full-PACS already in use. This study contains the way of setting up a MicroPACS with open source programs and assessment of its storage capability, stability, compatibility and performance of operations such as "retrieve", "query". Materials and Methods: 1. To start with, we searched open source software to correspond with the following standards to establish MicroPACS, (1) It must be available in Windows Operating System. (2) It must be free ware. (3) It must be compatible with PET/CT scanner. (4) It must be easy to use. (5) It must not be limited of storage capacity. (6) It must have DICOM supporting. 2. (1) To evaluate availability of data storage, we compared the time spent to back up data in the open source software with the optical discs (CDs and DVD-RAMs), and we also compared the time needed to retrieve data with the system and with optical discs respectively. (2) To estimate work efficiency, we measured the time spent to find data in CDs, DVD-RAMs and MicroPACS. 7 technologists participated in this study. 3. In order to evaluate stability of the software, we examined whether there is a data loss during the system is maintained for a year. Comparison object; How many errors occurred in randomly selected data of 500 CDs. Result: 1. We chose the Conquest DICOM Server among 11 open source software used MySQL as a database management system. 2. (1) Comparison of back up and retrieval time (min) showed the result of the following: DVD-RAM (5.13,2.26)/Conquest DICOM Server (1.49,1.19) by GE DSTE (p<0.001), CD (6.12,3.61)/Conquest (0.82,2.23) by GE DLS (p<0.001), CD (5.88,3.25)/Conquest (1.05,2.06) by SIEMENS. (2) The wasted time (sec) to find some data is as follows: CD ($156{\pm}46$), DVD-RAM ($115{\pm}21$) and Conquest DICOM Server ($13{\pm}6$). 3. There was no data loss (0%) for a year and it was stored 12741 PET/CT studies in 1.81 TB memory. In case of CDs, On the other hand, 14 errors among 500 CDs (2.8%) is generated. Conclusions: We found that MicroPACS could be set up with the open source software and its performance was excellent. The system built with open source proved more efficient and more robust than back-up process using CDs or DVD-RAMs. We believe that the operation of the MicroPACS would be effective data storage device as long as its operators develop and systematize it.

  • PDF

Impact of Shortly Acquired IPO Firms on ICT Industry Concentration (ICT 산업분야 신생기업의 IPO 이후 인수합병과 산업 집중도에 관한 연구)

  • Chang, YoungBong;Kwon, YoungOk
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.51-69
    • /
    • 2020
  • Now, it is a stylized fact that a small number of technology firms such as Apple, Alphabet, Microsoft, Amazon, Facebook and a few others have become larger and dominant players in an industry. Coupled with the rise of these leading firms, we have also observed that a large number of young firms have become an acquisition target in their early IPO stages. This indeed results in a sharp decline in the number of new entries in public exchanges although a series of policy reforms have been promulgated to foster competition through an increase in new entries. Given the observed industry trend in recent decades, a number of studies have reported increased concentration in most developed countries. However, it is less understood as to what caused an increase in industry concentration. In this paper, we uncover the mechanisms by which industries have become concentrated over the last decades by tracing the changes in industry concentration associated with a firm's status change in its early IPO stages. To this end, we put emphasis on the case in which firms are acquired shortly after they went public. Especially, with the transition to digital-based economies, it is imperative for incumbent firms to adapt and keep pace with new ICT and related intelligent systems. For instance, after the acquisition of a young firm equipped with AI-based solutions, an incumbent firm may better respond to a change in customer taste and preference by integrating acquired AI solutions and analytics skills into multiple business processes. Accordingly, it is not unusual for young ICT firms become an attractive acquisition target. To examine the role of M&As involved with young firms in reshaping the level of industry concentration, we identify a firm's status in early post-IPO stages over the sample periods spanning from 1990 to 2016 as follows: i) being delisted, ii) being standalone firms and iii) being acquired. According to our analysis, firms that have conducted IPO since 2000s have been acquired by incumbent firms at a relatively quicker time than those that did IPO in previous generations. We also show a greater acquisition rate for IPO firms in the ICT sector compared with their counterparts in other sectors. Our results based on multinomial logit models suggest that a large number of IPO firms have been acquired in their early post-IPO lives despite their financial soundness. Specifically, we show that IPO firms are likely to be acquired rather than be delisted due to financial distress in early IPO stages when they are more profitable, more mature or less leveraged. For those IPO firms with venture capital backup have also become an acquisition target more frequently. As a larger number of firms are acquired shortly after their IPO, our results show increased concentration. While providing limited evidence on the impact of large incumbent firms in explaining the change in industry concentration, our results show that the large firms' effect on industry concentration are pronounced in the ICT sector. This result possibly captures the current trend that a few tech giants such as Alphabet, Apple and Facebook continue to increase their market share. In addition, compared with the acquisitions of non-ICT firms, the concentration impact of IPO firms in early stages becomes larger when ICT firms are acquired as a target. Our study makes new contributions. To our best knowledge, this is one of a few studies that link a firm's post-IPO status to associated changes in industry concentration. Although some studies have addressed concentration issues, their primary focus was on market power or proprietary software. Contrast to earlier studies, we are able to uncover the mechanism by which industries have become concentrated by placing emphasis on M&As involving young IPO firms. Interestingly, the concentration impact of IPO firm acquisitions are magnified when a large incumbent firms are involved as an acquirer. This leads us to infer the underlying reasons as to why industries have become more concentrated with a favor of large firms in recent decades. Overall, our study sheds new light on the literature by providing a plausible explanation as to why industries have become concentrated.