• Title/Summary/Keyword: Check System

Search Result 3,303, Processing Time 0.037 seconds

A Study on Evaluation Technique of Network Security System (네트워크 보안시스템 보안성 평가 연구)

  • Kim, Jeom-Goo
    • Convergence Security Journal
    • /
    • v.9 no.2
    • /
    • pp.33-39
    • /
    • 2009
  • The problems of current network security system, separated by a single element is checked. To improve this, this thesis is to find vulnerabilities in the network security systems, and network security systems, security equipment, organic to make sure each works is a comprehensive review. Automation also offers a way to check it, it was implemented.

  • PDF

5축 NC 가공용 CAM 시스템 개발

  • 전차수;박세형;전용태
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1992.04a
    • /
    • pp.317-322
    • /
    • 1992
  • Developed in this reseach is a CAM system for 5-axis NC Machining of sculpture surfaces. We identify problems in generating 5-axis NC data and propose methods of overcoming them. Issues discussed in this report are; kinematic modelling of NC machines; Determination of cutter position(location and orientation); check of machine work-range; linear trajectory planning; calculation of feedrate number. The proposed system has been implemented in FORTRAN77 on the Personal IRIS EWS, and it also consitutes a module of the CAD/CAM system 'CASSETTE' developed in KIST CAD/CAM lab..

Implementation of text to speech terminal system by distributed database (데이터베이스 분산을 통한 소용량 문자-음성 합성 단말기 구현)

  • 김영길;박창현;양윤기
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.2431-2434
    • /
    • 2003
  • In this research, our goal is to realize Korean Distribute TTS system with server/client function in wireless network. The speech databases and some routines of TTS system is stuck with the server which has strong functions and we made Korean speech databases and accomplished research about DB which is suitable for distributed TTS. We designed a terminal has the minimum setting which operate this TTS and designed proper protocol so we will check action of Distributed TTS.

  • PDF

Making Practical Use of Urban MAGLEV System : How to Perform the Feasibility Study (도시형 자기부상열차 실용화사업 타당성조사 추진방안)

  • Kim, Yeon-Gu;Kim, Hun
    • Proceedings of the KSR Conference
    • /
    • 2006.05a
    • /
    • pp.34-45
    • /
    • 2006
  • Making practical use of urban MAGLEV system which is tried by government includes technique development and railway construction. Because huge amount of money will be spent on this project, feasibility study is being carried out in order to check the feasibility and to devise the master plan in prior to making practical use of urban MAGLEV system. The key issues of feasibility study are possibility of technique development, economical feasibility, location of a model railway and the improvement of related laws and regulations. This paper shows the approach to solve these key issues.

  • PDF

Design of Home Network Security System (홈 네트워크 보안시스템 설계)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.193-194
    • /
    • 2006
  • In this paper, the SPINS, a sensor network security mechanism, was researched to design a system to be applied to home network structure and check the security of which degree was ensured by a virtual network of home networking middleware. Sensor Network security mechanism SPINS provides data confidentiality and authentication by SNEP, and provides authenticated broadcast by ${\mu}TESLA$. We designed the system that applied SPINS to home networking middleware basic structure.

  • PDF

An Automated Visual Inspection System for Wire Harnesses (접속케이블의 품질검사를 위한 자동시각검사 시스템)

  • Lee, Moon-Kyu;Yun, Chan-Kyun
    • IE interfaces
    • /
    • v.9 no.1
    • /
    • pp.63-71
    • /
    • 1996
  • A wire harness is an assembly cables and/or wires to transmit signals between electronic assemblies in automobiles and electronic appliances. Inspection of such a wire harness is to check the sequence of assembled cabled each of which is identified by its own color. This paper presents an automated visual inspection system for wire harnesses incorporating back-propagation neural network as a color identification device. The tests performed by using real test specimens show that the inspection system works well enough.

  • PDF

Challenge in the Structural Design of Suzhou IFS

  • Zhou, Jianlong;Huang, Yongqiang
    • International Journal of High-Rise Buildings
    • /
    • v.10 no.3
    • /
    • pp.165-171
    • /
    • 2021
  • Core-outrigger-mega frame system is used in Suzhou IFS with 95-story, 450 m-tall, which is beyond Chinese code limit. Besides simple introduction on design principle, structure system and analysis, key techniques including performance based design criteria, frame shear ratio, capacity check of mega column, human comfort criteria under wind induced vibration and TSD design were presented in details for reference of similar super tall building design.

Design of a Secure Payment Mechanism based on S/MIME (S/MIME을 적용한 안전한 지불 메커니즘 설계)

  • Chun, Cheul-Woo;Lee, Jong-Hu;Lee, Sang-Ho
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.482-494
    • /
    • 2002
  • In E-mail based accounting system, the remitter does not have need to find collector's account number. To transfer money to a collector's account, what remitter need is just a collector's E-mail address. But the current E-mail based accounting systems are built on SSL technology. Basically SSL provides some security services - confidentiality, user authentication and data integrity, but does not provide non-repudiation. So, in the current E-mail based accounting system, it is possible to deny transaction. And there is no receipt of transaction. In this paper, we design and implementation of a S/MIME applied Secure Payment Mechanism. In our system, every account information - account number, receiver name, amount of money, etc. - is included in a 'check' message. And this message is protected under the Secure Web-mail using S/MIME. In a view point of the convenience, users using our system do not have need to find collector's account number. And in a view point of the security, our system provides confidentiality, user authentication, data integrity and non-repudiation. Moreover our system provides a receipt.

A Study on The Improved Selection Method of Information Security Management System(ISMS) Certification Object Applying SMART Technic (SMART 평가법을 활용한 정보보호 관리체계(ISMS) 인증 의무대상자 선정 기준 개선 방안에 관한 연구)

  • Jang, Sang Soo
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.85-94
    • /
    • 2014
  • Information Security Check System was Introduced in 2004, higher than in 2013, the effectiveness of Information Security Management System(ISMS) certification scheme was to unification. This is incident to the Internet affecting people's lives telecommunications service provider to target accountability because, considering the subject's duty selection criteria need to be clarified. however, Obligations under the current legislation, subject selection criteria applying the law itself is ambiguous, the result being a significant problem. Moreover, the regulatory system of certification systems subjects, although selection criteria should be clear and objectively not the obligation not to distrust the system itself and the subject was raised many issues for you. In this study, with SMART Technic in order to improve this certification you can easily determine whether a medical person authorized to develop a model for selection of medical subjects, The developed model is verified through empirical ways to improve the system by presenting the system to help, to secure the effectiveness.

An Audit Model for Information Protection in Smartwork (스마트워크 기반의 정보보호 감리 모형)

  • Han, Ki-Joon;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.1
    • /
    • pp.229-239
    • /
    • 2014
  • Smartwork technology, using teleworking, smartwork centers and mobile terminal, provides a flexible work environments without constraints of time and space. Smartwork system to increase the work efficiency has the information protection threats according to their convenience. Thus, in order to build smartwork, it is proper to provide information protection audit to help ensure the information protection. In this paper, we have proposed an infortaion protection audit model at the practical and technical level for building a smartwork environment. We were classified as a terminal, network and server area for information protection, and derived a professional information protection check items. Further, by establishing a smartwork information protection audit time to map ISMS control items, we have proposed an audit model so that it is possible to improve the security and efficiency. It also verified whether the proposed model is suitable or not by doing a survey if deduced audit domain and check items correspond with the purpose of the smartwork information protection audit to auditors and IT specialists. As the result, this study was 97% satisfaction out of 13 check items.