• Title/Summary/Keyword: Cyber Architecture

Search Result 161, Processing Time 0.021 seconds

Reference Model and Architecture of Interactive Cognitive Health Advisor based on Evolutional Cyber-physical Systems

  • Lee, KangYoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4270-4284
    • /
    • 2019
  • This study presents a reference model (RM) and the architecture of a cognitive health advisor (CHA) that integrates information with ambient intelligence. By controlling the information using the CHA platform, the reference model can provide various ambient intelligent solutions to a user. Herein, a novel approach to a CHA RM based on evolutional cyber-physical systems is proposed. The objective of the CHA RM is to improve personal health by managing data integration from many devices as well as conduct a new feedback cycle, which includes training and consulting to improve quality of life. The RM can provide an overview of the basis for implementing concrete software architectures. The proposed RM provides a standardized clarification for developers and service designers in the design and implementation process. The CHA RM provides a new approach to developing a digital healthcare model that includes integrated systems, subsystems, and components. New features for chatbots and feedback functions set the position of the conversational interface system to improve human health by integrating information, analytics, and decisions and feedback as an advisor on the CHA platform.

A Study of Information Security Maturity Measurement Methodology for Banking System based on Cyber -based Transaction Processing Architecture Diagnosis (사이버거래 처리 구조 진단을 기반으로 한 뱅킹시스템 정보보호 성숙도 측정방법론 연구)

  • Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.121-128
    • /
    • 2014
  • SSE-CMM for security engineering, engineering, assurance, risk is divided into three elements of the process maturity assessment model and the level of information security presented. Maturity measurement of privacy, vulnerability diagnosis and risk analysis methodologies is used in practical field for present a comprehensive conclusion. The common cyber services are internet banking, mobile banking, telephone banking and the like. Transaction structure, a kind of cyber-banking system, information security maturity of the existing measurement methodologies for research purposes, vulnerability diagnosis and risk analysis methodologies to be used in practical field present a comprehensive conclusion. To ensure safety and convenience for the user, convenient to deal with cyber environment is the key to the activation of cyber trading. Particularly by measuring the maturity of cyber banking system to ensure the safety of the practice field much effects are expected as a result.

Design of Multicast Performance Monitoring Architecture on 3D Cyber Museum Service (30 Cyber Museum Service의 Multicast performance Monitoring 구조 설계)

  • 조중근;박인수;박용진;권용무
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10e
    • /
    • pp.313-315
    • /
    • 2002
  • 본 논문에서는 3D Cyber Museum Service에서의 효과적인 Multicast performance monitoring을 위한 receiver 기반의 분산 모델을 제안한다 멀티캐스트 네트워크를 통해 전송되는 멀티미디어 서비스의 효과적인 performance monitoring을 위해서 사용자들이 경험하는 QoS를 사용자의 호스트상에서 보다 직접적으로 측정하고, 멀티캐스트를 사용함으로써 얻어지는 대역폭의 효율적인 사용에 대한 측정을 위한 모델을 설계한다.

  • PDF

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

  • Shin, Jinsoo;Son, Hanseong;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.517-524
    • /
    • 2017
  • Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

Research on System Architecture and Simulation Environment for Cyber Warrior Training (사이버전사의 훈련을 위한 시스템 구축 방안 연구)

  • Ahn, Myung Kil;Kim, Yong Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.533-540
    • /
    • 2016
  • It is important to establish the environment for cyber warrior training, testing support and effectiveness analysis in order to cope with sharply increasing cyber threat. However, those practices cannot be easily performed in real world and are followed with many constraints. In this paper, we propose a live/virtual M&S-based system for training/testing and constructive M&S-based system for effectiveness analysis to provide an environment similar to real world. These can be utilized to strengthen the capability to carry out cyber war and analyze the impact of cyber threat under the large-scale networks.

Estimation of the Cyber Lecture System based on XML (XML 3-tier 기반의 가상교육 시스템 평가)

  • Ahn, Yung-Doo;Yim, Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.2
    • /
    • pp.124-133
    • /
    • 2002
  • In this thesis. we present the cyber lecture system based on XML 3-tier that uses the communication network as the internet. The system was designed to analysis the existing cyber lecture system and its details and to examine web system architecture and XML 3-tier model. With the designed system, we developed the cyber lecture system. We tested the existing system for performance and problem, then we improved the method of the cyber lecture system used by XML 3-tier Model. The cyber lecture system is offered the handiness of the cyber lecture system using web interface.

The Research Related to Kansei Stimulation Elements in Cyber-Space

  • Dong, Oh-Gi
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2001.05a
    • /
    • pp.68-73
    • /
    • 2001
  • The word "cyber-space" was coined through the developments in communication technology and computers. It became possible to experience disembodied space in practice through a new kind of medium. this research aims to clarify the kansei stimulation elements as realistic sensed by users who use 3-dimensional expressions in cyber-space. The research was carried out by preparing 25 samples of computer graphics, and administering 3 questionnaires to 12 examinees. The Principal Ingredient Analysis method was used for its analysis and assessment. As a result of this research, it can be concluded that materials, reflection and shadow have the strongest effect on human beings' senses in cyber-space.

  • PDF

The Teaching Method of "Architectural Basic Design" with Digital tool (디지털도구를 이용한 건축기초설계 교육사례연구)

  • Koh, In-Lyong;Dong, Jae-Uk
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.4 no.2
    • /
    • pp.7-14
    • /
    • 2004
  • This paper is base on the Thought that digital Architecture and Digital design tools cannot be seperted as like Architevtural Design and Architectural Drafting tools. So the purpose of this paper is to show that the interactive 'Architectural Basic design' practice with Digital tools and there tranning method. This example of the pratical assignments in class("Architectural digital drafting" and "Architectural Basic Design") are focus on tranning spatial perception in real space and digital -cyber space. And these practical samples are using the primary step in The Digital Architectre.

  • PDF

ARM Instruction Set Architecture Analysis for Binary Analysis (바이너리 분석을 위한 ARM 명령어 구조 분석)

  • Jung, Seungil;Ryu, Chanho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.167-170
    • /
    • 2018
  • 본 논문에서는 바이너리 분석을 위한 ARM의 구조를 분석한다. 바이너리 분석이란 0과 1로 이루어진 이진 값의 의미를 분석하는 것을 말한다. 바이너리 코드를 역어셈블(Disassemble)하여 값으로만 존재하는 데이터가 어떤 명령어(Instruction)이며 어떤 피연산자(Operand)를 의미하는지 알 수 있다. 소스코드를 컴파일하여 실행파일이 생성이 되면 바이너리 값으로 구성되며 이 실행파일을 바이너리 파일이라고도 한다. 바이너리 파일을 분석하기 위해서 CPU의 명령어 집합 구조(Instruction Set Architecture)를 알아야 한다. PC와 서버, 모바일 등에서 많이 사용되고 있는 ARM 중에서 64비트를 지원하는 AArch64(ARMv8)의 명령어 구조를 분석하여 효율적인 바이너리 분석의 기반을 마련하고자 한다.

  • PDF

A Study on the influence of nature on digital architecture (자연적 요소가 디지털 건축에 미친 영향에 관한 연구)

  • Yoon, Jae-Eun;Kim, Joo-Hee
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.6 s.59
    • /
    • pp.131-138
    • /
    • 2006
  • Contemporary society is lately going through various changes in social, economic, and cultural aspects due to rapid growth of information and computer technology. The digital revolution generated from the development of network reflects the decentralizing characteristic that connects local and personal interconnections. The following paper is designed to develop a basic understanding of digital architecture and show that digital virtual reality is not accidental phenomenon but it is actually evolved from nature and recreated in cyber space. The relationship between nature and digital architecture will be explained through the background research of how digital architecture was born and how it has been transformed. Also, it is designed to find out modern trends of digital architecture through diagrams and virtual space of hyper architecture and follow up the new phenomena appearing in the field of architecture. It is said that digital architecture is a new trend of architecture created from computer bit but all architecture that has form and shape cannot be independent of nature. Nature is the root of everything and even mechanical abstraction such as 'digital' can find its form in the immanence melted in the pure essence of nature. The research found that the nature approach of digital architecture also needs no more than 5 sequential references to find its genuine sketch as the hypertext theory shows we need only 5 sequential references to prove we are all related. Additionally, the cyber space that is become a general living space and a indispensable factor of digital architecture is a space that has obscurity and more open culture. It represents the characteristics of contemporaries in various aspects of society.