• 제목/요약/키워드: Design of System

Search Result 53,387, Processing Time 0.1 seconds

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

A Design of Dual-band Microstrip Antennas using Stacked Inverted-L-shaped Parasitic Elements for GPS Applications (GPS용 역 L형 기생소자를 이용한 이중대역 마이크로스트립 안테나 설계)

  • Kim, Jun-Won;Woo, Jong-Myung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.14 no.3
    • /
    • pp.31-37
    • /
    • 2015
  • In this paper, newly proposed dual-band microstrip antennas using stacked inverted-L-shaped parasitic elements are presented for GPS $L_1(1.575GHz)$ and $L_2(1.227GHz)$ bands. For making dual band which has large interval, ${\lambda}/4$($L_1$ band) inverted-L-shaped parasitic elements were stacked at both side of radiation apertures on the half-wavelength($L_2$ band) patch antennas. The resonance in the parasitic elements occurs through coupling to the patch. Next, due to using circular polarization at GPS, ${\lambda}/4$($L_1$ band) inverted-L-shaped parasitic elements was stacked using sequential rotation technique on the patch and both side of the diagonal corners of the antenna were eliminated to make dual-band circular polarization. The designed circular polarized antenna's dimensions are $0.43{\lambda}L{\times}0.43{\lambda}L{\times}0.06{\lambda}L$ (${\lambda}L$ is the free-space wavelength at 1.227 GHz). Measured -10 dB bandwidths was 120 MHz(7.6%) and 82.5 MHz(6.7%) at GPS $L_1$ and $L_2$ bands. and 3 dB axial ration bandwidths are 172 MHz(10.9%) and 25 MHz(2.03%), respectively. All of these cover the respective required system bandwidths. Within each of the designed bands, broadside radiation patterns were observed.

Selection of Integrated Concepts Across Science and Humanities Using the Delphi Method (과학과 인문학의 통합개념 선정을 위한 델파이 연구)

  • Kim, Jiyoung;Park, Jieun;Yoon, Heojeong;Park, Eunmi;Bang, Dami
    • Journal of The Korean Association For Science Education
    • /
    • v.34 no.6
    • /
    • pp.549-558
    • /
    • 2014
  • Integrated concepts that are broad enough to embrace facts, principles, laws, and concepts of multiple disciplines could become the core of integrated education. Integrated concept-centered education enables effective and practical learning. In this study, the Delphi Method was implemented targeting experts in science (physics, life science, chemistry, and earth science) and humanities (history, geology, economics, ethics, and politics) to find out the integrated concept that can be used to design the concept-centered integrated education in the Republic of Korea. 124 experts participated in this survey. Delphi survey was conducted for three rounds. In the first round, an open questionnaire was given to experts to collect feasible integrated concepts in each major field. Then, in the second round experts were asked to select integrated concepts that could be used practically in the field of their major. In the third round, the integrated concept with selection frequency over medium value were given. They were asked to evaluate the applicability of integrated concepts by using the Likert-scale questionnaire. Through this process, content validity was analyzed. As a result, five integrated concepts (change, interaction, space-time, energy, and equilibrium) were selected for the inter-science integration. And thirteen integrated concepts (conflict, community, relationship, structure, power, diversity, culture, change, society, interaction, freedom, justice, and equality) were chosen for the inter-humanities integration. Finally, for the science-humanities integration, seven integrated concepts (structure, diversity, change, interaction, cycle, system, and environment) were determined.

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

Technology Trends of Oil-sands Plant Modularization using Patent Analysis (특허분석을 통한 오일샌드 플랜트 모듈화 기술 동향 연구)

  • Park, Gwon Woo;Hwang, In-Ju
    • Economic and Environmental Geology
    • /
    • v.49 no.3
    • /
    • pp.213-224
    • /
    • 2016
  • Non-conventional resource and alternative energy were researched for predicting oil peak. In this study, one of many non-conventional resources, specifically oil-sands, was investigated due to the increasing interest of oil-sands plant modularization in permaforst areas for reducing the construction periods through modular transportation while limiting local construction workers. Hence, tehcnological trends were analyzed for oil-sand plant modularization. Data used were between 1994 and 2015 for patent analysis while targets included Korea, US, Japan, Europe and Canada. Technology classification system consisted of mining, steam assisted gravity drainage(SAGD), separation/upgrading/tailors ponds, module design/packaging, module transportation and material/maintenance. Result of patent analysis, patent application accounts 89% in US and Canada. The main competitive companies were Shell, Suncor and Exxon-mobil. Unlike other oil developments, oil-sands have a long-term stable production characteristic, hence, it is important to ensure the competitiveness of oil-sands for obtaining a patent in the long run.

A Technique to Specify and Generate .NET Components in MDA/PSM for Pervasive Service (MDA/PSM상에서 퍼베이시브 서비스를 지원하는 닷넷 컴포넌트의 명세 및 생성 기법)

  • Kum, Deuk-Kyu;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.635-645
    • /
    • 2007
  • Component technology has been widely accepted as an effective way for building software systems with reusable components, and Microsoft (MS) .NET is one of the recent representative component technologies. Model Driven Architecture (MDA) is a new development paradigm which generates software by transforming design models automatically and incrementally. Transformation of structural models in MDA has been successfully applied. However, transformation of dynamic models and pervasive services, such as transaction service, security service, synchronization service and object pooling are largely remains as an area for further research. The recent enterprise system has multi tier distributed architecture, and the functionality of early mentioned pervasive services is essential for this architecture. .NET platform can implement Component Object Model+ (COM+) component for supporting pervasive services by specify Attribute code. In this paper, we specify the functionalities of the COM+ component offering pervasive services, and then those functionalities are defined by UML profile. By using the profile, the Platform Specific Model (PSM) for .NET/C# is specified, and .NET components are automatically generated through our tool. The development productivity, extensibility, portability, and maintenance of software can be dramatically improved by using of the proposed methods.

XML Schema Evolution Approach Assuring the Automatic Propagation to XML Documents (XML 문서에 자동 전파하는 XML 스키마 변경 접근법)

  • Ra, Young-Gook
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.641-650
    • /
    • 2006
  • XML has the characteristics of self-describing and uses DTD or XML schema in order to constraint its structure. Even though the XML schema is only at the stage of recommendation yet, it will be prevalently used because DTD is not itself XML and has the limitation on the expression power. The structure defined by the XML schema as well as the data of the XML documents can vary due to complex reasons. Those reasons are errors in the XML schema design, new requirements due to new applications, etc. Thus, we propose XML schema evolution operators that are extracted from the analysis of the XML schema updates. These schema evolution operators enable the XML schema updates that would have been impossible without supporting tools if there are a large number of XML documents complying the U schema. In addition, these operators includes the function of automatically finding the update place in the XML documents which are registered to the XSE system, and maintaining the XML documents valid to the XML schema rather than merely well-formed. This paper is the first attempt to update XML schemas of the XML documents and provides the comprehensive set of schema updating operations. Our work is necessary for the XML application development and maintenance in that it helps to update the structure of the XML documents as well as the data in the easy and precise manner.

A TransGate System for Convenient Wireless Internet Contents Generation (편리한 무선인터넷 컨텐츠 생성을 위한 TransGate 시스템)

  • Ryu Dong-Yeop;Han Seung-Hyun;Lim Young-Whan
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.37-52
    • /
    • 2006
  • A mobile device like ceil phone is the necessity of modern people, of ich con be easily connected to a wireless internet through such a mobile device. The demand for a wireless data communication is growing rapidly. However, agencies have not yet completed standardization of a markup language. Due to the development of the Mobile Device, agencies in this field have provided different data formats with each Mobile Device Platform. Traditionally, contents is hand-tailored to suit the target device. A key problem is that the characteristics and capabilities of the mobile device are too diverse to service the most suitable mobile contents. Because of these problems, the need for a re-usable document description language increases. In this paper, we defined Template file that is common data to service mobile devices. We proposed a method that could be an effective wireless web service though design and the implementation of the Call manager & the XSL Generator. In the methodology, when requesting a wireless internet service, a mobile device finds out markup language and a hardware specification of the mobile device through the Call Manager component supports. The XSL Generator component creates the XSL file dynamically that is the most suitable to a device. Finally, contents is serviced to each device by XSLT. It can generate a wireless page more easily by reusing the existing web contents through such course. Therefore, it can save the time and expense for generating a wireless page.

  • PDF

Performance Trial for Developing High - Yielding and Early Maturing Hairy Vetch (Vicia villosa Roth) Cultivar under Double Cropping System (2모작 작부체계 적응 다수성 및 조숙성 헤어리베치 품종 선발을 위한 생산력 검정)

  • Shin, Chung-Nam;Ko, Ki-Hwan
    • Journal of The Korean Society of Grassland and Forage Science
    • /
    • v.31 no.3
    • /
    • pp.243-250
    • /
    • 2011
  • This experiment was conducted to evaluate agronomic characteristics, forage quality and dry matter (DM) yield of early-maturing hairy vetch 'Cold green', 'Haymaker plus', 'Cappello' and medium-late maturing cultivar 'Cheong pa', 'Challenger', 'Hungvillosa' and 'Latigo' at Seongju in the Kyeongbuk from 2009 to 2011. The experiment was arranged in randomized complete block design with three replications. Hairy vetchs were seeded on Sep. 26 and Oct. 11 in 2009 and 2010. Vetch plants were harvested on 30 Apr. in 2010 and 2011. Cold tolerance for Haymaker plus and Cappello were a little lower than other cultivars. Fifty percent-flowering dates of Cold green had earlier than others and Haymaker plus and Cappello were earlier than Cheong pa, Challenger, Hungvillosa and Latigo. Cheong pa and Challenger were ealirer than Hungvillosa and Latigo. The DM yield of Cold green was the highest (p<0.05) of the cultivar except Haymaker plus. Haymaker plus was higher (p<0.05) than others and Cappello, Cheong pa, Challenger were higher (p<0.05) than Hungvillosa and Latigo in 2010. In 2011, the DM yield of Cold green was the highest (p<0.05) of the cultivar and Haymaker plus was higher (p<0.05) than others. Cappello was higher (p<0.05) than Hungvillosa and Latigo. Cheong pa and Challenger were higher (p<0.05) than Latigo. Vetch cultivar was high in crude protein (CP) and low in Acid detergent fiber (ADF). According to the results obtained from this study, it is suggested that early-maturing cultivar would be recommendable for fall sown vetch for DM production.

Case study on design and construction for cross-connection tunnel using large steel pipe thrust method in soil twin shield tunnels underneath airport (공항하부 토사 병설 쉴드터널에서 대구경 강관추진에 의한 횡갱 설계/시공사례 연구)

  • Ahn, Chang-Yoon;Park, Duhee
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.23 no.5
    • /
    • pp.325-337
    • /
    • 2021
  • On the road and rail tunnels, the evacuation pathway and facilities such as smoke-control and fire suppression system are essential in tunnel fire. In the long twin tunnels, the cross-connection tunnel is usually designed to evacuate from the tunnel where the fire broke out to the other tunnel. In twin shield tunnels, the segment lining has to be demolished to construct the cross-connection tunnel. Considering the modern shield TBM is mostly the closed chamber type, the exposure of underground soil induced by removal of steel segment lining is the most danger construction step in the shield tunnel construction. This case study introduces the excavation method using the thrust of large steel pipe and reviews the measured data after the construction. The large steel pipe thrust method for the cross-connection tunnel can stabilize the excavated face with the two mechanisms. Firstly, the soil in front of excavated face is cylindrically pre-supported by the large steel pipe. Secondly, the excavated face is supported by the plugging effect caused by the soil pressed into the steel pipe. It was reviewed that the large steel pipe thrust method in the cross-connection tunnel is enough to secure the construct ability and stability in soil from the measurement results about the deformation and stress of steel pipe.