• Title/Summary/Keyword: Program transformation

Search Result 387, Processing Time 0.029 seconds

안전한 핀테크 서비스를 위한 지침

  • Nah, Jae Hoon
    • Review of KIISC
    • /
    • v.29 no.4
    • /
    • pp.19-24
    • /
    • 2019
  • 디지털 전환(Digital Transformation)은 산업 각 분야에서 진행되고 있는 혁신이며, 금융권에서도 디지털 전환의 영향이 크게 미치고 있다. 전산화 되어 있지만 폐쇄적인 네트워크로 구축되어 있던 금융 네트워크가 점점 데이터의 공개를 필요로 하였으며, 그 공개된 데이터를 기반으로 새로운 서비스가 창출되는 산업적 태동이 있었다. 개별적 서비스의 처리나 단계(부품)의 개선이 아니라 플랫폼의 개방을 통한 융합화와 이를 조화롭게 통제하는 거버넌스의 필요성이 대두되었다. 이러한 동향에 편승하여 새로운 기업(스타트업)이 창출하였고, 공개된 정보를 기반으로 융합 서비스를 창출하여 서비스의 발전이 눈부시게 진행하고 있다. 핀테크 서비스가 공개 API(Application program interface)로 제공되고 있으며, 이를 이용하여 빠른 발전을 하고 있으나, 공개성으로 인하여 취약점마저도 공개되어 정보보안의 위협으로 작용 될 수 있으므로, 개방형 플랫폼의 정보보안을 중심으로 핀테크 정보보안 표준의 동향을 살펴본다.

LEAN CONSTRUCTION MEANS TO PROMOTE GOOD- AND ERADICATE BAD VARIATION

  • Iris D. Tommelein
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.51-59
    • /
    • 2009
  • Lean construction researchers and practitioners have established a new paradigm for managing construction projects. This paradigm stems from insights gained by viewing project delivery as one kind of production and, inspired by the success of the Toyota Production System, leveraging Toyota's 'lean thinking' in the context of such one-of production. Premises of lean construction are that (1) production systems are riddled with variation, (2) variation can be good or bad, but most of it is bad, (3) most of this variation-good or bad-is self-inflicted; consequently 'lean' passionately promotes good- and relentlessly eradicates bad variation. This paper surveys a few of many lean construction means to manage variation. Lean thinking encompasses a lot more than thinking about variation, but that is the lens used here through which construction project management is viewed. Pairing these premises with lean variation-management tools may help readers broaden the insights they can gain from reading the lean construction literature.

  • PDF

A Survey of Cybersecurity Vulnerabilities in Healthcare Systems

  • Adwan Alownie Alanazi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.155-161
    • /
    • 2023
  • In the process of remarkable progress in the medical and technical field and activating the role of technology in health care services and applications, and since the safety of medical data and its protection from security violations plays a major role in assessing the security of health facilities and the safety of medical servers Thus, it is necessary to know the cyber vulnerabilities in health information systems and other related services to prevent and address them in addition to obtaining the best solutions and practices to reach a high level of cybersecurity against attackers, especially due to the digital transformation of health care systems and the rest of the dealings. This research is about what cyberattacks are and the purpose of them, in addition to the methods of penetration. Then challenges, solutions and some of the security issues will be discussed in general, and a special highlight will be given to obtaining a safe infrastructure to enjoy safe systems in return.

A Study on a Control Language for the Configuration of Process Controllers (공정 제어기 구성을 위한 제어 언어에 관한 연구)

  • Seo, Chang-Jun;Kim, Byung-Kook
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.11
    • /
    • pp.36-44
    • /
    • 1994
  • In this paper, a high-level process control language is developed to construct multi-loop controllers for large scale process control systems. Function locks are defined which are basic functions necessary to configure a multi-loop controller. Each block is presented to the function code which is a line of ASCII codes and has the characteristics to be simple and to be easily understood. A control algorithm for a process is attained by means of the arrangement of function codes with order. In order to be used to various environments of target hardwares, a transformation program is prepared that transfers a control program configured by function codes to a C-language program. The proposed control language is easy and simple to use, possible to expend, and able to apply to various control systems. Simulation results are included to show the availability for the usage of the proposed control language in real world.

  • PDF

Wave-Front Error Reconstruction Algorithm Using Moving Least-Squares Approximation (이동 최소제곱 근사법을 이용한 파면오차 계산 알고리즘)

  • Yeon, Jeoung-Heum;Kang, Gum-Sil;Youn, Heong-Sik
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.4
    • /
    • pp.359-365
    • /
    • 2006
  • Wave-front error(WFE) is the main parameter that determines the optical performance of the opto-mechanical system. In the development of opto-mechanics, WFE due to the main loading conditions are set to the important specifications. The deformation of the optical surface can be exactly calculated thanks to the evolution of numerical methods such as the finite element method(FEM). To calculate WFE from the deformation results of FEM, another approximation of the optical surface deformation is required. It needs to construct additional grid or element mesh. To construct additional mesh is troublesomeand leads to transformation error. In this work, the moving least-squares approximation is used to reconstruct wave front error It has the advantage of accurate approximation with only nodal data. There is no need to construct additional mesh for approximation. The proposed method is applied to the examples of GOCI scan mirror in various loading conditions. The validity is demonstrated through examples.

Indirect Branch Target Address Verification for Defense against Return-Oriented Programming Attacks (Return-Oriented Programming 공격 방어를 위한 간접 분기 목적 주소 검증 기법)

  • Park, Soohyun;Kim, Sunil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.217-222
    • /
    • 2013
  • Return-Oriented Programming(ROP) is an advanced code-reuse attack like a return-to-libc attack. ROP attacks combine gadgets in program code area and make functions like a Turing-complete language. Some of previous defense methods against ROP attacks show high performance overhead because of dynamic execution flow analysis and can defend against only certain types of ROP attacks. In this paper, we propose Indirect Branch Target Address Verification (IBTAV). IBTAV detects ROP attacks by checking if target addresses of indirect branches are valid. IBTAV can defends against almost all ROP attacks because it verifies a target address of every indirect branch instruction. Since IBTAV does not require dynamic execution flow analysis, the performance overhead of IBTAV is relatively low. Our evaluation of IBTAV on SPEC CPU 2006 shows less than 15% performance overhead.

Selection and Classification of Bacterial Strains Using Standardization and Cluster Analysis

  • Lee, Sang Moo;Kim, Kyoung Hoon;Kim, Eun Joong
    • Journal of Animal Science and Technology
    • /
    • v.54 no.6
    • /
    • pp.463-469
    • /
    • 2012
  • This study utilized a standardization and cluster analysis technique for the selection and classification of beneficial bacteria. A set of synthetic data consisting of 100 individual variables with three characteristics was created for analysis. The three characteristics assigned to each independent variable were designated to have different numeric scales, averages, and standard deviations. The variables were bacterial isolates at random, and the three characteristics were fermentation products, including cell yield, antioxidant activity of culture, and enzyme production. A standardization method utilizing a standard normal distribution equation to record fermentation yields of each isolate was employed to weight their different numeric scales and deviations. Following transformation, the data set was analyzed by cluster analysis. The Manhattan method for dissimilarity matrix construction along with complete linkage technique, an agglomerative method for hierarchical cluster analysis, was employed using statistical computing program R. A total of 100 isolates were classified into groups A, B, and C. In a comparison of the characteristics of each group, all characteristics in groups A and C were higher than those of group B. Isolates displaying higher cell yield were classified as group A, whereas those isolates showing high antioxidant activity and enzyme production were assigned to group C. The results of the cluster analysis can be useful for the classification of numerous isolates and the preparation of an isolation pool using numerical or statistical tools. The present study suggests that a simple technique can be applied to screen and select beneficial microbes using the freely downloadable statistical computing program R.

Characteristics of Surface Electromyography During Strength Training of 12 weeks (12주 근력강화훈련 동안 표면근전도 신호의 특성)

  • Shin, Hwa-Kyung;Cho, Sang-Hyun;Cha, Kwang-Suk
    • Physical Therapy Korea
    • /
    • v.10 no.1
    • /
    • pp.109-128
    • /
    • 2003
  • This study tested whether repeated measurement of median frequency (MDF)-related variables could express the muscle power changes during a 12-week DeLome strengthening program, by using consecutive overlapping FFT (Fast Fourier transformation) and integrated EMG (IEMG) from surface EMG data for isometric and isotonic exercise. To evaluate the effect of training, the following were recorded every 3 weeks for the elbow flexors and knee extensors of 5 healthy male volunteers: MVC, lRM, limb circumference, and surface EMG during isometric MVC or isotonic contraction at 10RM load. From the EMG data, IEMG and variables from a regression analysis between MDF and time were obtained. MVC, lRM, IEMG, and initial MDF increased linearly over the training period. The fatigue index and slope of the regression line increased temporarily until the 6th week and decreased thereafter. From these results, there appeared to be enhanced neural recruitment of fast twitch fibers in the first 6 weeks and continued enhancement in the recruitment and hypertrophy of fast twitch fibers, which led to increased fatigue resistance, over the last 6 weeks. Accordingly, the MDF and IEMG analysis technique could demonstrate the effect of the program detected significant changes in both isometric and isotonic contractions. EMG analysis methods can be used to estimate the electrophysiological and histological changes in skeletal muscles during a strengthening program.

  • PDF

A Study for the Necessity and Recognizing Usability of Recruit Education Curriculum for Security Personnel (민간경비원 신임교육과목 필요성 및 활용성 인식에 관한 연구)

  • Bang, Whan-Bog
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.195-220
    • /
    • 2008
  • Various Kinds of social pathology and crimes that threaten our daily safety are on the increase in process of time as a result of the development of science and technology empty of moral sense, Value Confusions, apolaustic tendency, economic and social transformation recently. Moreover the effective provision of police service lies beyond the boundaries of the police organization. Therefore private security personnel have made an effort for safety and protection of group as well as an individual through the introduction of private security industry based on a benefit principle and private security industry is being become complexes utilizing technology as well as high-end devices through various international events. The field of private security industry in Korea is being extended rapidly with expansionism of society and public services but the quality improvement is declining. Furthermore the study of recruit education program for security personnel as the basis of quality improvement is insufficient compared with the study of police service. Consequently, this investigation is going to contribute to development of recruit education program for security personnel through the analysis about difference of each subject usability for education about electronic security and facility guard.

  • PDF

Electromagnetic Forming Process Analysis Based on Coupled Simulations of Electromagnetic Analysis and Structural Analysis

  • Lee, Man Gi;Lee, Seung Hwan;Kim, Sunwoo;Kim, Jin Ho
    • Journal of Magnetics
    • /
    • v.21 no.2
    • /
    • pp.215-221
    • /
    • 2016
  • We conducted a phased electromagnetic forming process analysis (EFPA) over time through a coupling of electromagnetic analysis and structural analysis. The analysis is conducted through a direct linkage between electromagnetic analysis and structural analysis. The analysis process is repeated until the electric current is completely discharged by a formed coil. We calculate the forming force that affects the workpiece using MAXWELL, a commercial electromagnetic finite element analysis program. Then, we simulate plastic behavior by using the calculated forming force data as the forming force input to ANSYS, a commercial structure finite element analysis program. We calculate the forming force data by using the model shape in MAXWELL, a commercial electromagnetic finite element analysis program. We repeat the process until the current is fully discharged by the formed coil. Our results can be used to reduce the error in data transformation with a reduced number of data transformations, because the proposed approach directly links the electromagnetic analysis and the structural analysis after removing the step of the numerical analysis of a graph describing the forming force, unlike the existing electromagnetic forming process. Second, it is possible to simulate a more realistic forming force by keeping a certain distance between nodes using the re-mesh function during the repeated analysis until the current is completely discharged by the formed coil, based on the MAXWELL results. We compare and review the results of the EFPA using the peak value of the forming force that acts on the workpiece (which is the existing analysis method), and the proposed phased EFPA over time approach.