• Title/Summary/Keyword: Security System Modeling

Search Result 266, Processing Time 0.029 seconds

Development of Camera System Board Using ARM (ARM을 이용한 카메라 시스템 보드 개발에 관한 연구)

  • Choi, Young-Gyu
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.664-670
    • /
    • 2018
  • In modern society, CCTV, which is the eye of surveillance, is being used to collect image data in various ways in daily life. CCTV is used not only for security, surveillance, and crime prevention but also in many fields such as automobile and black box. In this paper, we have developed a STM32F407 ARM chip based camera system for various applications. In order to develop camera system, modeling of camera system based on 3D structure was carried out in SolidWorks environment. The PCB board design was developed to extract the PCB parts from the camera system modeling files into iges files, convert them from the Altium Designer tool into 3D and 2D boards, After designing the camera system circuit and PCB, we have been studying the implementation of the stable system by using TRM (Thermal Risk Management) tool to cope with the heat simulation generated on the board.

THE INVESTIGATION OF PROPERTY MANAGEMENT AND DEVELOPMENT OF "BUILDING ADMINISTRATION SYSTEM"

  • Yan-Chyuan Shiau ;Cheng-Wei Liu ;Shu-Jen Sung;Chih-Kun Chu;Tsung-Pin Tsai
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.550-557
    • /
    • 2005
  • Because each building is built in different time, there exists different equipment to meet the need for each age. Before the announcement of "Community Management Regulation", the old communities usually suffer the problem of lower requirement and living quality. This may bring some security problem that we should face. In this research, we construct "Building Administration System" to provide users a tool to perform a standard operation procedure in community management. This powerful tool will also help manager to effectively handle important tasks in property administrating by reducing unnecessary documentation. In the current regulation, all community committee members shall be voted each year. This will seriously affect the cumulative of management knowledge and cause a worse efficiency. In this research, we use Object Oriented concept and Visual Modeling techniques to combine with Interbase, ER/Studio, and Delphi to develop this management system for Building Property. Through the help of current computing technology, we can solve the problem that can not be inherited and the storing of the huge amount of data. In this system, we develop the modules such as Basic Data Module, Administrative Expense Calculation, Receipt Print, and Inquiring for Inheritance. In this system, we have integrated all houses, parking lots, and public equipments in it. Manager will only need to handle some basic accounting data; the system will automatically handle the rest. Through the help of this system, the community management staff can be easily accomplished and put more manpower on some needed aspect to improve the living quality.

  • PDF

Design of Irrigation Pumping System Controller for Operational Instrument of Articulation (관절경 수술을 위한 관주(灌注)시스 (Irrigation Pumping System) 제어기의 개발)

  • 김민수;이순걸
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.1294-1297
    • /
    • 2003
  • With the development of medical field, many kinds of operations have been performed on human articulation. Arthroscopic surgery, which has Irrigation Pumping System for security of operator vision and washing spaces of operation, has been used for more merits than others. In this paper, it is presented that the research on a reliable control algorithm of the pumping system instrument for arthroscopic surgery. Before clinical operation, the flexible artificial articulation model is used for realizing the model the most same as human's and the algorithm has been exploited for it. This system is considered of the following; limited sensing point, dynamic effect by compliance, time delay by fluid flow and so on. The system is composed with a pressure controller, a regulator for keeping air pressure, an airtight tank that can have distilled water packs, artificial articulation and a measuring system, and has controlled by the feedback of pressure sensor on the artificial articulation. Also the system has applied to Smith Predictor for time delay and the parameter estimation method for the most suitable system with both the experiment data and modeling. In this paper, the pressure error that is between an air pressure tank and an artificial articulation was measured so that the system could be presumed and then the controller had developed for performing State-Feedback. Finally, the controller with a real microprocessor has realized. The confidence of system can be proved by applying this control algorithm to an artificial articulation experiment material.

  • PDF

Efficient Kernel Integrity Monitor Design for Commodity Mobile Application Processors

  • Heo, Ingoo;Jang, Daehee;Moon, Hyungon;Cho, Hansu;Lee, Seungwook;Kang, Brent Byunghoon;Paek, Yunheung
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.1
    • /
    • pp.48-59
    • /
    • 2015
  • In recent years, there are increasing threats of rootkits that undermine the integrity of a system by manipulating OS kernel. To cope with the rootkits, in Vigilare, the snoop-based monitoring which snoops the memory traffics of the host system was proposed. Although the previous work shows its detection capability and negligible performance loss, the problem is that the proposed design is not acceptable in recent commodity mobile application processors (APs) which have become de facto the standard computing platforms of smart devices. To mend this problem and adopt the idea of snoop-based monitoring in commercial products, in this paper, we propose a snoop-based monitor design called S-Mon, which is designed for the AP platforms. In designing S-Mon, we especially consider two design constraints in the APs which were not addressed in Vigilare; the unified memory model and the crossbar switch interconnect. Taking into account those, we derive a more realistic architecture for the snoop-based monitoring and a new hardware module, called the region controller, is also proposed. In our experiments on a simulation framework modeling a productionquality device, it is shown that our S-Mon can detect the rootkit attacks while the runtime overhead is also negligible.

Impact of Fourth Industrial Revolution on Airport Management System: Moderator Effect of Convergence and Leadership (4차 산업혁명이 공항경영시스템에 미치는 영향 : 융합 및 리더십의 조절효과)

  • Lee, Yung-Kil;Baek, Jeong-Sun;Park, Sung-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.5
    • /
    • pp.289-303
    • /
    • 2022
  • The purpose of this study verify to influence the effect of the 4th industrial revolution recognized by airport operators on the airport management system and the moderator effects of convergence and leadership between these influence relationships. Data collected through a survey of airport operators using simple random sampling at six international airports in Korea. Data analysis performed using Structural Equation Modeling. The research results found that the 4th industrial revolution had a positive effect on the airport management system. Also, moderator effects of convergence and leadership found significant statistically. In this paper, we asserts that it should be reconstructed the airport management system as a system suitable for the era of the 4th industrial revolution. This paper provide theoretical data and directions for empirical research to airport researchers, and implications for airport enterprise managers and airport policy planners. The findings of this study are particularly helpful for international airports that have adopted the technologies of the Fourth Industrial Revolution.

Neutral Reference Model for the Sharing and Propagation of Engineering Change Information in a Collaborative Engineering Development (협업 개발 내 설계 변경 정보의 공유 및 전파를 위한 중립 참조 모델)

  • Hwang, Jin-Sang;Mun, Du-Hwan;Han, Soon-Hung
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.4
    • /
    • pp.243-254
    • /
    • 2008
  • As modular production becoming increasingly widespread in globalized manufacturing industries, sub modules or parts of the final product are being provided by many suppliers. Some part suppliers design their own products for themselves. In some cases, part suppliers provide the same type of product to multiple OEM companies. Because all part suppliers and OEM companies typically cannot use the same CAD system, engineering change in the CAD model of one company cannot be directly propagated to related CAD models of other companies. Even if two companies use the same CAD system, it may be difficult to share their CAD model owing to corporate security policy. In this paper, a neutral reference model that consists of a neutral skeleton model and an external reference data model is proposed as a new medium for the sharing and propagation of engineering change information among collaborating companies.

Survey on IEEE 802.11 DCF Game Theoretic Approaches (IEEE 802.11 DCF에서의 게임 이론적 접근방법 소개)

  • Choi, Byeong-Cheol;Kim, Jung-Nyeo;Ryu, Jae-Cheol
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.240-242
    • /
    • 2007
  • The game theoretic analysis in wireless networks can be classified into the jamming game of the physical layer, the multiple access game of the medium access layer, the forwarder's dilemma and joint packet forwarding game of the network layer, and etc. In this paper, the game theoretic analysis about the multiple access game that selfish nodes exist in the IEEE 802.11 DCF(Distributed Coordination Function) wireless networks is addressed. In this' wireless networks, the modeling of the CSMA/CA protocol based DCF, the utility or payoff function calculation of the game, the system optimization (using optimization theory or convex optimization), and selection of Pareto-optimality and Nash Equilibrium in game strategies are the important elements for analyzing how nodes are operated in the steady state of system. Finally, the main issues about the game theory in the wireless network are introduced.

  • PDF

Modeling and Implementation of A Dynamic Reconfiguration Framework (동적 형상조정 프레임워크의 모델링 및 구현)

  • 윤태웅;민덕기
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.3
    • /
    • pp.83-94
    • /
    • 2003
  • For 24 hours-7 days service on distributed systems, a great deal of efforts are investigated on high availability for seamless operation. In this paper, we propose a dynamic reconfiguration framework of distributed systems, called "hot-swapping" framework. This framework allows us to upgrade and exchange a number of modules of a distributed system without stopping running service as well as the system itself. In order to hide the state of service operation, the framework employes the "proxy" design pattern. Our framework provides two types of proxies: a static proxy and a dynamic proxy, Static proxies can achieve fast execution time, but they need to be changed whenever any minor change exists in the related swappable module. Meanwhile, dynamic proxies takes longer execution time, but do not need to be changed under minor changes of swappable modules. We compare performances of static and dynamic proxies and also apply the framework to a real situation with security management modules. management modules.

  • PDF

A Study on the Discrimination Criteria of AMOLED-related Patents, a National Core Technology of Display Industry (디스플레이 분야 국가핵심기술인 AMOLED 관련 특허의 판별 기준 연구)

  • Se Hee Pak;Hang Bae Chang
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.105-121
    • /
    • 2024
  • Korea operates a national core technology system to protect important technologies at the national level. In the administrative procedures of the nation's core technology, the deliberation process conducted by qualitative evaluation by related industry experts is important. As the need for timely and appropriate technology protection increased, the need to shorten the time required for administrative procedures related to the designation and removal of national core technologies was raised. Therefore, this study studied the criteria for identifying patents related to national core technologies. For AMOLED, a national core technology in the display field, LDA topic modeling was applied to related news and papers to derive important technology and its trends, and mapped to AMOLED advanced technology processes under Article 5 of the Industrial Development Act to prepare criteria for discrimination. Since then, objective verification has been conducted through AMOLED national core technology patents already known. Through this study, patents related to AMOLED national core technologies can be identified, which can shorten the time for related administrative procedures.

Real-time Anomaly Detection System Using HITL Simulation-Based UAV Packet Data (HITL 시뮬레이션 기반 무인비행체 패킷 데이터를 활용한 실시간 이상 탐지 시스템)

  • Daekyeong Park;Byeongjin Kim
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.103-113
    • /
    • 2023
  • In recent years, Unmanned Aerial Vehicles (UAV) have been widely used in various industries. However, as the depend ence on UAV increases rapidly, concerns about the security and safety of UAV are growing. Currently, various vulnerabili ties such as stealing the control right of the UAV or the right to communicate with the UAV in the web application are being disclosed. However, there is a lack of research related to the security of UAV. Therefore, in this paper, a study was conducted to determine whether the packet data was normal or abnormal by collecting packet data of an unmanned aerial vehicle in a HITL(Hardware In The Loop) simulation environment similar to the real environment. In addition, this paper proposes a method for reducing computational cost in the modeling process and increasing the ease of data interpretation, a machine learning-based anomaly detection model that detects abnormal data by learning only normal data, and optimized hyperparameter values.