• Title/Summary/Keyword: Software Weakness

Search Result 115, Processing Time 0.027 seconds

A Study on the Stress Simulation for the Body Design of a PFA-lined Plug Valve (PFA 라이닝 플러그 밸브 설계를 위한 밸브 본체의 응력 시뮬레이션)

  • Kang, Shin-Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.3
    • /
    • pp.500-506
    • /
    • 2009
  • This study, is aimed to support the valve design engineer by a CAE simulation on the body of a PFA-lined plug valve, and focuses on static stress analysis, location of the weak point on bending and stiffness of the valve body. To determine whether the valve body can resist being transformed by loads, 1 simulated the stress distribution using CAD/CAE softwares. The 'step' file converted by CAD software after solid modeling is imported to the CAE software. Through simulation procedure, it is shown that the designed-solid-model fur a valve body has stiffness on bending and torsion but has weakness for side bending moment. Also, it is expected that the valve design engineer will understand the basic process of CAE and will be able to apply on his task.

Study on Application Case of Scrum Methodology using Visibility

  • Chang, Eun-Sun;Kim, Neung-Hoe
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.161-166
    • /
    • 2019
  • Viewed in the rate of change in the web environment, it is very difficult to remain the initial planning at the time until the time of launch, and there is a need for a method to accommodate changes and satisfy market demands during the development process. Unlike the traditional waterfall approach of maintaining initial planning, scrum is one of the agile methodologies that enables flexibility to respond to changes in the market and customers' needs and drive customer satisfaction and business success. However, to apply the scrum to a project in actual, the practice method itself is relatively simple but not easy to apply. The reason is that the members of the organization need to understand and participate in scrum's philosophy and principles and the continuous observation and change management should be carried out. Therefore, in this paper, we presented the feature dashboard and customized scrum methodology to enable continuous observation and change management using visibility, and we shared the case that periodically reflected inspection and adaptation with the explanation of the main points. Also, based on the experience with participants, the strengths and weakness of the feature dashboard and the customized scrum methodology are summarized.

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

Design of Evaluation Index System for Information Experience based on B2C e-Commerce Bigdata and Artificial Intelligence

  • KANG, Jangmook;HU, Haibo;CHEN, Yinghui;LEE, Sangwon
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • The online retail market continues to grow, especially in China, as e-commerce has developed rapidly in recent years in many countries. Meanwhile, the development and use of new network information technology provides consumers with various contact and experience environments for online shopping. Based on the theory of media weakness, the study began to focus consumer experience on the nature of commercial transactions. The study proposed and designed an initial measure of the consumer information evaluation index, which combines previous findings with implications. Finally, the five-dimensional B2C system was established to evaluate consumers' information experience providing information display, information interaction, information support and information personalization. We researched on evaluation index system for information experience of B2C e-commerce consumers based on samples of Chinese consumers.

Decision Support Tool for Evaluating Push and Pull Strategies in the Flow Shop with a Bottleneck Resource

  • Chiadamrong, N.;Techalert, T.;Pichalai, A.
    • Industrial Engineering and Management Systems
    • /
    • v.6 no.1
    • /
    • pp.83-93
    • /
    • 2007
  • This paper gives an attempt to build a decision support tool linked with a simulation software called ARENA for evaluating and comparing the performance of the push and pull material driven strategies operating in the flow shop environment with a bottleneck resource as the shop's constraint. To be fair for such evaluation, the comparison must be made fairly under the optimal setting of both systems' operating parameters. In this study, an optimal-seeking heuristic algorithm, Genetic Algorithm (GA), is employed to suggest a systems' best design based on the economic consideration, which is the profit generated from the system. Results from the study have revealed interesting outcomes, letting us know the strength and weakness of the push and pull mechanisms as well as the effect of each operating parameter to the overall system's financial performance.

An Accelerated Life Test for Burnout of Tungsten Filament of Incandescent Lamp (텅스텐 백열전구의 필라멘트 단선에 대한 가속수명시험)

  • 이재국;김진우;신재철;김명수
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2004.07a
    • /
    • pp.129-137
    • /
    • 2004
  • This paper presents an accelerated life test for burnout of tungsten filament of incandescent lamp. From failure analyses of field samples, it is shown that their root causes are local heating or hot sports in the filament caused by tungsten evaporation and wire sag. Finite element analysis is performed to evaluate the effect of vibration and impact for burnout, but any points of stress concentration or structural weakness are not found in the sample. To estimate the burnout life of lamp, an accelerated life test is planned by using quality function deployment and fractional factorial design, where voltage, vibration, and temperature are selected as accelerating variables. We assumed that Weibull lifetime distribution and a generalized linear model of life-stress relationship hold through goodness of fit test and test for common shape parameter of the distribution. Using accelerated life testing software, we estimated the common shape parameter of Weibull distribution, life-stress relationship, and accelerating factor.

  • PDF

안전한 소프트웨어 개발을 위한 시큐어 SDLC 동향

  • Park, Ran Kyoung;Lim, Jong In
    • Review of KIISC
    • /
    • v.26 no.1
    • /
    • pp.34-41
    • /
    • 2016
  • 최근 사이버 공격은 분야와 대상을 막론하지 않고 곳곳에서 발생하고 있으며 소프트웨어의 보안 취약점을 이용한 지능적인 수법으로 지속적인 공격을 수행하는 APT 공격 또한 확산하고 있다. 이와 같은 공격을 예방하기 위해서는 공격에 직접 이용되는 소프트웨어 보안 취약점을 사전에 제거해야 한다. 소프트웨어 보안 취약점(vulnerability)의 원천 원인은 소프트웨어 허점, 결점, 오류와 같은 보안 약점(weakness)이다. 그러므로 소프트웨어에서 보안 약점은 개발 단계에서 완전히 제거하는 것이 가장 좋다. 이를 위해 소프트웨어 개발 생명주기(SDLC:Software Development Life Cycle) 전반에 걸쳐 보안성을 강화하는 활동을 수행한다. 이는 소프트웨어 배포 이후에 발생할 수 있는 보안 취약점에 대한 보안 업데이트 및 패치에 대한 비용을 효과적으로 감소시키는 방안이기도 한다. 본 논문에서는 소프트웨어 개발 단계 보안을 강화한 소프트웨어 개발 생명주기로서 시큐어 SDLC에 대한 주요 사례를 소개한다.

Developing a Conceptual ERP Model by using "4+1 View" ("4+1 뷰"를 적용한 ERP 개념 모델 개발)

  • 허분애;정기원;이남용
    • The Journal of Society for e-Business Studies
    • /
    • v.5 no.2
    • /
    • pp.81-99
    • /
    • 2000
  • Nowadays, many commercial ERP products, such as Oracle, SAP, and Baan, etc, are designed based on large-scaled companies. It is difficult for small and medium-size companies with weakness in budgets and resources(e.g., human, organization, technique, and so on) to use them as it was. So, new ERP system need to be provided for small and medium-size companies. In this paper, we model and provide a conceptual ERP model for small and medium-size companies by using "4+1 View" architecture model of Unified Modeling Language(UML). The conceptual ERP model consists of five subsystems: Manufacturing, Sales, HumanResource and Payroll, Accounting, and Trading. Especially, we describe the conceptual ERP model focusing on "Manufacturing" subsystem by using several diagrams of UML. By using the conceptual ERP model, the ERP system′s developers of small and medium-size companies can obtain many benefits: improving the efficiency of software developing process and helping user requirements gathering and description of ERP system′s nonfunctional aspect as well as functional aspect.

  • PDF

Finding the Ball with WaterShed Algorism (Water Shed 알고리듬을 이용한 공 찾기)

  • Yu Ji-Chul;Kim Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.833-836
    • /
    • 2006
  • This is the paper for the finding the hidden ball with the Water Shed Algorism, and for analyzing the weakness. So, With this paper, Other institutions or organizations can improve their researching. For this researching, Visual Studio C++ is used, and some kinds of Algorism is added to the software such as Distance Transform, Labelling which we make.

  • PDF

A Novel Graduation Algorithm in Image Mosaic

  • Luo, Wenfei;Li, Yan;Wang, Xiaoming
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1316-1318
    • /
    • 2003
  • The Bernstein polynomial is one of the classic algorithms of panoramic images mosaic for shading into process applying in Virtual Reality modeling. Nevertheless, it is proven that the algorithm has its own limitation and weakness in applications. This paper was given the improved algorithm using Sinusoidal function for image mosaic. In order to put the new algorithm into image processing software as a flexible and general tool, it was further developed an extension for graduation image fusion and multi-images mosaic.

  • PDF