• Title/Summary/Keyword: Virtual ID

Search Result 50, Processing Time 0.026 seconds

Development of the Virtual Reality Plant for Nuclear Power Plant (원자력발전소를 위한 강의실용 가상발전소 교육훈련 시스템 개발)

  • 홍진혁
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 2003.05a
    • /
    • pp.391-398
    • /
    • 2003
  • 지금까지 전범위 시뮬레이터에 의해 이루어진 원자력 및 화력발전소에서의 운전원교육은 실제 발전소 주제어실과 유사한 상황을 전개한다는 장점을 가지고 있으나, 주요 계통 및 기기에 대한 설명을 위해서는 교과서를 공유하거나, 강사의 지식을 칠판에 서술하는 방법으로만 진행되어 왔다. 전력연구원은 이러한 교육을 상당부분 강의실 컴퓨터를 이용하여 수행할 수 있다는데 착안하여 강의실용 가상발전소 교육훈련 시스템(VRPLANT)을 개발하였다. VRPLANT는 3차원 웹(Web) 기술을 적용하여 발전소 건물, 건물내의 주요기기 등을 3차원 가상공간에서 구축하여 Navigation할 수 있도록 하였으며, 주요기기에 대해서는 엔지니어링 데이터베이스가 연동되어 있어서 이동 중에 특정 기기를 선택하면 P&ID, 논리도면, 기술설명서 등을 참조해 볼 수 있도록 개발하였다. 또한 기기들은 모니터상에서 분해 및 조립이 가능하여 기기의 형태, 내부구조 및 동작원리 등을 용이하게 이해할 수 있도록 하였다.

  • PDF

A Study on Framework for Open Virtual World (개방형 가상세계 프레임워크에 관한 연구)

  • Seo, Hae-Moon;Yim, Jae-Ha;Kim, Si-Young;Park, Woo-Chool
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.04a
    • /
    • pp.318-321
    • /
    • 2010
  • 기존의 가상세계는 서비스 주체별로 독자적인 방식으로 구축하여 서비스를 제공하는 닫힌 가상세계에서의 참여자간의 커뮤니티 형성, 특정 서비스 영역에 중점을 두고 있다. 하지만 닫힌 가상세계 서비스는 사용자에게 매우 불편하다. 각 가상세계 서비스별로 회원가입을 하고 해당 프로그램을 설치해야 하며, 여러 개의 ID와 password를 기억해야 한다. 또한, 제작자중심으로 가상세계를 구현하기 때문에 사용자들의 생각을 표현할 수 없어 폐쇄적이다. 본 논문은 사용자 중심의 개방형 및 진화형 현실모사 가상세계 프레임워크를 제작하기 위한 설계 및 구현에 대해 기술한다.

A Study on the Performance of VPN based on MPLS Networks (MPLS 망을 기반으로 하는 VPN의 성능에 관한 연구)

  • Shin, Tae-Sam;Kim, Young-Beom
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.8 no.1
    • /
    • pp.51-57
    • /
    • 2007
  • In this paper we introduce the concept of MPLS-based VPN and propose a scheme for providing VPN services in MPLS networks. Furthermore, we design the control components and the operational procedures and evaluated the performance of traditional VPN implementation methods and MPLS-based VPN. In this scheme it is possible to solve several problems that IP-based VPN pertains via the allocation of VPN ID and virtual space without tunneling, thereby providing effective VPN services. In other words, the MPLS-based VPN scheme uses MPLS networking technology together with the PSTN which can achieve a perfect segregation of user traffic on per-customer basis in a physical link and can guarantee high reliability and security levels. Specially, in the perspective of customers, it can save networking facilities installation and maintenance costs considerably. On the contrary, it possesses some shortcomings in that its deployment tends to be restricted within an ISP's network boundary and it is vulnerable to external security break-ins when going through public networks such as the Internet due to its lack of data encryption capability.

  • PDF

Modeling and Implementation of IDS for Security System simulation using SSFNet (SSFNet 환경에서 보안시스템 시뮬레이션을 위한 IDS 모델링 및 구현)

  • Kim, Yong-Tak;Kwon, Oh-Jun;Seo, Dong-Il;Kim, Tai-Suk
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.1
    • /
    • pp.87-95
    • /
    • 2006
  • We need to check into when a security system is newly developed, we against cyber attack which is expected in real network. However it is impossible to check it under the environment of a large-scale distributive network. So it is need to simulate it under the virtual network environment. SSFNet is a event-driven simulator which can be represent a large-scale network. Unfortunately, it doesn't have the module to simulate security functions. In this paper, we added the IDS module to SSFNet. We implement the IDS module by modeling a key functions of Snort. In addition, we developed some useful functions using Java language which can manipulate easily a packet for network simulation. Finally, we performed the simulation to verify the function if our developed IDS and Packets Manipulation. The simulation shows that our expanded SSFNet can be used to further large-scale security system simulator.

  • PDF

A Study on Traffic Big Data Mapping Using the Grid Index Method (그리드 인덱스 기법을 이용한 교통 빅데이터 맵핑 방안 연구)

  • Chong, Kyu Soo;Sung, Hong Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.6
    • /
    • pp.107-117
    • /
    • 2020
  • With the recent development of autonomous vehicles, various sensors installed in vehicles have become common, and big data generated from those sensors is increasingly being used in the transportation field. In this study, we proposed a grid index method to efficiently process real-time vehicle sensing big data and public data such as road weather. The applicability and effect of the proposed grid space division method and grid ID generation method were analyzed. We created virtual data based on DTG data and mapped to the road link based on coordinates. As a result of analyzing the data processing speed in grid index method, the data processing performance improved by more than 2,400 times compared to the existing link unit processing method. In addition, in order to analyze the efficiency of the proposed technology, the virtually generated data was mapped and visualized.

Ultimate-Game Automatic Trace and Analysis System Using IoT (사물인터넷 기반 얼티미트 경기 자동추적 및 분석 시스템)

  • Lim, Jea Yun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.1
    • /
    • pp.59-66
    • /
    • 2022
  • In this paper, by applying IoT technology to the Ultimate game, which is one of the games using Flyingdisc, the process of the game is traced based on the players and the flyingdisc, and a comprehensive relationship analysis between players is performed on the results of the game. A WiFi module with built-in GPS is attached in the players and flyingdisc. The player's ID, latitude/longitude values received from GPS and time are stored in the database in realtime during the game. Process informations of the game is also stored in the database at the same time using mobile Ultimate game App. Based on this informations after the game is over, we developed a system that can perform comprehensive analysis of the game contents. By using the informations stored in the database, the player-based game process and the flyingdisc-based scoring process are visualized in the virtual playground. Various game result informations for players are graphically analyzed using Python.

Analysis of the Impact of Host Resource Exhaustion Attacks in a Container Environment (컨테이너 환경에서의 호스트 자원 고갈 공격 영향 분석)

  • Jun-hee Lee;Jae-hyun Nam;Jin-woo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.1
    • /
    • pp.87-97
    • /
    • 2023
  • Containers are an emerging virtualization technology that can build an isolated environment more lightweight and faster than existing virtual machines. For that reason, many organizations have recently adopted them for their services. Yet, the container architecture has also exposed many security problems since all containers share the same OS kernel. In this work, we focus on the fact that an attacker can abuse host resources to make them unavailable to benign containers-also known as host resource exhaustion attacks. Then, we analyze the impact of host resource exhaustion attacks through real attack scenarios exhausting critical host resources, such as CPU, memory, disk space, process ID, and sockets in Docker, the most popular container platform. We propose five attack scenarios performed in several different host environments and container images. The result shows that three of them put other containers in denial of service.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

Development of tangible language content system based on voice recording (음성녹음 기반의 실감형 어학시스템 콘텐츠 개발)

  • Na, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.2
    • /
    • pp.234-239
    • /
    • 2013
  • Learning a lesson about poor concentration and problems of the existing content, the system of language which could not be determined, Many teachers' assessment decision was made. As a result, voice recording based on the combination of ubiquitous technology and virtual reality technology, and install the projector in a classroom Through the learning content corresponding grade English student ID card attached RFID reader in each classroom, and students of RFID tags attached. In reality of the virtual three-dimensional image content foreigners and question-and-answer using the voice recording technology at the same time check the pronunciation and intonation level passes or level failure judged. Student education data to a central server system is configured to do so after saving to the DB through a feedback process, which provides information. Analysis of the issues that can have a common language content in the present study and Problem for voice recording technology to solve the problem and did not solve the existing language in the content level based classes.

QoS Guaranteed Secure Network Service Realization using Global User Management Framework (GUMF);Service Security Model for Privacy

  • Choi, Byeong-Cheol;Kim, Kwang-Sik;Seo, Dong-Il
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1586-1589
    • /
    • 2005
  • GUMF (Global User Management Framework) that is proposed in this research can be applied to next generation network such as BcN (Broadband convergence Network), it is QoS guaranteed security framework for user that can solve present Internet's security vulnerability. GUMF offers anonymity for user of service and use the user's real-name or ID for management of service and it is technology that can realize secure QoS. GUMF needs management framework, UMS (User Management System), VNC (Virtual Network Controller) etc. UMS consists of root UMS in country dimension and Local UMS in each site dimension. VNC is network security equipment including VPN, QoS and security functions etc., and it achieves the QoSS (Quality of Security Service) and CLS(Communication Level Switching) functions. GUMF can offer safety in bandwidth consumption attacks such as worm propagation and DoS/DDoS, IP spoofing attack, and current most attack such as abusing of private information because it can offer the different QoS guaranteed network according to user's grades. User's grades are divided by 4 levels from Level 0 to Level 3, and user's security service level is decided according to level of the private information. Level 3 users that offer bio-information can receive secure network service that privacy is guaranteed. Therefore, GUMF that is proposed in this research can offer profit model to ISP and NSP, and can be utilized by strategy for secure u-Korea realization.

  • PDF