• Title/Summary/Keyword: security architecture

Search Result 1,093, Processing Time 0.029 seconds

A Study on the Real-time Data Interface Technology based on SCM for Shipbuilding and Marine Equipment Production (조선해양기자재 제작을 위한 SCM 기반 실시간 데이터 인터페이스 기술에 관한 연구)

  • Myeong-Ki Han;Young-Hun Kim;Jun-Su Park;Won-Ho Lee
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.27 no.1
    • /
    • pp.143-149
    • /
    • 2024
  • The production and procurement of shipbuilding and offshore equipment is an important competitive factor in the shipbuilding and offshore industry. Recently, ICT-based digital technology has been rapidly applied to the manufacturing industry following the Fourth Industrial Revolution. Under the digital transformation, real-time data interface technology based on SCM (Supply Chain Management) is emerging as an important tool to improve the efficiency of the equipment manufacturing process. In this study, the characteristics and advantages and disadvantages of interface technologies of web-based data interface technologies were compared and analyzed. The performance was compared between theoretical evaluation based on technical features and practical application cases. As a result, it was confirmed that GraphQL is useful for selective data processing, but there is a problem with optimization, and REST API has a problem with receiving data due to a fixed data structure. Therefore, this study aims to suggest ways to utilize and optimize these data interface technologies.

A Design of Smart Sensor Framework for Smart Home System Bsed on Layered Architecture (계층 구조에 기반을 둔 스마트 홈 시스템를 위한 스마트 센서 프레임워크의 설계)

  • Chung, Won-Ho;Kim, Yu-Bin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.49-59
    • /
    • 2017
  • Smart sensing plays a key role in a variety of IoT applications, and its importance is growing more and more together with the development of artificial intelligence. Therefore the importance of smart sensors cannot be overemphasized. However, most studies related to smart sensors have been focusing on specific application purposes, for example, security, energy saving, monitoring, and there are not much effort on researches on how to efficiently configure various types of smart sensors to be needed in the future. In this paper, a component-based framework with hierarchical structure for efficient construction of smart sensor is proposed and its application to smart home is designed and implemented. The proposed method shows that various types of smart sensors to be appeared in the near future can be configured through the design and development of necessary components within the proposed software framework. In addition, since it has a layered architecture, the configuration of the smart sensor can be expanded by inserting the internal or external layers. In particular, it is possible to independently design the internal and external modules when designing an IoT application service through connection with the external device layer. A small-scale smart home system is designed and implemented using the proposed method, and a home cloud operating as an external layer, is further designed to accommodate and manage multiple smart homes. By developing and thus adding the components of each layer, it will be possible to efficiently extend the range of applications such as smart cars, smart buildings, smart factories an so on.

A Study on the Improving Management Method for the Small Projects Applying Senior Construction Engineer (고령 건설기술자를 활용한 소규모공사의 공사관리방법 개선에 관한 연구)

  • Song Jin-Woo;Lee Sang-Beom
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2004.11a
    • /
    • pp.305-310
    • /
    • 2004
  • The building below standard scales to be built only by constructive report to authorities. Construction law 8 illustrates that supervision should be deployed in all the construction sites at the building which is found to have more than 3 floors and also to have more than $200m^2$ of total squares in especially outside area of city plan zone. Such a small construction is have a important and the most basic meaning. Many problems were found to occur in all the constructive places which were out of the limit of this law. The construction sites were found to be controlled by public official's visiting without supervisors and designers of architecture. Technique of construction in architecture was found to be not different from that of 1980. The security of employees in construction on sites has a serious problem. Because of choosing all the materials of the building without a reasonable point. All the building were found to have a law material about inside and outside aspects. The purpose of this study are to examine existing law about a small project and than to analyze the situation of constructive control through questionnaires and interviews with all the supervisors. Based on the data base of engineers who had a great experience in construction sites, The purpose of this study is also to suggest and advise the method of controlling all the items in architecture through on and off line.

  • PDF

Implementation of High-Throughput SHA-1 Hash Algorithm using Multiple Unfolding Technique (다중 언폴딩 기법을 이용한 SHA-1 해쉬 알고리즘 고속 구현)

  • Lee, Eun-Hee;Lee, Je-Hoon;Jang, Young-Jo;Cho, Kyoung-Rok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.4
    • /
    • pp.41-49
    • /
    • 2010
  • This paper proposes a new high speed SHA-1 architecture using multiple unfolding and pre-computation techniques. We unfolds iterative hash operations to 2 continuos hash stage and reschedules computation timing. Then, the part of critical path is computed at the previous hash operation round and the rest is performed in the present round. These techniques reduce 3 additions to 2 additions on the critical path. It makes the maximum clock frequency of 118 MHz which provides throughput rate of 5.9 Gbps. The proposed architecture shows 26% higher throughput with a 32% smaller hardware size compared to other counterparts. This paper also introduces a analytical model of multiple SHA-1 architecture at the system level that maps a large input data on SHA-1 block in parallel. The model gives us the required number of SHA-1 blocks for a large multimedia data processing that it helps to make decision hardware configuration. The hs fospeed SHA-1 is useful to generate a condensed message and may strengthen the security of mobile communication and internet service.

Spatial-Sensor Observation Service for Spatial Operation of GeoSensor (GeoSensor의 공간연산을 확장한 Spatial-Sensor Observation Service)

  • Lee, Hyuk;Lee, Yeon;Chung, Weon-Il;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.35-44
    • /
    • 2011
  • Advances in science and technology have made a lot of changes in our life. Especially, sensors have used in various ways to monitor in real time and analyze the world effectively. Traditional sensor networks, however, have used their own protocols and architecture so it had to be paid a lot of additional cost. In the past 8 years, OGC and ISO have been formulating standards and protocols for the geospatial Sensor Web. Although the OGC SWE initiatives have deployed some components, attempts have been made to access sensor data. All spatial operations had to calculate on the client side because traditional SOS architecture did not consider spatial operation for GeoSensor. As a result, clients have to implement and run spatial operations, and it caused a lot of overload on them and decreased approachableness. In this paper we propose S-SOS for in-situ and moving GeoSensor that extends 52 North SOS and provides spatialFilter and spatialFinder operations. The proposed S-SOS provides an architecture that does not need to edit already deployed SOSs and can add spatial operations as occasion. Additionally we explain how to express the spatial queries and to be used effectively for various location based services.

A Study on the Development of Standard Profiles Management System which supports the Technical Reference Model for Information Technology Architecture (정보기술 아키텍처를 위한 기술참조모델을 지원하는 표준프로파일 관리시스템 개발에 관한 연구)

  • Yang, Jin-Hyeok;Kim, Yeong-Do;Jeong, Hui-Jun;Yang, Jin-Yeong;Yu, Myeong-Hwan
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.665-672
    • /
    • 2001
  • ITA (Information Technology Architecture) satisfies the requirements of information system, supports the information used in the institution's business to guarantee the interoperability and security, and analyzes the components of information system. ITA consists of EA (Enterprise Architecture), TRM (Technical Reference Manual) and SP (Standard Profile). The SP, one of the major components of ITA, is a set of information technology standards. In this paper, to construct and utilize the ITA, we mention the applications of information technology about the SP system implementation based on the TRM. The SP management system implemented in this paper is the first trial in Korea, and designs the software with object oriented programming languages such as JSP and Java. Moreover the basic and detailed specification based on the UML notation, system design using the component and system design pattern consisting of software architectures enhance the software reusability. And the constructed system in this paper shows less maintenance cost by using the public softwares such as Linux system, Korean DBMS, Apache and Tomcat, etc. Finally, the system includes the SP reference system which is used in the other institutions and cannot be found in other institutions. Also it includes the additional diverse service modules which support the subsequent processing for the establishment and revision of standards via internet.

  • PDF

A Study on the Major Country's Domestic Intelligence Operation and Architecture: Focusing on UK, USA, France and Korea (주요 국가의 국내정보 활동 및 조직체계 연구 : 영국·미국·프랑스·우리나라의 국내정보기구를 중심으로)

  • Moon, Kyeong-Hwan
    • Korean Security Journal
    • /
    • no.41
    • /
    • pp.153-183
    • /
    • 2014
  • Nowadays, proactive intelligence activities are required because of enhanced nation wide threats of terrorism and complexity of multidimensional factors of national security. South Korea not only need to draw up plans of information sharing among agencies for more effective national intelligence activities, but also have to evaluate the structure of Domestic Intelligence Agency and its right direction of activities. In this vein, this paper conducts comparative studies of structures and range of activities of intelligence Agencies by reviewing U.K, U.S.A, and France cases and suggests a potential model of 'domestic information specified agency' that we can adopt and methods to share information among agencies. The focus of this paper is on the reviewing of necessity of establishing new 'domestic information specified agency' which will mainly conduct anti-terrorism and counterintelligence activities, and its appropriate form. After reviewing the cases of U.K, U.S.A. and France, we conclude that overcoming the people's distrust about an invasion of freedom and rights caused by centralized and integrated independent intelligence agency is a prerequisite. Disputable issues of FBI, DHS, and South Korea's intelligence agency cases suggest that plans for restoring trust have to be considered if a new 'domestic information specified agency' is established in NIS. If it is established under government ministries such as MSPA focusing on implementing anti-terrorism and counterintelligence activities, organizations such as NCTC, NIC, that can carry out information sharing and cooperating with agencies concerned have to be established. Additionally, measures to solve structural problems caused by carrying out law enforcement functions by domestic information specified agency should be considered.

  • PDF

The Evaluation of Crime Prevention Environment for Cultural Heritage using the 3D Visual Exposure Index (3D 시각노출도를 이용한 문화재 범죄예방환경의 평가)

  • Kim, Choong-Sik
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.35 no.1
    • /
    • pp.68-82
    • /
    • 2017
  • Strengthening surveillance, one of the most important factors in the crime prevention environment of cultural heritages, has difficulty in evaluating and diagnosing the site. For this reasons, surveillance enhancement has been assessed by modelling the shape of cultural heritage, topography, and trees digitally. The purpose of this study is to develop the evaluation method of crime prevention environment for cultural heritage by using the 3D visual exposure index (3DVE) which can quantitatively evaluate the surveillance enhancement in three dimensions. For the study, the evaluation factors were divided into natural, organizational, mechanical, and integrated surveillance. To conduct the analysis, the buildings, terrain, walls, and trees of the study site were modeled in three dimensions and the analysis program was developed by using the Unity 3D. Considering the working area of the person, it is possible to analyze the surveillance point by dividing it into the head and the waist position. In order to verify the feasibility of the 3DVE as the analysis program, we assessed the crime prevention environment by digitally modeling the Donam Seowon(Historic Site No. 383) located in Nonsan. As a result of the study, it was possible to figure out the problems of patrol circulation, the blind spot, and the weak point in natural, mechanical, and organizational surveillance of Donam Seowon. The results of the 3DVE were displayed in 3D drawings, so that the position and object could be identified clearly. Surveillance during the daytime is higher in the order of natural, mechanical, and organizational surveillance, while surveillance during the night is higher in the order of organizational, mechanical, and natural surveillance. The more the position of the work area becomes low, the more it is easy to be shielded, so it is necessary to evaluate the waist position. It is possible to find out and display the blind spot by calculating the surveillance range according to the specification, installation location and height of CCTV. Organizational surveillance, which has been found to be complementary to mechanical surveillance, needs to be analyzed at the vulnerable time when crime might happen. Furthermore, it is note that the analysis of integrated surveillance can be effective in examining security light, CCTV, patrol circulation, and other factors. This study was able to diagnose the crime prevention environment by simulating the actual situation. Based on this study, consecutive researches should be conducted to evaluate and compare alternatives to design the crime prevention environment.

A Study on Users' Recognition of Selection Attributes for Connection between Recreational Forest and Rural Tourism Village (자연휴양림과 체험마을 연계를 위한 이용객의 선택속성 인식 연구)

  • Lee, Yong-hak;Cho, Yeong-Eun;Kang, Eun-jee;Kim, Yong-Geun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.44 no.1
    • /
    • pp.16-28
    • /
    • 2016
  • The study was conducted to compare and analyze the importance and performance of leisure destination selection attributes of persons who use recreational forests and rural tourism villages. This researcher investigated the use patterns of users to identify the ground for connection between recreational forest and rural tourism village, analyzed their recognition differences in physical selection attribute, program selection attribute, and service selection attribute in order for leisure destination selection, and conducted importance-performance analysis(IPA analysis) to draw a plan for connection. The main results and suggestions are presented as follows. First, recreational forests were visited by family users in order for rest and emotional cultivation and provided experience programs using simple public interest function of forest, whereas rural tourism villages were visited by family users, friends and co-workers, groups and club members to experience a variety of annual programs and understand regional cultures. It was found that it was necessary to connect natural forest with rural tourism village in order to meet the leisure needs of the people changed in diversified ways. Secondly, it was found that the connection between rural tourism village and recreational forest visited mainly for simple rest led to positive visit intention of users. It was expected that there will be various kinds of uses, including experience program participation, child education, and safe accommodations security. In other words, the connection between recreational forest and rural tourism village is an alternative to trigger actual demands and recreational forest activities with high quality. Thirdly, in the case of users of recreational forests, their performance of all selection attributes was lower than their importance of them. Therefore, overall improvements were needed. In particular, needed were the diversity, benefit, and promotion of programs, improvements in locality(themes), supply of lodges and convenient facilities, booking system, the purchase system of local special products, and professional skills of operators and managers. On contrary, the performance of program selection attribute of rural tourism village was high. Therefore, it was found that program attribute of rural tourism village was the main connection factor to activate recreational forest use. Fourthly, according to IPA analysis, the proper connections between loges, convenient facilities, and nearby touristattractions, which give high expectations and satisfaction to users, needed to remain. And it was required to make common efforts to accomplish the goal (income creation) of rural tourism village and improve booking system for visitors and performance of local special products sales opportunity. In addition, the essential factors to induce users' leisure destination selection were found to be maintenance of the use fee system of recreational forest, diversity of rural tourism village program, and retention of locality.

Landscape Assessment and Improvement of the View Area by Selecting the Landscape Control Point (조망점 선정을 통한 대상지의 경관가치 평가 및 개선방안)

  • Kim, Jin-Hyo;Lee, Hyun-Taek;Ra, Jung-Hwa;Cho, Hyun-Ju;SaGong, Jung-Hee
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.40 no.5
    • /
    • pp.19-32
    • /
    • 2012
  • The purpose of this study is to quantitatively measure the view target and the view area through the selection of landscape control point by selecting Jimyeong-dong Dong-gu and Yeongyeong-dong Buk-gu Daegu, which are planned as the large scale housing complex development area, as the target places. It is very meaningful that from the simulation based on this measurement, the improvement methods are attempted to be suggested at the project level. The results of this study are as follows. First, the total number of viewing targets derived from the literature analysis for the selection of the viewing targets was 24, and finally derived main viewing targets were 4 places. Second, the total number of selection criteria of the derived landscape control point was 15, and these were re-categorized as prospect, accessibility and publicness according to the common property. The preliminary LCPs were selected by measuring the publicness and accessibility, and because of the said measurement, a total of 43 preliminary LCPs were selected. The final LCPs were selected by estimating the prospect of the selected preliminary LCPs, and as a result of estimation, a total of 29 final LCPs were selected. Finally, the total number of evaluation indicators derived from literature analysis was 26. Because of the valuation by the landscape control point, it was found that the 2 view areas were the I grade, 3 areas were II grade and 3 areas were the V grade, the lowest grade among 29 view areas. From the analysis on problems for the improvement methods, 4 improvement-indicators including the diversity of land mosaic were selected for the view area-1 without considering the development project drawing. In addition, for the view area-2 with considering the development project drawing, the landscape as the scenery forests was well formed, and the arrangement of architectures for the security of view corridor was right angle arrangement, and their floor number was 10.