• Title/Summary/Keyword: 분리보장

Search Result 233, Processing Time 0.022 seconds

Analysis of the Longitudinal Static Stability and the Drop Trajectory of a Fighter Aircraft's External Fuel Tank (전투기 외부 연료 탱크의 종방향 정안정성 및 투하 궤적 해석)

  • Kang, Chi-Hang;Cho, Hwan-Kee;Jang, Young-Il;Lee, Sang-Hyun;Kim, Kwang-Youn
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.3
    • /
    • pp.274-279
    • /
    • 2010
  • The present work is to analyze the longitudinal static stability and the drop trajectory of fighter aircraft's external fuel tank, of which horizontal fin is modified as the 20% scale down size compared with the original one. The analytical results to the pitching stability of external fuel tank using a thin airfoil's aerodynamic force data show the corresponding tendency to results of wind tunnel experiment. Results of trajectory simulation by the 6 degree of freedom equations of motion, comparing with drop trajectories of wind tunnel experiment, are shown that aircraft's attitude affects strongly on horizontal movement but not on the vertical movement. Those results give the reliability to aircraft safety when the external fuel tank with the 20% reduced horizontal fins is released from aircraft based on the flight manual.

A Time Constraints Permission Based Delegation Model in RBAC (RBAC을 기반으로 하는 시간제한 권한 위임 모델)

  • Kim, Tae-Shik;Chang, Tae-Mu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.163-171
    • /
    • 2010
  • RBAC(Role-Based Access Control) has advantages in managing access controls, because it offers the role inheritance and separation of duty in role hierarchy structures. Delegation is a mechanism of assigning access rights to a user. RBDM0 and RDM2000 models deal with user-to-user delegation. The unit of delegation in them is a role. However, RBAC does not process delegation of Role or Permission effectively that occurs frequently in the real world. This paper proposes a Time Constraints Permission-Based Delegation Model(TCPBDM) that guarantees permanency of delegated permissions and does not violate security principle of least privilege and separation of duty. TCPBDM, based on the well-known RBAC96, supports both user-to-user and role-to-role delegation with time constraints. A delegator can give permission to a specific person, that is delegatee, and the permission can be withdrawn whenever the delegator wants. Our model is analyzed and shown to be effective in the present paper.

The political economy analysis of the mobile phone subsidy (이동통신 보조금의 정치경제학적 분석)

  • Shin, Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1893-1900
    • /
    • 2015
  • The government has the responsibility to prevent abuses of monopoly and promote competition in order to maximize consumer welfare. The government should address the asymmetry in the information as much as possible and ensure consumer choice. The subsidy seems to reduce the burden on the consumer service charges and handset prices but it actually distorts the market through price discrimination. The government caused the principal-agent problem by neglecting their appropriate role to prevent distortion of the mobile telecom market. The money used as subsidy is part of excess profit and could be transferred to down the price of mobile phone and charges and it would become a benefit to consumers. Separate announcement of subsidies by Mobile Communications Terminal Distribution Structure Improvement Act is a little developed policy but it was not actually realized. The market price close to that from perfect competition structure is plausible, ultimately.

A Design of Peer-to-Peer Based IPTV System using Multiple Chain Architecture (다중 체인구조를 이용한 Peer-to-Peer 기반 IPTV 시스템 설계)

  • Kim, Ji-Hoon;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.12
    • /
    • pp.74-82
    • /
    • 2008
  • In this paper, we propose a P2P based IPTV system using a multiple chain architecture. Proposed system is robust to the peer churn. As opposed to the internet the IPTV network managed by a single ISP has fewer bandwidth constraints and end-to-end connectivity. So, we emphasize preferentially robustness of a P2P network in IPTV environment. A single chain structure which was proposed previously emphasizes simplicity, however there exists considerable delay time at the end part of peers as the number of peers increasing. As a solution to the problem, we propose the scheme which seperates the chain into several levels and again divides each level into spans to diminish a delay time. Though the chain is separated into level and span, basic structure of proposed scheme is still a chain structure. So the scheme simplifies the recovery procedure caused by join or departure of peers. We will show the improved performance of proposed scheme rather than single chain structure with respect to the delay time and reliability.

Session Control Mechanism for Peer-to-Peer IPTV Services (P2P IPTV 서비스를 위한 세션 제어 메카니즘)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.87-92
    • /
    • 2008
  • This paper proposes a session control model for the P2P(Peer to Peer) IPTV(Internet Protocol Television) services and presents the IPTV session control procedures based on the proposed model. Since, while public IPTV traffic is usually processed via a separate network, P2P IPTV traffic is processed together with the conventional Internet access traffic, the P2P IPTV control mechanism needs to provide multi-stream processing for the constituent TPS(Triple Play Service) traffic and corresponding QoS(Quality of Service) control functions. Besides, P2P IPTV session control mechanism should provide appropriate multicast control functions in order to support effective transmission of video traffic generated by personal IPTV broadcasters. The P2P IPTV session control model proposed in this paper is designed to be based on the standard SIP(Session Initiation Protocol), IGMP(Internet Group Management Protocol), and COPS(Common Open Policy Service) protocol so that it can contribute to the easy and prompt deployment of inter-operable P2P IPTV platform.

Blockchain Interoperability Mechanism (블록체인 상호호환성 메커니즘)

  • Zhou, Qing;Lee, Young-seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1676-1686
    • /
    • 2021
  • In this paper, we propose a general cross-chain solution based on the idea of modularity, abstraction, and layering, which decoupling the cross-chain function from the consensus algorithm and specific application logic, and utilize a Merkle proof to ensure the validity and legality of cross-chain operations. Since the underlying implementations of homogeneous and heterogeneous blockchains are different, we treat them separately. For homogeneous blockchains, we suggest a TCP-like cross-chain transport protocol (CCTP). While for heterogeneous blockchains, we present a method to construct the relay chain to realize the cross-chain function. The proposed scheme can enable the correct, effective, reliable, orderly, and timely transmission of cross-chain data. However, the essential difference between the operations within a single blockchain and the interoperability between different blockchains is that the trust domain is different. Cross-chain interoperation itself breaks the completeness of the blockchain, therefore, some efficiency and safety must sacrifice to trade-off.

Isolation and Identification of Adventitious Root Formation Inducing Substances from Cortex of cinnamomum cassia J.Presl (육계(Cortex of Cinnamomum cassia J.Presl) 추출물로부터 부정근 형성 유도물질 분리 및 동정)

  • Joo Ho Yeo;Jeong Kyu Baek;Jee Sung Park;Kun Woo Kim
    • Korean Journal of Plant Resources
    • /
    • v.37 no.1
    • /
    • pp.11-21
    • /
    • 2024
  • In this study, as a result of exploring the physiological activity of plants useful for agriculture on various plant resources, it was possible to confirm an activity similar to auxin that promotes plant rooting in methanol extract of Cinnamon Bark (cortex of Cinnamomum cassia J.Presl). After separating the active body by applying column chromatography and HPLC to the CHCl3 active fraction obtained by solvent extraction for each polarity from the methanol extract of cinnamon bark, cinnamyl alcohol was identified through GC/MS analysis. By bioassay using cinnamyl alcohol standard and the active fraction separated and purified from the methanol extract of cinnamon bark, the rooting rate of mung bean seedlings of the cinnamyl alcohol standard was 290% compared with the untreated control at 134.2 ㎍/mL concentration, and the adventitious root formation activity similar to the rooting rate (268.6%; 100 ㎍/mL) of the active fraction was shown. In conclusion, it is believed that cinnamyl alcohol contained in methanol extract of Cinnamon Bark is the main compound that induces adventitious root formation in mung bean.

A Study on Zero Trust Establishment Plan for Korean Military (한국군 맞춤형 제로 트러스트(Zero Trust) 구축방안 연구)

  • Kyuyong Shin;Chongkyung Kil;Keungsik Choi;Yongchul Kim
    • Convergence Security Journal
    • /
    • v.23 no.4
    • /
    • pp.131-139
    • /
    • 2023
  • In recent years, there have been frequent incidents of invasion of national defense networks by insiders. This trend can be said to disprove that the physical network separation policy currently applied by the Korea Ministry of National Defense can no longer guarantee military cyber security. Therefore, stronger cybersecurity measures are needed. In this regard, Zero Trust with a philosophy of never trusting and always verifying is emerging as a new alternative security paradigm. This paper analyzes the zero trust establishment trends currently being pursued by the US Department of Defense, and based on the implications derived from this, proposes a zero trust establishment plan tailored to the Korean military. The zero trust establishment plan tailored to the Korean military proposed in this paper includes a zero trust establishment strategy, a plan to organize a dedicated organization and secure budget, and a plan to secure zero trust establishment technology. Compared to cyber security based on the existing physical network separation policy, it has several advantages in terms of cyber security.

FPGA-based Hardware Implementation of Cryptography Algorithm ARIA (암호화 알고리즘 ARIA의 FPGA기반 하드웨어 구현)

  • Kim Young-Soo;Cho Sun-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1229-1236
    • /
    • 2006
  • Group oriented multicast service is a prerequisite for the current application system for remote lecture and customer service. IP multicast is used to be generally accepted as an internet standard. IP multicast which is designed to support network based replication model can efficiently use host and network resource, however it has some weak points that it has to support IP multicast in the internet by adding multicast-capable internet infrastructure such as router and is vulnerable to security by using public IP address for group identifier. Therefore we propose the trigger based application level multicast model that can enhance both scalability and security by separating the functions, which send and receive message to solve these problems. Our suggested model is expected to ensure the promotion of quality of service and reliability.

Interactive System for Efficient Video Cartooning (효율적인 비디오 카투닝을 위한 인터랙티브 시스템)

  • Hong, Sung-Soo;Yoon, Jong-Chul;Lee, In-Kwon
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.859-864
    • /
    • 2006
  • Mean shift 는 데이터의 특징을 잘 살려내는 None-parametric 방법으로, 특히 영상처리분야에서 많은 각광을 받아왔다. 하지만 좋은 결과를 보장하는 뛰어난 성능에도 불구하고, 높은 메모리소요와 긴 처리시간에 기인하여, 비디오처리 등의 분야에 적용하기엔 현실적인 제약점이 있다. 상기한 제약점을 극복하기 위해, 본 시스템은 비디오를 분석하여 전경과 후경으로 나눈다. 본 논문은 전경으로 분류된 부분에 대해 각 분리된 개체를구분하고, 좌표변환(coordinate shift)을 실행하여 연산을 할 비디오의 연산의 규모를 줄이는 방법론을 제시한다. 이러한 처리로 매우 많은 처리시간이 단축됨을 실험을 통해 알 수 있었다. 다음으로, 나뉘어진 전경에 3D mean shift를 적용하여 생성된 결과물에 대하여 3D cluster data structure 를 생성하고, 이를 이동하여 인터랙티브 에디팅이 가능하도록 하였다. 후경으로 나뉜 데이터는 이미지 한 장으로 축약이 되며, 2D mean shift 기반의 interactive cartooning system 을 통하여 만화화가 된다. 본 논문은 만화 특유의 단순한 톤을 표현하기 위해, 세밀한 분할이 필요한 부분과 그렇지 않은 부분을 따로 구분하여 처리하는 레이어처리방법을 제안한다. 위의 과정을 여러 실사이미지에 적용, 실험해본 결과 기존의 연구결과에 비해 매우 짧은 시간 내에 대상의 특징이 잘 나타낸 양질의 결과물이 생성되었다. 이러한 결과물은 출판, 영상편집분야 등 여러 분야에서 요긴하고 간편하게 사용될 수 있을 것으로 생각된다.

  • PDF