• Title/Summary/Keyword: 식별기술

Search Result 2,119, Processing Time 0.026 seconds

A Method to Manage Faults in SOA using Autonomic Computing (자율 컴퓨팅을 적용한 SOA 서비스 결함 관리 기법)

  • Cheun, Du-Wan;Lee, Jae-Yoo;La, Hyun-Jung;Kim, Soo-Dong
    • Journal of KIISE:Software and Applications
    • /
    • v.35 no.12
    • /
    • pp.716-730
    • /
    • 2008
  • In Service-Oriented Architecture (SOA), service providers develop and deploy reusable services on the repositories, and service consumers utilize blackbox form of services through their interfaces. Services are also highly evolvable and often heterogeneous. Due to these characteristics of the service, it is hard to manage the faults if faults occur on the services. Autonomic Computing (AC) is a way of designing systems which can manage themselves without direct human intervention. Applying the key disciplines of AC to service management is appealing since key technical issues for service management can be effectively resolved by AC. In this paper, we present a theoretical model, Symptom-Cause-Actuator (SCA), to enable autonomous service fault management in SOA. We derive SCA model from our rigorous observation on how physicians treat patients. In this paper, we first define a five-phase computing model and meta-model of SCA. And, we define a schema of SCA profile, which contains instances of symptoms, causes, actuators and their dependency values in a machine readable form. Then, we present detailed algorithms for the five phases that are used to manage faults the services. To show the applicability of our approach, we demonstrate the result of our case study for the domain of 'Flight Ticket Management Services'.

A Study on the Analysis of the Potential FT(Financing of Terrorism) Threat Using Virtual Currencies and Its Response (가상통화를 활용한 테러자금조달 위협 분석과 국내 대응방안에 관한 연구)

  • Kang, Taeho;Cha, Jang-Hyeon;Kim, Gunin
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.9-33
    • /
    • 2020
  • This study presents aspects of the financing of terrorism using virtual-currencies. Fisrt of all, this introduces the conventional threat of the financing of terrorism and the analysis of current legal system regarding virtual-currency in South Korea. Next, the financing of terrorism cases are analyzed. With given analysis, the paper deals with its response and future extensions by technical and institutional aspects. The threats of the financing of terrorism are going higher after the appearance of virtual-currencies such as Bitcoin. There are two typical ways to use virtual-currencies by terrorist groups. One is to conduct public fund-raising in the social network system and the dark web. The other is to hack into virtual-currency exchange network in order to steal virtual currencies for developing the weapon of mass destruction. Specifically South Korea is top three country of trading virtual currencies and has been subject to virtual-currency hacking more than 10 cases. However, many countries including South Korea deal with virtual currencies as only innovative technology and means of investment, not the threats of the financing of terrorism. Under these circumstances, there a the legal contradiction. This article points this limit and absurdity. Also, it shows reasonable alternatives. All in all, given these aspects, the article proposes detailed policy directions.

Redescription of Three Newly Recorded Gastrostyla Ciliates (Ciliophora: Spirotrichea: Stichotrichida) with Morphological Variations from Korea (한국미기록 Gastrostyla 섬모충 (Ciliophora: Spirotrichea: Stichotrichida) 3종의 형태적 변이와 재기재)

  • Jo Jong O;Kim YeonUk;Shin Mann Kyoon
    • Animal Systematics, Evolution and Diversity
    • /
    • v.21 no.1
    • /
    • pp.45-56
    • /
    • 2005
  • Three species of Gastrostyla ciliates collected from the sewage treatment plant and a puddle in the valley from Korea were identified as Gastrostyla minima Hemberger, 1985, G. steinii Engelmann, 1862 and G. setifera (Engelmann, 1862). The description was based on the observation of living specimens, protargol impregnated specimens and biometric analysis. The morphological variations among the populations of these species were investigated with morphometry. These species have not been reported in Korea and their diagnostic characteristics are as follows: G. minima normally has two oval macronuclei (Ma) with one spherical micronucleus (Mi) respectively, continuous ventral cirral row (VCR) with additional one postoral ventral cirrus (poVC), five transverse cirri (TC), six dorsal kineties (DK) with broken 4th kinety, and cortical granules. G. steinii has four oval Ma with three to five Mi, discontinuous VCR with additional one poVC, four TCs, six DKs, and no cortical granules. G. setifera has two oval Ma with one spherical Mi respectively, five TCs which distinctly separate in two groups, six DKs, discontinuous VCR with additional two poVCs, and no cortical granules.

Analysis on the Uniformity of Temperature and Humidity According to Environment Control in Tomato Greenhouses (토마토 재배 온실의 환경조절에 따른 온습도 균일도 분석)

  • Nam, Sang-Woon;Kim, Young-Shik
    • Journal of Bio-Environment Control
    • /
    • v.18 no.3
    • /
    • pp.215-224
    • /
    • 2009
  • A survey on the actual state of heating, cooling, ventilation, and air-flow and experimental measurement of temperature and humidity distribution in tomato greenhouse were performed to provide fundamental data required in the development of air-flow control technology. In single-span plastic houses, which account for most of 136 tomato greenhouses surveyed, roof windows, ventilation and air-flow fans were installed in a low rate, and installation specs of those facilities showed a very large deviation. There were no farms installed greenhouse cooling facilities. In the hot air heating system, which account for most of heating type, installation specs of hot air duct showed also a large deviation. The exhaust air temperature and wind speed in hot air duct also were measured to have a big difference depending on the distance from the heater. We are using the maximum difference as indicator to determine whether temperature distribution is uniform. However if the temperature slope is not identical in greenhouse, it can't represent the uniformity. We analyzed relation between the maximum difference and the uniformity of temperature and humidity distribution. The uniformity was calculated using the mean and standard deviation of data from 12 measuring points. They showed high correlation but were represented differently by linear in the daytime and quadratic in the nighttime. It could see that the uniformity of temperature and humidity distribution was much different according to greenhouse type and heating method. The installation guidelines for ventilation and air-flow fan, the spread of greenhouse cooling technology for year-round stable production, and improvement of air duct and heating system, etc. are needed.

Security of Ethernet in Automotive Electric/Electronic Architectures (차량 전자/전기 아키텍쳐에 이더넷 적용을 위한 보안 기술에 대한 연구)

  • Lee, Ho-Yong;Lee, Dong-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.39-48
    • /
    • 2016
  • One of the major trends of automotive networking architecture is the introduction of automotive Ethernet. Ethernet is already used in single automotive applications (e.g. to connect high-data-rate sources as video cameras), it is expected that the ongoing standardization at IEEE (IEEE802.3bw - 100BASE-T1, respectively IEEE P802.3bp - 1000BASE-T1) will lead to a much broader adoption in future. Those applications will not be limited to simple point-to-point connections, but may affect Electric/Electronic(EE) Architectures as a whole. It is agreed that IP based traffic via Ethernet could be secured by application of well-established IP security protocols (e.g., IPSec, TLS) combined with additional components like, e.g., automotive firewall or IDS. In the case of safety and real-time related applications on resource constraint devices, the IP based communication is not the favorite option to be used with complicated and performance demanding TLS or IPSec. Those applications will be foreseeable incorporate Layer-2 based communication protocols as, e.g., currently standardized at IEEE[13]. The present paper reflects the state-of-the-art communication concepts with respect to security and identifies architectural challenges and potential solutions for future Ethernet Switch-based EE-Architectures. It also gives an overview and provide insights into the ongoing security relevant standardization activities concerning automotive Ethernet. Furthermore, the properties of non-automotive Ethernet security mechanisms as, e.g., IEEE 802.1AE aka. MACsec or 802.1X Port-based Network Access Control, will be evaluated and the applicability for automotive applications will be assessed.

Provision of a Novel Unlicensed Access Relay Station in IEEE 802.16-based Broadband Wireless Access Networks (IEEE 802.16 기반의 무선 액세스 망에서 Unlicensed 대역 액세스 릴레이에 대한 설계)

  • Choi, W.;Shon, T.S.;Choi, H.H.;Lee, Y.
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.169-177
    • /
    • 2007
  • Existing wireless access (mobile) routers are based commonly on the network address and port translation (NAPT) technique which permits simultaneously sharing a subscriber's connection to the network with multiple users. However, the NAPT architecturally makes the users invisible on the network side, thus becoming a user-oriented connection technique. In this paper, we propose a novel service provider-oriented unlicensed nomadic access relay station (WiNNERS) for helping wireless broadband network service providers to make their business more lucrative by accommdating unlicensed band users as subscribers into their network. The WiNNERS offers service providers the capability to directly manage each of the unlicensed band users at the network side. This direct management allows the service providers to flexibly and simply handle QoS, access control, and billing for each user. In order to distinguish each of the unlicensed band users the WiNNERS constructs a virtual tunnel from each user's terminal to the network access router using connection identifiers which is defined for service flow management within the WiBro system, Consequently, our proposed service provider-oriented relay station can be included into the WiBro network system with minimum modifications.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

The Study on Design of Circuit Card Assembly on Servo Control Unit for Automated Resupply Vehicle K56 (K56 탄약운반장갑차용 서보제어기의 회로카드조립체 설계에 관한 연구)

  • Lee, Ju-Seung;Kim, Seong-Jin;Bae, Gong-Myeong;Kwon, Soon-Mo;Park, Hyean-Jo;Choi, Jun-Sok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.102-109
    • /
    • 2019
  • This paper describes the design of the circuit card assembly to eliminate the communication error on a servo control unit installed in the automated resupply vehicle K56. K56 is a weapon system that automates the supply and loading of ammunition on the K-55A1 self-propelled artillery. As the core item responsible for ammunition movement control, the servo control unit is required to have good communication stability and reliability, but the conventional unit has recognized a problem that communication error intermittently occurs, resulting in an emergency stop phenomenon. We analyzed the communication signal of the servo control unit and identified the failure cause of the circuit card assembly to solve this problem. In addition, the signal interference in data/address line of the circuit card assembly was confirmed through analysis of the failure cause, and redesigned to avoid the interference, such as adjustment of the distance between communication lines and position change. Finally, the proposed cause analysis and redesign were verified through the component of servo control unit and attachment test on K56. We expected these study results to be used as reference for the design of other similar items.

Study on the Service Quality of Small Arms using Kano-SERVQUAL Integrated Approach (Kano-SERVQUAL 통합접근법을 이용한 소구경화기의 서비스 품질에 관한 연구)

  • Lee, Ho-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.4
    • /
    • pp.56-64
    • /
    • 2020
  • Service quality research is being conducted actively to improve customer satisfaction in various fields, but no research has been done on the service quality of small arms in the national defense. To enhance the user satisfaction and quality of small arms, this study aimed to derive the main quality attributes, measure the current level of satisfaction, and explore the elements requiring improvement. For this, a questionnaire survey based on the Kano model and SERVQUAL model was conducted on the identified service quality factors through discussions of experts involved in the production, quality assurance, and operation. All service quality factors were classified as one-dimensional elements, and an analysis of the Kano-SERVQUAL integrated approach showed that the user's expectation and dissatisfaction coefficient had a strong positive correlation with a 1% significance level, and user's perception value and satisfaction coefficient had a negative correlation with the 1% significance level. Using the Kano-SERVQUAL integrated approach, the priority service quality attributes for small arms requiring improvement among the many areas of service quality could be identified. Overall, it is expected that service-quality-level measurements can be used to improve the quality level of munitions as well as user satisfaction.

A fundamental study on the installation methods of automatic identification buoy on coastal gill net (연안자망 부이에 어구자동식별 장치 설치방안에 관한 기초적 연구)

  • HEO, Nam-Hee;KANG, Kyoung-Bum;KOO, Myeong-Seong;KIM, Keun-Hyong;KIM, Jong-Bum;JWA, Min-Seok;KIM, Jun-Teck;JOUNG, Joo-Myeong;KIM, Byung-Yeob;KIM, Suk-Jong
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.55 no.4
    • /
    • pp.294-302
    • /
    • 2019
  • As a series of fundamental researches on the development of an automatic identification monitoring system for fishing gear. Firstly, the study on the installation method of automated identification buoy for the coastal improvement net fishing net with many loss problems on the west coast was carried out. Secondly, the study was conducted find out how to install an automatic identification buoy for coastal gill net which has the highest loss rate among the fisheries. GPS for fishing was used six times in the coastal waters around Seogwipo city in Jeju Island to determine the developmental status and underwater behavior to conduct a field survey. Next, a questionnaire was administered in parallel on the type of loss and the quantity and location of fishing gear to be developed and the water transmitter. In the field experiment, the data collection was possible from a minimum of 13 hours, ten minutes to a maximum of 20 hours and ten minutes using GPS, identifying the development status and underwater behavior of the coastal gillnet fishing gear. The result of the survey showed that the loss of coastal net fishing gear was in the following order: net (27.3%), full fishing gear (24.2%), buoys, and anchors (18.2%). The causes were active algae (50.0%), fish catches (33.3%) and natural disasters (12.5%). To solve this problem, the installation method is to attach one and two electronic buoys to top of each end of the fishing gear, and one underwater transmitter at both ends of the float line connected to the anchor. By identifying and managing abnormal conditions such as damage or loss of fishing gear due to external factors such as potent algae and cutting of fishing gear, loss of fishing gear can be reduced. If the lost fishing gear is found, it will be efficiently collected.