• Title/Summary/Keyword: 신뢰실행환경

Search Result 158, Processing Time 0.023 seconds

Data Transmission Processing System Design for Real-Time Distributed Simulation by Using Software Design Patterns (소프트웨어 디자인 패턴을 적용한 실시간 분산 시뮬레이션을 위한 데이터 전달처리 시스템 설계)

  • Suk, Jin-Weon;Ryoo, In-Tae
    • Journal of Digital Contents Society
    • /
    • v.10 no.4
    • /
    • pp.649-657
    • /
    • 2009
  • Usually, The data transmission processing efficiency of the distributed system running on high speed networks depends on the system architecture and the data transmission processing system. In order to secure the real-time rate and the system reliability, the real-time distributed simulation system on the distributed environment has tried to satisfy the performance required by the data transmission processing system. However, the client/server-based data transmission processing system in the real-time simulation system has been difficult to satisfy the system stability, extensibility and maintenability, especially when system changes. So, it is natural to study another improved data transmission processing system to solve the problems at the existing real-time simulation system. After analyzing the existing real-time simulation system, this paper will propose the improved real-time data transmission system by using Software Design Pattern, which enhances extensibility, interoperability, reusability and maintenability of the system.

  • PDF

DEV&DESS-Based Real-Time Distributed Simulation Method Using DDS for Design Verification of Cyber-Physical Systems (CPS 설계 검증을 위한 DDS 및 DEV&DESS 기반의 실시간 분산 시뮬레이션 방법)

  • Kim, Jin Myoung;Lee, Hae Young;Chun, Ingeol;Kim, Won-Tae
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.1-6
    • /
    • 2014
  • CPS (cyber-physical systems) which consists of connected and diverse embedded systems and physical systems are a new paradigm. Traditional systems were usually considered to be passive and dumb parts in physical systems, but with CPS, we have to take into account what are being moved or changed in the physical systems. So, as increasing the complexity of CPS, potential errors in the systems also increase. In this paper, for enhancing the reliability of CPS, we exploit an executable-model-based design methodology and propose a distributed simulation method to verify the design of CPS. For the design of the systems including discrete and continuous factors, we apply DEV&DESS formalism and simulate models in distributed simulation environments through DDS middleware. We also illustrate the applications of CPS with our modeling tool.

Collaborative Dispositions of Participatory Arts in Contemporary Practices -Based on Nicolas Bourriaud's Notion of Postproduction- (동시대 예술 형식의 상호성과 공유 가능성 -니콜라 부리오의 포스트프로덕션 개념을 중심으로-)

  • Baik, Youngju
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.88-101
    • /
    • 2018
  • The collective narratives on global crisis such as the displaced, uneven distribution of resources, invasion of human rights is more than a recurring theme or polemics in the fields of contemporary arts. In the latest projects from Olafur Eliasson, Rirkrit Tiravanija and Ai WeiWei, art works are presented as performative 'platforms' for tackling these undiscriminating reality of human conditions. Here, 'the users' as driving forces of possible change, are postulated as prospective actors/players who lead and collaborate to defy the status-quo. Crossing over the on/off lines, the everyday-activities of exchanging, sharing and networking are strategically deployed and its meaning reconfigured within the context of post/production discourse. This historical, yet unsettling juncture between art and life, dystopian reality and utopian idealism has its formal-conceptual links to Russian Constructivism, Brechtian Learning-Play and Joseph Beuys' Social Sculpture. Based on Nicolas Bourriaud's notion of Postproduction, this paper aims to provide a diachronic analysis on collaborative dispositions of participatory arts practices.

Analysis of the Ecological Impact of Climate Change using ABMS: A Case Study of Polar Bears and Glacier (기후 변화의 생태계 영향에 대한 ABMS 연구 -빙하감소와 북극곰의 모의실험을 바탕으로-)

  • Cho, Sung-Jin;Na, Yu-Gyung;Lee, Joon-Young;Joh, Chang-Hyeon
    • Journal of the Korean Geographical Society
    • /
    • v.46 no.3
    • /
    • pp.291-303
    • /
    • 2011
  • It has actively advanced to study the impact of climate change on ecosystem. This study addresses ABMS (Agent Based Modeling and Simulation) as a methodology of ecosystem research. ABMS would suggest the possibility of practical use in this sector. This study would investigate how the melting speed of glacier in the arctic influences the extinction period of polar bears. The Polar Bears and Glacier Model in this study is expected to contribute to accurate prediction of the polar bear's extinction period. The suggested ABMS could also be applied to the study of various factors of ecosystem in general.

Software-based Encryption Pattern Bootstrap for Secure Execution Environment (보안 실행 환경을 위한 소프트웨어 기반의 암호화 패턴 부트스트랩)

  • Choi, Hwa-Soon;Lee, Jae-Heung
    • Journal of IKEEE
    • /
    • v.16 no.4
    • /
    • pp.389-394
    • /
    • 2012
  • Most current systems have ignored security vulnerability concerned with boot firmware. It is highly likely that boot firmware may cause serious system errors, such as hardware manipulations by malicious programs or code, the operating system corruption caused by malicious code and software piracy under a condition of no consideration of security mechanism because boot firmware has an authority over external devices as well as hardware controls. This paper proposed a structural security mechanism based on software equipped with encrypted bootstrap patterns different from pre-existing bootstrap methods in terms of securely loading an operating system, searching for malicious codes and preventing software piracy so as to provide reliability of boot firmware. Moreover, through experiments, it proved its superiority in detection capability and overhead ranging between 1.5 % ~ 3 % lower than other software security mechanisms.

The Effects of the Quality of Technology Entrepreneurship Educating Program on Participant's Satisfaction and Referring Will (기술창업교육프로그램 품질이 참여자 만족과 추천의향에 미치는 영향 연구)

  • Yang, Young-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.1071-1078
    • /
    • 2010
  • This paper measures the effects of the quality of the technology entrepreneurship educating program over participants' satisfaction and referring will. The paper focus on developing the best techno-entrepreneurship educating program alternative at the national level through evaluating and improving the quality of TEC Program (developed in NC State University in U.S. and applied in Korea). This paper applies SERVQUAL model to evaluate the quality of TEC program in affecting the participant's satisfaction and referring will, with collecting questionnaire sheets from participants of TEC program since 2007. The result of research show and confirm the high level of satisfaction and referring will existing among TEC program participants basing upon strong (+) correlation result between core components of SERVQUAL; tangibles, assurance, reliability and participants' satisfaction with referring will.

Extended Semantic Web Services Retrieval Model for the Intelligent Web Services (지능형 웹 서비스를 위한 확장된 시맨틱 웹서비스 검색 모델)

  • Choi, Ok-Kyung;Han, Sang-Yong;Lee, Zoon-Ky
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.725-730
    • /
    • 2006
  • Recently Web services have become a key technology which is indispensable for e-business. Due to its ability to provide the desired information or service regardless of time and place, integrating current application systems within a single business or between multiple businesses with standardized technologies are realized using the open network and Internet. However, the current Web Services Retrieval Systems, based on text oriented search are incapable of providing reliable search results by perceiving the similarity or interrelation between the various terms. Currently there are no web services retrieval models containing such semantic web functions. This research work is purported for solving such problems by designing and implementing an extended Semantic Web Services Retrieval Model that is capable of searching for general web documents, UDDI and semantic web documents. Execution result is proposed in this paper and its efficiency and accuracy are verified through it.

A Study on Smart Contract for Personal Information Protection (개인정보보호를 위한 스마트컨트랙트 연구)

  • Kim, Young-Hun
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.215-220
    • /
    • 2019
  • The block chain technology is a technique that prevents manipulation of data and ensures integrity and reliability. Ethereum is building a smart contract environment as a type of encryptionenabled system based on block chains. Smart contracts can be implemented when conditions are met, thus increasing confidence in digital data. However, smart contracts that are being tried in various ways are not covered by information security and personal information protection. The structure in which the network participant can view the open transaction ledger is exposed to data or personal information listed in the block chain. In this study, it is possible to manage the data of personal information recorded in the block chain directly. This study is protected personal information by preventing the exposure of personal information and by executing time code, it is possible to erase recorded information after a certain period of time has elapsed. Based on the proposed system in the future, it is necessary to study the additional management techniques of unknown code defects or personal information protection.

A Study of End-to-End Message Security Protocol Based on Lightweight Ciphers for Smart IoT Devices (스마트 IoT 디바이스를 위한 경량 암호기반 종단간 메시지 보안 프로토콜)

  • Kim, Hee-jeong;Kim, Jeong Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1309-1317
    • /
    • 2018
  • Although the IoT market is steadily growing, there is still a lack of consideration for increasing security threats in the IoT environment. In particular, it is difficult to apply existing IP security technology to resource-constrained devices. Therefore, there is a demand for reliable end-to-end communication security measures to cope with security threats such as information tampering and leakage that may occur during communication between heterogeneous networks do. In this paper, we propose an end-to-end message security protocol based on lightweight cipher that increases security and lowers security overhead in resource-constrained IoT device communication. Through simulation of processing time, we verified that the proposed protocol has better performance than the existing AES-based protocol.

Research on the Integration and Coexistence Path of Innovation and Entrepreneurship Education and Professional Education in Universities (대학교 혁신 창업 교육과 직업 교육의 융합과 공존 경로 연구)

  • Xiaoyue Song;Jinling Wang
    • Journal of the International Relations & Interdisciplinary Education
    • /
    • v.3 no.1
    • /
    • pp.29-50
    • /
    • 2023
  • This study selected college students in Anhui Province as the research subjects and used a questionnaire survey method to understand the current implementation status of the integration of innovation and entrepreneurship education and professional education. The survey results indicate that college students have insufficient awareness of innovation and entrepreneurship; Poor integration of curriculum construction. This study analyzes the reasons for the problems from four aspects: the government, enterprises, and universities, as well as the subjective will of students. Based on qualitative and quantitative research, the following countermeasures and suggestions are proposed: firstly, strengthen top-level design; Secondly, promote the integration of curriculum construction; Thirdly, expand the teaching staff; Fourthly, a practical platform for school enterprise co creation; Fifth, cultivate students' innovative awareness and guide innovative practice.