• Title/Summary/Keyword: 인증프로그램

Search Result 490, Processing Time 0.024 seconds

Stress Analysis for Bendable Electronic Module Under Thermal-Hygroscopic Complex Loads (열·습도 복합하중에서의 유연성 전자모듈에 대한 구조해석)

  • Han, Changwoon;Oh, Chulmin;Hong, Wonsik
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.5
    • /
    • pp.619-624
    • /
    • 2013
  • A bendable electronic module is developed. In this module, thin silicon electronic chips are embedded in a polymer-based encapsulating adhesive between flexible copper-clad polyimide layers. During the qualification test of a harshly thermal-hygroscopic complex loading condition, delaminations occur inside the module layers. A finite element model is developed for the module. To investigate the effect of hygroscopic stress on delamination, the results of the thermal and thermal-hygroscopic loads are compared. The analysis results reveal that the hygroscopic effect more strongly affects delamination than does the thermal effect. The potential failure mechanisms of the module are investigated based on the stress analysis.

A Design and Implementation of Secure Electronic Bidding System (인터넷 기반 전자입찰시스템의 보안 설계 및 구현)

  • 윤선희
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.861-870
    • /
    • 2002
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. Widely spread the use of the internet, there are various applications for Business to Business (B to B) or Business to Customer(B to C) model that are based on the intranet or extranet. This paper designed and implemented the Web-based Electronic Bidding System for Business to Business (B to B) model. The technical issues of electronic bidding system in the internet are involved in the connection between web client and server, electronic data interchange for the contract document, and security solution during the bidding and contracting processes. The web-based electronic bidding system in this paper is implemented using Java applet and servlet as a connection interface for web client and sewer, XML/EDI-based documents for a bid and a contract, and bidding server and notary server for enhancing the security using PKI(Public Key Infrastructure)-based public key cryptography, digital signature and Certification Authority (CA).

  • PDF

Design and Implementation of National Supercomputing Service Framework (국가 슈퍼컴퓨팅 서비스 프레임워크의 설계 및 구현)

  • Yu, Jung-Lok;Byun, Hee-Jung;Kim, Han-Gi
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.663-674
    • /
    • 2016
  • Traditional supercomputing services suffer from limited accessibility and low utilization in that users(researchers) may perform computational executions only using terminal-based command line interfaces. To address this problem, in this paper, we provide the design and implementation details of National supercomputing service framework. The proposed framework supports all the fundamental primitive functions such as user management/authentication, heterogeneous computing resource management, HPC (High Performance Computing) job management, etc. so that it enables various 3rd-party applications to be newly built on top of the proposed framework. Our framework also provides Web-based RESTful OpenAPIs and the abstraction interfaces of job schedulers (as well as bundle scheduler plug-ins, for example, LoadLeveler, Open Grid Scheduler, TORQUE) in order to easily integrate the broad spectrum of heterogeneous computing clusters. To show and validate the effectiveness of the proposed framework, we describe the best practice scenario of high energy physics Lattice-QCD as an example application.

IPMP(Intellectual Property Management and Protection) Service Interfaces based on MPEG Multimedia (MPEG 멀티미디어 미들웨어에 기반한 보호관리 서비스 인터페이스)

  • Choo, Hyon-Gon;Bang, Gun;Nam, Je-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.325-334
    • /
    • 2007
  • In order to increase the promotion of multimedia processing techniques in MPEG standard, MPEG Multimedia Middleware (M3W) which supports middleware interface for multimedia processing is set up. In this paper, multimedia protection and management service interfaces based on MPEG Multimedia Middleware (M3W) are introduced. The service interfaces are based on component models of M3W and support normative IPMP messages. The proposed interfaces are composed of Tool interfaces and Trust management interfaces: Tool interfaces provide the functionality supporting terminal and tool based on the governed decoder model and Trust management interfaces provide the supporting functionality such as license managing and authentication required in DRM devices. As an application of the proposed interfaces, a JAVA based player simulator is shown. The proposed interfaces can be easily implemented under various device and application environments as an ISO/IEC 23004-2 standard middleware platform.

  • PDF

A Novel Auditing System for Dynamic Data Integrity in Cloud Computing (클라우드 컴퓨팅에서 동적 데이터 무결성을 위한 개선된 감사 시스템)

  • Kim, Tae-yeon;Cho, Gi-hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1818-1824
    • /
    • 2015
  • Cloud computing draws attention as an application to provide dynamically scalable infrastructure for application, data and file storage. An untrusted remote server can cause a variety of problems in the field of data protection. It may process intentionally or involuntarily user's data operations(modify, insert, delete) without user's permission. It may provide false information in order to hide his mistakes in the auditing process. Therefore, it is necessary to audit the integrity of data stored in the cloud server. In this paper, we propose a new data auditing system that can verify whether servers had a malicious behavior or not. Performance and security analysis have proven that our scheme is suitable for cloud computing environments in terms of performance and security aspects.

Validity Assessment of Ed-Program & License for Internet IR Specialist (지식산업 전문인력 정책개발을 위한 정보검색사 교육과 자격 시험제 타당성 분석)

  • 유사라
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.2
    • /
    • pp.77-104
    • /
    • 2001
  • Searching and retrieving information on the Web that define the core-function of Internet IR specialists is one of the activities that practitioners and searchers of LIS fields do exceptionally yell. Various education programs and license examinations for Internet IR specialists have been carried out by many organizations, without consistent monitoring or objective evaluation of those validity and functionality, which community of information professionals requires. This study focused on investigating the current practice of the education and license exam, and identifying problems that hinder the validity of those programs, and alerting the professionals to enhance and expand serious cooperation to keep up with the evolving interests of Internet IR specialists as a great challenge we all(partners, researchers, and policy-makers in government) face.

  • PDF

A Study on Engineering Education based on Cooperation between University and Enterprises (산학협력기반 공학교육모델에 관한 연구)

  • Park, Cheol-Woo
    • Journal of Engineering Education Research
    • /
    • v.11 no.4
    • /
    • pp.5-10
    • /
    • 2008
  • Conventional engineering education models have fallen to give satisfactory results to enterprises. So this paper deals with the new engineering education system, Engineering House, to overcome it. EH is made of three spaces and three concepts. Concept means system. Three concepts are things about a education program, a research cooperation, a open-door policy of EH facilities. First of all, Education system for undergraduates is most important of all. We intend to give them chances for real engineering experiences. Specialist from companies are participated in the education. The second is a research network. EH is managed by two or three professors together and their researches are carry out with companies's researcher. Key-point is doing all together. The third is service system for regional enterprises. EH's facilities are opened. Our students and professors are supporting directly. Mainly high price measuring machine is used. Like these, networks with companies are very helpable for undergraduate's educations and job connections. These are the work based learning system. Engineering House system look forward to getting to good program for undergraduate, based on the co-operation between university and enterprises.

Research on Web standards compliance and professional level of domestic Web Developer (국내 웹 개발자의 웹표준 준수 및 전문성 수준에 대한 연구)

  • Shin, Moon-sun;Jeong, Kyeong-ja;Kim, Byung-chul
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.201-208
    • /
    • 2016
  • Recently, non-standard techniques of web like Active-X caused not only user inconvenience but also barriers to the business of Internet. The government recognized that the serious environmental situation of using Internet is needed to be improved. Especially, HTML5 convergence technology is meant to be a specific platform over the devices, users, and systems. It also means web standards to support more creative business service model and emerging market. In this paper, we performed a survey on Web standards compliance and web development professional level of domestic web developers. In addition, we present the basic direction of government policy of software and software-positive human resources policy, that is based on the analysis of the survey results. Our study will be able to contribute to construct policies to support digital convergence industry and to strengthen technical assistance and expertise to build training programs for the spread of global Web standards (HTML5).

Improvement of size measurement polystyrene spheres of diameters 3$\mu$m and 10$\mu$m by optical microscope with CCD camera (CCD 카메라가 장착된 광학현미경을 사용한 폴리스티렌구 (3 $\mu$m와 10 $\mu$m)의 평균지름측정)

  • 정기영;박병천;깅주식;송원영;오범환
    • Korean Journal of Optics and Photonics
    • /
    • v.9 no.6
    • /
    • pp.362-367
    • /
    • 1998
  • Center Distance Finding (CDF) is a technique to find the sphere diameter by measuring the distance between two contacting spheres. The focal spots of the sphere clusters are formed in the back-focal plane by the transmission-mode optical microscope with the pseudothermal illumination source. Digital images taken by the CCD camera were processed by the software called Global Lab Image. The centers of the focal spots are found and the spot positions are expressed in terms of the CCD pixel elements, whose coordinate are calibrated by a heterodyne interferometer. The new CDF measurement system has been developed, which are more advantageous in time and convenience than the existing system, while the measurement uncertainly remains sufficient for its use as a magnification standard for optical microscopy. Two kinds of polystyrene spheres whose nominal diameters 3 and 10 $\mu\textrm{m}$ (NIST SRM 1962 and 1960) are measured with the uncertainly less than 1% at the confidence level of 99%, and the results are compared with the results of National Institute of Standards and Technology.

  • PDF

DDoS attack traffic through the analysis of responses to research (트래픽 분석을 통한 DDoS 공격에 대한 대응책 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.3
    • /
    • pp.1-6
    • /
    • 2014
  • DDoS (Distributed Denial Service, Distributed Service) attacks are being generated for a constant threat on the Internet, countermeasures for this have been proposed. However, the problem has become an increasingly effective instruction in any Measures are a variety of attacks and sophisticated attacks. Attackers can change a steady attack tools to respond to these, the experts as a countermeasure to this constantly research for a fresh attack. This paper is to introduce countermeasures to DDoS recent representative examples of 7.7DDoS and look for 3.3DDoS existing types of DDoS attacks increased PPS attacks, high traffic sent, web service delay and router and firewall settings, applications and to describe the DDoS countermeasures research by certification, is so that you can plan effectively for the future DDoS attacks proposed method.

  • PDF