• Title/Summary/Keyword: 인증프로그램

Search Result 490, Processing Time 0.026 seconds

Development of Lithium-Ion based Onboard Battery for Space Launch Vehicle (우주발사체 탑재용 리튬이온 배터리 개발)

  • Kim, Myung-Hwan;Ma, Keun-Su;Lim, You-Chol;Lee, Jae-Deuk
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.4
    • /
    • pp.363-368
    • /
    • 2007
  • Lithium-ion batteries providing high gravimetric energy density are rapidly replacing Ni-Cd and Ni-H2 in aerospace applications. The main advantage is the weight reduction of the battery system. Weight is a major concern in aerospace applications. Also, lithium-ion offer low thermal dissipation, high energy efficiency, and low cell cost. The Onboard battery module for KSLV-I(Korea Space Launch Vehicle) contains 80 Sony US18650 cells configured as 10 strings in parallel, with each string containing 8 series connected cells. This allows to meet voltage and capacity requirements specified for the mission. In this paper design description and specifications of lithium-ion battery developed are presented. Qualification test flow is also shown to make sure the performance in the predicted space environment. Electrical performance was simulated by dedicated program, and verified with electronic load. Lastly, the capacity was proven on real equipment load assembly.

Architecture Evaluation Utilizing CBAM and AHP (생체인식 소프트웨어의 품질 평가모듈에 관한 연구)

  • Yang, Hae-Sool;Lee, Man-Ho;Yoon, Young-Mi
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.699-708
    • /
    • 2006
  • The latest biometric field have marched fast with security technology of IT. As importance of present biometrics is realized, internal and external biometrics software market is trend that is soaring. Accordingly, high reliability of biometric software and request of high quality software are enlarged. Evaluation items and criteria must be established for biometric software quality assurance. In this paper, we development the evaluation module for biometric software test based on ISO/IEC 12119 that is the standard about software quality requirement and test, and ISO/IEC 9126 that is standard about evaluation of software product, and ISO/IEC 14598-6 that is the standard about construction of the evaluation module. Constituents of biometric software products(product descriptor, user document program and data) is subject to the quality evaluation module that we developed in this paper, we can expect improvement in the quality of software by using with a standard such as ISO/IEC 9126-3 that can be used in software development process.

Development of Ultrasonic Testing System for Piping Welds (배관 용접부 초음파검사 시스템 개발)

  • Choi, Sung-Nam;Kim, Hyung-Nam;Yoo, Hyun-Ju;Cho, Hyun-Jun;Hwang, Won-Gul
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.28 no.4
    • /
    • pp.331-338
    • /
    • 2008
  • Ultrasonic testing for welds is widely used to ensure the integrity of facilities in NPPs. Automated ultrasonic testing(AUT) is more consistent than the manual ultrasonic testing(MUT). It can scan welded parts, examines the scanned images, and saves the results as data files. AUT in NPPs is making use of commercial systems, and there has been some difficulties in calibration of the system. An AUT system is developed. It comprises of pulser/receiver, scanner and a control program(SonicWizard). The performance demonstration for piping welds in NPPs and the piping wall thickness measurement on site were conducted to verify this system. The test results of the ultrasonic testing system developed is satisfactory and effective.

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

Improvement of Management of Long-Term Care Facilities Through FGI (FGI를 통한 노인장기요양시설 운영 개선 방향에 관한 연구)

  • Park, Sung Won;Lee, Won Jae
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.587-597
    • /
    • 2019
  • With the rapid aging of the nation's population and the increasing number of elderly people with difficulties in daily life, the elderly care system was implemented for social solidarity. Structural problems in the long-term care system that emerged after the introduction of the system are demanded, and the problem of functional readjustment between nursing hospitals and facilities is raised due to the lack of continuity of care for the elderly by institutional and salary types. In this study, we set up research problems related to personnel, staff, and services to address the problem and conducted FGI. Research has shown that the number of elderly and recognized people in the region, the number of elderly and elderly patients, needs to be reflected in long-term care demand, the direction of appropriate institutional and manpower supply policies, and the establishment of local government goals and plans to strengthen the long-care institutions. It was revealed that non-medical accident arbitration bodies are needed to apply the cost of food insurance, provide programs through links with relevant institutions, and manage the admission smoothly.

Countermeasure of an Application Attack Scenario Using Spring Server Remote Code Execution Vulnerability (CVE-2018-1270) (스프링 서버 원격코드 실행 취약점(CVE-2018-1270)을 이용한 응용 공격 시나리오의 대응 방안)

  • Jung, Byeong-Mun;Jang, Jae-Youl;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.303-308
    • /
    • 2019
  • Spring framework is widely used as a base technology for e-government frameworks and to the extent it is a standard for web service development tools of Korean public institutions. However, recently, a remote code execution vulnerability(CVE-2018-1270) was found in an application using a spring framework. This paper proposes a method of analyzing the vulnerability experiment using a hacking scenario, Proof Of Concept(POC), in which the spring framework is a hazard to the server. We propose the patch to version 4.3.16 and version 5.0.5 or later as an ultimate response. It is also expected that the proposed experiment analysis on vulnerability of hacking scenario will be used as a data for improving performance of security programs and establishing a new authentication system.

EA Study on Practical Engineering Education through the Design and Configure of Safe Running Type Drones (안전 주행형 무인기의 설계 및 제작을 통한 실천 공학 교육에 관한 연구)

  • Jo, Yeong-Myeong;Lee, Sang-Gwon;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.9 no.1
    • /
    • pp.7-13
    • /
    • 2017
  • This study will provide a practical plan of engineering education through the study of major activities connected with the production of works to accomplish the graduation conditions by completing the comprehensive design subject and the result of the performance. The designed subject is to measure the minimum safety distance during driving using the obstacle detection function of the ultrasonic sensor and to perform the avoidance algorithm based on the measurement value of the acceleration gyro sensor. It is proposed an access surveillance system that minimizes the damage of drones, surrounding objects, and people, and improves air mobility. Experimental results show that the obstacles around the drone are detected by five ultrasonic sensors and the difference of output value is applied to each motor of the drone and obstacle avoidance is confirmed. In addition, the content and level of the data for measuring the achievement of learning achievement in the engineering education certification program were used and the results were confirmed to be consistent with the description of the engineering problem level required for the graduates of 4-year engineering college.

A Secure Active Packet Transfer using Cryptographic Techniques (암호 기술을 이용한 안전한 능동 패킷 전송)

  • 김영수;나중찬;손승원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.2
    • /
    • pp.135-145
    • /
    • 2002
  • Active networks represent a new approach to network architecture. Nodes(routers, switches, etc.) can perform computations on user data, while packets can carry programs to be executed on nodes and potentially change the state of them. While active networks provide a flexible network iufrastructure, they are more complex than traditional networks and raise considerable security problems. Nodes are Public resources and are essential to the proper and contract running of many important systems. Therefore, security requirements placed upon the computational environment where the code of packets will be executed must be very strict. Trends of research for active network security are divided into two categories: securing active nodes and securing active packets. For example, packet authentication or monitoring/control methods are for securing active node, but some cryptographic techniques are for the latter. This paper is for transferring active packets securely between active nodes. We propose a new method that can transfer active packets to neighboring active nodes securely, and execute executable code included in those packets in each active node. We use both public key cryptosystem and symmetric key cryptosystem in our scheme

A Comparative Study on the Curriculum of Graduate Schools of Archival Sciences in Korea and the Foreign Countries (국내외 기록관리학 대학원 교육과정에 관한 비교 연구)

  • Lee, Yun-Jung;Chung, Yeon-Kyoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.1
    • /
    • pp.567-591
    • /
    • 2021
  • This study examined the curriculum of 23 graduate schools of archival sciences in the United States, Canada, the United Kingdom, and Australia and 25 graduate schools of archival sciences in Korea, and compared core knowledge categories. The average number of courses in Korea and other countries was similar, but each university in other countries set required courses, and few in Korea. As a result of comparison by knowledge category, all knowledge categories in North America were opened as individual courses, while the UK and Australia did not open knowledge categories of outreach, instruction, advocacy, and knowledge categories of professionalism separately. In Korea, the category of outreach, instruction, advocacy, the knowledge category of professionalism, and the knowledge category of information technology have not been established separately, while courses related to history and administration are subdivided. In order to reform the archival science education in Korea, the knowledge categories for archival professionals should be prepared and the guidelines and certification standards for the education should be established.

A Study on the Criminal Justice Rehabilitation System of Sweden (스웨덴 법무보호복지제도 연구)

  • Kwon, Joon-Sung;Gong, Jung-Sik;Hyun, Mun-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.506-514
    • /
    • 2022
  • The method of suppressing recidivism through punishment centered on punishment is showing limitations through criminal policy research in many countries. As an alternative to this, a restorative judicial law aimed at returning criminals to members of society through reconciliation and coordination of community members, victims, and perpetrators is emerging as a paradigm for crime prevention and recidivism. Sweden is a representative welfare state and is confirming positive effects through correction of criminals based on restorative justice. In addition, it has a stable system related to the legal protection welfare system, and maintains a low recidivism rate and social security through scientific and reasonable operation using evidence-based principles in the evaluation and certification process of operating programs. However, research on the legal protection system implemented in advanced welfare and correctional countries, including Sweden, is still insufficient in Korea. Therefore, this study aims to explore the direction of the domestic legal protection system through a review of Swedish criminal policy and legal protection system, and to identify insufficient areas and complementary points of the domestic system to lay the foundation for improving the domestic legal protection welfare system and expanding business.