• Title/Summary/Keyword: 플랫폼 관리

Search Result 1,784, Processing Time 0.026 seconds

Structure Method for IOT Middle Ware with Plug-in module for Automation & Smart processing of Ppuri Manufacturing Factory (뿌리기업 자동화·스마트 공정을 위한 Plug-in 구조의 IOT 미들웨어 구축 방법)

  • Lee, Jeong-Hoon;Kim, Eui-Ryong;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.229-236
    • /
    • 2019
  • IOT middleware is required to play a pivotal role in interpreting, managing, and controlling data information of Internet devices (sensors, etc.). In particular, the root industry has different process flows for different industries, and there are various data processing requirements for each company. Therefore, a general purpose IOT middleware is needed to accommodate this. The IOT middleware structure proposed by this paper is a plug-in that can be used as an engine part for middleware basic processes such as communication, data collection, processing and service linkage, We propose a flexible and effective smart process for root industry. In addition, we propose a method to strengthen prevention and security against tampering, deodorization, etc. through encryption of network data between middleware plug - in and related service layer. We propose a system that will be developed as an IOT middleware platform that is specialized in the root industry so that it can be extended in various network protocols such as MQTT, COAP, XAMP.

A Universal Middleware-based Small Satellite Payload Power Module Design (유니버설미들웨어기반 소형위성 탑재체 전력모듈설계)

  • Lee, Hae-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.487-494
    • /
    • 2019
  • A Small-Sat Power System Design and Development should be depend on space environment such as solar wind with Electromagnetic field by hurdle of techniques. It is surmount solution of trend that will unitize and converge with power module in these days. The level of modularize means that applying Universal Middleware for payload power module requirements. The scope of target system is a main power provider module and operational subunit that can be implemented with the final power module distribution loads to consume for continuous process. A Universal Middleware strengthen to build power module from satellite power system should be accuracy and consuming data. A Power Service Module and dynamic system drive interactive management between power distribution and consumer module by Range Control. Consequently, suggesting evaluation, unexpecting payload system power consumer that makes fine variable resources in the development design process and efficiency.

A Study on the Effectiveness of Secure Responses to Malicious E-mail (악성 이메일에 대한 안전한 대응의 효과성 연구)

  • Lee, Taewoo;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.2
    • /
    • pp.26-37
    • /
    • 2021
  • E-mail is one of the important tools for communicating with people in everyday life. With COVID-19 (Coronavirus) increasing non-face-to-face activity, security incidents through e-mail such as spam, phishing, and ransomware are increasing. E-mail security incidents are increasing as social engineering attack using human psychology rather than arising from technological weaknesses that e-mails have. Security incidents using human psychology can be prevented and defended by improving security awareness. This study empirically studies the analysis of changes in response to malicious e-mail due to improved security awareness through malicious e-mail simulations on executives and employees of domestic and foreign company. In this study, the factors of security training, top-down security management, and security issue sharing are found to be effective in safely responding to malicious e-mail. This study presents a new study by conducting empirical analysis of theoretical research on security awareness in relation to malicious e-mail responses, and results obtained from simulations in a practical setting may help security work.

Development of Real-time HRV measurement Application based on vital signs for IoT smart stress care (IoT 스마트 스트레스 케어를 위한 생체신호 기반의 실시간 HRV 측정)

  • Song, Ho Jun;Park, Do Young
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.40-45
    • /
    • 2021
  • Our daily lives have changed a lot because of the COVID-19 pandemic. This is essential to reduce the spread of COVID-19 due to public health measures such as social distancing. At the same time, however, they are exposed to depression, anxiety disorders, depressive disorders, trauma and stress-related disorders. For this, we developed an application that can check HRV data and stress index by measuring ECG and PPG based on a Smart Watch device that can measure bio-signals in real time. In the case of the developed application, the heart rate is measured and displayed in real time to deliver basic exercise information by measuring exercise, steps and calories, and total distance, and smoothly based on blood pressure, heart rate, and HRV data as a measurement program. Through this, I believe that the IoT Smart Stress Care Application, which can manage mental health by itself, will be helpful to patients with stress and depressive trauma disorders.

User Dynamic Access Control Mechanism Using Smart Contracts in Blockchain Environment (블록체인 환경에서 스마트 컨트랙트를 활용한 사용자 동적 접근제어 메커니즘)

  • Cho, Do-Eun
    • Journal of Platform Technology
    • /
    • v.9 no.1
    • /
    • pp.46-57
    • /
    • 2021
  • Recently, research has been actively conducted to utilize blockchain technology in various fields. In particular, blockchain-based smart contracts are applied to various automation systems that require reliability as they have the characteristics of recording data in a distributed ledger environment to verify the integrity and validity of data. However, blockchain does not provide data access control and information security because data is shared among network participants. In this paper, we propose a user dynamic access control mechanism utilizing smart contracts in blockchain environments. The proposed mechanism identifies the user's contextual information when accessing data, allocating the user's role and dynamically controlling the data access range. This can increase the security of the system and the efficiency of data management by granting data access dynamically at the time of user authentication, rather than providing the same services in roles assigned to each user group of the network system. The proposed mechanism is expected to provide flexible authentication capabilities through dynamic data access control by users to enhance the security of data stored within blockchain networks.

A Study on Documentation Strategy for Contemporary Incidents (동시대 사건 기록화를 위한 도큐멘테이션 전략 연구 L코믹스 사태를 중심으로)

  • Go, Na Gyeong
    • The Korean Journal of Archival Studies
    • /
    • no.62
    • /
    • pp.185-224
    • /
    • 2019
  • The contemporary incidents, in which hatred toward the socially disadvantaged is the cause, are constantly evoking archivists' social role and responsibility. This study notes the documentation strategy as a way to document contemporary incidents involving the socially disadvantaged as the main actors. The purpose of this study is to propose the documentation strategy for documenting contemporary incidents around the L Comics issue. As a theoretical study, it examines the concept and significance of contemporary incidents documenting and documentation strategies. Through an analysis of the issue's overview, features, key events, and focus groups, the context of the issue was identified, and relevant online records were investigated. In addition, through interviews with stakeholders and experts, opinions on the documentation strategy of the L Comics issue were collected. In conclusion, the study discusses the objectives, direction, principle, category, subject and considerations for documenting the issue, and proposes the documentation strategy for it.

Analysis of Dedicated Mission Software Architecture for Unmanned Vehicles for Public Mission (공공임무를 위한 무인이동체 탑재용 임무소프트웨어 구조 분석)

  • Park, Jong-Hong;Choi, Sungchan;Ahn, Il-Yeup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.435-440
    • /
    • 2020
  • The application of the unmanned vehicles in various fields has been attracting attention, and the development of a service utilizing unmanned vehicles has been proceeding. As the service market using the unmanned vehicles rapidly increases, the demand for the development of software for performing the mission with unmanned vehicles is increasing. In particular, as the demand for unmanned vehicle utilization services for public missions such as fire detection, mail delivery, and facility management increases, the importance of developing mission software for unmanned vehicle is increasing. To develop common mission software, architecture design should be made so that unmanned vehicle service provider can easily develop software using reusable libraries or functions through analysis commonly required by various public institutions. In this paper, we discuss the research trends of mission software for public mission unmanned vehicles. In addition, the architecture design of developing formal mission software is proposed. Finally, we propose a data transfer architecture between mission software and data platform.

Cybersecurity Audit of 5G Communication-based IoT, AI, and Cloud Applied Information Systems (5G 통신기반 IoT, AI, Cloud 적용 정보시스템의 사이버 보안 감리 연구)

  • Im, Hyeong-Do;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.428-434
    • /
    • 2020
  • Recently, due to the development of ICT technology, changes to the convergence service platform of information systems are accelerating. Convergence services expanded to cyber systems with 5G communication, IoT, AI, and cloud are being reflected in the real world. However, the field of cybersecurity audit for responding to cyber attacks and security threats and strengthening security technology is insufficient. In this paper, we analyze the international standard analysis of information security management system, security audit analysis and security of related systems according to the expansion of 5G communication, IoT, AI, Cloud based information system security. In addition, we design and study cybersecurity audit checklists and contents for expanding security according to cyber attack and security threat of information system. This study will be used as the basic data for audit methods and audit contents for coping with cyber attacks and security threats by expanding convergence services of 5G, IoT, AI, and Cloud based systems.

P-RBACML : Privacy Enhancing Role-Based Access Control Policy Language Model (P-RBACML : 프라이버시 강화형 역할기반접근통제 정책 언어 모델)

  • Lee, Young-Lok;Park, Jun-Hyung;Noh, Bong-Nam;Park, Hae-Ryong;Chun, Kil-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.149-160
    • /
    • 2008
  • As individual users have to provide more information than the minimum for using information communication service, the invasion of privacy of Individual users is increasing. That is why client/server based personal information security platform technologies are being developed such as P3P, EPAL and XACML. By the way enterprises and organizations using primarily role based access control can not use these technologies. because those technologies apply access control policies to individual subjects. In this paper, we suggest an expression language for privacy enhancing role-based access control policy. Suggested privacy enhancing role-based access control policy language model is a variation of XACML which uses matching method and condition, and separately contains elements of role, purpose, and obligation. We suggest policy language model for permission assignment in this paper, shows not only privacy policy scenario with policy document instance, but also request context and response context for helping understanding.

Implementation of a Sensor Network in a Welding Workplace Based on IoT for Smart Shipyards (스마트 조선소를 위한 사물인터넷 기반 용접 작업장 센서네트워크 구축)

  • Kim, Hyun Sik;Lee, Gi Seung;Kang, Seog Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.3
    • /
    • pp.433-439
    • /
    • 2021
  • In this paper, we propose a method to implement an IoT-based sensor network for each workplace of a shipyard. Here, at the most common welding workplace in shipyards, the shipbuilding blocks are used as a communication medium to transmit information such as the worker's location, welding progress, and working hour to a server using LoRa and powerline communication. To achieve the data communication, inductive couplers and hybrid modems have been manufactured and installed on wire feeders and pin jigs to establish a sensor network. As a result of field test, the proposed system shows a success rate of data transmission and a rate of successful recognition of worker's location of about 98% or more. In addition, the process management system platform can record and display the work process data generated at the field in real time. The proposed system can be a starting point for enhancing the competitiveness of Korean shipbuilding industry through the establishment of a smart shipyard.