• Title/Summary/Keyword: API Standard

Search Result 212, Processing Time 0.023 seconds

The Study on the Development of Automatic Rebar Placement System Applying Selection Method of Optimum Reinforcing Bar Group on Shear Wall (최적배근그룹 선정방법을 적용한 전단벽체의 자동배근 시스템 개발에 관한 연구)

  • Cho, Young-Sang;Kim, Dong-Eun;Jin, Hyun-Ah;Jang, Hyun-Suk
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.19 no.1
    • /
    • pp.81-89
    • /
    • 2015
  • This study takes shear wall of reinforced concrete structure as study object, and the purpose of this study is to suggest structure BIM based on automatic reinforcing bar placement system applying set-based design through the most optimum reinforcing bar placement group that was selected by applying AHP (analytical hierarchy process) method from design step. For this, the most optimum reinforcing bar placement group was selected by pairwise comparison analysis on complex standard of multiple alternatives. And shear wall automatic reinforcing bar placement system has been developed, which can automatically generate members and arrange reinforcing bar by structure design algorithm and using open API (application programming interface) provided by a BIM software vendor. As a result, the most optimum reinforcing bar placement group of the highest weight, ALT1, was selected and was generated using Tekla Structure program.

Implementation of Secure E-Mail System based on lava (자바기반의 안전한 전자 메일 시스템 구현)

  • 이원구;김성준;이희규;조한진;이재광
    • Journal of Internet Computing and Services
    • /
    • v.2 no.3
    • /
    • pp.51-62
    • /
    • 2001
  • Recently, as computers and networks become popular, distributing information on the Internet is common In our daily life. also, the explosion of the Internet. of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. The e-mail has been commonly used by users as well recognizing It as the standard of manners among users on the Internet. In the past, e-mail has been the primary choice of exchanging Information, but secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. most of existing e-mail system don't have any security on the transmitted information. Thus. security mail system need to provide security including message encryption, content Integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mail system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services. API.

  • PDF

Development of SAML Software for JAVA Web Applications in Korea (국내 자바 웹 응용을 위한 SAML 소프트웨어의 개발)

  • Jo, Jinyong;Chae, Yeonghun;Kong, JongUk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1160-1172
    • /
    • 2019
  • Federated authentication is a user authentication and authorization infrastructure that spans multiple security domains. Many overseas Web applications have been adopting SAML-based federated authentication. However, in Korea, it is difficult to apply the authentication because of the high market share of a specific Web (application) server, which is hard to use open-source SAML software and the high adoption of Java-based standard framework which is not easy to integrate with SAML library. This paper proposes the SAML4J, which is developed in order to have Web applications easily and safely integrated with the Java-based framework. SAML4J has a developer-friendly advantage of using a session storage independent of the framework and processing Web SSO flows through simple API. We evaluate the functionality, performance, and security of the SAML4J to demonstrate the high feasibility of it.

Design and Function Analysis of Dust Measurement Platform based on IoT protocol (사물인터넷 프로토콜 기반의 미세먼지 측정 플랫폼 설계와 기능해석)

  • Cho, Youngchan;Kim, Jeongho
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.79-89
    • /
    • 2021
  • In this paper, the fine dust (PM10) and ultrafine dust (PM2.5) measurement platforms are designed to be mobile and fixed using oneM2M, the international standard for IoT. The fine dust measurement platform is composed and designed with a fine dust measurement device, agent, oneM2M platform, oneM2M IPE, and monitoring system. The main difference between mobile and fixed is that the mobile uses the MQTT protocol for interconnection between devices and services without blind spots based on LTE connection, and the fixed uses the LoRaWAN protocol with low power and wide communication range. Not only fine dust, but also temperature, humidity, atmospheric pressure, volatile organic compounds (VOC), carbon monoxide (CO), sulfur dioxide (SO2), nitrogen dioxide (NO2), and noise data related to daily life were collected. The collected sensor values were managed using the common API provided by oneM2M through the agent and oneM2M IPE, and it was designed into four resource types: AE and container. Six functions of operability, flexibility, convenience, safety, reusability, and scalability were analyzed through the fine dust measurement platform design.

Implementation of the Personal Information Infringement Detection Module in the HTML5 Web Service Environment (HTML5 웹 서비스 환경에서의 개인정보 침해 탐지 모듈 구현)

  • Han, Mee Lan;Kwak, Byung Il;Kim, Hwan Kuk;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1025-1036
    • /
    • 2016
  • The conversion of the international standard web utilization HTML5 technology is being developed for improvement of the internet environment based on nonstandard technology like ActiveX. Hyper Text Markup Language 5 (HTML5) of basic programming language for creating a web page is designed to consider the security more than HTML4. However, the range of attacks increased and a variety of security threats generated from HTML4 environment inherited by new HTML5 API. In this paper, we focus on the script-based attack such as CSRF (Cross-Site Request Forgery), Cookie Sniffing, and HTML5 API such as CORS (Cross-Origin Resource Sharing), Geolocation API related with the infringement of the personal information. We reproduced the infringement cases actually and embodied a detection module of a Plug-in type diagnosed based on client. The scanner allows it to detect and respond to the vulnerability of HTML5 previously, thereby self-diagnosing the reliability of HTML5-based web applications or web pages. In a case of a new vulnerability, it also easy to enlarge by adding another detection module.

IoT Data Collection Platform Based on Selective Protocols (선택적 프로토콜 기반의 사물인터넷 데이터 수집 플랫폼)

  • Oh, Hyeong-Seok;Kim, Dong-Hwi;Jeon, Hyun-Sig;Park, Hyun-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.871-878
    • /
    • 2017
  • As the interest of things to the Internet increases, the market of IoT grows larger and devices and protocols related with IoT are evolving.As these IoT devices and protocols evolve, There was a problem with interoperability. As a result, market and standard of IoT are confused, and communication between objects and objects is being hindered by different platforms. Currently, various IoT platforms are being developed and interoperability with heterogeneous platforms is under study, but the protocols used on each platform are limited and designed to have no generalized structure. Therefore, in this paper, we analyze services of HTTP, CoAP, and MQTT protocols, which are typical in the Internet market, and design services that enable selective protocol communication. We also design resources that apply the RESTful API to generalize platform usage. and We implemented the platform through database modeling for quick processing and safety of the collected data. Through this process, devices communicating with different protocols can be interworked on one platform and We propose a "generalized selective protocol based Internet object data collecting platform" that can be applied to various protocols.

Evaluation of Lateral Pile Behavior under Cyclic Loading by Centrifuge Tests (원심모형 실험을 이용한 반복하중을 받는 모노파일 거동 평가)

  • Lee, Myungjae;Yoo, Mintaek;Park, Jeongjun;Min, Kyungchan
    • Journal of the Korean Geotechnical Society
    • /
    • v.35 no.6
    • /
    • pp.39-48
    • /
    • 2019
  • This study investigated the lateral behavior of monopile embedded in the dry sand through cyclic lateral loading test using a centrifuge test. The sand sample for the experiment was the dry Jumunjin standard sand at 80% relative density and the friction angle of $38^{\circ}$. In the experimental procedure, firstly, it was determined the static lateral bearing capacity by performing the static lateral loading test to decide the cyclic load. This derived static lateral bearing capacity values of 30%, 50%, 80%, 120% were determined as the cyclic lateral load, and the number of cycle was performed 100 times. Through the results, the experiment cyclic p-y curve was calculated, and the cyclic p-y backbone curve by depth was derived using the derived maximum soil resistance point by the load. The initial slope at the same depth was underestimated than API (1987) p-y curves, and the ultimate soil resistance was overestimated than API (1987) p-y curves. In addition, the result of the comparison with the suggested dynamic p-y curve was that the suggested dynamic p-y curve was overestimated than the cyclic p-y backbone curve on the initial slope and soil resistance at the same depth. It is considered that the p-y curve should be applied differently depending on the loading conditions of the pile.

A Development of Consequence Analysis System for Combustible Materials Release Events Based on HTML5 Web (HTML5 웹 기반 가연성 물질 누출 피해영향평가 시스템 개발)

  • Lee, Ugwiyeon;Ji, Hyunmin;Oh, Jeongseok;Cho, Wansu
    • Journal of the Korean Institute of Gas
    • /
    • v.23 no.6
    • /
    • pp.39-60
    • /
    • 2019
  • Korea Gas Safety Corporation is developing consequence analysis system for combustible materials release events to enhance risk assessment technology and its efficiency. Unlike general consequence analysis programs, the final consequence area was implemented through ETA analysis based on API-581 standard, and a convenient user interface was constructed based on HTML5-based responsive web technology. In addition, a phase equilibrium module using third-order state equations (such as Peng-Robinson, SRK, and RK) and fugecity was implemented to analyze the mixture quality. Also. using the consequence analysis algorithm introduced in CCPS books and TNO Yellow Book, we developed material leak analysis module, fireball, pool fire, jet fire, flash fire, and vapor cloud explosion consequence assessment module. In addition, the conditions for calculating the safety distance were prepared with using the control values in the EIGA standard, PAC, and Bevi Reference Book.

The design and implementation of the Event and Service registry engineering for USN application (USN 응용을 위한 이벤트 및 서비스 레지스트리 설계 및 구현)

  • Yeom, Sung-Kun;Kim, Yong-Woon;Yoo, Sang-Keun;Kim, Hyung-Jun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.327-330
    • /
    • 2008
  • Resently as ubiquitous environment rapidly emerges due to the development of network and information communication technology, ubiquitous computing is being noticed as a technology that will take the lead in information technology industry of the future. For the realization of this Ubiquitous Service requires some technique such as situations of environment and recognition of locations by the Sensor Network, then sensor data have to be transferred to an application service after processes. Also the creation rule of registration and search of the event is necessary because the USN sensor data must be possible to specific the multi condition of event which relates on using time. And for using a numerous sensor data provision service, service provider can publish its service in standardized registry for users to search and use the service registry. Currently there is the web service for a WS-Eventing and a UDDI with standard, but the event and the service registry is unnecessary or there is a portion which is insufficient. In this paper, I design and implementated standardzation of event definition for USN application service and service registry structure, standard API.

  • PDF

Propose a Static Web Standard Check Model

  • Hee-Yeon Won;Jae-Woong Kim;Young-Suk Chung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.83-89
    • /
    • 2024
  • After the end of the service of Internet Explorer, the use of ActiveX ended, and the Non-ActiveX policy spread. HTML5 is used as a standard protocol for web pages established based on the Non-ActiveX policy. HTML5, developed in the W3C(World Wide Web Consortium), provides a better web application experience through API, with various elements and properties added to the browser without plug-in. However, new security vulnerabilities have been discovered from newly added technologies, and these vulnerabilities have widened the scope of attacks. There is a lack of research to find possible security vulnerabilities in HTML5-applied websites. This paper proposes a model for detecting tags and attributes with web vulnerabilities by detecting and analyzing security vulnerabilities in web pages of public institutions where plug-ins have been removed within the last five years. If the proposed model is applied to the web page, it can analyze the compliance and vulnerabilities of the web page to date even after the plug-in is removed, providing reliable web services. And it is expected to help prevent financial and physical problems caused by hacking damage.