• 제목/요약/키워드: Code request

검색결과 90건 처리시간 0.043초

링크암호 환경에서 이미지 데이터와 잡음의 영향 (Analysis of Noise Sensitivity due to Image Wireless Transmission)

  • 김기환;김형락;이훈재;류영재
    • 한국정보통신학회논문지
    • /
    • 제22권1호
    • /
    • pp.211-220
    • /
    • 2018
  • CCSDS가 제시하는 표준 데이터 링크 계층 암호화는 HDLC 프레임을 입력받고 이를 AES 알고리즘을 사용하여 암호화하는 구조를 가진다. 하지만 CCSDS의 표준 방식은 불안정한 채널을 통해 노이즈 간섭이 발생하는 경우 수신측 스스로 재동기 요청할 수 없는 구조를 가지고 있다. SES Alarmed는 CCSDS의 링크 암호화와 유사한 동작 구조에 추가적으로 수신측에서 오류를 감지하고 재동기 요청을 수행할 수 있는 구조를 가지고 있다. SES Alarmed와 관련된 논문은 최적의 임계범위를 발견하는 것과 채널 노이즈에 따른 데이터 손상을 확인하는 것에 목적을 두었다. 본 논문에서는 SES Alarmed에서 암호 동기 코드를 제외한 HDLC 프레임을 연속으로 임의의 임계값을 초과할 경우 재동기 과정을 낮추는 것에 초점을 두었다. 이에 HDLC 프레임 순서를 변경하고 SES Alarmed를 사용한 결과를 제안 및 비교한다.

웹2.0에서 SOAP 처리와 성능 향상을 위한 모바일 웹 서버 프레임워크의 설계 (A Design of Mobile Web Server Framework for SOAP Transaction and Performance Enhancement in Web2.0)

  • 김용태;정윤수;박길철
    • 한국정보통신학회논문지
    • /
    • 제12권10호
    • /
    • pp.1866-1874
    • /
    • 2008
  • 기존의 웹 서버는 과부하 상태인 경우 폐쇄 연결, 암호 핸드쉐이크 실행 증가와 서버 용량의 현저한 감소로 서버의 처리량에 문제가 발생하여 시스템의 전체적인 성능을 저하시킨다. 또한 쓰레드 블록으로 인하여 다수의 클라이언트 요청 처리가 원활하지 못하고, 쓰레드 활성화를 위하여 많은 시간과 자원을 요구하여, 클라이언트의 요청에 대해 접속시간과 응답 시간이 증가하는 단점이 발생한다. 그러므로 본 논문에서는 웹서버스의 장점인 통합과 커뮤니케이션 지원과 시스템 성능 향상을 위해 서버 과부하를 개선하고, 지연처리를 위해 필요한 기술을 제공하는 확장된 웹서버를 제안한다. 그리고 기존 시스템(Tomcat 5.5에서 구현)과 제안한 모바일 웹 서버 아키텍처를 평가한다. 확장된 서버 아키텍처는 시스템 성능을 위해 우수한 교환 조건을 제공하고, 다중쓰레드와 쓰레드풀을 결합한 개선된 웹 서버 아키텍처를 평가한다. 본 논문에서 제안된 웹서비스 아키텍처는 오리지널 Tomcat 5.5의 평가 결과보다 개선된 성능 이익의 결과를 얻었다.

스마트 컨트랙트의 계층형 규칙 모듈화와 보안 메커니즘 (Smart Contract's Hierarchical Rules Modularization and Security Mechanism)

  • 안정현;나성현;박용범
    • 반도체디스플레이기술학회지
    • /
    • 제18권1호
    • /
    • pp.74-78
    • /
    • 2019
  • As software becomes larger and network technology develops, the management of distributed data becomes more popular. Therefore, it is becoming increasingly important to use blockchain technology that can guarantee the integrity of data in various fields by utilizing existing infrastructure. Blockchain is a distributed computing technology that ensures that servers participating in a network maintain and manage data according to specific agreement algorithms and rules to ensure integrity. As smart contracts are applied, not only passwords but also various services to be applied to the code. In order to reinforce existing research on smart contract applied to the blockchain, we proposed a dynamic conditional rule of smart contract that can formalize rules of smart contract by introducing ontology and SWRL and manage rules dynamically in various situations. In the previous research, there is a module that receives the upper rule in the blockchain network, and the rule layer is formed according to this module. However, for every transaction request, it is a lot of resources to check the top rule in a blockchain network, or to provide it to every blockchain network by a reputable organization every time the rule is updated. To solve this problem, we propose to separate the module responsible for the upper rule into an independent server. Since the module responsible for the above rules is separated into servers, the rules underlying the service may be transformed or attacked in the middleware. Therefore, the security mechanism using TLS and PKI is added as an agent in consideration of the security factor. In this way, the benefits of computing resource management and security can be achieved at the same time.

행정업무 자동화 챗봇 개발 및 성능 향상에 관한 연구 (A Study on the Development and Performance Improvement of Chatbot for Office Automation)

  • 박준수;김영준;정윤교
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2022년도 춘계학술대회
    • /
    • pp.158-160
    • /
    • 2022
  • 조직에서 이루어지는 반복적인 행정업무는 비효율적인 방법으로 진행되는 경우가 많다. 본 연구에서는 반복적인 작업을 자동화하기 위해 사용자의 접근성이 좋은 카카오톡 기반의 챗봇을 개발하고 실제 업무 환경에 사용했다. 그 결과 챗봇을 실제 운용하는 과정에서 여러 명이 동시에 접속할 때 서버가 다운되거나 응답이 되지 않는 문제를 확인했다. 이를 개선하기 위해 챗봇 서버에서 사용하는 프로그램의 언어를 변경하는 코드 고도화를 진행했으며, 데이터베이스 구조를 새로 설계하고 로드 밸런싱을 통해 서비스의 부하를 분산시키는 등 성능 향상을 위해 여러 방법을 시도했다. 각각의 방법이 얼마나 성능 개선에 영향을 주는지 확인하기 위해 초당 처리량, 평균 레이턴시 등의 지표를 통해 비교 후 챗봇을 실제 업무 환경에서 사용하면서 발생한 문제에 대한 개선방안을 제시했다.

  • PDF

Services Quality Improvement through Control Management Cloud-Based SLA

  • Abel Adane
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.89-94
    • /
    • 2023
  • Cloud-based technology is used in different organizations around the world for various purposes. Using this technology, the service providers provide the service mainly SaaS, PaaS and while the cloud service consumer consumes the services by paying for the service they used or accessed by the principle of "pay per use". The customer of the services can get any services being at different places or locations using different machines or electronic devices. Under the conditions of being well organized and having all necessary infrastructures, the services can be accessed suitably. The identified problem in this study is that cloud providers control and monitor the system or tools by ignoring the calculation and consideration of various faults made from the cloud provider side during service delivery. There are currently problems with ignoring the consumer or client during the monitoring and mentoring system for cloud services consumed at the customer or client level by SLA provisions. The new framework was developed to address the above-mentioned problems. The framework was developed as a unified modeling language. Eight basic components are used to develop the framework. For this research, the researcher developed a prototype by using a selected cloud tool to simulate and java programming language to write a code as well as MySQL to store data during SLA. The researcher used different criteria to validate the developed framework i.e. to validate SLA that is concerned with a cloud service provider, validate what happened when the request from the client-side is less than what is specified in SLA and above what is specified in SLA as well as implementing the monitoring mechanism using the developed Monitoring component. The researcher observed that with the 1st and 3rd criteria the service level agreement was violated and this indicated that if the Service level agreement is monitored or managed only by cloud service prover, there is a violation of LSA. Therefore, the researcher recommended that the service level agreement be managed by both cloud service providers and service consumers in the cloud computing environment.

ECU 응답특성 분석을 통한 T-50 계열 항공기 보조동력장치 자동 꺼짐 개선에 관한 연구 (A study on the improvement of Auxiliary Power Unit auto-shutdown of T-50 series aircraft based on analysis of ECU response characteristics)

  • 박성제;유인제;최수진;이동기
    • 한국산학기술학회논문지
    • /
    • 제18권3호
    • /
    • pp.640-646
    • /
    • 2017
  • T-50 계열 항공기는 비행 전 지상에서 비상동력계통 작동 점검을 위해 보조동력장치 GEN TEST를 수행하게 된다. 만일 GEN TEST 수행 중 비상동력계통에 전원이 정상적으로 공급되지 않을 경우 ECU의 응답 신호를 통해 보조동력장치가 자동으로 꺼지는 현상이 발생하게 되며, 지상에서 비상동력계통 작동 점검이 정상적으로 이루어지지 않을 경우 더 이상 비행을 할 수 없기 때문에 해당 결함은 항공기 가동률 저하에 큰 원인이 된다. ECU에서 식별된 결함코드는 인버터 결함으로 판별되었으나 인버터 교체 이후에도 동일한 결함이 지속적으로 반복되었다. 본 논문은 인버터가 특정 시간 안에 전압을 생성시키지 못 할 경우 ECU에서는 결함으로 식별되는 것이 확인되었으며, 보조/비상동력계통의, BSG, ESC, 및 ECU의 응답특성을 분석하여 개선된 방법을 제시한다. 또한, 개선된 방법에 대한 검증을 통해 비상동력계통 출력 요구시간 범위 안에 인버터 출력이 정상적으로 생성되는 것을 확인하였으며, 이를 통해 비행전 지상에서 GEN TEST 수행 시 보조동력장치 자동 꺼짐 현상을 효과적으로 예방 할 수 있음을 확인 하였다.

통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구 (A Study of Web Application Attack Detection extended ESM Agent)

  • 김성락
    • 한국컴퓨터정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.161-168
    • /
    • 2007
  • 웹에 대한 공격은 웹 서버 자체의 취약점 보다 웹 어플리케이션의 구조, 논리, 코딩상의 오류를 이용한다. OWASP에서 웹 어플리케이션 취약점을 10가지로 분류하여 발표한 자료에 의하면 웹 해킹의 위험성과 피해가 심각함을 잘 알 수 있다. 이에 따라 웹 해킹에 대한 탐지능력 및 대응이 절실히 요구된다. 이러한 웹 공격을 방어하기 위해 패턴 매칭을 이용한 필터링을 수행하거나 코드를 수정하는 방법이 있을 수 있지만 새로운 공격에 대해서는 탐지 및 방어가 어렵다. 또한 침입탐지시스템이나 웹 방화벽과 같은 단위보안 제품을 도입할 수 있지만 운영과 지속적인 유지를 위해서는 많은 비용과 노력이 요구되며 많은 탐지의 오류를 발생한다. 본 연구에서는 웹 어플리케이션의 구조와 파라미터 입력 값에 대한 타입, 길이와 같은 특성 값들을 추출하는 프로파일링 기법을 이용하여 사전에 웹 어플리케이션 구조 데이터베이스를 구축함으로서 사용자 입력 값 검증의 부재에 대한 해결과 비정상적인 요청에 대해 데이터베이스의 프로파일 식별자를 이용하여 검증하고 공격 탐지가 가능하다. 통합보안관리시스템은 현재 대부분 조직에서 도입하여 운영하고 있으며 일반화 되어있다. 그래서 통합보안관리시스템의 보안 감사 로그 수집 에이전트에 웹 어플리케이션 공격 탐지 기능을 추가한 모델을 제시함으로서 추가 단위보안제품을 도입하지 않고서도 웹 어플리케이션 공격을 탐지할 수 있도록 하였다.

  • PDF

내장형 시스템의 원활한 멀티미디어 서비스 지원을 위한 커널 수준의 RTP (A Kernel-level RTP for Efficient Support of Multimedia Service on Embedded Systems)

  • 선동국;김태웅;김성조
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제10권6호
    • /
    • pp.460-471
    • /
    • 2004
  • RTP는 VoD, AoD, VoIP와 같은 멀티미디어 서비스를 위해 실시간 데이타를 전송하기에 적합하도록 설계되어 있어, RTSP, H.323, SIP 등 실시간 데이타 전송 프로토콜로서 사용되고 있다. 내장형 시스템에서도 원활한 멀티미디어 서비스를 위해 내장형 시스템용 RTP 프로토콜 스택이 필요하지만 현재까지 이러한 RTP 프로토콜 스택은 전무한 상태이다. 본 논문은 내장형 시스템에 적합하도록 RTP 프로토콜 스택을 커널 수준에서 지원하는 embeddedRTP에 대하여 설명한다. EmbeddedRTP는 UDP 모듈에 포함되도록 설계되었기 때문에,'rcp/lp 서비스를 필요로 하는 애플리케이션은 기존과 같이 동작하고, RTP프로토콜 스택을 사용하는 애플리케이션은 embeddedRTP API를 이용하여 RTP 서비스를 받을 수 있다. EmbeddedRTP는 RTP 패킷이 도착했을 때, 패킷의 포트 번호와 세션 정보를 이용하여 세션별 패킷 버퍼에 저장한다. 애플리케이션과 embeddedRTP간의 통신은 시스템 콜과 시그널 메커니즘을 통해 이루어지며, embeddedRTP API를 제공함으로써 애플리케이션 개발이 용이하도록 했다. PDA 상에서 멀티미디어 스트리밍 서비스를 이용하여 embeddedRTP의 성능을 분석한 결과, 비교대상인 VCL RTP에 비해 코드사이즈는 약 58%정도 감소된 반면, 패킷 처리속도는 약 7.8배 빨라졌다.

양치시설 여부에 따른 초등학생의 구강환경관리능력 및 구강건강관리 행태 변화 (Effect of Toothbrushing Facilities on PHP index and Oral Health-related Behaviors in Elementary schools)

  • 황윤숙;김광수;정재연;유영재;김수화;임미희
    • 한국학교ㆍ지역보건교육학회지
    • /
    • 제14권3호
    • /
    • pp.27-40
    • /
    • 2013
  • Objectives: This study was conducted at a request for cooperation through an analysis of the effect of toothbrushing facilities at a public health center in Seongdong-gu. Also, with the aim of furnishing basic data to the proposal of a program for improving the ability of school aged children in managing oral cavities and developing a correct toothbrushing habit, the study conducted an investigation of how toothbrushing facilities affect change in the oral environment management ability and behavior of oral health care. Methods: From among elementary schools located in Seongdong-gu, Seoul the study selected A Elementary School where toothbrushing facilities were established and have been operated since 2008, B Elementary School in an adjacent region within the jurisdiction of Seongdong-gu where the demographic environment was similar among schools where toothbrushing facilities were newly established in 2012, and C Elementary School without toothbrushing facilities. Then the study was aimed at first grade students of the schools and an investigation was carried out from April to December 2012. Through a dental checkup, the study evaluated the teeth and periodontal health conditions, and a test of the oral environment management ability was undertaken three times. Regarding change of oral health care behavior, the study carried out a self-recording survey. Results: 1. Concerning decayed and filled tooth(dft) and decayed and filled surface (dfs), A Elementary School where toothbrushing facilities have been established and operated from the past showed a relatively lower decayed, missing, and filled teeth index than B Elementary School where toothbrushing facilities were established in 2012 or C Elementary School without toothbrushing facilities; however, there was no significant difference (p>0.05). For CPI, there was no significant difference by school; however, in looking into the difference between boy students and girl students, Code (0) was discovered higher in boy students whereas Code (1) was shown higher in girl students. 2. In the PHP index test in accordance with the existence of toothbrushing facilities before the installation of toothbrushing facilities, for A Elementary School where toothbrushing facilities have been established and operated from the past, the school recorded 4.28 points whereas B Elementary School where the facilities were established in 2012 recorded 3.51 points. Meanwhile C Elementary School without the facilities posted 4.30 points. Therefore there was a statistically significant difference according to the existence of toothbrushing facilities (p<0.05). 3. In a comparison of teeth health care behavior according to the existence of toothbrushing facilities, the number of answers that the respondent did not brush their teeth after lunch over the past one week was higher in B Elementary School and C Elementary School where there were no toothbrushing facilities. Regarding the average number of brushing after lunch for one week, it was discovered higher in A Elementary School (p<0.01). 4. In change of teeth health care behavior before and after the establishment of toothbrushing facilities, the case of answering that the respondents did not brush their teeth after lunch for one week increased more after establishment than before establishment. Also the average number of teeth brushings after lunch for one week decreased further after the establishment of toothbrushing facilities; however, it did not show a significant difference (p>0.05). One of the reasons that they do not brush their teeth, "the lack of a place", decreased significantly after establishment than before establishment (p<0.05), whereas the answer, "because their friends do not brush their tooth" increased greatly after establishment than before establishment; however, there was no significant difference (p>0.05). 5. In the comparison of the degree of knowledge about dental health according to the existence of toothbrushing facilities, the degree of knowledge about dental health was shown significantly higher in A Elementary School with toothbrushing facilities than in B Elementary School and C Elementary School where there were no toothbrushing facilities (p<0.01). Conclusions: Given the above results, it is difficult to attract change in behavior only with an environmental improvement; therefore, it is deemed necessary to develop an educational program that will help children to make a habit of oral health care not only through a school but also through a related policy and financial support of government organizations as well as the construction of the basis of a systematic and consistent cooperative system with relevant organizations.

  • PDF

프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론 (A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development)

  • 권오병
    • Asia pacific journal of information systems
    • /
    • 제18권1호
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.