• Title/Summary/Keyword: DEV

Search Result 337, Processing Time 0.036 seconds

DEV&DESS-Based Real-Time Distributed Simulation Method Using DDS for Design Verification of Cyber-Physical Systems (CPS 설계 검증을 위한 DDS 및 DEV&DESS 기반의 실시간 분산 시뮬레이션 방법)

  • Kim, Jin Myoung;Lee, Hae Young;Chun, Ingeol;Kim, Won-Tae
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.2
    • /
    • pp.1-6
    • /
    • 2014
  • CPS (cyber-physical systems) which consists of connected and diverse embedded systems and physical systems are a new paradigm. Traditional systems were usually considered to be passive and dumb parts in physical systems, but with CPS, we have to take into account what are being moved or changed in the physical systems. So, as increasing the complexity of CPS, potential errors in the systems also increase. In this paper, for enhancing the reliability of CPS, we exploit an executable-model-based design methodology and propose a distributed simulation method to verify the design of CPS. For the design of the systems including discrete and continuous factors, we apply DEV&DESS formalism and simulate models in distributed simulation environments through DDS middleware. We also illustrate the applications of CPS with our modeling tool.

Korean Security Risk Management Framework for the Application of Defense Acquisition System (국방획득체계 적용 한국형 보안위험관리 프레임워크)

  • Yang, Woo-sung;Cha, Sung-yong;Yoon, Jong-sung;Kwon, Hyeok-joo;Yoo, Jae-won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1183-1192
    • /
    • 2022
  • Information and Information processing systems must maintain a certain level of security during the total life cycle of Information. To maintain a certain level of security, security management processes are applied to software, automobile development, and the U.S. federal government information system over a life cycle, but theme of no similar security management process in Korea. This paper proposes a Korean-style security risk management framework to maintain a certain level of security in the total life cycle of information and information processing system in the defense sector. By applied to the defense field, we intend to present the direction of defense security work in the future and induce an shift in security paradigm.

A Study On Operation for DevOps Using Zero Trust in Network Separation Environment (망분리 환경에서 제로 트러스트를 활용한 DevOps 운영에 관한 연구)

  • Bong-Yong Han;Young-Kun Choi;Ga-Yeon So;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.27-34
    • /
    • 2024
  • Network separation is an important policy that Cyber Incident prevent cyber and protect data. Recently, the IT environment is changing in software development, such as remote work, using the cloud, and using open sources. Due to these changes, fintech companies' development productivity and efficiency are lowering due to network separation regulations, and the demand for easing network separation continued. The government revised the regulations electronic financial supervision(hereafter EFS) in response to needs for mitigation of network separation in the IT environment and fintech companies. Some amendments to the EFS, which took effect on 01/01/2023, mitigate network separation only for research and development purposes in cloud environments. If software developed in a cloud development environment is applied to an operating system through a distribution system the existing perimeter-based security model will not satisfaction the network separation conditions. In this Study, we would like to propose a way to maintain the DevOps system in a network separation environment by Using the zero trust security system.

A Proposal for the Location of Dementia Patients in Indoor and Outdoor Using Beacon and GPS in Digital Health Medical Device Environment (디지털 헬스 의료기기 환경에서 비콘과 GPS를 활용한 실내외 치매환자 위치 파악 기법 제안)

  • Park, Yeoung-Nam;Kang, Hyeok;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.145-146
    • /
    • 2022
  • 고령화에 잇따른 질병 중 치매는 배회 증상 및 여러 사고를 발생시킨다. 그러나 실내외 전반에 걸친 치매환자 위치 파악 시스템이 부재하기에 본 논문에서는 치매환자의 웨어러블 디바이스에 내장된 Beacon과 GPS를 통해 실내외 위치를 파악하고, SaMD 기능을 통해 치매환자의 신체 상태를 파악하여 보호자와 구조요청기관에 알릴 수 있는 기법을 제안한다.

Counterfeit Medicine Distribution Prevention System using the Blockchain and Distributed Storage System (블록체인과 분산형 스토리지 시스템을 사용한 위조 의약품 유통 방지 시스템)

  • Seon-Ja Lim;Md Mamunur Rashid;Ki-Ryong Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.436-438
    • /
    • 2024
  • 의료 당국은 가능한 최상의 서비스를 보장하기 위해 코로나19와 같은 전염병 기간뿐만 아니라 일상적인 운영에서도 의료 공급망 프로세스를 효과적으로 관리해야 한다. 제품 리콜, 제품 공급 부족 모니터링, 만료 및 위조는 방지되어야 하는 중요한 의료 공급망 운영 중 일부이다. 본 논문에서는 블록체인과 분산형 스토리지 시스템을 사용한 위조 의약품 유통 방지 시스템을 제안한다. 제안하는 솔루션은 투명성을 높이고, 이해 관계자간의 커뮤니케이션을 개선하며, 제품 조달 일정을 단축하는 동시에 중요한 격차와 결함을 제거한다.

A Study on Static Analysis in Cluster Layer Manifest from the DevSecOps Perspective (DevSecOps 관점의 클러스터 계층 내 매니페스트 정적 분석에 관한 연구)

  • Ga-Hyun Kim;Mi-Jin Kim;Ye-Rin Chun;Hye-Yeon Hyeon;Seongmin Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.241-242
    • /
    • 2024
  • 컨테이너 오케스트레이션 도구로 쿠버네티스가 가장 많이 사용되고 있으며, 관련 취약점 연구는 DevSecOps 관점에서 4C layer로 분류된 클라우드 보안 계층 중, 클러스터 및 코드 계층에 초점이 맞춰져 왔다. 반면에 클러스터 계층에도 네트워크 정책, 인증 제어, 권한 설정 및 매개변수 설정에 관한 취약점이 존재한다. 이에 본 논문은 취약점을 분석하여 OWASP 10과 접목하여 분류한 뒤 예방법을 제시함으로써 앞으로의 안전한 클러스터 계층 구축에 기여하고자 한다.

Accessibility Information Element & a PNC Selection Method in the High Rate WPAN (WPAN에서 통신가능성 정보 요소와 PNC 선택 방법)

  • Jeong, Heon-Ju;Cho, Moo-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.10B
    • /
    • pp.639-647
    • /
    • 2005
  • When a DEV associates with an existing WPAN, the PNC checks the capabilities of the new DEV to see if it is more capable to be the PNC of the piconet based on the criteria defined in the IEEE Std 802.15. If the new DEV is more capable and the current security policies allow it, then the PNC has the option of handing over control of the piconet to the DEV that has just joined. And, If the PNC is shutting down or wants to leave the WPAN, it also uses the handover process to give control to another DEV in the piconet. However, IEEE 802.15.3 checks only DEV capability information for more PNC capable. For PNC selection, it should consider the radio coverage of new PNC capable DEVs. So, we propose the method of PNC selection with accessibility check. This method manages PNC candidate list in the current piconet. In this paper, we analyze accessibility problems for PNC selection in section 2. In section 3, we explain CI(Configuration Inquiry) process which is proposed by Sony Corporation and propose PCI(PNC Candidate Inquiry) process. Also, we perform numerical analysis to compare PCI process with CI process in section 4. Finally, we conclude in section 5.

Expression of Adenylyl Cyclase Genes in Mycobacterium smegmatis under Hypoxic and Nitric Oxide Conditions (저산소와 NO 조건에서 Mycobacterium smegmatis의 adenylyl cyclase 유전자 발현)

  • Jeon, Han-Seung;Yang, Ki-Hoon;Ko, In-Jeong;Oh, Jeong-Il
    • Journal of Life Science
    • /
    • v.24 no.12
    • /
    • pp.1330-1338
    • /
    • 2014
  • In Mycobacterium tuberculosis H37Rv 16 adenylyl cyclase (AC) genes have been identified, while 10 AC genes have been found in non-pathogenic Mycobacterium smegmatis. Expression of 6 AC genes (MSMEG_0218, MSMEG_3243, MSMEG_3780, MSMEG_4279, MSMEG_4477, and MSMEG_6154) among 10 AC genes in M. smegmatis was increased when M. smegmatis was subjected to hypoxic growth conditions. On the other hand, only MSMEG_3780 and MSMEG_4279 were slightly induced in the presence of NO. The cAMP levels in cells and culture media were 450- and 9.8-fold increased, respectively, when M. smegmatis was grown under hypoxic conditions relative to those grown aerobically. Intracellular levels of cAMP were increased 5.8-fold on the exposure to NO. The DevSR two-component system is known to be involved in the induction of many genes whose expression is induced under hypoxic conditions and in the presence of NO. Expression of 6 hypoxically induced AC genes was observed to be induced in a devR deletion mutant grown under hypoxic conditions, indicating that the induction of the 6 AC genes under hypoxic conditions is independent of the DevSR two-component system. In order to identify a trans-acting regulatory element that is pertinent in the hypoxic induction of MSMEG_3780, ligand-fishing analysis was performed using the upstream DNA of MSMEG_3780 and MSMEG_5136 protein was identified.

Attenuation of High-Frequency Wave Energy Due to Opposing Currents

  • Suh, Kyung-Duck;Lee, Dong-Young-
    • Proceedings of the Korean Society of Coastal and Ocean Engineers Conference
    • /
    • 1993.07a
    • /
    • pp.20-25
    • /
    • 1993
  • In coastal waters, more often than not, waves propagate on currents driven by tidal forces, earth’s gravity, or wind. There have been a number of studies for dealing with the change of wave spectrum due to tile presence of current. Based on the conservation of wave action, Hedges et al. (1985) have proposed an equation which describes the influence of current on the change of wave spectrum in water of finite depth. (omitted)

  • PDF

A study of hidden inheritance to the child object in SR DEVS (SR DEVS에서 하위 객체의 히든 상속 연구)

  • Park, Sangjoon;Lee, Jongchan
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.127-128
    • /
    • 2019
  • 본 논문에서는 SR DEVS에서 부모 객체가 자식 개체로의 상속에서 입력 함수와 출력 함수의 상속 형태에 대한 특정한 상황을 고려한다. 히든 상속의 경우 자식 객체는 부모 객체로부터 부모의 자산을 상속받더라도 상속 함수에 대한 작용이 일어나지 않는다. 이 경우 부모에게서 넘겨받은 자산에 대해 상속받지 못한 것은 아니며 단지 숨겨진 상태를 의미한다.

  • PDF