• 제목/요약/키워드: Deployment Analysis

Search Result 552, Processing Time 0.029 seconds

Current Status and Improvement Plan for Evaluation System of Records Management in Public Institutions (공공기관 기록관리 평가제도의 현황과 개선방향)

  • Park, Jong Yeon;Rieh, Hae-young;Seo, Hyo-Sun;Kim, Woo-hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.1
    • /
    • pp.251-274
    • /
    • 2019
  • It has been more than ten years since the evaluation system of records management in public institutions was introduced. Over the past decade, the evaluation system of records management in public institutions has contributed to the professional deployment of records management and the expansion of the records infrastructure. However, at this time, it is necessary to introduce a new evaluation system because of various problems including ranking and insufficiency of feedback measure. Therefore, we attempted to identify the problems and suggest the direction of improvement by analyzing the status of the evaluation system for records management in public institutions and collecting opinions from various sectors. The directions of the new institutional evaluation on records management based on the analysis of the problems are a step-by-step introduction, the selection of customized evaluation indicators according to institutional characteristics, the introduction of the governance system, self-evaluation by selecting autonomous indicators of institutions, and the strengthening of the consulting function of the National Archives of Korea.

A study to detect and leaked personal information on the smartphone. (스마트폰 상에서의 개인정보 유출 탐지 모니터링 연구)

  • Kim, Wung-Jun;Park, Sang-Hwi;Park, Sang-No;Kim, Chang-Su;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.606-608
    • /
    • 2014
  • Recent smartphone users constantly increases, an increase in malicious applications smartphones indiscretions exists within the Terminal, through the deployment of privacy disclosure, Singh and other victims also are on the rise. A typical personal way to malicious code masquerading as a normal application and install it on the handset of my text message or a personal note, such as personal information, the certificate directory, is the way that leaked. Therefore, to obtain permission to attack the root Terminal event by collecting malware infections and respond to determine whether it is necessary for the technique. In this paper, check the features of a Smartphone in real time systems, to carry out a study on the application throughout the Terminal to collect my attack event analysis, malware infection can determine whether or not the mobile security monitoring system. This prevents a user's personal information and take advantage of the top and spill are expected to be on the field.

  • PDF

Analysis and Design of FRT Detection System Using PMU (PMU를 사용한 FRT 검출시스템 설계 및 분석)

  • Kwon, Dae-Yun;Moon, Chae-Joo;Jeong, Moon-Seon;Yoo, Do-Kyeong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.4
    • /
    • pp.643-652
    • /
    • 2021
  • Accidents or faults in the transmission and distribution system are never completely avoidable, and short-circuit and earth faults are occurs despite the efforts of the TSO and DSO. Recently, the connection to the transmission and distribution system of large-capacity new and renewable distributed power has increased rapidly and has various effects on the operation of the system. In order to minimize this, connection standards such as FRT (Fault-Ride-Through) have been established to provide wind turbines or solar inverters. In the event of a major faults of the power system, the operation support shall be provided so that the operator can stably operate the system by smoothly performing connection maintenance or rapid system separation. In this paper, in order to appropriately determine whether the FRT condition, which is the grid connection criterion for a representative DERs, is sufficient, a detection system using a PMU (Phasor Measurement Unit) that measures a synchro-phasors was designed and deployment and a system accident due to a generator step-out to analyze and evaluate the proposed system based on the case.

Development of Composite Tape-Springs for Deployable Structures (전개장치용 복합재료 테이프 스프링 개발)

  • Kim, Yeong-Bae;Jung, Geunsung;Kim, Do-won;Choi, Han-Sol;Lim, Jae Hyuk
    • Composites Research
    • /
    • v.34 no.4
    • /
    • pp.226-232
    • /
    • 2021
  • In this paper, development of tape-springs made of composite materials was conducted for the deployment structures along with design, analysis, fabrication, and numerical and experimental investigation of mechanical behavior of the tape-springs. To this end, the tape-springs were manufactured according to three stacking patterns, and numerical and experimental investigation were conducted to determine whether or not they were damaged during bending with various selected composite materials. Finally, optimal stacking patterns that do not cause damage were selected during bending. With this information, the four-point bending test was conducted to obtain the moment-rotation curves. From results, it was confirmed that the nonlinear hysteresis phenomenon of the tape-springs was properly realized according to folding and unfolding. Therefore, it was confirmed that the composite material tape spring was properly developed.

An Intelligent Bluetooth Intrusion Detection System for the Real Time Detection in Electric Vehicle Charging System (전기차 무선 충전 시스템에서 실시간 탐지를 위한 지능형 Bluetooth 침입 탐지 시스템 연구)

  • Yun, Young-Hoon;Kim, Dae-Woon;Choi, Jung-Ahn;Kang, Seung-Ho
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.11-17
    • /
    • 2020
  • With the increase in cases of using Bluetooth devices used in the electric vehicle charging systems, security issues are also raised. Although various technical efforts have beed made to enhance security of bluetooth technology, various attack methods exist. In this paper, we propose an intelligent Bluetooth intrusion detection system based on a well-known machine learning method, Hidden Markov Model, for the purpose of detecting intelligently representative Bluetooth attack methods. The proposed approach combines packet types of H4, which is bluetooth transport layer protocol, and the transport directions of the packet firstly to represent the behavior of current traffic, and uses the temporal deployment of these combined types as the final input features for detecting attacks in real time as well as accurate detection. We construct the experimental environment for the data acquisition and analysis the performance of the proposed system against obtained data set.

A Empirical Study on the Patch Impact Assessment Method for Industrial Control Network Security Compliance (산업제어망 보안 컴플라이언스를 위한 패치 영향성 평가 방안에 관한 실증 연구)

  • Choi, Inji
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1141-1149
    • /
    • 2020
  • Most of the industrial control network is an independent closed network, which is operated for a long time after installation, and thus the OS is not updated, so security threats increase and security vulnerabilities exist. The zero-day attack defense must be applied with the latest patch, but in a large-scale industrial network, it requires a higher level of real-time and non-disruptive operation due to the direct handling of physical devices, so a step-by-step approach is required to apply it to a live system. In order to solve this problem, utility-specific patch impact assessment is required for reliable patch application. In this paper, we propose a method to test and safely install the patch using the regression analysis technique and show the proven results. As a patch impact evaluation methodology, the maximum allowance for determining the safety of a patch was derived by classifying test types based on system-specific functions, performance, and behavior before and after applying the patch. Finally, we report the results of case studies applied directly to industrial control networks, the OS patch has been updated while ensuring 99.99% availability.

The Development of Air-based Space Launch Vehicle for small satellites (초소형위성 발사를 위한 공중기반 우주발사체 발전방안)

  • Cho, Taehwan;Lee, Soungsub
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.4
    • /
    • pp.267-272
    • /
    • 2021
  • The end of the ROK-U.S. missile guidelines opened up the possibility of developing space launch vehicles for various platforms based on air and sea. In particular, the air-based space launch vehicle is an essential space power projection capability compared to the ground-based space launch vehicle in consideration of the geographical location of the Korean Peninsula, such as the deployment of various satellite orbits and the timely launch of satellite. In addition, compared to the ground-based launch vehicle, the cost reduction effect is large, and it has the merit of energy gain because it can be launched with the advantage of the aircraft's altitude and speed. Therefore, in this paper, the necessity of air-based space launch vehicle in the strategic environment of the Korean Peninsula is clearly presented, and through technology trend analysis of various air launch vehicle, the three methods are proposed to have the most efficient air-based space launch vehicle capability in the Korean situation.

QFD-Based Integrated Model of Dismantling Method Selection and FMEA Risk Assessment for Work Stage (QFD 기반의 해체공사 공법선정과 FMEA 위험성평가 통합 모델)

  • Lee, Hyung-Yong;Cho, Jae-Ho;Son, Bo-Sik;Chae, Myung-Jin;Kim, Hyun-Soo;Chun, Jae-Youl
    • Journal of the Korea Institute of Building Construction
    • /
    • v.21 no.6
    • /
    • pp.629-640
    • /
    • 2021
  • According to statistics from the Ministry of Land, Infrastructure and Transport in 2018, approximately 37% of residential buildings in Korea need to be reconstructed. Due to the rapid growth of the demolition industry, many side effects such as environmental destruction and safety accidents are becoming a problem in the demolition of existing buildings. This study proposes a decision-making process for selecting the most suitable dismantling method for field application by comprehensively considering safety, economic feasibility, and environmental characteristics. In particular, field applicability is evaluated by evaluating risk factors for the selected method. To this end, this study proposes the TOPSIS method for the selection of the dismantling method using the QFD development concept, and the FMEA method as a continuous development process of the selected method.

ECPS: Efficient Cloud Processing Scheme for Massive Contents (클라우드 환경에서 대규모 콘텐츠를 위한 효율적인 자원처리 기법)

  • Na, Moon-Sung;Kim, Seung-Hoon;Lee, Jae-Dong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.4
    • /
    • pp.17-27
    • /
    • 2010
  • Major IT vendors expect that cloud computing technology makes it possible to reduce the contents service cycle, speed up application deployment and skip the installation process, reducing operational costs, proactive management etc. However, cloud computing environment for massive content service solutions requires high-performance data processing to reduce the time of data processing and analysis. In this study, Efficient_Cloud_Processing_Scheme(ECPS) is proposed for allocation of resources for massive content services. For high-performance services, optimized resource allocation plan is presented using MapReduce programming techniques and association rules that is used to detect hidden patterns in data mining, based on levels of Hadoop platform(Infrastructure as a service). The proposed ECPS has brought more than 20% improvement in performance and speed compared to the traditional methods.

Development and Operation of Remote Lone-Senior Monitoring System Based on Heterogeneous IoT Sensors and Deep Learning (이종 사물인터넷 센서와 딥러닝에 기반한 독거노인 원격 모니터링 시스템의 개발 및 운영 사례 연구)

  • Yoon, Young;Kim, Hyunmin;Lee, Siwoo;Pouri, Safa Siavash
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.387-398
    • /
    • 2022
  • This paper presents a system that remotely monitors lone seniors at home and promptly alarms caregivers to recommend appropriate medical care services upon detecting abnormal behavior and critical conditions such as collapsing, excessive coughing, degradation of sleep quality, fever, and unusual indoor moving lines. Our system offers contactless monitoring techniques based on heterogeneous IoT sensors and deep learning to minimize the disruption to lone senior's daily life. In addition to the design and implementation of the sensor data collection and analysis system, we share our experience in installation, deployment, configuration, maintenance of the system through the case study conducted on the actual lone seniors living in Seoul Metropolitan. Based on our research, we recommend further development directions to prepare for the nationwide expansion of our system.