• Title/Summary/Keyword: IT융합 솔루션

Search Result 141, Processing Time 0.026 seconds

Architectural Representation to Support Multi-Platform Applications Using ACME (ACME를 이용한 멀티플랫폼 지원 아키텍처 표현)

  • Park, Jae-Jin;Ko, Jae-Chul;Hong, Jang-eui
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.1
    • /
    • pp.1-6
    • /
    • 2013
  • As the important of software quality has being emphasized, the studies on software architecture also have being performed actively. On the other hand, due to the diversification of Smartphone platforms, the effort was increased to develop the application for supporting those multiple platforms. However several solutions are suggested to reduce the effort, and a representative solution is FireMonkey framework. In this paper, we represent the FireMonkey framework using ACME which is a language to describe software architecture. Such representation can provide the guideline to develop the application for the multiple platforms. Also it supports the information of that which perspectives are critical to develop such applications.

  • PDF

Provision and Obligations in Policy Rules (정책규칙에서 Provision과 Obligation)

  • Kim, Su-Hee
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.1-9
    • /
    • 2005
  • XML is the most common tool for data processing and data transmission in web applications. Policies are extensively used in all online business solutions and it is recognized that abinary decision such as 'yes/no' for access requests is not enough. In this paper, a method is developed to convert policy rules with provisions and obligations in logic formula formats into XML formats. The primary purpose is to enable security policy programmers to write flexible authorization policies in XML and to implement them easily. General syntaxes are defined to specify information for users, objects and actions in XML formats and an XML DTD is developed to specify authorization rules with these three components. To support various security features such as data transcoding and non-repudiation depending on data in addition to access control based on authorization policies, studies for specifying them in XML policy rules will be performed in the future.

  • PDF

A Study on Insider Behavior Scoring System to Prevent Data Leaks

  • Lim, Young-Hwan;Hong, Jun-Suk;Kook, Kwang Ho;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.77-86
    • /
    • 2015
  • The organization shall minimize business risks associated with customer information leaks. Enhance information security activities through voluntary pre-check and must find a way to detect the personal information leakage caused by carelessness and neglect accident. Recently, many companies have introduced an information leakage prevention solution. However, there is a possibility of internal data leakage by the internal user who has permission to access the data. By this thread it is necessary to have the environment to analyze the habit and activity of the internal user. In this study, we use the SFI analytical technique that applies RFM model to evaluate the insider activity levels were carried out case studies is applied to the actual business.

A Study Medium-based safe File Management Security System on the cloud Environment (클라우드 환경에서 매체기반의 안전한 파일관리 보안 시스템에 대한 연구)

  • Kim, Hee-Chul
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.142-150
    • /
    • 2019
  • This study is a file management security system that encrypts and decrypts computer and cloud data by using Bluetooth based cryptographic module. It is a necessary solution in terms of abuse of personal information and protection of social and national information. We developed H/W and S/W for SFMS(: Safe File Management Security) related Bluetooth module in cloud environment and implemented firmware development, encryption key generation and issuance, client program for system mobile and key management system. In the terminal internal encryption and decryption, SFMS was developed to ensure high security that the hacking itself is not possible because key values exist separately for each file.

A Study on Clinical Decision Support System based on Common Data Model (공통데이터모델 기반의 임상의사결정지원시스템에 관한 연구)

  • Ahn, Yoon-Ae;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.11
    • /
    • pp.117-124
    • /
    • 2019
  • Recently, medical IT solutions are being provided on a distributed environment basis. In Korea, the necessity of developing a clinical decision support system that can share medical information in a distributed environment has been recognized and studied. The existing clinical decision support system is being built using only medical information of its own within the hospital. This makes it difficult for existing systems to achieve good results in terms of efficiency and accuracy of decision support. In order to solve these limitations, this paper proposes a design and implementation method of clinical decision support system based on common data model in medical field. To explain the application process of the proposed model, we describe the development scenario of the clinical decision support system for the diagnosis of colorectal cancer. We also propose the essential requirements for the development of successful clinical decision support systems. Through this, it is expected that it will be possible to develop clinical decision support system that can be used in various hospitals and improve the efficiency and accuracy of the system.

Abnormal Situation Detection Algorithm via Sensors Fusion from One Person Households

  • Kim, Da-Hyeon;Ahn, Jun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.4
    • /
    • pp.111-118
    • /
    • 2022
  • In recent years, the number of single-person elderly households has increased, but when an emergency situation occurs inside the house in the case of single-person households, it is difficult to inform the outside world. Various smart home solutions have been proposed to detect emergency situations in single-person households, but it is difficult to use video media such as home CCTV, which has problems in the privacy area. Furthermore, if only a single sensor is used to analyze the abnormal situation of the elderly in the house, accurate situational analysis is limited due to the constraint of data amount. In this paper, therefore, we propose an algorithm of abnormal situation detection fusion inside the house by fusing 2DLiDAR, dust, and voice sensors, which are closely related to everyday life while protecting privacy, based on their correlations. Moreover, this paper proves the algorithm's reliability through data collected in a real-world environment. Adnormal situations that are detectable and undetectable by the proposed algorithm are presented. This study focuses on the detection of adnormal situations in the house and will be helpful in the lives of single-household users.

Technical Issues and Solutions for Developing IoT Applications (IoT 애플리케이션 개발의 기술적 이슈 및 솔루션)

  • Shin, Dong Ha;Han, Seung Ho;La, Hyun Jung;Kim, Soo Dong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.3
    • /
    • pp.99-110
    • /
    • 2015
  • Internet-of-Things(IoT) is the computing paradigm converged with different technologies, where diverse devices are connected via the wireless network, acquire environmental information from their equipped sensors, and actuated. IoT applications typically provide smart services to users by interacting with multiple devices connected to the network and are designed by integrating multiple technologies such as sensor network, communication technologies, and software engineering. Moreover, since the concept of IoT has been introduced recently, most of the researches are in the beginning step, which is too early to be practically applied. Due to these facts, developing IoT application results in unconventional technical challenges which have not been observed in typical software applications. And, it is not straightforward to apply conventional project guidelines to IoT application development projects. Hence, there can be many difficulties to successfully complete the projects. Therefore, for successful completion of the projects, we analyze technical challenges occurring in all phases of the project lifecycle, i.e. project preparation stage and development stage. And, we propose the effective solutions to overcome the issues. To verify identified issues and presented solutions, we present the result of applying the solutions to an IoT application development. Through the case study, we evaluate how reasonable the unconventional technical issues are generated and analyze effectiveness of applying the solutions to the application.

Mobile Mashup Development Tool Based on Smartphone (스마트폰 기반의 모바일 매쉬업 개발 툴)

  • Lee, Yong-Ju;Ahn, Sang-June;Im, Hyo-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1611-1614
    • /
    • 2012
  • 매쉬업은 공개된 Open API들을 이용하여 두 가지 이상의 서로 다른 자원을 섞어서 완전히 새로운 가치의 서비스를 만드는 것이다. 매쉬업은 미래 IT 융합 서비스의 효과적인 구현 방법으로써 그 관심도가 점점 높아지고 있으나 컴퓨팅 파워가 떨어지는 스마트폰 환경에서 매쉬업을 성공적으로 개발하기 위해서는 한정된 스마트폰 성능과 고성능 무선 인터넷 활용에 대한 이슈들을 고려해야만 한다. 본 논문에서는 다양한 Open API들을 스마트폰에서 손쉽게 이용할 수 있도록 한 모바일 기반 매쉬업 개발 툴을 개발한다. 본 개발 툴은 사용자가 프로그래밍 지식을 가지고 있지 않더라도 손쉽게 Web 2.0 환경에서 제공하는 Open API들을 매쉬업할 수 있고, 별도의 솔루션을 구축하지 않아도 스마트폰 환경에서 매쉬업을 저비용 고효율적으로 제작할 수 있도록 지원한다.

Authentication Scheme using Biometrics in Electronic Control Unit(ECU) (자동차 전자제어시스템(ECU)에서 생체인증을 이용한 인증기법)

  • Lee, Kwang-Jae;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.818-820
    • /
    • 2013
  • 현재 IT기술과 자동차기술을 융합한 지능형 자동차를 개발 중에 있다. 지능형자동차에 대한 개발이 활발하게 이루어지면서 무선 네트워크 데이터 통신이 가능하게 된 시점이다. 하지만 외부에서 네트워크에 침입하여 지능형자동차의 보안을 위협할 수 있어 그에 따른 지능형자동차 보안솔루션이 필요하다. 하지만 아직 미약한 수준의 단계에 있다. 이런 시점에서 지능형자동차개발에 문제가 되지 않도록 보안성이 높은 지능형자동차서비스를 위한 사용자 생체정보를 이용한 인증 기법을 제안하고자 한다.

Location Based Mobile Mashup Development of Smart Phone Using Open APIs (Open API를 이용한 스마트폰 위치기반 모바일 매쉬업 개발)

  • Lee, Yong-Ju;Seo, Jong-Won;Lee, Jung-Woon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1572-1575
    • /
    • 2013
  • 매쉬업은 공개된 Open API들을 이용하여 두 가지 이상의 서로 다른 자원을 섞어서 완전히 새로운 가치의 서비스를 만드는 것이다. 매쉬업은 미래 IT 융합 서비스의 효과적인 구현 방법으로써 그 관심도가 점점 높아지고 있으나 컴퓨팅 파워가 떨어지는 스마트폰 환경에서 매쉬업을 성공적으로 개발하기 위해서는 한정된 스마트폰 성능과 고성능 무선 인터넷 활용에 대한 이슈들을 고려해야만 한다. 본 논문에서는 다양한 Open API들을 이용하여 스마트폰에서 활용 가능한 위치기반 모바일 매쉬업을 개발한다. 이는 클라우드 컴퓨팅 개념을 접목하여 별도의 솔루션을 구축하지 않고도 저비용 고효율적으로 스마트폰 응용 프로그램을 제작할 수 있는 방법을 제시하고 있다.