• Title/Summary/Keyword: Modules

Search Result 5,789, Processing Time 0.034 seconds

Derivation of Anti-Tamper System Requirements Based on CMVP Standard for Technology Protection of Weapon Systems (무기 시스템의 기술 보호를 위한 CMVP 표준 기반의 Anti-Tamper 시스템 요구사항 도출)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.470-478
    • /
    • 2019
  • As the growth of the domestic defense industry is remarkable regarding technology level and export size, technology protection is necessary. Particularly, there is a need to apply anti-tamper measures to prevent critical technologies from illegally being taken out of weapon systems. However, there is no security protection strategy and system built yet in ROK. Precedent studies discussed the trend analysis and technical research for specific protective techniques, and the application of anti-tamper using limited procedures was provided. Recently, methods of how to select the technology for protection were studied based on risk management. Nonetheless, these studies cannot be associated with the acquisition process for the whole life-cycle, having difficulty with actual development and evaluation of the weapon systems. The objective of our study is to derive the system requirements of the weapon system for which anti-tamper measures have been determined to apply. Specifically, requirements items suitable for the development of anti-tamper weapon systems were derived based on ISO/IEC 19790, the CMVP standard for the development and verification of cryptographic modules. Also, its utilization in technical reviews and test & evaluations was presented. The usefulness of the research results was confirmed through inductive inference and comparative evaluation. The result can be expected to play a role in initiating extensive activities needed for technology protection of the weapon systems.

Influence of the Amount of Conductive Paste on the Electrical Characteristics of c-Si Photovoltaic Module (전도성 페이스트 도포량 변화에 따른 결정질 태양광 모듈의 전기적 특성에 대한 영향성 분석)

  • Kim, Yong Sung;Lim, Jong Rok;Shin, Woo Gyun;Ko, Suk-Whan;Ju, Young-Chul;Hwang, Hye Mi;Chang, Hyo Sik;Kang, Gi-Hwan
    • Korean Journal of Materials Research
    • /
    • v.29 no.11
    • /
    • pp.720-726
    • /
    • 2019
  • Recently, research on cost reduction and efficiency improvement of crystalline silicon(c-Si) photovoltaic(PV) module has been conducted. In order to reduce costs, the thickness of solar cell wafers is becoming thinner. If the thickness of the wafer is reduced, cracking of wafer may occur in high temperature processes during the c-Si PV module manufacturing process. To solve this problem, a low temperature process has been proposed. Conductive paste(CP) is used for low temperature processing; it contains Sn57.6Bi0.4Ag component and can be electrically combined with solar cells and ribbons at a melting point of $150^{\circ}C$. Use of CP in the PV module manufacturing process can minimize cracks of solar cells. When CP is applied to solar cells, the output varies with the amount of CP, and so the optimum amount of CP must be found. In this paper, in order to find the optimal CP application amount, we manufactured several c-Si PV modules with different CP amounts. The amount control of CP is fixed at air pressure (500 kPa) and nozzle diameter 22G(outer diameter 0.72Ø, inner 0.42Ø) of dispenser; only speed is controlled. The c-Si PV module output is measured to analyze the difference according to the amount of CP and analyzed by optical microscope and Alpha-step. As the result, the optimum amount of CP is 0.452 ~ 0.544 g on solar cells.

Elementary Students' Creativity Appear in Small Group Interactions During Model-Based Classrooms on Terraforming (테라포밍에 대한 과학적 모델링 수업에서 소그룹 상호작용 중 발현되는 초등학생의 창의성)

  • Park, Shin Hee;Choe, Seung Urn;Kim, Chan Jong
    • Journal of The Korean Association For Science Education
    • /
    • v.40 no.6
    • /
    • pp.611-620
    • /
    • 2020
  • The purpose of the study is to find creativity factors of students in the process of small group modeling and relate them to the types of interactions among students. In order to capture students' detailed interactions, this study was conducted as an 'essential case study' through qualitative analysis. We have developed the modules of nine lessons about terraforming, and they were used in an actual classroom. In order to understand the creativity of the students in the process of modeling, students' discourses and interview data were analyzed using 19 creative factors or abilities. The findings are as follows. Frequently found creativity factors are Elaboration, Evaluation, Visualization, Resist premature closer, Originality, Analysis and Concentration. And students' interactions that affect students' creativity in the process of modeling can be classified into four categories: Suggestion, Agreement, Questioning, Refutation, and Conversion. Through each interaction, students demonstrated the process of expressing and modifying their own thoughts and ideas in the modeling process. The findings of the study suggest that it is important to the teachers to understand types of interactions among students and the relationship between the types of interaction and creativity factors for students' creative modeling in modeling-based learning.

Design and implementation of an AI-based speed quiz content for social robots interacting with users (사람과 상호작용하는 소셜 로봇을 위한 인공지능 기반 스피드 퀴즈 콘텐츠의 설계와 구현)

  • Oh, Hyun-Jung;Kang, A-Reum;Kim, Do-Yun;Jeong, Gu-Min
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.611-618
    • /
    • 2020
  • In this paper, we propose a design and implementation method of speed quiz content that can be driven by a social robot capable of interacting with humans, and a method of developing an intelligent module necessary for implementation. In addition, we propose a method of implementing speed quiz content through the process of constructing a map by arranging and connecting intelligent module blocks. Recently, software education has become mandatory and interest in programming is increasing. However, programming is difficult for students without basic knowledge of programming languages to directly access, and interest in block-type programming platforms suitable for beginners is growing. The block-type programming platform used in this paper is a platform that supports immediate and intuitive programming by supporting interactions between humans and robots. In this paper, the intelligent module implemented for the speed quiz content was used by blocking it within a block-type programming platform. In order to implement the scenario of the speed quiz content proposed in this paper, we implement a total of three image-based artificial intelligence modules. In addition to the intelligent module, various functional blocks were placed to implement the speed quiz content. In this paper, we propose a method of designing a speed quiz content scenario and a method of implementing an intelligent module for speed quiz content.

Cooperative Architecture for Centralized Botnet Detection and Management (협업 기반의 중앙집중형 봇넷 탐지 및 관제 시스템 설계)

  • Kwon, Jong-Hoon;Im, Chae-Tae;Choi, Hyun-Sang;Ji, Seung-Goo;Oh, Joo-Hyung;Jeong, Hyun-Cheol;Lee, Hee-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.83-93
    • /
    • 2009
  • In recent years, cyber crimes were intended to get financial benefits through malicious attempts such as DDoS attacks, stealing financial information and spamming. Botnets, a network composed of large pool of infected hosts, lead such malicious attacks. The botnets have adopted several evasion techniques and variations. Therefore, it is difficult to detect and eliminate them. Current botnet solutions use a signature based detection mechanism. Furthermore, the solutions cannot cover broad areas enough to detect world-wide botnets. In this study, we suggest an architecture to detect and regulate botnets using cooperative design which includes modules of gathering network traffics and sharing botnet information between ISPs or nations. Proposed architecture is effective to reveal evasive and world-wide botnets, because it does not depend on specific systems or hardwares, and has broadband cooperative framework.

Design and Implementation of an E-mail Worm-Virus Filtering System on MS Windows (MS 윈도우즈에서 E-메일 웜-바이러스 차단 시스템의 설계 및 구현)

  • Choi Jong-Cheon;Chang Hye-Young;Cho Seong-Je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.37-47
    • /
    • 2005
  • Recently, the malicious e-mail worm-viruses have been widely spreaded over the Internet. If the recipient opens the e-mail attachment or an e-mail itself that contains the worm-virus, the worm-virus can be activated and then cause a tremendous damage to the system by propagating itself to everyone on the mailing list in the user's e-mail package. In this paper, we have designed and implemented two methods blocking e-mail worm-viruses. In the fist method, each e-mail is transmitted only by sender activity such as the click of button on a mail client application. In the second one, we insert the two modules into the sender side, where the one module transforms a recipient's address depending on a predefined rule only in time of pushing button and the other converts the address reversely with the former module whenever an e-mail is sent. The lader method also supports a polymorphism model in order to cope with the new types of e-mail worm-virus attacks. The two methods are designed not to work for the e-mail viruses. There is no additional fraction on the receiver's side of the e-mail system. Experimental results show that the proposed methods can screen the e-mail worm-viruses efficiently with a low overhead.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

Assessment Module Formulation for the Trapped-Oil Recovery Operations from Sunken Vessels (침몰선 잔존유 회수작업 평가모듈 개발에 관한 연구)

  • Kang, Kwang-gu;Lee, Eun-bang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.1
    • /
    • pp.88-96
    • /
    • 2021
  • When oil tankers, large passenger ships and cargo ships sink under the sea owing to various maritime accidents, the residual cargo oil or fuel oil in the such vessels could pose direct risk to factor for the marine environment and it require safe and rapid removal. Although domestic and foreign salvage companies are adopting various recovery methods and technologies with customizations according to each site during recovery operations studies on reasonable assessment modules for the operation process are relatively insufficient. In this study, the data from trapped-oil recovery operations performed at different site conditions were collected and analyzed in order to designed an operation assessment module, define the operational process steps in terms of preparation, implementation and completion, and derive key factors for each detailed process. Subsequently, the module was designed in such a way as to construct performance indicators to assess these key factors. In order to exclude subjective opinions from the assessment as much as possible, the assessment each item was constructed with indicators based on data that could be evaluated quantitatively and its usefulness was verified by applying the module to the trapped-oil recovery operation cases. We expect this the method and the technology assessment module for the trapped-oil recovery operation on sunken vessels will help to verify the adequacy of the trapped-oil recovery such operation before or after. Furthermore, it is expected that the continuous accumulation of assessment data and feedback from past or future operation cases will contribute toward enhancing the overall safety, efficiency and field applicability of trapped-oil recovery operation.

The Development and Application Effects of Youth Future Career Programs (청소년의 미래진로프로그램 개발 및 적용 효과)

  • Baek, Minjung;Kang, Kyoung-Kyoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.603-610
    • /
    • 2021
  • The purpose of this study was to develop a Youth Future Career Program for adolescents and to look into the effects of the program on the future efficacy. Through the program, adolescents would predict the future, explore alternative futures to solve future problems, find the shape of the future society they want and desire. In addition, they will discover or create future jobs. In this study, the Youth Future Career Program was developed into four modules: Future Understanding, Future Participation, Future-self, and Future Management. Ninety-three students in K University's Gifted Education Center participated in the Future Career Program (62 males and 31 females, 62 middle school students, and 31 high school students). The students responded to 14 questions about the future efficacy of the Youth before and after the program. Statistically significant differences were observed in 8 out of 14 questions (p<.05). In particular, the abilities of the participants were improved as follows: to apply newly learned things to society, to evaluate the current problems, to develop critical thinking to solve the problem, and to communicate with members of society.

A Study on Loading Method of Large Scaffolding Module for LNG Carriers Using TRIZ (TRIZ를 이용한 LNG 운반선 대형 비계 모듈의 탑재 방안 연구)

  • Park, Myeong-Chul;Shin, Sang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.94-100
    • /
    • 2021
  • To improve the productivity of cargo containment construction for a membrane LNG carrier, it is important to shorten the installation period and process of the scaffolding system, which is a construction workbench of a cargo containment for a membrane LNG carrier. As an effective method, opinions are being gathered to enlarge the lifting unit from the existing two stages to eight stages. On the other hand, the stresses around the pin and hole will increase significantly because of the increase in lifting load according to the large size of the module. The purpose of this study was to establish a new large module-lifting plan by introducing TRIZ to solve these problems. This study adopted a method to utilize 40 inventive principles, which is one of the various problem-solving tools of TRIZ. First, technical contradictions were derived, the engineering parameters were selected. Second, efficient inventive principles were selected to overcome the technical contradictions using a contradiction matrix. Finally, the general and specific solutions were derived through the selected inventive principle, and structural analysis confirmed that the stress generated in the structure was low. The utility of TRIZ was confirmed by the successful lifting of large modules using the established lifting method.