• 제목/요약/키워드: Open-Source Components

검색결과 84건 처리시간 0.031초

오픈소스 기반 분산원장기술 시스템을 위한 보안 강화 방안 (Security Enhancements for Distributed Ledger Technology Systems Based on Open Source)

  • 박근덕;김대경;염흥열
    • 정보보호학회논문지
    • /
    • 제29권4호
    • /
    • pp.919-943
    • /
    • 2019
  • 4차 산업 혁명 관련 신흥 기술로 주목받고 있는 분산원장기술은 오픈소스 기반 분산원장기술 시스템(또는 분산원장기술 플랫폼)으로 구현되어 다양한 애플리케이션(또는 서비스) 개발 시 널리 활용되고 있으나, 오픈소스 기반 분산원장기술 시스템에서 제공하는 보안 기능은 매우 미흡한 실정이다. 본 논문에서는 오픈소스 기반 분산원장기술 시스템 운용 시 발생할 수 있는 잠재적인 보안 위협을 식별하고, 국내 법규 및 보안 인증 기준(ISMS-P, Information Security Management System-Privacy)을 분석하여 보안 위협에 대응할 수 있는 보안기능 요구사항을 도출한다. 그리고 국제 표준인 공통평가기준(CC, Common Criteria)의 보안기능 컴포넌트 분석을 통하여 오픈소스 기반 분산원장기술 시스템에 필요한 보안 기능을 구현할 수 있는 방안을 제안함으로서 보안을 강화하고자 한다.

오픈소스 클라우드 플랫폼 OpenStack 기반 위성영상분석처리 서비스 시험구현 (Testing Implementation of Remote Sensing Image Analysis Processing Service on OpenStack of Open Source Cloud Platform)

  • 강상구;이기원
    • 한국지리정보학회지
    • /
    • 제16권4호
    • /
    • pp.141-152
    • /
    • 2013
  • 2013년 현재 클라우드(Cloud) 컴퓨팅 서비스는 정보통신기술분야의 핵심 기술 동향 중 하나로서 이에 관련된 기술이나 사업 응용 분야가 계속 발전, 확대되고 있다. 이러한 서비스를 개발할 수 있는 기반 요소인 클라우드 플랫폼 중에 하나인 OpenStack은 오픈소스 기반으로 몇 가지의 내부 기술 요소로 이루어져 있고, 서비스 목적에 따라 상업적 플랫폼에 의존하지 않고도 독자적인 공개 및 비공개 클라우드 컴퓨팅 환경을 구축할 수 있는 환경을 제공한다. 이번 연구에서는 위성영상정보 분석처리 시스템을 시범적인 클라우드 서비스 모델로 설정하여 OpenStack을 기반으로 비공개 클라우드 컴퓨팅 환경으로 설계, 구축하는 사례를 제시하고자 하였다. 구현된 서비스는 세부적으로 인스턴스 서버, 웹 서비스, 모바일 앱으로 구분하였다. 인스턴스 서버는 실제 위성영상정보 분석처리, 데이터베이스 등의 기능을 제공하고, 웹 서비스는 사용자로부터 위성영상정보를 저장 및 관리하는 기능을 제공한다. 한편 모바일 앱은 위성영상정보의 시각화 및 분석처리 요청 등의 기능을 수행한다.

공간정보 오픈플랫폼 설계를 위한 2D Web Mapping Open API 비교 연구 (The Comparative Research On 2D Web Mapping Open API for Designing Geo-Spatial Open Platform)

  • 최원근;김민수;장인성;장윤섭
    • Spatial Information Research
    • /
    • 제22권5호
    • /
    • pp.87-98
    • /
    • 2014
  • Google 지도는 AJAX(Asynchronous JavaScript and XML) 기술을 이용하여 Web-GIS의 반응 속도를 크게 변화시켰다. 또한 Google은 Open API(Application Programming Interface)인 Google Maps API를 공개하여 기존의 SDK(Software Development Kit)와 ASP(Application Service Provider)가 주도하던 지도 시장에 Open API라는 패러다임의 변화를 가져왔다. 이후, 많은 정부와 기업과 오픈소스 진영에서 비슷한 방식의 Open API를 내놓았으며 Web-GIS 시장을 키워왔다. 또한 HTML5 표준에 대한 최신 웹브라우저의 적극적인 표준 구현으로 인해 웹지도는 단순한 웹페이지가 아닌 하나의 웹어플리케이션으로 진화하여 속도와 성능향상을 이루었다. 하지만 많은 공간정보 2D Open API들이 나왔지만 국내의 API에 대한 현실적인 비교분석은 잘 이루어지지 않은 실정이다. 따라서 본 논문에서는 먼저 공간정보 2D Open API를 이루고 있는 구성요소들을 살펴보고, 각각의 API들이 어떠한 기능들을 얼마만큼 지원하는지를 살펴보고자 한다. 또한 각 API 별로 기능적인 특징과 서비스적인 특징들을 살펴보고 비교분석을 수행하고자 한다. 끝으로, 공간정보 2D Open API의 서비스 사례들을 살펴보고 앞으로의 발전 방향에 대해 제시하고자 한다.

The Effects of Online Social Influencers on Purchasing Behavior of Generation Z: An Empirical Study in Vietnam

  • PHAM, Minh;DANG, Thao Yen;HOANG, Thi Hong Yen;TRAN, Thi Thanh Nga;NGO, Thi Huong Quynh
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권11호
    • /
    • pp.179-190
    • /
    • 2021
  • The purpose of this study is to understand the impact of influencers on generation Z (Gen Z) in the online environment. This article has applied the theories of source credibility, TAM, IAM, and TPB to identify influencer characteristics that affect the purchasing behaviors of Gen Z customers. This research was conducted using a Google Form survey with 24 pre-designed questions. A total of 464 valid questionnaires from Gen Z Vietnamese were collected between November 2020 and January 2021. Data was analyzed using partial least squares structural equation modeling (PLS-SEM) with SmartPLS 3 software. The analysis results confirmed that the components of influencer credibility have a positive impact on Gen Z's purchasing behaviors under the mediated influence of argument quality, perceived usefulness, and social influence. Surprisingly, for Gen Z, the influencers' attractiveness has the strongest impact on their online behavior. More specifically, attractiveness plays the most important role in the perceived usefulness and social influence of Gen Z customers, while influencers' expertise has the strongest impact on argument quality delivered to customers. This study provides evidence of a change in the way Gen Z responds to marketing activities. They are more drawn by the attraction of influencers than their expertise.

Supporting Java Components in the SID Simulation System

  • Ma'ruf, Hasrul;Febiansyah, Hidayat;Kwon, Jin-Baek
    • Journal of Information Processing Systems
    • /
    • 제8권1호
    • /
    • pp.101-118
    • /
    • 2012
  • Embedded products are becoming richer in features. Simulation tools facilitate low-costs and the efficient development of embedded systems. SID is an open source simulation software that includes a library of components for modeling hardware and software components. SID components were originally written using C/C++ and Tcl/Tk. Tcl/Tk has mainly been used for GUI simulation in the SID system. However, Tcl/Tk components are hampered by low performance, and GUI development using Tcl/Tk also has poor flexibility. Therefore, it would be desirable to use a more advanced programming language, such as Java, to provide simulations of cutting-edge products with rich graphics. Here, we describe the development of the Java Bridge Module as a middleware that will enable the use of Java Components in SID. We also extended the low-level SID API to Java. In addition, we have added classes that contain default implementations of the API. These classes are intended to ensure the compatibility and simplicity of SID components in Java.

Fault-Tolerant Strategy to Control a Reverse Matrix Converter for Open-Switch Faults in the Rectifier Stage

  • Lee, Eunsil;Lee, Kyo-Beum
    • Journal of Power Electronics
    • /
    • 제16권1호
    • /
    • pp.57-65
    • /
    • 2016
  • Reverse matrix converters, which can step up voltages, are suitable for applications with source voltages that are lower than load voltages, such as generator systems. Reverse matrix converter topologies are advantageous because they do not require additional components to conventional matrix converters. In this paper, a detection method and a post-fault modulation strategy to operate a converter as close as possible to its desired normal operation under the open-switch fault condition in the rectifier stage are proposed. An open-switch fault in the rectifier stage of a reverse matrix converter causes current distortions and voltage ripples in the system. Therefore, fault-tolerant control for open-switch faults is required to improve the reliability of a system. The proposed strategy determines the appropriate switching stages from among the remaining healthy switches of the converter. This is done based on reference currents or voltages. The performance of the proposed strategy is experimentally verified.

SID 시뮬레이터와 자바 컴포넌트 연동 모듈 개발 (Developing a Bridge Module to Java Component for SID Simulator)

  • 하스룰;권진백
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2010년도 추계학술발표대회
    • /
    • pp.1635-1637
    • /
    • 2010
  • Simulation tools help creating a low cost and efficient development of embedded system. SID is an open source simulator software that consists library of components for modelling hardware and software components. A component can be written in C/C++ and Tcl/Tk. Currently, the SID simulation toolkit only provides support for C++ and Tcl/Tk. Tcl/Tk is used to write GUI-based components. However, we have observed that Tcl/Tk components cause slow simulation response because Tcl/Tk is a script language. It is not proper for developing the cutting-edge products with rich graphics. Therefore, in this paper, we suggest Java to a new language for GUI components in SID by developing a bridge module for SID to interworking with Java components.

Heritability and Repeatability Estimates for Reproductive Traits of Japanese Black Cows

  • Oyama, K.;Katsuta, T.;Anada, K.;Mukai, F.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • 제15권12호
    • /
    • pp.1680-1685
    • /
    • 2002
  • Reproductive data collected from more than 20,000 Japanese Black cows of Hyogo and Shimane Prefectures were analyzed. Averages of age at first calving, gestation length, days open and calving interval were 25.1 mo, 289 d, 112 d and 401 d, respectively. Variance components were obtained by REML procedure and the heritability estimate of age at first calving was 0.22. In gestation length the heritability estimate was 0.40 and no permanent environmental effect was estimated. Estimated variance components of calving interval were similar to those of days open and the heritability and repeatability of calving interval were 0.05 and 0.09, respectively. Random farm effects accounted for approximately 10% of phenotypic variations in all traits. Genetic and farm correlations between age at first calving and calving interval were 0.27 and 0.39, respectively. It was found that temporary environment was an important source of variation for calving intervals of Japanese Black.

Automatic Extraction of Dependencies between Web Components and Database Resources in Java Web Applications

  • Oh, Jaewon;Ahn, Woo Hyun;Kim, Taegong
    • Journal of information and communication convergence engineering
    • /
    • 제17권2호
    • /
    • pp.149-160
    • /
    • 2019
  • Web applications typically interact with databases. Therefore, it is very crucial to understand which web components access which database resources when maintaining web apps. Existing research identifies interactions between Java web components, such as JavaServer Pages and servlets but does not extract dependencies between the web components and database resources, such as tables and attributes. This paper proposes a dynamic analysis of Java web apps, which extracts such dependencies from a Java web app and represents them as a graph. The key responsibility of our analysis method is to identify when web components access database resources. To fulfill this responsibility, our method dynamically observes the database-related objects provided in the Java standard library using the proxy pattern, which can be applied to control access to a desired object. This study also experiments with open source web apps to verify the feasibility of the proposed method.

Android App Reuse Analysis using the Sequential Hypothesis Testing

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제8권4호
    • /
    • pp.11-18
    • /
    • 2016
  • Due to open source policy, Android systems are exposed to a variety of security problems. In particular, app reuse attacks are detrimental threat to the Android system security. This is because attacker can create core malign components and quickly generate a bunch of malicious apps by reusing these components. Hence, it is very imperative to discern whether Android apps contain reused components. To meet this need, we propose an Android app reuse analysis technique based on the Sequential Hypothesis Testing. This technique quickly makes a decision with a few number of samples whether a set of Android apps is made through app reuse. We performed experimental study with 6 malicious app groups, 1 google and 1 third-party app group such that each group consists of 100 Android apps. Experimental results demonstrate that our proposed analysis technique efficiently judges Android app groups with reused components.