• Title/Summary/Keyword: Process Identification

Search Result 2,150, Processing Time 0.027 seconds

Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location (보안 위협위치에서 재사용 가능한 상태전이도를 이용한 보안요구사항 식별)

  • Seo Seong-Chae;You Jin-Ho;Kim Young-Dae;Kim Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.67-74
    • /
    • 2006
  • The security requirements identification in the software development has received some attention recently. However, previous methods do not provide clear method and process of security requirements identification. We propose a process that software developers can build application specific security requirements from state transition diagrams at the security threat location. The proposed process consists of building model and identifying application specific security requirements. The state transition diagram is constructed through subprocesses i) the identification of security threat locations using security failure data based on the point that attackers exploit software vulnerabilities and attack system assets, ii) the construction of a state transition diagram which is usable to protect, mitigate, and remove vulnerabilities of security threat locations. The identification Process of application specific security requirements consist of i) the analysis of the functional requirements of the software, which are decomposed into a DFD(Data Flow Diagram; the identification of the security threat location; and the appliance of the corresponding state transition diagram into the security threat locations, ii) the construction of the application specific state transition diagram, iii) the construction of security requirements based on the rule of the identification of security requirements. The proposed method is helpful to identify the security requirements easily at an early phase of software development.

Research Trends on External Event Identification and Screening Methods for Safety Assessment of Nuclear Power Plant (원자력발전소 안전성 평가를 위한 외부사건 식별 및 선별 방법 연구동향)

  • Kim, Dongchang;Kwag, Shinyoung;Kim, Jitae;Eem, Seunghyun
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.2
    • /
    • pp.252-260
    • /
    • 2022
  • Purpose: As the intensity and frequency of natural hazards are increasing due to climate change, external events that affecting nuclear power plants(NPPs) may increase. NPPs must be protected from external events such as natural hazards and human-induced hazards. External events that may occur in NPPs should be identified, and external events that may affect NPPs should be identified. This study introduces the methodology of identification and screening methods for external events by literature review. Method: The literature survey was conducted on the identification and screening methods of external events for probabilistic safety assessment of NPPs. In addition, the regulations on the identification and screening of external events were investigated. Result: In order to minimize the cost of external event impact analysis of nuclear power plants, research on identifying and screening external events is being conducted. In general, in the identification process, all events that can occur at the NPPs are identified. In the screening process, external events are selected based on qualitative and quantitative criteria in most studies. Conclusions: The process of identifying and screening external events affecting NPPs is becoming important. This paper, summarize on how to identify and screen external events for a probabilistic safety assessment of NPPs. It is judged that research on bounding analysis and conservative analysis methods performed in the quantitative screening process of external events is necessary.

Identification with the Point of Views and the Characters in Game (게임에서의 시점과 캐릭터 동일시)

  • Lee, Sul-Hi;Sung, Yong-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.3
    • /
    • pp.117-126
    • /
    • 2008
  • Lacan's Identification theory has been applied to various cultural genres such as literature, film, media so on. Especially, Identification theory in Film Theory gives game researchers who try to apply identification theory to the game, a concrete base. This paper aims to explain the gamer's action through identification theory. Thus, we divide identification into the level of the gamer's point of view and that of the character in game text. While point-on-view of identification, the primary identification, in film has been explained that the audience identifies with camera's point-of view, in game one identifies with various point-of-views. There are two aspects of Identification of characters in game. First, gamers identify themselves with moving images on screen. Second, They identify with the roles given to themselves. The factors which allow them identification are suppression of false statement system, interpolation and process of selection, arrangement, a cursor, colours on screen.

Minutiae extraction using improved Binarization process of the fingerprint (지문의 개선된 이진화 과정을 통한 특징점 추출)

  • Son Won-Mu;Song Jong-Kwan;Yoon Byung-Woo;Lee Myeong-Jin
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.4
    • /
    • pp.243-248
    • /
    • 2004
  • Automatic fingerprint identification is a process of direction extraction, binarization, thinning, minutiae extraction of fingerprint identification. In this process, binarization after direction extraction affects a process of thinning and minutiae extraction. The fasle binarization is increased the false minutiae extraction rate. In this paper, we proposed more exact minutiae extraction algorithm with more enhanced binarization method, compared with traditional binarization process. We could have more enhanced results by using the direction and the half distance between ridges as the threshold of binarization process. In an experiment, Fingerprint images from NIST DBI are tested and the result shows that the proposed binarization algorithm increases minutiae extraction.

  • PDF

Adaptive control based on nonlinear dynamical system

  • Sugisaka, Masanori;Eguchi, Katsumasa
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10b
    • /
    • pp.401-405
    • /
    • 1993
  • This paper presents a neuro adaptive control method for nonlinear dynamical systems based on artificial neural network systems. The proposed neuro adaptive controller consists of 3 layers artificial neural network system and parallel PD controller. At the early stage in learning or identification process of the system characteristics the PD controller works mainly in order to compensate for the inadequacy of the learning process and then gradually the neuro contrller begins to work instead of the PD controller after the learning process has proceeded. From the simulation studies the neuro adaptive controller is seen to be robust and works effectively for nonlinear dynamical systems from a practical applicational points of view.

  • PDF

Modeling of Grade Change Operations in Paper Mills

  • Ko, Jun-Seok;Yeo, Yeong-Koo;Ha, Seong-Mun;Lim, Jung-Woo;Ko, Du-Seok;Hong Kang
    • Journal of Korea Technical Association of The Pulp and Paper Industry
    • /
    • v.35 no.5
    • /
    • pp.46-52
    • /
    • 2003
  • In this work we developed the closed-loop model of a paper machine during grade change with the intention to provide a reliable dynamic model to be used in the model-based grade change control scheme. During the grade change, chemical and physical characteristics of paper process change with time. It is very difficult to represent these characteristics on-line by using physical process models. In this work, the wet circulation part and the drying section were considered as a single process and closed-loop identification technique was used to develop the grade change model. Comparison of the results of numerical simulations with mill operation data demonstrates the effectiveness of the model identified.

A Study on the Extraction of the Minutiae and Singular Point for Fingerprint Matching

  • Na Ho-Jun;Kim Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.6
    • /
    • pp.761-767
    • /
    • 2005
  • The personal identification procedure through the fingerprints is divided as the classification process by the type of the fingerprints and the matching process to confirm oneself. Many existing researches for the classification and the matching of the fingerprint depend on the number of the minutiae of the fingerprints and the flow patterns by their direction information. In this paper, we focus on extracting the singular points by using the flow patterns of the direction information from identification. The extracted singular points are utilized as a standard point for the matching process by connecting with the extracted information from the singular point embodied. The orthogonal coordinates which is generated by the axises of the standard point can increase the accuracy of the fingerprints matching because of minimizing the effects on the location changes of the fingerprint images.

  • PDF

A Case Study on RFID-PPS(Radio Frequency IDentification-Pallet Pool System) (RFID-PPS (Radio Frequency IDentification-Pallet Pool System) 사례연구)

  • 안종윤;양광모;진향찬;강경식
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2004.05a
    • /
    • pp.303-307
    • /
    • 2004
  • Is not used by consistency transport at transport of freight nothing but is using Pallet only by pedestal when work palletized unit load or materials handling when keep simplicity receptacle which fill raw material or product in factory in our country. Therefore, pallet that is most important function of Pallet is not empled circulation to end consumer from manufacturing plant which is circulation process whole path being done and factory. It is real condition stopping only in extremely determinate part process use of warehouse back. Additionally, it is possible to figure out the flow of all the materials loaded on the RFID pallet; product, material, raw material immediately, so that epoch-making management is possible and it contributes to the reduction of logistics cost because there are little loss or outflow of pallet. The materials flow is getting speedy and inventory is decreasing in the logistics process, and also bad inventory and loss problems are prevented. As a result, not only logistics cost of company but also national logistics cost is decreased. Thus it contributes to the strength of national competitiveness.

  • PDF

A Method of Service Refinement for Network-Centric Operational Environment

  • Lee, Haejin;Kang, Dongsu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.97-105
    • /
    • 2016
  • Network-Centric Operational Environment(NCOE) service becomes critical in today's military environment network because reusability of service and interaction are being increasingly important as well in business process. However, the refinement of service by semantic similarity and functional similarity at the business process was not detailed yet. In order to enhance accuracy of refining of business service, in this study, the authors introduce a method for refining service by semantic similarity and functional similarity in BPMN model. The business process are designed in a BPMN model. In this model, candidated services are refined through binding related activities by the analysis result of semantic similarity based on word-net and functional similarity based on properties specification between activities. Then, the services are identified through refining the candidated service. The proposed method is expected to enhance the service identification with accuracy and modularity. It also can accelerate more standardized service refinement developments by the proposed method.